Skip to main content
Source: .polarion/tracker/fields/workitem-link-role-enum.xml These 5 link roles are unique to the TARA cybersecurity solution and implement the dual-track traceability model.
Role IDForward LabelReverse LabelFrom TypeTo TypeDescription
hasThreatScenariohas Threat Scenariois Threat Scenario intaraRecordthreatScenarioLinks a TARA record to its threat scenario from the shared catalog. Risksheet Level 4 hierarchy column.
hasStakeholderhas Stakeholderis Stakeholder intaraRecordstakeholderLinks a TARA record to the affected stakeholder from the shared catalog. Risksheet Level 1 hierarchy column.
hasCybersecurityGoalhas Cybersecurity Goalis Cybersecurity Goal intaraRecordcybersecurityGoalLinks a TARA record to its derived cybersecurity goal. Required when treatment choice is Reducing or Avoiding.
derivesRequirementderives from Goalderives RequirementsysReqcybersecurityGoalLinks a cybersecurity requirement to the goal it was derived from. Completes the Goal Track traceability chain.
mitigatesMitigatesis Mitigated byriskControltaraRecordLinks a risk control to the TARA record it addresses. Primary Risksheet task link role.

Dual-Track Traceability Diagram

                         GOAL TRACK
                         ---------
TARA Record --hasCybersecurityGoal--> Cybersecurity Goal
                                             ^
                                             | derivesRequirement
                                             |
                                      Requirement (sysReq)
                                             ^
                                             | verifies
                                             |
                                        Test Case


                        CONTROL TRACK
                        -------------
TARA Record <--mitigates-- Risk Control
                                 ^
                                 | implements
                                 |
                          Requirement (sysReq)
                                 ^
                                 | verifies
                                 |
                            Test Case
Both tracks converge on Requirements and Test Cases, providing complete bidirectional traceability from threat through verification evidence. These 12 link roles are standard Polarion or Nextedy roles used across the solution.

Requirements and Design

Role IDForward LabelReverse LabelFrom TypeTo TypeDescription
refinesRefinesis Refined bysysReqsysReqRequirements decomposition within the same type. Used for hierarchical requirement breakdown.
implementsImplementsis Implemented bytask, sysReqsysReq, riskControlImplementation traceability. Two rules: task -> sysReq/riskControl and sysReq -> riskControl.
allocatedTois Allocated tohas Allocatedfunction, processStepsystemElementFunctional allocation to system elements in architecture analysis.

Verification and Validation

Role IDForward LabelReverse LabelFrom TypeTo TypeDescription
verifiesVerifiesis Verified bytestCasesysReqFormal verification link. Test cases verify requirements. Used in RTM coverage dashboards via nxLinkCoverage macro.
validatesValidatesis Validated by(unrestricted)(unrestricted)Validation under real-world conditions. No type constraints, allowing flexible cross-type usage.

Defect and Change Management

Role IDForward LabelReverse LabelFrom TypeTo TypeDescription
detectedByis Detected byDetectsdefecttestCaseRecords which test case discovered a defect. Supports test effectiveness metrics.
tracksTracksis Tracked bychangeRequestsysReq, task, defectChange impact analysis. Broad target types allow full scope tracking.
followsUpFollows upis Followed up bytaskdefect, task, changeRequestFollow-up action chains. task -> task rule enables sequential remediation workflows.

Hierarchy and Lineage

Role IDForward LabelReverse LabelConstraintDescription
parenthas parentis parent ofsameType=trueHierarchical parent-child within the same type. Used for system element trees, requirement hierarchies.
branched_fromis Branched fromhas Branch(unrestricted)Variant management. Work item branched from another for project reuse.
derived_fromis Derived fromhas Derived(unrestricted)Lineage tracking across project variants or standards.
addressAddressis Addressed by(unrestricted)Use case coverage. Links use steps to user needs.

Risksheet Column Bindings

The following link roles are directly consumed by Risksheet itemLink and taskLink columns:
Risksheet ColumnLink RoleColumn TypeQuery Factory
stakeholderhasStakeholderitemLinkstakeholderQuery (type:stakeholder)
threatScenariohasThreatScenarioitemLinkthreatScenarioQuery (type:threatScenario)
cybersecurityGoalhasCybersecurityGoalitemLinkcybersecurityGoalQuery (type:cybersecurityGoal)
task (Control ID)mitigatestaskLink— (configured as task type in global settings)

Lucene Query Patterns

Link roles can be queried using the linkedWorkItems.role Lucene field:
linkedWorkItems.role:mitigates
linkedWorkItems.role:hasThreatScenario
linkedWorkItems.role:hasCybersecurityGoal
linkedWorkItems.role:derivesRequirement
linkedWorkItems.role:verifies
linkedWorkItems.role:implements
linkedWorkItems.role:allocatedTo
Role IDConstrained TypesBidirectional
hasThreatScenariotaraRecord -> threatScenarioNo
hasStakeholdertaraRecord -> stakeholderNo
hasCybersecurityGoaltaraRecord -> cybersecurityGoalNo
derivesRequirementsysReq -> cybersecurityGoalNo
mitigatesriskControl -> taraRecordNo
refinessysReq -> sysReqNo
implementstask/sysReq -> sysReq/riskControlNo
allocatedTofunction/processStep -> systemElementNo
verifiestestCase -> sysReqNo
validates(unrestricted)No
detectedBydefect -> testCaseNo
trackschangeRequest -> sysReq/task/defectNo
followsUptask -> defect/task/changeRequestNo
parentsame type onlyNo
branched_from(unrestricted)No
derived_from(unrestricted)No
address(unrestricted)No