Tactics
Techniques
Countermeasures
Countermeasures
NIST References
ISO IEC 27001
D3FEND
Tactics
Technqiues
Artifacts
Resources
General Information
Getting Started
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Search
Updates
v1.6
v1.0
v1.2
v1.5.1
v1.3.1
v1.3.2
v1.3
v1.3.1.1
v1.4
v1.5
v1.1
Home
Resources
Updates
v1.3
Update - v1.3
Start Date
End Date
April 22 2023
May 08 2023
Below highlights the changes to the website, techniques, sub-techniques, and/or countermeasures.
Website Updates
Added SPARTA
Navigator
Added SPARTA
Countermeasure Mapper
Updated Countermeasure information page
Updated General Information page to include new articles and presentations
Techniques
New Techniques
RD-0005:
Obtain Non-Cyber Capabilities
EX-0016:
Jamming
EX-0017:
Kinetic Physical Attack
EX-0018:
Non-Kinetic Physical Attack
PER-0005:
Valid Credentials
DE-0009:
Camouflage, Concealment, and Decoys (CCD)
DE-0010:
Overflow Audit Log
DE-0011:
Valid Credentials
LM-0006:
Launch Vehicle Interface
LM-0007:
Valid Credentials
Modified Techniques
REC-0001:
Gather Spacecraft Design Information
REC-0003:
Gather Spacecraft Communications Information
REC-0007:
Monitor for Safe-Mode Indicators
REC-0009:
Gather Mission Information
RD-0001:
Acquire Infrastructure
RD-0002:
Compromise Infrastructure
RD-0003:
Obtain Cyber Capabilities
IA-0001:
Compromise Supply Chain
IA-0005:
Rendezvous & Proximity Operations
IA-0007:
Compromise Ground System
IA-0008:
Rogue External Entity
IA-0010:
Exploit Reduced Protections During Safe-Mode
EX-0005:
Exploit Hardware/Firmware Corruption
EX-0007:
Trigger Single Event Upset
EX-0010:
Malicious Code
EX-0011:
Exploit Reduced Protections During Safe-Mode
EX-0013:
Flooding
EX-0014:
Spoofing
PER-0003:
Ground System Presence
PER-0004:
Replace Cryptographic Keys
DE-0001:
Disable Fault Management
DE-0003:
Modify On-Board Values
DE-0007:
Rootkit
DE-0008:
Bootkit
LM-0005:
Virtualization Escape
EXF-0003:
Eavesdropping
EXF-0005:
Proximity Operations
EXF-0006:
Modify Communications Configuration
EXF-0007:
Compromised Ground System
IMP-0002:
Disruption
IMP-0003:
Denial
IMP-0004:
Degradation
IMP-0006:
Theft
Sub-Techniques
New Sub-Techniques
REC-0003.04:
Valid Credentials
RD-0001.04:
Launch Facility
RD-0005.01:
Launch Services
RD-0005.02:
Non-Kinetic Physical ASAT
RD-0005.03:
Kinetic Physical ASAT
RD-0005.04:
Electronic ASAT
IA-0008.03:
ASAT/Counterspace Weapon
EX-0010.01:
Ransomware
EX-0010.02:
Wiper Malware
EX-0010.03:
Rootkit
EX-0010.04:
Bootkit
EX-0016.03:
Position, Navigation, and Timing (PNT)
EX-0016.01:
Uplink Jamming
EX-0016.02:
Downlink Jamming
EX-0014.05:
Ballistic Missile Spoof
EX-0017.01:
Direct Ascent ASAT
EX-0017.02:
Co-Orbital ASAT
EX-0018.01:
Electromagnetic Pulse (EMP)
EX-0018.02:
High-Powered Laser
EX-0018.03:
High-Powered Microwave
DE-0009.01:
Debris Field
DE-0009.02:
Space Weather
DE-0009.03:
Trigger Premature Intercept
LM-0006.01:
Rideshare Payload
Modified Sub-Techniques
REC-0001.01:
Software
REC-0001.03:
Cryptographic Algorithms
REC-0003.01:
Communications Equipment
REC-0003.02:
Commanding Details
RD-0001.03:
Spacecraft
RD-0002.03:
3rd-Party Spacecraft
RD-0003.02:
Cryptographic Keys
IA-0001.01:
Software Dependencies & Development Tools
IA-0001.03:
Hardware Supply Chain
IA-0005.01:
Compromise Emanations
IA-0005.02:
Docked Vehicle / OSAM
IA-0005.03:
Proximity Grappling
IA-0007.02:
Malicious Commanding via Valid GS
IA-0008.01:
Rogue Ground Station
IA-0008.02:
Rogue Spacecraft
EX-0005.02:
Malicious Use of Hardware Commands
EX-0009.01:
Flight Software
EX-0009.03:
Known Vulnerability (COTS/FOSS)
EX-0012.08:
Attitude Determination & Control Subsystem
EX-0013.01:
Valid Commands
EX-0013.02:
Erroneous Input
EX-0014.03:
Sensor Data
EX-0014.04:
Position, Navigation, and Timing (PNT)
PER-0002.01:
Hardware
DE-0002.02:
Jam Link Signal
DE-0003.07:
Cryptographic Modes
EXF-0003.01:
Uplink Intercept
Countermeasures
New Countermeasures
CM0074:
Distributed Constellations
CM0075:
Proliferated Constellations
CM0076:
Diversified Architectures
CM0077:
Space Domain Awareness
CM0078:
Space-Based Radio Frequency Mapping
CM0079:
Maneuverability
CM0080:
Stealth Technology
CM0081:
Defensive Jamming and Spoofing
CM0082:
Deception and Decoys
CM0083:
Antenna Nulling and Adaptive Filtering
CM0084:
Physical Seizure
CM0085:
Electromagnetic Shielding
CM0086:
Filtering and Shuttering
CM0087:
Defensive Dazzling/Blinding
Modified Countermeasures
CM0020:
Threat modeling
CM0024:
Anti-counterfeit Hardware
CM0025:
Supplier Review
CM0026:
Original Component Manufacturer
CM0027:
ASIC/FPGA Manufacturing
CM0028:
Tamper Protection
CM0004:
Development Environment Security
CM0010:
Update Software
CM0011:
Vulnerability Scanning
CM0012:
Software Bill of Materials
CM0015:
Software Source Control
CM0018:
Dynamic Analysis
CM0019:
Static Analysis
CM0021:
Software Digital Signature
CM0023:
Configuration Management
CM0014:
Secure boot
CM0065:
OSAM Dual Authorization
CM0029:
TRANSEC
×
load more results