Inquiry: ARM’s Architectural Recommendations for Isolated Hosting of SafeVM, IVI & Trusted SW Using CCA

Hi Team,

I’m exploring ARM’s architectural guidance for deploying SafeVM, IVI, and Trusted Software stacks.

Specifically, I’m interested in understanding how these components can be isolated across different execution worlds to fully leverage Confidential Compute Architecture (CCA) features—ensuring robust safety, security, and confidentiality in each domain.

Regards,

Vikas Pandey