PSA Certified
PSA Certified provides a framework for securing connected devices. Certification demonstrates that security best practices have been implemented, based on an independent security assessment. For more information, see: PSA Certified.
PSA Certified defines ten security goals that form the foundation for device security. The certification process involves an assessment that these security goals have been met. The Trusted Services project includes service provider components and reference integrations that a system integrator may use as the basis for creating a platform that meets these goals.
PSA Goals
The following table lists the ten security goals and how the Trusted Services project helps to achieve them:
PSA Certified Goal |
Trusted Services Contribution |
---|---|
Unique Identification |
A unique device identity, assigned during manufacture, may be stored securely
using the Secure Storage trusted service with a suitable platform provided backend.
|
Security Lifecycle |
The Attestation trusted service provides an extensible framework for adding claims
to a signed attestation report. The security lifecycle state claim is planned to be
added in a future release.
|
Attestation |
A remote third-party may obtain a trusted view of the security state of a device by
obtaining a signed attestation token from the Attestation service.
|
Secure Boot |
Secure boot relies on a hardware trust anchor such as a public key hash programmed into
an OTP eFuse array. For firmware that uses TF-A, all firmware components are verified
during the early boot phase.
|
Secure Update |
Involves cooperation of a trusted service with other firmware components such as the
boot loader.
|
Anti-Rollback |
The Secure Storage service provider can be used with arbitrary storage backends, allowing
platform specific storage to be used. Where the necessary hardware is available, roll-back
protected storage can be provided with a suitable backend.
|
Isolation |
The trusted services architectural model assumes that service isolation is implemented using
a hardware backed secure processing environment. A secure partition managed by a Secure
Partition Manager is one method for realizing isolation.
|
Interaction |
The FF-A specification defines messaging and memory management primitives that enable
secure interaction between partitions. Importantly, the secure partition manager provides
a trusted view of the identity of a message sender, allowing access to be controlled.
|
Secure Storage |
The Secure Storage service provider uses a pre-configured storage backend to provide
an object store with suitable security properties. Two deployments of the secure storage
provider (Internal Trusted Storage and Protected Storage) are included with platform
specific storage backends.
|
Cryptographic Service |
The Crypto service provider implements a rich set of cryptographic operations using
a protected key store. Key usage is controlled based on the least privileges principle
where usage flags constrain permitted operations.
|
Conformance Test Support
To support API level conformance testing, the PSA Arch Test project provides a rich set of test suites that allow service implementations to be tested. To facilitate running of PSA functional API tests, the psa-api-test deployment (see: Test Executables) is supported which integrates test suites with service clients. This can be used to run tests on a platform and collect tests results to provide visibility to an external assessor.
Copyright (c) 2022, Arm Limited and Contributors. All rights reserved.
SPDX-License-Identifier: BSD-3-Clause