428 items across 6 document types — generated 2026-03-11
| UID | Title | Type | Vm | Rationale | Importance | Urgency | Risk | Difficulty | Active | Parent links |
|---|---|---|---|---|---|---|---|---|---|---|
MRS-001 | Diagram generation tool | F | R | Efficiency and programmable diagram generation | 5 | 4 | 1 | — | active | — |
MRS-010 | Requirements traceability | F | T | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-002 | Unified repository storage | F | T | To facilitate interlinking of assets | 5 | 5 | 1 | — | active | — |
MRS-003 | Open file format | F | T | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-004 | Unique artifact IDs | F | T | To ensure traceability | 5 | 5 | 1 | — | active | — |
MRS-005 | Requirements management tool | F | T | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-006 | Artifact linking feature | F | T | To facilitate interlinking | 5 | 5 | 1 | — | active | — |
MRS-007 | Version control system | F | R | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-008 | Use Git software | F | R | Maturity, features, widely available tool support and documentation | 5 | 5 | 1 | — | active | — |
MRS-009 | Requirement hierarchies | F | T | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-011 | V&V test features | F | T | See Mission Analysis | 5 | 3 | 1 | — | active | — |
MRS-012 | Testing framework integration | F | R | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-013 | Artifact tagging | F | T | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-014 | Project management feature | F | T | See Mission Analysis | 4 | 4 | 1 | — | active | — |
MRS-015 | Time report consolidation | F | T | See Mission Analysis | 4 | 4 | 1 | — | active | — |
MRS-016 | ISMS folder verification | F | T | See Mission Analysis | 2 | 2 | 1 | — | active | — |
MRS-059 | Enforce user management | S | R | See Mission Analysis. | 5 | 4 | 1 | — | active | — |
MRS-017 | Import/export artifacts | F | T | See Mission Analysis | 5 | 3 | 1 | — | active | — |
MRS-018 | Collaboration feature | F | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-019 | User management | F | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-020 | User authentication | F | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-021 | User authorization | F | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-022 | Access control levels | F | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-023 | Web-based asset sharing | F | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-057 | Use web dev platform | A | R | To build on existing well-established solutions and cut unneeded effort | 5 | 5 | 1 | — | active | — |
MRS-024 | Secret sharing feature | F | T | See Mission Analysis | 3 | 2 | 1 | — | active | — |
MRS-025 | File integrity check | F | T | See Mission Analysis | 3 | 3 | 1 | — | active | — |
MRS-046 | File signing feature | F | T | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-047 | PQC encryption feature | F | T | See Mission Analysis. | 3 | 2 | 4 | — | active | — |
MRS-027 | Link requirements to code | F | T | See Mission Analysis | 1 | 1 | 1 | — | active | — |
MRS-028 | Search and filter | F | T | Ease of use and efficiency | 5 | 1 | 1 | — | active | — |
MRS-029 | Filter by tags | F | T | Ease of use and efficiency | 5 | 3 | 1 | — | active | — |
MRS-030 | Store SFRs/SARs | F | T | See Mission Analysis | 5 | 3 | 1 | — | active | — |
MRS-043 | Automate OR/ETR generation | F | T | See Mission Analysis | 3 | 1 | 1 | — | active | — |
MRS-044 | EUCC evaluation support | F | T | See Mission Analysis | 3 | 1 | 1 | — | active | — |
MRS-045 | Store CSA objectives | F | T | See Mission Analysis | 3 | 1 | 1 | — | active | — |
MRS-032 | Provide CCT implementation | F | T | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-036 | Store CC classes | F | T | See Mission Analysis; risk related to availability | 3 | 2 | 3 | 3 | active | — |
MRS-037 | Adopt CC storage format | F | T | See Mission Analysis; risk related to change in XML DTD | 4 | 1 | 3 | — | active | — |
MRS-038 | Transform CC content | F | T | See Mission Analysis | 3 | 1 | 3 | — | active | — |
MRS-039 | Maintain CC knowledge base | F | T | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-040 | CC forum and FAQ | F | T | See Mission Analysis | 2 | 2 | 1 | — | active | — |
MRS-041 | Threats and risks DB | F | T | See Mission Analysis | 4 | 2 | 1 | — | active | — |
MRS-042 | Threat DB sources | F | T | See Mission Analysis | 3 | 2 | 1 | — | active | — |
MRS-031 | Threat modelling solution | F | R | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-033 | Threat modelling tool | F | R | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-034 | Export design assets | F | T | See Mission Analysis | 5 | 2 | 1 | — | active | — |
MRS-035 | Risk management tool | F | T | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-054 | Include SRA model | C | R | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-060 | Store assets for TRICK | I | T | See Mission Analysis. | 3 | 2 | 1 | — | active | — |
MRS-048 | Include SDPM model | C | R | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-049 | Include VVPM model | C | R | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-050 | Include SPMM model | C | R | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-051 | Include SSDLC publication | C | R | See Mission Analysis | 5 | 5 | 1 | — | active | — |
MRS-052 | Include CC model | C | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-053 | Include CC-TMM | C | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-055 | Define CC activities | C | R | See Mission Analysis | 4 | 3 | 1 | — | active | — |
MRS-026 | Baseline module implementation | F | R | Project constraints and assumptions, system overview | 5 | 3 | 1 | — | active | — |
MRS-056 | Use NoSQL datastore | A | T | Portability, interoperability, easy & effective integration in version control | 5 | 5 | 1 | — | active | — |
MRS-058 | Follow modular design | A | R | See Mission Analysis | 5 | 4 | 1 | — | active | — |
MRS-061 | Integrate CRA requirements database | F | T | EU Regulation 2024/2847 imposes structured security requirements on products with digital elements; a machine-readable local database enables offline compliance analysis. | 4 | 4 | 1 | 2 | active | — |
MRS-062 | Generate CRA compliance checklist | F | T | CRA Article 13 requires manufacturers to demonstrate compliance; automated checklist generation with export capability reduces manual effort and enables traceability evidence. | 5 | 4 | 1 | 2 | active | — |
MRS-063 | Generate CRA technical documentation template | F | T | CRA Annex V requires manufacturers to supply structured technical documentation; a Quarto-based template pre-loaded with required sections reduces authoring overhead. | 4 | 3 | 2 | 3 | active | — |
MRS-064 | Generate SBOM using Syft | F | T | CRA and supply-chain security best practices require a verified, up-to-date inventory of software components; Syft provides industry-standard SBOM generation in CycloneDX and SPDX formats. | 4 | 4 | 1 | 2 | active | — |
MRS-065 | Import SBOM into Doorstop traceability | F | T | Importing SBOM components into the Doorstop traceability system enables bidirectional linking between SBOM artifacts and SSDLC requirements, supporting the CRA evidence trail. | 3 | 3 | 1 | 2 | active | — |
MRS-ARM | Artifact management | — | — | — | — | — | — | — | active | — |
MRS-TVF | Testing & verification features | — | — | — | — | — | — | — | active | — |
