diff --git a/doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_architecture_lifecycle.rst b/doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_architecture_lifecycle.rst index b853f4ac0094..edf443918936 100644 --- a/doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_architecture_lifecycle.rst +++ b/doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_architecture_lifecycle.rst @@ -7,8 +7,20 @@ nRF54H20 SoC lifecycle states :local: :depth: 2 -The Secure Domain ROM defines the lifecycle states (LCS) for the nRF54H20 SoC. -The states are based on the Arm PSA Security Model and allow for programming and safely erasing the device assets. +Lifecycle states control device security features and debug access. +Each state specifies when and how the device allows the following operations: + +* Provision or replace security assets, for example, root keys, certificates, and configuration +* Enable or disable debug access (open, authenticated, or permanently disabled) +* Enforce secure boot and prevent rollback +* Perform failure analysis (RMA) handling +* Sanitize the device before disposal + +Available LCS +************* + +The Secure Domain ROM implements these lifecycle states for the nRF54H20 SoC. +The states are based on the Arm PSA Security Model and enable safe programming and erasure of device assets. The LCS available are the following: @@ -43,19 +55,27 @@ See the following diagram: nRF54H20 lifecycle states and transitions available on the nRF54H20 SoC. +Transitioning LCS +***************** + You can change the SoC lifecycle state to streamline development and testing: * During application development, set the SoC to the ``Root of Trust`` (RoT) state. * To validate behavior in a production environment, use the ``DEPLOYED`` state. - If the device is in LCS ``EMPTY``, transition it to LCS ``RoT`` by following the :ref:`nRF54H20 DK bring-up ` procedure. .. caution:: - The transition from ``EMPTY`` to ``RoT`` is permanent and cannot be reversed. + You can only progress forward through lifecycle states. + As such, the transition from ``EMPTY`` to ``RoT`` is permanent and cannot be reversed. + Each forward transition increases protection and reduces invasive debug options. + +Additional information +********************** For more information, see the following pages: -* :ref:`ug_nrf54h20_gs` -* :ref:`ug_nrf54h20_custom_pcb` -* :ref:`ug_nrf54h20_keys` +* :ref:`ug_nrf54h20_gs` - nRF54H20 DK bring-up and initial setup guide +* :ref:`ug_nrf54h20_custom_pcb` - Guidelines for designing a custom PCB +* :ref:`ug_nrf54h20_keys` - Provisioning and managing security keys +* :ref:`ug_nrf54h20_ironside` - |ISE| how-to guide, specifically the :ref:`ug_nrf54h20_ironside_se_update` section containing instructions for updating the |ISE| firmware