Contents!
Release%information%................................................................................................................................%2%
Non-Confidential%Proprietary%Notice%......................................................................................................%3%
1% About!this!document!.......................................................................................................................!5%
1.1% References%....................................................................................................................................%5%
1.2% Terms%and%Abbreviations%................................................................ ..............................................%5%
2% Introdu c tio n!....................................................................................................................................!7%
2.1% Industr y%C hallenges%.......................................................................................................................%7%
2.2% Arm’s%vision%for%a%more%secure%IoT%...............................................................................................%7%
2.3% Supporting%IP%................................................................................................................................%8%
3% Platform!Security!Architecture!.........................................................................................................!9%
3.1% Objective%.......................................................................................................................................%9%
3.2% Building%Blocks%..............................................................................................................................%9%
3.3% Threat%Models%and%Security%Analyses%.........................................................................................%10%
3.4% Architecture%Specifications%Documents%......................................................................................%11%
3.4.1% Device%Security%Model%.................................................................................................%12%
3.4.2% Trusted%Device%Initialization%........................................................................................%12%
3.4.3% Trusted%Base%System%Architecture%(TBSA)%...................................................................%13%
3.4.4% Trusted%Boot%and%Firmware%Update%............................................................................%13%
3.4.5% Firmware%Framework%(PSA-FF)%....................................................................................%13%
3.4.6% Trusted%Functions%........................................................................................................%15%
3.5% Trusted%Firmware-M%(TF-M)%reference%implementation%............................................................%15%
3.6% Ecosystem%Enabling%....................................................................................................................%16%
4% Security!evaluation!and!compliance!...............................................................................................!17%
5% Conclusion!..................................................................................................................................... !18%
%