If one want to use secure boot it is necessary.
But you must understand that you are giving away control over your computing system.
It is - kind of - extended DRM (Digital Right Managment) - which is designed to make as much money as possible.
Next logical step is to use the TPM implementation to further exclude …