SA-17(7) - Developer Security and Privacy Architecture and Design | Structure for Least Privilege

Require the developer of the system, system component, or system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege.


ID: SA-17(7)
Enhancement of : SA-17

Space Segment Guidance

Designing the spacecraft software and hardware for the least privilege often requires careful layering of services, strict interface contracts, and restricting privileged commands to a minimal, highly trusted code base. For example, if the spacecraft bus OS runs a kernel-mode module that handles core flight functions (e.g., attitude control, propulsion, cryptographic key management), the developer security architecture should ensure mission payload software runs at a lower privilege level with strictly bounded access rights. Using microservices or containerized segments can help enforce these boundaries: each container only receives permissions essential to its function and cannot “see” or modify unrelated processes. By methodically applying the least privilege, developers minimize the damage any faulty or malicious process can inflict, ensuring resilient and compartmentalized operation even in dynamic or contested space environments.