Skip to main content

Overview

The Security Threat Assessment Risksheet is a specialized risk analysis template designed for DO-326A compliance. It follows a structured workflow for identifying threats using STRIDE categories, assessing threat likelihood and impact, allocating security controls (countermeasures), and tracking residual risk through Security Assurance Levels (SAL). diagram

Risksheet Structure

The Security Threat Assessment Risksheet contains 15 columns organized into 5 header groups:
Header GroupColumnsPurpose
AssetSystem Element, Attack SurfaceIdentify what is being threatened
ThreatSTRIDE Category, Title, DescriptionClassify and describe the threat
Initial AssessmentLikelihood, Impact, SALEvaluate pre-mitigation risk
ControlsCountermeasure ID, Title, StatusAllocate security countermeasures
ResidualLikelihood, Impact, SALVerify post-mitigation risk

Hierarchy

The risksheet uses a 3-level hierarchy:
  1. System Element — Top-level system element being assessed (e.g., “Flight Control Computer”)
  2. Threat Category — STRIDE threat type grouping (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege)
  3. Attack Scenario — Specific threat instance with details

Column Reference

Asset Group

ColumnTypeValuesDescription
System ElementItem LinksystemElement work itemsThe system element being threatened. Links to the decomposed system hierarchy.
Attack SurfaceTextFree textIdentifies the specific attack surface or interface (e.g., “ARINC 429 data bus”, “Power supply input”, “Software update port”).

Threat Group

ColumnTypeValuesDescription
STRIDE CategoryEnumerationSpoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of PrivilegeSTRIDE threat classification per DO-326A methodology.
TitleTextFree textShort threat description (e.g., “Unauthorized data injection into sensor inputs”).
DescriptionTextLong textDetailed threat narrative explaining attack method, preconditions, and potential impact.

Initial Assessment Group

ColumnTypeDefaultDescription
LikelihoodEnumerationUnlikelyProbability of threat exploitation: Unlikely, Possible, Likely, Almost Certain.
ImpactEnumerationNegligibleConsequence severity if threat succeeds: Negligible, Minor, Major, Catastrophic.
SAL (Initial)FormulaAuto-calculatedSecurity Assurance Level (0–3) computed from Likelihood × Impact 4×4 matrix. See SAL Auto-Calculation below.

Controls Group

ColumnTypeDefaultDescription
Countermeasure IDItem LinkriskControl work itemsLinks to the security control (countermeasure) that mitigates this threat.
Countermeasure TitleTextAuto-populated from linkName of the countermeasure (e.g., “Data validation on sensor inputs”, “Encryption of flight data”).
StatusEnumerationOpenImplementation status: Open, In Progress, Implemented, Verified.

Residual Group

ColumnTypeDefaultDescription
Likelihood (Residual)EnumerationUnlikelyPost-mitigation threat likelihood after countermeasures are applied.
Impact (Residual)EnumerationNegligiblePost-mitigation impact assessment.
SAL (Residual)FormulaAuto-calculatedPost-mitigation SAL computed from residual Likelihood × Impact. Typically lower than Initial SAL if controls are effective.

SAL Auto-Calculation Formula

The Security Assurance Level is automatically calculated from a 4×4 likelihood-impact matrix:
// Likelihood levels: Unlikely (1), Possible (2), Likely (3), Almost Certain (4)
// Impact levels: Negligible (1), Minor (2), Major (3), Catastrophic (4)

SAL Matrix:
┌──────────────┬───────┬───────┬───────┬──────────────┐
Likelihood \ │ Neg.  │ MinorMajorCatastrophic
Impact       │ (1)   │ (2)   │ (3)   │ (4)          │
├──────────────┼───────┼───────┼───────┼──────────────┤
Unlikely (1) │ SAL-0SAL-0SAL-1SAL-2
Possible (2) │ SAL-0SAL-1SAL-2SAL-3
Likely (3)   │ SAL-1SAL-2SAL-3SAL-3
Almost (4)   │ SAL-2SAL-3SAL-3SAL-3
└──────────────┴───────┴───────┴───────┴──────────────┘

SAL-0: Green    (Lowest assurance required)
SAL-1: Yellow   (Moderate assurance)
SAL-2: Orange   (High assurance)
SAL-3: Red      (Highest assurance required)
The formula automatically updates when Likelihood or Impact values change, enabling real-time risk re-assessment as countermeasures are added.

Views

The Security Threat Assessment Risksheet provides 5 guided workflow views:
ViewFocusUse Case
Full AnalysisAll columns visibleComprehensive threat analysis with all data
Identify ThreatsAsset + Threat groupsThreat discovery and characterization phase
Initial AssessmentAsset + Threat + Initial Assessment groupsRisk scoring and countermeasure prioritization
Security ControlsInitial SAL + Controls + ResidualCountermeasure allocation and tracking
Residual AssessmentInitial vs. Residual AssessmentRisk mitigation effectiveness verification
These views parallel the FMEA step-by-step workflow but are adapted for security context per DO-326A threat assessment methodology.

