Software tool for threat analysis and risk assessment
    CycurRISK Productbox

Uncover the vulnerable points of your automotive systems UN R 155 and other international regulations have made a risk-based approach to vehicle architecture development a prerequisite for type approval. In addition, ISO/SAE 21434 sets the framework for the implementation of these guidelines. Threat Analysis and Risk Assessment (TARA) has thus become an indispensable part of automotive system design and development processes.

diagram cycurrisk

Threat Analysis & Risk Assessment methodology

CycurRISK is a TARA software tool that helps you to uncover and evaluate the potential attack surfaces in automotive systems and architectures at an early stage.

CycurRISK allows you to systematically identify and analyze threats via attack feasibility (based on attack potential) using attack trees. Damage scenarios are used to assess the impact on road users and your business. The tool provides a structured documentation of threat scenarios and risks to a given system. Further, it allows to compare different variants and to share and reuse knowledge from previous analyses through catalogues. Thus, CycurRISK enables you to prioritize risks and countermeasures and to create a security concept compliant to the requirements of security engineering processes, ISO/SAE 21434 and UN R 155.

Your benefits

  • EstablishedCycurRISK is widely used in the automotive industry
  • ProfessionalETAS offers professional maintenance and support

  • ReliableUpdates and improvements based on our long-standing experience in automotive security
  • Quality and reliabilityCycurRISK is fully compliant with ISO/SAE 21434, the tool classification according to ISO 26262 is available and the tool qualification for all use cases is for tool confidence level (TCL) 2/3 performed
  • FlexibleThe report templates from CycurRISK are fully configurable
  • ComprehensiveCycurRISK backed with ETAS security consulting experience and services

Professional assessment for your automotive cybersecurity during the complete product lifecycle

Threat analysis and risk assessment service

ESCRYPT’s threat analysis and risk assessment service supports you during the whole TARA process for embedded products in the design or development phase and in the field. Because even if product development is further along, long product lifecycles often mean having to respond to new requirements or new security risks. ESCRYPT helps customers determine the data and functions to be protected, identify potential attacks and attackers, and define the appropriate protection requirements for all critical security risks. When necessary, ESCRYPT develops suitable adaptations for security implications.

ISO 9001:2015