Even though the diagram over exemplifies a TEE by having an working system (Trusted OS), we could just Possess a bare-metallic firmware exposing an interface with exclusive usage of specified components methods.
great https://sidneyqfzj893426.digiblogbox.com/55011143/considerations-to-know-about-confidential-computing