Quick Start Guide

Get up and running with TARA Flow in 5 minutes

Last updated: December 13, 20245 min read

Before You Begin

Make sure you have an active TARA Flow account. If you don't have one yet, start your free trial.

Step 1: Upload Your First Diagram

TARA Flow works with any diagram format - whiteboard photos, Visio files, draw.io exports, or even hand-drawn sketches. Simply drag and drop your file into the upload area.

Supported formats include:

  • Images (PNG, JPG, WEBP)
  • PDF documents
  • Visio files (.vsdx)
  • Draw.io exports
  • Lucidchart exports

Step 2: AI-Powered Analysis

Once uploaded, TARA Flow's AI automatically:

  • Identifies all components and connections
  • Classifies component types (ECUs, sensors, networks, etc.)
  • Maps trust boundaries
  • Detects potential attack surfaces

Analysis typically completes in under 30 seconds, depending on diagram complexity.

Step 3: Generate Threat Model

Click "Generate TARA" to create a comprehensive threat model based on your selected compliance standard:

typescriptยทexample-output.ts
// Example threat model output structure
{
  "threats": [
    {
      "id": "T-001",
      "category": "Spoofing",
      "component": "CAN Bus Interface",
      "severity": "High",
      "attackVector": "Physical access",
      "mitigations": [
        "M-001: Implement message authentication",
        "M-002: Enable secure boot"
      ]
    }
  ],
  "compliance": {
    "standard": "ISO 21434",
    "coverage": 94,
    "gaps": ["Work Product WP-06-02"]
  }
}

Step 4: Export and Share

Export your completed threat model in multiple formats:

  • PDF Report - Audit-ready documentation
  • Excel - For further analysis
  • JSON/XML - Integration with other tools
  • STRIDE Format - Microsoft Threat Modeling compatible

You're Ready!

Congratulations! You've created your first threat model with TARA Flow. Continue to the Platform Overview to learn about advanced features.

Next Steps

Was this page helpful?