mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-30 07:39:24 +00:00
Merge "docs(threat-model): add a notes related to the Measured Boot" into integration
This commit is contained in:
commit
100f56d873
3 changed files with 37 additions and 3 deletions
|
@ -50,15 +50,18 @@
|
||||||
.. |SP| replace:: :term:`SP`
|
.. |SP| replace:: :term:`SP`
|
||||||
.. |SPD| replace:: :term:`SPD`
|
.. |SPD| replace:: :term:`SPD`
|
||||||
.. |SPM| replace:: :term:`SPM`
|
.. |SPM| replace:: :term:`SPM`
|
||||||
|
.. |SRTM| replace:: :term:`SRTM`
|
||||||
.. |SSBS| replace:: :term:`SSBS`
|
.. |SSBS| replace:: :term:`SSBS`
|
||||||
.. |SVE| replace:: :term:`SVE`
|
.. |SVE| replace:: :term:`SVE`
|
||||||
.. |TBB| replace:: :term:`TBB`
|
.. |TBB| replace:: :term:`TBB`
|
||||||
.. |TBBR| replace:: :term:`TBBR`
|
.. |TBBR| replace:: :term:`TBBR`
|
||||||
|
.. |TCG| replace:: :term:`TCG`
|
||||||
.. |TEE| replace:: :term:`TEE`
|
.. |TEE| replace:: :term:`TEE`
|
||||||
.. |TF-A| replace:: :term:`TF-A`
|
.. |TF-A| replace:: :term:`TF-A`
|
||||||
.. |TF-M| replace:: :term:`TF-M`
|
.. |TF-M| replace:: :term:`TF-M`
|
||||||
.. |TLB| replace:: :term:`TLB`
|
.. |TLB| replace:: :term:`TLB`
|
||||||
.. |TLK| replace:: :term:`TLK`
|
.. |TLK| replace:: :term:`TLK`
|
||||||
|
.. |TPM| replace:: :term:`TPM`
|
||||||
.. |TRNG| replace:: :term:`TRNG`
|
.. |TRNG| replace:: :term:`TRNG`
|
||||||
.. |TSP| replace:: :term:`TSP`
|
.. |TSP| replace:: :term:`TSP`
|
||||||
.. |TZC| replace:: :term:`TZC`
|
.. |TZC| replace:: :term:`TZC`
|
||||||
|
|
|
@ -187,6 +187,9 @@ You can find additional definitions in the `Arm Glossary`_.
|
||||||
SPM
|
SPM
|
||||||
Secure Partition Manager
|
Secure Partition Manager
|
||||||
|
|
||||||
|
SRTM
|
||||||
|
Static Root of Trust for Measurement
|
||||||
|
|
||||||
SSBS
|
SSBS
|
||||||
Speculative Store Bypass Safe. Introduced in Armv8.5, this configuration
|
Speculative Store Bypass Safe. Introduced in Armv8.5, this configuration
|
||||||
bit can be set by software to allow or prevent the hardware from
|
bit can be set by software to allow or prevent the hardware from
|
||||||
|
@ -204,6 +207,9 @@ You can find additional definitions in the `Arm Glossary`_.
|
||||||
TCB
|
TCB
|
||||||
Trusted Compute Base
|
Trusted Compute Base
|
||||||
|
|
||||||
|
TCG
|
||||||
|
Trusted Computing Group
|
||||||
|
|
||||||
TEE
|
TEE
|
||||||
Trusted Execution Environment
|
Trusted Execution Environment
|
||||||
|
|
||||||
|
@ -219,6 +225,9 @@ You can find additional definitions in the `Arm Glossary`_.
|
||||||
TLK
|
TLK
|
||||||
Trusted Little Kernel. A Trusted OS from NVIDIA.
|
Trusted Little Kernel. A Trusted OS from NVIDIA.
|
||||||
|
|
||||||
|
TPM
|
||||||
|
Trusted Platform Module
|
||||||
|
|
||||||
TRNG
|
TRNG
|
||||||
True Randon Number Generator (hardware based)
|
True Randon Number Generator (hardware based)
|
||||||
|
|
||||||
|
|
|
@ -36,12 +36,34 @@ assumptions:
|
||||||
- There is no Secure-EL2. We don't consider threats that may come with
|
- There is no Secure-EL2. We don't consider threats that may come with
|
||||||
Secure-EL2 software.
|
Secure-EL2 software.
|
||||||
|
|
||||||
- Measured boot is disabled. We do not consider the threats nor the mitigations
|
|
||||||
that may come with it.
|
|
||||||
|
|
||||||
- No experimental features are enabled. We do not consider threats that may come
|
- No experimental features are enabled. We do not consider threats that may come
|
||||||
from them.
|
from them.
|
||||||
|
|
||||||
|
.. note::
|
||||||
|
|
||||||
|
In the current Measured Boot design, BL1, BL2, and BL31, as well as the
|
||||||
|
secure world components, form the |SRTM|. Measurement data is currently
|
||||||
|
considered an asset to be protected against attack, and this is achieved
|
||||||
|
by storing them in the Secure Memory.
|
||||||
|
Beyond the measurements stored inside the TCG-compliant Event Log buffer,
|
||||||
|
there are no other assets to protect or threats to defend against that
|
||||||
|
could compromise |TF-A| execution environment's security.
|
||||||
|
|
||||||
|
There are general security assets and threats associated with remote/delegated
|
||||||
|
attestation. However, these are outside the |TF-A| security boundary and
|
||||||
|
should be dealt with by the appropriate agent in the platform/system.
|
||||||
|
Since current Measured Boot design does not use local attestation, there would
|
||||||
|
be no further assets to protect(like unsealed keys).
|
||||||
|
|
||||||
|
A limitation of the current Measured Boot design is that it is dependent upon
|
||||||
|
Secure Boot as implementation of Measured Boot does not extend measurements
|
||||||
|
into a discrete |TPM|, where they would be securely stored and protected
|
||||||
|
against tampering. This implies that if Secure-Boot is compromised, Measured
|
||||||
|
Boot may also be compromised.
|
||||||
|
|
||||||
|
Platforms must carefully evaluate the security of the default implementation
|
||||||
|
since the |SRTM| includes all secure world components.
|
||||||
|
|
||||||
Data Flow Diagram
|
Data Flow Diagram
|
||||||
=================
|
=================
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue