STM32Trust

Overview
Security functions and services
Standard & regulation
Security assurance and standards
Software security policy development process
Partners
Developer resources

Enhancing the level of security in embedded design

The rise of Internet of Things (IoT) products has transformed the way we interact with the world around us.
From smart homes to factories, these connected devices are now part of our daily lives, making things easier and more efficient.

With the increasing demand for greater security, especially regarding data privacy and intellectual property (IP) protection, we are taking the lead to address security with a scalable approach implemented in our STM32 series.

To address these needs, we present STM32Trust, built upon six key foundations:

Security functions and services

Ensure that your final application is secured and well-protected. A set of security functions at your disposal, via hardware, software, and services.

Standard and regulations

Understand the governmental rules that electronic systems must comply with. Be ready for your compliance.

Security assurance and standards

Refer to standardized and non-ubiquitous ways of measuring cybersecurity, especially in terms of robustness.

Software security policy development process

Developing and maintaining a comprehensive STM32 software security policy enables you to build secure and reliable devices.

Partners

You are not alone. Review our set of qualified partners who are essential to helping you deliver robust security solutions.

Developer resources

A rich set of security resources to help you know what is available and how easily it can be used.

Security assessment and implementation flow

This flowchart illustrates the structured approach to managing security in embedded systems, guiding users through key questions and decisions to protect their assets effectively.

1

Determine assets to protect

The question “What do you have to protect?” helps to define the critical assets - such as data, intellectual property, or financial resources -that require safeguarding.

2

Identify threats

The process begins by asking, “What are you worried about?” This step focuses on identifying potential threats that could compromise the system’s security.

3

Assess security issues and vulnerabilities

The flow then considers whether there are existing security issues by asking, “Are you having security issues?” This highlights potential weaknesses and vulnerabilities that could be exploited by threats.

4

Select and implement security functions

Based on the identified threats, assets, and vulnerabilities, appropriate STM32Trust security functions are selected and implemented. These functions will help mitigate the risks to an acceptable level.

STM32Trust provides developers with a robust, multilevel strategy to enhance security in their new product designs.

With a set of 12 security functions offering hardware, software, and design services from ST and third parties, STM32Trust complies with the new requirements of national regulations and security standards for embedded devices.

STM32Trust offers security services that are constantly evolving to simplify designers' security journeys:

Secure boot and secure firmware update

Trusted execution environment (TEE)

Secure manufacturing

Secure platform attestation

Secure storage

Cryptography

An overview of a complex cybersecurity landscape

Ensuring robust security for IoT and embedded devices is a global priority, prompting the development of comprehensive regulatory frameworks across major markets.
Navigating these diverse regulatory landscapes is essential for manufacturers and service providers seeking to deploy secure IoT and embedded solutions globally.

Swipe to right →
Standard / Regulation Description
Cyber Resilience Act (CRA) The CRA is a European cybersecurity law aiming at increasing the security of connected digital elements.
RED Directive RED establishes a regulatory framework for placing radio equipment on the market to meet cybersecurity requirements for internet-connected devices, with compliance via self-assessment or notified bodies.
EN 18031 Harmonized standard for RED
IEC 62443 The ISA/IEC 62443 series define requirements and processes for implementing and maintaining electronically secure industrial automation and control systems, bridging operations and IT security.
EN 303 645 The European standard on connected device security, defining baseline security requirements for consumer IoT devices.
USA Cyber Trustmark The USA Cyber Trustmark is a voluntary cybersecurity certification program designed to help organizations demonstrate their commitment to cybersecurity best practices. It aims to build trust among consumers, partners, and stakeholders by providing a recognizable mark that signifies adherence to established security standards.
ioXt Alliance The mission of the ioXt Alliance is to build confidence in IoT products through multistakeholder, international, harmonized, and standardized security and privacy requirements, product compliance programs, and public transparency.
CLS CSA introduced the CLS to enhance IoT security, guide consumers in choosing secure smart devices, and encourage manufacturers to prioritize cybersecurity in their products.
JC-STAR The Ministry of Economy, Trade, and Industry (METI) and the Information- technology Promotion Agency (IPA) have launched the “Labeling Scheme based on Japan Cybersecurity Technical Assessment requirements” (JC-STAR). Going forward, METI and IPA plan to promote the dissemination of labeled products, develop higher-level security conformance criteria and achieve mutual recognition with various countries.

In addition to providing the mandatory security functions and services, ST has focused strongly on developing a security assurance program for microcontrollers and microprocessors to ease our developers’ compliance with various regulations, and to enable its reuse across different end-application segments.

