Next steps

This guide provides the essential knowledge that you must have to design and build an SoC for a secure IoT device. The IP discussed in this guide, including the subsystems, is all available through Arm Flexible Access. You can review the options for Arm Flexible Access here.

After you have familiarized yourself with the PSA, you can carry out a threat and security analysis for your use case. The analysis will help you decide on the IP you require to meet the security requirements of your SoC. You might also want to review the software and firmware requirements of your system at this point.

The next step is to explore the SSE-123 subsystem and decide whether you can use it as the basis for your SoC. You will find that the SSE-123 is designed using the same IP introduced in this guide. If the SSE-123 fits your vision, you will gain considerable time savings.