17.3.2. Secure debug

The security system also controls availability of debug provision. You can configure separate hardware over full JTAG debug and trace control for Normal and Secure software worlds, so that no information about the trusted system leaks. You can control hardware configuration options through a Secure peripheral or you can hardwire them and control them using the following signals:

Copyright © 2015 ARM. All rights reserved.ARM DEN0024A
Non-ConfidentialID050815