Skip to main content

Prerequisites

  • Threat identification is complete: all TARA records have stakeholder, CIAx property, damage scenario, threat scenario, and threat path populated (see Identify Threats)

Steps

1. Switch to the “2. Assess Feasibility” view

Select 2. Assess Feasibility from the view dropdown. This view exposes the five attack factor columns alongside the computed feasibility result:
ColumnField IDDescription
TIMEattackTimeElapsed time to complete the attack
EXPattackExpertiseSpecialist expertise required
KNOWattackKnowledgeKnowledge of the target system required
WOOattackWooWindow of opportunity (access constraints)
EQPattackEquipmentEquipment or tooling required
FeasibilitytaraFeasibilityAuto-computed from the five factors

2. Score each factor for the first TARA record

Click each factor cell and select a value from the dropdown. The available values and their numeric weights are: TIME (attackTime):
ValueScore
Less than or equal to 1 day0
Less than or equal to 1 week1
Less than or equal to 1 month4
Less than or equal to 6 months17
Greater than 6 months19
EXP (attackExpertise):
ValueScore
Layman0
Proficient3
Expert6
Multiple Experts8
KNOW (attackKnowledge):
ValueScore
Public0
Restricted3
Confidential7
Strictly Confidential11
WOO (attackWoo):
ValueScore
Unlimited0
Easy1
Moderate4
Difficult10
EQP (attackEquipment):
ValueScore
Standard0
Specialized4
Bespoke7
Multiple Bespoke9

3. Review the computed Feasibility

Once all five factors are set, the feasibilityFormula automatically computes the aggregate score and classifies it:
Sum RangeFeasibility LevelColor
0 — 13High (easy to attack)Red
14 — 19MediumAmber
20 — 24LowGreen
25+Very Low (hard to attack)Green
The feasibilityDecorator applies color coding to the Feasibility cell for immediate visual feedback.
The formula returns null if any factor is empty. The Feasibility column remains blank until all five inputs are provided. Do not skip factors — each one contributes to the ISO-aligned scoring.

4. Repeat for all TARA records

Score each row individually. Consider the specific threat path when rating factors — the same threat scenario may have different feasibility scores depending on the attack vector.
TARA records with the same threat scenario often share similar feasibility profiles. Use the Risksheet’s collapse/expand at the Threat Scenario level to review groups of related records, then score individual threat paths within each group.

5. Review the overall distribution

Collapse the Risksheet to the Stakeholder or Damage Scenario level to see a summary view. The rowHeaderVerdict decorator colors row headers based on the eventual verdict, giving a quick visual scan even before impact is assessed. Check for outliers:
  • All High feasibility: Double-check if scores are too conservative. Not every attack is trivially easy.
  • All Very Low feasibility: Verify that you are not overestimating attacker barriers. Remote attacks on connected systems often have lower time and equipment requirements than expected.

Verification

  • All TARA records have all five attack factors populated (no blank Feasibility cells)
  • The computed feasibility levels reflect realistic attacker capability assessments
  • High-feasibility records (red) have been reviewed for accuracy

Next Step

Proceed to Assess Risk Verdict using the “3. Risk Assessment” view, where you will set the impact level and the verdict will be auto-computed from the impact-feasibility matrix.

See Also