A root of trust (RoT) is a source within a computing system that is inherently and implicitly trusted. RoTs are designed to be the "first link" in a security chain, providing functions such as cryptographic key storage, identity verification, and integrity measurement that the rest of the system can rely upon.
Where does trust begin in a computing system?
Before an operating system loads, an application runs, or a user authenticates, the underlying hardware must prove that it is genuine and unmodified. This certainty is determined by the root of trust (RoT), the starting point for system trust and verification. The National Institute of Standards and Technology (NIST) defines a root of trust as a highly reliable hardware, firmware, and software component that performs specific, critical security functions in order to build a firm security and trust foundation.
When implemented into information and technology systems, a root of trust is typically a standalone hardware component, such as a dedicated chip or a protected region within a processor. This dedicated component remains isolated from the primary operating system. This isolation is critical, as it keeps the root of trust protected even if the device’s main software is compromised by sophisticated malware or administrative-level breaches. These are known as a hardware root of trust (HRoT).
Traditional security measures, such as antivirus software or firewalls, operate at the software level and can only protect what they can observe. If an attacker compromises the firmware or the boot process, they can effectively hide from the operating system, gaining a level of persistence that survives reboots and disk wipes.
A root of trust addresses these vulnerabilities by providing several key security protections:
NIST defines a hardware root of trust (HRoT) as "an inherently trusted combination of hardware and firmware that maintains the integrity of information."
A hardware root of trust is the secure foundation of a computing system and its operations. When implemented, an HRoT contains the keys used for cryptographic functions and enables secure boot processes. An HRoT can be implemented as a stand-alone security module, within a processor, or within a system on chip (SoC).
Hardware root of trust architectures rely on specialized components such as:
While it is possible to implement a root of trust in software, it is generally considered insufficient for high-security environments. This is because a software-based RoT resides in the same memory space as the potential threats it is designed to detect, making it vulnerable to the same exploits that compromise the operating system. If the underlying operating system is compromised, the foundation of trust is broken.
A root of trust operates through a “chain of trust,” a hierarchical system in cybersecurity where trust is established and passed down from a trusted "root" to intermediate entities, ensuring authenticity. A chain of trust consists of a sequential cryptographic verification process where each component in the boot sequence is authenticated by the preceding, already trusted component before execution. When completed, this chain establishes an unbroken chain of verified integrity from hardware power-on to operating system load.
A chain of trust consists of multi-step, sequential verification process:
Failure at any point in this chain indicates a potential compromise, leading to a controlled system response to prevent untrusted code execution. This layered verification is critical for system security from the first instruction.
Zero trust operates on a key principle: "never trust, always verify."
A root of trust provides the technical mechanisms required to implement this principle in real world systems. In a zero trust architecture (ZTA), access to resources is not implicitly granted based on network location. Instead, every access request is rigorously evaluated based on the identity and integrity of the requesting entity and device. RoT-backed signals are crucial for establishing this verifiable trust, and support key zero trust principles: identity verification, device integrity, and policy enforcement.
Zero trust principle | How root of trust aligns |
Identity verification: Authenticating users and devices before granting access. | Provides unique, hardware-bound cryptographic identities (such as attestation keys) that allow devices to prove their identity and resist spoofing during authentication. |
Device integrity: Verifying if devices are healthy, compliant, and free from compromise. | Utilizes secure measurement capabilities via root of trust for measurement (RTM) to cryptographically hash boot components, verifying the entire boot chain's integrity and reporting any deviations. |
Policy enforcement: Granting least-privilege access based on context and risk. | Offers secure, tamper-resistant storage (TRS) for critical policy enforcement keys and configuration data. Access decisions are based on trusted and unaltered parameters. |
The principles of root of trust are fundamental to securing an array of computing systems, from consumer devices to enterprise infrastructure.
A root of trust can be implemented at scale, from protecting individual devices to securing entire data centers and cloud networks. Modern infrastructure environments rely on RoTs to establish identity and protect sensitive resources across distributed environments.
Common use cases for roots of trust in modern infrastructure environments include:
A root of trust provides cryptographic measurement and verification of the hardware and software environment in which AI workloads run, including agentic AI systems. A hardware root of trust may be embedded directly into AI silicon (CPUs, GPUs, NPUs) to provide a physical anchor for system integrity, and to ensure that AI models, firmware, and data remain untampered with.
Using hardware-backed isolation (e.g., TEEs) and remote attestation, a root of trust also enables systems to validate platform integrity before decrypting model artifacts or accessing protected credentials, such as API tokens, signing keys, or service identity certificates used by agents to authenticate and communicate. This can prevent malicious AI workloads and agents from running and prevent data from compromise or manipulation. However, a root of trust does not assess model behavior or determine model safety.
Common use cases for root of trust in agentic AI systems includes:
What is the Chain of Trust?
The Chain of Trust is a sequential verification process in which each system component is authenticated by a previously trusted component before it runs. This creates an unbroken path of verified integrity from hardware power-on to operating system load and beyond.
What is the difference between hardware and software Root of Trust?
A software root of trust (RoT) runs within the operating system environment and depends on that environment’s security. A hardware root of trust is physically isolated from the main CPU and memory, providing stronger protection against tampering.
How does a Root of Trust support zero trust architectures?
Zero trust requires continuous verification of identity and device integrity. A root of trust provides hardware-bound cryptographic identities and verifiable integrity measurements that systems can use to evaluate trust before granting access.
How does Root of Trust apply to AI systems?
A root of trust verifies the integrity of the platform and runtime environment before AI models execute. It can also bind cryptographic identity to autonomous agents and provide evidence that models and data were processed in verified environments.
How is Root of Trust used in infrastructure?
In distributed systems, a root of trust (RoT) enables hardware-backed identity, remote attestation, protected key storage, and verification of servers or workloads before they are admitted into trusted environments.