What You Will Achieve
By the end of this tutorial you will have:- Identified threats with stakeholders, CIAx properties, damage and threat scenarios
- Scored attack feasibility using 5 factors (TIME, EXP, KNOW, WOO, EQP)
- Assessed risk verdicts using the Impact x Feasibility matrix
- Defined risk treatment with cybersecurity goals and risk controls
- Linked cybersecurity requirements and verification test cases
Prerequisites
| Requirement | Details |
|---|---|
| TARA module | Created per Create Your First TARA Module |
| TARA records | At least 2-3 records with stakeholders and damage scenarios |
| Catalogs | Populated Threat Scenario and Stakeholder catalogs |
Step 1: Identify Threats
Switch to view: “1. Identify Threats” This view shows the threat identification columns:stakeholder, ciaxProperty, damageScenario, threatScenario, and threatPath.
For each TARA record:
- Stakeholder — Select the affected party from the Stakeholder Catalog dropdown (e.g., Vehicle Occupants, Road Users).
- CIAx Property — Choose the security property under threat:
confidentiality,integrity,availability,authenticity,authorization, ornonRepudiation. - Damage Scenario — Describe the harm that results from the threat being realized.
- Threat Scenario — Select a named scenario from the Threat Scenario Catalog dropdown.
- Threat Path — Describe the concrete attack vector or entry point.
Step 1 implements Clause 15.5 (Threat Scenario Identification) and Clause 15.4 (Damage Scenario Identification). Each record captures a unique combination of stakeholder, security property, and attack vector.
Step 2: Assess Feasibility
Switch to view: “2. Assess Feasibility” This view adds the 5 attack potential factors alongside the threat columns. For each TARA record, score the following factors:| Factor | Column | Options |
|---|---|---|
| Elapsed Time | attackTime | <= 1 day (0), <= 1 week (1), <= 1 month (4), <= 6 months (17), > 6 months (19) |
| Specialist Expertise | attackExpertise | Layman (0), Proficient (3), Expert (6), Multiple Experts (8) |
| Knowledge of Item | attackKnowledge | Public (0), Restricted (3), Confidential (7), Strictly Confidential (11) |
| Window of Opportunity | attackWoo | Unlimited (0), Easy (1), Moderate (4), Difficult (10) |
| Equipment | attackEquipment | Standard (0), Specialized (4), Bespoke (7), Multiple Bespoke (9) |
taraFeasibility column auto-computes via the feasibilityFormula:
- Sum of all 5 scores determines the aggregate feasibility level
- Sum <= 13: High (easy to attack)
- Sum 14-19: Medium
- Sum 20-24: Low
- Sum >= 25: Very Low (hard to attack)
Step 3: Risk Assessment
Switch to view: “3. Risk Assessment” This view showstaraImpact, taraFeasibility, and taraVerdict.
For each TARA record:
-
Select an Impact level in the
taraImpactcolumn:- Severe — Life-threatening injuries; severe regulatory violation
- Major — Severe injuries; significant consequences
- Moderate — Light injuries; moderate consequences
- Negligible — No injuries; negligible consequences
- The Verdict auto-computes from the risk matrix:
| Impact | Very Low | Low | Medium | High |
|---|---|---|---|---|
| Severe | 3 | 4 | 5 | 5 |
| Major | 2 | 3 | 4 | 5 |
| Moderate | 1 | 2 | 3 | 4 |
| Negligible | 1 | 1 | 1 | 1 |
Step 4: Risk Treatment
Switch to view: “4. Risk Treatment” This view adds treatment columns:treatmentChoice, treatmentStatus, cybersecurityGoal, goalCal, taraClaims, task (Risk Control), and taskTitle.
For each TARA record with verdict >= 3:
-
Select a Treatment Choice:
- Reducing — Apply controls to lower the risk
- Avoiding — Eliminate the threat source or vulnerability
- Sharing — Transfer risk to another party
- Retaining — Accept the risk with documented justification
-
Based on the treatment choice:
For Reducing or Avoiding:
- Link a Cybersecurity Goal using the dropdown picker (creates a
hasCybersecurityGoallink) - The CAL column auto-populates from the goal’s
calfield. ThecalDecoratorvalidates that the CAL meets the minimum for the verdict level (e.g., Verdict 5 requires CAL 4) - Add Risk Controls: create or link
riskControlwork items using the task column (creates amitigateslink)
- Document a Cybersecurity Claim in the
taraClaimscolumn justifying the decision
- Link a Cybersecurity Goal using the dropdown picker (creates a
-
Set the Treatment Status:
planned,ongoing, orcompleted.
The Risksheet highlights missing fields with orange outlines. If you select Reducing/Avoiding but leave the cybersecurity goal empty, the
goalHighlight decorator shows “Goal required.” Similarly, Retaining/Sharing without a claim triggers the claimHighlight decorator.Step 5: Requirements and Verification
Switch to view: “5. Req & Verification” This view shows the downstream traceability:cybersecurityGoal, goalCal, task (Risk Control), taskTitle, requirements, and verification.
- For each cybersecurity goal, create cybersecurity requirements (
sysReqtype withclassification=cybersecurity) that derive from the goal using thederivesRequirementlink role. - For each risk control, create requirements that implement the control using the
implementslink role. - Link test cases (
testCasetype) to requirements using theverifieslink role.
requirements and verification columns use server-side rendering to traverse these link chains automatically:
- Requirements column: shows all
sysReqitems linked from the risk control viaimplements - Verification column: shows all
testCaseitems linked from requirements viaverifies
The TARA solution implements two traceability tracks that converge at requirements and test cases. See Traceability Chain for the full architecture.
Verification
After completing all 5 steps, verify your work:- TARA Report — Navigate to the TARA Report dashboard. Confirm your module appears in the structure tree with correct verdict distribution.
- Cybersecurity Case — Check that cybersecurity goals and requirements appear in the assurance argument dashboard.
- Overview — Switch to the Overview view in your Risksheet. All records should have verdicts, treatment choices, and linked goals or claims.
Next Steps
- Identify Threats and Damage Scenarios — Detailed guidance on threat identification.
- ISO/SAE 21434 Clause Coverage — Understand which clauses are addressed by each step.
- Review and Approve a TARA Document — Submit your completed TARA for review.