MRS-PMG | Project management | — | — | — | — | — | — | — | active | — |
MRS-UAC | User access control, collaboration & ISMS | — | — | — | — | — | — | — | active | — |
MRS-CRY | Cryptography | — | — | — | — | — | — | — | active | — |
MRS-SFT | Search, filter & code traceability | — | — | — | — | — | — | — | active | — |
MRS-CCT | Common Criteria Toolbox | — | — | — | — | — | — | — | active | — |
MRS-TRM | Threat modelling & risk management (CPSSA) | — | — | — | — | — | — | — | active | — |
MRS-KNB | Knowledge base & methodology | — | — | — | — | — | — | — | active | — |
MRS-NFR | Non-functional requirements & architecture | — | — | — | — | — | — | — | active | — |
MRS-CRA | Cyber Resilience Act (CRA) compliance module | — | — | — | — | — | — | — | active | — |
MRS-SBOM | Software Bill of Materials (SBOM) | — | — | — | — | — | — | — | active | — |
| UID | Title | Active | Parent links |
|---|---|---|---|
ARC-001 | C5-DEC CAD context diagram | active | MRS-058 |
ARC-002 | C5-DEC CAD functional tree | active | MRS-012 MRS-014 MRS-015 MRS-016 MRS-026 MRS-058 |
ARC-003 | C5-DEC CAD subsystems architecture | active | MRS-001 MRS-002 MRS-003 MRS-004 MRS-005 MRS-006 MRS-009 MRS-010 MRS-011 MRS-013 MRS-017 MRS-024 MRS-025 MRS-026 MRS-027 MRS-028 MRS-031 MRS-033 MRS-034 MRS-035 MRS-046 MRS-047 MRS-048 MRS-049 MRS-050 MRS-051 MRS-052 MRS-053 MRS-054 MRS-055 MRS-056 MRS-058 |
ARC-004 | C5-DEC CAD system architecture | active | MRS-001 MRS-002 MRS-003 MRS-005 MRS-007 MRS-008 MRS-011 MRS-013 MRS-018 MRS-019 MRS-020 MRS-021 MRS-022 MRS-023 MRS-026 MRS-029 MRS-033 MRS-034 MRS-035 MRS-040 MRS-041 MRS-044 MRS-056 MRS-057 MRS-058 MRS-059 MRS-060 |
ARC-006 | System context diagram (C4 level 1) | active | MRS-058 |
ARC-007 | Container diagram (C4 level 2) | active | MRS-058 |
ARC-008 | CCT module – class hierarchy | active | MRS-058 |
ARC-009 | CPSSA subsystem – component diagram | active | MRS-058 |
ARC-010 | Frontend layer – component diagram | active | MRS-058 |
ARC-011 | CC checklist creation – sequence diagram | active | MRS-058 |
ARC-012 | Deployment diagram | active | MRS-058 |
ARC-020 | Developer and operator workstation | active | MRS-058 |
ARC-021 | C5-DEC CLI | active | MRS-058 |
ARC-022 | C5-DEC TUI | active | MRS-058 |
ARC-023 | C5-DEC GUI | active | MRS-058 |
ARC-024 | CCT — Common Criteria Toolbox module | active | MRS-058 |
ARC-025 | SSDLC module | active | MRS-058 |
ARC-026 | Transformer module | active | MRS-058 |
ARC-027 | PM — Project management module | active | MRS-058 |
ARC-028 | CPSSA module | active | MRS-058 |
ARC-029 | Crypto module | active | MRS-058 |
ARC-030 | CRA module | active | MRS-058 |
ARC-031 | SBOM module | active | MRS-058 |
ARC-032 | ISMS module | active | MRS-058 |
ARC-033 | CC XML database | active | MRS-058 |
ARC-034 | Config and parameters store | active | MRS-058 |
ARC-035 | Output artifact workspace | active | MRS-058 |
ARC-036 | PQC cryptographic sidecar | active | MRS-058 |
ARC-037 | DocEngine container | active | MRS-058 |
ARC-038 | Doorstop requirements manager | active | MRS-058 |
ARC-039 | GnuPG cryptographic engine | active | MRS-058 |
ARC-040 | Syft SBOM generator | active | MRS-058 |
ARC-041 | OpenProject server | active | MRS-058 |
assumptions | — | active | — |
threat-actors | — | active | — |
ARC-OVW | System overview | active | — |
ARC-ARC | Architecture views | active | — |
ARC-PML | PlantUML architecture diagrams | active | — |
ARC-SEC | Security architecture — threat model layer | active | — |
ARC-FRN | Frontend layer | active | — |
ARC-COR | Core modules | active | — |
ARC-DAT | Data stores | active | — |
ARC-INF | Infrastructure and sidecars | active | — |
ARC-EXT | External systems | active | — |
| UID | Title | Author | Acceptance | Date | Dependence | Status | Importance | Urgency | Risk | Outlay | Type | Rationale | Version | Active | Parent links |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
SRS-001 | Access and Browse Database for CC Security Components | — | — | — | [] | In Progress | 5 | 5 | 1 | 2 | F | — | 0.1 | active | MRS-030 MRS-036 |
SRS-002 | Query the Database of Security Components. | — | — | — | ['SRS-001'] | In Progress | 3 | 3 | 1 | 2 | F | — | 0.1 | active | MRS-028 MRS-030 MRS-036 |
SRS-003 | Export Security Components | — | — | — | ['SRS-001', 'SRS-002'] | In Progress | 3 | 3 | — | — | F | — | 0.1 | active | MRS-053 MRS-055 |
SRS-004 | Tailor Security Requirements | — | — | — | ['SRS-003'] | Open | 3 | 3 | 1 | — | F | — | 0.1 | active | MRS-032 MRS-053 MRS-055 |
SRS-044 | Validate Hierarchies and Dependencies in Security Components | — | — | — | [] | In Progress | 3 | 3 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-053 MRS-055 |
SRS-045 | Generate Impact Analysis Reports for Certification Maintenance. | — | — | — | [] | Open | 2 | 2 | 2 | — | F | — | 1.0 | active | MRS-032 MRS-053 MRS-055 |
SRS-005 | Containerized Deployment via Docker DevContainer | — | — | — | [] | In Progress | 5 | 5 | 1 | 2 | F | — | 1.0 | active | MRS-002 MRS-003 MRS-026 |
SRS-006 | SSDLC New Project Scaffolding | — | — | — | ['SRS-005'] | In Progress | 5 | 5 | 1 | 3 | F | — | 1.0 | active | MRS-002 MRS-003 MRS-026 |
SRS-007 | DocEngine Report and Presentation Template Creation | — | — | — | ['SRS-005'] | In Progress | 4 | 4 | 1 | 3 | F | — | 1.0 | active | MRS-003 MRS-026 |
SRS-008 | Post-Quantum Cryptography Container Deployment | — | — | — | [] | In Progress | 3 | 3 | 2 | 3 | F | — | 1.0 | active | MRS-046 MRS-047 |
SRS-054 | Shamir's secret sharing split and recovery | — | — | — | [] | In Progress | 3 | 2 | 2 | 2 | F | — | 1.0 | active | MRS-024 |
SRS-055 | GPG-based file signing, verification, and encryption | — | — | — | [] | In Progress | 3 | 2 | 2 | 2 | F | — | 1.0 | active | MRS-046 |
SRS-056 | NaCl/Ed25519 key generation, signing, and verification | — | — | — | [] | In Progress | 3 | 2 | 2 | 2 | F | — | 1.0 | active | MRS-046 |
SRS-058 | Doorstop and Git as artifact management infrastructure | — | — | — | [] | Active | 3 | 1 | 1 | 1 | C | — | 1.0 | active | MRS-004 MRS-005 MRS-006 MRS-007 MRS-008 MRS-009 MRS-011 MRS-012 MRS-013 |
SRS-059 | Platform-delegated features (out of scope for custom implementation) | — | — | — | [] | Out of scope | 2 | 1 | 1 | 1 | C | — | 1.0 | active | MRS-017 MRS-018 MRS-019 MRS-020 MRS-021 MRS-022 MRS-023 MRS-056 MRS-057 MRS-059 MRS-060 |
SRS-009 | Project Management Time Report Conversion | — | — | — | [] | In Progress | 4 | 4 | 1 | 2 | F | — | 1.0 | active | MRS-014 MRS-015 |
SRS-010 | Project Management Timesheet Consolidation and Cost Reporting | — | — | — | ['SRS-009'] | In Progress | 4 | 4 | 1 | 2 | F | — | 1.0 | active | MRS-015 |
SRS-011 | ISMS Folder Content Verification | — | — | — | [] | In Progress | 3 | 3 | 1 | 2 | F | — | 1.0 | active | MRS-016 |
SRS-012 | SBOM Generation, Import, Diff, and Validation | — | — | — | [] | In Progress | 4 | 4 | 2 | 3 | F | — | 1.0 | active | MRS-025 MRS-026 MRS-064 MRS-065 |
SRS-013 | CRA Annex I and V Compliance Checklist Generation and Export | — | — | — | [] | In Progress | 4 | 4 | 2 | 3 | F | — | 1.0 | active | MRS-026 MRS-035 MRS-061 MRS-062 MRS-063 |
SRS-014 | Access and Navigation Through Knowledge Base | — | — | — | [] | In Progress | 4 | 3 | 1 | 3 | F | — | 0.2 | active | MRS-032 MRS-039 |
SRS-015 | Comprehensive and User-Friendly Explanations | — | — | — | [] | In Progress | 4 | 3 | 1 | 2 | F | — | 0.2 | active | MRS-032 MRS-039 |
SRS-016 | Interconnected Framework and Seamless Navigation | — | — | — | [] | In Progress | 4 | 3 | 1 | 3 | F | — | 0.3 | active | MRS-032 MRS-039 |
