# Secure Terminal > A zero-trust execution environment. Hardware-enforced access control, whitelisted application environment, zero-trust networking, encrypted distributed storage, and Phantom Secrets™ key integration. Every element is verified before anything executes. ## What It Is A hardened endpoint and execution environment for high-assurance operations: signing, custody, identity issuance, OT/SCADA control, and other workflows where the conventional desktop or server is too permissive a runtime. ## What's Hardware-Enforced - **Access control** — only attested users on attested hardware can boot or interact - **Application environment** — only whitelisted, signed binaries may execute - **Networking** — zero-trust, identity-bound, mutually authenticated by default - **Storage** — encrypted, distributed, tamper-evident - **Cryptographic operations** — bound to Phantom Secrets™; private keys never exist on the terminal at rest ## Where It Deploys Custody operations rooms, regulated trading desks, treasury workstations, government secure facilities, defence and critical-infrastructure operator stations, and any environment where a single-host compromise would be catastrophic. ## Related - Phantom Secrets™: /api/md/products/phantom-secrets - PhantomGate™: /api/md/products/phantom-gate - Critical Infrastructure solution: /api/md/solutions/critical-infrastructure