1################## 2Trusted Firmware M 3################## 4 5Trusted Firmware-M (TF-M) implements the Secure Processing Environment (SPE) 6for Armv8-M, Armv8.1-M architectures (e.g. the `Cortex-M33`_, `Cortex-M23`_, 7`Cortex-M55`_, `Cortex-M85`_ processors) and dual-core platforms. 8It is the platform security architecture reference implementation aligning with 9PSA Certified guidelines, enabling chips, Real Time Operating Systems and 10devices to become PSA Certified. 11 12TF-M relies on an isolation boundary between the Non-secure Processing 13Environment (NSPE) and the Secure Processing Environment (SPE). It can but is 14not limited to using the `Arm TrustZone technology`_ on Armv8-M and Armv8.1-M 15architectures. In pre-Armv8-M architectures physical core isolation is required. 16 17**TF-M consists of:** 18 19- Secure Boot to authenticate NSPE and SPE images 20- TF-M Core for controlling the isolation, communication 21 and execution within SPE and with NSPE 22- Crypto, Internal Trusted Storage (ITS), Protected Storage (PS), 23 Firmware Update and Attestation secure services 24 25TF-M implements `PSA-FF-M`_ defined IPC and SFN mechanisms to allow communication 26between isolated firmware partitions. TF-M is highly configurable allowing users 27to only include the required secure services and features. Project provides 28:ref:`Base_configuration` build with just TF-M core and platform drivers and 4 predefined 29configurations known as :ref:`tf-m_profiles`. TF-M Profiles or TF-M base can 30be configured to include required services and features as described in the 31:ref:`tf-m_configuration` section. 32 33.. figure:: readme_tfm_v8.png 34 :scale: 65 % 35 :align: center 36 37 FF-M compliant design with TF-M 38 39Applications and Libraries in the Non-secure Processing Environment can 40utilize these secure services with a standardized set of PSA Functional APIs. 41Applications running on Cortex-M devices can leverage TF-M services to ensure 42secure connection with edge gateways and IoT cloud services. It also protects 43the critical security assets such as sensitive data, keys and certificates on 44the platform. TF-M is supported on several Cortex-M based 45:doc:`Microcontrollers </platform/index>` and Real Time Operating 46Systems (RTOS). 47 48Terms ``TFM`` and ``TF-M`` are commonly used in documents and code and both 49refer to ``Trusted Firmware M.`` :doc:`Glossary </glossary>` has the list 50of terms and abbreviations. 51 52####### 53License 54####### 55The software is provided under a BSD-3-Clause :doc:`License </contributing/lic>`. 56Contributions to this project are accepted under the same license with developer 57sign-off as described in the :doc:`Contributing Guidelines </contributing/contributing_process>`. 58 59This project contains code from other projects as listed below. The code from 60external projects is limited to ``bl2``, ``lib`` and ``platform`` 61folders. The original license text is included in those source files. 62 63- The ``bl2`` folder contains files imported from MCUBoot project and the files 64 have Apache 2.0 license. 65- The ``lib/ext`` folder may contain 3rd party projects and files with 66 diverse licenses. Here are some that are different from the BSD-3-Clause and 67 may be a part of the runtime image. The source code for these projects is 68 fetched from upstream at build time only. 69 70 - ``CMSIS_5`` - Apache 2.0 license 71 - ``mbedcrypto`` - `Apache 2.0 license MbedTLS 72 <https://github.com/Mbed-TLS/mbedtls/blob/development/LICENSE>`_ 73 - ``mcuboot`` - `Apache 2.0 license MCUBoot 74 <https://github.com/mcu-tools/mcuboot/blob/main/LICENSE>`_ 75 - ``qcbor`` - `Modified BSD-3-Clause license 76 <https://github.com/laurencelundblade/QCBOR#copyright-and-license>`_ 77 - ``tf-m-extras`` - Set of additional components. Please check individually in 78 `tf-m-extras repository <https://git.trustedfirmware.org/TF-M/tf-m-extras.git/tree/>`_ 79 80- The ``platform`` folder currently contains platforms support imported from 81 the external project and the files may have different licenses. 82 83.. include:: /platform/platform_introduction.rst 84 85The document :doc:`Supported Platforms </platform/index>` lists the details. 86 87######################### 88Release Notes and Process 89######################### 90The :doc:`Release Cadence and Process </releases/release_process>` provides 91release cadence and process information. 92 93The :doc:`Releases </releases/index>` provides details of 94major features of the release and platforms supported. 95 96#################### 97Feedback and Support 98#################### 99For this release, feedback is requested via email to 100`tf-m@lists.trustedfirmware.org <tf-m@lists.trustedfirmware.org>`__. 101 102A bi-weekly technical forum is available for discussion on any technical topics 103online. Welcome to join `TF-M Forum <https://www.trustedfirmware.org/meetings/tf-m-technical-forum>`__. 104 105.. _Cortex-M33: https://developer.arm.com/Processors/Cortex-M33 106.. _Cortex-M23: https://developer.arm.com/Processors/Cortex-M23 107.. _Cortex-M55: https://developer.arm.com/Processors/Cortex-M55 108.. _Cortex-M85: https://developer.arm.com/Processors/Cortex-M85 109.. _PSA Certified: https://www.psacertified.org/about/developing-psa-certified/ 110.. _Arm TrustZone technology: https://developer.arm.com/ip-products/security-ip/trustzone/trustzone-for-cortex-m 111.. _PSA-FF-M: https://www.arm.com/architecture/security-features/platform-security 112 113-------------- 114 115*Copyright (c) 2017-2022, Arm Limited. All rights reserved.* 116