SI-4(7) - System Monitoring | Automated Response to Suspicious Events

(a) Notify [Assignment: organization-defined incident response personnel (identified by name and/or by role)] of detected suspicious events; and (b) Take the following actions upon detection: [Assignment: organization-defined least-disruptive actions to terminate suspicious events].


ID: SI-4(7)
Enhancement of : SI-4

Space Segment Guidance

In some space missions, automated responses to suspicious events can mitigate immediate threats—like halting a rogue command sequence before it completes a dangerous maneuver. However, automation requires careful design to avoid false positives that shut down legitimate activities. For instance, if a satellite's intrusion detection system detects repeated invalid logins or unexpected parameter updates, it could temporarily lock out the offending port or process. Because communication delays to the ground can be lengthy, this on-orbit autonomy sometimes proves vital. However, if automated termination inadvertently interferes with recovery, the spacecraft must provide fallback options, such as safe-mode entry or a backup communication channel. Balancing these factors in the system architecture ensures quick, onboard defenses protect mission-critical assets without irreversibly isolating the vehicle from human intervention.