SRS-017 | Availability of Pragmatic Guidance and Best Practices | — | — | — | [] | In Progress | 4 | 3 | 1 | 3 | F | — | 0.2 | active | MRS-032 MRS-039 |
SRS-018 | Continuous Updates and Assurance of Current Information | — | — | — | [] | In Progress | 4 | 3 | 1 | 2 | F | — | 0.2 | active | MRS-032 MRS-039 |
SRS-019 | Integration of Multimedia Elements in Knowledge Articles | — | — | — | ['SRS-014'] | Not Started | 2 | 1 | 1 | 3 | F | — | 0.1 | active | MRS-032 |
SRS-020 | Integrating Links to FAQ Section | — | — | — | ['SRS-014'] | Not Started | 2 | 2 | 1 | 2 | F | — | 0.1 | active | MRS-032 MRS-040 |
SRS-021 | Provision of General Link to a CC-Specific Forum | — | — | — | ['SRS-014'] | Not Started | 2 | 2 | 1 | 1 | F | — | 0.1 | active | MRS-032 MRS-040 |
SRS-060 | SSDLC methodology models and secure development lifecycle content | — | — | — | [] | In Progress | 3 | 2 | 1 | 2 | C | — | 1.0 | active | MRS-048 MRS-049 MRS-050 MRS-051 MRS-052 |
SRS-022 | Data Storage and Format Mapping | — | — | — | [] | In Progress | 4 | 1 | 3 | 3 | F | — | 1.0 | active | MRS-032 MRS-037 |
SRS-023 | Bidirectional Transformation and Consistency | — | — | — | [] | In Progress | 3 | 1 | 3 | 4 | F | — | 1.0 | active | MRS-032 MRS-038 |
SRS-024 | Threats, Risks, and Countermeasures Database | — | — | — | [] | Open | 4 | 2 | 1 | 4 | F | — | 1.0 | active | MRS-041 MRS-042 |
SRS-025 | Support Mechanism for EUCC Additional Evaluation Evidence | — | — | — | [] | Open | 3 | 1 | 1 | 4 | F | — | 1.0 | active | MRS-044 |
SRS-026 | Storing Generic Security Objectives of CSA Article 51 | — | — | — | [] | Open | 3 | 1 | 1 | 3 | F | — | 1.0 | active | MRS-045 |
SRS-027 | Unified Storage Mechanism for CC Artifacts and Security Elements | — | — | — | [] | In Progress | 3 | 2 | 3 | 4 | F | — | 1.0 | active | MRS-030 MRS-036 |
SRS-028 | Automated Rationale and Traceability Matrix Generation | — | — | — | [] | In Progress | 4 | 3 | 1 | 3 | F | — | 1.0 | active | MRS-032 |
SRS-029 | Verification of Rationales and Traceability Matrices | — | — | — | [] | Not Started | 4 | 3 | 1 | 3 | F | — | 1.0 | active | MRS-032 |
SRS-030 | Detailed Consistency and Completeness Checks | — | — | — | [] | Open | 4 | 3 | 1 | 3 | F | — | 1.0 | active | MRS-032 |
SRS-031 | Automated Validation of Relationships, Attributes, and Dependencies | — | — | — | [] | Open | 4 | 3 | 1 | 3 | F | — | 1.0 | active | MRS-032 |
SRS-057 | Doorstop artifact publish and export pipeline | — | — | — | [] | In Progress | 3 | 2 | 1 | 2 | F | — | 1.0 | active | MRS-003 MRS-010 |
SRS-061 | Code-level traceability, tag-based filtering, and modular architecture | — | — | — | [] | In Progress | 3 | 2 | 1 | 2 | C | — | 1.0 | active | MRS-027 MRS-029 MRS-058 |
SRS-033 | API Provision for Threat Importation | — | — | — | [] | Open | 3 | 2 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-041 |
SRS-034 | Transformation of Imported Threats to CC-conformant Format | — | — | — | [] | Open | 3 | 2 | 1 | — | F | — | 1.0 | active | MRS-032 MRS-041 |
SRS-032 | Seamless Aggregation and Presentation of SARs and Work Units | — | — | — | ['MRS-030'] | In Progress | 4 | 3 | 1 | 3 | F | — | 1.0 | active | MRS-032 |
SRS-035 | Automated Evaluation Checklist Creation | — | — | — | ['SRS-034'] | In Progress | 3 | 1 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-043 |
SRS-036 | Evaluation Progress Tracking | — | — | — | [{'SRS-035': None}] | In Progress | 3 | 1 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-043 |
SRS-037 | Work Unit Artifact Linking | — | — | — | ['SRS-035'] | Open | 4 | 3 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-043 |
SRS-038 | Automated OR Generation | — | — | — | ['SRS-037', 'SRS-036', 'SRS-035'] | Open | 3 | 2 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-043 |
SRS-039 | Automated ETR Generation | — | — | — | ['SRS-035', 'SRS-036', 'SRS-037', 'SRS-038'] | Open | 3 | 2 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-043 |
SRS-040 | Flagging and Addressing Failed Work Units with Cascading Flags | — | — | — | ['SRS-037', 'SRS-036'] | Open | 3 | 2 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-043 |
SRS-041 | Logging evaluated Work Units | — | — | — | ['SRS-036'] | In Progress | 3 | 2 | 1 | 3 | F | — | 1.0 | active | MRS-032 MRS-043 |
SRS-042 | Extend Data Model Across Entire CC Ecosystem | — | — | — | [] | Open | 3 | 1 | 1 | 3 | N | — | 1.0 | active | MRS-032 |
SRS-043 | Provide CC Document Templates | — | — | — | ['SRS-042'] | Open | 3 | 2 | 1 | — | F | — | 1.0 | active | MRS-032 |
SRS-046 | Create threat model from Doorstop architecture artifacts | — | — | — | [] | In Progress | 4 | 3 | 2 | 3 | F | — | 2.0 | active | MRS-031 MRS-033 |
SRS-047 | Doorstop architecture item format for threat model input | — | — | — | [] | Stable | 5 | 3 | 3 | 2 | C | — | 2.0 | active | MRS-031 MRS-033 |
SRS-048 | Generate CPSSA Markdown report from threat model | — | — | — | [] | In Progress | 4 | 3 | 2 | 2 | F | — | 2.0 | active | MRS-031 MRS-035 |
SRS-049 | Generate PlantUML Data Flow Diagram from architecture items | — | — | — | [] | In Progress | 5 | 3 | 2 | 2 | F | — | 2.0 | active | MRS-001 MRS-034 |
SRS-050 | Generate FAIR risk analysis input template | — | — | — | [] | In Progress | 5 | 3 | 2 | 2 | F | — | 2.0 | active | MRS-035 MRS-054 |
SRS-051 | Run FAIR-based quantitative risk analysis | — | — | — | [] | In Progress | 5 | 3 | 1 | 3 | F | — | 2.0 | active | MRS-035 MRS-054 |
SRS-052 | Risk analysis output artifacts: CSV results and Markdown summary | — | — | — | [] | In Progress | 4 | 3 | 1 | 3 | F | — | 2.0 | active | MRS-035 MRS-054 |
SRS-053 | Generate interactive HTML graph for Doorstop specifications navigation | — | — | — | [] | Open | 3 | 2 | 2 | 2 | F | — | 1.0 | active | MRS-001 MRS-034 |
SRS-CCT | CC Component Search & Export | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-VAL | Component Validation | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-INF | Infrastructure & Tooling | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-CPL | Compliance & Project Management | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-KNO | Knowledge Base | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-DAT | Data Management & Storage | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-TRZ | Traceability & Consistency | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-THR | Threat Management | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-EVL | Evaluation Management | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-DOC | CC Data Model & Documents | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
SRS-CPS | CPSSA Threat Modelling & Risk Analysis | — | — | — | [] | — | — | — | — | — | — | — | — | active | — |
| UID | Title | Active | Parent links |
|---|---|---|---|
SWD-001 | CCT class diagram | active | ARC-003 ARC-004 |
SWD-002 | C5-DEC CAD classes | active | ARC-003 ARC-004 |
SWD-003 | C5-DEC CAD packages | active | ARC-003 ARC-004 |
SWD-018 | Centralized settings module | active | ARC-003 |
SWD-004 | C5-DEC CCT data model part 1 | active | ARC-003 ARC-004 |
SWD-005 | C5-DEC CCT data model part 2 | active | ARC-003 ARC-004 |
SWD-006 | C5-DEC CCT Doorstop metadata | active | ARC-003 ARC-004 |
SWD-007 | C5-DEC CCT Doorstop Markdown body | active | ARC-003 ARC-004 |
SWD-008 | C5-DEC CCT security functional class | active | ARC-003 ARC-004 |
SWD-009 | C5-DEC CCT security assurance class | active | ARC-003 ARC-004 |
SWD-010 | C5-DEC CCT element operations | active | ARC-003 ARC-004 |
SWD-011 | C5-DEC CCT CEM evaluation activities | active | ARC-003 ARC-004 |
