A method and system for enhanced security and manageability using secure
storage. The system may include a crypto-processor and a memory coupled
to receive memory transactions through the crypto-processor. The memory
transactions are passed to the memory by the crypto-processor. The system
may include a first processor, a second processor coupled to the first
processor, and a storage device operably coupled to the first processor
through the second processor. The second processor is configured to
control access to the storage device. The method includes transmitting a
request for a memory transaction for a storage location in the storage
device and receiving the request for the memory transaction at the
crypto-processor. The method also includes determining if the memory
transaction is authorized for the storage location, and passing the
request for the memory transaction to the storage device if the memory
transaction is authorized for the storage location.