SA-8(9) - Security and Privacy Engineering Principles | Trusted Components

Implement the security design principle of trusted components in [Assignment: organization-defined systems or system components].


ID: SA-8(9)
Enhancement of : SA-8

Space Segment Guidance

Containment techniques limit propagation across subsystems. Consider memory protection and time/space partitioning, watchdogs with bounded restart policies, and message validation at partition boundaries. Think through behavior under resets, degraded clocks, or partial uploads so containment holds while recovery actions, especially safe-mode commanding, remain available and evident in telemetry.