SWD-012 | C5-DEC CCT sec. assurance and eval. act. dependencies | active | ARC-003 ARC-004 |
SWD-013 | C5-DEC CCT generic Doorstop document | active | ARC-003 ARC-004 |
SWD-014 | C5-DEC CCT security target data model | active | ARC-003 ARC-004 |
SWD-015 | CRA module class diagram | active | ARC-003 ARC-004 |
SWD-016 | SBOM module design | active | ARC-003 ARC-004 |
SWD-017 | DocEngine template types and configuration design | active | ARC-003 |
SWD-019 | Doorstop ingestion helpers | active | ARC-009 |
SWD-020 | Threagile mapping layer | active | ARC-009 |
SWD-021 | Threat model generation — `create_threat_model()` | active | ARC-009 |
SWD-022 | CPSSA report generation — `generate_cpssa_report()` | active | ARC-009 |
SWD-023 | DFD generation — `generate_dfd()` | active | ARC-009 |
SWD-024 | FAIR input template generation — `generate_fair_input_template()` | active | ARC-009 |
SWD-025 | Quantitative risk analysis — `run_quantitative_risk_analysis()` | active | ARC-009 |
SWD-026 | Sidecar files and Doorstop field conventions | active | ARC-009 |
SWD-027 | CPSSA orchestration and CLI integration | active | ARC-009 |
SWD-CLS | Class and package structure | active | — |
SWD-DAT | CCT data model | active | — |
SWD-SEC | Security classes and evaluation | active | — |
SWD-DOC | Document models | active | — |
SWD-MOD | CRA and SBOM compliance modules | active | — |
SWD-DOCENG | DocEngine template design | active | — |
SWD-DARC | CPSSA TARA integration design | active | — |
| UID | Title | Platform | Precondition | Expected outcome | Verification method | Release | Execution type | Complexity | Test data | Version | Source prefix | Source uid | Active | Parent links |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
TCS-059 | CC database and knowledge base | — | — | — | — | beta | — | — | — | — | TST | TST-CDB | inactive | — |
TCS-094 | Deployment and knowledge base | — | — | — | — | stable | — | — | — | — | TSS | TSS-DEP | active | — |
TCS-010 | Inspect CC Database-DTD mapping | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Inspection | alpha | — | — | — | — | TST | TST-010 | active | SRS-022 |
TCS-064 | TC: Test containerized deployment on x86-64 | GNU/Linux x86-64 (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | see referenced files | 1.0 | TSS | TSS-001 | active | SRS-005 |
TCS-011 | Test correctness of CC Database | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | Exported or viewed data correctly reflects content and relationships as defined in the CC PDF. | Test | alpha | — | — | — | — | TST | TST-011 | active | SRS-022 |
TCS-035 | Run the GUI from the CLI with option `--gui` | Any of MacOS, Windows, GNU/Linux | c5dec has been successfully installed | The GUI of the CCT module opens in the default browser | Test | beta | — | — | — | — | TST | TST-035 | active | — |
TCS-001 | Test accessing and browsing the CC Database | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | c5dec installed | (i) No errors encountered while browsing the database. (ii) Randomly sampled selection data corresponds to description in the respective Common Criteria PDF. | Test | alpha | — | — | — | — | TST | TST-001 | active | SRS-001 |
TCS-003 | Test exporting Security Components | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | a working doorstop repository | File containing respective Security Requirements correctly exported according to specified settings. | Test | alpha | — | — | — | — | TST | TST-003 | active | SRS-003 |
TCS-002 | Test query the CC Database | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | C5Dec installed | — | Test | alpha | — | — | — | — | TST | TST-002 | active | SRS-002 |
TCS-005 | Test navigating the Knowledge Base | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Review | alpha | — | — | — | — | TST | TST-005 | active | SRS-014 |
TCS-006 | Test comprehensiveness of Knowledge Base | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Review | alpha | — | — | — | — | TST | TST-006 | active | SRS-016 |
TCS-004 | Test tailoring Security Requirements | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | — | alpha | — | — | — | — | TST | TST-004 | active | SRS-004 |
TCS-065 | TC: Test containerized deployment on arm64 | GNU/Linux arm64 (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | see referenced files | 1.0 | TSS | TSS-002 | active | SRS-005 |
TCS-066 | TC: Test PQ cryptography container | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 1 | see referenced files | 1.0 | TSS | TSS-003 | active | SRS-008 |
TCS-067 | TC: Test DocEngine | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 1 | see referenced files | 1.0 | TSS | TSS-004 | active | SRS-007 |
TCS-076 | TC: Test DocEngine CRA technical documentation template | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-013 | active | SRS-007 |
TCS-077 | TC: Test DocEngine presentation template | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 1 | N/A | 1.0 | TSS | TSS-014 | active | SRS-007 |
TCS-007 | Test interconnection of Knowledge Base | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Review | alpha | — | — | — | — | TST | TST-007 | active | SRS-016 |
TCS-008 | Test currency of Knowledge Base | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Review | alpha | — | — | — | — | TST | TST-008 | active | SRS-017 |
TCS-009 | Test cosmetic features of Knowledge Base | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | — | alpha | — | — | — | — | TST | TST-009 | active | SRS-019 SRS-020 SRS-021 |
TCS-063 | Data transformation and standards compliance | — | — | — | — | beta | — | — | — | — | TST | TST-TRF | inactive | — |
TCS-096 | Foundations and data sources | — | — | — | — | stable | — | — | — | — | TSS | TSS-PRJ | active | — |
TCS-068 | TC: Test the creation of an empty C5-DEC-based project | GNU/Linux, Windows | — | — | Test (T), Inspection (I) | stable | Manual | 1 | N/A | 1.0 | TSS | TSS-005 | active | SRS-006 |
TCS-069 | TC: Test build and run of new project via scripts | GNU/Linux | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-006 | active | SRS-006 |
TCS-070 | TC: Test new project in VS Code | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-007 | active | SRS-006 |
TCS-015 | Test availabilty of CSA Article 51 defined Security Objectives | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-015 | active | SRS-026 |
TCS-016 | Test uniformity of storage mechanisms in CCT module | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | All internally stored CC artefacts are stored in C5-DEC document-based data storage format and can be managed centrally. | Test | alpha | — | — | — | — | TST | TST-016 | active | SRS-027 |
TCS-012 | Test validity and conistency of bidirectional transformation | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Validate any/all CC XML independently against the DTD file (./c5dec/assets/database/SecurityControls/cc3<revision>.xml) | All exported CC XML files are valid and identical. | Test | alpha | — | — | — | — | TST | TST-012 | active | SRS-022 SRS-023 |
TCS-013 | Test threats, risks, and countermeasures database | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-013 | active | SRS-024 |
TCS-014 | Test EUCC support | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-014 | active | SRS-025 |
TCS-037 | User manual contains guides for functionality added in Beta | Any of MacOS, Windows, GNU/Linux | — | The information in the user manual is correct and reflects the updates made for the Beta release. | Review | beta | — | — | — | — | TST | TST-037 | active | — |
