Specification Browser

428 items across 6 document types — generated 2026-03-11

UIDTitleTypeVmRationaleImportanceUrgencyRiskDifficultyActiveParent links
MRS-001Diagram generation toolFREfficiency and programmable diagram generation541active
MRS-010Requirements traceabilityFTSee Mission Analysis551active
MRS-002Unified repository storageFTTo facilitate interlinking of assets551active
MRS-003Open file formatFTSee Mission Analysis551active
MRS-004Unique artifact IDsFTTo ensure traceability551active
MRS-005Requirements management toolFTSee Mission Analysis551active
MRS-006Artifact linking featureFTTo facilitate interlinking551active
MRS-007Version control systemFRSee Mission Analysis551active
MRS-008Use Git softwareFRMaturity, features, widely available tool support and documentation551active
MRS-009Requirement hierarchiesFTSee Mission Analysis551active
MRS-011V&V test featuresFTSee Mission Analysis531active
MRS-012Testing framework integrationFRSee Mission Analysis551active
MRS-013Artifact taggingFTSee Mission Analysis431active
MRS-014Project management featureFTSee Mission Analysis441active
MRS-015Time report consolidationFTSee Mission Analysis441active
MRS-016ISMS folder verificationFTSee Mission Analysis221active
MRS-059Enforce user managementSRSee Mission Analysis.541active
MRS-017Import/export artifactsFTSee Mission Analysis531active
MRS-018Collaboration featureFRSee Mission Analysis541active
MRS-019User managementFRSee Mission Analysis541active
MRS-020User authenticationFRSee Mission Analysis541active
MRS-021User authorizationFRSee Mission Analysis541active
MRS-022Access control levelsFRSee Mission Analysis541active
MRS-023Web-based asset sharingFRSee Mission Analysis541active
MRS-057Use web dev platformARTo build on existing well-established solutions and cut unneeded effort551active
MRS-024Secret sharing featureFTSee Mission Analysis321active
MRS-025File integrity checkFTSee Mission Analysis331active
MRS-046File signing featureFTSee Mission Analysis431active
MRS-047PQC encryption featureFTSee Mission Analysis.324active
MRS-027Link requirements to codeFTSee Mission Analysis111active
MRS-028Search and filterFTEase of use and efficiency511active
MRS-029Filter by tagsFTEase of use and efficiency531active
MRS-030Store SFRs/SARsFTSee Mission Analysis531active
MRS-043Automate OR/ETR generationFTSee Mission Analysis311active
MRS-044EUCC evaluation supportFTSee Mission Analysis311active
MRS-045Store CSA objectivesFTSee Mission Analysis311active
MRS-032Provide CCT implementationFTSee Mission Analysis431active
MRS-036Store CC classesFTSee Mission Analysis; risk related to availability3233active
MRS-037Adopt CC storage formatFTSee Mission Analysis; risk related to change in XML DTD413active
MRS-038Transform CC contentFTSee Mission Analysis313active
MRS-039Maintain CC knowledge baseFTSee Mission Analysis431active
MRS-040CC forum and FAQFTSee Mission Analysis221active
MRS-041Threats and risks DBFTSee Mission Analysis421active
MRS-042Threat DB sourcesFTSee Mission Analysis321active
MRS-031Threat modelling solutionFRSee Mission Analysis431active
MRS-033Threat modelling toolFRSee Mission Analysis431active
MRS-034Export design assetsFTSee Mission Analysis521active
MRS-035Risk management toolFTSee Mission Analysis431active
MRS-054Include SRA modelCRSee Mission Analysis431active
MRS-060Store assets for TRICKITSee Mission Analysis.321active
MRS-048Include SDPM modelCRSee Mission Analysis551active
MRS-049Include VVPM modelCRSee Mission Analysis551active
MRS-050Include SPMM modelCRSee Mission Analysis551active
MRS-051Include SSDLC publicationCRSee Mission Analysis551active
MRS-052Include CC modelCRSee Mission Analysis541active
MRS-053Include CC-TMMCRSee Mission Analysis541active
MRS-055Define CC activitiesCRSee Mission Analysis431active
MRS-026Baseline module implementationFRProject constraints and assumptions, system overview531active
MRS-056Use NoSQL datastoreATPortability, interoperability, easy & effective integration in version control551active
MRS-058Follow modular designARSee Mission Analysis541active
MRS-061Integrate CRA requirements databaseFTEU Regulation 2024/2847 imposes structured security requirements on products with digital elements; a machine-readable local database enables offline compliance analysis.4412active
MRS-062Generate CRA compliance checklistFTCRA Article 13 requires manufacturers to demonstrate compliance; automated checklist generation with export capability reduces manual effort and enables traceability evidence.5412active
MRS-063Generate CRA technical documentation templateFTCRA Annex V requires manufacturers to supply structured technical documentation; a Quarto-based template pre-loaded with required sections reduces authoring overhead.4323active
MRS-064Generate SBOM using SyftFTCRA and supply-chain security best practices require a verified, up-to-date inventory of software components; Syft provides industry-standard SBOM generation in CycloneDX and SPDX formats.4412active
MRS-065Import SBOM into Doorstop traceabilityFTImporting SBOM components into the Doorstop traceability system enables bidirectional linking between SBOM artifacts and SSDLC requirements, supporting the CRA evidence trail.3312active
MRS-ARMArtifact managementactive
MRS-TVFTesting & verification featuresactive
MRS-PMGProject managementactive
MRS-UACUser access control, collaboration & ISMSactive
MRS-CRYCryptographyactive
MRS-SFTSearch, filter & code traceabilityactive
MRS-CCTCommon Criteria Toolboxactive
MRS-TRMThreat modelling & risk management (CPSSA)active
MRS-KNBKnowledge base & methodologyactive
MRS-NFRNon-functional requirements & architectureactive
