SC-16 - Transmission of Security and Privacy Attributes

Associate [Assignment: organization-defined security and privacy attributes] with information exchanged between systems and between system components.


Informational References

ISO 27001

ID: SC-16
Enhancements:  1 | 2 | 3

Countermeasures Covered by Control

ID Name Description D3FEND

Space Threats Tagged by Control

ID Description
SV-SP-3 Introduction of malicious software such as a virus, worm, Distributed Denial-Of-Service (DDOS) agent, keylogger, rootkit, or Trojan Horse
SV-SP-9 On-orbit software updates/upgrades/patches/direct memory writes. If TT&C is compromised or MOC or even the developer's environment, the risk exists to do a variation of a supply chain attack where after it is in orbit you inject malicious code
SV-DCO-1 Not knowing that you were attacked, or attack was attempted
SV-MA-5 Not being able to recover from cyberattack
SV-IT-1 Communications system spoofing resulting in denial of service and loss of availability and data integrity
SV-MA-6 Not planning for security on SV or designing in security from the beginning

Sample Requirements

Requirement

Related SPARTA Techniques and Sub-Techniques

ID Name Description