Tactics
Techniques
Countermeasures
Countermeasures
Space Segment Cybersecurity Profile
NIST References
ISO IEC 27001
NASA Best Practice Guide
D3FEND
Tactics
Technqiues
Artifacts
Resources
General Information
Getting Started
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Indicators of Behavior
Space System Cybersecurity Questionnaire
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Search
Updates
v3.0
v2.0
v1.6
v1.5
v1.5.1
v1.4
v1.3
v1.3.2
v1.3.1
v1.3.1.1
v1.2
v1.1
v1.0
Home
Resources
Updates
Update - SPARTA v3.0
Start Date
End Date
April 15 2025
This is the current version of SPARTA
Below highlights the changes to the website, techniques, sub-techniques, and/or countermeasures.
Website Updates
SPARTA 3.0 Blog Post
Created
Indicators of Behavior
for SPARTA TTPs
Added CWE Classes to SPARTA TTPs
Added NIST 800-160 Vol 1 and 2 mappings to
Spacecraft Decomp
Created
Space System Cybersecurity Questionnaire
Updated
Contribute
List
Cleaned up webpages by adding tabs for information
Techniques
New Techniques
Modified Techniques
REC-0008:
Gather Supply Chain Information
IA-0008:
Rogue External Entity
IA-0010:
Unauthorized Access During Safe-Mode
EX-0010:
Malicious Code
EX-0011:
Exploit Reduced Protections During Safe-Mode
EX-0014:
Spoofing
PER-0005:
Credentialed Persistence
DE-0002:
Disrupt or Deceive Downlink
DE-0003:
On-Board Values Obfuscation
DE-0005:
Subvert Protections via Safe-Mode
DE-0007:
Evasion via Rootkit
DE-0008:
Evasion via Bootkit
DE-0009:
Camouflage, Concealment, and Decoys (CCD)
DE-0011:
Credentialed Evasion
LM-0007:
Credentialed Traversal
EXF-0002:
Side-Channel Exfiltration
EXF-0003:
Signal Interception
Sub-Techniques
New Sub-Techniques
DE-0009.04:
Targeted Deception of Onboard SSA/SDA Sensors
DE-0009.05:
Corruption or Overload of Ground-Based SDA Systems
Modified Sub-Techniques
REC-0001.01:
Software Design
REC-0005.01:
Uplink Intercept Eavesdropping
REC-0008.01:
Hardware Recon
REC-0008.02:
Software Recon
REC-0008.03:
Known Vulnerabilities
IA-0008.01:
Rogue Ground Station
IA-0008.02:
Rogue Spacecraft
EX-0001.02:
Bus Traffic Replay
EX-0010.02:
Wiper Malware
EX-0010.03:
Rootkit
EX-0010.04:
Bootkit
EX-0012.11:
Watchdog Timer (WDT)
EX-0012.13:
Poison AI/ML Training Data
EX-0014.01:
Time Spoof
EX-0014.02:
Bus Traffic Spoofing
EX-0014.04:
Position, Navigation, and Timing (PNT) Spoofing
EX-0016.03:
Position, Navigation, and Timing (PNT) Jamming
PER-0002.01:
Hardware Backdoor
PER-0002.02:
Software Backdoor
DE-0002.01:
Inhibit Ground System Functionality
DE-0003.09:
System Clock for Evasion
DE-0003.11:
Watchdog Timer (WDT) for Evasion
DE-0003.12:
Poison AI/ML Training for Evasion
LM-0006.01:
Rideshare Payload
EXF-0003.01:
Uplink Exfiltration
EXF-0003.02:
Downlink Exfiltration
Countermeasures
New Countermeasures
CM-NA:
Countermeasure Not Identified
Modified Countermeasures
CM0001:
Protect Sensitive Information
CM0008:
Security Testing Results
CM0009:
Threat Intelligence Program
CM0022:
Criticality Analysis
CM0024:
Anti-counterfeit Hardware
CM0025:
Supplier Review
CM0026:
Original Component Manufacturer
CM0027:
ASIC/FPGA Manufacturing
CM0028:
Tamper Protection
CM0041:
User Training
CM0077:
Space Domain Awareness
CM0002:
COMSEC
CM0031:
Authentication
CM0033:
Relay Protection
CM0004:
Development Environment Security
CM0010:
Update Software
CM0012:
Software Bill of Materials
CM0018:
Dynamic Testing
CM0021:
Software Digital Signature
CM0047:
Operating System Security
CM0005:
Ground-based Countermeasures
CM0053:
Physical Security Controls
CM0032:
On-board Intrusion Detection & Prevention
CM0042:
Robust Fault Management
CM0044:
Cyber-safe Mode
CM0014:
Secure boot
CM0038:
Segmentation
CM0029:
TRANSEC
×
load more results