RA-5(5) - Vulnerability Monitoring and Scanning | Privileged Access

Implement privileged access authorization to [Assignment: organization-defined system components] for [Assignment: organization-defined vulnerability scanning activities].


ID: RA-5(5)
Enhancement of : RA-5

Space Segment Guidance

Some assessments require elevated or authenticated access to achieve meaningful coverage (e.g., configuration audits of mission servers or consoles). Consider scheduling to avoid pass conflicts, scoping credentials to least privilege/read-only where possible, and segregating test traffic from TT&C paths. For flight software, pursue equivalent depth pre-flight in integration or flatsat environments, with on-orbit confirmation via image IDs, checksums, and configuration telemetry rather than intrusive scans.