Security built-in by design
Security-by-Design via MILS (Multiple independent Levels of Security)
Security provides high-assurance for its functionality
Adaptation and update of the system to change deployment environment and mutating attackers
Security assurance via independent Security certification
Secure life cycle with secure boot and secure update
Support of trusted modules TPM/HSM and cryptography