TCS-060 | Evaluation toolbox | — | — | — | — | beta | — | — | — | — | TST | TST-EVL | inactive | — |
TCS-095 | CRA, SBOM, CCT and PRM | — | — | — | — | stable | — | — | — | — | TSS | TSS-MOD | active | — |
TCS-026 | Test Work Unit-Artifact linking | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Run TST-024 prior to have access to an Evaluation Checklist. | — | Test | alpha | — | — | — | — | TST | TST-026 | active | SRS-037 |
TCS-071 | TC: Test time report conversion from OpenProject CSV | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 1 | see referenced files | 1.0 | TSS | TSS-008 | active | SRS-009 |
TCS-027 | Test automated generation of Observation Reports | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Run TST-024 prior to have access to an Evaluation Checklist. | — | Test | alpha | — | — | — | — | TST | TST-027 | active | SRS-038 |
TCS-028 | Test automated generation of Evaluation Technical Report | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Run TST-024 prior to have access to an Evaluation Checklist. | — | Test | alpha | — | — | — | — | TST | TST-028 | active | SRS-039 |
TCS-029 | Test flagging failed Work Units and affected artifacts | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Run TST-024 prior to have access to an Evaluation Checklist. | — | Test | alpha | — | — | — | — | TST | TST-029 | active | SRS-040 |
TCS-030 | Test auditability of Evaluation Items | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Run TST-024 prior to have access to an Evaluation Checklist. | — | Test | alpha | — | — | — | — | TST | TST-030 | active | SRS-041 |
TCS-031 | Test extended data model | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-031 | active | SRS-042 |
TCS-032 | Test CC templates | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-032 | active | SRS-043 |
TCS-033 | Test hierarchies and dependencies of Security Component sets | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | - Valid selections are detected as valid selections.\n - invalid selection are detected to be invalid and the potentially valid set matches the\ respective corrected set | Test | alpha | — | — | — | — | TST | TST-033 | active | SRS-044 |
TCS-034 | Test generation of Impact Analysis Report | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-034 | active | SRS-045 |
TCS-017 | Test automated rationale and traceability matrix generation | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-017 | active | SRS-028 |
TCS-018 | Test verificaiton of rationales and traceability matrices | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-018 | active | SRS-029 |
TCS-072 | TC: Test timesheet consolidation and cost report generation | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 1 | see referenced files | 1.0 | TSS | TSS-009 | active | SRS-010 |
TCS-019 | Test automated consistency and completeness checks | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-019 | active | SRS-030 |
TCS-020 | Test automated validation | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-020 | active | SRS-031 |
TCS-021 | Test aggregation of SARs and Work Units | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Evaluation checklist created and stored. | — | Test | alpha | — | — | — | — | TST | TST-021 | active | SRS-032 |
TCS-022 | Test API provision for threat import | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-022 | active | SRS-033 |
TCS-023 | Test transforming imported threats to CC-conformant format | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | — | Test | alpha | — | — | — | — | TST | TST-023 | active | SRS-034 |
TCS-024 | Test automated creation of Evaluation Checklist | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | — | (i) Successfully created Evaluation Checklist for the valid set (ii) Invalid set successfully detected to be invalid. (iii) Successfully created Evaluation Checklist for the augmented set (iv) Evaluation Evidence Documentation Index created for valid sets and stored under `./evaluations/<prefix>` | Test | alpha | — | — | — | — | TST | TST-024 | active | SRS-035 |
TCS-025 | Test evaluation progress tracking | WSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04 | Run TST-024 prior to have access to an Evaluation Checklist. | — | Test | alpha | — | — | — | — | TST | TST-025 | active | SRS-036 |
TCS-036 | Run the GUI from the CLI with option `-g` | Any of MacOS, Windows, GNU/Linux | Run this test immediatly after TST-035 | The GUI of the CCT module opens in the default browser | Test | beta | — | — | — | — | TST | TST-036 | active | — |
TCS-038 | Browse the CC database in the GUI | Any of MacOS, Windows, GNU/Linux | The GUI has been launched from the terminal | Upon selection of an item, the subsequent dropdown list is updated automatically as described in the test steps. | Test | beta | — | — | — | — | TST | TST-038 | active | — |
TCS-039 | The CC browser displays the content of the selected items | Any of MacOS, Windows, GNU/Linux | The GUI has been launched from the terminal | (i)The content displayed in the text area provides information about the selected items. (ii) The content in the toggle area corresponds to the text displayed in the text area. | Test | beta | — | — | — | — | TST | TST-039 | active | — |
TCS-073 | TC: Test ISMS folder content verification | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T), Inspection (I) | stable | Manual | 1 | see referenced files | 1.0 | TSS | TSS-010 | active | SRS-011 |
TCS-074 | TC: Test SBOM generation, import, diff, and validation | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-011 | active | SRS-012 |
TCS-075 | TC: Test CRA compliance checklist generation and export | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-012 | active | SRS-013 |
TCS-078 | TC: Test CRA checklist category filtering | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-015 | active | SRS-013 |
TCS-079 | TC: Test CRA SBOM auto-verification | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-016 | active | SRS-013 |
TCS-080 | TC: Test SBOM import to Doorstop and validate completeness | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | tests/content/ (sample CycloneDX JSON) | 1.0 | TSS | TSS-017 | active | SRS-012 |
TCS-081 | TC: Test SBOM SPDX format and Syft-not-installed error path | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-018 | active | SRS-012 |
TCS-061 | GUI and CLI interface | — | — | — | — | beta | — | — | — | — | TST | TST-IFC | inactive | — |
TCS-093 | Cryptography, CCT and SSDLC | — | — | — | — | stable | — | — | — | — | TSS | TSS-CRYPT | active | — |
TCS-044 | GUI: create spreadsheet eval checklist - SAR class CCv2022R1 | Any of MacOS, Windows, GNU/Linux | The GUI has been launched from the terminal | (i) A folder containing markdown files corresponding to the checklist items of ALC is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units from the ALC class. (iii) A success message appears in the GUI. | Test, Review | beta | — | — | — | — | TST | TST-044 | active | — |
TCS-082 | TC: Test SHA-256 hash computation and verification | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 1 | N/A | 1.0 | TSS | TSS-019 | active | SRS-012 |
TCS-045 | GUI: create spreadsheet eval checklist - all classes of CC2022R1 | Any of MacOS, Windows, GNU/Linux | The GUI has been launched from the terminal | (i) A folder containing markdown files corresponding to the checklist items of all the classes in CCv2022R1 is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units in CCv2022R1. (iii) A success message appears in the GUI. | Test, Review | beta | — | — | — | — | TST | TST-045 | active | — |
