Skip to main content

The 8 Work Item Types

diagram

Type Summary

Type IDLabelPurposeCustom Fields
taraRecordTARA RecordCentral risk assessment record — one per threat path15 fields (CIAx, damage, feasibility factors, impact, verdict, treatment)
cybersecurityGoalCybersecurity GoalHigh-level protection objective per ISO 21434 Clause 15cal, goalCiaxProperty, goalAsset, goalRationale
systemElementSystem ElementComponent in the vehicle architecture hierarchyelementType (system/subsystem/assembly/subassembly/component)
threatScenarioThreat ScenarioNamed threat grouping attack paths (catalog item)Standard fields only
stakeholderStakeholderEntity affected by cybersecurity threats (catalog item)Standard fields only
riskControlRisk ControlCountermeasure that mitigates a TARA recordriskControlType (Inherent Safety Design, Protective Measure, Information for Safety)
sysReqRequirementCybersecurity or system requirementclassification (cybersecurity, SC, CC)
testCaseTest CaseVerification test case for a requirementStandard fields only

TARA Record: The Central Hub

The taraRecord type is the most field-rich type in the solution. Each record represents a unique combination of stakeholder, security property, damage scenario, threat scenario, and attack path.

Custom Fields (15)

Field IDNameTypeEdited In
ciaxPropertyCIAx Propertyenum:taraRecord-ciaxPropertyRisksheet
damageScenarioDamage Scenariotext/plainRisksheet
threatPathThreat Pathtext/plainRisksheet
attackTimeElapsed Timeenum:taraRecord-attackTimeRisksheet
attackExpertiseSpecialist Expertiseenum:taraRecord-attackExpertiseRisksheet
attackKnowledgeKnowledge of Itemenum:taraRecord-attackKnowledgeRisksheet
attackWooWindow of Opportunityenum:taraRecord-attackWooRisksheet
attackEquipmentEquipmentenum:taraRecord-attackEquipmentRisksheet
taraImpactImpactenum:taraRecord-taraImpactRisksheet
taraFeasibilityAttack Feasibilityenum:taraRecord-taraFeasibilityComputed (formula)
taraVerdictRisk VerdictintegerComputed (formula)
treatmentChoiceTreatment Choiceenum:taraRecord-treatmentChoiceRisksheet
treatmentStatusTreatment Statusenum:taraRecord-treatmentStatusRisksheet
taraClaimsClaimstext/plainRisksheet
taraControlsControlstext/plain(reserved)
All TARA record custom fields are marked read-only in the Polarion form layout. Editing is exclusively performed through the Risksheet interface. This ensures the structured 5-step workflow is followed.

TARA-Specific Roles (5)

Role IDForward NameReverse NameDirection
hasStakeholderhas Stakeholderis Stakeholder intaraRecord —> stakeholder
hasThreatScenariohas Threat Scenariois Threat Scenario intaraRecord —> threatScenario
hasCybersecurityGoalhas Cybersecurity Goalis Cybersecurity Goal intaraRecord —> cybersecurityGoal
mitigatesMitigatesis Mitigated byriskControl —> taraRecord
derivesRequirementderives from Goalderives RequirementsysReq —> cybersecurityGoal

Standard Roles Used in TARA Traceability

Role IDDirectionPurpose in TARA
implementssysReq —> riskControlRequirement implements a risk control
verifiestestCase —> sysReqTest case verifies a requirement
parentsameType hierarchicalSystem element hierarchy
allocatedTosysReq —> systemElementRequirement allocated to component

Cybersecurity Goal

The cybersecurityGoal type represents the high-level protection objective derived from risk assessment. Key fields:
  • cal (Cybersecurity Assurance Level): CAL 1 through CAL 4. Higher CAL means stricter verification requirements. The calDecorator in the Risksheet validates that the CAL meets the minimum for the verdict level (Verdict 5 requires CAL 4, Verdict 4 requires CAL 3).
  • goalCiaxProperty: The CIAx security property this goal protects (uses the same enum as taraRecord.ciaxProperty).
  • goalRationale: Rich-text rationale explaining the goal.

System Element

The systemElement type models the vehicle architecture hierarchy. The elementType custom field uses the systemElementType enum:
LevelType ID
Topsystem
L1subsystem
L2assembly
L3subassembly
L4component
System elements are organized using the parent link role. Each TARA module is linked to a system element through the systemElementId document custom field. The System Element Navigator on dashboards traverses this hierarchy to display which elements have TARAs.

Risk Control

The riskControl type represents countermeasures. Its riskControlType field classifies controls into:
TypeDescription
Inherent Safety DesignDesigned-in protection that eliminates or reduces the threat
Protective MeasureActive countermeasure (e.g., firewall, encryption, IDS)
Information for SafetyLabeling, warnings, or operational procedures
Risk controls link to TARA records via the mitigates role and to requirements via the implements role.

RTM Domain Model

The RTM YAML (.polarion/nextedy/models/rtm.yaml) defines a minimal model with 5 entity types and no relationships:
Document, Chapter, SystemElement, Requirement, TestCase
The TARA-specific types (taraRecord, threatScenario, stakeholder, riskControl, cybersecurityGoal) are implemented entirely through native Polarion configuration. All traceability is enforced via link role type constraints in the workitem-link-role-enum.xml, not through the RTM model.