Hardware / Firmware
- Risks: Physical tampering, side-channel attacks, bootkits.
- Controls: Secure boot, hardware root of trust, firmware signing, measured boot, and Information Flow Tracking
Note: Hardware compromise undermines higher layers → trust must start here.