Architectures and techniques that allow a firmware agent to operate as a
tamper-resistant agent on a host platform that may be used as a trusted
policy enforcement point (PEP) on the host platform to enforce policies
even when the host operating system is compromised. The PEP may be used
to open access control and/or remediation channels on the host platform.
The firmware agent may also act as a local policy decision point (PDP) on
the host platform in accordance with an authorized enterprise PDP entity
by providing policies if a host trust agent is non-responsive and may
function as a passive agent when the host trust agent is functional.