Secure boot

Software/Firmware must verify a trust chain that extends through the hardware root of trust, boot loader, boot configuration file, and operating system image, in that order. The trusted boot/RoT computing module should be implemented on radiation tolerant burn-in (non-programmable) equipment. 

Sources

Best Segment for Countermeasure Deployment

  • Space Segment
ID: CM0014
Created: 2022/10/19
Last Modified: 2025/04/15