What is TARA in Automotive Cybersecurity? A Practical Guide
By Agnile Engineering Team
By Agnile Engineering Team
TL;DR — TARA (Threat Analysis and Risk Assessment) is the systematic five-step cybersecurity risk process defined in ISO/SAE 21434 Clause 15. It identifies assets, enumerates threats, rates impact and Attack Feasibility, and produces Risk Treatment decisions and Cybersecurity Goals that drive downstream engineering. TARA results are also the primary cybersecurity evidence OEMs submit for UNECE R155 Type Approval.
TARA (Threat Analysis and Risk Assessment) is the systematic Cybersecurity Engineering analysis methodology defined in ISO 21434 Clause 15. It is the process by which automotive engineering teams identify cybersecurity threats to vehicle systems, assess the feasibility and impact of each threat, determine risk levels, and define appropriate risk treatments. TARA is widely considered the backbone of automotive cybersecurity engineering — without it, there is no structured basis for making cybersecurity decisions.
Every vehicle system that falls within the scope of ISO/SAE 21434 requires a TARA. This includes ECUs, communication interfaces, external connectivity modules, sensor systems, and any component that processes, stores, or transmits data relevant to vehicle cybersecurity. For a modern connected vehicle with 50-100+ ECUs, this means dozens of TARAs must be performed across the vehicle program.
TARA is not optional under ISO/SAE 21434. Clause 15 explicitly requires that a Threat Analysis and Risk Assessment be performed for each item or component within the cybersecurity scope. The results of the TARA drive all downstream cybersecurity activities: Cybersecurity Goals, cybersecurity requirements, verification criteria, and validation test cases.
Beyond ISO/SAE 21434, TARA results are essential for UNECE R155 compliance. When an OEM submits evidence for Vehicle Type Approval, the type approval authority expects to see structured threat analysis results that demonstrate systematic identification and treatment of cybersecurity risks. TARA Work Products serve as that evidence.
For Tier-1 suppliers, OEMs increasingly require TARA deliverables as part of the component or system delivery package. The Cybersecurity Interface Agreement (CIA) between OEM and supplier — defined in ISO/SAE 21434 Clause 7 — typically specifies TARA responsibilities and expected Work Products.
ISO/SAE 21434 Clause 15 defines the TARA process in five distinct steps. Each step builds on the outputs of the previous one, creating a traceable chain from asset identification to risk treatment.
Item assets with cybersecurity properties
Outcomes the item must avoid
How asset properties could be violated
Concrete attacker action sequence
Avoid, reduce, share, or retain
Item assets with cybersecurity properties
Outcomes the item must avoid
How asset properties could be violated
Concrete attacker action sequence
Avoid, reduce, share, or retain
Step 1: Asset Identification.The first step is to identify the cybersecurity-relevant assets within the system under analysis. An asset is anything that has value and requires protection — this includes data (firmware, calibration data, cryptographic keys, personal data), functions (diagnostic services, OTA update mechanisms, safety-critical control functions), and interfaces (CAN bus connections, Ethernet ports, Bluetooth, Wi-Fi, OBD-II). Each asset is characterized by its cybersecurity properties: confidentiality, integrity, availability, and authenticity.
Step 2: Threat Identification.For each identified asset, the team identifies potential threats — actions or events that could compromise the asset's cybersecurity properties. Threat identification can be performed using structured methodologies such as STRIDE, attack trees, or catalog-based approaches. A comprehensive threat library is critical here — experienced teams maintain catalogs of hundreds of known automotive threats mapped to specific asset types and architectures.
Step 3: Impact Assessment.Each identified threat is assessed for its potential impact if successfully exploited. ISO 21434 defines four impact categories: safety (potential for physical harm), financial (economic loss to stakeholders), operational (disruption of vehicle functions), and privacy (exposure of personal data). Each category is rated on a scale — typically negligible, moderate, major, or severe. The overall impact rating is the highest rating across all four categories.
Step 4: Attack Feasibility Assessment. This step evaluates how feasible it is for an attacker to actually carry out each identified threat. ISO/SAE 21434 provides several approaches for assessing attack feasibility, with the attack potential-based approach being the most commonly used. This evaluates factors such as elapsed time (how long the attack takes), specialist expertise required, knowledge of the target, window of opportunity, and equipment needed. The result is a feasibility rating: low, medium, high, or very high.
Step 5: Risk Determination and Treatment. The final step combines the impact rating and Attack Feasibility rating to determine the overall risk level for each threat. ISO/SAE 21434 defines risk levels from 1 (lowest) to 5 (highest), determined by a risk matrix. For each risk, the team then selects a Risk Treatment decision: avoid (eliminate the threat source), reduce (implement cybersecurity controls), share (transfer risk to another party), or accept (acknowledge and document the residual risk). Risk reduction decisions generate Cybersecurity Goals, which flow into cybersecurity requirements for the development phase.
A high-quality TARA requires well-defined inputs. The most critical input is the item definition — a comprehensive description of the system under analysis, including its boundaries, interfaces, functions, data flows, and operational context. Other inputs include the system architecture description, relevant cybersecurity information from vulnerability databases and threat intelligence sources, and any prior TARA results from related systems.
The outputs of a TARA are structured Work Products that serve as both engineering artifacts and compliance evidence:
Despite its systematic structure, TARA is one of the most challenging activities in Automotive Cybersecurity Engineering. Teams frequently encounter the following difficulties:
Historically, TARA has been performed manually using spreadsheets, documents, and workshops. A typical manual TARA for a single system takes 4-8 weeks of engineering effort, involving multiple workshops, iterations, and review cycles.
The limitations of manual TARA are well-documented: inconsistency between analysts, difficulty maintaining traceability, high effort per system, and challenges in updating TARAs when system designs change. These limitations have driven the development of automated TARA tools that use structured databases, AI-powered threat identification, and automated report generation. For a deeper comparison, see our article on manual TARA vs automated TARA.
KAVACH is Agnile Technologies' AI-native TARA automation platform, purpose-built for ISO/SAE 21434 compliance. KAVACH transforms the TARA process from a manual, workshop-driven exercise into a structured, AI-augmented workflow that produces consistent, auditable results.
KAVACH's approach addresses each TARA step:
By automating the repetitive and judgment-intensive aspects of TARA, KAVACH reduces the cycle time from weeks to hours while improving consistency and traceability. This enables engineering teams to focus their expertise on reviewing, refining, and validating the AI-generated analysis rather than building it from scratch.
For more information on the ISO/SAE 21434 standard and its requirements, explore our comprehensive ISO/SAE 21434 guide or request a KAVACH demo to see automated TARA in action.
Agnile Technologies specializes in Automotive Cybersecurity Engineering and TARA automation. Learn more about our Cybersecurity services.
KAVACH and Agnile's cybersecurity engineering team help teams connect architecture, assets, threats, attack paths, controls, and traceable cybersecurity evidence.