CNSS - CNSSI-1253F Space Platform Overlay
CNSS - CNSSI-1253F Space Platform Overlay
A space system is a defined set of interrelated processes, communications links, and devices
providing specified products or services to users or customers from a space platform(s), or
directly necessary for the proper operation of the space platform(s). Examples of space system
devices or components are space platforms; payloads; space bus/payload operations centers;
mission/user terminals for initial reception, processing, and/or exploitation; and launch systems.
These devices or components can be categorized into four segments: space segment, launch
segment, ground segment, and user segment. Space platforms and payloads constitute the space
segment. Launch vehicles, launch ranges, launch site services, and payload adapters constitute
the launch segment. Space bus/payload operations centers constitute the ground segment.
Mission terminals constitute the user segment. The life cycle of a space platform consists of the
following phases: on-ground development, on-ground testing, pre-operational testing in space,
operations in space, and decommissioning.
This overlay applies to information technology (IT) components of unmanned space platforms in
the space segment of national security space systems (whether experimental1 or operational).
This overlay does not apply to ground or user segments or to the launch segment, nor does it
address the space platform while it is in development or testing on the ground.2 The assumptions
made in this section about the applicable unmanned space platforms do not necessarily hold true
for manned space platforms or the launch, user, or ground segments.
This overlay does not capture all sources of requirements driving selection of controls. Security
requirements for space systems are contained in Committee on National Security Systems Policy
(CNSSP) No. 12, National Information Assurance Policy for Space Systems Used to Support
National Security Missions, and other issuances such as department- or service-specific
directives and instructions used to implement CNSSP No. 12. Mission-specific technologies,
designs, threats, and concepts of operation (CONOPS) also drive security requirements.
Unmanned space platforms in the space segment differ from ground systems—they do not suffer
the same threats and vulnerabilities as information systems on the ground. The following
describe assumptions made about or characteristics of unmanned space platforms driving the
need to use the Space Platform Overlay (i.e., add or subtract controls):
Space platforms after launch are impractical to physically access for repairs,
reconfiguration, updates, or maintenance once deployed; therefore, many controls
associated with these activities are not selected or must be implemented differently than
intended by the control text. However, the ability for robotic spacecraft to physically
access current and future space platforms is quickly emerging. This will likely require a
1
The concept of “experimental” may refer to a space platform but more often refers to only a payload on the space platform. Experimental
payloads usually do not have command and control capabilities. The experimental asset may not require full protections, because it is not
supporting real-world operations.
2
Ground-based components of space systems may use other appropriate overlays (e.g., tactical, highly sensitive INTs).
2
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Conventional space platforms do not support user accounts of any form (other than
cryptographic accounts); however, advanced space platforms may support user accounts.
Access to command the bus may be distinct from access to command specific payloads,
potentially with different personnel security clearance requirements.
Vulnerability scanning for space platforms from the point of view of external adversaries
is very different than for ground systems. The space platform usually consists of a
mixture of mostly custom and some commercial-off-the-shelf (COTS) and Government-
off-the-shelf (GOTS) hardware and software, so it is not possible to use standard
scanning tools in all cases.
Accreditation boundaries for space systems are often set at the segment (i.e., space,
ground, user, or launch) boundary, thus creating difficulties in assigning controls to
mitigate risk across the entire space system containing components in all three segments.
It is necessary to indicate in the space platform authorization package (i) if the control is
applicable (i.e., the threat and vulnerability associated with a control can affect the space
platform itself) and (ii) if the control is implemented on the space platform or inherited
from a ground system, as it may not be possible, appropriate, or cost effective to
implement all controls on the space platform due to size, weight, and power (SWaP)
limitations. It is not advisable to separate the analysis of the space platform and
controlling ground systems due to the fact that they impact each other’s overall risk
posture. Also, when a platform contains multiple payloads, consideration should be
given to categorizing and accrediting separately those payloads with distinctly different
risk profiles (e.g., experimental vs. operational assets).
Inheritance of functional controls is often advantageous in ensuring space platforms
maintain an appropriate risk posture. Conventional space platforms have limited
connections to external networks and information systems; therefore, Type-1 protected
connections to the ground control systems are not external, but instead an extension of
the trusted enclave. Thus, maintaining ground-based boundary protection and a trusted
system operator base allows for inheritance of many functional controls.
The Space Platform Overlay can serve as a reference for other systems, given some similarities.
Developers of remotely controlled and/or operated non-space platforms or systems (e.g.,
unmanned vehicles or robotic systems) may need to implement security controls similar or
identical to those in the Space Platform Overlay; therefore, these developers are encouraged to
use the Space Platform Overlay as appropriate to address their mission security requirements.
