Stm32trust Product Overview
Stm32trust Product Overview
STM32Trust TEE
1 What is security? 4
Secure Manager
2
Click to go to the relevant sections
What is security?
3
What is security?
Availability
Availability Integrity
Ensuring that functionality and/or data is available
when it is needed.
4
Addressing the security challenges and gaps
Security challenges
for our customers IoT security
our customers certifications
Time to & regulations
Complex High cost
market
Missing link
Developers
Scalability, certification,
maintenance.
Core security hardware and services
Multiple devices
Hardware
5
Our goal: protect customer assets
Data Connectivity
Confidentiality Regulations
Secrets Network access
Regulations Data transfer
Authenticity Confidentiality
Availability
IP System trust
Software Regulations
Data Reliability
Processes Availability
Secrets Authentication
Confidentiality
6
Threat assessment workflow
•1 Identify threats according to the different types of customer assets.
•2 Propose mitigation strategies via Security Functions & services.
•3 Rely on recognized Security Assurance levels.
Threats exploit
vulnerabilities & damage
assets.
Protections mitigate
vulnerabilities & therefore
can mitigate threats.
Customers Assets Threats Vulnerabilities Security
Functions
&
Services
Mitigate
7
The STM32Trust framework
8
What is STM32Trust?
Certifications &
Software & services
regulations
9
Software and services
Use our services to protect your workflow, from the development
phase to deployment in the field
Supports Supports
Supports
STM32Cube TF-M, TF-A Secure firmware install
PSA Certification OP-TEE Secure module install
SESIP Certification Crypto libraries Secure secret provisioning
NIST SP800-90B Secure Manager Secure element support
Simplifies
10
Certifications & Regulations
End Devices & Applications
Security Security
Regulations Standards
Focuses on
IEC 62443-4 EN 303 645
Platform Security
Security Evaluation Architecture
Standard for IoT Platforms For chips, system Enables
software & device
11
Focus on RED and CRA standards
August 1, 2024
STM32Trust Security Functions
From assets to Security Functions
STM32Trust streamlines the IoT security Model with: STM32Trust Security Functions
• A meta security framework with generic Security Functions Identification / Authentication / Attestation
• The coverage of commonplace threats & vulnerabilities classes Application life cycle
Secure manufacturing
Software IP protection
15
STM32Trust Security Functions explained
Security Functions Definition
Identification / Authentication / Attestation Unique identification of a device and/or software, and ability to detect its authenticity.
Application life cycle Defines unchangeable incremental states to securely protect application states and assets.
Secure manufacturing Device provisioning or personalization in untrusted environment with overproduction control.
Software IP protection Ability to protect a section or the whole software package against external or internal reading, ”multitenant”.
Silicon device life cycle Control states to securely protect silicon device assets during its lifetime.
Secure install / update Installation or update of firmware with initial integrity & authenticity checks before programming & execution.
Abnormal situation handling Ability to detect and to react to abnormal hardware and software situations.
Secure boot Ability to ensure the authenticity and integrity of an embedded application.
Crypto engine Ability to process cryptographic algorithms, as recommended by security assurance schemes.
16
STM32 product target certifications
Mainstream PSA Certified Level 1 PSA Certified Level 1 PSA Certified Level 1
STM32G0 STM32G4
MCUs STM32C0
Ultra-low-power PSA Certified Level 1 PSA Certified Level 1 SESIP3 PSA Certified Level 3 SESIP3
MCUs STM32MP13
17
STM32Trust TEE Secure Manager
Embedded security
“If only
What are developers typically trying to achieve?
Easily protect my critical Easily protect my IP and my Easily & securely connect
data & secrets and those partner’s IP in a strong and to clouds & servers without
of my end customers effective way painful digital identities
management
Locally
During development Data protection
During Secure
communication updates
At rest
Registration
In production
In the field
Remotely Device life
cycle
19
Introducing the STM32Trust TEE
Secure Manager
Secure Manager
A trusted execution
environment (TEE) integrating
core security services
20
Secure Manager
First used in the STM32H5 platform
The STM32Trust TEE Secure Manager protects IP and simplifies your
security journey
TrustZone®
Non-secure Secure • ST platform ownership
Un-privileged or Un-privileged • Turnkey set of security services
Privileged
• Secure Manager Core to handle isolation
Trusted storage
Firmware update
Trusted app N
Trusted app 1
Cryptography
• Multitenant software IP protection
Attestation
Application • Arm® PSA API compatible
• Designed for long-term-support (LTS)
Target • Modular secure update capable
Privileged
• Optimized certification properties
PSA API
ST iRoT 21
Secure firmware and secret installation
Embedded secure firmware install - SFI
Manage STM32 authentication, firmware decryption and installation
STM32
Third-party premises
SMI
SMI Firmware cloning
Encrypted
Authenticate target STM32
Generate installation license protection on the first Protect third-party
Module Encrypted Module
Module transfer installation software IP
Store encryption via (SMI)
key in HSM HSM
Physical transfer UART / SPI / USB
Trusted Package creator
ST hardware secure
module (HSM)
23
Embedded secure secret provisioning - SSP
Manage STM32 authentication, license generation and secure key transfer
24
Security in practice
Customer example (1/6)
focus on secure manufacturing
Asset
Bob is at the head of a company designing toys.
