Skip to main content

Prerequisites

  • System elements are defined in the SYSTEM-ELEMENTS document (see Create System Elements)
  • You know the work item ID of the target system element (e.g., TR-20527)

Steps

1. Open the Risksheet Navigation

Navigate to the Risksheets section in the Polarion sidebar. This shows all existing TARA modules and provides the option to create new ones.

2. Create a New Module from Template

  1. Click CREATE in the Risksheet navigation panel
  2. Select TARATemplate from the template list
  3. Enter a name for the new module following the naming convention: TARA-<SystemElementName> (e.g., TARA-Sensor-Fusion-ECU)
  4. The module is created in the Risks/ space with the full Risksheet configuration from the template
The TARATemplate provides:
  • All 22 columns across 7 views
  • 3 formulas (feasibility, verdict, description)
  • 8 cell decorators for visual risk coding
  • 5-level row hierarchy
  • Pre-configured sort order and column group styling

3. Set the System Element Custom Field

This is the most important configuration step. Link the TARA module to its target system element:
  1. Open Document Properties on the newly created module
  2. Find the System Element (systemElementId) field
  3. Enter the work item ID of the target system element (e.g., TR-20527 for Sensor Fusion ECU)
If the systemElementId field is not set, the Risksheet top panel displays a warning banner: “Configuration Required: The System Element custom field is not set.” The TARA module will not appear in the System Element Navigator on the Home or Risks Home dashboards until this field is configured.

4. Fill in Document Metadata

Set the additional riskSpecification document custom fields:
FieldPurposeExample
cybersecurityContextScope and threat environment”Data fusion from forward camera, front radar, ultrasonic sensors; AUTOSAR Adaptive platform”
assumptionsAnalysis boundary assumptions”Secure boot implemented; network isolation by gateway”
redAssetsAssets requiring protection”Sensor fusion algorithms, calibration data, CAN communication”
The cybersecurityContext and assumptions fields appear in the Risksheet top panel, providing analysts with the analysis scope at a glance. Fill these in before starting threat identification.

5. Add TARA Record Rows

The template comes with heading rows only. To add TARA records:
  1. Click the add-row button in the Risksheet
  2. Each new row creates a taraRecord work item in the module
  3. Begin populating fields in the 1. Identify Threats view

6. Verify the Module

Check that the new TARA module appears correctly:
  1. Navigate to the Home dashboard — the System Element Navigator should now show a link to the new TARA module next to the target system element
  2. Navigate to the Risks Home dashboard — the module should appear with its current document status (Draft)
  3. Open the TARA module — the top panel should display the system element breadcrumb and metadata
diagram

What Happens Next

With the TARA module created and linked, proceed to the 5-step workflow:
  1. Identify Threats and Damage Scenarios
  2. Score Attack Feasibility
  3. Assess Risk Verdict
  4. Define Risk Treatment
  5. Link Requirements and Verification

See Also