SA-11(6) - Developer Testing and Evaluation | Attack Surface Reviews

Require the developer of the system, system component, or system service to perform attack surface reviews.


ID: SA-11(6)
Enhancement of : SA-11

Space Segment Guidance

Attack surface reviews for satellites delve into every interface—RF uplinks, payload data channels, onboard networks, and even debug or maintenance ports—mapping out where adversaries might probe for weaknesses. By identifying all possible entry points, developers can methodically apply mitigations or hardening measures, such as disabling unnecessary protocols or isolating payload processes. It is also wise to consider nontraditional surfaces, like scheduled housekeeping commands or overshadowed bus interconnects, that might inadvertently give a backdoor into mission software. During testing, teams compare the discovered surface against known threat models (e.g., jamming, code injection, cross-payload tampering) and verify that each interface enforces robust authentication and parameter checking. This approach unearths inherited vulnerabilities for heavily reused or legacy software, ensuring that prior code exposures do not remain hidden. Given the high stakes of orbital operations, methodical attack surface reviews help ensure that even subtle entry points are understood and appropriately guarded.