Security

Assumptions and Delegated Mitigations

ID

01

Assumption

Physical attack is out of scope.

Delegated Mitigation

None. None.

Impact if assumption is wrong

Unhandled vulnerabilities.

ID

02

Assumption

Part of NOR flash access restriction is controlled by end platform providers.

Delegated Mitigation

The current hardware and software implementations lack protection to NOR Flash. The vendor should add protection before NOR Flash and program the access restrictions similar to the Memory Side Filter (MSF).

Impact if assumption is wrong

Secure keys/FIP image can be overwritten.

ID

03

Assumption

Part of DDR region access restriction is controlled by end platform providers.

Delegated Mitigation

The current hardware and software implementations lack protection to DDR. The vendor should add protection before DDR and program the access restrictions similar to the Memory Side Filter (MSF).

Impact if the assumption is wrong

Can be overwritten by Malicious software.

ID

04

Assumption

The firmware update capsule is generated from a working set of firmware image blobs (TF-A BL2, SCP BL2, etc.) and not tampered in DDR. (The Firmware Update Capsule contains the FIP image and additional FWU specific headers. On the TC SW stack reference design, the update capsule is preloaded manually to the DDR before execution.)

Delegated Mitigation

None.

Impact if the assumption is wrong

Boot hangs.

ID

05

Assumption

Not using the dummy key provided with the TC software stack for the platform secure boot.

Delegated Mitigation

The vendor should follow RSE guidelines to create custom keys and securely store them.

Impact if the assumption is wrong

The keys are exposed and the secure boot is compromised.

ID

06

Assumption

Securely handle debug and trace for production releases.

Delegated Mitigation

The vendor should disable the debug and trace capability for production releases or enable proper debug authentication as recommended by DEN0034.

Impact if the assumption is wrong

Secure data can be exposed. Arbitrary code can be executed.