A technique is provided for facilitating secure operation of an integrated
system. The technique includes passing a request for data through a data
access controller incorporated within the integrated system, and
selectively qualifying the request in accordance with a security state of
the controller. The security state of the controller is one state of
multiple possible security states, including a null state and a secured
state. In the secured state, the controller replaces a standard boot code
address associated with a request for boot code with a substitute boot
code address. The substitute boot code address addresses an encrypted
version of boot code, which is then decrypted by the controller employing
a master key set held at the controller. When transitioning to the null
state, the master key set is erased.