TCS-046 | Navigate using the links in the GUI | Any of MacOS, Windows, GNU/Linux | — | All the links are valid and link to the expected websites or pages as per the description (text of the link). | Test | beta | — | — | — | — | TST | TST-046 | active | — |
TCS-047 | CLI export spreadsheet eval form - all SAR classes CCv3.1R5 | Any of MacOS, Windows, GNU/Linux | c5dec has been succesfully installed | All the expected outcomes described in the test steps are observed. | Test | beta | — | — | — | — | TST | TST-047 | active | — |
TCS-048 | CLI export spreadsheet eval form - all SAR classes CC2022R1 | Any of MacOS, Windows, GNU/Linux | c5dec has been succesfully installed | A spreadsheet containing all the work units in CCv2022R1 is created at `$C5DEC_ROOT/c5dec/checklist-<yyyymmdd>-<hhmmss>` | Test | beta | — | — | — | — | TST | TST-048 | active | — |
TCS-049 | CLI export spreadsheet eval form - some SAR classes CCv3.1R5 | Any of MacOS, Windows, GNU/Linux | — | The evaluation checklist for classes ACE and AVA of CCv3.1R5 is created in a spreadsheet at '$C5DEC_ROOT/c5dec | Test | beta | — | — | — | — | TST | TST-049 | active | — |
TCS-050 | CLI export spreadsheet eval form - some SAR classes CC2022R1 | Any of MacOS, Windows, GNU/Linux | — | The evaluation checklist for classes ACE and AVA of CC2022R1 is created in a spreadsheet at '$C5DEC_ROOT/c5dec | Test | beta | — | — | — | — | TST | TST-050 | active | — |
TCS-051 | Export command: messages for invalid input | Any of MacOS, Windows, GNU/Linux | — | All the commands display an error message informing the user about the cause of the error | Test | beta | — | — | — | — | TST | TST-051 | active | — |
TCS-052 | CLI: export spreadsheet eval form - set SAR comp. CCv3.1R5 | Any of MacOS, Windows, GNU/Linux | — | The expected outcomes described in the steps are observed | Test | beta | — | — | — | — | TST | TST-052 | active | — |
TCS-053 | CLI export spreadsheet eval form - set SAR comp. CCv2022R1 | Any of MacOS, Windows, GNU/Linux | — | An evaluation checklists for components ACO_REL.1 and ALC_COMP.1 of CCv2022R1 is created in a spreadsheet at `$C5DEC_ROOT/c5dec` | Test | beta | — | — | — | — | TST | TST-053 | active | — |
TCS-054 | Generate default parts of an ETR document | Any of MacOS, Windows, GNU/Linux | c5dec has been successfully installed | The expected outcomes described in the steps are observed | Test | beta | — | — | — | — | TST | TST-054 | active | — |
TCS-083 | TC: Test Shamir's Secret Sharing split and recovery | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-020 | active | SRS-054 |
TCS-055 | Generate specific parts of an ETR document | Any of MacOS, Windows, GNU/Linux | — | (i)A file named `<family>-analysis.qmd` is created per each selected family, with the content corresponding to the evaluation checklist of the assurance family. (ii) The file `Acronyms-table.md` is created too. All the files are stored in the folder `$C5DEC_ROOT/c5dec/assets/etr/output`. | Test | beta | — | — | — | — | TST | TST-055 | active | — |
TCS-056 | Generate ETR report template using C5-DEC DocEngine | Any of MacOS, Windows, GNU/Linux | The VS Code extension for [Quarto](https://quarto.org/) must be installed | The following output is created at the folder `$c5DEC_ROOT/c5dec/assets/etr/etr_template/_output`: (i) `Single-Evaluation-Technical-Report.pdf` (ii) `Single-Evaluation-Technical-Report.docx` (iii) html files corresponding to the report in HTML format | Test | beta | — | — | — | — | TST | TST-056 | active | — |
TCS-057 | Generate parts of ETR report with exported evaluation checklist | Any of MacOS, Windows, GNU/Linux | — | Generated Markdown files with data from ALC_LCD are stored at `$C5DEC_ROOT/c5dec/assets/etr/output` | Test | beta | — | — | — | — | TST | TST-057 | active | — |
TCS-058 | Publish the project assets in HTML and Markdown | Any of MacOS, Windows, GNU/Linux | Assets have been created with Doorstop | N/A - command currently disabled (feature_flag OFF) | Test | beta | — | — | — | — | TST | TST-058 | active | — |
TCS-084 | TC: Test GPG file signing and signature verification | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-021 | active | SRS-055 |
TCS-085 | TC: Test GPG file encryption and decryption | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-022 | active | SRS-055 |
TCS-086 | TC: Test NaCl Ed25519 key generation, signing, and verification | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-023 | active | SRS-056 |
TCS-040 | Copy content in markdown from the CC browser text area | Any of MacOS, Windows, GNU/Linux | The GUI has been launched from the terminal | The copied text is pasted into the text editor. | Test | beta | — | — | — | — | TST | TST-040 | active | — |
TCS-041 | Expand text including info of all descendents of selected item | Any of MacOS, Windows, GNU/Linux | — | All the descendants (families, components, elements) of a selected item are displayed | Test | beta | — | — | — | — | TST | TST-041 | active | — |
TCS-042 | GUI: create spreadsheet eval checklist - SAR class of CCv3.1R5 | Any of MacOS, Windows, GNU/Linux | The GUI has been launched from the terminal | (i) A folder containing markdown files corresponding to the checklist items of ALC is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units from the ALC class. (iii) A success message appears in the GUI. | Test, Review | beta | — | — | — | — | TST | TST-042 | active | — |
TCS-043 | GUI: create spreadsheet eval checklist - all classes of CCv3.1R5 | Any of MacOS, Windows, GNU/Linux | The GUI has been launched from the terminal | (i) A folder containing markdown files corresponding to the checklist items of all the classes in CCv3.1R5 is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units in CCv3.1R5. (iii) A success message appears in the GUI. | Test, Review | beta | — | — | — | — | TST | TST-043 | active | — |
TCS-062 | Document generation and publishing | — | — | — | — | beta | — | — | — | — | TST | TST-RPT | inactive | — |
TCS-092 | CPSSA — cyber-physical system security analysis | — | — | — | — | stable | — | — | — | — | TSS | TSS-CPSS | active | — |
TCS-087 | TC: Test CPSSA threat model generation — Threagile format | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 3 | N/A | 1.0 | TSS | TSS-024 | active | SRS-046 SRS-047 |
TCS-088 | TC: Test CPSSA threat model generation — pytm formats | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-025 | active | SRS-046 |
TCS-089 | TC: Test CPSSA Markdown report generation | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-026 | active | SRS-048 |
TCS-090 | TC: Test PlantUML DFD generation from ARC items | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 2 | N/A | 1.0 | TSS | TSS-027 | active | SRS-049 |
TCS-091 | TC: Test FAIR risk input template and quantitative risk analysis | GNU/Linux (Dockerized C5-DEC deployment environment) | — | — | Test (T) | stable | Manual | 3 | N/A | 1.0 | TSS | TSS-028 | active | SRS-050 SRS-051 SRS-052 |
| UID | Title | Test date | Tester | Defect category | Passed steps | Failed steps | Not executed steps | Release version | Verification method | Release | Source prefix | Source uid | Active | Parent links |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
TRP-035 | CC database and knowledge base | — | — | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-CDB | inactive | — |
