Skip to main content

Values

IDLabelSort OrderDescription
confidentialityConfidentiality0Information is not disclosed to unauthorized entities. Covers data exfiltration, eavesdropping, and information leakage scenarios.
integrityIntegrity1Information has not been altered by unauthorized means. Covers tampering, replay, and data manipulation threats.
availabilityAvailability2Timely and reliable access to information and functions. Covers denial-of-service and system disruption threats.
authenticityAuthenticity3Information originates from a verified source. Covers spoofing and impersonation threats targeting message or data origin verification.
authorizationAuthorization4Only authorized entities can perform actions. Covers access control bypass and privilege escalation scenarios.
nonRepudiationNon-repudiation5An action or event cannot be denied afterward. Covers threats to audit trails and forensic evidence integrity.

STRIDE Correspondence

The CIAx properties have an implicit correspondence with the STRIDE threat classification model:
CIAx PropertySTRIDE Category
authenticitySpoofing
integrityTampering
nonRepudiationRepudiation
confidentialityInformation Disclosure
availabilityDenial of Service
authorizationElevation of Privilege

Field Binding

PropertyValue
Field IDciaxProperty
Work Item TypetaraRecord
Enum IDtaraRecord-ciaxProperty
Field TypeEnum (single-select)
The ciaxProperty field is defined as a custom field on the TARA Record work item type. It appears in the Risksheet as a Level 2 hierarchy column, grouping TARA Records by the threatened security property under each stakeholder.

Risksheet Usage

In the Risksheet Configuration, the ciaxProperty column serves as:
  • Level 2 control column in the 5-level row hierarchy (Stakeholder > CIAx Property > Damage Scenario > Threat Scenario > Threat Path)
  • Sort dimension in the default sortBy configuration, ordering rows by security property within each stakeholder group
  • Visible column in the following views:
    • 1. Identify Threats
    • 2. Assess Feasibility
    • 3. Risk Assessment
    • 4. Risk Treatment

Configuration Notes

  • The enumeration name uses the ciaxProperty suffix, where “x” denotes the extended properties beyond the standard CIA triad (Authenticity, Authorization, Non-repudiation).
  • Sort order places the three core CIA properties first (0-2), followed by the three extensions (3-5). This ordering affects display sequence in Polarion form dropdowns and Risksheet column pickers.
  • In automotive cybersecurity per ISO/SAE 21434, availability threats often carry direct safety implications and may elevate impact scores. Integrity violations on safety-critical systems may similarly trigger higher risk verdicts.
  • The field appears in the auto-generated description formula output as part of the structured risk record summary.