yes, if you wanted to compromise every pc covertly getting access to the NORTHbridge would give you access to everything, as the SOUTH flows into and handles ancillary devices. Again this is a INTEL/AMD world and has been for a long long time… IBM likely has developed something similar for their ARCH but off the top of my head I don't know.