Control all logic
Prevent damage
Process securing the information layer to the operational one.
Manifest
The manifest contains meta-data about the eg. firmware image.
Security
It should be unobtrusive, unavoidable and cheap.
Intervention
Mitigate any breach within the up and downlink.