Cybersecurity Threat Analysis & Risk Assessment (TARA)
Learn how to use Saphira to perform comprehensive cybersecurity threat analysis and risk assessment (TARA) for automotive systems! Saphira implements the complete ISO 21434 cybersecurity workflow, enabling automated threat identification, risk assessment, and security requirement generation.What is TARA?
TARA (Threat Analysis and Risk Assessment) is a systematic process for identifying and evaluating cybersecurity threats to automotive systems according to ISO 21434. Saphira provides an AI-powered workflow that guides you through the complete cybersecurity engineering process:- Asset Identification: Identify cybersecurity-critical assets in your system
- Threat Analysis: Discover potential threat scenarios and attack vectors
- Risk Assessment: Evaluate the impact and feasibility of identified threats
- Security Goals: Define cybersecurity goals to mitigate threats
- Security Requirements: Generate detailed technical security requirements
- Security Controls: Specify security controls and countermeasures
Getting Started with TARA
Define Item and Identify Assets
Define Item and Identify Assets
- Hardware components with cybersecurity relevance
- Software modules handling sensitive data
- Communication interfaces and protocols
- Data assets requiring protection (CIA triad: Confidentiality, Integrity, Availability)
Perform Threat Analysis
Perform Threat Analysis
- Spoofing attacks
- Tampering with data or code
- Repudiation threats
- Information disclosure
- Denial of service
- Elevation of privilege
Assess Risk Levels
Assess Risk Levels
- Impact Rating: Potential damage to safety, privacy, financial, or operational aspects
- Attack Feasibility: Required expertise, time, equipment, and opportunity
- CAL (Cybersecurity Assurance Level): Automatic calculation based on ISO 21434 risk matrix
TARA Workflow Steps
Saphira guides you through a systematic cybersecurity analysis workflow:Step 1: Item Definition
Step 1: Item Definition
- Function: Primary function of the system
- System/Item: Hardware and software components
- Interfaces: Communication channels (CAN, Ethernet, USB, wireless)
- Operating Modes: Normal operation, degraded mode, maintenance mode
- System Boundary: What’s included and excluded from analysis
- ISO 26262 (Functional Safety)
- ISO 21448 (SOTIF - Safety of the Intended Functionality)
- ISO 25119 (Agricultural Machinery)
Step 2: Cybersecurity Assets
Step 2: Cybersecurity Assets
- Hardware Assets: ECUs, sensors, actuators, communication modules
- Software Assets: Application software, firmware, bootloaders
- Data Assets: Authentication tokens, cryptographic keys, personal data
- Communication Assets: Network protocols, message formats
- Asset type and category
- Cybersecurity properties (confidentiality, integrity, availability)
- Damage scenarios if compromised
Step 3: Threat Analysis
Step 3: Threat Analysis
- Threat Agents: External attackers, insiders, automated tools
- Attack Paths: Entry points and propagation through system
- Attack Methods: Injection, reverse engineering, DoS, physical access
- Prerequisites: Required knowledge, access, and equipment
Step 4: Cybersecurity Goals
Step 4: Cybersecurity Goals
- Protect specific assets from identified threats
- Maintain confidentiality, integrity, and availability
- Ensure secure communication and data handling
- Prevent unauthorized access and control
- Target assets and threat scenarios
- Required CAL (Cybersecurity Assurance Level)
- Verification criteria
Step 5: Cybersecurity Requirements
Step 5: Cybersecurity Requirements
- Authentication and authorization mechanisms
- Cryptographic protection requirements
- Secure communication protocols
- Intrusion detection and logging
- Secure boot and code signing
- Input validation and sanitization
- Specific technical implementation guidance
- Traceability to goals and threats
- Verification methods
- ASIL/CAL levels
Step 6: Cybersecurity Controls
Step 6: Cybersecurity Controls
- Preventive Controls: Firewalls, access control, encryption
- Detective Controls: Intrusion detection, logging, monitoring
- Corrective Controls: Incident response, recovery procedures
- Implementation details
- Effectiveness rating
- Verification evidence requirements
Advanced TARA Features
Parallel Workflows (FuSa + Cybersecurity)
Parallel Workflows (FuSa + Cybersecurity)
- Item Definition → Fault Model → HARA → FSC → Failures → TSC
- Item Definition → Assets → Threats → Goals → Requirements → Controls
Inline Editing & Feedback
Inline Editing & Feedback
- Click any item to edit details inline
- Provide feedback on specific threats or requirements
- AI learns from your feedback and regenerates improved results
- Track feedback history and iterative improvements
Multi-Component TARA
Multi-Component TARA
- Perform TARA for each component separately
- Load and analyze existing component assessments
- Import functions and interfaces from other components
- Generate integrated threat scenarios across components
Reference Document Import
Reference Document Import
