AC-17(2) - Remote Access | Protection of Confidentiality and Integrity Using Encryption

Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.


ID: AC-17(2)
Enhancement of : AC-17

Space Segment Guidance

Space platforms often rely on remote RF links for command and control, which by definition traverse external or shared networks (radio spectrum, tracking data relay satellites, etc.).  This enhancement focuses on protecting remote access from interception or manipulation.  While the baseline control addresses establishing secure channels, 17(2) emphasizes further safeguarding, potentially requiring strong encryption and robust endpoint authentication for any data crossing external networks.  For a spacecraft with multiple ground stations or multi-agency payload operations, ensuring the confidentiality and integrity of each command stream is paramount.  One practical approach is employing NSA-approved cryptographic modules for every remote access session.  Engineers may also design hardware-based trust anchors (e.g., secure elements on the satellite’s bus) to validate the authenticity of the data link before processing critical commands.  By rigorously securing remote access, missions reduce the chance of malicious injection attacks, replay attempts, or eavesdropping on sensitive control sequences.