Associate [Assignment: organization-defined security and privacy attributes] with information exchanged between systems and between system components.
ID | Name | Description | D3FEND |
ID | Description | |
SV-SP-3 |
Introduction of malicious software such as a virus, worm, Distributed Denial-Of-Service (DDOS) agent, keylogger, rootkit, or Trojan Horse |
|
SV-SP-9 |
On-orbit software updates/upgrades/patches/direct memory writes. If TT&C is compromised or MOC or even the developer's environment, the risk exists to do a variation of a supply chain attack where after it is in orbit you inject malicious code |
|
SV-DCO-1 |
Not knowing that you were attacked, or attack was attempted |
|
SV-MA-5 |
Not being able to recover from cyberattack |
|
SV-IT-1 |
Communications system spoofing resulting in denial of service and loss of availability and data integrity |
|
SV-MA-6 |
Not planning for security on SV or designing in security from the beginning |
Requirement |
---|
ID | Name | Description |
---|