SV-MA-6

Not planning for security on SV or designing in security from the beginning


Informational References

  • TOR-2018-02275 - A Need for Robust Space Vehicle Cybersecurity
ID: SV-MA-6
DiD Layer: Prevention
CAPEC #:  30 | 69
Lowest Threat Tier to
Create Threat Event:  
I
Notional Risk Rank Score: 

High-Level Requirements

The Program shall specifically develop a defense-in-depth architecture for the spacecraft and document within applicable security documentation.

Low-Level Requirements

Requirement Rationale/Additional Guidance/Notes
The Program shall develop a security plan for the spacecraft. {SV-MA-6} {PL-2}
The Program shall protect the security plan from unauthorized disclosure and modification. {SV-MA-6} {PL-2}
The Program shall plan and coordinate security-related activities affecting the spacecraft with groups associated with systems from which the spacecraft is inheriting satisfaction of controls before conducting such activities in order to reduce the impact on other organizational entities. {SV-MA-6} {PL-2}
The Program shall document and design a security architecture using a defense-in-depth approach that allocates the Program defined safeguards to the indicated locations and layers: [Examples include operating system abstractions and hardware mechanisms to the separate processors in the spacecraft, internal components, and the FSW]. {SV-MA-6} {PL-8,PL-8(1)}
The Program shall ensure that the allocated security safeguards operate in a coordinated and mutually reinforcing manner. {SV-MA-6} {PL-8(1)}
The Program shall implement a security architecture and design that provides the required security functionality, allocates security controls among physical and logical components, and integrates individual security functions, mechanisms, and processes together to provide required security capabilities and a unified approach to protection. {SV-MA-6} {SA-2,SA-8}
The Program shall document the spacecraft's security architecture, and how it is established within and is an integrated part of the Program's mission security architecture. {SV-MA-6} {SA-17}

Related SPARTA Techniques and Sub-Techniques

ID Name Description

Related SPARTA Countermeasures

ID Name Description NIST Rev5 D3FEND ISO 27001