SA-15(3) - Development Process, Standards, and Tools | Criticality Analysis

Require the developer of the system, system component, or system service to perform a criticality analysis: (a) At the following decision points in the system development life cycle: [Assignment: organization-defined decision points in the system development life cycle]; and (b) At the following level of rigor: [Assignment: organization-defined breadth and depth of criticality analysis].


ID: SA-15(3)
Enhancement of : SA-15

Space Segment Guidance

Effective development processes embed structured threat modeling at each design increment. With block diagrams, engineers identify trust boundaries, enumerate attacker goals such as uplink spoofing or sensor blinding, and map controls that block or detect each goal. The threat model evolves with the design, driving unit tests that exercise mitigations and guiding code review checklists. By release freeze, the model provides a living concordance between mission threats, implemented defenses, and residual risks that the authorizing official must weigh before launching.