blob: 4bceb631c42ecbd1b59fb414a900364e8d595755 [file] [log] [blame]
Tamas Banef589bf2022-11-30 17:09:43 +01001Threat Model for RSS - AP interface
2***********************************
3
4************
5Introduction
6************
7This document is an extension for the general TF-A threat-model. It considers
8those platforms where a Runtime Security Subsystem (RSS) is included in the SoC
9next to the Application Processor (AP).
10
11********************
12Target of Evaluation
13********************
14The scope of this threat model only includes the interface between the RSS and
15AP. Otherwise, the TF-A :ref:`Generic Threat Model` document is applicable for
16the AP core. The threat model for the RSS firmware will be provided by the RSS
17firmware project in the future.
18
19
20Data Flow Diagram
21=================
22This diagram is different only from the general TF-A data flow diagram in that
23it includes the RSS and highlights the interface between the AP and the RSS
24cores. The interface description only focuses on the AP-RSS interface the rest
25is the same as in the general TF-A threat-model document.
26
27.. uml:: ../resources/diagrams/plantuml/tfa_rss_dfd.puml
28 :caption: Figure 1: TF-A Data Flow Diagram including RSS
29
30.. table:: Table 1: TF-A - RSS data flow diagram
31
32 +-----------------+--------------------------------------------------------+
33 | Diagram Element | Description |
34 +=================+========================================================+
35 | DF7 | | Boot images interact with RSS over a communication |
36 | | channel to record boot measurements and get image |
37 | | verification keys. At runtime, BL31 obtains the |
38 | | realm world attestation signing key from RSS. |
39 +-----------------+--------------------------------------------------------+
40
41Threat Assessment
42=================
43For this section, please reference the Threat Assessment under the general TF-A
44threat-model document, :ref:`Generic Threat Model`. All the threats listed there
45are applicable for the AP core, here only the differences are highlighted.
46
47 - ID 11: The access to the communication interface between AP and RSS is
48 allowed only for firmware running at EL3. Accidentally exposing this
49 interface to NSCode can allow malicious code to interact with RSS and
50 gain access to sensitive data.
51 - ID 13: Relevant in the context of the realm attestation key, which can be
52 retrieved by BL31 through DF7. The RSS communication protocol layer
53 mitigates against this by clearing its internal buffer when reply is
54 received. The caller of the API must do the same if data is not needed
55 anymore.
56
57--------------
58
59*Copyright (c) 2022, Arm Limited. All rights reserved.*