White Papers
 Post Update Behavior Figure 81.
NOTE: The time taken for each component update has a set limit. The update is completed within 
this limit. For more information, see Figure 81. 
Security is important, and the update process is designed to ensure both system and data are 
protected. The update process uses multiple layers of security validation: 
  External data is temporarily stored in non‐volatile storage. The data is then validated 
using Dell’s private key signature to prevent intrusion of tampered data from external 
sources. 
  Access control is restricted on Lifecycle Controller, and Lifecycle Controller partitions 
are opened as read-only. Only authorized programs are allowed to open the partitions 
as read/write. 
  Only validated data is staged in Lifecycle Controller for application to the related 
components. 