- Upload system specifications, architecture documents, or previous assessments
- AI extracts relevant information automatically
- Populates item definition, assets, and known threats
- Accelerates TARA creation with existing knowledge
Traceability Visualization
Traceability Visualization
- Asset → Threat → Goal → Requirement → Control traceability
- Interactive graph view with filtering
- Identify coverage gaps and missing links
- Ensure complete traceability for audits
Customizable Workflows
Customizable Workflows
- Add custom workflow steps
- Configure default threat categories
- Define organization-specific security requirements
- Create templates for common system types
Risk Assessment and CAL Determination
Impact Rating
Impact Rating
- S0: No impact on safety
- S1: Light injuries
- S2: Severe injuries
- S3: Life-threatening/fatal injuries
- F0: Negligible
- F1: Moderate financial loss
- F2: Significant financial loss
- F3: Severe financial loss
- O0: No operational impact
- O1: Limited operational impact
- O2: Significant operational impact
- O3: Severe operational impact
- P0: No privacy violation
- P1: Minor privacy violation
- P2: Significant privacy violation
- P3: Severe privacy violation
Attack Feasibility Analysis
Attack Feasibility Analysis
- Very Low: Highly skilled experts with extensive resources
- Low: Skilled attackers with significant resources
- Medium: Proficient attackers with moderate resources
- High: Easily achievable with common tools
CAL Calculation
CAL Calculation
- CAL QM: Quality Management sufficient
- CAL 1: Low cybersecurity requirements
- CAL 2: Medium cybersecurity requirements
- CAL 3: High cybersecurity requirements
- CAL 4: Very high cybersecurity requirements
Export and Documentation
TARA Reports
TARA Reports
- Complete TARA report with all threats and controls
- Asset inventory and classification
- Risk assessment matrix
- Traceability matrix (Asset → Threat → Goal → Requirement → Control)
- Residual risk analysis
CSV Export for Integration
CSV Export for Integration
- Requirements management tools (DOORS, Jama, Polarion)
- Risk management platforms
- Issue tracking systems (Jira, Azure DevOps)
- Custom compliance databases
Compliance Documentation
Compliance Documentation
- Cybersecurity Case structure
- Work products for each lifecycle phase
- Evidence of threat analysis completeness
- CAL justification and rationale
- Traceability documentation
Best Practices
Start with Clear Item Definition
Start with Clear Item Definition
- List all interfaces explicitly (CAN, Ethernet, diagnostic ports, wireless)
- Include all operating modes (normal, degraded, maintenance, update)
- Define system boundaries clearly
- Specify hardware and software components
Iterate with Feedback
Iterate with Feedback
- Review AI-generated threats and provide feedback
- Refine and add missing threat scenarios
- Adjust impact and feasibility ratings based on expertise
- Regenerate downstream artifacts after updates
Collaborate Across Teams
Collaborate Across Teams
- Security experts: Identify attack vectors and vulnerabilities
- System architects: Understand interfaces and data flows
- Safety engineers: Assess safety-related impacts
- Software developers: Evaluate implementation feasibility
Integrate with Functional Safety
Integrate with Functional Safety
- Run both workflows in parallel from same item definition
- Identify security-safety interactions
- Address combined ASIL/CAL requirements
- Ensure holistic system protection
Validate Completeness
Validate Completeness
- Verify all interfaces have associated threat scenarios
- Check that all high-value assets are protected
- Ensure each threat has mitigating controls
- Review traceability for gaps
- Document residual risks and acceptance rationale
Common Use Cases
Automotive ECU Cybersecurity
Automotive ECU Cybersecurity
- Domain controllers (ADAS, infotainment, powertrain)
- Gateway ECUs with multiple network interfaces
- Telematics and connectivity modules
- Over-the-air (OTA) update systems
V2X Communication Systems
V2X Communication Systems
- Identify threats to V2V (vehicle-to-vehicle) messaging
- Assess V2I (vehicle-to-infrastructure) vulnerabilities
- Evaluate message authentication and integrity
- Consider privacy of location and identity data
Connected and Cloud Services
Connected and Cloud Services
- Mobile app security and authentication
- Cloud data storage and processing
- Remote diagnostics and vehicle control
- User account and privacy protection
Autonomous Vehicle Systems
Autonomous Vehicle Systems
- Sensor spoofing and manipulation
- ML model poisoning and adversarial attacks
- Vehicle control system compromise
- Map and localization data integrity
Next Steps
After completing your TARA:- Implement Security Controls: Use generated requirements to design and implement security measures
- Verification & Validation: Create test plans to verify security controls (see Verification & Validation)
- Safety Case Generation: Integrate TARA results into your safety case (see Safety Case Generation)
- Ongoing Monitoring: Update TARA as system evolves and new threats emerge

