There is no surprise that the percentage of breaches involving end-user devices has doubled each year or that bad actors are shifting focus from desktop to mobile users and the internet of things (IoT). A bad actor that can alter, inject, or replace code on an IoT device might gain control of the system and access sensitive data. As a result, the need to prioritize embedded security in embedded systems has never been more urgent and the secure boot of every embedded system is a key part of any security strategy.