Browse the whole documentation.
itemis Security Analyst is a model-based software solution for Threat Analyses and Risk Assessments of technical systems. It supports your Threat Analysis and Risk Assessment (TARA) throughout the entire lifecycle in a sophisticated manner which provides full compliancy with ISO/SAE 21434 and UN Regulation No. 155.
This section explains how to use this tool to conduct your TARA which is an engineering methodology to identify, prioritize, and respond to cyber threats through the application of countermeasures that reduce susceptibility to cyber attack. The subsequent sections will provide you with an overview and clarify some important characteristics.
The method configuration serves as a foundation for all calculations taking place in itemis Security Analyst. It contains the domain-specific sets of feasibility options, impact options, impact categories, etc.
Security Analyst reports can be created in DOCX and PDF formats. To generate and display the corresponding document, right-click on the chunk in the project explorer, and select Generate Report (docx) or Generate Report (pdf). Alternatively, if a chunk is selected, buttons available in the main editor window’s bottom section.
Catalogs in itemis Security Analyst consist of a threats catalog, a controls catalog, and a technologies catalog. Each catalog features pre-evaluated elements to be re-used across your TARAs and prepares for future automation throughout the TARA lifecycle.
The import and export chapter covers everything you need to know to import and export data to and from the Security Analyst. As most users of Security Analyst already have existing models, Security Analyst provides two ways to import data. You have the following options to import data into the tool: