You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
doc: matter: Add TF-M to Matter documentation and HW requirements
- Added information about TF-M to Matter documentation.
- Updated the hardware requirements for Matter products and added
nRF54L15 + TF-M variant with partitioning description.
Signed-off-by: Arkadiusz Balys <[email protected]>
Copy file name to clipboardExpand all lines: doc/nrf/protocols/matter/end_product/security.rst
+42-11Lines changed: 42 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,14 +7,39 @@ Security
7
7
:local:
8
8
:depth: 3
9
9
10
-
Nordic Matter samples leverage security features supported in the |NCS| that can be divided into three major categories:
10
+
Nordic Matter samples leverage :ref:`security` features supported in the |NCS| that can be divided into four major categories:
11
11
12
+
* Secure processing environment
12
13
* Cryptography
13
14
* Trusted storage
14
15
* Securing production devices
15
16
16
17
In the following sections you will learn more details about each listed category.
17
18
19
+
Secure processing environment
20
+
*****************************
21
+
22
+
Depending on the board, Matter samples can use a secure processing environment.
23
+
24
+
nRF54L with Trusted Firmware-M (TF-M)
25
+
=====================================
26
+
27
+
On the nRF54L SoC, Matter samples support :ref:`app_boards_spe_nspe` with Trusted Firmware-M (TF-M).
28
+
All cryptographic operations within the Matter stack are performed by utilizing the `Platform Security Architecture (PSA)`_ API and executed in the secure TF-M environment.
29
+
The secure materials like Matter Session keys, DAC private key and other keys, are stored in the TF-M secure storage using the :ref:`tfm_encrypted_its` module.
30
+
Matter samples use the full TF-M library, so you cannot use the :ref:`tfm_minimal_build` version of TF-M.
31
+
32
+
To build a Matter sample with the TF-M support, :ref:`build <building>` for the :ref:`board target <app_boards_names>` with the ``/ns`` variant.
33
+
34
+
To configure partition layout for your application, you can edit the :file:`pm_static_nrf54l15dk_nrf54l15_cpuapp_ns.yml` file that is available in each sample directory.
35
+
To read more about the TF-M partitioning, see :ref:`ug_tfm_partition_alignment_requirements`.
36
+
While using TF-M, the application partition size and available RAM space for the application is lower than without TF-M.
37
+
You must keep this in mind and calculate the available space for the application partition.
38
+
The recommended values are provided in the :ref:`ug_matter_hw_requirements_layouts` section.
39
+
40
+
In addition, you can store the DAC private key in the KMU storage while using TF-M.
41
+
To learn how to do it, see the :ref:`matter_platforms_security_dac_priv_key_kmu` section.
42
+
18
43
Cryptography
19
44
************
20
45
@@ -150,24 +175,30 @@ See the following table to learn about the default secure storage backends for t
150
175
- Default secure storage backend for DAC private key
If you migrate the DAC private key to storage based on Zephyr Settings storage, you cannot use the :kconfig:option:`CONFIG_CHIP_FACTORY_RESET_ERASE_SETTINGS` Kconfig option.
198
+
This is because the factory reset feature will erase the secure storage, including the DAC private key, which has been removed from the factory data.
199
+
In this case, the DAC private key will be lost, and the device will not be able to authenticate to the network.
200
+
201
+
You can use the :kconfig:option:`CONFIG_CHIP_FACTORY_RESET_ERASE_SETTINGS` Kconfig option if you store the DAC private key in the KMU or TF-M secure storage (available on nRF54L SoCs only).
The following table lists memory requirements for samples running on the :ref:`nRF54L15 DK with CMSE enabled <app_boards_spe_nspe_cpuapp_ns>` (:ref:`nrf54l15dk/nrf54l15/cpuapp/ns <zephyr:nrf54l15dk_nrf54l15>`).
You can generate :ref:`Partition Manager's ASCII representation <pm_partition_reports>` of these tables by running the following command for your respective *board_target*:
0 commit comments