arm-trusted-firmware/docs/threat_model/firmware_threat_model
laurenw-arm b908814c74 docs(threat-model): supply chain threat model TF-A
Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
2024-01-19 14:50:24 -06:00
..
index.rst docs(threat-model): supply chain threat model TF-A 2024-01-19 14:50:24 -06:00
threat_model.rst docs(threat-model): supply chain threat model TF-A 2024-01-19 14:50:24 -06:00
threat_model_arm_cca.rst docs(threat-model): supply chain threat model TF-A 2024-01-19 14:50:24 -06:00
threat_model_el3_spm.rst docs(threat-model): supply chain threat model TF-A 2024-01-19 14:50:24 -06:00
threat_model_fvp_r.rst docs(threat-model): supply chain threat model TF-A 2024-01-19 14:50:24 -06:00
threat_model_fw_update_and_recovery.rst docs(threat-model): supply chain threat model TF-A 2024-01-19 14:50:24 -06:00
threat_model_rss_interface.rst docs(threat-model): supply chain threat model TF-A 2024-01-19 14:50:24 -06:00