Skip to content

Commit 03a9ac0

Browse files
Update tool verification report template
- Split evaluation table into two: Safety and Security evaluation - Wrap info about chapter content in "tip" directive
1 parent 6dbf899 commit 03a9ac0

File tree

1 file changed

+127
-42
lines changed

1 file changed

+127
-42
lines changed

process/folder_templates/tools/tool_verification_report_template.rst

Lines changed: 127 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -56,13 +56,16 @@ Scope and purpose
5656
~~~~~~~~~~~~~~~~~
5757
[Describe the scope and purpose of the tool]
5858

59-
May add general use cases, scenarios, etc.
59+
.. tip::
60+
May add general use cases, scenarios, etc.
61+
6062

6163
Inputs and outputs
6264
~~~~~~~~~~~~~~~~~~
6365
[Describe here the inputs and outputs of the tool]
6466

65-
May add a figure, if appropriate
67+
.. tip::
68+
May add a figure, if appropriate
6669

6770
.. note::
6871
| .. figure:: _assets/[Your Tool Name].drawio.svg
@@ -77,14 +80,15 @@ Available information
7780
~~~~~~~~~~~~~~~~~~~~~
7881
[Describe here the available information for the tool]
7982

80-
May also add some general information about the tool
83+
.. tip::
84+
May also add some general information about the tool
8185

82-
May add links to the public available information, if applicable,
83-
e.g. tools documentation, tracking of tool bugs, user manual, guidelines, etc.
86+
May add links to the public available information, if applicable,
87+
e.g. tools documentation, tracking of tool bugs, user manual, guidelines, etc.
8488

85-
May add some comments to get started or usage information or integration manual
89+
May add some comments to get started or usage information or integration manual
8690

87-
May add tool usage constraints/limitations
91+
May add tool usage constraints/limitations
8892

8993

9094
Installation and integration
@@ -94,73 +98,152 @@ Installation
9498
~~~~~~~~~~~~
9599
[Describe here how to install the tool]
96100

97-
May add where is the tool located?
101+
.. tip::
102+
May add where is the tool located?
98103

99-
May add how the tool is configured in order to be used in safe/secure way?
104+
May add how the tool is configured in order to be used in safe/secure way?
100105

101-
May add access/usage protection required?, execution authority required?
106+
May add access/usage protection required?, execution authority required?
102107

103108
Integration
104109
~~~~~~~~~~~
105110
[Describe here how to integrate the tool in existing toolchain]
106111

107-
May add how the tool works together with other tools?
112+
.. tip::
113+
May add how the tool works together with other tools?
108114

109115
Environment
110116
~~~~~~~~~~~
111117
[Describe environment and its constraints/limitations]
112118

113119

114-
Evaluation
115-
----------
116-
[Describe here detailed information about the tool evaluation]
120+
Safety evaluation
121+
-----------------
122+
[Describe here detailed information about the tool safety evaluation]
117123

118-
Determine the use case for the tool in the project and for each use case
124+
.. tip::
125+
Determine the use case for the tool in the project and for each use case
119126

120-
Determine the malfunctions/threats
127+
Determine the malfunctions/threats
121128

122-
Determine the tool impact based on the malfunctions/threats
129+
Determine the tool impact based on the malfunctions/threats
123130

124-
Determine the available safety/security measures
131+
Determine the available safety/security measures
125132

126-
Determine if the impact detection based on safety/security measures are sufficient and
127-
add additional ones, if required
133+
Determine if the impact detection based on safety/security measures are sufficient and
134+
add additional ones, if required
128135

129-
Determine the tool confidence based on tool impact and tool impact detection
136+
Determine the tool confidence based on tool impact and tool impact detection
130137

131-
Use the table below to document all uses cases and their evaluation. The table has an
132-
example included.
138+
Use the table below to document all uses cases and their evaluation. The table has an
139+
example included.
133140

134-
The final Confidence shall be judged on the maximum confidence level of each use case.
141+
The final Confidence shall be judged on the maximum confidence level of each use case.
135142

136143

137144
.. list-table:: [Your tool name] evaluation
138145
:header-rows: 1
146+
:widths: 1 2 8 2 6 4 2 2
139147

