White Papers

Post Update Behavior Figure 81.
NOTE: The time taken for each component update has a set limit. The update is completed within
this limit. For more information, see Figure 81.
Security is important, and the update process is designed to ensure both system and data are
protected. The update process uses multiple layers of security validation:
External data is temporarily stored in non‐volatile storage. The data is then validated
using Dell’s private key signature to prevent intrusion of tampered data from external
sources.
Access control is restricted on Lifecycle Controller, and Lifecycle Controller partitions
are opened as read-only. Only authorized programs are allowed to open the partitions
as read/write.
Only validated data is staged in Lifecycle Controller for application to the related
components.