xref: /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/index.rst (revision b908814c74f5c5d4a9f2b86f341f38a3948527a9)
1*b908814cSlaurenw-armTF-A Firmware Threat Model
2*b908814cSlaurenw-arm==========================
3*b908814cSlaurenw-arm
4*b908814cSlaurenw-armAs the TF-A codebase is highly configurable to allow tailoring it best for each
5*b908814cSlaurenw-armplatform's needs, providing a holistic threat model covering all of its features
6*b908814cSlaurenw-armis not necessarily the best approach. Instead, we provide a collection of
7*b908814cSlaurenw-armdocuments which, together, form the project's threat model. These are
8*b908814cSlaurenw-armarticulated around a core document, called the :ref:`Generic Threat Model`,
9*b908814cSlaurenw-armwhich focuses on the most common configuration we expect to see. The other
10*b908814cSlaurenw-armdocuments typically focus on specific features not covered in the core document.
11*b908814cSlaurenw-arm
12*b908814cSlaurenw-armAs the TF-A codebase evolves and new features get added, these threat model
13*b908814cSlaurenw-armdocuments will be updated and extended in parallel to reflect at best the
14*b908814cSlaurenw-armcurrent status of the code from a security standpoint.
15*b908814cSlaurenw-arm
16*b908814cSlaurenw-arm   .. note::
17*b908814cSlaurenw-arm
18*b908814cSlaurenw-arm      Although our aim is eventually to provide threat model material for all
19*b908814cSlaurenw-arm      features within the project, we have not reached that point yet. We expect
20*b908814cSlaurenw-arm      to gradually fill these gaps over time.
21*b908814cSlaurenw-arm
22*b908814cSlaurenw-armEach of these documents give a description of the target of evaluation using a
23*b908814cSlaurenw-armdata flow diagram, as well as a list of threats we have identified using the
24*b908814cSlaurenw-arm`STRIDE threat modeling technique`_ and corresponding mitigations.
25*b908814cSlaurenw-arm
26*b908814cSlaurenw-arm.. toctree::
27*b908814cSlaurenw-arm   :maxdepth: 1
28*b908814cSlaurenw-arm   :caption: Contents
29*b908814cSlaurenw-arm
30*b908814cSlaurenw-arm   threat_model
31*b908814cSlaurenw-arm   threat_model_el3_spm
32*b908814cSlaurenw-arm   threat_model_fvp_r
33*b908814cSlaurenw-arm   threat_model_rss_interface
34*b908814cSlaurenw-arm   threat_model_arm_cca
35*b908814cSlaurenw-arm   threat_model_fw_update_and_recovery
36*b908814cSlaurenw-arm
37*b908814cSlaurenw-arm--------------
38*b908814cSlaurenw-arm
39*b908814cSlaurenw-arm*Copyright (c) 2021-2024, Arm Limited and Contributors. All rights reserved.*
40*b908814cSlaurenw-arm
41*b908814cSlaurenw-arm.. _STRIDE threat modeling technique: https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats#stride-model
42