1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859 |
- Threat Model for RSS - AP interface
- ***********************************
- ************
- Introduction
- ************
- This document is an extension for the general TF-A threat-model. It considers
- those platforms where a Runtime Security Subsystem (RSS) is included in the SoC
- next to the Application Processor (AP).
- ********************
- Target of Evaluation
- ********************
- The scope of this threat model only includes the interface between the RSS and
- AP. Otherwise, the TF-A :ref:`Generic Threat Model` document is applicable for
- the AP core. The threat model for the RSS firmware will be provided by the RSS
- firmware project in the future.
- Data Flow Diagram
- =================
- This diagram is different only from the general TF-A data flow diagram in that
- it includes the RSS and highlights the interface between the AP and the RSS
- cores. The interface description only focuses on the AP-RSS interface the rest
- is the same as in the general TF-A threat-model document.
- .. uml:: ../resources/diagrams/plantuml/tfa_rss_dfd.puml
- :caption: Figure 1: TF-A Data Flow Diagram including RSS
- .. table:: Table 1: TF-A - RSS data flow diagram
- +-----------------+--------------------------------------------------------+
- | Diagram Element | Description |
- +=================+========================================================+
- | DF7 | | Boot images interact with RSS over a communication |
- | | channel to record boot measurements and get image |
- | | verification keys. At runtime, BL31 obtains the |
- | | realm world attestation signing key from RSS. |
- +-----------------+--------------------------------------------------------+
- Threat Assessment
- =================
- For this section, please reference the Threat Assessment under the general TF-A
- threat-model document, :ref:`Generic Threat Model`. All the threats listed there
- are applicable for the AP core, here only the differences are highlighted.
- - ID 11: The access to the communication interface between AP and RSS is
- allowed only for firmware running at EL3. Accidentally exposing this
- interface to NSCode can allow malicious code to interact with RSS and
- gain access to sensitive data.
- - ID 13: Relevant in the context of the realm attestation key, which can be
- retrieved by BL31 through DF7. The RSS communication protocol layer
- mitigates against this by clearing its internal buffer when reply is
- received. The caller of the API must do the same if data is not needed
- anymore.
- --------------
- *Copyright (c) 2022, Arm Limited. All rights reserved.*
|