Skip to main content
Understanding this chain is essential because ISO 14971 and IEC 62304 auditors trace individual requirements through design, risk analysis, and testing to confirm that each risk control is implemented, verified, and validated.

The V-Shape

The V-Model has two sides. The left side decomposes what the device must do. The right side proves that each level was built correctly. diagram

Left Side — Requirements Decomposition

The left side of the V defines a three-level requirements hierarchy. Each level adds specificity.
LevelWork Item TypeCountScoping
TopUser Need (userNeed)30Scoped to Requirements/UserNeedSpecification document
MiddleSystem Requirement (sysReq)153Scoped by document type systemRequirementsSpecification
BottomDesign Requirement (desReq)157Scoped by document type designRequirementsSpecification + subsystem constraint
The refines link role connects each level. System requirements refine user needs. Design requirements refine system requirements. Both use many-to-many cardinality, so a single user need can be refined by multiple system requirements, and a design requirement can trace to multiple system requirements.
Design requirements are constrained to the same subsystem as the system requirement they refine. The RTM model uses a $context.source.document.subsystem constraint so the picker only shows design requirements from the matching subsystem document.

Right Side — Verification and Validation

The right side proves that each requirement level was satisfied. Two distinct link roles enforce the ISO 14971 V&V distinction:
  • validates — Test cases validate user needs (confirming the device meets stakeholder expectations)
  • verifies — Test cases verify system and design requirements (confirming the implementation matches the specification)
Test LevelLink RoleTargetTest Cases
User Need ValidationvalidatesUser Need19
System VerificationverifiesSystem Requirement82
Design VerificationverifiesDesign Requirement47
The distinction between validates and verifies is not cosmetic. ISO 14971 treats validation (does the device meet the user’s actual need?) and verification (does the implementation match the spec?) as fundamentally different activities.

Parallel Traceability Paths

Beyond the primary requirements chain, two parallel paths support use analysis and process analysis:
PathFromLink RoleTo
Use analysisUse Step (useStep)addressUser Need
Process analysisProcess Step (processStep)associatesSystem Element
Use steps represent operational scenarios — how a user interacts with the device. Each use step addresses one or more user needs, and HARA risk records assess use steps to identify where hazardous situations arise. Process steps represent manufacturing activities. They associate with the system elements they produce or modify, enabling process FMEA analysis.

Risk Analysis Overlay

Risk analysis connects to the traceability chain at multiple points:
  1. Risk records assess use steps and link to hazards and harms
  2. Risk controls mitigate risk records (and failure modes)
  3. Requirements implement risk controls — system and design requirements carry the implements link to risk controls
This creates a closed loop: a user need generates requirements, requirements are analyzed for risk, risk controls are defined, and those controls are implemented back into requirements that are then verified by test cases.
All traceability relationships are stored as native Polarion linkedWorkItems. No custom fields or external databases are used. This means standard Polarion traceability reports, impact analysis, and suspect link detection work out of the box. The RTM domain model defines 8 entity types and 8 relationships that together form the complete V-shaped graph. For the full relationship table, see Link Roles and Traceability Relationships.