TRP-072 | GUI launch and user manual | — | — | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-GUI | inactive | — |
TRP-097 | Deployment and KB test results | — | — | 0 — flawless | — | — | — | — | — | stable | TRS | TRS-DEP | active | — |
TRP-001 | Accessing and browsing the CC database | 2023-11-27 | IVS | 1 — insignificant | — | — | — | — | — | alpha | TRA | TRA-001 | active | TCS-001 |
TRP-010 | CC database-DTD mapping inspection | 2023-11-28 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-010 | active | TCS-010 |
TRP-011 | Correctness of the CC database | 2023-11-28 | IVS | 2 — minor | — | — | — | — | — | alpha | TRA | TRA-011 | active | TCS-011 |
TRP-038 | Running GUI from CLI with --gui option | 2024-07-14 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-001 | active | TCS-035 |
TRP-039 | Running GUI from CLI with -g option | 2024-07-14 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-002 | active | TCS-036 |
TRP-074 | TCER: containerized deployment arm64 | 2025-05-02 | IVS | 0 — flawless | 5 | 0 | 0 | 1.0 | T | stable | TRS | TRS-002 | active | TCS-065 |
TRP-040 | User manual coverage for beta release functionality | 2024-07-16 | IVS | 2 — minor | — | — | — | — | — | beta | TRB | TRB-003 | active | TCS-037 |
TRP-075 | TCER: PQ cryptography container | 2025-05-02 | IVS | 0 — flawless | 5 | 0 | 0 | 1.0 | T | stable | TRS | TRS-003 | active | TCS-066 |
TRP-076 | TCER: Test DocEngine | 2025-05-02 | IVS | 0 — flawless | 3 | 0 | 0 | 1.0 | T | stable | TRS | TRS-004 | active | TCS-067 |
TRP-073 | TCER: containerized deployment x86-64 | 2025-05-02 | IVS | 0 — flawless | 6 | 0 | 0 | 1.0 | T | stable | TRS | TRS-001 | active | TCS-064 |
TRP-080 | TCER: DocEngine presentation template | 2026-03-01 | AAT | 0 — flawless | 8 | 0 | 0 | 1.0 | T | stable | TRS | TRS-014 | active | TCS-077 |
TRP-002 | Querying the CC database | 2023-11-27 | IVS | 1 — insignificant | — | — | — | — | — | alpha | TRA | TRA-002 | active | TCS-002 |
TRP-003 | Exporting security components | 2023-11-29 | IVS | 1 — insignificant | — | — | — | — | — | alpha | TRA | TRA-003 | active | TCS-003 |
TRP-004 | Tailoring security requirements | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-004 | active | TCS-004 |
TRP-005 | Navigating the knowledge base | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-005 | active | TCS-005 |
TRP-006 | Comprehensiveness of the knowledge base | 2023-11-28 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-006 | active | TCS-006 |
TRP-007 | Interconnection of the knowledge base | 2023-11-28 | IVS | 2 — minor | — | — | — | — | — | alpha | TRA | TRA-007 | active | TCS-007 |
TRP-008 | Currency of the knowledge base | 2023-11-28 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-008 | active | TCS-008 |
TRP-009 | Cosmetic features of the knowledge base | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-009 | active | TCS-009 |
TRP-037 | Data transformation and standards | — | — | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-TRF | inactive | — |
TRP-069 | CC browser interaction | — | — | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-CCB | inactive | — |
TRP-099 | Foundations and data sources test results | — | — | 0 — flawless | — | — | — | — | — | stable | TRS | TRS-PRJ | active | — |
TRP-012 | Validity and consistency of bidirectional transformation | 2023-11-28 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-012 | active | TCS-012 |
TRP-041 | Browsing CC database in GUI | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-004 | active | TCS-038 |
TRP-077 | TCER: creation of empty C5-DEC-based project | 2025-05-06 | IVS | 0 — flawless | 4 | 0 | 0 | 1.0 | T, I | stable | TRS | TRS-005 | active | TCS-068 |
TRP-042 | CC browser display of selected item content | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-005 | active | TCS-039 |
TRP-078 | TCER: build and run an empty created project | 2025-05-06 | IVS | 0 — flawless | 7 | 0 | 0 | 1.0 | T | stable | TRS | TRS-006 | active | TCS-069 |
TRP-043 | Copying content in markdown from CC browser | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-006 | active | TCS-040 |
TRP-079 | TCER: New project in VS Code | 2025-05-06 | IVS | 0 — flawless | 4 | 0 | 0 | 1.0 | T | stable | TRS | TRS-007 | active | TCS-070 |
TRP-044 | Expanding item content with descendant information | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-007 | active | TCS-041 |
TRP-045 | GUI evaluation checklist creation for CCv3.1R5 assurance class | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-008 | active | TCS-042 |
TRP-013 | Threats, risks, and countermeasures database | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-013 | active | TCS-013 |
TRP-014 | EUCC support | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-014 | active | TCS-014 |
TRP-015 | CSA Article 51 security objectives availability | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-015 | active | TCS-015 |
TRP-016 | Uniformity of storage mechanisms in CCT module | 2023-11-30 | Arash | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-016 | active | TCS-016 |
TRP-046 | GUI evaluation checklist creation for all CCv3.1R5 classes | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-009 | active | TCS-043 |
TRP-047 | GUI evaluation checklist creation for CCv2022R1 assurance class | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-010 | active | TCS-044 |
TRP-048 | GUI evaluation checklist creation for all CCv2022R1 classes | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-011 | active | TCS-045 |
TRP-049 | GUI link navigation | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-012 | active | TCS-046 |
TRP-036 | Evaluation toolbox | — | — | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-EVL | inactive | — |
TRP-071 | CLI evaluation checklist export | — | — | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-EXP | inactive | — |
TRP-098 | CRA, SBOM, CCT and PRM test results | — | — | 0 — flawless | — | — | — | — | — | stable | TRS | TRS-MOD | active | — |
TRP-017 | Automated rationale and traceability matrix generation | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-017 | active | TCS-017 |
TRP-026 | Work unit-artifact linking | 2023-11-27 | AAT | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-026 | active | TCS-026 |
TRP-027 | Automated generation of observation reports | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-027 | active | TCS-027 |
TRP-028 | Automated generation of evaluation technical report | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-028 | active | TCS-028 |
TRP-029 | Flagging failed work units and affected artifacts | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-029 | active | TCS-029 |
TRP-030 | Auditability of evaluation items | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-030 | active | TCS-030 |
TRP-031 | Extended data model | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-031 | active | TCS-031 |
TRP-032 | CC templates | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-032 | active | TCS-032 |
TRP-033 | Validation of hierarchies and dependencies of security component sets | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-033 | active | TCS-033 |
TRP-034 | Generation of impact analysis report | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-034 | active | TCS-034 |
TRP-050 | CLI evaluation checklist export for all CCv3.1R5 classes | 2024-07-15 | IVS | 1 — insignificant | — | — | — | — | — | beta | TRB | TRB-013 | active | TCS-047 |
