A consideration for hardware-based security is in support of zero-trust architectures where the trustworthiness of a connecting PC is confirmed by hardware-enforced root of trust.