As mentioned in the previous slide, users may select any one method of securing JTAG access depending on their application. In cases where security is a primary concern, it is preferable to lock the JTAG w/o password. Once this is accomplished the device can be accessed only via the BSL. This involves knowing the BSL password which is longer in length making it inherently more secure. In this case however, the user must make the two VSL lines available if the ability to update firmware is required. The second option is securing JTAG with a password, which involves generating a unique password that is stored in the IDE such as CCS or IAR. When the device is accessed from an authorized source that is able to provide the IDE password, JTAG access is made available once again.

