Platform Security Architecture (PSA)
The Arm Platform Security Architecture (PSA) is the framework for securing the next one trillion connected devices, from end point to cloud. With the explosive growth in the Internet of Things, and the number of devices soaring, security has become an even bigger challenge globally.
The Arm PSA guides designers through the minefield of security, offering a way to achieve consistent security across connected devices. It is a constantly evolving, common foundation with key principles, best practices and deliverables, which can be adopted across the entire IoT ecosystem.
The PSA splits security design into three stages: analyze, architect, and implement. Each of these stages offers guidance, documentation, and deliverables to help you through the process. This makes security quicker, easier and more affordable to design into the very heart of the device from the start.
Before beginning any security design, it’s important to assess the value of your assets and potential risks. In this PSA stage Arm provides Threat Models and Security Analysis (TMSAs) documentation, which cover many different IoT devices. Developers and manufacturers can use these examples to establish a set of security requirements, which match the threats and the associated risk to their assets.
The architect stage helps make PSA a reality with a set of specifications to start your design. The specifications cover both hardware and firmware architecture specifications, which are available open-source. These documents help remove roadblocks and make security design easier.
Arm has taken our success and heritage of Trusted Firmware-A and brought it to the PSA. Trusted Firmware-M is a reference implementation of secure world software for Armv8-M, which SoC developers and OEMs can use as reference-trusted code base. The code base complies with the relevant Arm specifications to make secure software development simpler. You can also use PSA APIs and API test kits for a consistent developer experience.
Explore various resources such as Threat Models and
Security Analyses, as well as access the latest open source
reference implementation firmware.
Arm provides a range of security IP products designed to protect against a variety of different attacks, even physical attacks. Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.
Arm’s security portfolio is designed to protect against a broad spectrum of attacks, allowing partners to deploy the security level that best matches their application needs. Achieving layered security involves implementing technologies, processes and measures designed to protect systems, networks, and data from a range of attacks.
Arm PSA APIs and testing kits demonstrate the correct functioning of the PSA Root of Trust. For developers, the APIs provide a consistent developer experience independent of security hardware implementation. Open source implementations of API test kits help developers to cross-check functionality and ensure interoperability.
An intelligent network must be built on a foundation of secure IoT-devices with defense-in-depth at its core. These six steps tell you how.
Protect Your Data Platforms from the Next Wave of Cybercrime
The latest Arm Security Manifesto 2018 shows a disturbing trend in the continuing rise of cybercrime, particularly vast armies of attack bots and elaborate global security offensives. Yet industry is under pressure to simplify IoT, even as the numbers of IoT devices and data streams multiply by billions every year.