This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

TMS570LC4357: How secure is the Safety Measure JTG2?

Part Number: TMS570LC4357

Hi experts,

The Safety Manual (SPNU540A) lists JTG1 "Hardware Disable of JTAG Port" und JTG2 "Lockout of JTAG Access Using AJSM" as ways to secure JTAG.
We are planning to use the access key of the AJSM to secure JTAG. But we are not able to use the recommended hardware disable of JTAG (TCK=LOW & TMS = HIGH) because we need to do a boundary scan during production.

(Q1) Is the us of JTG2 enough to secure JTAG from unwanted debug access?

Thank you and best regards,
Max