SA-11(2) - Developer Testing and Evaluation | Threat Modeling and Vulnerability Analyses

Require the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development and the subsequent testing and evaluation of the system, component, or service that: (a) Uses the following contextual information: [Assignment: organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels]; (b) Employs the following tools and methods: [Assignment: organization-defined tools and methods]; (c) Conducts the modeling and analyses at the following level of rigor: [Assignment: organization-defined breadth and depth of modeling and analyses]; and (d) Produces evidence that meets the following acceptance criteria: [Assignment: organization-defined acceptance criteria].


ID: SA-11(2)
Enhancement of : SA-11

Space Segment Guidance

Dynamic testing and independent verification can probe timing, race conditions, parser robustness, and recovery behavior. Consider scenarios with degraded RF (BER, jitter), partial uploads and resumes, resets during activation, safe-mode entry/exit, clock drift, and long-duration endurance reflecting orbital duty cycles. Verify that accept/reject reason codes, rollback paths, and watchdog behavior are observable in telemetry and remain credible under constrained power/thermal margins.