PL-8 - Security and Privacy Architectures

a. Develop security and privacy architectures for the system that: 1. Describe the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information; 2. Describe the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals; 3. Describe how the architectures are integrated into and support the enterprise architecture; and 4. Describe any assumptions about, and dependencies on, external systems and services; b. Review and update the architectures [Assignment: organization-defined frequency] to reflect changes in the enterprise architecture; and c. Reflect planned architecture changes in security and privacy plans, Concept of Operations (CONOPS), criticality analysis, organizational procedures, and procurements and acquisitions.


ID: PL-8
Enhancements:  1 | 2

Space Segment Guidance

Security architecture typically addresses segmentation between bus and payload, software partitioning, and separation of ground enclaves for planning, TT&C, and science distribution. Consider how information flows are constrained (command paths vs. telemetry fan-out), how cryptographic services are provisioned, and how autonomy/FDIR interact with authorization and safety interlocks. Capture mode-aware behavior (what narrows in safe mode), resilience patterns (dual banks, watchdogs, partitioning), and verification/activation steps, recognizing the cost of change after launch.