If a trusted process is initiated there is necessary no restrictions on what it is allowed to do something. However , it is possible that the applications which access the trusted APIs required to be signed before access is allowed but this technique depends on the implemented security plan.