MRS-CRACyber Resilience Act (CRA) compliance moduleactive
MRS-SBOMSoftware Bill of Materials (SBOM)active
UIDTitleActiveParent links
ARC-001C5-DEC CAD context diagramactiveMRS-058
ARC-002C5-DEC CAD functional treeactiveMRS-012 MRS-014 MRS-015 MRS-016 MRS-026 MRS-058
ARC-003C5-DEC CAD subsystems architectureactiveMRS-001 MRS-002 MRS-003 MRS-004 MRS-005 MRS-006 MRS-009 MRS-010 MRS-011 MRS-013 MRS-017 MRS-024 MRS-025 MRS-026 MRS-027 MRS-028 MRS-031 MRS-033 MRS-034 MRS-035 MRS-046 MRS-047 MRS-048 MRS-049 MRS-050 MRS-051 MRS-052 MRS-053 MRS-054 MRS-055 MRS-056 MRS-058
ARC-004C5-DEC CAD system architectureactiveMRS-001 MRS-002 MRS-003 MRS-005 MRS-007 MRS-008 MRS-011 MRS-013 MRS-018 MRS-019 MRS-020 MRS-021 MRS-022 MRS-023 MRS-026 MRS-029 MRS-033 MRS-034 MRS-035 MRS-040 MRS-041 MRS-044 MRS-056 MRS-057 MRS-058 MRS-059 MRS-060
ARC-006System context diagram (C4 level 1)activeMRS-058
ARC-007Container diagram (C4 level 2)activeMRS-058
ARC-008CCT module – class hierarchyactiveMRS-058
ARC-009CPSSA subsystem – component diagramactiveMRS-058
ARC-010Frontend layer – component diagramactiveMRS-058
ARC-011CC checklist creation – sequence diagramactiveMRS-058
ARC-012Deployment diagramactiveMRS-058
ARC-020Developer and operator workstationactiveMRS-058
ARC-021C5-DEC CLIactiveMRS-058
ARC-022C5-DEC TUIactiveMRS-058
ARC-023C5-DEC GUIactiveMRS-058
ARC-024CCT — Common Criteria Toolbox moduleactiveMRS-058
ARC-025SSDLC moduleactiveMRS-058
ARC-026Transformer moduleactiveMRS-058
ARC-027PM — Project management moduleactiveMRS-058
ARC-028CPSSA moduleactiveMRS-058
ARC-029Crypto moduleactiveMRS-058
ARC-030CRA moduleactiveMRS-058
ARC-031SBOM moduleactiveMRS-058
ARC-032ISMS moduleactiveMRS-058
ARC-033CC XML databaseactiveMRS-058
ARC-034Config and parameters storeactiveMRS-058
ARC-035Output artifact workspaceactiveMRS-058
ARC-036PQC cryptographic sidecaractiveMRS-058
ARC-037DocEngine containeractiveMRS-058
ARC-038Doorstop requirements manageractiveMRS-058
ARC-039GnuPG cryptographic engineactiveMRS-058
ARC-040Syft SBOM generatoractiveMRS-058
ARC-041OpenProject serveractiveMRS-058
assumptionsactive
threat-actorsactive
ARC-OVWSystem overviewactive
ARC-ARCArchitecture viewsactive
ARC-PMLPlantUML architecture diagramsactive
ARC-SECSecurity architecture — threat model layeractive
ARC-FRNFrontend layeractive
ARC-CORCore modulesactive
ARC-DATData storesactive
ARC-INFInfrastructure and sidecarsactive
ARC-EXTExternal systemsactive
UIDTitleAuthorAcceptanceDateDependenceStatusImportanceUrgencyRiskOutlayTypeRationaleVersionActiveParent links
SRS-001Access and Browse Database for CC Security Components[]In Progress5512F0.1activeMRS-030 MRS-036
SRS-002Query the Database of Security Components.['SRS-001']In Progress3312F0.1activeMRS-028 MRS-030 MRS-036
SRS-003Export Security Components['SRS-001', 'SRS-002']In Progress33F0.1activeMRS-053 MRS-055
SRS-004Tailor Security Requirements['SRS-003']Open331F0.1activeMRS-032 MRS-053 MRS-055
SRS-044Validate Hierarchies and Dependencies in Security Components[]In Progress3313F1.0activeMRS-032 MRS-053 MRS-055
SRS-045Generate Impact Analysis Reports for Certification Maintenance.[]Open222F1.0activeMRS-032 MRS-053 MRS-055
SRS-005Containerized Deployment via Docker DevContainer[]In Progress5512F1.0activeMRS-002 MRS-003 MRS-026
SRS-006SSDLC New Project Scaffolding['SRS-005']In Progress5513F1.0activeMRS-002 MRS-003 MRS-026
SRS-007DocEngine Report and Presentation Template Creation['SRS-005']In Progress4413F1.0activeMRS-003 MRS-026
SRS-008Post-Quantum Cryptography Container Deployment[]In Progress3323F1.0activeMRS-046 MRS-047
SRS-054Shamir's secret sharing split and recovery[]In Progress3222F1.0activeMRS-024
SRS-055GPG-based file signing, verification, and encryption[]In Progress3222F1.0activeMRS-046
SRS-056NaCl/Ed25519 key generation, signing, and verification[]In Progress3222F1.0activeMRS-046
SRS-058Doorstop and Git as artifact management infrastructure[]Active3111C1.0activeMRS-004 MRS-005 MRS-006 MRS-007 MRS-008 MRS-009 MRS-011 MRS-012 MRS-013
SRS-059Platform-delegated features (out of scope for custom implementation)[]Out of scope2111C1.0activeMRS-017 MRS-018 MRS-019 MRS-020 MRS-021 MRS-022 MRS-023 MRS-056 MRS-057 MRS-059 MRS-060
SRS-009Project Management Time Report Conversion[]In Progress4412F1.0activeMRS-014 MRS-015
SRS-010Project Management Timesheet Consolidation and Cost Reporting['SRS-009']In Progress4412F1.0activeMRS-015
SRS-011ISMS Folder Content Verification[]In Progress3312F1.0activeMRS-016
SRS-012SBOM Generation, Import, Diff, and Validation[]In Progress4423F1.0activeMRS-025 MRS-026 MRS-064 MRS-065
SRS-013CRA Annex I and V Compliance Checklist Generation and Export[]In Progress4423F1.0activeMRS-026 MRS-035 MRS-061 MRS-062 MRS-063
SRS-014Access and Navigation Through Knowledge Base[]In Progress4313F0.2activeMRS-032 MRS-039
SRS-015Comprehensive and User-Friendly Explanations[]In Progress4312F0.2activeMRS-032 MRS-039
SRS-016Interconnected Framework and Seamless Navigation[]In Progress4313F0.3activeMRS-032 MRS-039
SRS-017Availability of Pragmatic Guidance and Best Practices[]In Progress4313F0.2activeMRS-032 MRS-039
SRS-018Continuous Updates and Assurance of Current Information[]In Progress4312F0.2activeMRS-032 MRS-039
SRS-019Integration of Multimedia Elements in Knowledge Articles['SRS-014']Not Started2113F0.1activeMRS-032
SRS-020Integrating Links to FAQ Section['SRS-014']Not Started2212F0.1activeMRS-032 MRS-040
SRS-021Provision of General Link to a CC-Specific Forum['SRS-014']Not Started2211F0.1activeMRS-032 MRS-040
SRS-060SSDLC methodology models and secure development lifecycle content[]In Progress3212C1.0activeMRS-048 MRS-049 MRS-050 MRS-051 MRS-052
