Tactics
Techniques
Countermeasures
Countermeasures
Space Segment Control Tailoring
NIST References
ISO IEC 27001
NASA Best Practice Guide
D3FEND
Tactics
Technqiues
Artifacts
Resources
SPARTA User Guide
TTP Recommended Practices
General Information
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Indicators of Behavior
Spacecraft Functional Decomposition
Space System Cybersecurity Questionnaire
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Tools
Navigator
Countermeasure Mapper
Control Mapper
Spacecraft Mapper
JSON Creator
Notional Risk Scores
Attack Flow (
Code
|
Tool
)
Search
COUNTERMEASURES
SPARTA by DiD Layer
Data
TEMPEST
Shared Resource Leakage
Machine Learning Data Integrity
On-board Message Encryption
Spacecraft Software
Development Environment Security
Software Version Numbers
Update Software
Vulnerability Scanning
Software Bill of Materials
Dependency Confusion
Software Source Control
CWE List
Coding Standard
Dynamic Testing
Static Analysis
Software Digital Signature
Configuration Management
Session Termination
Least Privilege
Long Duration Testing
Operating System Security
Secure Command Mode(s)
Dummy Process - Aggregator Node
Process White Listing
Single Board Computer
Secure boot
Disable Physical Ports
Segmentation
Backdoor Commands
Error Detection and Correcting Memory
Resilient Position, Navigation, and Timing
Tamper Resistant Body
Power Randomization
Power Consumption Obfuscation
Secret Shares
Power Masking
Increase Clock Cycles/Timing
Dual Layer Protection
OSAM Dual Authorization
Communication Physical Medium
Protocol Update / Refactoring
IDS/IPS
Cloaking Safe-mode
On-board Intrusion Detection & Prevention
Robust Fault Management
Cyber-safe Mode
Fault Injection Redundancy
Model-based System Verification
Smart Contracts
Reinforcement Learning
Cryptography
COMSEC
Crypto Key Management
Authentication
Relay Protection
Traffic Flow Analysis Defense
Comms Link
TRANSEC
Ground
Ground-based Countermeasures
Monitor Critical Telemetry Points
Protect Authenticators
Physical Security Controls
Data Backup
Alternate Communications Paths
Prevention
Protect Sensitive Information
Security Testing Results
Threat Intelligence Program
Threat modeling
Criticality Analysis
Anti-counterfeit Hardware
Supplier Review
Original Component Manufacturer
ASIC/FPGA Manufacturing
Tamper Protection
User Training
Insider Threat Protection
Two-Person Rule
Distributed Constellations
Proliferated Constellations
Diversified Architectures
Space Domain Awareness
Space-Based Radio Frequency Mapping
Maneuverability
Stealth Technology
Defensive Jamming and Spoofing
Deception and Decoys
Antenna Nulling and Adaptive Filtering
Physical Seizure
Electromagnetic Shielding
Filtering and Shuttering
Defensive Dazzling/Blinding
Organizational Policy
Assessment & Authorization
Continuous Monitoring
Home
Countermeasure
Countermeasure Not Identified
Countermeasure Not Identified
No Applicable Countermeasures
Mappings
SPARTA Techniques Addressed by Countermeasures
Space Threats Addressed by Countermeasures
Sample Requirements
NIST Rev5 Controls
D3FEND Techniques
D3FEND Artifacts
None
ISO 27001
NASA Best Practice Guide
ESA Space Shield Mitigation
None
Related MITRE EMB3D Mitigations
No related MITRE EMB3D Mitigations
ID:
CM-NA
Created:
2025/04/15
Last Modified:
2025/04/15
Techniques Addressed by Countermeasure
ID
Name
Description
Space Threats Addressed by Countermeasure
ID
Description
Sample Requirements
Requirement
Rationale/Additional Guidance/Notes
×