CM-5(1) - Access Restrictions for Change | Automated Access Enforcement and Audit Records

(a) Enforce access restrictions using [Assignment: organization-defined automated mechanisms]; and (b) Automatically generate audit records of the enforcement actions.


ID: CM-5(1)
Enhancement of : CM-5

Space Segment Guidance

Restricting modifications to only authorized software and firmware is pivotal to mission integrity for space missions.  If an unapproved binary were uploaded, it could inadvertently contain logic that disrupts attitude control or corrupts cryptographic keys.  Thus, operators enforce strict whitelists identifying which code modules and versions are permitted.  Ground stations perform cryptographic checks, verifying code signatures align with the official release.  Such measures deter unauthorized or tampered files from being installed, effectively blocking potential insider threats or supply-chain exploits that could sabotage expensive, irreplaceable space assets.