SI-3(10) - Malicious Code Protection | Malicious Code Analysis

(a) Employ the following tools and techniques to analyze the characteristics and behavior of malicious code: [Assignment: organization-defined tools and techniques]; and (b) Incorporate the results from malicious code analysis into organizational incident response and flaw remediation processes.


ID: SI-3(10)
Enhancement of : SI-3

Space Segment Guidance

Autorun functions enable malware to launch when a diagnostic laptop or payload memory card connects. Disable execution of boot sector code and application autostart on every removable interface that can touch flight or flatsat computers. If operational constraints require autorun for a specific maintenance tool, restrict it with digital signatures and whitelists, then log each invocation to an audit channel reviewed by mission assurance. This small policy change blocks an entire class of USB-borne attacks without consuming processor cycles in flight.