Executive Summary

Introduction

The purpose of this document is to help build robust firmware using EDK II. This supplements other documents related to secure design of EDK II code.

Audience

This document is intended for firmware security developers, security reviewers, and firmware security validation engineers.