Use-Cases and Features¶
Core Features¶
Create and visualize attack paths with an intuitive drag-and-drop interface powered by ReactFlow. This feature enables security analysts to model complex attack scenarios using hierarchical tree structures with AND/OR gate logic, providing automatic attack feasibility calculations based on ISO/SAE 21434. Key capabilities:
|
Leverage AI (preferrably local model) to enhance security analysis through automated threat generation, attack vector discovery, and control recommendations. This feature uses natural language processing to help security teams identify potential threats they might have overlooked. AI capabilities include:
|
Enable teams to work together on security analysis through organizations, projects, and role-based access control. This feature supports multiple organizations with fine-grained permissions at both organization and project levels. Collaboration features:
|
Standard automotive cybersecurity approach using attack potential assessment compliant with ISO/SAE 21434 requirements. This methodology calculates attack feasibility based on five key factors with automatic scoring and rating. Attack potential factors:
|
Generate professional security documentation in multiple formats including Sphinx-needs compatible reStructuredText for requirements traceability, JSON for project portability, and management summaries for executive reporting. Export formats:
|
Define and document the system being analyzed with comprehensive TOE description, configuration, scope definition, and assumptions. This feature provides structured templates for documenting system boundaries and environmental assumptions. TOE components:
|
Identify and manage critical system assets with security properties (Confidentiality, Integrity, Availability). Assets are the foundation of threat analysis, representing what needs protection in the system. Asset features:
|
Model potential harm and impact through damage scenarios with customizable impact categories. This feature helps assess the consequences of successful attacks and prioritize security efforts based on potential damage. Damage scenario capabilities:
|
Comprehensive threat identification and tracking system with support for multiple methodologies, MITRE ATT&CK mapping, and status management. Threats are linked to assets, damage scenarios, and attack trees for complete traceability. Threat management:
|
Document and track security controls (mitigations) with implementation status, verification methods, and residual risk assessment. Security controls are linked to threats they mitigate for traceability. Control features:
|
Native desktop applications for macOS, Windows, and Linux built with Electron, providing offline capability and system integration. Desktop apps wrap the web application with native file system access and auto-update support. Desktop features:
|
Interface available in 6 languages with instant language switching and persistent preferences. Translations cover all UI elements, making TARA analysis accessible to international teams. Supported languages:
|
Integrated MITRE ATT&CK framework database for linking threats to known attack techniques and tactics. Browse tactics, techniques, and sub-techniques with full STIX data support for standardized threat intelligence. MITRE capabilities:
|
Import embedded device security profiles from EMB3D (Embedded Device Security Database) to leverage standardized embedded threat taxonomy and device property mappings. EMB3D features:
|
Planned Features¶
Microsoft’s threat categorization framework for systematic threat identification using the STRIDE mnemonic: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Planned for v0.3.0. |
Traditional risk assessment using likelihood × impact matrices with customizable risk appetite and visual risk heat maps for executive reporting. Planned for v0.3.0. |
Component-based risk analysis for complex systems with module-level threat assessment, interface risk analysis, and aggregated system risk calculation considering supply chain factors. Planned for v0.3.0. |
Live editing with team member presence, change notifications, conflict resolution, and thread-based discussions on threats and assets for synchronous teamwork. Planned for v0.4.0. |
Generate comprehensive reports with compliance templates, custom branding, automated report generation, and support for multiple output formats. Planned for v0.4.0. |
Traceability¶
All features are traceable to:
User stories and use cases
Implementation components (see Architecture)
Test coverage (see Testing Guide)
Documentation sections
See Attack Trees, AI Features, Collaboration, and Export & Documentation Generation for detailed feature documentation.