Product He would like to avoid the counterfeiting of his company-
branded toys.
• Firmware protection
• Ensure that the firmware package is • Software IP protection
isolated from customer firmware • Code isolation
Secure manufacturing - - -
STM32F2**
Software IP protection MPU**, WRP - -
Secure storage - - -
Isolation - - -
Certification targets
Abnormal situation handling Tamper, RTC -
Secure boot - - -
Crypto engine - - -
Audit / Log - - -
34
Mainstream products with security functions
STM32Cx STM32Trust Security Features
Functions
Hardware Software Services
Secure manufacturing - - -
Secure storage - - -
Isolation MPU - -
Certification targets
Abnormal situation handling Tamper, RTC -
Secure boot - - -
Crypto engine - - -
Audit / Log - - -
35
Mainstream products with security functions
STM32Gx STM32Trust Security Features
Functions
Hardware Software Services
Secure manufacturing - - -
Audit / Log - - -
36
Mainstream products with security functions
STM32Gx STM32Trust Security Features
Functions
Hardware Software Services
Secure manufacturing - - -
Audit / Log - - -
37
Ultra-low-power products with security functions
STM32Lx STM32Trust Security Features
Functions
Hardware Software Services
Secure manufacturing - - -
STM32L5
Software IP protection RDP, Firewall, PcRoP, MPU -
Audit / Log - -
38
Ultra-low-power products with security functions
STM32Lx STM32Trust Security Features
Functions
Hardware Software Services
Audit / Log - -
39
Ultra-low-power products with security functions
STM32Lx STM32Trust Security Features
Functions
Hardware Software Services
Secure install / update RDP, MPU, UBE, TrustZone® TF-M_SBSFU boot CubeProgrammer
Secure boot RDP, WRP, MPU, UBE, HDP TF-M_SBSFU boot CubeProgrammer
40
Ultra-low-power products with security functions
STM32Ux STM32Trust Security Features
Functions
Hardware Software Services
Secure install / update TrustZone®, HDP, MPU, UBE, RDP X-CUBE-SBSFU, TFM_SBSFU Boot CubeProgrammer
41
High performance products with security functions
STM32Fx STM32Trust Security Features
Functions
Hardware Software Services
Secure manufacturing - -
STM32F7
Software IP protection - -
Secure storage - - -
Isolation - - -
Certification targets
Abnormal situation handling - - -
Secure boot - - -
Crypto engine - - -
Audit / Log - - -
42
High performance products with security functions
STM32Fx STM32Trust Security Features
Functions
Hardware Software Services
Secure manufacturing - -
STM32F7
Software IP protection RDP, MPU, PCROP -
CubeProgrammer
Secure install / update HDP, WPR, RDP, UBE X-CUBE-SBSFU
(digest, signature)
Audit / Log - - -
Secure manufacturing - - -
STM32F7
Software IP protection RDP, MPU -
CubeProgrammer
Secure install / update HDP, WPR, RDP, UBE X-CUBE-SBSFU
(digest, signature)
Isolation MPU - -
Certification targets Tamper, RTC, GPIO locking, ECC, CSS, Temp
Abnormal situation handling - -
Sensor, Watchdogs, PVD
CubeProgrammer
Secure boot RDP,WRP,MPU X-CUBE-SBSFU
(digest, signature)
Audit / Log - - -
Software IP protection Product states, HDPL, MPU, WRP, TZ Secure Manager, TF-M XCUBE-SFI
45
High performance products with security functions
STM32Hx STM32Trust Security Features
Functions
Hardware Software Services
CubeProgrammer
Secure install / update HDP, WPR, RDP, UBE X-CUBE-SBSFU
(digest, signature)
Audit / Log - - -
Secure manufacturing - - -
STM32WL5
Software IP protection RDP, MPU - -
Secure install / update RDP, MPU, FUS on CM0 X-CUBE-SBSFU on Cortex® M4 CubeProgrammer
Isolation MPU - -
Certification targets Tamper, RTC, GPIO lock, CSS, ECC, Temp. sensor,
Abnormal situation handling - -
PVD, WD, BR
Audit / Log - - -
47
Wireless products with security functions
STM32Wx STM32Trust Security Features
Functions
Hardware Software Services
Secure boot TrustZone®, Bootlock, RDP, WRP, MPU, HDP TF-M_SBSFU Boot CubeProgrammer
48
Wireless products with security functions
STM32Wx STM32Trust Security Features
Functions
Hardware Software Services
Audit / Log - - -
49
MPU products with security functions
STM32MPx STM32Trust Security Features
Functions
Hardware Software Services
50
Enhancing STM32 security assurance
levels with STSECURE
The building blocks of security
MCU / MPU with
Crypto engine Computer firmware MCU + Secure element
embedded security
• Basic crypto services • Pure software countermeasures Broad MCU portfolio Trusted components
embedded in dedicated ICs against remote software attacks • Tamper resistance (Hardware & SoC)
• Countermeasures against remote
