Even though the diagram above exemplifies a TEE by having an operating procedure (Trusted OS), we could just have a bare-steel firmware exposing an interface with exclusive use of certain hardware methods.
this extra https://harmonywcws973731.oblogation.com/29802636/little-known-facts-about-confidential-computing-enclave