Browse Source

Merge "docs(threat-model): add a notes related to the Measured Boot" into integration

pull/1997/head
Sandrine Bailleux 2 years ago
committed by TrustedFirmware Code Review
parent
commit
100f56d873
  1. 3
      docs/global_substitutions.txt
  2. 9
      docs/glossary.rst
  3. 28
      docs/threat_model/threat_model.rst

3
docs/global_substitutions.txt

@ -50,15 +50,18 @@
.. |SP| replace:: :term:`SP`
.. |SPD| replace:: :term:`SPD`
.. |SPM| replace:: :term:`SPM`
.. |SRTM| replace:: :term:`SRTM`
.. |SSBS| replace:: :term:`SSBS`
.. |SVE| replace:: :term:`SVE`
.. |TBB| replace:: :term:`TBB`
.. |TBBR| replace:: :term:`TBBR`
.. |TCG| replace:: :term:`TCG`
.. |TEE| replace:: :term:`TEE`
.. |TF-A| replace:: :term:`TF-A`
.. |TF-M| replace:: :term:`TF-M`
.. |TLB| replace:: :term:`TLB`
.. |TLK| replace:: :term:`TLK`
.. |TPM| replace:: :term:`TPM`
.. |TRNG| replace:: :term:`TRNG`
.. |TSP| replace:: :term:`TSP`
.. |TZC| replace:: :term:`TZC`

9
docs/glossary.rst

@ -187,6 +187,9 @@ You can find additional definitions in the `Arm Glossary`_.
SPM
Secure Partition Manager
SRTM
Static Root of Trust for Measurement
SSBS
Speculative Store Bypass Safe. Introduced in Armv8.5, this configuration
bit can be set by software to allow or prevent the hardware from
@ -204,6 +207,9 @@ You can find additional definitions in the `Arm Glossary`_.
TCB
Trusted Compute Base
TCG
Trusted Computing Group
TEE
Trusted Execution Environment
@ -219,6 +225,9 @@ You can find additional definitions in the `Arm Glossary`_.
TLK
Trusted Little Kernel. A Trusted OS from NVIDIA.
TPM
Trusted Platform Module
TRNG
True Randon Number Generator (hardware based)

28
docs/threat_model/threat_model.rst

@ -36,12 +36,34 @@ assumptions:
- There is no Secure-EL2. We don't consider threats that may come with
Secure-EL2 software.
- Measured boot is disabled. We do not consider the threats nor the mitigations
that may come with it.
- No experimental features are enabled. We do not consider threats that may come
from them.
.. note::
In the current Measured Boot design, BL1, BL2, and BL31, as well as the
secure world components, form the |SRTM|. Measurement data is currently
considered an asset to be protected against attack, and this is achieved
by storing them in the Secure Memory.
Beyond the measurements stored inside the TCG-compliant Event Log buffer,
there are no other assets to protect or threats to defend against that
could compromise |TF-A| execution environment's security.
There are general security assets and threats associated with remote/delegated
attestation. However, these are outside the |TF-A| security boundary and
should be dealt with by the appropriate agent in the platform/system.
Since current Measured Boot design does not use local attestation, there would
be no further assets to protect(like unsealed keys).
A limitation of the current Measured Boot design is that it is dependent upon
Secure Boot as implementation of Measured Boot does not extend measurements
into a discrete |TPM|, where they would be securely stored and protected
against tampering. This implies that if Secure-Boot is compromised, Measured
Boot may also be compromised.
Platforms must carefully evaluate the security of the default implementation
since the |SRTM| includes all secure world components.
Data Flow Diagram
=================

Loading…
Cancel
Save