List of tables
Table 1. Applicable products ..................................................................1
Table 2. Glossary ..........................................................................2
Table 3. Assets to be protected ................................................................6
Table 4. Attacks types and costs ...............................................................8
Table 5. Memory types and associated protection .................................................. 18
Table 6. Scope of STM32 embedded memory protection features ....................................... 21
Table 7. Software isolation mechanism .......................................................... 21
Table 8. Basic feature differences of TrustZone-based secure software .................................... 26
Table 9. Security features for STM32C0, STM32F0/1/2/3/4, STM32G0/4 devices ............................. 27
Table 10. Security features for STM32L0/1/4/4+, STM32WB, STM32WL devices .............................. 28
Table 11. Security features for STM32L5, STM32U5, STM32H503/5, STM32H72x/73/74x/75, STM32H7Ax/7Bx, STM32F7
devices.......................................................................... 29
Table 12. RDP protections ................................................................... 31
Table 13. Attributes and access permission managed by MPU........................................... 37
Table 14. Process isolation ................................................................... 38
Table 15. Security use cases .................................................................. 42
Table 16. Document revision history ............................................................. 49
AN5156
List of tables
AN5156 - Rev 8
page 54/56