SRS-022Data Storage and Format Mapping[]In Progress4133F1.0activeMRS-032 MRS-037
SRS-023Bidirectional Transformation and Consistency[]In Progress3134F1.0activeMRS-032 MRS-038
SRS-024Threats, Risks, and Countermeasures Database[]Open4214F1.0activeMRS-041 MRS-042
SRS-025Support Mechanism for EUCC Additional Evaluation Evidence[]Open3114F1.0activeMRS-044
SRS-026Storing Generic Security Objectives of CSA Article 51[]Open3113F1.0activeMRS-045
SRS-027Unified Storage Mechanism for CC Artifacts and Security Elements[]In Progress3234F1.0activeMRS-030 MRS-036
SRS-028Automated Rationale and Traceability Matrix Generation[]In Progress4313F1.0activeMRS-032
SRS-029Verification of Rationales and Traceability Matrices[]Not Started4313F1.0activeMRS-032
SRS-030Detailed Consistency and Completeness Checks[]Open4313F1.0activeMRS-032
SRS-031Automated Validation of Relationships, Attributes, and Dependencies[]Open4313F1.0activeMRS-032
SRS-057Doorstop artifact publish and export pipeline[]In Progress3212F1.0activeMRS-003 MRS-010
SRS-061Code-level traceability, tag-based filtering, and modular architecture[]In Progress3212C1.0activeMRS-027 MRS-029 MRS-058
SRS-033API Provision for Threat Importation[]Open3213F1.0activeMRS-032 MRS-041
SRS-034Transformation of Imported Threats to CC-conformant Format[]Open321F1.0activeMRS-032 MRS-041
SRS-032Seamless Aggregation and Presentation of SARs and Work Units['MRS-030']In Progress4313F1.0activeMRS-032
SRS-035Automated Evaluation Checklist Creation['SRS-034']In Progress3113F1.0activeMRS-032 MRS-043
SRS-036Evaluation Progress Tracking[{'SRS-035': None}]In Progress3113F1.0activeMRS-032 MRS-043
SRS-037Work Unit Artifact Linking['SRS-035']Open4313F1.0activeMRS-032 MRS-043
SRS-038Automated OR Generation['SRS-037', 'SRS-036', 'SRS-035']Open3213F1.0activeMRS-032 MRS-043
SRS-039Automated ETR Generation['SRS-035', 'SRS-036', 'SRS-037', 'SRS-038']Open3213F1.0activeMRS-032 MRS-043
SRS-040Flagging and Addressing Failed Work Units with Cascading Flags['SRS-037', 'SRS-036']Open3213F1.0activeMRS-032 MRS-043
SRS-041Logging evaluated Work Units['SRS-036']In Progress3213F1.0activeMRS-032 MRS-043
SRS-042Extend Data Model Across Entire CC Ecosystem[]Open3113N1.0activeMRS-032
SRS-043Provide CC Document Templates['SRS-042']Open321F1.0activeMRS-032
SRS-046Create threat model from Doorstop architecture artifacts[]In Progress4323F2.0activeMRS-031 MRS-033
SRS-047Doorstop architecture item format for threat model input[]Stable5332C2.0activeMRS-031 MRS-033
SRS-048Generate CPSSA Markdown report from threat model[]In Progress4322F2.0activeMRS-031 MRS-035
SRS-049Generate PlantUML Data Flow Diagram from architecture items[]In Progress5322F2.0activeMRS-001 MRS-034
SRS-050Generate FAIR risk analysis input template[]In Progress5322F2.0activeMRS-035 MRS-054
SRS-051Run FAIR-based quantitative risk analysis[]In Progress5313F2.0activeMRS-035 MRS-054
SRS-052Risk analysis output artifacts: CSV results and Markdown summary[]In Progress4313F2.0activeMRS-035 MRS-054
SRS-053Generate interactive HTML graph for Doorstop specifications navigation[]Open3222F1.0activeMRS-001 MRS-034
SRS-CCTCC Component Search & Export[]active
SRS-VALComponent Validation[]active
SRS-INFInfrastructure & Tooling[]active
SRS-CPLCompliance & Project Management[]active
SRS-KNOKnowledge Base[]active
SRS-DATData Management & Storage[]active
SRS-TRZTraceability & Consistency[]active
SRS-THRThreat Management[]active
SRS-EVLEvaluation Management[]active
SRS-DOCCC Data Model & Documents[]active
SRS-CPSCPSSA Threat Modelling & Risk Analysis[]active
UIDTitleActiveParent links
SWD-001CCT class diagramactiveARC-003 ARC-004
SWD-002C5-DEC CAD classesactiveARC-003 ARC-004
SWD-003C5-DEC CAD packagesactiveARC-003 ARC-004
SWD-018Centralized settings moduleactiveARC-003
SWD-004C5-DEC CCT data model part 1activeARC-003 ARC-004
SWD-005C5-DEC CCT data model part 2activeARC-003 ARC-004
SWD-006C5-DEC CCT Doorstop metadataactiveARC-003 ARC-004
SWD-007C5-DEC CCT Doorstop Markdown bodyactiveARC-003 ARC-004
SWD-008C5-DEC CCT security functional classactiveARC-003 ARC-004
SWD-009C5-DEC CCT security assurance classactiveARC-003 ARC-004
SWD-010C5-DEC CCT element operationsactiveARC-003 ARC-004
SWD-011C5-DEC CCT CEM evaluation activitiesactiveARC-003 ARC-004
SWD-012C5-DEC CCT sec. assurance and eval. act. dependenciesactiveARC-003 ARC-004
SWD-013C5-DEC CCT generic Doorstop documentactiveARC-003 ARC-004
SWD-014C5-DEC CCT security target data modelactiveARC-003 ARC-004
SWD-015CRA module class diagramactiveARC-003 ARC-004
SWD-016SBOM module designactiveARC-003 ARC-004
SWD-017DocEngine template types and configuration designactiveARC-003
SWD-019Doorstop ingestion helpersactiveARC-009
SWD-020Threagile mapping layeractiveARC-009
SWD-021Threat model generation — `create_threat_model()`activeARC-009
SWD-022CPSSA report generation — `generate_cpssa_report()`activeARC-009
SWD-023DFD generation — `generate_dfd()`activeARC-009
SWD-024FAIR input template generation — `generate_fair_input_template()`activeARC-009
SWD-025Quantitative risk analysis — `run_quantitative_risk_analysis()`activeARC-009
SWD-026Sidecar files and Doorstop field conventionsactiveARC-009
SWD-027CPSSA orchestration and CLI integrationactiveARC-009
SWD-CLSClass and package structureactive
SWD-DATCCT data modelactive
SWD-SECSecurity classes and evaluationactive
SWD-DOCDocument modelsactive
SWD-MODCRA and SBOM compliance modulesactive
SWD-DOCENGDocEngine template designactive
SWD-DARCCPSSA TARA integration designactive
UIDTitlePlatformPreconditionExpected outcomeVerification methodReleaseExecution typeComplexityTest dataVersionSource prefixSource uidActiveParent links
