Quick Start Guide
Get up and running with TARA Flow in 5 minutes
Before You Begin
Make sure you have an active TARA Flow account. If you don't have one yet, start your free trial.
Step 1: Upload Your First Diagram
TARA Flow works with any diagram format - whiteboard photos, Visio files, draw.io exports, or even hand-drawn sketches. Simply drag and drop your file into the upload area.
Supported formats include:
- Images (PNG, JPG, WEBP)
- PDF documents
- Visio files (.vsdx)
- Draw.io exports
- Lucidchart exports
Step 2: AI-Powered Analysis
Once uploaded, TARA Flow's AI automatically:
- Identifies all components and connections
- Classifies component types (ECUs, sensors, networks, etc.)
- Maps trust boundaries
- Detects potential attack surfaces
Analysis typically completes in under 30 seconds, depending on diagram complexity.
Step 3: Generate Threat Model
Click "Generate TARA" to create a comprehensive threat model based on your selected compliance standard:
// Example threat model output structure
{
"threats": [
{
"id": "T-001",
"category": "Spoofing",
"component": "CAN Bus Interface",
"severity": "High",
"attackVector": "Physical access",
"mitigations": [
"M-001: Implement message authentication",
"M-002: Enable secure boot"
]
}
],
"compliance": {
"standard": "ISO 21434",
"coverage": 94,
"gaps": ["Work Product WP-06-02"]
}
}Step 4: Export and Share
Export your completed threat model in multiple formats:
- PDF Report - Audit-ready documentation
- Excel - For further analysis
- JSON/XML - Integration with other tools
- STRIDE Format - Microsoft Threat Modeling compatible
You're Ready!
Congratulations! You've created your first threat model with TARA Flow. Continue to the Platform Overview to learn about advanced features.
Next Steps
Was this page helpful?