A Cybersecurity Requirement Diagram displays cybersecurity goals, cybersecurity requirements, and their relations. The main purpose of this diagram is to create requirements that cover the goals defined in TARA.
Cybersecurity Requirements are derived from Cybersecurity Goals defined in a TARA table. You can use the Cybersecurity Requirement Diagram to derive four types of Cybersecurity Requirements: Functional, Technical, Software, and Hardware.
To derive a Cybersecurity Requirement
To create a Cybersecurity Goal
You can also create a Cybersecurity Goal in the Cybersecurity Goal Table or by using the diagram panel. |
To create a Cybersecurity Requirement
In the dialog, expand ISO 21434. From the drop-down list, choose one of the following:
Name the created Cybersecurity Requirement in the Containment tree.
You can also create a cybersecurity requirement in the cybersecurity requirement tables. |
The Functional Cybersecurity Concept Table provides an overview of goals & requirements to be implemented to secure assets.