2. Applicability
This overlay applies to the space platform portion of all space systems (whether experimental or
operational) that must comply with CNSSP No. 12. The controls specified in this overlay are
intended to apply to the space platform after it is launched and undergoing pre-operational
testing and during operation.3 The overlay does not address the space platform while it is in
development or testing on the ground. Although not captured in this overlay, additional controls
3
Space platforms have a different testing cycle than most IT. Testing is performed during development. Testing is performed on the ground
with physical connections to other systems. Testing is performed once the space platform is launched but before operations with mission data.
This overlay covers the space platform once launched.
3
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
are required during pre-launch ground testing of the space platform. For example, physical
security controls are not needed after the space platform is launched, but those controls are
definitely needed while the space platform is on the ground during development and testing.
This overlay does not apply to manned space platforms or launch vehicles, as the assumptions
made for unmanned space platforms don’t necessarily apply to these other types of systems.
The Space Platform Overlay applies, if the answer to all the following questions is yes:
1. Is the system (or subsystem) a space platform4 as defined in CNSSP No. 12?5
2. Is the system unmanned?
3. Implementation
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53,
Revision 3, Recommended Security Controls for Federal Information Systems and
Organizations, August 2009 with May 2010 errata updates
Committee on National Security Systems Instruction (CNSSI) No. 1253, Security
Categorization and Control Selection for National Security Systems, March 15, 2012
Any of the baselines defined in CNSSI No. 1253 can be selected for a space system. Addition of
security controls are documented from the Low-Low-Low (LLL) baseline, while any
subtractions of security controls are documented from the High-High-High (HHH) baseline.
This overlay does not require any other overlays to provide the needed protection for most
applicable space platforms; however, a specific space platform’s mission or type of information
may drive additional requirements necessitating the application of other overlays.
As noted throughout the Space Platform Overlay, some modifications to the set of selected
security controls will be necessary for the ground and user segments to support or be compatible
with security controls implemented in the space platform.
The table below contains the security controls (identified with a +) generally always applicable
to space platforms beyond the controls required in the LLL baseline. The table also identifies
those controls generally not applicable (identified with a “--") to space platforms, that are
required by the HHH baseline.
4
Per CNSSP No. 12, a space platform is defined as: A satellite, spacecraft, or space station developed, launched, and operated for purposes of
providing specified products or services to users or customers. A space platform operates at an altitude greater than 100km and typically
consists of a bus and one or more payloads
5
Must the system comply with CNSSP No. 12?
4
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Table 1: Space Platform Overlay Security Controls
SPACE SPACE SPACE
CONTROL PLATFORM CONTROL PLATFORM CONTROL PLATFORM
OVERLAY OVERLAY OVERLAY
AC-6(6) -- IA-2(4) -- PE-15 --
5
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
SPACE SPACE SPACE
CONTROL PLATFORM CONTROL PLATFORM CONTROL PLATFORM
OVERLAY OVERLAY OVERLAY
CP-10(4) + PE-13(2) -- SI-10 +
5. Supplemental Guidance
The supplemental guidance in this section elaborates on the supplemental guidance in NIST SP
800-53 for only those controls and enhancements listed in the table of security controls in
Section 4.6 More general supplemental guidance for all controls (by control family) is provided
in Section 8.
Control Enhancement: 6
Space Supplemental Guidance: Command and control of the space platform (bus and
payloads) is often restricted to operations centers operated by mission organizations or
user equipment provided by mission organizations. As such, there is no non-
organizational user access, and thus the threat/vulnerability addressed by this control does
not exist. Note that this control could be interpreted as applying to the situation where
multiple hosted platform payloads, potentially from different organizations, have access
to the shared platform bus. This control could be interpreted as restricting those payloads
from having privileged access to the bus. In such situations, it might be reasonable to
include this control as part of the control set; alternatively, restricting access to the bus
could be done through combination of AC-6(1) and AC-3.
Control Enhancement: 1
Space Supplemental Guidance: A publically viewable pattern placed over a display (e.g.,
screen saver), is not necessary on space platforms as there are no human readers.
Control Enhancement: 1
Space Supplemental Guidance: For the space platform, the commands that can be
performed without identification and authentication fall into two groups: (i) those
6
This limitation is not imposed by CNSSI 1253 or the overlay template; however, this overlay’s team of authors chose to limit detailed
supplemental guidance in this manner for the sake of relative brevity.
