Executive Summary
Introduction
The purpose of this document is to help build robust firmware using EDK II. This supplements other documents related to secure design of EDK II code.
Audience
This document is intended for firmware security developers, security reviewers, and firmware security validation engineers.