TRP-018 | Verification of rationales and traceability matrices | 2023-11-29 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-018 | active | TCS-018 |
TRP-051 | CLI evaluation checklist export for all CCv2022R1 classes | 2024-07-15 | IVS | 1 — insignificant | — | — | — | — | — | beta | TRB | TRB-014 | active | TCS-048 |
TRP-052 | CLI evaluation checklist export for selected CCv3.1R5 classes | 2024-07-15 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-015 | active | TCS-049 |
TRP-053 | CLI evaluation checklist export for selected CCv2022R1 classes | 2024-07-16 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-016 | active | TCS-050 |
TRP-054 | Export command invalid input error messages | 2024-07-15 | IVS | 3 — major | — | — | — | — | — | beta | TRB | TRB-017 | active | TCS-051 |
TRP-055 | CLI evaluation checklist export for CCv3.1R5 components | 2024-07-16 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-018 | active | TCS-052 |
TRP-081 | TCER: CRA checklist category filtering | 2026-03-01 | AAT | 0 — flawless | 13 | 0 | 0 | 1.0 | T | stable | TRS | TRS-015 | active | TCS-078 |
TRP-056 | CLI evaluation checklist export for CCv2022R1 components | 2024-07-16 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-019 | active | TCS-053 |
TRP-082 | TCER: CRA SBOM auto-verification | 2026-03-01 | AAT | 0 — flawless | 8 | 0 | 0 | 1.0 | T | stable | TRS | TRS-016 | active | TCS-079 |
TRP-083 | TCER: SBOM import to Doorstop and validate completeness | 2026-03-01 | AAT | 0 — flawless | 9 | 0 | 0 | 1.0 | T | stable | TRS | TRS-017 | active | TCS-080 |
TRP-084 | TCER: SBOM SPDX format and Syft-not-installed error path | 2026-03-01 | AAT | 0 — flawless | 11 | 0 | 0 | 1.0 | T | stable | TRS | TRS-018 | active | TCS-081 |
TRP-019 | Automated consistency and completeness checks | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-019 | active | TCS-019 |
TRP-020 | Automated validation | 2023-11-27 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-020 | active | TCS-020 |
TRP-021 | Aggregation of SARs and work units | 2023-11-27 | IVS | 3 — major | — | — | — | — | — | alpha | TRA | TRA-021 | active | TCS-021 |
TRP-022 | API provision for threat import | 2023-11-28 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-022 | active | TCS-022 |
TRP-023 | Transforming imported threats to CC-conformant format | 2023-11-28 | IVS | 0 — flawless | — | — | — | — | — | alpha | TRA | TRA-023 | active | TCS-023 |
TRP-024 | Automated creation of evaluation checklist | 2023-11-27 | IVS | 2 — minor | — | — | — | — | — | alpha | TRA | TRA-024 | active | TCS-024 |
TRP-025 | Evaluation progress tracking | 2023-11-29 | IVS | 4 — critical | — | — | — | — | — | alpha | TRA | TRA-025 | active | TCS-025 |
TRP-070 | ETR generation and publishing | — | — | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-ETR | inactive | — |
TRP-096 | Cryptography, CCT and SSDLC test results | — | — | 0 — flawless | — | — | — | — | — | stable | TRS | TRS-CRYPT | active | — |
TRP-057 | Default ETR document parts generation | 2024-07-16 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-020 | active | TCS-054 |
TRP-089 | TCER: NaCl Ed25519 key generation, signing, and verification | 2026-03-01 | AAT | 0 — flawless | 13 | 0 | 0 | 1.0 | T | stable | TRS | TRS-023 | active | TCS-086 |
TRP-058 | Specific ETR document parts generation | 2024-07-16 | IVS | 1 — insignificant | — | — | — | — | — | beta | TRB | TRB-021 | active | TCS-055 |
TRP-059 | ETR report template generation via DocEngine | 2024-07-16 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-022 | active | TCS-056 |
TRP-060 | ETR generation from exported evaluation checklist | 2024-07-16 | IVS | 3 — major | — | — | — | — | — | beta | TRB | TRB-023 | active | TCS-057 |
TRP-061 | Publishing project assets in HTML and Markdown | 2024-07-16 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-024 | active | TCS-058 |
TRP-085 | TCER: SHA-256 hash computation and verification | 2026-03-01 | AAT | 0 — flawless | 9 | 0 | 0 | 1.0 | T | stable | TRS | TRS-019 | active | TCS-082 |
TRP-086 | TCER: Shamir's Secret Sharing split and recovery | 2026-03-01 | AAT | 0 — flawless | 13 | 0 | 0 | 1.0 | T | stable | TRS | TRS-020 | active | TCS-083 |
TRP-087 | TCER: GPG file signing and signature verification | 2026-03-01 | AAT | 0 — flawless | 9 | 0 | 0 | 1.0 | T | stable | TRS | TRS-021 | active | TCS-084 |
TRP-088 | TCER: GPG file encryption and decryption | 2026-03-01 | AAT | 0 — flawless | 8 | 0 | 0 | 1.0 | T | stable | TRS | TRS-022 | active | TCS-085 |
TRP-095 | CPSSA test results | — | — | 0 — flawless | — | — | — | — | — | stable | TRS | TRS-CPSS | active | — |
TRP-090 | TCER: CPSSA threat model generation — Threagile format | 2026-03-01 | AAT | 0 — flawless | 8 | 0 | 0 | 1.0 | T | stable | TRS | TRS-024 | active | TCS-087 |
TRP-104 | TCER: CRA compliance checklist generation and export | 2026-03-10 | AAT | 0 — flawless | 7 | 0 | 0 | 1.2 | T | stable | TRS | TRS-033 | active | TCS-075 |
TRP-105 | TCER: DocEngine CRA technical documentation template | 2026-03-10 | AAT | 0 — flawless | 9 | 0 | 0 | 1.2 | T | stable | TRS | TRS-034 | active | TCS-076 |
TRP-091 | TCER: CPSSA threat model generation — pytm formats | 2026-03-01 | AAT | 0 — flawless | 9 | 0 | 0 | 1.0 | T | stable | TRS | TRS-025 | active | TCS-088 |
TRP-092 | TCER: CPSSA Markdown report generation | 2026-03-01 | AAT | 0 — flawless | 7 | 0 | 0 | 1.0 | T | stable | TRS | TRS-026 | active | TCS-089 |
TRP-093 | TCER: PlantUML DFD generation from ARC items | 2026-03-01 | AAT | 0 — flawless | 8 | 0 | 0 | 1.0 | T | stable | TRS | TRS-027 | active | TCS-090 |
TRP-094 | TCER: FAIR risk input template and quantitative risk analysis | 2026-03-01 | AAT | 0 — flawless | 11 | 0 | 0 | 1.0 | T | stable | TRS | TRS-028 | active | TCS-091 |
TRP-100 | TCER: Time report conversion from OpenProject CSV | 2026-03-10 | AAT | 0 — flawless | 6 | 0 | 0 | 1.2 | T | stable | TRS | TRS-029 | active | TCS-071 |
TRP-101 | TCER: Timesheet consolidation and cost report generation | 2026-03-10 | AAT | 0 — flawless | 7 | 0 | 0 | 1.2 | T | stable | TRS | TRS-030 | active | TCS-072 |
TRP-102 | TCER: ISMS folder content verification | 2026-03-10 | AAT | 0 — flawless | 6 | 0 | 0 | 1.2 | T, I | stable | TRS | TRS-031 | active | TCS-073 |
TRP-103 | TCER: SBOM generation, import, diff, and validation | 2026-03-10 | AAT | 0 — flawless | 7 | 0 | 0 | 1.2 | T | stable | TRS | TRS-032 | active | TCS-074 |
TRP-062 | ETR generation from exported checklist (re-test after fix) | 2024-07-18 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-025 | inactive | TCS-057 |
TRP-063 | Export command invalid input messages (re-test after fix) | 2024-07-18 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-026 | inactive | TCS-051 |
TRP-064 | CLI CCv2022R1 all-classes checklist export (re-test after fix) | 2024-07-18 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-027 | inactive | TCS-048 |
TRP-065 | CLI CCv3.1R5 all-classes checklist export (re-test after fix) | 2024-07-18 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-028 | inactive | TCS-047 |
TRP-066 | GUI CCv3.1R5 class checklist creation (re-test after fix) | 2024-07-18 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-029 | inactive | TCS-042 |
TRP-067 | GUI all CCv3.1R5 classes checklist creation (re-test after fix) | 2024-07-18 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-030 | active | TCS-043 |
TRP-068 | User manual beta release coverage (re-test after fix) | 2024-07-18 | IVS | 0 — flawless | — | — | — | — | — | beta | TRB | TRB-031 | inactive | TCS-037 |