Next steps

This guide provided a high-level introduction to security concepts. We have learned about security basics, and can now explore specific security-related technologies in the following guides:

  • TrustZone for Armv8-A - This guide introduces and explains the Arm TrustZone technology. Arm TrustZone technology offers an efficient, system-wide approach to security with hardware-enforced isolation that is built into the CPU.

  • Providing protection for complex software - This guide explores the features that are available in the Arm architecture to provide robust protection against common software attacks including pointer authentication, branch target identification and memory tagging. The guide introduces the features that are required to mitigate against Jump-Orientated Programming and Return-Orientated Programming attacks.