You copied the Doc URL to your clipboard.

2.17. Hardware consideration for Security Extensions

This section describes the following: