In two previous articles, I looked at the JTAG access port from a security perspective, and considered what exposure the choice of BMC operating system might have on a platform supporting At-Scale Debug. Now, letโs consider the root of all trust, the silicon itself, and see what options exist for locking it down.