The purpose of this document is to help build robust firmware using EDK II. This supplements other documents related to secure design of EDK II code.
This document is intended for firmware security developers, security reviewers, and firmware security validation engineers.