blob: 3b5389d6da0214d868f448e69f3d236a6aea9c0e [file] [log] [blame]
PSA Attestation SP
==================
Scope of evaluation
-------------------
This assessment makes the following assumptions:
- The PSA Attestation service is deployed to a dedicated S-EL0 SP, and its execution context is physically isolated.
- The solution uses the Logging SP, or the FF-A logging API provided by the SPMC.
- The Attestation SP uses a PSA Crypto SP for executing cryptographic operations.
- The SPMC passes a copy of the measurements made by earlier boot stages (BL1 and BL2) to the Attestation SP as boot
arguments. The system must protect the measurements from tampering before passing to the SP.
Assessment Results
------------------
This section specializes the threats identified in the Generic Threat Model for the attestation service where applicable.
Threats not listed here are mitigated as described in the :doc:`/security/threat-models/generic-threat-model`.
- :ref:`GEN05 <generic_threat_5>` "External devices connected to the system storing sensitive data."
The Attestation SP does not require any external devices for its operation, even when the built-in PSA Crypto is
used. Therefore, this threat is considered out of scope.
- :ref:`GEN06 <generic_threat_6>` "State of external devices connected to the system might be modified by an
attacker."
The Attestation SP does not require any external devices for its operation, even when the built-in PSA Crypto is
used. Therefore, this threat is considered out of scope.
- :ref:`GEN07 <generic_threat_7>` "Invalid or conflicting access to shared hardware."
The Attestation SP does not require any external devices for its operation, even when the built-in PSA Crypto is
used. Therefore, this threat is considered out of scope.
- :ref:`GEN08 <generic_threat_8>` "Unauthenticated access to hardware."
The Attestation SP does not require any external devices for its operation, even when the built-in PSA Crypto is
used. Therefore, this threat is considered out of scope.
- :ref:`GEN09 <generic_threat_9>` "Unauthenticated access to sensitive data."
The PSA Attestation SP is designed to present a uniform view to all clients, so the SP does not need to enforce
client isolation itself.
The Attestation SP requires the PSA Crypto SPs to enforce client isolation and prevent other FF-A endpoints
from accessing its assets.
- :ref:`GEN10 <generic_threat_10>` "Time-of-Check to Time-of-Use (TOCTTOU) attack through shared memory."
The Attestation service provider must ensure data is copied to a secure memory buffer before calling the PSA Crypto
implementation to execute sensitive operations.
--------------
*Copyright (c) 2025, Arm Limited and Contributors. All rights reserved.*
SPDX-License-Identifier: BSD-3-Clause