2.1 The Role of the Operating System2.2 Multiple Independent Levels of Security2.3 Microkernel versus Monolith2.4 Core Embedded Operating System Security Requirements2.5 Access Control and Capabilities2.6 Hypervisors and System Virtualization2.7 I/O Virtualization2.8 Remote Management2.9 Assuring Integrity of the TCB2.10 Key Points2.11 Bibliography and Notes