Although the diagram previously mentioned exemplifies a TEE by having an working program (Trusted OS), we could just Have a very bare-metallic firmware exposing an interface with exclusive usage of specific components https://haseebymgz229051.bloguerosa.com/29440333/5-essential-elements-for-encrypting-data-in-use