mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-13 08:04:27 +00:00
docs(porting): refer the reader back to the threat model
When porting TF-A to a new platform, it is essential to read the threat model documents in conjunction with the porting guide to understand the security responsibilities of each platform interface to implement. Add a note to highlight this in the porting guide. Change-Id: Icd1e41ae4b15032b72531690dd82a9ef95ca0db5 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
This commit is contained in:
parent
292585be90
commit
fd0933516b
1 changed files with 7 additions and 0 deletions
|
@ -26,6 +26,13 @@ provide their own implementation if the default implementation is inadequate.
|
|||
defined. We intend to convert existing weak functions over time. Until
|
||||
then, you will find references to *weak* functions in this document.
|
||||
|
||||
Please review the :ref:`Threat Model` documents as part of the porting
|
||||
effort. Some platform interfaces play a key role in mitigating against some of
|
||||
the threats. Failing to fulfill these expectations could undermine the security
|
||||
guarantees offered by TF-A. These platform responsibilities are highlighted in
|
||||
the threat assessment section, under the "`Mitigations implemented?`" box for
|
||||
each threat.
|
||||
|
||||
Some modifications are common to all Boot Loader (BL) stages. Section 2
|
||||
discusses these in detail. The subsequent sections discuss the remaining
|
||||
modifications for each BL stage in detail.
|
||||
|
|
Loading…
Add table
Reference in a new issue