Security Engineering Features
New TARA Features
Web-based TARA
SysML-based item definition and assignment of items to TARA document
CVSS exploitability metrics and Attack Vector available for attack feasibility rating
Threat scenario automatically adopts max. attack feasibility of associated attack paths
Catalogs for security related objects like damage and threat scenarios
Separate risk matrix for all impact categories
Defining CAL for Threat Scenario
Customizing TARA
Most parameters used in TARA can be customized and stored to a profile.
Cybersecurity property
Impact rating
Attack feasibility rating
Risk matrix
Catalogs for security related objects
Assumptions
Damage scenarios
Threat scenarios
Attack paths
Attack steps
Vulnerabilities
Cybersecurity controls