Tamas Ban | ef589bf | 2022-11-30 17:09:43 +0100 | [diff] [blame] | 1 | Threat Model for RSS - AP interface |
| 2 | *********************************** |
| 3 | |
| 4 | ************ |
| 5 | Introduction |
| 6 | ************ |
| 7 | This document is an extension for the general TF-A threat-model. It considers |
| 8 | those platforms where a Runtime Security Subsystem (RSS) is included in the SoC |
| 9 | next to the Application Processor (AP). |
| 10 | |
| 11 | ******************** |
| 12 | Target of Evaluation |
| 13 | ******************** |
| 14 | The scope of this threat model only includes the interface between the RSS and |
| 15 | AP. Otherwise, the TF-A :ref:`Generic Threat Model` document is applicable for |
| 16 | the AP core. The threat model for the RSS firmware will be provided by the RSS |
| 17 | firmware project in the future. |
| 18 | |
| 19 | |
| 20 | Data Flow Diagram |
| 21 | ================= |
| 22 | This diagram is different only from the general TF-A data flow diagram in that |
| 23 | it includes the RSS and highlights the interface between the AP and the RSS |
| 24 | cores. The interface description only focuses on the AP-RSS interface the rest |
| 25 | is the same as in the general TF-A threat-model document. |
| 26 | |
| 27 | .. uml:: ../resources/diagrams/plantuml/tfa_rss_dfd.puml |
| 28 | :caption: Figure 1: TF-A Data Flow Diagram including RSS |
| 29 | |
| 30 | .. table:: Table 1: TF-A - RSS data flow diagram |
| 31 | |
| 32 | +-----------------+--------------------------------------------------------+ |
| 33 | | Diagram Element | Description | |
| 34 | +=================+========================================================+ |
| 35 | | DF7 | | Boot images interact with RSS over a communication | |
| 36 | | | channel to record boot measurements and get image | |
| 37 | | | verification keys. At runtime, BL31 obtains the | |
| 38 | | | realm world attestation signing key from RSS. | |
| 39 | +-----------------+--------------------------------------------------------+ |
| 40 | |
| 41 | Threat Assessment |
| 42 | ================= |
| 43 | For this section, please reference the Threat Assessment under the general TF-A |
| 44 | threat-model document, :ref:`Generic Threat Model`. All the threats listed there |
| 45 | are applicable for the AP core, here only the differences are highlighted. |
| 46 | |
| 47 | - ID 11: The access to the communication interface between AP and RSS is |
| 48 | allowed only for firmware running at EL3. Accidentally exposing this |
| 49 | interface to NSCode can allow malicious code to interact with RSS and |
| 50 | gain access to sensitive data. |
| 51 | - ID 13: Relevant in the context of the realm attestation key, which can be |
| 52 | retrieved by BL31 through DF7. The RSS communication protocol layer |
| 53 | mitigates against this by clearing its internal buffer when reply is |
| 54 | received. The caller of the API must do the same if data is not needed |
| 55 | anymore. |
| 56 | |
| 57 | -------------- |
| 58 | |
| 59 | *Copyright (c) 2022, Arm Limited. All rights reserved.* |