Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,20 @@ nRF54H20 SoC lifecycle states
:local:
:depth: 2

The Secure Domain ROM defines the lifecycle states (LCS) for the nRF54H20 SoC.
The states are based on the Arm PSA Security Model and allow for programming and safely erasing the device assets.
Lifecycle states control device security features and debug access.
Each state specifies when and how the device allows the following operations:

* Provision or replace security assets, for example, root keys, certificates, and configuration
* Enable or disable debug access (open, authenticated, or permanently disabled)
* Enforce secure boot and prevent rollback
* Perform failure analysis (RMA) handling
* Sanitize the device before disposal

Available LCS
*************

The Secure Domain ROM implements these lifecycle states for the nRF54H20 SoC.
The states are based on the Arm PSA Security Model and enable safe programming and erasure of device assets.

The LCS available are the following:

Expand Down Expand Up @@ -43,19 +55,27 @@ See the following diagram:

nRF54H20 lifecycle states and transitions available on the nRF54H20 SoC.

Transitioning LCS
*****************

You can change the SoC lifecycle state to streamline development and testing:

* During application development, set the SoC to the ``Root of Trust`` (RoT) state.
* To validate behavior in a production environment, use the ``DEPLOYED`` state.


If the device is in LCS ``EMPTY``, transition it to LCS ``RoT`` by following the :ref:`nRF54H20 DK bring-up <ug_nrf54h20_gs_bringup>` procedure.

.. caution::
The transition from ``EMPTY`` to ``RoT`` is permanent and cannot be reversed.
You can only progress forward through lifecycle states.
As such, the transition from ``EMPTY`` to ``RoT`` is permanent and cannot be reversed.
Each forward transition increases protection and reduces invasive debug options.

Additional information
**********************

For more information, see the following pages:

* :ref:`ug_nrf54h20_gs`
* :ref:`ug_nrf54h20_custom_pcb`
* :ref:`ug_nrf54h20_keys`
* :ref:`ug_nrf54h20_gs` - nRF54H20 DK bring-up and initial setup guide
* :ref:`ug_nrf54h20_custom_pcb` - Guidelines for designing a custom PCB
* :ref:`ug_nrf54h20_keys` - Provisioning and managing security keys
* :ref:`ug_nrf54h20_ironside` - |ISE| how-to guide, specifically the :ref:`ug_nrf54h20_ironside_se_update` section containing instructions for updating the |ISE| firmware