TCS-059CC database and knowledge basebetaTSTTST-CDBinactive
TCS-094Deployment and knowledge basestableTSSTSS-DEPactive
TCS-010Inspect CC Database-DTD mappingWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04InspectionalphaTSTTST-010activeSRS-022
TCS-064TC: Test containerized deployment on x86-64GNU/Linux x86-64 (Dockerized C5-DEC deployment environment)Test (T)stableManual2see referenced files1.0TSSTSS-001activeSRS-005
TCS-011Test correctness of CC DatabaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Exported or viewed data correctly reflects content and relationships as defined in the CC PDF.TestalphaTSTTST-011activeSRS-022
TCS-035Run the GUI from the CLI with option `--gui`Any of MacOS, Windows, GNU/Linuxc5dec has been successfully installedThe GUI of the CCT module opens in the default browserTestbetaTSTTST-035active
TCS-001Test accessing and browsing the CC DatabaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04c5dec installed(i) No errors encountered while browsing the database. (ii) Randomly sampled selection data corresponds to description in the respective Common Criteria PDF.TestalphaTSTTST-001activeSRS-001
TCS-003Test exporting Security ComponentsWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04a working doorstop repositoryFile containing respective Security Requirements correctly exported according to specified settings.TestalphaTSTTST-003activeSRS-003
TCS-002Test query the CC DatabaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04C5Dec installedTestalphaTSTTST-002activeSRS-002
TCS-005Test navigating the Knowledge BaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04ReviewalphaTSTTST-005activeSRS-014
TCS-006Test comprehensiveness of Knowledge BaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04ReviewalphaTSTTST-006activeSRS-016
TCS-004Test tailoring Security RequirementsWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04alphaTSTTST-004activeSRS-004
TCS-065TC: Test containerized deployment on arm64GNU/Linux arm64 (Dockerized C5-DEC deployment environment)Test (T)stableManual2see referenced files1.0TSSTSS-002activeSRS-005
TCS-066TC: Test PQ cryptography containerGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual1see referenced files1.0TSSTSS-003activeSRS-008
TCS-067TC: Test DocEngineGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual1see referenced files1.0TSSTSS-004activeSRS-007
TCS-076TC: Test DocEngine CRA technical documentation templateGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-013activeSRS-007
TCS-077TC: Test DocEngine presentation templateGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual1N/A1.0TSSTSS-014activeSRS-007
TCS-007Test interconnection of Knowledge BaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04ReviewalphaTSTTST-007activeSRS-016
TCS-008Test currency of Knowledge BaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04ReviewalphaTSTTST-008activeSRS-017
TCS-009Test cosmetic features of Knowledge BaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04alphaTSTTST-009activeSRS-019 SRS-020 SRS-021
TCS-063Data transformation and standards compliancebetaTSTTST-TRFinactive
TCS-096Foundations and data sourcesstableTSSTSS-PRJactive
TCS-068TC: Test the creation of an empty C5-DEC-based projectGNU/Linux, WindowsTest (T), Inspection (I)stableManual1N/A1.0TSSTSS-005activeSRS-006
TCS-069TC: Test build and run of new project via scriptsGNU/LinuxTest (T)stableManual2N/A1.0TSSTSS-006activeSRS-006
TCS-070TC: Test new project in VS CodeGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-007activeSRS-006
TCS-015Test availabilty of CSA Article 51 defined Security ObjectivesWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-015activeSRS-026
TCS-016Test uniformity of storage mechanisms in CCT moduleWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04All internally stored CC artefacts are stored in C5-DEC document-based data storage format and can be managed centrally.TestalphaTSTTST-016activeSRS-027
TCS-012Test validity and conistency of bidirectional transformationWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Validate any/all CC XML independently against the DTD file (./c5dec/assets/database/SecurityControls/cc3<revision>.xml)All exported CC XML files are valid and identical.TestalphaTSTTST-012activeSRS-022 SRS-023
TCS-013Test threats, risks, and countermeasures databaseWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-013activeSRS-024
TCS-014Test EUCC supportWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-014activeSRS-025
TCS-037User manual contains guides for functionality added in BetaAny of MacOS, Windows, GNU/LinuxThe information in the user manual is correct and reflects the updates made for the Beta release.ReviewbetaTSTTST-037active
TCS-060Evaluation toolboxbetaTSTTST-EVLinactive
TCS-095CRA, SBOM, CCT and PRMstableTSSTSS-MODactive
TCS-026Test Work Unit-Artifact linkingWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Run TST-024 prior to have access to an Evaluation Checklist.TestalphaTSTTST-026activeSRS-037
TCS-071TC: Test time report conversion from OpenProject CSVGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual1see referenced files1.0TSSTSS-008activeSRS-009
TCS-027Test automated generation of Observation ReportsWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Run TST-024 prior to have access to an Evaluation Checklist.TestalphaTSTTST-027activeSRS-038
TCS-028Test automated generation of Evaluation Technical ReportWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Run TST-024 prior to have access to an Evaluation Checklist.TestalphaTSTTST-028activeSRS-039
