Tactics
Techniques
Countermeasures
Countermeasures
NIST References
Resources
General Information
Getting Started
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Search
Updates
v1.2
v1.1
v1.0
Home
Resources
Updates
Update - SPARTA v1.2
Start Date
End Date
December 08 2022
This is the current version of SPARTA
Below highlights the changes to the website, techniques, sub-techniques, and/or countermeasures.
Website Updates
Added
Working with SPARTA
page where there is a
STIX2 JSON
file download as well as Excel export capability
Added
General Information
page
Techniques
New Techniques
Defense Evasion:
DE-0007
Defense Evasion:
DE-0008
Lateral Movement:
LM-0005
Exfiltration:
EXF-0010
Modified Techniques
Reconnaissance:
REC-0001
Reconnaissance:
REC-0002
Reconnaissance:
REC-0003
Reconnaissance:
REC-0005
Reconnaissance:
REC-0006
Reconnaissance:
REC-0007
Reconnaissance:
REC-0008
Resource Development:
RD-0001
Initial Access:
IA-0003
Initial Access:
IA-0004
Initial Access:
IA-0005
Initial Access:
IA-0006
Initial Access:
IA-0007
Initial Access:
IA-0008
Initial Access:
IA-0010
Execution:
EX-0003
Execution:
EX-0004
Execution:
EX-0006
Execution:
EX-0007
Execution:
EX-0009
Execution:
EX-0010
Execution:
EX-0011
Execution:
EX-0012
Execution:
EX-0013
Execution:
EX-0014
Execution:
EX-0015
Persistence:
PER-0001
Persistence:
PER-0002
Persistence:
PER-0003
Persistence:
PER-0004
Defense Evasion:
DE-0001
Defense Evasion:
DE-0002
Defense Evasion:
DE-0003
Defense Evasion:
DE-0004
Defense Evasion:
DE-0005
Lateral Movement:
LM-0001
Lateral Movement:
LM-0002
Lateral Movement:
LM-0003
Lateral Movement:
LM-0004
Exfiltration:
EXF-0001
Exfiltration:
EXF-0002
Exfiltration:
EXF-0003
Exfiltration:
EXF-0004
Exfiltration:
EXF-0005
Exfiltration:
EXF-0006
Exfiltration:
EXF-0007
Exfiltration:
EXF-0008
Exfiltration:
EXF-0009
Impact:
IMP-0001
Impact:
IMP-0002
Impact:
IMP-0003
Impact:
IMP-0004
Impact:
IMP-0005
Impact:
IMP-0006
Sub-Techniques
New Sub-Techniques
Reconnaissance:
REC-0003.03
Reconnaissance:
REC-0005.04
Reconnaissance:
REC-0008.04
Execution:
EX-0013.03
Execution:
EX-0014.04
Exfiltration:
EXF-0006.01
Exfiltration:
EXF-0006.02
Modified Sub-Techniques
Reconnaissance:
REC-0001.01
Reconnaissance:
REC-0001.02
Reconnaissance:
REC-0001.03
Reconnaissance:
REC-0001.04
Reconnaissance:
REC-0001.05
Reconnaissance:
REC-0001.06
Reconnaissance:
REC-0001.07
Reconnaissance:
REC-0001.08
Reconnaissance:
REC-0001.09
Reconnaissance:
REC-0002.01
Reconnaissance:
REC-0002.02
Reconnaissance:
REC-0002.03
Reconnaissance:
REC-0003.01
Reconnaissance:
REC-0003.02
Reconnaissance:
REC-0005.01
Reconnaissance:
REC-0005.02
Reconnaissance:
REC-0005.03
Reconnaissance:
REC-0006.01
Reconnaissance:
REC-0006.02
Reconnaissance:
REC-0008.01
Reconnaissance:
REC-0008.03
Resource Development:
RD-0001.01
Resource Development:
RD-0001.03
Resource Development:
RD-0002.01
Resource Development:
RD-0002.02
Resource Development:
RD-0002.03
Resource Development:
RD-0003.01
Resource Development:
RD-0003.02
Resource Development:
RD-0004.01
Resource Development:
RD-0004.02
Initial Access:
IA-0001.01
Initial Access:
IA-0001.02
Initial Access:
IA-0001.03
Initial Access:
IA-0004.01
Initial Access:
IA-0005.01
Initial Access:
IA-0005.02
Initial Access:
IA-0005.03
Initial Access:
IA-0007.01
Initial Access:
IA-0007.02
Initial Access:
IA-0008.01
Initial Access:
IA-0008.02
Initial Access:
IA-0009.01
Execution:
EX-0001.01
Execution:
EX-0001.02
Execution:
EX-0005.02
Execution:
EX-0009.01
Execution:
EX-0009.02
Execution:
EX-0009.03
Execution:
EX-0012.01
Execution:
EX-0012.03
Execution:
EX-0012.05
Execution:
EX-0012.06
Execution:
EX-0012.07
Execution:
EX-0012.08
Execution:
EX-0012.09
Execution:
EX-0012.10
Execution:
EX-0013.01
Execution:
EX-0013.02
Execution:
EX-0014.01
Execution:
EX-0014.02
Persistence:
PER-0002.01
Persistence:
PER-0002.02
Defense Evasion:
DE-0002.01
Defense Evasion:
DE-0002.02
Defense Evasion:
DE-0002.03
Defense Evasion:
DE-0003.01
Defense Evasion:
DE-0003.02
Defense Evasion:
DE-0003.03
Defense Evasion:
DE-0003.04
Defense Evasion:
DE-0003.05
Defense Evasion:
DE-0003.06
Defense Evasion:
DE-0003.07
Defense Evasion:
DE-0003.08
Defense Evasion:
DE-0003.09
Defense Evasion:
DE-0003.10
Defense Evasion:
DE-0003.11
Exfiltration:
EXF-0002.02
Exfiltration:
EXF-0002.03
Exfiltration:
EXF-0003.01
Exfiltration:
EXF-0003.02
Countermeasures
New Countermeasures
CM0073:
Traffic Flow Analysis Defense
CM0071:
Communication Physical Medium
CM0072:
Protocol Update / Refactoring
Modified Countermeasures
CM0000:
Countermeasure Not Identified
CM0001:
Protect Sensitive Information
CM0008:
Security Testing Results
CM0009:
Threat Intelligence Program
CM0020:
Threat modeling
CM0022:
Criticality Analysis
CM0024:
Anti-counterfeit Hardware
CM0025:
Supplier Review
CM0026:
Original Component Manufacturer
CM0027:
ASIC/FPGA Manufacturing
CM0028:
Tamper Protection
CM0041:
User Training
CM0052:
Insider Threat Protection
CM0054:
Two-Person Rule
CM0002:
COMSEC
CM0030:
Crypto Key Management
CM0031:
Authentication
CM0033:
Relay Protection
CM0003:
TEMPEST
CM0040:
Shared Resource Leakage
CM0049:
Machine Learning Data Integrity
CM0050:
On-board Message Encryption
CM0004:
Development Environment Security
CM0007:
Software Version Numbers
CM0010:
Update Software
CM0011:
Vulnerability Scanning
CM0012:
Software Bill of Materials
CM0013:
Dependency Confusion
CM0015:
Software Source Control
CM0016:
CWE List
CM0017:
Coding Standard
CM0018:
Dynamic Analysis
CM0019:
Static Analysis
CM0021:
Software Digital Signature
CM0023:
Configuration Management
CM0036:
Session Termination
CM0039:
Least Privilege
CM0046:
Long Duration Testing
CM0047:
Operating System Security
CM0055:
Secure Command Mode(s)
CM0062:
Dummy Process - Aggregator Node
CM0069:
Process White Listing
CM0005:
Ground-based Countermeasures
CM0034:
Monitor Critical Telemetry Points
CM0035:
Protect Authenticators
CM0053:
Physical Security Controls
CM0056:
Data Backup
CM0070:
Alternate Communications Paths
CM0006:
Cloaking Safe-mode
CM0032:
On-board Intrusion Detection & Prevention
CM0042:
Robust Fault Management
CM0044:
Cyber-safe Mode
CM0051:
Fault Injection Redundancy
CM0066:
Model-based System Verification
CM0067:
Smart Contracts
CM0068:
Reinforcement Learning
CM0014:
Secure boot
CM0037:
Disable Physical Ports
CM0038:
Segmentation
CM0043:
Backdoor Commands
CM0045:
Error Detection and Correcting Memory
CM0048:
Resilient Position, Navigation, and Timing
CM0057:
Tamper Resistant Body
CM0058:
Power Randomization
CM0059:
Power Consumption Obfuscation
CM0060:
Secret Shares
CM0061:
Power Masking
CM0063:
Increase Clock Cycles/Timing
CM0064:
Dual Layer Protection
CM0065:
OSAM Dual Authorization
CM0029:
TRANSEC
×