1b908814cSlaurenw-armTF-A Firmware Threat Model 2b908814cSlaurenw-arm========================== 3b908814cSlaurenw-arm 4b908814cSlaurenw-armAs the TF-A codebase is highly configurable to allow tailoring it best for each 5b908814cSlaurenw-armplatform's needs, providing a holistic threat model covering all of its features 6b908814cSlaurenw-armis not necessarily the best approach. Instead, we provide a collection of 7b908814cSlaurenw-armdocuments which, together, form the project's threat model. These are 8b908814cSlaurenw-armarticulated around a core document, called the :ref:`Generic Threat Model`, 9b908814cSlaurenw-armwhich focuses on the most common configuration we expect to see. The other 10b908814cSlaurenw-armdocuments typically focus on specific features not covered in the core document. 11b908814cSlaurenw-arm 12b908814cSlaurenw-armAs the TF-A codebase evolves and new features get added, these threat model 13b908814cSlaurenw-armdocuments will be updated and extended in parallel to reflect at best the 14b908814cSlaurenw-armcurrent status of the code from a security standpoint. 15b908814cSlaurenw-arm 16b908814cSlaurenw-arm .. note:: 17b908814cSlaurenw-arm 18b908814cSlaurenw-arm Although our aim is eventually to provide threat model material for all 19b908814cSlaurenw-arm features within the project, we have not reached that point yet. We expect 20b908814cSlaurenw-arm to gradually fill these gaps over time. 21b908814cSlaurenw-arm 22b908814cSlaurenw-armEach of these documents give a description of the target of evaluation using a 23b908814cSlaurenw-armdata flow diagram, as well as a list of threats we have identified using the 24b908814cSlaurenw-arm`STRIDE threat modeling technique`_ and corresponding mitigations. 25b908814cSlaurenw-arm 26b908814cSlaurenw-arm.. toctree:: 27b908814cSlaurenw-arm :maxdepth: 1 28b908814cSlaurenw-arm :caption: Contents 29b908814cSlaurenw-arm 30b908814cSlaurenw-arm threat_model 31b908814cSlaurenw-arm threat_model_el3_spm 32624c9a0bSTamas Ban threat_model_rse_interface 33b908814cSlaurenw-arm threat_model_arm_cca 34b908814cSlaurenw-arm threat_model_fw_update_and_recovery 35*a5e9623eSHarrison Mutai threat_model_firmware_handoff 36b908814cSlaurenw-arm 37b908814cSlaurenw-arm-------------- 38b908814cSlaurenw-arm 392cadf21bSBoyan Karatotev*Copyright (c) 2021-2025, Arm Limited and Contributors. All rights reserved.* 40b908814cSlaurenw-arm 41b908814cSlaurenw-arm.. _STRIDE threat modeling technique: https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats#stride-model 42