TCS-029Test flagging failed Work Units and affected artifactsWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Run TST-024 prior to have access to an Evaluation Checklist.TestalphaTSTTST-029activeSRS-040
TCS-030Test auditability of Evaluation ItemsWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Run TST-024 prior to have access to an Evaluation Checklist.TestalphaTSTTST-030activeSRS-041
TCS-031Test extended data modelWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-031activeSRS-042
TCS-032Test CC templatesWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-032activeSRS-043
TCS-033Test hierarchies and dependencies of Security Component setsWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04- Valid selections are detected as valid selections.\n - invalid selection are detected to be invalid and the potentially valid set matches the\ respective corrected setTestalphaTSTTST-033activeSRS-044
TCS-034Test generation of Impact Analysis ReportWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-034activeSRS-045
TCS-017Test automated rationale and traceability matrix generationWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-017activeSRS-028
TCS-018Test verificaiton of rationales and traceability matricesWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-018activeSRS-029
TCS-072TC: Test timesheet consolidation and cost report generationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual1see referenced files1.0TSSTSS-009activeSRS-010
TCS-019Test automated consistency and completeness checksWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-019activeSRS-030
TCS-020Test automated validationWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-020activeSRS-031
TCS-021Test aggregation of SARs and Work UnitsWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Evaluation checklist created and stored.TestalphaTSTTST-021activeSRS-032
TCS-022Test API provision for threat importWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-022activeSRS-033
TCS-023Test transforming imported threats to CC-conformant formatWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04TestalphaTSTTST-023activeSRS-034
TCS-024Test automated creation of Evaluation ChecklistWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04(i) Successfully created Evaluation Checklist for the valid set (ii) Invalid set successfully detected to be invalid. (iii) Successfully created Evaluation Checklist for the augmented set (iv) Evaluation Evidence Documentation Index created for valid sets and stored under `./evaluations/<prefix>`TestalphaTSTTST-024activeSRS-035
TCS-025Test evaluation progress trackingWSL/GNU/Linux Ubuntu 20/Linux Ubuntu 22.04Run TST-024 prior to have access to an Evaluation Checklist.TestalphaTSTTST-025activeSRS-036
TCS-036Run the GUI from the CLI with option `-g`Any of MacOS, Windows, GNU/LinuxRun this test immediatly after TST-035The GUI of the CCT module opens in the default browserTestbetaTSTTST-036active
TCS-038Browse the CC database in the GUIAny of MacOS, Windows, GNU/LinuxThe GUI has been launched from the terminalUpon selection of an item, the subsequent dropdown list is updated automatically as described in the test steps.TestbetaTSTTST-038active
TCS-039The CC browser displays the content of the selected itemsAny of MacOS, Windows, GNU/LinuxThe GUI has been launched from the terminal(i)The content displayed in the text area provides information about the selected items. (ii) The content in the toggle area corresponds to the text displayed in the text area.TestbetaTSTTST-039active
TCS-073TC: Test ISMS folder content verificationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T), Inspection (I)stableManual1see referenced files1.0TSSTSS-010activeSRS-011
TCS-074TC: Test SBOM generation, import, diff, and validationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-011activeSRS-012
TCS-075TC: Test CRA compliance checklist generation and exportGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-012activeSRS-013
TCS-078TC: Test CRA checklist category filteringGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-015activeSRS-013
TCS-079TC: Test CRA SBOM auto-verificationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-016activeSRS-013
TCS-080TC: Test SBOM import to Doorstop and validate completenessGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2tests/content/ (sample CycloneDX JSON)1.0TSSTSS-017activeSRS-012
TCS-081TC: Test SBOM SPDX format and Syft-not-installed error pathGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-018activeSRS-012
TCS-061GUI and CLI interfacebetaTSTTST-IFCinactive
TCS-093Cryptography, CCT and SSDLCstableTSSTSS-CRYPTactive
TCS-044GUI: create spreadsheet eval checklist - SAR class CCv2022R1Any of MacOS, Windows, GNU/LinuxThe GUI has been launched from the terminal(i) A folder containing markdown files corresponding to the checklist items of ALC is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units from the ALC class. (iii) A success message appears in the GUI.Test, ReviewbetaTSTTST-044active
TCS-082TC: Test SHA-256 hash computation and verificationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual1N/A1.0TSSTSS-019activeSRS-012
TCS-045GUI: create spreadsheet eval checklist - all classes of CC2022R1Any of MacOS, Windows, GNU/LinuxThe GUI has been launched from the terminal(i) A folder containing markdown files corresponding to the checklist items of all the classes in CCv2022R1 is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units in CCv2022R1. (iii) A success message appears in the GUI.Test, ReviewbetaTSTTST-045active
