Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 060

ARM TrustZone

What is ARM TrustZone?

ARM TrustZoneA hardware security extension on ARM CPUs that partitions the SoC into a Secure World and a Normal World, providing a TEE for keys, DRM, and biometric data.


ARM TrustZone is a system-wide security architecture introduced in ARMv6 (TrustZone-A for Cortex-A and TrustZone-M for Cortex-M). The SoC is split into two worlds - Secure and Non-Secure - signalled by the NS bit, with the CPU, memory controller, bus fabric, and peripherals aware of the partition. The Secure World runs a small trusted OS (e.g. OP-TEE, Qualcomm QSEE, Samsung TEEgris, Trustonic Kinibi) that exposes Trusted Applications via SMC calls (GlobalPlatform TEE API). TrustZone hosts the Android Keystore, iOS Secure Enclave-equivalent flows, Widevine L1 DRM, fingerprint matchers, fTPMs, and mobile-payment crypto. Recent attacks (CLKSCREW, downgrade flaws in vendor TAs) have shown that Secure World code still needs careful auditing.

Examples

  1. 01

    Android Keystore-bound credentials are sealed inside TrustZone.

  2. 02

    Widevine L1 DRM decoding runs inside a TrustZone Trusted Application.

Frequently asked questions

What is ARM TrustZone?

A hardware security extension on ARM CPUs that partitions the SoC into a Secure World and a Normal World, providing a TEE for keys, DRM, and biometric data. It belongs to the Cryptography category of cybersecurity.

What does ARM TrustZone mean?

A hardware security extension on ARM CPUs that partitions the SoC into a Secure World and a Normal World, providing a TEE for keys, DRM, and biometric data.

How does ARM TrustZone work?

ARM TrustZone is a system-wide security architecture introduced in ARMv6 (TrustZone-A for Cortex-A and TrustZone-M for Cortex-M). The SoC is split into two worlds - Secure and Non-Secure - signalled by the NS bit, with the CPU, memory controller, bus fabric, and peripherals aware of the partition. The Secure World runs a small trusted OS (e.g. OP-TEE, Qualcomm QSEE, Samsung TEEgris, Trustonic Kinibi) that exposes Trusted Applications via SMC calls (GlobalPlatform TEE API). TrustZone hosts the Android Keystore, iOS Secure Enclave-equivalent flows, Widevine L1 DRM, fingerprint matchers, fTPMs, and mobile-payment crypto. Recent attacks (CLKSCREW, downgrade flaws in vendor TAs) have shown that Secure World code still needs careful auditing.

How do you defend against ARM TrustZone?

Defences for ARM TrustZone typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for ARM TrustZone?

Common alternative names include: TrustZone, ARM TEE.

Related terms