Why Dual-Track Traceability?
ISO/SAE 21434 requires two complementary perspectives on cybersecurity treatment:- What to protect — Cybersecurity goals define the protection objectives. Requirements derive from goals, and test cases verify the requirements.
- How to protect — Risk controls define the countermeasures. Requirements implement controls, and test cases verify the implementation.
The Two Tracks
Goal Track
The Goal Track answers “What must be protected and to what level?”| Link | From | To | Purpose |
|---|---|---|---|
hasCybersecurityGoal | taraRecord | cybersecurityGoal | Connects risk to its protection objective |
derivesRequirement | sysReq | cybersecurityGoal | Requirement derives from the goal |
verifies | testCase | sysReq | Test case provides verification evidence |
Control Track
The Control Track answers “How is the protection implemented?”| Link | From | To | Purpose |
|---|---|---|---|
mitigates | riskControl | taraRecord | Control addresses the identified risk |
implements | sysReq | riskControl | Requirement specifies the control |
verifies | testCase | sysReq | Test case verifies the implementation |
Convergence at Requirements
The two tracks converge at thesysReq (Requirement) level. A single requirement can:
- Derive from a cybersecurity goal via
derivesRequirement(Goal Track) - Implement a risk control via
implements(Control Track) - Be verified by a test case via
verifies(both tracks)
Treatment Choice Determines the Track
ThetreatmentChoice field on the TARA record determines which track applies:
| Treatment | Primary Track | Required Links |
|---|---|---|
| Reducing | Both tracks | Cybersecurity Goal + Risk Control + Requirements + Tests |
| Avoiding | Goal Track | Cybersecurity Goal + Requirements + Tests |
| Sharing | Documentation | Cybersecurity Claim (text justification) |
| Retaining | Documentation | Cybersecurity Claim (text justification) |
How the Risksheet Traverses the Chain
The “5. Req & Verification” view in the Risksheet displays the full chain:- Cybersecurity Goal and CAL columns show the Goal Track origin.
- Control ID and Control columns show the Control Track origin.
- Requirements column uses server-side Velocity rendering to traverse
implementsback-links from the risk control, finding allsysReqitems. - Verification column traverses
verifiesback-links from those requirements, finding alltestCaseitems.
Traceability in Dashboards
TARA Summary Report
The TARA Report dashboard does not directly display the traceability chain but uses verdict data from the Goal Track to compute verdict distribution across the system hierarchy.Cybersecurity Case Dashboard
The Cybersecurity Case dashboard explicitly displays both tracks:- Cybersecurity Goals Summary: Lists all goals with CAL badges and status (Goal Track origin).
- Cybersecurity Requirements Traceability: Lists requirements filtered by
classification.KEY:cybersecuritywith status (convergence point). - Residual Risk Summary: Lists TARA records with verdict >= 4 and their treatment details (triggers for both tracks).
Example: Complete Chain
Consider a TARA record for “Spoofed sensor data on the Sensor Fusion ECU”:- TARA Record: Identified with stakeholder “Vehicle Occupants”, CIAx =
integrity, verdict = 4. - Treatment: Reducing.
- Cybersecurity Goal: “Ensure integrity of sensor fusion input data” (CAL 3).
- Risk Control: “Implement authenticated sensor data protocol” (Protective Measure).
- Requirement: “SR-101: Sensor data shall be authenticated using CMAC with AES-128” (classification = cybersecurity, derives from goal, implements control).
- Test Case: “TC-201: Verify CMAC authentication rejects tampered sensor frames” (verifies requirement).
Related
- Data Model and Work Item Types — All 8 types and their fields.
- Link Roles and Traceability Relationships — Full reference of all 17 link roles.
- The 5-Step TARA Workflow — Walk through the chain in practice.
- Cybersecurity Case and Assurance Argument — How the chain appears in the assurance dashboard.