SFI for STM32H5

1 Introduction

The STM32H5 series provide a security framework with a trusted execution environment: the Secure Manager. It simplifies the security development cycle of embedded applications, by providing ready-to-use security services that are developed following recommended industry standards.

The OEM can choose to develop its application using the Secure Manager or not.
As 2 SFI procedures can be applied to the STM32H5 series, this choice impacts the SFI procedure to be followed:

2 SFI for STM32H5 series with Secure Manager

This procedure must be followed if the OEM installs an application developed using the Secure Manager. In this case, there are several additional components to prepare, to test and to install.

The preparation and installation flow is described below:

Security SFI H5 Preparation and installation Flow.png


STMicroelectronics provides the SFI solution to perform the preparation and installation flows.

2.1 Preparation flow

2.1.1 Overview

Security SFI H5 Preparation Flow.png

The purpose of this step is to:

  • prepare the encrypted firmware image to install, called SFI image. It is composed of the OEM application and the additional components (OEM secrets, Secure Manager and modules).
  • provision the OEM key within an HSM or within a global license.

2.1.2 SFI image

2.1.2.1 Overview

Here is an overview of the SFI image creation flow.

Security SFI H5 Preparation Flow SFI Image.png
2.1.2.2 SFI image generation

Once the OEM application has been developed using the SMAK, the OEM must prepare and test the SFI image to be installed during manufacturing.
For that purpose, the OEM must use the SMAK in production preparation phase. This allows to correctly generate the SFI image (for instance, setting the Secure Manager configuration according to the OEM application) and test it before manufacturing.

The output of the SMAK production preparation phase is the tested SFI image, ready to be installed during manufacturing.

2.1.2.3 Description of the SFI image inputs

The OEM must provide the following inputs, described below:

  • the OEM application: The OEM must provide its application binary, developed using the Secure Manager.
  • the Secure Manager: The Secure Manager binary is available as an encrypted image from STM32TRUSTEE-SM[1].
  • the modules: The Secure Manager offers the possibility to install secure modules. However, the Secure Manager requires these modules to have an specific format. Only SMDK provides this format for modules. The modules must be developed via the SMDK.
  • the OEM secrets: The OEM secrets are the OEM data, the OEM keys and also the Secure Manager OEM configuration.The OEM secrets are described in detail in the Secure Manager configuration.

During the SFI procedure, the OEM must set its secrets, paying specific attention to the following:

The OEM must set the licensed modules installation model. The same model is used for all the licensed modules. The OEM must set the secure SRAM size used by the modules (one secure SRAM area is shared between all the modules).

Warning white.png Warning
The Flash Memory configuration to install via the SFI procedure must be the same than the one used during the OEM application development.
2.1.2.4 SFI image output description

The Trusted Package Creator encrypts the SFI image inputs with the OEM key, and generates the SFI image.
The SFI image is then an encrypted image containing the Secure Manager, the OEM application, the OEM secrets, and the modules.

2.1.3 OEM key provisioning

The OEM must provide its OEM key to the Contract Manufacturer (CM) in a way the OEM key cannot be read or extracted clearly by the CM. Only STM32 can handle the OEM key.


In SFI for STM32H5 with Secure Manager, there are 2 ways to provide the OEM key to the CM:

  • The OEM provisions its OEM key, using the Trusted Package Creator, in one HSM.
  • The OEM provisions its OEM key, using the Trusted Package Creator, in one global license file

Then:

  • Only the STMicroelectronics STM32 microcontrollers can securely install the SFI image.
  • Authenticity, integrity, and confidentiality of the SFI image content is ensured.

When using the HSM, the number of STM32 chips to program can be counted.

Security SFI H5 Preparation Flow OEM key provision.png

NOTE: The global license is not available in SFI for STM32H5 without Secure Manager.

2.2 Installation flow

There is one additional input, compared to other platforms: the module license information file.
This file indicates if the module to install is licensed or not.
If the module is licensed, the file can provide the module global license file path, or can indicate the HSM slot ID. The HSM card is provisioned with the module secret key and initialized with a max counter of licenses, in case of module chip specific license.

The installation procedure is similar to the generic SFI installation procedure, deployed on other STM32 products supporting SFI.

Security SFI H5 Installation Flow.png


Info white.png Information
Refer to AN4992 §6 "SFI image programming by OEMs or CMs" for an overview of the SFI image programming.

2.3 Step by Step SFI procedure

Follow How to start SFI on STM32H5 with Secure Manager to run the SFI procedure on STM32H5 with Secure Manager.

3 SFI for STM32H5 without Secure Manager

This procedure must be followed when the OEM installs an application developed without the use of the Secure Manager.
In this case, the SFI procedure on the STM32H5 series is similar to the SFI procedure applied on other platforms. Follow SFI Step-by-step on STM32 boards to run the SFI procedure on the STM32H5 without Secure Manager.

4 References