TCS-046Navigate using the links in the GUIAny of MacOS, Windows, GNU/LinuxAll the links are valid and link to the expected websites or pages as per the description (text of the link).TestbetaTSTTST-046active
TCS-047CLI export spreadsheet eval form - all SAR classes CCv3.1R5Any of MacOS, Windows, GNU/Linuxc5dec has been succesfully installedAll the expected outcomes described in the test steps are observed.TestbetaTSTTST-047active
TCS-048CLI export spreadsheet eval form - all SAR classes CC2022R1Any of MacOS, Windows, GNU/Linuxc5dec has been succesfully installedA spreadsheet containing all the work units in CCv2022R1 is created at `$C5DEC_ROOT/c5dec/checklist-<yyyymmdd>-<hhmmss>`TestbetaTSTTST-048active
TCS-049CLI export spreadsheet eval form - some SAR classes CCv3.1R5Any of MacOS, Windows, GNU/LinuxThe evaluation checklist for classes ACE and AVA of CCv3.1R5 is created in a spreadsheet at '$C5DEC_ROOT/c5decTestbetaTSTTST-049active
TCS-050CLI export spreadsheet eval form - some SAR classes CC2022R1Any of MacOS, Windows, GNU/LinuxThe evaluation checklist for classes ACE and AVA of CC2022R1 is created in a spreadsheet at '$C5DEC_ROOT/c5decTestbetaTSTTST-050active
TCS-051Export command: messages for invalid inputAny of MacOS, Windows, GNU/LinuxAll the commands display an error message informing the user about the cause of the errorTestbetaTSTTST-051active
TCS-052CLI: export spreadsheet eval form - set SAR comp. CCv3.1R5Any of MacOS, Windows, GNU/LinuxThe expected outcomes described in the steps are observedTestbetaTSTTST-052active
TCS-053CLI export spreadsheet eval form - set SAR comp. CCv2022R1Any of MacOS, Windows, GNU/LinuxAn evaluation checklists for components ACO_REL.1 and ALC_COMP.1 of CCv2022R1 is created in a spreadsheet at `$C5DEC_ROOT/c5dec`TestbetaTSTTST-053active
TCS-054Generate default parts of an ETR documentAny of MacOS, Windows, GNU/Linuxc5dec has been successfully installedThe expected outcomes described in the steps are observedTestbetaTSTTST-054active
TCS-083TC: Test Shamir's Secret Sharing split and recoveryGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-020activeSRS-054
TCS-055Generate specific parts of an ETR documentAny of MacOS, Windows, GNU/Linux(i)A file named `<family>-analysis.qmd` is created per each selected family, with the content corresponding to the evaluation checklist of the assurance family. (ii) The file `Acronyms-table.md` is created too. All the files are stored in the folder `$C5DEC_ROOT/c5dec/assets/etr/output`.TestbetaTSTTST-055active
TCS-056Generate ETR report template using C5-DEC DocEngineAny of MacOS, Windows, GNU/LinuxThe VS Code extension for [Quarto](https://quarto.org/) must be installedThe following output is created at the folder `$c5DEC_ROOT/c5dec/assets/etr/etr_template/_output`: (i) `Single-Evaluation-Technical-Report.pdf` (ii) `Single-Evaluation-Technical-Report.docx` (iii) html files corresponding to the report in HTML formatTestbetaTSTTST-056active
TCS-057Generate parts of ETR report with exported evaluation checklistAny of MacOS, Windows, GNU/LinuxGenerated Markdown files with data from ALC_LCD are stored at `$C5DEC_ROOT/c5dec/assets/etr/output`TestbetaTSTTST-057active
TCS-058Publish the project assets in HTML and MarkdownAny of MacOS, Windows, GNU/LinuxAssets have been created with DoorstopN/A - command currently disabled (feature_flag OFF)TestbetaTSTTST-058active
TCS-084TC: Test GPG file signing and signature verificationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-021activeSRS-055
TCS-085TC: Test GPG file encryption and decryptionGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-022activeSRS-055
TCS-086TC: Test NaCl Ed25519 key generation, signing, and verificationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-023activeSRS-056
TCS-040Copy content in markdown from the CC browser text areaAny of MacOS, Windows, GNU/LinuxThe GUI has been launched from the terminalThe copied text is pasted into the text editor.TestbetaTSTTST-040active
TCS-041Expand text including info of all descendents of selected itemAny of MacOS, Windows, GNU/LinuxAll the descendants (families, components, elements) of a selected item are displayedTestbetaTSTTST-041active
TCS-042GUI: create spreadsheet eval checklist - SAR class of CCv3.1R5Any of MacOS, Windows, GNU/LinuxThe GUI has been launched from the terminal(i) A folder containing markdown files corresponding to the checklist items of ALC is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units from the ALC class. (iii) A success message appears in the GUI.Test, ReviewbetaTSTTST-042active
TCS-043GUI: create spreadsheet eval checklist - all classes of CCv3.1R5Any of MacOS, Windows, GNU/LinuxThe GUI has been launched from the terminal(i) A folder containing markdown files corresponding to the checklist items of all the classes in CCv3.1R5 is created at `$C5DEC_ROOT/evaluation`. (ii) A file with name format `chklist-<aaaammdd>-<hhmmss>-export-<aaaammdd>-<hhmmss>.xlsx` is created at `$C5DEC_ROOT/c5dec`; this file captures all the work units in CCv3.1R5. (iii) A success message appears in the GUI.Test, ReviewbetaTSTTST-043active
TCS-062Document generation and publishingbetaTSTTST-RPTinactive
TCS-092CPSSA — cyber-physical system security analysisstableTSSTSS-CPSSactive
TCS-087TC: Test CPSSA threat model generation — Threagile formatGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual3N/A1.0TSSTSS-024activeSRS-046 SRS-047
TCS-088TC: Test CPSSA threat model generation — pytm formatsGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-025activeSRS-046
TCS-089TC: Test CPSSA Markdown report generationGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-026activeSRS-048
