SA-15(8) - Development Process, Standards, and Tools | Reuse of Threat and Vulnerability Information

Require the developer of the system, system component, or system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.


ID: SA-15(8)
Enhancement of : SA-15

Space Segment Guidance

Leveraging prior threat and vulnerability information from similar spacecraft shortens development cycles and bolsters reliability. A prime example might be referencing earlier missions' experience with jamming attempts or firmware injection. If a particular class of encryption flaws once plagued a related program, developers can preemptively patch or redesign that functionality. This reuse of intelligence often hinges on inter-program data-sharing agreements—particularly for classified or proprietary issues. Still, the net outcome is more robust, resilient flight software that matures faster. By systematically incorporating external insights, project teams avoid rediscovering the same vulnerabilities, saving cost and schedule time. Ultimately, the spacecraft benefits from a cumulative security wisdom that reduces repeated pitfalls and helps ensure mission success in an increasingly contested space environment.