SLAU846B June 2023 – November 2024 MSPM0G1105 , MSPM0G1106 , MSPM0G1107 , MSPM0G1505 , MSPM0G1506 , MSPM0G1507 , MSPM0G1519 , MSPM0G3105 , MSPM0G3105-Q1 , MSPM0G3106 , MSPM0G3106-Q1 , MSPM0G3107 , MSPM0G3107-Q1 , MSPM0G3505 , MSPM0G3505-Q1 , MSPM0G3506 , MSPM0G3506-Q1 , MSPM0G3507 , MSPM0G3507-Q1 , MSPM0G3519
Some MSPM0 devices offer several extensive cybersecurity features as part of the device architecture, including:
The security architecture decouples mechanisms (controls offered by MSPM0 devices) from policies that are application-defined. This allows for a wide variety of security requirements to be supported.
The overall security configuration offered by MSPM0 devices is implemented in two steps:
In this security model, both TI boot code and CSC are considered trusted. The main application is considered untrusted. When execution jumps to the main application, all security elements are expected to have been configured, including restrictions on debug, memory accesses, key management, and so on.