. . "This isolation can be accomplished either by physically not providing any such processing capability such as a CPU, or by disabling or disconnecting such CPU from the protected storage." . .