RA-5(4) - Vulnerability Monitoring and Scanning | Discoverable Information

Determine information about the system that is discoverable and take [Assignment: organization-defined corrective actions].


ID: RA-5(4)
Enhancement of : RA-5

Space Segment Guidance

Attackers study open literature and amateur telemetry feeds to craft exploits. The program must inventory every public source that leaks design or state data, for example, FCC filings, amateur satellite trackers, pre-launch photos, or vendor white papers. Security engineers then rank each source for usefulness to an adversary and redact or delay releases where possible. A quarterly review checks that mission blogs, conference slides, and patent drawings do not expose command dictionary entries, crypto part numbers, or antenna patterns that would ease spoofing or jamming.