SI-3(8) - Malicious Code Protection | Detect Unauthorized Commands

(a) Detect the following unauthorized operating system commands through the kernel application programming interface on [Assignment: organization-defined system hardware components]: [Assignment: organization-defined unauthorized operating system commands]; and (b) [Selection (one or more): issue a warning; audit the command execution; prevent the execution of the command].


ID: SI-3(8)
Enhancement of : SI-3

Space Segment Guidance

For advanced satellites that perform real-time checks on incoming or internally generated commands, unauthorized command detection is a vital safeguard against malicious or errant instructions. This might mean running a lightweight behavioral monitor that recognizes suspicious sequences (e.g., repeated attempts to deactivate critical thrusters) or verifying the digital signature of every command above a specific privilege level. If the monitor flags an anomaly, the spacecraft can log the event and optionally halt execution pending ground-station verification—though designers must consider communication delays. Mission operators can respond quickly before damage spreads across critical systems by tying such alerts to onboard intrusion detection. Even purely autonomous vehicles benefit, as local checks on command validity prevent an adversary from easily hijacking flight software with unexpected kernel-level directives.