Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To manage your asset candidates open the Assets Selection in the TARA RM folder.

...

Add content as needed:

  • Text fields are provided to assign a Name(mandatory) and Description to your Asset.

  • Select an Element Category from drop-down menu as required.

  • The column Model Element provides a drop-down menu containing all model elements in your project that have the stereotype “Asset” assigned to them.

  • The column Vunerability provides a drop-down menu containing all model elements in your project that have the stereotype “Vunerability” assigned to them.

...

To finalize asset identification, you need to identify damage scenarios that might be realized in case an asset’s cybersecurity property is compromised. The user-side logic for creating and assigning damage scenarios is quite analogous to asset handling:

To manage your damage scenarios, open the project damage scenarios view in the RM folder and click the green plus icon at upper right corner grafik-20240827-053602.pngImage Added - icon to add a new row.

...

Name and Description are once again text fields which will take input after double-clicking them. A stakeholder can be selected from drop-down in column Stakeholder. The impact can be rated in the categories Safety, Financial, Operational, and Privacy or any additional category defined in a custom profile. Complete your damage scenario by filling in text in columns Justification and Assumptions on Impact as needed.

To assign a damage scenario from project damage scenarios view to an asset in TARA table drag it and drop it anywhere in a row. Alternatively a damage scenario can be selected from the drop-down menu in the column DS Name.

...