mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-19 02:54:24 +00:00
Merge "docs(threat-model): add a notes related to the Measured Boot" into integration
This commit is contained in:
commit
100f56d873
3 changed files with 37 additions and 3 deletions
|
@ -50,15 +50,18 @@
|
|||
.. |SP| replace:: :term:`SP`
|
||||
.. |SPD| replace:: :term:`SPD`
|
||||
.. |SPM| replace:: :term:`SPM`
|
||||
.. |SRTM| replace:: :term:`SRTM`
|
||||
.. |SSBS| replace:: :term:`SSBS`
|
||||
.. |SVE| replace:: :term:`SVE`
|
||||
.. |TBB| replace:: :term:`TBB`
|
||||
.. |TBBR| replace:: :term:`TBBR`
|
||||
.. |TCG| replace:: :term:`TCG`
|
||||
.. |TEE| replace:: :term:`TEE`
|
||||
.. |TF-A| replace:: :term:`TF-A`
|
||||
.. |TF-M| replace:: :term:`TF-M`
|
||||
.. |TLB| replace:: :term:`TLB`
|
||||
.. |TLK| replace:: :term:`TLK`
|
||||
.. |TPM| replace:: :term:`TPM`
|
||||
.. |TRNG| replace:: :term:`TRNG`
|
||||
.. |TSP| replace:: :term:`TSP`
|
||||
.. |TZC| replace:: :term:`TZC`
|
||||
|
|
|
@ -187,6 +187,9 @@ You can find additional definitions in the `Arm Glossary`_.
|
|||
SPM
|
||||
Secure Partition Manager
|
||||
|
||||
SRTM
|
||||
Static Root of Trust for Measurement
|
||||
|
||||
SSBS
|
||||
Speculative Store Bypass Safe. Introduced in Armv8.5, this configuration
|
||||
bit can be set by software to allow or prevent the hardware from
|
||||
|
@ -204,6 +207,9 @@ You can find additional definitions in the `Arm Glossary`_.
|
|||
TCB
|
||||
Trusted Compute Base
|
||||
|
||||
TCG
|
||||
Trusted Computing Group
|
||||
|
||||
TEE
|
||||
Trusted Execution Environment
|
||||
|
||||
|
@ -219,6 +225,9 @@ You can find additional definitions in the `Arm Glossary`_.
|
|||
TLK
|
||||
Trusted Little Kernel. A Trusted OS from NVIDIA.
|
||||
|
||||
TPM
|
||||
Trusted Platform Module
|
||||
|
||||
TRNG
|
||||
True Randon Number Generator (hardware based)
|
||||
|
||||
|
|
|
@ -36,12 +36,34 @@ assumptions:
|
|||
- There is no Secure-EL2. We don't consider threats that may come with
|
||||
Secure-EL2 software.
|
||||
|
||||
- Measured boot is disabled. We do not consider the threats nor the mitigations
|
||||
that may come with it.
|
||||
|
||||
- No experimental features are enabled. We do not consider threats that may come
|
||||
from them.
|
||||
|
||||
.. note::
|
||||
|
||||
In the current Measured Boot design, BL1, BL2, and BL31, as well as the
|
||||
secure world components, form the |SRTM|. Measurement data is currently
|
||||
considered an asset to be protected against attack, and this is achieved
|
||||
by storing them in the Secure Memory.
|
||||
Beyond the measurements stored inside the TCG-compliant Event Log buffer,
|
||||
there are no other assets to protect or threats to defend against that
|
||||
could compromise |TF-A| execution environment's security.
|
||||
|
||||
There are general security assets and threats associated with remote/delegated
|
||||
attestation. However, these are outside the |TF-A| security boundary and
|
||||
should be dealt with by the appropriate agent in the platform/system.
|
||||
Since current Measured Boot design does not use local attestation, there would
|
||||
be no further assets to protect(like unsealed keys).
|
||||
|
||||
A limitation of the current Measured Boot design is that it is dependent upon
|
||||
Secure Boot as implementation of Measured Boot does not extend measurements
|
||||
into a discrete |TPM|, where they would be securely stored and protected
|
||||
against tampering. This implies that if Secure-Boot is compromised, Measured
|
||||
Boot may also be compromised.
|
||||
|
||||
Platforms must carefully evaluate the security of the default implementation
|
||||
since the |SRTM| includes all secure world components.
|
||||
|
||||
Data Flow Diagram
|
||||
=================
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue