AC-6(9) - Least Privilege | Log Use of Privileged Functions

Log the execution of privileged functions.


ID: AC-6(9)
Enhancement of : AC-6

Space Segment Guidance

In a space context, auditing privileged functions can ensure that actions with high consequences, such as changing cryptographic keys, reconfiguring flight software, or commanding propulsion, are monitored with exceptional scrutiny.  Since many satellites rely on highly privileged commands to maintain mission-critical operations (e.g., orbit adjustments, thermal management), each invocation of such a command can be decisive for spacecraft safety and mission success.  An audit trail that records who (or which process) issued the privileged instruction, when it was issued, and whether it was successfully authenticated is essential for forensic analysis and anomaly response.  Because on-board memory is at a premium, many space programs implement a “store-and-forward” system that offloads logs to ground stations at scheduled downlink opportunities.  By carefully auditing privileged usage, organizations can detect suspicious patterns (e.g., repeated execution attempts outside standard contact windows) and respond proactively by blocking further commands, switching to redundant subsystems, or investigating potential insider threats.