Tactics
Techniques
Countermeasures
Countermeasures
Space Segment Cybersecurity Profile
NIST References
ISO IEC 27001
NASA Best Practice Guide
D3FEND
Tactics
Technqiues
Artifacts
Resources
General Information
Getting Started
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Spacecraft Functional Decomposition
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Tools
Navigator
Countermeasure Mapper
Control Mapper
Spacecraft Mapper
JSON Creator
Notional Risk Scores
Search
Updates
v2.0
v1.6
v1.5
v1.5.1
v1.4
v1.3
v1.3.2
v1.3.1
v1.3.1.1
v1.2
v1.1
v1.0
Home
Resources
Updates
v1.3
Update - v1.3
Start Date
End Date
April 22 2023
May 08 2023
Below highlights the changes to the website, techniques, sub-techniques, and/or countermeasures.
Website Updates
Added SPARTA
Navigator
Added SPARTA
Countermeasure Mapper
Updated Countermeasure information page
Updated General Information page to include new articles and presentations
Techniques
New Techniques
RD-0005:
Obtain Non-Cyber Capabilities
EX-0016:
Jamming
EX-0017:
Kinetic Physical Attack
EX-0018:
Non-Kinetic Physical Attack
PER-0005:
Valid Credentials
DE-0009:
Camouflage, Concealment, and Decoys (CCD)
DE-0010:
Overflow Audit Log
DE-0011:
Valid Credentials
LM-0006:
Launch Vehicle Interface
LM-0007:
Valid Credentials
Modified Techniques
REC-0001:
Gather Spacecraft Design Information
REC-0003:
Gather Spacecraft Communications Information
REC-0007:
Monitor for Safe-Mode Indicators
REC-0009:
Gather Mission Information
RD-0001:
Acquire Infrastructure
RD-0002:
Compromise Infrastructure
RD-0003:
Obtain Cyber Capabilities
IA-0001:
Compromise Supply Chain
IA-0005:
Rendezvous & Proximity Operations
IA-0007:
Compromise Ground System
IA-0008:
Rogue External Entity
IA-0010:
Exploit Reduced Protections During Safe-Mode
EX-0005:
Exploit Hardware/Firmware Corruption
EX-0007:
Trigger Single Event Upset
EX-0010:
Malicious Code
EX-0011:
Exploit Reduced Protections During Safe-Mode
EX-0013:
Flooding
EX-0014:
Spoofing
PER-0003:
Ground System Presence
PER-0004:
Replace Cryptographic Keys
DE-0001:
Disable Fault Management
DE-0003:
Modify On-Board Values
DE-0007:
Rootkit
DE-0008:
Bootkit
LM-0005:
Virtualization Escape
EXF-0003:
Eavesdropping
EXF-0005:
Proximity Operations
EXF-0006:
Modify Communications Configuration
EXF-0007:
Compromised Ground System
IMP-0002:
Disruption
IMP-0003:
Denial
IMP-0004:
Degradation
IMP-0006:
Theft
Sub-Techniques
New Sub-Techniques
REC-0003.04:
Valid Credentials
RD-0001.04:
Launch Facility
RD-0005.01:
Launch Services
RD-0005.02:
Non-Kinetic Physical ASAT
RD-0005.03:
Kinetic Physical ASAT
RD-0005.04:
Electronic ASAT
IA-0008.03:
ASAT/Counterspace Weapon
EX-0010.01:
Ransomware
EX-0010.02:
Wiper Malware
EX-0010.03:
Rootkit
EX-0010.04:
Bootkit
EX-0016.03:
Position, Navigation, and Timing (PNT)
EX-0016.01:
Uplink Jamming
EX-0016.02:
Downlink Jamming
EX-0014.05:
Ballistic Missile Spoof
EX-0017.01:
Direct Ascent ASAT
EX-0017.02:
Co-Orbital ASAT
EX-0018.01:
Electromagnetic Pulse (EMP)
EX-0018.02:
High-Powered Laser
EX-0018.03:
High-Powered Microwave
DE-0009.01:
Debris Field
DE-0009.02:
Space Weather
DE-0009.03:
Trigger Premature Intercept
LM-0006.01:
Rideshare Payload
Modified Sub-Techniques
REC-0001.01:
Software
REC-0001.03:
Cryptographic Algorithms
REC-0003.01:
Communications Equipment
REC-0003.02:
Commanding Details
RD-0001.03:
Spacecraft
RD-0002.03:
3rd-Party Spacecraft
RD-0003.02:
Cryptographic Keys
IA-0001.01:
Software Dependencies & Development Tools
IA-0001.03:
Hardware Supply Chain
IA-0005.01:
Compromise Emanations
IA-0005.02:
Docked Vehicle / OSAM
IA-0005.03:
Proximity Grappling
IA-0007.02:
Malicious Commanding via Valid GS
IA-0008.01:
Rogue Ground Station
IA-0008.02:
Rogue Spacecraft
EX-0005.02:
Malicious Use of Hardware Commands
EX-0009.01:
Flight Software
EX-0009.03:
Known Vulnerability (COTS/FOSS)
EX-0012.08:
Attitude Determination & Control Subsystem
EX-0013.01:
Valid Commands
EX-0013.02:
Erroneous Input
EX-0014.03:
Sensor Data
EX-0014.04:
Position, Navigation, and Timing (PNT)
PER-0002.01:
Hardware
DE-0002.02:
Jam Link Signal
DE-0003.07:
Cryptographic Modes
EXF-0003.01:
Uplink Intercept
Countermeasures
New Countermeasures
CM0074:
Distributed Constellations
CM0075:
Proliferated Constellations
CM0076:
Diversified Architectures
CM0077:
Space Domain Awareness
CM0078:
Space-Based Radio Frequency Mapping
CM0079:
Maneuverability
CM0080:
Stealth Technology
CM0081:
Defensive Jamming and Spoofing
CM0082:
Deception and Decoys
CM0083:
Antenna Nulling and Adaptive Filtering
CM0084:
Physical Seizure
CM0085:
Electromagnetic Shielding
CM0086:
Filtering and Shuttering
CM0087:
Defensive Dazzling/Blinding
Modified Countermeasures
CM0020:
Threat modeling
CM0024:
Anti-counterfeit Hardware
CM0025:
Supplier Review
CM0026:
Original Component Manufacturer
CM0027:
ASIC/FPGA Manufacturing
CM0028:
Tamper Protection
CM0004:
Development Environment Security
CM0010:
Update Software
CM0011:
Vulnerability Scanning
CM0012:
Software Bill of Materials
CM0015:
Software Source Control
CM0018:
Dynamic Analysis
CM0019:
Static Analysis
CM0021:
Software Digital Signature
CM0023:
Configuration Management
CM0014:
Secure boot
CM0065:
OSAM Dual Authorization
CM0029:
TRANSEC
×