This document discusses security for a new computing architecture called The Machine. It begins by providing examples of technological innovations from the past 60 years. It then discusses the shift from processor-centric to memory-driven computing in The Machine. The rest of the document outlines the security framework for The Machine, including building security in from the ground up, protecting data at rest and in flight, secure boot and firmware, runtime monitoring, and access control. It also discusses capabilities for detection of compromised components or tampering and recovery from security incidents.