xref: /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/index.rst (revision aa2cb429a8c14c6c85fd14c4f0eddb3257418611)
1b908814cSlaurenw-armTF-A Firmware Threat Model
2b908814cSlaurenw-arm==========================
3b908814cSlaurenw-arm
4b908814cSlaurenw-armAs the TF-A codebase is highly configurable to allow tailoring it best for each
5b908814cSlaurenw-armplatform's needs, providing a holistic threat model covering all of its features
6b908814cSlaurenw-armis not necessarily the best approach. Instead, we provide a collection of
7b908814cSlaurenw-armdocuments which, together, form the project's threat model. These are
8b908814cSlaurenw-armarticulated around a core document, called the :ref:`Generic Threat Model`,
9b908814cSlaurenw-armwhich focuses on the most common configuration we expect to see. The other
10b908814cSlaurenw-armdocuments typically focus on specific features not covered in the core document.
11b908814cSlaurenw-arm
12b908814cSlaurenw-armAs the TF-A codebase evolves and new features get added, these threat model
13b908814cSlaurenw-armdocuments will be updated and extended in parallel to reflect at best the
14b908814cSlaurenw-armcurrent status of the code from a security standpoint.
15b908814cSlaurenw-arm
16b908814cSlaurenw-arm   .. note::
17b908814cSlaurenw-arm
18b908814cSlaurenw-arm      Although our aim is eventually to provide threat model material for all
19b908814cSlaurenw-arm      features within the project, we have not reached that point yet. We expect
20b908814cSlaurenw-arm      to gradually fill these gaps over time.
21b908814cSlaurenw-arm
22b908814cSlaurenw-armEach of these documents give a description of the target of evaluation using a
23b908814cSlaurenw-armdata flow diagram, as well as a list of threats we have identified using the
24b908814cSlaurenw-arm`STRIDE threat modeling technique`_ and corresponding mitigations.
25b908814cSlaurenw-arm
26b908814cSlaurenw-arm.. toctree::
27b908814cSlaurenw-arm   :maxdepth: 1
28b908814cSlaurenw-arm   :caption: Contents
29b908814cSlaurenw-arm
30b908814cSlaurenw-arm   threat_model
31b908814cSlaurenw-arm   threat_model_el3_spm
32624c9a0bSTamas Ban   threat_model_rse_interface
33b908814cSlaurenw-arm   threat_model_arm_cca
34b908814cSlaurenw-arm   threat_model_fw_update_and_recovery
35*a5e9623eSHarrison Mutai   threat_model_firmware_handoff
36b908814cSlaurenw-arm
37b908814cSlaurenw-arm--------------
38b908814cSlaurenw-arm
392cadf21bSBoyan Karatotev*Copyright (c) 2021-2025, Arm Limited and Contributors. All rights reserved.*
40b908814cSlaurenw-arm
41b908814cSlaurenw-arm.. _STRIDE threat modeling technique: https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats#stride-model
42