Security built-in by design
Security provides high-assurance for its functionality
Adaptation and update of the system to change deployment environment and mutating attackers
Security-by-Design via MILS
Security assurance via independent Security certification
Secure lifecycle with secure boot and secure update
Support of trusted modules TPM/HSM and cryptography