This session discusses the importance of providing layered security co-located with fundamental device content for better overall endpoint protection and resilience. An important aspect of this is migrating mutable software roots of trust to hardware roots of trust. A strong case can be made for a hardware core root of trust for measurement (CRTM). While often existing as a software RoT, the CRTM can be vulnerable to numerous attacks and if compromised the whole system becomes "rooted" and untrustworthy. Hardware roots and layered security can mitigate these attacks.