AC-17(4) - Remote Access | Privileged Commands and Access

(a) Authorize the execution of privileged commands and access to security-relevant information via remote access only in a format that provides assessable evidence and for the following needs: [Assignment: organization-defined needs]; and (b) Document the rationale for remote access in the security plan for the system.


ID: AC-17(4)
Enhancement of : AC-17

Space Segment Guidance

Privileged operations (e.g., crypto rekey, mode transitions, software loads) often warrant additional assurance. Consider independent checks or approvals, mode and precondition-aware gating, and enhanced logging that captures parameter values and verification steps. Holding points aligned to pass windows can help operators confirm effects before proceeding, while still allowing essential recovery actions when the vehicle is in a constrained state.