The (safe) boot process is an elementary component of every security concept. Based on this, it is determined whether the system can be considered protected from third-party or service provider access. The security of the boot process, and the option to verify which kernel and which application software has been booted, enable the device manufacturer to safely ascertain whether or not the software has been modified. This allows the rejection of unfounded recourse claims with certainty!
We would be glad to help you become skilled in assuredly distinguishing between a manipulated system and an integer system!
Further information can be found in our paper Embedded Secure-Boot.