Overview
SAL is calculated automatically from a 4×4 matrix combining threat likelihood (how probable the threat is) and threat impact (the consequence if the threat succeeds). This matrix-based approach aligns with DO-326A security assessment methodology and ensures consistent, quantifiable threat prioritization across the system. The four SAL levels are:| SAL Level | Risk Color | Description | Security Activities Required |
|---|---|---|---|
| SAL-0 | Green | Negligible threat — unlikely occurrence with negligible consequences | Minimal or no specialized security activities |
| SAL-1 | Yellow | Low threat — possible occurrence or minor consequences | Basic security controls, standard design practices |
| SAL-2 | Orange | Medium threat — likely occurrence or major consequences | Formal threat assessment, documented countermeasures |
| SAL-3 | Red | High threat — almost certain or catastrophic consequences | Comprehensive security assurance, independent verification |
In DO-326A security analysis, “Security Assurance Level” (SAL) is distinct from Design Assurance Level (DAL) used in ARP 4754A safety assessment. SAL rates the severity of a security threat, while DAL rates the criticality of a system function. A single system element may have both a DAL allocation (e.g., DAL B) and security threats at multiple SAL levels (e.g., SAL-2 and SAL-3).
SAL Calculation Matrix
SAL is computed from the Cartesian product of Threat Likelihood (4 levels) and Threat Impact (4 levels), creating a 4×4 evaluation matrix:Threat Likelihood Scale
| Level | ID | Description | Definition |
|---|---|---|---|
| Unlikely | unlikely | Low probability of occurrence | Expected less than once per 1000 flight hours |
| Possible | possible | Moderate probability of occurrence | Expected 1–10 times per 1000 flight hours |
| Likely | likely | High probability of occurrence | Expected 10–100 times per 1000 flight hours |
| Almost Certain | almostCertain | Very high probability of occurrence | Expected more than 100 times per 1000 flight hours |
Threat Impact Scale
| Level | ID | Description | Consequence |
|---|---|---|---|
| Negligible | negligible | Minimal adverse effect | System continues operation; user may not notice |
| Minor | minor | Small degradation of service | Reduced functionality; user experiences inconvenience |
| Major | major | Significant service loss | Critical function unavailable; mission impact |
| Catastrophic | catastrophic | Complete loss of safety or mission-critical function | Loss of aircraft or loss of life |
SAL Assignment from Likelihood × Impact
The following matrix shows how likelihood and impact combine to determine SAL:- SAL-0 (green) results from low likelihood + low impact combinations
- SAL-1 (yellow) represents low-to-moderate risk requiring standard controls
- SAL-2 (orange) indicates medium-to-high risk requiring formal documentation and mitigation
- SAL-3 (red) is reserved for threats that are either very likely or have catastrophic consequences
Initial vs. Residual SAL
Security threat assessment uses a two-phase evaluation: Initial SAL (before countermeasures) and Residual SAL (after countermeasures):Initial SAL Assessment
Initial SAL is determined based on:- Initial Likelihood: Probability of the threat succeeding without any countermeasures
- Initial Impact: Consequence if the threat succeeds
Residual SAL Assessment
After implementing security countermeasures, residual assessment evaluates:- Residual Likelihood: Reduced probability with countermeasures in place
- Residual Impact: Impact remains unchanged (countermeasures do not reduce consequence, only prevent occurrence)
Work Item Fields
Security threats in the Aerospace Safety Solution track SAL using the following custom fields:Initial Assessment Fields
| Field Name | Type | Description | Enumeration |
|---|---|---|---|
initialLikelihood | Enum | Probability of threat before countermeasures | unlikely, possible, likely, almostCertain |
initialImpact | Enum | Consequence severity before mitigation | negligible, minor, major, catastrophic |
initialSAL | Enum (read-only) | Auto-calculated SAL from likelihood × impact | sal0, sal1, sal2, sal3 |
Residual Assessment Fields
| Field Name | Type | Description | Enumeration |
|---|---|---|---|
residualLikelihood | Enum | Probability of threat after countermeasures | unlikely, possible, likely, almostCertain |
residualImpact | Enum | Consequence severity (unchanged from initial) | negligible, minor, major, catastrophic |
residualSAL | Enum (read-only) | Auto-calculated SAL from residual likelihood × impact | sal0, sal1, sal2, sal3 |
The
initialSAL and residualSAL fields are automatically calculated by the Security Threat Assessment risksheet using a JavaScript formula that applies the 4×4 likelihood/impact matrix. You do not manually assign SAL values — instead, set likelihood and impact, and SAL populates automatically.SAL in the Aerospace Safety Solution
Security Threat Assessment Risksheet
SAL is the primary risk metric in the DO-326A Security Threat Assessment risksheet:- System Element (e.g., Processing Core Module)
- Attack Surface (e.g., Network, Physical, Software)
- Threat Scenario (e.g., Spoofing attack via network interface)
Security Threat Assessment Dashboard
The Security Threat Assessment dashboard provides project-wide threat aggregation, showing:- Count of threats by SAL level (SAL-0, SAL-1, SAL-2, SAL-3)
- Distribution of threats by attack surface type (Network, Physical, Software, Human, Supply Chain, Wireless)
- Countermeasure status (Planned, In Progress, Implemented, Verified)