TCS-090TC: Test PlantUML DFD generation from ARC itemsGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual2N/A1.0TSSTSS-027activeSRS-049
TCS-091TC: Test FAIR risk input template and quantitative risk analysisGNU/Linux (Dockerized C5-DEC deployment environment)Test (T)stableManual3N/A1.0TSSTSS-028activeSRS-050 SRS-051 SRS-052
UIDTitleTest dateTesterDefect categoryPassed stepsFailed stepsNot executed stepsRelease versionVerification methodReleaseSource prefixSource uidActiveParent links
TRP-035CC database and knowledge base0 — flawlessalphaTRATRA-CDBinactive
TRP-072GUI launch and user manual0 — flawlessbetaTRBTRB-GUIinactive
TRP-097Deployment and KB test results0 — flawlessstableTRSTRS-DEPactive
TRP-001Accessing and browsing the CC database2023-11-27IVS1 — insignificantalphaTRATRA-001activeTCS-001
TRP-010CC database-DTD mapping inspection2023-11-28IVS0 — flawlessalphaTRATRA-010activeTCS-010
TRP-011Correctness of the CC database2023-11-28IVS2 — minoralphaTRATRA-011activeTCS-011
TRP-038Running GUI from CLI with --gui option2024-07-14IVS0 — flawlessbetaTRBTRB-001activeTCS-035
TRP-039Running GUI from CLI with -g option2024-07-14IVS0 — flawlessbetaTRBTRB-002activeTCS-036
TRP-074TCER: containerized deployment arm642025-05-02IVS0 — flawless5001.0TstableTRSTRS-002activeTCS-065
TRP-040User manual coverage for beta release functionality2024-07-16IVS2 — minorbetaTRBTRB-003activeTCS-037
TRP-075TCER: PQ cryptography container2025-05-02IVS0 — flawless5001.0TstableTRSTRS-003activeTCS-066
TRP-076TCER: Test DocEngine2025-05-02IVS0 — flawless3001.0TstableTRSTRS-004activeTCS-067
TRP-073TCER: containerized deployment x86-642025-05-02IVS0 — flawless6001.0TstableTRSTRS-001activeTCS-064
TRP-080TCER: DocEngine presentation template2026-03-01AAT0 — flawless8001.0TstableTRSTRS-014activeTCS-077
TRP-002Querying the CC database2023-11-27IVS1 — insignificantalphaTRATRA-002activeTCS-002
TRP-003Exporting security components2023-11-29IVS1 — insignificantalphaTRATRA-003activeTCS-003
TRP-004Tailoring security requirements2023-11-27IVS0 — flawlessalphaTRATRA-004activeTCS-004
TRP-005Navigating the knowledge base2023-11-29IVS0 — flawlessalphaTRATRA-005activeTCS-005
TRP-006Comprehensiveness of the knowledge base2023-11-28IVS0 — flawlessalphaTRATRA-006activeTCS-006
TRP-007Interconnection of the knowledge base2023-11-28IVS2 — minoralphaTRATRA-007activeTCS-007
TRP-008Currency of the knowledge base2023-11-28IVS0 — flawlessalphaTRATRA-008activeTCS-008
TRP-009Cosmetic features of the knowledge base2023-11-29IVS0 — flawlessalphaTRATRA-009activeTCS-009
TRP-037Data transformation and standards0 — flawlessalphaTRATRA-TRFinactive
TRP-069CC browser interaction0 — flawlessbetaTRBTRB-CCBinactive
TRP-099Foundations and data sources test results0 — flawlessstableTRSTRS-PRJactive
TRP-012Validity and consistency of bidirectional transformation2023-11-28IVS0 — flawlessalphaTRATRA-012activeTCS-012
TRP-041Browsing CC database in GUI2024-07-15IVS0 — flawlessbetaTRBTRB-004activeTCS-038
TRP-077TCER: creation of empty C5-DEC-based project2025-05-06IVS0 — flawless4001.0T, IstableTRSTRS-005activeTCS-068
TRP-042CC browser display of selected item content2024-07-15IVS0 — flawlessbetaTRBTRB-005activeTCS-039
TRP-078TCER: build and run an empty created project2025-05-06IVS0 — flawless7001.0TstableTRSTRS-006activeTCS-069
TRP-043Copying content in markdown from CC browser2024-07-15IVS0 — flawlessbetaTRBTRB-006activeTCS-040
TRP-079TCER: New project in VS Code2025-05-06IVS0 — flawless4001.0TstableTRSTRS-007activeTCS-070
TRP-044Expanding item content with descendant information2024-07-15IVS0 — flawlessbetaTRBTRB-007activeTCS-041
TRP-045GUI evaluation checklist creation for CCv3.1R5 assurance class2024-07-15IVS0 — flawlessbetaTRBTRB-008activeTCS-042
TRP-013Threats, risks, and countermeasures database2023-11-27IVS0 — flawlessalphaTRATRA-013activeTCS-013
TRP-014EUCC support2023-11-27IVS0 — flawlessalphaTRATRA-014activeTCS-014
TRP-015CSA Article 51 security objectives availability2023-11-27IVS0 — flawlessalphaTRATRA-015activeTCS-015
TRP-016Uniformity of storage mechanisms in CCT module2023-11-30Arash0 — flawlessalphaTRATRA-016activeTCS-016
TRP-046GUI evaluation checklist creation for all CCv3.1R5 classes2024-07-15IVS0 — flawlessbetaTRBTRB-009activeTCS-043
TRP-047GUI evaluation checklist creation for CCv2022R1 assurance class2024-07-15IVS0 — flawlessbetaTRBTRB-010activeTCS-044
TRP-048GUI evaluation checklist creation for all CCv2022R1 classes2024-07-15IVS0 — flawlessbetaTRBTRB-011activeTCS-045
TRP-049GUI link navigation2024-07-15IVS0 — flawlessbetaTRBTRB-012activeTCS-046
TRP-036Evaluation toolbox0 — flawlessalphaTRATRA-EVLinactive
TRP-071CLI evaluation checklist export0 — flawlessbetaTRBTRB-EXPinactive
TRP-098CRA, SBOM, CCT and PRM test results0 — flawlessstableTRSTRS-MODactive
TRP-017Automated rationale and traceability matrix generation2023-11-29IVS0 — flawlessalphaTRATRA-017activeTCS-017
TRP-026Work unit-artifact linking2023-11-27AAT0 — flawlessalphaTRATRA-026activeTCS-026
TRP-027Automated generation of observation reports2023-11-29IVS0 — flawlessalphaTRATRA-027activeTCS-027
TRP-028Automated generation of evaluation technical report2023-11-27IVS0 — flawlessalphaTRATRA-028activeTCS-028
TRP-029Flagging failed work units and affected artifacts2023-11-29IVS0 — flawlessalphaTRATRA-029activeTCS-029
TRP-030Auditability of evaluation items2023-11-29IVS0 — flawlessalphaTRATRA-030activeTCS-030
TRP-031Extended data model2023-11-27IVS0 — flawlessalphaTRATRA-031activeTCS-031
TRP-032CC templates2023-11-27IVS0 — flawlessalphaTRATRA-032activeTCS-032
TRP-033Validation of hierarchies and dependencies of security component sets2023-11-29IVS0 — flawlessalphaTRATRA-033activeTCS-033
