Fields Overview
| Field ID | Display Name | Type | Required | Editable In |
|---|
cybersecurityContext | Cybersecurity Context | Plain text | Recommended | Draft |
assumptions | Assumptions | Plain text | Recommended | Draft |
systemElementId | System Element ID | Work item reference | Yes | Draft |
subsystem | Subsystem | Work item reference | No | Draft |
Field Definitions
cybersecurityContext
Captures the cybersecurity scope of the risk specification document. Describes the system boundaries, interfaces, and threat environment relevant to the TARA analysis.
Field ID: cybersecurityContext
Type: string (plain text)
Appears on: riskSpecification document header
Purpose: Provides contextual framing for the entire risk analysis. Every stakeholder reviewing the TARA should read this field first to understand what system, interfaces, and threat environment are being analyzed.
Example values:
| System Element | Example Context |
|---|
| ADAS Control System | ”ECU controlling brake-by-wire and lane-keeping, ISO/SAE 21434 compliant, V2X and CAN interfaces in scope” |
| Connectivity Gateway | ”Telematics gateway bridging V2X, cellular, and in-vehicle CAN networks, external interfaces in scope” |
| Sensor Fusion ECU | ”Multi-sensor fusion controller processing camera, radar, and LiDAR data for ADAS decision-making” |
assumptions
Documents the assumptions made during the risk analysis — external dependencies, environmental conditions, or operational constraints that bound the TARA conclusions.
Field ID: assumptions
Type: string (plain text)
Appears on: riskSpecification document header
Purpose: Records what was taken as given at analysis time for traceability and audit. Changes to assumptions may invalidate existing TARA conclusions and require re-analysis.
Example values:
- “Assumes secure boot is implemented on target ECU”
- “Network isolation guaranteed by gateway firewall rules”
- “Physical access to vehicle interior is unrestricted (worst case)”
- “OTA update channel uses TLS 1.3 with mutual authentication”
When assumptions change, the associated Risk Specification should be sent back to Draft via the Rework action to trigger re-analysis. All prior approval signatures are automatically invalidated.
systemElementId
Links the Risk Specification document to its target system element. This field is used by the Risks Home Dashboard and the TARA Summary Report to discover which TARA module covers which system element.
Field ID: systemElementId
Type: Work item ID reference (string)
Appears on: riskSpecification document metadata
Behavior:
- Dashboards use Lucene query
type:riskSpecification AND systemElementId:{elementId} to find the TARA for each system element
- If no document matches a system element, dashboards display a “Missing TARA” indicator (em-dash with
nx-missing CSS class)
- Only the first matching document is shown if multiple Risk Specifications reference the same element
subsystem
Optional reference to the parent subsystem for organizational context. Used by the TARA Summary Report in the Unacceptable Risk action items table.
Field ID: subsystem
Type: Work item ID reference (string)
Appears on: riskSpecification document metadata
Field Usage in Dashboards
The following diagram shows how document custom fields feed into dashboard queries:
| Dashboard | Fields Used | Query Pattern |
|---|
| Risks Home | systemElementId, status | type:riskSpecification AND systemElementId:{id} |
| TARA Summary Report | systemElementId, subsystem | type:riskSpecification AND systemElementId:{id} AND project.id:{pid} |
| Cybersecurity Case | (indirect via taraRecord module) | project.id:{pid} AND type:taraRecord |
Relationship to Other Configuration
These document fields work in conjunction with:
The riskSpecification document type uses the document_risk.png icon and is displayed as “Risk Assessment” in the Polarion UI. It is the only document type that carries TARA-specific custom fields.
Source: riskSpecification-custom-fields.xml