A Cybersecurity Requirement Diagram displays cybersecurity goals, cybersecurity requirements, and their relations. The main purpose of this diagram is to create requirements that cover the goals defined in TARA. Deriving Cybersecurity RequirementsCybersecurity Requirements are derived from Cybersecurity Goals defined in a TARA table. You can use the Cybersecurity Requirement Diagram to derive four types of Cybersecurity Requirements: Functional, Technical, Software, and Hardware. To derive a Cybersecurity Requirement
- From the Index page, open the Functional Cybersecurity Concept.
- Find the Cybersecurity Goal you want to derive the Cybersecurity Requirement from and drag it to the diagram.
- Create the Cybersecurity Requirement you want to derive by clicking it in the diagram palette and clicking an empty space on the diagram pane.
- Name the created Cybersecurity Requirement and write the required text.
- Create a derived relationship from the Cybersecurity Requirement to the Safety Goal as displayed below.

Creating a Cybersecurity GoalTo create a Cybersecurity Goal
- In the Containment tree, right-click Functional Cybersecurity Concept and select Create Element.

- Do one of the following:
- In the dialog, expand ISO 21434 and select Cybersecurity Goal.

- In the search tab, type the keyword goals and then select Cybersecurity Goal.

- Name the created Cybersecurity Goal in the Containment tree. The cybersecurity goal has the suffix CG, which denotes that the created element is cybersecurity goals; the number 1 indicates that it is the first cybersecurity goal created.

You can create a Cybersecurity Goal in the Cybersecurity Goal Table or by using the diagram panel. |
Creating a Cybersecurity RequirementTo create a Cybersecurity Requirement
- In the Containment tree, right-click Functional Cybersecurity Concept and select Create Element.

- Do one of the following:
Name the created Cybersecurity Requirement in the Containment tree.

|