SA-15(7) - Development Process, Standards, and Tools | Automated Vulnerability Analysis

Require the developer of the system, system component, or system service [Assignment: organization-defined frequency] to: (a) Perform an automated vulnerability analysis using [Assignment: organization-defined tools]; (b) Determine the exploitation potential for discovered vulnerabilities; (c) Determine potential risk mitigations for delivered vulnerabilities; and (d) Deliver the outputs of the tools and results of the analysis to [Assignment: organization-defined personnel or roles].


ID: SA-15(7)
Enhancement of : SA-15

Space Segment Guidance

Modern toolchains include static analyzers, container scanners, and software bill of materials generators that run automatically at every commit. Enabling these tools in the continuous integration pipeline forces developers to confront common weaknesses such as buffer overruns or the use of deprecated crypto libraries while the fix is still cheap. Store the scan reports in the configuration-management system, require zero critical findings before the merge, and re-run the suite whenever a third-party package updates. This ensures that later builds cannot silently re-introduce flaws already excised.