Executive Summary

Introduction

This document describes guidelines for secure code review in EDK II firmware.

Audience

This document is intended for use by firmware developers, security reviewers, and firmware validation engineers.