SPRT788
May
2025
AM2612 , AM2612-Q1 , AM2631 , AM2631-Q1 , AM2632 , AM2632-Q1 , AM2634-Q1 , AM263P2-Q1 , AM263P4 , AM263P4-Q1
-
1
-
1Security Goals of AM26x Devices
-
2Software Components Delivered by TI
-
3Device Lifecycle and Provisioning
Flow
-
4TI's AM26xx OTP Key Writer Package
- 4.1
List of Features Supported by OTP Key Writer
Flow
-
5TI Foundational Software for MCU devices
- 5.1
List of NIST Standards and References
-
6List of Valid Devices
1 Security Goals of AM26x Devices
- Modules and platform protection -
- Protect modules (hardware and software) and defend platform from takeover and unauthorized modifications.
- Protect critical assets and resources from hardware and software attacks
- Limit the attack surface for critical assets -
- Isolate critical assets in protected space with heavily restricted access. Focus on protection against class-based attacks.
- Assume rest of system is compromised to protect critical assets.
- Sand-box security -
- Security operates in isolated environment.
- Application modules/tasks are securely isolated from each other, even on the same CPU.
- Layered security -
- Multi-tier approach, such that compromises do not spread and break the entire system security.
- Each tier operates in isolation with other tiers.
- Traceability, accountability and isolation for security development -
- Security must be developed in isolated environment so that unexpected potential leaks are avoided.
- This is also required to prove security to certification entities and customers.