Loading...
Polarion Template

Cybersecurity TARA Template for Automotive

TARA

Threat Analysis and Risk Assessment

ISO/SAE 21434 is an international standard that establishes new regulations to replace existing vehicle life cycle standards as both electronic control of vehicles and external access routes to vehicles increase. As a part of this, TARA (Threat Analysis and Risk Assessment) is a methodology that quantitatively analyzes vehicle cybersecurity threats and helps users set appropriate response measures.

The "Cybersecurity TARA Template for Automotive Polarion" project template developed by Branvi Inc. based on ISO/SAE 21434 and TARA methodology allows users to identify assets, classify threats to assets, and select appropriate actions according to risk level.

ISO/SAE 21434
TARA
Polarion Template

Project Home

You can check the progress of the TARA methodology at a glance and quickly access to each step.

Project Home
TARA Process

Progress from Step 1 to Step 13

Step 1

Item Definition

Define the items for which you want to analyze security threats and the logical, physical, and electronic configurations connected to them.

Step 1
Item Definition
Step 2

Candidate Asset

Identify assets based on the configurations created in the previous step and determine whether the identified assets can become threats.

Step 2
Candidate Asset
Step 3

Asset Identification

Check the asset information and compare it with the appropriate type in the global project, directly identify Cybersecurity Properties that may be damaged, or create a damage scenario to analyze the asset.

Step 3
Asset Identification
Step 4

Impact Rating

Determine the impact by each sector through the identified Cybersecurity Properties and Damage Scenarios and measure the final aggregated Impact Rating.

Step 4
Impact Rating
Step 5

Threat Scenario

Based on the compromised Cybersecurity Properties, predict which attack methods can threaten the asset and create a threat scenario.

Step 5
Threat Scenario
Step 6-1 & 6-2

Attack Path Library & Attack Path Analysis

Create an attack path and feasibility to the asset, and analyze the attack path that can respond to the threat method.

Step 6-1 & 6-2
Attack Path Library & Attack Path Analysis
Step 7

Attack Feasibility Rating

Calibrate predefined feasibility information through threat analysis and attack path information.

Step 7
Attack Feasibility Rating
Step 8 & 9

Risk Value & Risk Treatment Decision

Using the predefined standard Risk Matrix based on the previously assessed impacts and feasibilities, the TARA Template guides users to automatically classify the risk levels and choose how to respond.

Step 8 & 9
Risk Value & Risk Treatment Decision
Step 10-1 & 10-2

CS Goals & CS Claims Library, CS Goals & CS Claims Analysis

Create Cybersecurity Goals, Cybersecurity Requirements connected to them, and a Cybersecurity Claims in advance, and connect the Cybersecurity Goals or Cybersecurity Claims according to Risk Treatments.

Step 10-1 & 10-2
CS Goals & CS Claims Library, CS Goals & CS Claims Analysis
Step 11 & 13

Verification for CS Goals & CS Claims, Verification for CS Concept

Review whether a series of processes has been successfully completed using verification criteria prepared for the cybersecurity information obtained while the users proceed with the project.

Step 11 & 13
Verification for CS Goals & CS Claims, Verification for CS Concept
Step 12

CS Concept

Check which assets are related to the defined Cybersecurity Goals and Cybersecurity Claims.

Step 12
CS Concept
Documents

Document Library

Provide libraries of related documents to help you write quickly and provide easy version control.

Documents
Document Library