That's a nice design. They're trying really hard while staying within COTS components. So, I wanted to know what the TCB was running. Paydirt:
" The I/O Controller runs an isolated instance of Security
Enhanced Linux and has a separate TPM for measurements and identity anchoring."
Yeah, that's not trustworthy. It might get attacked less than competing systems but SELinux isn't a good TCB. The NSA themselves rate it like most of the rest at EAL4+: resistant to "inadvertant" or "casual" attempts to breach security. You want that trusted component to be running something stronger, preferably with low odds of 0-days. A minimal version of OpenBSD is a cheap start as their networking and Ethernet stacks probably had most review. Next best is a separation kernel enforcing policy with small TCB & user-mode stacks. There's commercial ones they can buy or FOSS ones to build on. Memory-safe language like Ada/SPARK or Rust for their trusted code. Paid or FOSS options for that, too.
The point being the hackers are going to look for ways to send in malicious data or cause unusual executions to get code into memory. Whatever they're using should stop that or isolate the damage with high confidence. Most don't, though. Even well-thought ones like this product.
EDIT: Thanks for the tip-off, though, as I occasionally send recommendations to security vendors. Might email them or use them as an example for high-security people of what kind of thing to build or market.
Microsoft's PAW definition covers related topics, https://technet.microsoft.com/en-us/windows-server-docs/secu...