mainly
software and board level attacks • Common Criteria, GSMA, TCG certifications
• Self-evaluated solution • Proven against all attacks (remote software,
• STM32Trust Security framework
board level and silicon level attacks)
• Arm® TrustZone®
• SESIP & PSA certifications Life cycle Security Centric devices
• Secure programming services • Secure development methodology
• Secure personalization & key provisioning
• Secure supply chain
• Certified Common Criteria sites
52
Where to find help
Documentation and useful links
• STM32Trust webpage
• STM32TrustTEE-SM webpage
• Wiki security
• Online trainings
54
Get support from ST authorized partners
Development Tools
Embedded software
Consultancy
Engineering services Evaluations Cloud solutions
Training Personalization
Hardware modules Assessment Device management
Technology Programming
Secure element & Consulting PKI life cycle
TPM solutions
Middleware / OS
55
Abbreviation glossary and definitions
56
Abbreviation glossary and definitions
Glossary Benefit and explanation
57
Abbreviation glossary and definitions
Glossary Benefit and explanation
MMU (memory management unit) Ensures privileged access to some portion of application–task isolations.
OP-TEE (Part of OpenSTLinux) Trusted Execution Environment for STM32MP, featuring Secure storage service
OP-TEE (Part of OpenSTLinux) Trusted Execution Environment for STM32MP, adding further software handling for application portions sandboxing
OTFDEC (on the fly decryption) Decryption of encrypted image on external flash.
OTFDEC (on the fly decryption) Decryption of encrypted content stored on external flash.
OTP (one time programmable) memory OTP zones where application credentials or life cycle states can be stored.
PCROP (proprietary code readout protection) Ability to set some flash sectors as execute-only, thus preventing other sectors to read them.
PKA (public key accelerator) Asymmetric algorithms (public key), implemented by hardware, for RSA/ECC/DH.
PVD (power voltage monitoring) Monitors power changes.
RDP (Read protection) Prevents a debugger from reading the secure boot
RNG (random number generator) True RNG done entirely by hardware.
RSS with SFI (root security services with secure Built-in service callable at reset, ensuring installation of an OEM firmware and option bytes, with authenticity, integrity,
firmware install) confidentiality, insurance to program a genuine STM32, and possibly limited overall quantity of programmed STM32.
58
Abbreviation glossary and definitions
Glossary Benefit and explanation
Secure boot ROM code Root of trust for loading first bootloader on STM32MP.
Built-in service callable at reset, ensuring secure provisioning of OEM credentials. Controllability of overall
Secure boot with SSP (secure secret provisioning)
quantity of STM32MP1 provisioned.
Secure FSBL (First Stage bootloader) Secure bootloader, loaded and authenticated by secure boot ROM code.
SSP (secure secret provisioning) Secure provisioning of OTP secret values.
STM32CubeProgrammer Software tool able to control the RDP cycle
Symmetric hardware crypto accelerators Implements a given algorithm by hardware implementation, like AES for instance.
Checks if the device is operating in the expected temperature range. Hardened protection against temperature
Temperature sensor
attacks.
TF-A (part of OpenSTLinux) First-stage secure bootloader configuring STM32MP platform
TFM_SBSFU boot (part of STM32CubeL5) Example code implementing both a secure boot and a secure firmware update mechanism
Runtime isolation technology allowing 2 distinct worlds, secure and nonsecure. It is a complete set of hardware
TrustZone® mechanisms to isolate two main security application domains: one trusted (ensuring secure storage) and one
nontrusted.
TZC (TrustZone® controller) Ability to isolate Cortex-A cores from Cortex-M one.
UBE (unique boot entry) Ensures the silicon always boots at the secure boot location.
Watchdogs Independent watchdog and window watchdog for software timing control.
WRP (write protection) Prevents an application from altering the secure boot firmware.
This ECCN 5D002-classified software is based on STM32Cube architecture package and includes a set of crypto
X-CUBE-CRYPTOLIB
algorithms based on firmware implementation (symmetric, asymmetric, hash…)
X-CUBE-SBSFU code example implementing both a secure boot and a secure firmware update mechanism
59
Find out more at www.st.com/stm32trust