2 Development Flow

The Secure application developer and the Non-Secure application developer have a discussion and reach an agreement regarding the peripherals and memory regions that will be used to create Secure and Non-Secure applications.