RA-3 - Risk Assessment

a. Conduct a risk assessment, including: 1. Identifying threats to and vulnerabilities in the system; 2. Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information; and 3. Determining the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; b. Integrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-level risk assessments; c. Document risk assessment results in [Selection: security and privacy plans; risk assessment report; [Assignment: organization-defined document] ]; d. Review risk assessment results [Assignment: organization-defined frequency]; e. Disseminate risk assessment results to [Assignment: organization-defined personnel or roles]; and f. Update the risk assessment [Assignment: organization-defined frequency] or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.


ID: RA-3
Enhancements:  1 | 2 | 3 | 4

Space Segment Guidance

A tailored cyber risk assessment must consider the space domain’s unique threat vectors, uplink spoofing, downlink jamming, radiation-induced faults, and supply-chain implants. Analysts build a model that couples likelihood, based on historical jamming incidents and parts pedigree, with mission consequence metrics like lost observation cycles or collision risk. The output drives the selection of encryption modes, redundancy levels, and incident-response automation thresholds.