Risk Item Type

All rows in the Security Threat Assessment Risksheet are work items of type securityThreat. This work item type:
  • Carries custom fields for threat classification, SAL tracking, and countermeasure linkage
  • Supports bidirectional linking to system elements (asset ownership) and risk controls (mitigation)
  • Enables cross-risksheet traceability between threat assessment and control plan
  • Integrates with compliance and audit workflows

Document Scope

The Security Threat Assessment Risksheet is project-scoped — not element-scoped. Unlike SFMEA and DFMEA documents which are bound to specific system elements via systemElementId, the security threat analysis covers the entire system or subsystem as defined in the threat identification scope.
The exact mechanism for scoping threat analysis (whole system vs. subsystem) to specific risksheet instances depends on project configuration. Refer to your project’s Security Threat Analysis document instance to confirm the scope boundary (system vs. subsystem level).

Countermeasure Traceability

Security countermeasures are tracked via the mitigates link role, connecting:
  • Security Threat (source) ← mitigatesRisk Control (target)
Each risk control can mitigate multiple threats. The Controls group displays:
  • Which countermeasure(s) address this threat
  • Implementation status (Open → In Progress → Implemented → Verified)
  • Whether the residual risk meets SAL target after control implementation

Configuration Interaction with System Elements

The Security Threat Assessment document is configured with a systemElementId custom field (if scoped to a subsystem) or left empty (if project-scoped). The top panel uses this field to:
  • Display the threatened system element in breadcrumb navigation
  • Link to related design and functional documents for that element
  • Filter threat analysis views to the scoped system element
Confirm the scoping mechanism (element-scoped vs. project-scoped) in your Security Threat Template instance.

Integration with Compliance and Certification

Security Threat Assessment data feeds into:
  • Compliance Matrix — DO-326A threat assessment evidence and control status
  • Certification Readiness Scorecard — SAL coverage percentage, residual risk distribution
  • Risk Control Plan — Centralized view of all countermeasures across the project
  • Security Reports — STRIDE threat inventory, SAL heatmap, control effectiveness summary

Data Export and PDF

The Security Threat Assessment Risksheet supports:
  • PDF Export — Professional risk report with all columns, threat descriptions, and control assignments
  • Excel Export — Threat inventory for external review and stakeholder communication
  • API Access — Programmatic access to threat and control data via Polarion SOAP API

Security Threat Assessment is a mandatory activity for DO-326A (Airborne Cyber Security). Ensure all credible threats are identified and assessed, and that residual SAL levels meet certification requirements per your project’s DO-326A compliance plan.
Code: modules/RiskTemplates/SecurityThreatTemplate/attachments/risksheet.json (0.74) · modules/Risks/COMPLIANCE-001/module.xml, modules/Risks/MIL-STD-882E-HTS-001/module.xml, modules/Risks/SEC-THREAT-001/module.xml, modules/Risks/SFMEA-SUB-001/module.xml, modules/Risks/SFMEA-SUB-002/module.xml, modules/Risks/SFMEA-SUB-003/module.xml (0.70) · modules/RiskTemplates/RiskControlPlanTemplate/attachments/risksheet.json (0.68) · modules/RiskTemplates/PSSATemplate/attachments/risksheet.json (0.63) · modules/RiskTemplates/SSATemplate/attachments/risksheet.json (0.62) · modules/RiskTemplates/CCATemplate/attachments/risksheet.json (0.61) · datasets/sol-aero-ui-walkthrough/summary.md, navigation.md, dashboards/home-dashboard.md, dashboards/role-dashboards.md, dashboards/standards-compliance.md, risksheet-views/risksheet-views.md, work-item-types/data-model.md (0.59) · modules/RiskTemplates/FHATemplate/attachments/risksheet.json (0.58) · modules/RiskTemplates/DFMEATemplate/attachments/risksheetTopPanel.vm, SubSystem-FMEATemplate/attachments/risksheetTopPanel.vm, System-FMEATemplate/attachments/risksheetTopPanel.vm, PFMEATemplate/attachments/risksheetTopPanel.vm, HazardTrackingTemplate/attachments/risksheetTopPanel.vm, DFMEATemplate/attachments/risksheetPdfExport.vm, SubSystem-FMEATemplate/attachments/risksheetPdfExport.vm, System-FMEATemplate/attachments/risksheetPdfExport.vm, PFMEATemplate/attachments/risksheetPdfExport.vm (0.57) · modules/RiskTemplates/DFMEATemplate/attachments/risksheet.json (0.56)