AC-3(10) - Access Enforcement | Audited Override of Access Control Mechanisms

Employ an audited override of automated access control mechanisms under [Assignment: organization-defined conditions] by [Assignment: organization-defined roles].


ID: AC-3(10)
Enhancement of : AC-3

Space Segment Guidance

Overriding standard access control mechanisms—such as entering cryptographic bypass mode—demands careful auditing on spacecraft since it bypasses typical command validation. Operators might use "bypass" under emergencies (e.g., lost crypto keys or partial system failure), but each invocation should be thoroughly logged. This logging can be as simple as the spacecraft tagging all bypass commands with a special flag in the telemetry data or as advanced as a dedicated subsystem that documents the date-time group, operator credentials (if available), and a justification code. Because on-orbit systems have limited resources, the logging function must be concise yet preserve enough data to support investigators post-event. Ground controllers then interpret these logs to confirm that the override was authorized correctly—for instance, an urgent attitude fix demanded bypassing regular crypto checks. Audited overrides thus balance operational flexibility with robust traceability, ensuring that exploitation of a bypass mode raises immediate visibility and triggers corrective or investigative actions to safeguard mission assets.