1*b908814cSlaurenw-armTF-A Firmware Threat Model 2*b908814cSlaurenw-arm========================== 3*b908814cSlaurenw-arm 4*b908814cSlaurenw-armAs the TF-A codebase is highly configurable to allow tailoring it best for each 5*b908814cSlaurenw-armplatform's needs, providing a holistic threat model covering all of its features 6*b908814cSlaurenw-armis not necessarily the best approach. Instead, we provide a collection of 7*b908814cSlaurenw-armdocuments which, together, form the project's threat model. These are 8*b908814cSlaurenw-armarticulated around a core document, called the :ref:`Generic Threat Model`, 9*b908814cSlaurenw-armwhich focuses on the most common configuration we expect to see. The other 10*b908814cSlaurenw-armdocuments typically focus on specific features not covered in the core document. 11*b908814cSlaurenw-arm 12*b908814cSlaurenw-armAs the TF-A codebase evolves and new features get added, these threat model 13*b908814cSlaurenw-armdocuments will be updated and extended in parallel to reflect at best the 14*b908814cSlaurenw-armcurrent status of the code from a security standpoint. 15*b908814cSlaurenw-arm 16*b908814cSlaurenw-arm .. note:: 17*b908814cSlaurenw-arm 18*b908814cSlaurenw-arm Although our aim is eventually to provide threat model material for all 19*b908814cSlaurenw-arm features within the project, we have not reached that point yet. We expect 20*b908814cSlaurenw-arm to gradually fill these gaps over time. 21*b908814cSlaurenw-arm 22*b908814cSlaurenw-armEach of these documents give a description of the target of evaluation using a 23*b908814cSlaurenw-armdata flow diagram, as well as a list of threats we have identified using the 24*b908814cSlaurenw-arm`STRIDE threat modeling technique`_ and corresponding mitigations. 25*b908814cSlaurenw-arm 26*b908814cSlaurenw-arm.. toctree:: 27*b908814cSlaurenw-arm :maxdepth: 1 28*b908814cSlaurenw-arm :caption: Contents 29*b908814cSlaurenw-arm 30*b908814cSlaurenw-arm threat_model 31*b908814cSlaurenw-arm threat_model_el3_spm 32*b908814cSlaurenw-arm threat_model_fvp_r 33*b908814cSlaurenw-arm threat_model_rss_interface 34*b908814cSlaurenw-arm threat_model_arm_cca 35*b908814cSlaurenw-arm threat_model_fw_update_and_recovery 36*b908814cSlaurenw-arm 37*b908814cSlaurenw-arm-------------- 38*b908814cSlaurenw-arm 39*b908814cSlaurenw-arm*Copyright (c) 2021-2024, Arm Limited and Contributors. All rights reserved.* 40*b908814cSlaurenw-arm 41*b908814cSlaurenw-arm.. _STRIDE threat modeling technique: https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats#stride-model 42