IR-4(12) - Incident Handling | Malicious Code and Forensic Analysis

Analyze malicious code and/or other residual artifacts remaining in the system after the incident.


ID: IR-4(12)
Enhancement of : IR-4

Space Segment Guidance

Deception and canary techniques can provide early indicators, best placed in ground environments and mission tooling. Consider decoy credentials, fake repositories, or canary procedures that never propagate to the flight article, plus telemetry analytics tuned to detect use of these artifacts. Ensure such mechanisms cannot induce hazardous commanding and that their alerts route directly into incident handling without adding operational risk.