Hardware configuration

For the evaluated configuration to remain Common Criteria-compliant, it must operate on a secure hardware configuration.