A starting point that is implicitly trusted.
Trust is complex. We need to manage trust in hierarchy with trust chain. Root of trust must not be abused. (disaster)
Highly reliable hardware, firmware, and software components that perform specific, critical security functions. Because roots of trust are inherently trusted, they must be secure by design. Roots of trust provide a firm foundation from which to build security and trust.