Additional Security Features
- Key and asset provisioning, management, and isolation, across different device operational scenarios
- Support for secure debug facilities, which can be validated and authenticated via the hardware RoT