Opening the Post-Threat Scenario Table

To open the Post-Threat Scenario Table


  • In the Containment tree, expand the 01 - Post-Threat Scenarios package and open the 01 - Post-Threat Scenarios table.

The 01 - Post-Threat Scenarios table displays the Higher Level Threat Scenario you created in the (2026x) Pre Risk Assessment table.

Adding a Threat Scenario

To add a new Threat Scenario to the Post-Threat Scenario Table


  1. In the Post-Threat Scenarios table, click Add New to add a new Threat Scenario.



  2. In the newly created Threat Scenario's row and the Name column, double-click the designated cell to name the Threat Scenario.



To add an existing Threat Scenario to the Post-Threat Scenario Table


  1. In the Post-Threat Scenario Table, click Add Existing.



  2. From the Select Threat Scenario dialog, select the required Threat Scenario. A row is added to the Post-Threat Scenario Table, showing the existing Threat Scenario.



  3.  In the existing Threat Scenario's row and the Name column, double-click the designated cell to rename the Threat Scenario.


Adding Documentation

To add documentation


  • In the Threat Scenario's row and the Documentation column, double-click the designated cell and type the required data.

Adding a Threat Source, Vulnerability, and Misuse Case

To add a Threat Source


  1. Double-click the designated cell in the Threat Source column and the required Threat Scenario's row and click .



  2. From the Select Elements dialog, select Threat Source and click OK.



    The Threat Source is added to the Post-Threat Scenario Table.



  3. Similarly, add the Vulnerability and Misuse Case to the Post-Threat Scenario Table.

Adding a Security Measure, Attack Path, and Requirement

To add a Security Measure, Attack Path, and Requirement


  1. Double-click the designated cell in the Security Measure column and the required Threat Scenario's row and click .



  2. From the Select Elements dialog, select one or more Security Measure(s) and click OK.



    The Security Measure(s) are added to the Post-Threat Scenario Table.



  3. Similarly, add the Attack Path and Requirement to the Post-Threat Scenario Table.

The Aggregated Impact Rating, Effectiveness, Likelihood, and Risk values are calculated automatically based on the DO-326A standards.