TRP-034Generation of impact analysis report2023-11-27IVS0 — flawlessalphaTRATRA-034activeTCS-034
TRP-050CLI evaluation checklist export for all CCv3.1R5 classes2024-07-15IVS1 — insignificantbetaTRBTRB-013activeTCS-047
TRP-018Verification of rationales and traceability matrices2023-11-29IVS0 — flawlessalphaTRATRA-018activeTCS-018
TRP-051CLI evaluation checklist export for all CCv2022R1 classes2024-07-15IVS1 — insignificantbetaTRBTRB-014activeTCS-048
TRP-052CLI evaluation checklist export for selected CCv3.1R5 classes2024-07-15IVS0 — flawlessbetaTRBTRB-015activeTCS-049
TRP-053CLI evaluation checklist export for selected CCv2022R1 classes2024-07-16IVS0 — flawlessbetaTRBTRB-016activeTCS-050
TRP-054Export command invalid input error messages2024-07-15IVS3 — majorbetaTRBTRB-017activeTCS-051
TRP-055CLI evaluation checklist export for CCv3.1R5 components2024-07-16IVS0 — flawlessbetaTRBTRB-018activeTCS-052
TRP-081TCER: CRA checklist category filtering2026-03-01AAT0 — flawless13001.0TstableTRSTRS-015activeTCS-078
TRP-056CLI evaluation checklist export for CCv2022R1 components2024-07-16IVS0 — flawlessbetaTRBTRB-019activeTCS-053
TRP-082TCER: CRA SBOM auto-verification2026-03-01AAT0 — flawless8001.0TstableTRSTRS-016activeTCS-079
TRP-083TCER: SBOM import to Doorstop and validate completeness2026-03-01AAT0 — flawless9001.0TstableTRSTRS-017activeTCS-080
TRP-084TCER: SBOM SPDX format and Syft-not-installed error path2026-03-01AAT0 — flawless11001.0TstableTRSTRS-018activeTCS-081
TRP-019Automated consistency and completeness checks2023-11-27IVS0 — flawlessalphaTRATRA-019activeTCS-019
TRP-020Automated validation2023-11-27IVS0 — flawlessalphaTRATRA-020activeTCS-020
TRP-021Aggregation of SARs and work units2023-11-27IVS3 — majoralphaTRATRA-021activeTCS-021
TRP-022API provision for threat import2023-11-28IVS0 — flawlessalphaTRATRA-022activeTCS-022
TRP-023Transforming imported threats to CC-conformant format2023-11-28IVS0 — flawlessalphaTRATRA-023activeTCS-023
TRP-024Automated creation of evaluation checklist2023-11-27IVS2 — minoralphaTRATRA-024activeTCS-024
TRP-025Evaluation progress tracking2023-11-29IVS4 — criticalalphaTRATRA-025activeTCS-025
TRP-070ETR generation and publishing0 — flawlessbetaTRBTRB-ETRinactive
TRP-096Cryptography, CCT and SSDLC test results0 — flawlessstableTRSTRS-CRYPTactive
TRP-057Default ETR document parts generation2024-07-16IVS0 — flawlessbetaTRBTRB-020activeTCS-054
TRP-089TCER: NaCl Ed25519 key generation, signing, and verification2026-03-01AAT0 — flawless13001.0TstableTRSTRS-023activeTCS-086
TRP-058Specific ETR document parts generation2024-07-16IVS1 — insignificantbetaTRBTRB-021activeTCS-055
TRP-059ETR report template generation via DocEngine2024-07-16IVS0 — flawlessbetaTRBTRB-022activeTCS-056
TRP-060ETR generation from exported evaluation checklist2024-07-16IVS3 — majorbetaTRBTRB-023activeTCS-057
TRP-061Publishing project assets in HTML and Markdown2024-07-16IVS0 — flawlessbetaTRBTRB-024activeTCS-058
TRP-085TCER: SHA-256 hash computation and verification2026-03-01AAT0 — flawless9001.0TstableTRSTRS-019activeTCS-082
TRP-086TCER: Shamir's Secret Sharing split and recovery2026-03-01AAT0 — flawless13001.0TstableTRSTRS-020activeTCS-083
TRP-087TCER: GPG file signing and signature verification2026-03-01AAT0 — flawless9001.0TstableTRSTRS-021activeTCS-084
TRP-088TCER: GPG file encryption and decryption2026-03-01AAT0 — flawless8001.0TstableTRSTRS-022activeTCS-085
TRP-095CPSSA test results0 — flawlessstableTRSTRS-CPSSactive
TRP-090TCER: CPSSA threat model generation — Threagile format2026-03-01AAT0 — flawless8001.0TstableTRSTRS-024activeTCS-087
TRP-104TCER: CRA compliance checklist generation and export2026-03-10AAT0 — flawless7001.2TstableTRSTRS-033activeTCS-075
TRP-105TCER: DocEngine CRA technical documentation template2026-03-10AAT0 — flawless9001.2TstableTRSTRS-034activeTCS-076
TRP-091TCER: CPSSA threat model generation — pytm formats2026-03-01AAT0 — flawless9001.0TstableTRSTRS-025activeTCS-088
TRP-092TCER: CPSSA Markdown report generation2026-03-01AAT0 — flawless7001.0TstableTRSTRS-026activeTCS-089
TRP-093TCER: PlantUML DFD generation from ARC items2026-03-01AAT0 — flawless8001.0TstableTRSTRS-027activeTCS-090
TRP-094TCER: FAIR risk input template and quantitative risk analysis2026-03-01AAT0 — flawless11001.0TstableTRSTRS-028activeTCS-091
TRP-100TCER: Time report conversion from OpenProject CSV2026-03-10AAT0 — flawless6001.2TstableTRSTRS-029activeTCS-071
TRP-101TCER: Timesheet consolidation and cost report generation2026-03-10AAT0 — flawless7001.2TstableTRSTRS-030activeTCS-072
TRP-102TCER: ISMS folder content verification2026-03-10AAT0 — flawless6001.2T, IstableTRSTRS-031activeTCS-073
TRP-103TCER: SBOM generation, import, diff, and validation2026-03-10AAT0 — flawless7001.2TstableTRSTRS-032activeTCS-074
TRP-062ETR generation from exported checklist (re-test after fix)2024-07-18IVS0 — flawlessbetaTRBTRB-025inactiveTCS-057
TRP-063Export command invalid input messages (re-test after fix)2024-07-18IVS0 — flawlessbetaTRBTRB-026inactiveTCS-051
TRP-064CLI CCv2022R1 all-classes checklist export (re-test after fix)2024-07-18IVS0 — flawlessbetaTRBTRB-027inactiveTCS-048
TRP-065CLI CCv3.1R5 all-classes checklist export (re-test after fix)2024-07-18IVS0 — flawlessbetaTRBTRB-028inactiveTCS-047
TRP-066GUI CCv3.1R5 class checklist creation (re-test after fix)2024-07-18IVS0 — flawlessbetaTRBTRB-029inactiveTCS-042
TRP-067GUI all CCv3.1R5 classes checklist creation (re-test after fix)2024-07-18IVS0 — flawlessbetaTRBTRB-030activeTCS-043
TRP-068User manual beta release coverage (re-test after fix)2024-07-18IVS0 — flawlessbetaTRBTRB-031inactiveTCS-037