In the second installment of this series, the author details the security building blocks required for embedded security in automotive designs. In the first installment, electronic control unit software integrity protection was analyzed. Part 2 details secure storage, which the author says must be persistent. Also detailed are secure boot techniques required to bring automotive systems to a trusted state. Finally, the author explores secure JTAG interfaces for debugging SoCs and a secure execution environment needed for secure processors.