Hi experts,
The Safety Manual (SPNU540A) lists JTG1 "Hardware Disable of JTAG Port" und JTG2 "Lockout of JTAG Access Using AJSM" as ways to secure JTAG.
We are planning to use the access key of the AJSM to secure JTAG. But we are not able to use the recommended hardware disable of JTAG (TCK=LOW & TMS = HIGH) because we need to do a boundary scan during production.
(Q1) Is the us of JTG2 enough to secure JTAG from unwanted debug access?
Thank you and best regards,
Max