Even though the diagram earlier mentioned exemplifies a TEE by having an running procedure (Trusted OS), we could just Have got a bare-steel firmware exposing an interface with exclusive use of specific components https://carlyedcq047360.techionblog.com/31120564/considerations-to-know-about-confidential-computing