SA-8(16) - Security and Privacy Engineering Principles | Self-reliant Trustworthiness

Implement the security design principle of self-reliant trustworthiness in [Assignment: organization-defined systems or system components].


ID: SA-8(16)
Enhancement of : SA-8

Space Segment Guidance

Balanced protection reminds engineers to guard every trust boundary to the same resistance level as its neighbors so an attacker cannot flow around a single hardened component. Encrypting the uplink without authenticating on-board maintenance ports leaves a hollow shell for a spacecraft. Map all external and internal interfaces, score each for confidentiality, integrity, and availability impacts, and then raise weaker links to match the strongest requirement that the mission profile demands. Practical steps include adding MAC-address whitelists on the EGSE Ethernet switch when the flight computer authenticates commands and applying TEMPEST gaskets to payload harnesses that route near shielded crypto cards.