Virtually every embedded system today is connected. Unfortunately, this connectivity makes systems vulnerable to attack. To thwart such attacks, organizations surround their systems with a protective barrier: network, cryptographic, and even physical security. As the software that provides centralized access to the CPU, memory, and other resources, the realtime operating system (RTOS) can play a major role in achieving this goal of building secure, survivable embedded systems.