PL-8(1) - Security and Privacy Architectures | Defense in Depth

Design the security and privacy architectures for the system using a defense-in-depth approach that: (a) Allocates [Assignment: organization-defined controls] to [Assignment: organization-defined locations and architectural layers]; and (b) Ensures that the allocated controls operate in a coordinated and mutually reinforcing manner.


ID: PL-8(1)
Enhancement of : PL-8

Space Segment Guidance

When refining architecture, layered protections that avoid single points of failure are useful on both space and ground segments. Examples include independent command authentication with on-board acceptance checks, partitioning that limits fault propagation, default-deny at boundaries, and fallback paths (safe-mode command sets, dual-bank images) for recoverability. Think through how each layer behaves under degraded power/thermal margins and intermittent links, and where additional monitoring or hold points improve resilience.