You copied the Doc URL to your clipboard.

Example system design

The example system design describes a simple system with the key extra components and logic that are required to support an ARM®v8‑M-based microcontroller with ARM TrustZone® technology for ARMv8‑M. In addition to the components shown, Secure access-only components at addresses exempt from attribution can also exist in the system.

The following figure shows the example system design:

Example ARMv8-M system

The following table describes the components of the example system:

Table 1-1 Example system components

Component Description
Full IDAU Implementation Defined Attribution Unit (IDAU) informs an ARMv8‑M master of the system-specific security address map, along with region identification numbers and whether a particular address is Non-secure callable.
Lite IDAU Informs a TrustZone technology aware master or security wrapper of the system-specific security address map.
Security wrapper Maps a legacy master as either Secure or Non-secure and applies Secure attribution that is based on the address map.
Block-based gate Conditionally rejects transactions for an address region that is divided into blocks or pages.
Watermark-based gate Conditionally rejects transactions for an address region that is divided into two using a movable watermark value.
Select-based gate Conditionally rejects transactions for an address region containing multiple slaves that are based on device select lines.
System security controller System controller containing the control fields that drive the rest of the security components.
Was this page helpful? Yes No