SA-8(31) - Security and Privacy Engineering Principles | Secure System Modification

Implement the security design principle of secure system modification in [Assignment: organization-defined systems or system components].


ID: SA-8(31)
Enhancement of : SA-8

Space Segment Guidance

Deterministic builds guarantee that the binary flashed into a satellite matches the reviewed source code. They use reproducible toolchains pinned to specific compilers, linkers, and library versions and store container images in a trusted registry. Two independent build servers compile the release; matching cryptographic hashes become the acceptance criterion for uplink. Any divergence triggers an immediate investigation for corrupted sources, compromised tools, or tampered build scripts, blocking unsafe images from ever reaching flight hardware.