Defense In Depth
Realttime AT Monitors
Code & Configuration
2 levels of Trusted Zones!
Unlike traditional systems, critical control is not
on primary network yet instead on highly
protected & encrypted secondary busses!
All code sits encrypted!
Unencrypted code not available outside of
Single Source Boot!
Malicious code has no place to attach!
In normal operation, reprogram blocked
Defense In Depth Overview