    STM32 security assurance is based on:
  • Security Evaluation standard for IoT Platforms (SESIP) defined and maintained by Global Platform®
  • Platform Security Assurance (PSA) defined initially by Arm® and maintained by Global Platform®
  • NIST CAVP - The NIST Cryptographic Algorithm Validation Program (CAVP) to validate cryptographic algorithms to ensure they meet federal standards for security and reliability
  • NIST ESV - NIST Entropy Validation (EV) provides standardized tests to assess the quality and unpredictability of random entropy sources used in cryptographic systems. It ensures that entropy inputs meet required randomness criteria for secure key generation and cryptographic operations

SESIP is a cybersecurity evaluation framework developed to assess the security of Internet of Things (IoT) platforms. SESIP has been adopted by CEN and CENELEC as a European standard (EN 17927).
It provides a standardized methodology to evaluate the security features and robustness of IoT devices and their underlying platforms. The framework covers multiple security domains, including device identity, data protection, communication security, and software integrity. SESIP aims to identify vulnerabilities and ensure that IoT platforms meet minimum security requirements. It supports manufacturers, developers, and evaluators in implementing and verifying security controls. SESIP emphasizes life cycle security, addressing threats from device manufacturing to decommissioning. The standard facilitates trust and transparency between vendors and consumers by providing clear security assurance levels. SESIP is aligned with international cybersecurity standards and best practices to promote global interoperability. It encourages continuous improvement through periodic reassessment and updates.
SESIP allows the evaluation of platform parts, individually or in composition, in such a way that the evaluation results of those platform parts remain applicable in different connected products.
An example of composition is extracted from SESIP documentation provided below:

    There are 5 security certification levels named SESIP1, SESIP2, SESIP3, SESIP4, and SESIP5 and they are hierarchical:
  • SESIP Assurance Level 1 (SESIP1) is a self-assessment-based level
  • SESIP Assurance Level 2 (SESIP2) is a black-box penetration testing level
  • SESIP Assurance Level 3 (SESIP3) is a traditional white-box vulnerability analysis
  • SESIP Assurance Level 4 (SESIP4) is intended to reuse SOG-IS/EUCC certified platforms
  • SESIP Assurance Level 5 (SESIP5) is intended to reuse SOG-IS/EUCC certified platforms

The STM32 SESIP certificates can be found on the TrustCB security scheme website.

PSA , or Platform Security Architecture, is based on a specification developed by Arm® to establish a security‑principles‑driven approach to device protection. It provides a foundational framework to enhance the security of connected devices.
PSA Certified is a global security certification framework designed specifically for Internet of Things (IoT) devices and embedded systems. It provides a structured approach to evaluating and improving device security from design to deployment. The framework is based on the Platform Security Architecture (PSA) developed by Arm® and incorporates industry best practices and standards.
PSA Certified offers multiple assurance levels, addressing different security needs and threat models. The certification process involves independent third‑party assessments to validate security claims. PSA Certified aims to simplify security adoption for manufacturers and increase trust among consumers and partners.
It promotes interoperability by aligning with global security standards such as ISO/IEC 15408 (Common Criteria). The program supports a broad ecosystem, including chip vendors, device manufacturers, and service providers. Overall, PSA Certified helps accelerate secure IoT innovation while reducing risks associated with cyberthreats.
Governance of PSA Certified is now handled by GlobalPlatform®. STM32 PSA certificates can still be found here.

NIST CAVP is a program that validates cryptographic algorithms used in federal information systems. It provides standardized testing to ensure that algorithms meet strict security and interoperability requirements. The program covers a wide range of cryptographic functions, including encryption, hashing, and digital signatures. Vendors submit their algorithm implementations for independent testing and certification. CAVP helps maintain trust in cryptographic modules and supports compliance with federal cybersecurity standards.
For STM32 certificates, please visit NIST CAVP cryptographic algorithm certificates.

NIST Entropy Source Validation (ESV) assesses the quality and reliability of entropy sources used in cryptographic systems. It ensures that random number generators produce unpredictable and high-quality randomness essential for secure cryptographic operations. The validation process involves rigorous statistical testing and analysis of entropy inputs. ESV helps detect biases, patterns, or weaknesses that could compromise security. It is a critical component for certifying cryptographic modules under standards like FIPS 140-3. Overall, NIST ESV strengthens trust in the randomness used for key generation and other security functions.
STM32 random generator certificates can be found at Cryptographic Module Validation Program | CSRC.

Essential for upcoming regulations and final product compliance, STM32Trust is also dedicated to building trust with our developers through the software deliverables we provide.

To achieve this, a secure software development life cycle has been established within STM32Cube for our STM32 deliverables. This initiative aims to integrate security into our software development process, evolving it into a comprehensive secure software development life cycle.

A detailed documentation of this flow is available in our STM32 MCU wiki - STM32Trust software security policies. Additional questions and answers are also provided in our STM32Trust software security policies Q&A wiki. This process is currently being implemented, initially limited to most STM32CubeXXX packages and various security components, but it will be scaled up over time.

