We present several use-cases where embedded security is a fundamental requirement. For each use-case, we list a set of security-related characteristics and translate these characteristics into security requirements. We continue by analyzing the security requirements and identifying the embedded security building blocks of each one. The information for each use-case is presented in a tabular format combined with detailed analysis, facilitating easy reference per specific use-case.