Layered Security for Your Next SoC

Arm provides a range of security IP products designed to protect against a variety of different attacks, even physical attacks. Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.


When considering how to secure your SoC or device, it's essential to start thinking about security implementation at the very beginning. If you're new to security, the wide variety of vulnerabilities and mitigations can feel a little daunting, which is why our security products support the Platform Security Architecture (PSA).  PSA is an architecture-agnostic framework to help you secure your devices from the ground up and is available completely free of charge. The four-phase approach helps you analyze your use case, architect systems, implement the solution, and then certify that everything is working as expected.

Features and Benefits
Vast Ecosystem

More than 1,000 software, tools and service partners to support and enable the use of our technology.

Standard Industry Framework

The Arm Platform Security Architecture (PSA) is the framework for a common security best practice.

Protection Against a Broad Spectrum of Attacks

Our IP extends across the system with protection for processors, subsystems, acceleration, and offloading—all fitting together seamlessly for layered protection.

Always Expanding 

Arm continues to build on its history in mobile security, addressing new market requirements for developer-friendly, deterministic, real-time embedded and IoT applications.

Security IP

Arm provides an expanding portfolio of secure IP, firmware and software, collaborating with the ecosystem to provide the right counter-measures for the variety of threats now facing devices.

Arm CryptoCell Family

Arm CryptoCell enables the protection of assets (code and data) belonging to different stakeholders in an ecosystem (for example, silicon vendor, OEM, service provider, user). CryptoCell enables SoC designers to trade off area, power, performance or robustness in a very flexible manner so that SoC designs can be optimized to achieve the most appropriate security level for the target market.

Physical Security Solutions

Arm's suite of physical security solutions empowers designers to build in the necessary physical protection at the heart of the device. The suite includes both processor IP equipped with tamper resistance, plus a range of IP specifically created to mitigate side-channel attacks.

TrustZone Technology for Processor IP

Arm TrustZone technology is a system-on-chip (SoC) and CPU system-wide approach to security with hardware-enforced isolation to establish secure end points and a device root of trust.

TrustZone Security System IP

Arm also has a range of Security System IP to provide multiple layers of processor and data protection.

Talk with an Expert

Our security expert team is here to help you.

Contact Us
Securing the Next One Trillion Devices

Arm’s security portfolio is designed to protect against a broad spectrum of attacks, allowing partners to deploy the security level that best matches their application needs. Achieving layered security involves implementing technologies, processes and measures designed to protect systems, networks, and data from a range of attacks.

Build a Secure IoT System-on-Chip

Designing a secure system-on-chip (SoC) is challenging and time-consuming. It involves defining a system architecture, acquiring the right IP and integrating many pieces of IP together to build a system that perfectly matches your requirements.

Arm Corstone reference designs help SoC designers build secure systems faster and are the perfect starting point for your SoC. The reference design is a subsystem that can be tailored to your specific needs.

Learn More