Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

279 trademark policy process and checklist #280

Draft
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

JohnTraverAmd
Copy link
Contributor

@JohnTraverAmd JohnTraverAmd commented Mar 5, 2025

Reviewed Process and Checklist Documents

@JohnTraverAmd JohnTraverAmd self-assigned this Mar 5, 2025
@JohnTraverAmd JohnTraverAmd linked an issue Mar 5, 2025 that may be closed by this pull request
@JohnTraverAmd
Copy link
Contributor Author

I need to add the Trademark Images

@syncsrc-nv
Copy link

A few comments:

  • I thought we'd agreed the External Entity Interaction Checklist Item could be dropped due to being redundant with the PA_USER requirement? Same for the Secure Mailbox Access checklist item.
  • There is a note in the google docs version that the SRAM Zeroization Process item would be removed
  • The Key Revoke Bits checklist item seems redundant given the Field-programmable requirement preceding it.
  • The Debugging Controls checklist item needs to clarify what sensitive information needs to be protected, as Caliptra already takes the responsibility to protect its internal assets.
  • The requirement for Log Functionality in SoC needs to clarify SOC versus Caliptra responsibility for providing tamper evidence.
  • The Interface Wires section needs to define what "correctly implemented" means for the various signals.
  • The Testing and Verification section is too broad to be a MUST requirement.


**Version 0.2**

# Introduction {#introduction}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

{#introduction} displays in the preview.

* **Evaluation Methodology:** Manufacturers must detail the security measures employed during the handling of the UDS seed, including access controls, secure storage practices, and zeroization procedures.
* **Checklist Item:**
* **Requirement**: Field Entropy should be generated on die with no exposure to outside the die.
* **Evaluation Methodology**: Manufacturers/auditors must verify the generation process and document any reason the UDS seed is exposed outside of the die.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should be field entropy here.


# Caliptra Documentation

The Caliptra Specification is maintained within the [ChipsAlliance Caliptra github](https://github.com/chipsalliance/Caliptra/blob/main/doc/Caliptra.md). This is a live link. Each generation, the main specification will be updated and the older specifications will be maintained for reference for designs based on that specification. For example, here is the specification for [Calitpra 1.X](https://github.com/chipsalliance/Caliptra/blob/main/doc/caliptra_1x/Caliptra.md).
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The Caliptra Specification is maintained within the [ChipsAlliance Caliptra github](https://github.com/chipsalliance/Caliptra/blob/main/doc/Caliptra.md). This is a live link. Each generation, the main specification will be updated and the older specifications will be maintained for reference for designs based on that specification. For example, here is the specification for [Calitpra 1.X](https://github.com/chipsalliance/Caliptra/blob/main/doc/caliptra_1x/Caliptra.md).
The Caliptra Specification is maintained within the [ChipsAlliance Caliptra repository](https://github.com/chipsalliance/Caliptra/blob/main/doc/Caliptra.md). This is a live link. Each generation, the main specification will be updated and the older specifications will be maintained for reference for designs based on that specification. For example, here is the specification for [Calitpra 1.X](https://github.com/chipsalliance/Caliptra/blob/main/doc/caliptra_1x/Caliptra.md).

* **Requirement:** The UDS seed and field entropy must be generated using a cryptographically secure random number generator (CSRNG) compliant with [NIST Entropy Source Certification](https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations) SP 800-90B.
* **Evaluation Methodology:** Manufacturers must provide documentation demonstrating compliance with applicable standards for entropy generation.
* **Checklist Item:**
* **Requirement:** The confidentiality and integrity of the UDS seed and must be protected during generation, storage, and provisioning. Access to these assets must be strictly controlled, and any temporary storage must be securely zeroized after use.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* **Requirement:** The confidentiality and integrity of the UDS seed and must be protected during generation, storage, and provisioning. Access to these assets must be strictly controlled, and any temporary storage must be securely zeroized after use.
* **Requirement:** The confidentiality and integrity of the UDS seed must be protected during generation, storage, and provisioning. Access to this asset must be strictly controlled, and any temporary storage must be securely zeroized after use.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In "generation, storage, and provisioning." storage refers to off-chip storage, on-chip storage (fuses), or both?


* **Checklist Item:**
* **Requirement:** Access to the fuses containing the UDS seed and field entropy should be restricted exclusively to the mechanisms needed for loading these values into Caliptra's fuse registers. No other components or firmware should have read or write access, except for essential hardware functions like fuse sense and distribution logic.
* **Evaluation Methodology:** Manufacturers must provide architectural diagrams and RTL code excerpts demonstrating that only authorized hardware mechanisms can access these fuses.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are EDA tools that will analyze the flow of confidential data and produce a report. For example https://eda.sw.siemens.com/en-US/ic/questa/formal-verification/secure-check/. Analysis at the RTL level is helpful at first, but the final analysis needs to be performed after synthesis and scan-cell insertion.


#### *Flaw Remediation Process*

* **Checklist Item:**
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Shouldn't this be the other way around, for when a security issue is found in Caliptra? If a flaw is found in Caliptra then presumably the Integrator needs a way to be alerted and hopefully open to deploying the fix if they can.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Trademark Policy Process and Checklist
4 participants