Tactics
Techniques
Countermeasures
Countermeasures
Space Segment Cybersecurity Profile
NIST References
ISO IEC 27001
NASA Best Practice Guide
D3FEND
Tactics
Technqiues
Artifacts
Resources
General Information
Getting Started
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Spacecraft Functional Decomposition
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Tools
Navigator
Countermeasure Mapper
Control Mapper
Spacecraft Mapper
JSON Creator
Notional Risk Scores
Search
Updates
v2.0
v1.6
v1.5
v1.5.1
v1.4
v1.3
v1.3.2
v1.3.1
v1.3.1.1
v1.2
v1.1
v1.0
Home
Resources
Updates
v1.6
Update - v1.6
Start Date
End Date
February 29 2024
June 11 2024
Below highlights the changes to the website, techniques, sub-techniques, and/or countermeasures.
Website Updates
Added mappings to
NASA's Space Security: Best Practices Guide
Updated
Notional Risk Scores
page to better explain the process
Using SPARTA to Conduct Space Vehicle Cyber Assessments
presentation now available
New references added across 70 SPARTA techniques and all 9 tactics
Techniques
New Techniques
Modified Techniques
REC-0001:
Gather Spacecraft Design Information
REC-0002:
Gather Spacecraft Descriptors
REC-0003:
Gather Spacecraft Communications Information
REC-0004:
Gather Launch Information
REC-0005:
Eavesdropping
REC-0006:
Gather FSW Development Information
REC-0009:
Gather Mission Information
RD-0001:
Acquire Infrastructure
RD-0002:
Compromise Infrastructure
RD-0003:
Obtain Cyber Capabilities
RD-0005:
Obtain Non-Cyber Capabilities
RD-0004:
Stage Capabilities
IA-0002:
Compromise Software Defined Radio
IA-0004:
Secondary/Backup Communication Channel
IA-0005:
Rendezvous & Proximity Operations
IA-0006:
Compromise Hosted Payload
IA-0007:
Compromise Ground System
IA-0008:
Rogue External Entity
IA-0011:
Auxiliary Device Compromise
EX-0001:
Replay
EX-0002:
Position, Navigation, and Timing (PNT) Geofencing
EX-0003:
Modify Authentication Process
EX-0004:
Compromise Boot Memory
EX-0005:
Exploit Hardware/Firmware Corruption
EX-0006:
Disable/Bypass Encryption
EX-0009:
Exploit Code Flaws
EX-0010:
Malicious Code
EX-0012:
Modify On-Board Values
EX-0013:
Flooding
EX-0016:
Jamming
EX-0014:
Spoofing
EX-0015:
Side-Channel Attack
EX-0018:
Non-Kinetic Physical Attack
PER-0001:
Memory Compromise
PER-0003:
Ground System Presence
PER-0004:
Replace Cryptographic Keys
DE-0001:
Disable Fault Management
DE-0002:
Prevent Downlink
DE-0003:
Modify On-Board Values
DE-0004:
Masquerading
DE-0009:
Camouflage, Concealment, and Decoys (CCD)
LM-0001:
Hosted Payload
LM-0002:
Exploit Lack of Bus Segregation
LM-0003:
Constellation Hopping via Crosslink
LM-0004:
Visiting Vehicle Interface(s)
LM-0005:
Virtualization Escape
EXF-0001:
Replay
EXF-0002:
Side-Channel Attack
EXF-0003:
Eavesdropping
EXF-0004:
Out-of-Band Communications Link
EXF-0006:
Modify Communications Configuration
EXF-0007:
Compromised Ground System
EXF-0008:
Compromised Developer Site
EXF-0010:
Payload Communication Channel
IMP-0001:
Deception (or Misdirection)
IMP-0002:
Disruption
IMP-0003:
Denial
IMP-0004:
Degradation
IMP-0005:
Destruction
IMP-0006:
Theft
Sub-Techniques
New Sub-Techniques
Modified Sub-Techniques
REC-0001.01:
Software
REC-0001.02:
Firmware
REC-0001.03:
Cryptographic Algorithms
REC-0001.04:
Data Bus
REC-0001.06:
Maneuver & Control
REC-0001.07:
Payload
REC-0001.08:
Power
REC-0002.02:
Organization
REC-0003.01:
Communications Equipment
REC-0003.02:
Commanding Details
REC-0003.04:
Valid Credentials
REC-0005.01:
Uplink Intercept
REC-0005.02:
Downlink Intercept
REC-0005.03:
Proximity Operations
REC-0006.01:
Development Environment
REC-0008.01:
Hardware
REC-0008.02:
Software
REC-0008.03:
Known Vulnerabilities
RD-0001.01:
Ground Station Equipment
RD-0001.02:
Commercial Ground Station Services
RD-0001.03:
Spacecraft
RD-0001.04:
Launch Facility
RD-0002.01:
Mission-Operated Ground System
RD-0002.02:
3rd Party Ground System
RD-0002.03:
3rd-Party Spacecraft
RD-0003.01:
Exploit/Payload
RD-0004.01:
Identify/Select Delivery Mechanism
RD-0004.02:
Upload Exploit/Payload
IA-0001.02:
Software Supply Chain
IA-0001.03:
Hardware Supply Chain
IA-0004.01:
Ground Station
IA-0005.01:
Compromise Emanations
IA-0005.02:
Docked Vehicle / OSAM
IA-0005.03:
Proximity Grappling
IA-0007.01:
Compromise On-Orbit Update
IA-0007.02:
Malicious Commanding via Valid GS
IA-0008.01:
Rogue Ground Station
IA-0008.02:
Rogue Spacecraft
IA-0009.03:
User Segment
EX-0001.01:
Command Packets
EX-0001.02:
Bus Traffic
EX-0005.01:
Design Flaws
EX-0005.02:
Malicious Use of Hardware Commands
EX-0009.01:
Flight Software
EX-0009.02:
Operating System
EX-0009.03:
Known Vulnerability (COTS/FOSS)
EX-0010.04:
Bootkit
EX-0012.03:
Memory Write/Loads
EX-0012.05:
Scheduling Algorithm
EX-0012.06:
Science/Payload Data
EX-0012.07:
Propulsion Subsystem
EX-0012.08:
Attitude Determination & Control Subsystem
EX-0012.09:
Electrical Power Subsystem
EX-0012.10:
Command & Data Handling Subsystem
EX-0013.01:
Valid Commands
EX-0013.02:
Erroneous Input
EX-0016.03:
Position, Navigation, and Timing (PNT)
EX-0016.01:
Uplink Jamming
EX-0016.02:
Downlink Jamming
EX-0014.02:
Bus Traffic
EX-0014.03:
Sensor Data
EX-0014.04:
Position, Navigation, and Timing (PNT)
EX-0017.01:
Direct Ascent ASAT
EX-0018.01:
Electromagnetic Pulse (EMP)
PER-0002.01:
Hardware
PER-0002.02:
Software
DE-0002.01:
Inhibit Ground System Functionality
DE-0002.02:
Jam Link Signal
DE-0002.03:
Inhibit Spacecraft Functionality
DE-0003.07:
Cryptographic Modes
LM-0006.01:
Rideshare Payload
EXF-0002.01:
Power Analysis Attacks
EXF-0002.02:
Electromagnetic Leakage Attacks
EXF-0002.03:
Traffic Analysis Attacks
EXF-0002.04:
Timing Attacks
EXF-0003.01:
Uplink Intercept
EXF-0003.02:
Downlink Intercept
EXF-0006.02:
Transponder
Countermeasures
New Countermeasures
Modified Countermeasures
×