- Comparison of initial vs. residual SAL distribution
Relationship to Other Assessments
| Assessment Type | Risk Metric | Scope | Framework |
|---|---|---|---|
| Functional Safety (FHA/PSSA/SSA) | DAL + Probability | System functions and failure conditions | ARP 4761 |
| Failure Mode Analysis (SFMEA/DFMEA) | RPN (Severity × Occurrence × Detection) | Failure modes and their causes | AIAG FMEA |
| Hazard Analysis (MIL-STD-882E) | Severity + Probability | System hazards | MIL-STD-882E |
| Security Threat Assessment (DO-326A) | SAL (Likelihood × Impact) | Security threats via STRIDE | DO-326A |
SAL Levels and Required Activities
Different SAL levels trigger different security assurance activities, similar to how DAL levels drive certification objectives:| SAL Level | Likelihood + Impact Combinations | Required Activities | Countermeasure Rigor |
|---|---|---|---|
| SAL-0 | Unlikely + Negligible/Minor | Basic design review; standard security practices | Standard design controls |
| SAL-1 | Unlikely + Major, Possible + Negligible/Minor, Likely + Negligible | Threat documentation; design countermeasures; peer review | Documented security controls |
| SAL-2 | Possible + Major, Likely + Minor/Major, Unlikely + Catastrophic | Formal threat analysis; design + protective countermeasures; traceability to requirements | Formal security controls with evidence |
| SAL-3 | Almost Certain + any, Likely + Catastrophic, Possible + Catastrophic | Comprehensive threat analysis; multi-layered countermeasures; independent verification | Highest level of assurance; independent review |
The specific activities and evidence artifacts required for each SAL level in the Aerospace Safety Solution should be confirmed against your project’s DO-326A security plan and certification authority guidance. SAL levels serve as a framework for organizing security work, but the detailed implementation depends on your program’s risk management strategy.
Cross-Cutting SAL Concepts
SAL vs. DAL
Program managers often ask: “What is the relationship between SAL and DAL?”- DAL (Design Assurance Level) applies to safety-critical functions and comes from FHA/PSSA/SSA analysis (ARP 4761)
- SAL (Security Assurance Level) applies to security threats and comes from DO-326A threat assessment
- A DAL (e.g., DAL B) — indicating its functional safety criticality
- Multiple SALs (e.g., SAL-2 network threat, SAL-1 physical threat) — indicating different security threat levels
Multi-Select Countermeasures
Security countermeasures (riskControl work items) can address multiple threats simultaneously. For example, an authentication system might reduce SAL for both:- Spoofing threats (STRIDE: Spoofing) on the network interface
- Tampering threats (STRIDE: Tampering) on the system module
Security Threat Assessment Workflow
The typical workflow for security threat assessment follows these steps:SAL in Reports and Dashboards
Certification Readiness Scorecard
The Certification Readiness Scorecard includes a row for DO-326A security assessment with:- Classification %: Percentage of identified threats with assigned initial likelihood and impact
- Decomposition %: Percentage of threats linked to system elements (hierarchical organization)
- Test Coverage %: Percentage of countermeasures with linked verification evidence
- SAL Coverage %: Percentage of threats with residual SAL assessed (post-mitigation)
- Doc Inventory: Count of security analysis documents (Security Plan, Threat Assessment report)
Current project statistics for DO-326A security threat analysis may show 0 threats if the project has not yet conducted security threat assessment. The SAL functionality is available and ready to use; activation depends on your certification roadmap.
Related References
- Security Threat Assessment How-To Guide — Step-by-step workflow for conducting DO-326A threat assessment
- Threat Categories (STRIDE) — Six STRIDE threat types and examples
- Risk Control Type — Countermeasure classification and ISO 14971 hierarchy
- RTM Domain Model — Security threat entity relationships and link roles
- Security Threat Assessment Risksheet Configuration — Risksheet column layout, formulas, and views
Page Version: v2
Last Updated: February 2026
Framework: DO-326A / ED-202A Airworthiness Security
Related Standard: ARP 4754A, ARP 4761, MIL-STD-882E
Source References (dev)
Source References (dev)
Code:
.polarion/tracker/fields/securityThreat-attackSurface-enum.xml, securityThreat-likelihood-enum.xml, securityThreat-impact-enum.xml, securityThreat-sal-enum.xml (0.70) · .polarion/pages/spaces/_default/Safety Assessment Summary/page.xml, Common Cause Analysis Report/page.xml, Security Threat Assessment/page.xml, Hara Risk Matrix Report/page.xml (0.54) · .polarion/nextedy/models/rtm.yaml (0.53) · .polarion/tracker/fields/designRequirement-subType-enum.xml, environmentalCategory-enum.xml, fta-gateType-enum.xml, cca-analysisType-enum.xml, controlType-enum.xml, riskControlType-enum.xml, verificationMethod-enum.xml, testLevel-enum.xml (0.53) · modules/RiskTemplates/SecurityThreatTemplate/attachments/risksheet.json (0.50) · .polarion/tracker/fields/securityThreat-custom-fields.xml (0.50) · .polarion/tracker/fields/complianceObjective-custom-fields.xml (0.49) · datasets/sol-aero-ui-walkthrough/summary.md, navigation.md, dashboards/home-dashboard.md, dashboards/role-dashboards.md, dashboards/standards-compliance.md, risksheet-views/risksheet-views.md, work-item-types/data-model.md (0.48) · .polarion/tracker/fields/workitem-type-enum.xml (0.48) · .polarion/tracker/fields/dal-enum.xml (0.48)