Skip to main content

Prerequisites

  • Risk treatment has been defined for TARA records (treatment choice selected, goals or claims linked)
  • Risk controls exist and are linked to TARA records via the mitigates link role
  • Cybersecurity requirements (sysReq with classification = cybersecurity) exist in the project
  • Test cases (testCase) exist and are linked to requirements via the verifies link role

Steps

1. Open the Req & Verification View

Switch to the 5. Req & Verification view in your TARA Risksheet. This view displays the downstream traceability columns:
ColumnTypeContent
stakeholderitemLinkAffected stakeholder
damageScenariotextDamage description
threatScenarioitemLinkLinked threat
cybersecurityGoalitemLinkLinked goal
goalCalenumCAL level of linked goal
tasktaskLinkRisk control ID
taskTitletextRisk control title
requirementsserverRenderRequirements linked to the control
verificationserverRenderTest cases linked to the requirements

2. Understand the Traceability Chain

The Requirements and Verification columns use Velocity server-side rendering to traverse Polarion link chains automatically. You do not enter data in these columns directly — they reflect links created elsewhere in the project. diagram Goal Track (top row): TARA Record -> Cybersecurity Goal -> Requirement (derivesRequirement) -> Test Case (verifies) Control Track (bottom row): TARA Record <- Risk Control (mitigates) -> Requirement (implements) -> Test Case (verifies)

3. Create Cybersecurity Requirements

Outside the Risksheet, create sysReq work items for each cybersecurity requirement:
  1. Set the classification field to cybersecurity to mark it as a cybersecurity requirement
  2. Link it to the cybersecurity goal using the derivesRequirement link role
  3. Alternatively, link it to a risk control using the implements link role
Requirements with classification = cybersecurity appear in the Cybersecurity Case dashboard’s traceability table, providing compliance evidence for ISO/SAE 21434 Clause 10.
Create testCase work items and link them to requirements:
  1. On each test case, create a verifies link pointing to the cybersecurity requirement
  2. The test case provides verification evidence that the requirement is satisfied

5. Review Traceability in the Risksheet

Return to the 5. Req & Verification view. The columns now display:
  • Requirements column: shows all sysReq and desReq items that link back to the risk control (via implements or back-link traversal)
  • Verification column: shows all testCase items that link back to those requirements (via verifies)
The Requirements and Verification columns use server-side Velocity rendering (serverRender) to traverse back-links. Changes to links may not appear immediately — reload the Risksheet if the columns appear stale.

6. Verify Completeness

Check each row in the Req & Verification view:
  • Every Reducing-treated record should show at least one risk control in the task column
  • Every risk control should have at least one linked requirement in the Requirements column
  • Every requirement should have at least one test case in the Verification column
Gaps in any column indicate missing traceability that should be addressed before the TARA document can be approved.
Use the Cybersecurity Case dashboard for a project-wide view of requirements traceability and verification coverage across all TARA modules.

See Also