Skip to main content

Why This Mapping Matters

ISO/SAE 21434 defines the cybersecurity engineering lifecycle for road vehicles. Regulatory frameworks such as UNECE R155 reference it as the basis for Cyber Security Management System (CSMS) certification. Auditors need to trace each clause requirement to concrete evidence in your project. This mapping shows exactly where that evidence lives within the TARA solution.

Coverage Summary

diagram

Detailed Clause Mapping

Clause 6 — Cybersecurity Management (Full Coverage)

RequirementImplementation
Cybersecurity plan (6.4.2)CYBERSEC-PLAN document in the Risks space. Sections for activities, roles, responsibilities, methods, tools, and milestones.
Cybersecurity case / assurance argument (6.4.6)Cybersecurity Case dashboard. Aggregates cybersecurity goals with CAL badges, TARA coverage with verdict distribution, requirements traceability, and residual risk summary. Concludes with case status (OPEN or READY FOR REVIEW).
Document approvalriskSpecification document workflow: Draft > In Review > Approved > Published. Electronic signatures via project_approver role.

Clause 9 — Item Definition (Full Coverage)

RequirementImplementation
Item identificationsystemElement work item type with elementType hierarchy (system, subsystem, assembly, subassembly, component).
Interfaces and architectureSystem element hierarchy in the SYSTEM-ELEMENTS document with parent link roles.
Assets (RED Assets)redAssets document custom field on each TARA module.
Cybersecurity contextcybersecurityContext and assumptions custom fields on riskSpecification documents.

Clause 10 — Cybersecurity Goals and Concept (Full Coverage)

RequirementImplementation
Cybersecurity goalscybersecurityGoal work item type with cal (Cybersecurity Assurance Level), goalCiaxProperty, and goalRationale fields. Linked from TARA records via hasCybersecurityGoal.
Cybersecurity conceptCYBERSEC-CONCEPT document deriving requirements from goals using derivesRequirement link role.
Requirement allocationallocatedTo link role from requirements to system elements. classification = cybersecurity for filtering.

Clause 11 — Product Development (Partial Coverage)

RequirementImplementation
Design specificationssysReq work items with cybersecurity classification.
ImplementationOut of scope — code-level implementation is beyond the TARA analysis domain.
Integration testingtestCase work items linked via verifies provide test planning structure. Actual test execution management requires additional Polarion test management configuration.
Clause 11 addresses the full product development lifecycle. The TARA solution covers the requirements and verification planning portions but does not extend to implementation or detailed test execution management.

Clause 12 — Cybersecurity Verification (Full Coverage)

RequirementImplementation
Verification planningtestCase work items linked to requirements via verifies link role.
Verification evidenceverification column in the Risksheet “5. Req & Verification” view traverses the link chain from risk controls through requirements to test cases.
CAL-based verification rigorThe calDecorator validates minimum CAL against verdict level, ensuring verification rigor matches risk severity.

Clause 15 — TARA (Full Coverage)

RequirementImplementation
Asset identification (15.3)systemElement hierarchy with cybersecurity context.
Damage scenario identification (15.4)damageScenario text field per TARA record.
Threat scenario identification (15.5)threatScenario itemLink to the Threat Scenario Catalog plus threatPath text field.
Attack feasibility rating (15.6)5-factor scoring (TIME, EXP, KNOW, WOO, EQP) with feasibilityFormula. ISO 21434 Annex G thresholds.
Impact rating (15.7)taraImpact enum: severe, major, moderate, negligible.
Risk determination (15.8)verdictFormula computing verdict 1—5 from the 4x4 risk matrix.
Risk treatment decision (15.9)treatmentChoice enum: reducing, avoiding, sharing, retaining.

Annex G — Attack Feasibility Rating (Full Coverage)

The feasibilityFormula implements the attack potential-based approach from Annex G with 5 factors and ISO-aligned score weights. See Attack Feasibility Scoring (EVITA).

Clauses Out of Scope

ClauseTopicReason
Clause 5Organizational cybersecurity managementOrganizational process, not product-level analysis
Clause 7Distributed cybersecurity activitiesSupply chain management beyond TARA tool scope
Clause 8Continual cybersecurity activitiesOngoing monitoring, not captured in project-level TARA
Clause 13ProductionManufacturing cybersecurity requirements
Clause 14Operations and maintenancePost-production field activities

UNECE R155 Alignment

The TARA solution supports UNECE R155 compliance by providing auditable evidence that:
  • Threats have been systematically identified and assessed (Annex 5, Part A)
  • Risks are classified and treated (Annex 5, Part B)
  • Cybersecurity requirements are derived and verified (Annex 5, Part C)
  • The process is documented and reviewable (CSMS evidence)