Everything that causes a computer system or network to be devoid of malicious software or hardware. Maintaining the trusted computing base (TCB) is essential for security policy to be implemented successfully. See
known-good software,
TCG,
NCSC and
NGSCB.