Often overlooked are Protected Ports. This is physical security. Sometimes they are called JTAG ports. Essentially, there are other ways of actually going in and physically debugging the system and since one has to physically have access to the device, most people do not worry about it.