SLAU846A June 2023 – October 2023 MSPM0G1105 , MSPM0G1106 , MSPM0G1107 , MSPM0G1505 , MSPM0G1506 , MSPM0G1507 , MSPM0G3105 , MSPM0G3105-Q1 , MSPM0G3106 , MSPM0G3106-Q1 , MSPM0G3107 , MSPM0G3107-Q1 , MSPM0G3505 , MSPM0G3505-Q1 , MSPM0G3506 , MSPM0G3506-Q1 , MSPM0G3507 , MSPM0G3507-Q1
The serial wire debug related policies configure the functionality which is available through the device's physical debug interface (SWD). By default, MSPM0 devices come from TI in an unrestricted state. This state allows for easy production programming, evaluation, and development. However, this unrestricted state is not recommended for mass production, as it leaves a large attack surface present. To accommodate a variety of needs while keeping the configuration process simple, MSPM0 devices support three generic security levels: no restrictions (Level 0), custom restrictions (Level 1), and fully restricted (Level 2). Table 1-5 shows the three generic security levels, from least restrictive to most restrictive.
There are 4 main uses of the SWD interface for which protection needs to be considered:
Level | Scenario | SW-DP Policy | App Debug Policy | Mass Erase Policy | Factory Reset Policy | TI FA Policy |
---|---|---|---|---|---|---|
0 | No restrictions | EN | EN | EN | EN | EN |
1 | Custom restrictions | EN | EN, EN, EN with PW, DISDIS | EN, EN with PW, DIS | EN, EN with PW, DIS | EN, DIS |
2 | Fully restricted | DIS | Don't care (access not possible with SW-DP disabled)(1) |