Securing the next one trillion connected devices

Platform Security Architecture (PSA)

Security is never optional

The Arm Platform Security Architecture (PSA) is the framework for securing the next one trillion connected devices, from end point to cloud. With the explosive growth in the Internet of Things, and the number of devices soaring, security has become an even bigger challenge globally.


The Arm PSA guides designers through the minefield of security, offering a way to achieve consistent security across connected devices. It is a constantly evolving, common foundation with key principles, best practices and deliverables, which can be adopted across the entire IoT ecosystem.

Why Choose to Adopt the Platform Security Architecture?
Common Foundation

A new common foundation, ensuring common security best practice endorsed by the Arm ecosystem

Reduce Costs and Time  

Reduce your ongoing costs and time-to-market for security with a set of holistic security deliverables 

Increase Confidence

Ensure success and confidence in your designs

What is PSA?

The PSA splits security design into three stages: analyze, architect, and implement. Each of these stages offers guidance, documentation, and deliverables to help you through the process. This makes security quicker, easier and more affordable to design into the very heart of the device from the start.


Before beginning any security design, it’s important to assess the value of your assets and potential risks. In this PSA stage Arm provides Threat Models and Security Analysis (TMSAs) documentation, which cover many different IoT devices. Developers and manufacturers can use these examples to establish a set of security requirements, which match the threats and the associated risk to their assets.


The architect stage helps make PSA a reality with a set of specifications to start your design. The specifications cover both hardware and firmware architecture specifications, which are available open-source. These documents help remove roadblocks and make security design easier.


Arm has taken our success and heritage of Trusted Firmware-A and brought it to the PSA. Trusted Firmware-M is a reference implementation of secure world software for Armv8-M, which SoC developers and OEMs can use as reference-trusted code base. The code base complies with the relevant Arm specifications to make secure software development simpler. You can also use PSA APIs and API test kits for a consistent developer experience.

Technical Information
Get Started with PSA

Explore various resources such as Threat Models and
Security Analyses, as well as access the latest open source
reference implementation firmware.

Visit PSA Resources
Related Products and Services
Explore More Options and Features
Security IP

Arm provides a range of security IP products designed to protect against a variety of different attacks, even physical attacks. Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.

Security Solutions

Arm’s security portfolio is designed to protect against a broad spectrum of attacks, allowing partners to deploy the security level that best matches their application needs. Achieving layered security involves implementing technologies, processes and measures designed to protect systems, networks, and data from a range of attacks.


Arm PSA APIs and testing kits demonstrate the correct functioning of the PSA Root of Trust. For developers, the APIs provide a consistent developer experience independent of security hardware implementation. Open source implementations of API test kits help developers to cross-check functionality and ensure interoperability.

Six Steps to Develop Secure and Connected IoT Devices
An IoT network cannot scale if its devices can’t be trusted.

An intelligent network must be built on a foundation of secure IoT-devices with defense-in-depth at its core. These six steps tell you how.

Learn More

Protect Your Data Platforms from the Next Wave of Cybercrime

The latest Arm Security Manifesto 2018 shows a disturbing trend in the continuing rise of cybercrime, particularly vast armies of attack bots and elaborate global security offensives. Yet industry is under pressure to simplify IoT, even as the numbers of IoT devices and data streams multiply by billions every year.

Download 2018 Manifesto
Talk with an Expert

Interested in learning more about how you can adopt the Arm Platform Security Architecture? Talk with an Arm expert. 

Contact Us