threat_model_rse_interface.rst 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. Threat Model for RSE - AP interface
  2. ***********************************
  3. ************
  4. Introduction
  5. ************
  6. This document is an extension for the general TF-A threat-model. It considers
  7. those platforms where a Runtime Security Engine (RSE) is included in the SoC
  8. next to the Application Processor (AP).
  9. ********************
  10. Target of Evaluation
  11. ********************
  12. The scope of this threat model only includes the interface between the RSE and
  13. AP. Otherwise, the TF-A :ref:`Generic Threat Model` document is applicable for
  14. the AP core. The threat model for the RSE firmware will be provided by the RSE
  15. firmware project in the future.
  16. Data Flow Diagram
  17. =================
  18. This diagram is different only from the general TF-A data flow diagram in that
  19. it includes the RSE and highlights the interface between the AP and the RSE
  20. cores. The interface description only focuses on the AP-RSE interface the rest
  21. is the same as in the general TF-A threat-model document.
  22. .. uml:: ../../resources/diagrams/plantuml/tfa_rse_dfd.puml
  23. :caption: Figure 1: TF-A Data Flow Diagram including RSE
  24. .. table:: Table 1: TF-A - RSE data flow diagram
  25. +-----------------+--------------------------------------------------------+
  26. | Diagram Element | Description |
  27. +=================+========================================================+
  28. | DF7 | | Boot images interact with RSE over a communication |
  29. | | channel to record boot measurements and get image |
  30. | | verification keys. At runtime, BL31 obtains the |
  31. | | realm world attestation signing key from RSE. |
  32. +-----------------+--------------------------------------------------------+
  33. Threat Assessment
  34. =================
  35. For this section, please reference the Threat Assessment under the general TF-A
  36. threat-model document, :ref:`Generic Threat Model`. All the threats listed there
  37. are applicable for the AP core, here only the differences are highlighted.
  38. - ID 11: The access to the communication interface between AP and RSE is
  39. allowed only for firmware running at EL3. Accidentally exposing this
  40. interface to NSCode can allow malicious code to interact with RSE and
  41. gain access to sensitive data.
  42. - ID 13: Relevant in the context of the realm attestation key, which can be
  43. retrieved by BL31 through DF7. The RSE communication protocol layer
  44. mitigates against this by clearing its internal buffer when reply is
  45. received. The caller of the API must do the same if data is not needed
  46. anymore.
  47. --------------
  48. *Copyright (c) 2022-2024, Arm Limited. All rights reserved.*