Skip to main content
diagram

Key Features

FeatureDescription
5-Step TARA WorkflowISO/SAE 21434 Clause 15 threat analysis in a structured Risksheet
EVITA Feasibility Scoring5-factor attack potential rating per ISO 21434 Annex G
Risk Verdict MatrixImpact x Feasibility produces verdicts 1—5 with color-coded heat map
Dual-Track TraceabilityGoal Track and Control Track from threat through to test case verification
Shared CatalogsReusable Threat Scenario and Stakeholder catalogs across all TARA modules
Cybersecurity Case DashboardISO 21434 Clause 6.4.6 assurance argument with coverage evidence

Documentation Structure

SectionWhat You Will Find
Getting StartedInstall the solution, create your first TARA module, walk through the 5-step workflow
ConceptsISO 21434 coverage, data model, traceability chain, scoring algorithms, system element hierarchy
How-To GuidesStep-by-step procedures for TARA analysis, setup, dashboards, and approval workflows
ReferenceWork item types, enumerations, Risksheet configuration, formulas, dashboards, RTM model
FAQAnswers to common questions about TARA workflow, configuration, and ISO compliance

Quick Start

  1. Install — Deploy the TARA solution into your Polarion project. See Install the TARA Solution.
  2. Model your system — Create system elements with the systemElement type. See Create System Elements.
  3. Create a TARA — Open Risksheets, select TARATemplate, and link to a system element. See Create Your First TARA Module.
  4. Analyze threats — Walk through all 5 steps. See The 5-Step TARA Workflow.
  5. Review and approve — Use the document workflow to send for review. See Review and Approve a TARA Document.
The TARA solution uses Nextedy Risksheet as its primary analysis tool. All TARA records are edited exclusively inside the Risksheet interface — not in standard Polarion work item forms.