Trusted Firmware Logo

Introducing Rusted Firmware-A (RF-A) - A Rust-Based reimagination of Trusted Firmware-A

logo
Bharath Subramanian| Tuesday, August 19, 2025|5 min read

We are excited to unveil Rusted Firmware-A, a new open-source project that reimagines Trusted Firmware-A (TF-A) using Rust. Developed collaboratively by engineers at Arm and Google, Rusted Firmware-A is a ground-up redesign that leverages the strengths of a modern systems programming language specifically designed to address key limitations of traditional approaches, with a strong focus on safety and performance.

TL;DR: Rusted Firmware-A is a Rust-first implementation of Trusted Firmware-A for the latest Arm A-class processors. It’s open source, security by design, legacy-free, and built with the future in mind. This is just the beginning. The project welcomes your feedback as it evolves.

Why Rusted Firmware-A?

TF-A has served the Arm ecosystem reliably for many years. However, it carries evolutionary and legacy artifacts accumulated over time. Rusted Firmware-A gives us a great opportunity to:

The C TF-A will continue to be supported and maintained including Long-Term Support (LTS) versions that remain first-class for many years. However, with Rusted Firmware-A, we’re refreshing the implementation for the future.

Scope and Goals

Rusted Firmware-A starts with a blank sheet, targeting the latest Arm A-class processors. Older architecture versions and extensions are out of scope. Some key principles:

Project Status and Roadmap

We are currently working on an early prototype and published v0.1 for use. This version will serve as a public signal that the codebase is available and open for feedback.

Development Milestones

Timeline: We’re looking to productize Rusted Firmware-A in a few years. Until then, expect rapid iteration and community-driven evolution.

Open Source and Collaboration

Rusted Firmware-A is open source. You can explore the project, feedback, contribute or track progress at:

Currently, contributions from Arm and Google are given priority. We welcome external contributions on a best-effort basis during the early phases.

Migration Strategy

We anticipate providing a migration path from TF-A to Rusted Firmware-A once the project matures. Our intent is to eventually do all new firmware development in Rusted Firmware-A. However:

Get Involved

Rusted Firmware-A is early but promising. The v0.1 release is available. clone the repository, explore the issues, and let us know what you think.

Whether you’re considering adoption or contribution, your feedback is essential. Please share your thoughts:

We’re especially interested in:

Let’s build the next generation of secure Arm firmware together.

FAQs

  1. Why write Rusted Firmware-A in Rust?
    To ensure memory safety, reduce legacy baggage, improve maintainability, and leverage Rust’s type system to catch more bugs earlier.

  2. Is C TF-A flawed?
    Absolutely not. It has served us well. Rusted Firmware-A is an opportunity for a modern reimplementation.

  3. Will both versions be developed in parallel?
    For now, yes. But maintaining feature parity long-term is unsustainable. Eventually, Rusted Firmware-A will become the default for new development.

  4. What if I need features missing in Rusted Firmware-A?
    Rusted Firmware-A will not support all the features supported by TF-A today. Please continue using C TF-A if those are required.

  5. Where can I find the RUSTED FIRMWARE-A roadmap and status?
    We’ll publish a roadmap shortly. In the meantime, track our GitHub issues.

  6. Are there plans to transition other Trusted Firmware projects to Rust?
    There are currently no plans to transition other Trusted Firmware projects to Rust. The existing projects will continue to be actively maintained in their current implementation languages.

About TrustedFirmware.org

TrustedFirmware.org is an open source project implementing foundational software components for creating secure devices. Trusted Firmware provides a reference implementation of secure software for processors implementing both the A-Profile and M-Profile Arm architecture. It provides SoC developers and OEMs with a reference trusted code base complying with the relevant Arm specifications. Trusted Firmware code is the preferred implementation of Arm specifications, allowing quick and easy porting to modern chips and platforms. This forms the foundations of a Trusted Execution Environment (TEE) on application processors, or the Secure Processing Environment (SPE) of microcontrollers.

TrustedFirmware.org is member driven and member funded.

To learn more about membership and its benefits, please see the following page or send a request for more information to enquiries@trustedfirmware.org.

Recent Posts

post image
Introducing Rusted Firmware-A (RF-A) - A Rust-Based reimagination of Trusted Firmware-A

Tuesday, August 19, 2025

Why Rusted Firmware-A?

post image
Rusted Firmware-A (RF-A) - A Rust-Based Reimagination of Trusted Firmware-A for the Next Generation of Secure Computing

Tuesday, August 19, 2025

Rusted Firmware-A: A Rust-Based Reimagination of Trusted Firmware-A for the Next Generation of Secure Computing

post image
Trusted Firmware-A v2.13 released!

Thursday, May 22, 2025

Introduction Trusted Firmware-A (TF-A) 2.13 has been officially released, delivering a host of enhancements focused on security, platform support, and maintainability. This release introduces key updates including support for Arm Architecture features, expanded RMM functionality, and improved integration with third-party firmware components. TF-A 2.13 also strengthens its...

post image
Trusted Firmware-M Release v2.2.0

Tuesday, April 22, 2025

Trusted Firmware-M v2.2.0 Release

post image
Trusted Firmware-A v2.12 released!

Monday, January 6, 2025

Introduction Trusted Firmware-A recently had its second release in 2024 for TF-A v2.12. It is tagged across multiple repositories – TF-A, TF-A Tests, Hafnium, TF-A OpenCI Scripts, Trusted Services and Realm Management Monitor (RMM) 0.6.0 components.