STM32Trust also aims to offer our developers an ecosystem of trusted partners. Carefully chosen for their expertise and quality of service, these STM32Trust security partners provide a wide range of services, including consulting, training, key generation and provisioning, cryptographic solutions, design services, and up to complete solution implementations

Documentation

00 Files selected for download
  Description Version Size Action
DB2641
Proprietary code read-out protection (PCROP), software expansion for STM32Cube
3.0
139 KB
PDF
  Description Version Size Action
AN5056
Integration guide for the X-CUBE-SBSFU STM32Cube Expansion Package
3.0
3 MB
PDF
AN5156
Introduction to STM32 microcontrollers security
2.0
3 MB
PDF
AN4729
STM32L0/L4 FIREWALL overview
1.2
114 KB
PDF
AN4730
Using the FIREWALL embedded in STM32L0/L4/L4+ Series MCUs for secure access to sensitive parts of code and data
2.0
114 KB
PDF
AN2606
STM32 microcontroller system memory boot mode
38.0
3.9 MB
PDF
AN4701
Proprietary code read-out protection on microcontrollers of the STM32F4 Series
3.0
893 KB
PDF
AN4758
Proprietary code read-out protection on microcontrollers of the STM32L4 Series
2.0
994.8 KB
PDF
AN4968
Proprietary code read out protection (PCROP) on STM32F72xxx and STM32F73xxx microcontrollers
1.0
1.1 MB
PDF
AN4230
STM32 microcontrollers random number generation validation using NIST statistical test suite
2.0
517 KB
PDF
AN3371
Using the hardware real-time clock (RTC) in STM32 F0, F2, F3, F4 and L1 series of MCUs
5.2
418 KB
PDF
AN4992
Overview secure firmware install (SFI)
3.0
1.2 MB
PDF
AN5054
Secure programming using STM32CubeProgrammer
2.0
2.9 MB
PDF
AN4838
Managing memory protection unit (MPU) in STM32 MCUs
3.0
219.8 KB
PDF
AN4246
Proprietary Code Read Out Protection on STM32L1 microcontrollers
1.2
283 KB
PDF
AN5421
Getting started with STM32L5 Series microcontrollers and TrustZone® development
1.0
2.70 MB
PDF
AN5347
STM32L5 Series TrustZone® features
4.0
1.19 MB
PDF
AN5447
Overview of Secure Boot and Secure Firmware Update solution on Arm® TrustZone®
1.0
374 KB
PDF
  Description Version Size Action
UM2262
Getting started with the X-CUBE-SBSFU STM32Cube Expansion Package
4.0
2.8 MB
PDF
UM2237
STM32CubeProgrammer software description
7.0
3.2 MB
PDF
UM2238
STM32 Trusted Package Creator tool software description
3.0
1.7 MB
PDF
UM2671
Getting started with STM32CubeL5 TFM application
2.0
2.05 MB
PDF
UM2851
Getting started with STM32CubeU5 TF-M applications
1
4.6 MB
PDF
  Description Version Size Action
STM32Trust
More Trust with STM32 - A whole security ecosystem around STM32
1.0
171 KB
PDF
  Description Version Size Action
STM32H5 and Security FAQ
Everything you need to know to implement security on STM32H5 MCUs
1.0
516 KB
PDF
Fast-track your embedded security journey
Discover the STM32Trust TEE Secure Manager for STM32H5 MCUs
1.0
1.59 MB
PDF
STM32Trust - an ecosystem for embedded security
The STM32 security framework for protecting embedded systems
23.11
2.0 MB
PDF
DB2641

Proprietary code read-out protection (PCROP), software expansion for STM32Cube

AN5056

Integration guide for the X-CUBE-SBSFU STM32Cube Expansion Package

AN5156

Introduction to STM32 microcontrollers security

AN4730

Using the FIREWALL embedded in STM32L0/L4/L4+ Series MCUs for secure access to sensitive parts of code and data

AN2606

STM32 microcontroller system memory boot mode

AN4701

Proprietary code read-out protection on microcontrollers of the STM32F4 Series

AN4758

Proprietary code read-out protection on microcontrollers of the STM32L4 Series

AN4968

Proprietary code read out protection (PCROP) on STM32F72xxx and STM32F73xxx microcontrollers

AN4230

STM32 microcontrollers random number generation validation using NIST statistical test suite

AN3371

Using the hardware real-time clock (RTC) in STM32 F0, F2, F3, F4 and L1 series of MCUs

AN4992

Overview secure firmware install (SFI)

AN5054

Secure programming using STM32CubeProgrammer

AN4838

Managing memory protection unit (MPU) in STM32 MCUs

AN4246

Proprietary Code Read Out Protection on STM32L1 microcontrollers

AN5421

Getting started with STM32L5 Series microcontrollers and TrustZone® development

AN5347

STM32L5 Series TrustZone® features

AN5447

Overview of Secure Boot and Secure Firmware Update solution on Arm® TrustZone®

UM2262

Getting started with the X-CUBE-SBSFU STM32Cube Expansion Package

UM2237

STM32CubeProgrammer software description

UM2238

STM32 Trusted Package Creator tool software description

UM2671

Getting started with STM32CubeL5 TFM application

STM32Trust

More Trust with STM32 - A whole security ecosystem around STM32

STM32H5 and Security FAQ

Everything you need to know to implement security on STM32H5 MCUs

Fast-track your embedded security journey

Discover the STM32Trust TEE Secure Manager for STM32H5 MCUs

STM32Trust - an ecosystem for embedded security

The STM32 security framework for protecting embedded systems

Protecting the data integrity and confidentiality on the
STM32MP1 thanks to the power of STM32Trust