ISO WIZBlogTry ISO WIZ Free →
← All articles
ISO 21434TARACybersecurityAutomotive

ISO 21434 TARA: How to Do a Threat Analysis and Risk Assessment for Automotive Cybersecurity

April 16, 2025 · 10 min read

Why Automotive Cybersecurity Is Now Non-Negotiable

UN Regulation 155 (UN R155) mandated that from July 2024, all new vehicle type approvals in regulated markets require a certified Cybersecurity Management System (CSMS). ISO 21434 is the technical standard that defines how to build it.

For automotive safety engineers, the critical insight is this: cybersecurity and functional safety are not separate concerns. A successful cyberattack that compromises a safety-critical system is a functional safety violation — the safety mechanisms designed to prevent harm can be circumvented. ISO 21434 and ISO 26262 must be aligned, and TARA is the mechanism that makes that alignment explicit.


What Is TARA?

Threat Analysis and Risk Assessment (TARA) is the cybersecurity equivalent of HARA. Where HARA identifies hazardous events and rates their severity/exposure/controllability to derive safety goals, TARA identifies threat scenarios and rates their risk to derive cybersecurity goals.

TARA is defined in ISO 21434 Clause 15. The process has four main steps:

  1. Asset identification — what does the system have that an attacker would want to compromise?
  2. Threat scenario identification — how could an attacker damage, disclose, or misuse those assets?
  3. Attack path analysis — what is the feasibility of each attack?
  4. Risk determination — what is the risk level, and what treatment is required?

Step 1: Asset Identification

Assets are things of value that can be harmed. In automotive cybersecurity, assets fall into categories:

Cybersecurity properties (the CIA triad + authenticity):

Example assets for an EPS (Electronic Power Steering) system:

For each asset, document the damage scenario: what bad outcome happens if this cybersecurity property is violated?


Step 2: Threat Scenario Identification

A threat scenario describes how an adversary could compromise an asset's cybersecurity property.

Example threat scenarios for EPS:

Each threat scenario should reference:


Step 3: Attack Path Analysis and Feasibility

For each threat scenario, identify one or more attack paths — sequences of steps an attacker would need to execute. Then rate the feasibility of each attack using ISO 21434's CVSS-derived approach or the Attack Feasibility Rating (AFR) method.

Attack Feasibility Rating factors:

Lower feasibility = higher attacker effort required = lower risk (all else equal).


Step 4: Risk Determination

Risk in TARA = Impact × Attack Feasibility

Impact is rated on a scale similar to ISO 26262 severity, considering:

Risk value combines impact and feasibility into a risk matrix (ISO 21434 Table B.9). The outcome is one of four risk treatment options:

Most cybersecurity goals come from the "Reduce" treatment path.


Connecting TARA to Functional Safety

This is where ISO 21434 and ISO 26262 must explicitly align. Cybersecurity threats that can lead to safety hazardous events need to be reflected in both:

ISO 21434 Clause 5.4.3 specifically requires that cybersecurity goals that impact functional safety be coordinated with the functional safety team.

In practice: every cybersecurity goal derived from a threat scenario that maps to a safety-relevant damage scenario should link to the corresponding ISO 26262 safety goal. The safety mechanisms protecting against the hazardous event must be reviewed for their cybersecurity resilience.


How ISO WIZ Handles ISO 21434 TARA

ISO WIZ includes a structured TARA workflow with asset identification, cybersecurity property documentation, threat scenario generation, attack path analysis, feasibility rating, risk determination, and cybersecurity goal derivation. All threat scenarios that map to safety-relevant damage scenarios are automatically linked to the corresponding ISO 26262 hazardous events and safety goals. Cross-standard consistency gaps — where a cybersecurity threat is unaddressed in the safety concept — are flagged in real time.

ISO 26262 · SOTIF · ISO 21434 · ASPICE — one platform

ISO WIZ harmonizes all four standards into a single workflow with shared traceability, cross-standard gap detection, and no spreadsheet maintenance.

Try ISO WIZ Free →