CM-8(3) - System Component Inventory | Automated Unauthorized Component Detection

(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and (b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable network access by such components; isolate the components; notify [Assignment: organization-defined personnel or roles] ].


ID: CM-8(3)
Enhancement of : CM-8

Space Segment Guidance

Discovery of unauthorized or unknown components is often improved by scheduled attestations. Consider periodic on-board self-reports and cross-checks during maintenance passes, plus ground scans of network segments supporting TT&C. When mismatches occur (e.g., unexpected image hash), a standard confirm→quarantine→investigate process helps restore confidence before normal commanding resumes.