140-
* - Use case Identification
141-
- Use case Description
148+
* - Malfunction identification
149+
- Use case description
142150
- Malfunctions
143151
- Impact on safety?
144152
- Impact safety measures available?
145153
- Impact safety detection sufficient?
154+
- Further additional safety measure required?
155+
- Confidence (automatic calculation)
156+
* - 1
157+
- Use case description example
158+
- | Malfunction X (with safety impact and available measures)
159+
|
160+
| Detailed description of malfunction X shall be added here, if applicable.
161+
- yes
162+
- Reviews
163+
- yes
164+
- no
165+
- high
166+
* - 2
167+
- Use case description example
168+
- | Malfunction Y (with safety impact and no available measures)
169+
|
170+
| Detailed description of malfunction Y shall be added here, if applicable.
171+
- yes
172+
- no
173+
- no
174+
- yes (qualification)
175+
- low
176+
* - 3
177+
- Use case description example
178+
- | Malfunction Z (without safety impact)
179+
|
180+
| Detailed description of malfunction Z shall be added here, if applicable.
181+
- no
182+
- no
183+
- yes
184+
- no
185+
- high
186+
187+
188+
Security evaluation
189+
-------------------
190+
[Describe here detailed information about the tool security evaluation]
191+
192+
.. tip::
193+
Determine the use case for the tool in the project and for each use case
194+
195+
Determine the threats
196+
197+
Determine the tool impact based on the threats
198+
199+
Determine the available security measures
200+
201+
Determine if the impact detection based on s security measures are sufficient and
202+
add additional ones, if required
203+
204+
Use the table below to document all uses cases and their security evaluation.
205+
The table has an example included.
206+
207+
The final Confidence shall be judged on the maximum confidence level of each use case.
208+
209+
.. list-table:: [Your tool name] security evaluation
210+
:header-rows: 1
211+
:widths: 1 2 8 2 6 4 2
212+
213+
* - Threat identification
214+
- Use case description
146215
- Threats
147216
- Impact on security?
148217
- Impact security measures available?
149218
- Impact security detection sufficient?
150-
- Further additional safety measure required?
151-
- Confidence (automatic calculation)
219+
- Further additional security measure required?
152220
* - 1
153-
- Generate element (requirements, architecture, safety analysis, ...)
154-
- Wrong or missed element may lead to an wrong implementation with any potential error
221+
- Use case description example
222+
- | Threat A (with security impact and available measures)
223+
|
224+
| Detailed description of threat A shall be added here, if applicable.
225+
- yes
226+
- (Example) Usage of SSH/GPG keys to access to the source code repository
155227
- yes
156-
- Reviews
157228
- no
158-
- Gain access to modify or run manipulated Doc-as-code or to to modify input files
229+
* - 2
230+
- Use case description example
231+
- | Threat B (with security impact and no available measures)
232+
|
233+
| Detailed description of threat B shall be added here, if applicable.
159234
- yes
160-
- Access control, roles in Github
235+
- no
236+
- no
237+
- yes (qualification)
238+
* - 3
239+
- Use case description example
240+
- | Threat C (without security impact)
241+
|
242+
| Detailed description of threat C shall be added here, if applicable.
243+
- no
244+
- no
161245
- yes
162-
- Compare generated text in documentation with original text (#PR)
163-
- low
246+
- no
164247

165248

166249
Result
@@ -177,21 +260,23 @@ Requirements and testing aspects
177260
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
178261
[Describe here requirements and their tests from user point of view]
179262

180-
Where are tool requirements defined?
263+
.. tip::
264+
Where are tool requirements defined?
181265

182-
Where are the test cases for the requirements defined?
266+
Where are the test cases for the requirements defined?
183267

184-
Where are the requirements coverage documented?
268+
Where are the requirements coverage documented?
185269

186270

187271
Analysis perspective
188272
~~~~~~~~~~~~~~~~~~~~
189273
[Describe analysis perspective]
190274

191-
Optional:
275+
.. tip::
276+
Optional:
192277

193-
Where is the architectural design of the tool defined?
278+
Where is the architectural design of the tool defined?
194279

195-
Where is the safety analysis for the tool defined?
280+
Where is the safety analysis for the tool defined?
196281

197-
Where is the security analysis for the tool defined?
282+
Where is the security analysis for the tool defined?

0 commit comments

Comments
 (0)