SC-32(1) - System Partitioning | Separate Physical Domains for Privileged Functions

Partition privileged functions into separate physical domains.


ID: SC-32(1)
Enhancement of : SC-32

Space Segment Guidance

In higher-risk scenarios—like national security or critical commercial missions—simply partitioning systems at a software level may be insufficient. Instead, placing privileged functions into physically separate domains (distinct processors, memory modules, or even circuit boards) hardens the architecture against cross-partition exploits, hardware trojans, or electromagnetic interference aimed at bridging logical barriers. This may mean, for instance, relegating cryptographic key storage and flight-control logic to a physically isolated processor with no direct data bus connectivity to payload computers. Although this approach can drive up development costs and integration complexity, it provides a robust safety net: the adversary cannot tamper with the physically segregated bus operations or encryption routines even if a payload system is compromised. For missions requiring the utmost assurance, such physical separation is critical to a multi-layered, defense-in-depth cybersecurity strategy.