6
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
commands issued over the cryptographic channel but do not require authentication, and
(ii) commands issued when the platform is in crypto-bypass mode. Due to the value and
difficulty of replacing the space platform, the actions permitted that do not require
authentication should be minimized at all impact categories to only those necessary to
support emergency mission/business operations. In the case of the crypto bypass mode,
there should be a clear understanding of the conditions that may be in place when that
mode is active and the actions that may be required to return the space platform to normal
operation as soon as it is safe to do so. As required by AC-14, if there are any actions
that can be performed without identification and authentication, the organization must
document the rationale for the set of selected commands in system design documentation,
justifying that the set of commands available without authentication are only those
necessary to support mission/business operations.
Space Supplemental Guidance: Space platform access does not fall into the definition of
remote access. Space platforms are commanded or directed (as opposed to passive
receipt of information, which is broadcast) from a ground system that has encryption keys
for just that space platform. This makes the space platform communication case
analogous to the VPN. The definitions explicitly state that a virtual private network,
when adequately provisioned with appropriate security controls, is considered an internal
network (i.e., the organization establishes a network connection between organization-
controlled endpoints in a manner that does not require the organization to depend on
external networks to protect the confidentiality or integrity of information transmitted
across the network).
Space Supplemental Guidance: Access to the space platform does not fall under the
definition of remote access, as discussed in AC-17.
Control Enhancement: 3
Space Supplemental Guidance: This control addresses the vulnerability that wireless
capability may be enabled without the user’s knowledge. The term wireless is not
restricted to the typical 802.11x and can be applied to the concept of wireless
communications with a space platform; therefore, both scenarios are addressed here. In
the case of wireless communications with a space platform in space, this control is
generally not applicable, as wireless capabilities are always required to communicate
with the space platform and it is not advisable to disable wireless communications to the
space platform, as there would be no means to command or control the space platform.
In the case of 802.11x wireless, if a space system integrates a COTS module or
component, any wireless capability within the module or component that is not needed to
support the mission or functionality of the space platform should be removed or disabled.
7
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Control Enhancement: 5
Control Enhancement: 4
8
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Control Enhancement: 2
Space Supplemental Guidance: There are no physical controls (e.g., guards, guns,
physical access control lists) applicable to the space platform. The focus of this overlay
is on unmanned space platforms in space, with no physical access for repairs.
Control Enhancement: 1
Space Supplemental Guidance: Audit review and reduction is not performed directly on
the space platform; rather, it is performed on audit data off-loaded to the ground segment.
Reduction of audit data may occur on the space platform within the telemetry stream
between the space platform and the ground. During anomaly resolution, this audit data
can be modified to delve into specific points of interest within the space platform to aid in
determining, identifying, and correcting system failures.
Control Enhancement: 1
Space Supplemental Guidance: Audit review and reduction is not performed directly on
the space platform; rather, it is performed on audit data off-loaded to the ground segment.
Space platforms only do pre-selection of audit events; therefore, it is not possible to
identify events of interest.
Control Enhancement: 2
Control Enhancement: 1
9
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Space Supplemental Guidance: Devices on a space platform must capture data elements
consistent with Annex J of CNSSI 1253. Correlation and compilation of audit records is
a ground segment function. Space platform payloads are monitored separately,
separately owned, and conceivably transmit their payload audit to the payload owners.
Even in fractionated space platforms, audit data would be sent bent pipe (i.e., opaquely
encrypted for that payload) to the payload owner.
Space Supplemental Guidance: Alternate storage is not applicable to the space platform.
On the space platform, there is no user data in long term storage; user data is only
transitory. System data exists, but it is not subject to backup; rather, a master system
image is maintained on the ground and uploaded when required. Space platform data
stored in the ground system is subject to this control and satisfaction of the control is the
responsibility of the ground system.
Space Supplemental Guidance: This control is not applicable to the space platform, but
to the supporting ground system. On the space platform, there is no user data in long
term storage; user data is only transitory, or if stored, is stored temporarily and forwarded
to the ground. System data exists, but is not subject to backup; rather, a master system
image is typically maintained on the ground and uploaded when required (and thus, that
master system image is the backup). Documentation is maintained on the ground as part
of the ground segment. Backup of space platform information stored in the ground
system is the responsibility of the ground system.
Control Enhancement: 2
Control Enhancement: 4
10
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
software image, because unintended consequences could result in the loss or disabling of
the space platform. For a space platform, the operational image is prepared and fully
tested on the ground and then uploaded as the complete image to the space platform.
Control Enhancement: 5
Space Supplemental Guidance: Although advanced space platforms may have user
accounts, the access for those accounts is not considered to be “local access” and would
be addressed by the network access controls on the ground segment.
Space Supplemental Guidance: There is no need to control physical access to remote and
static media. The space platform does not have removable media, and access to static
media is prevented by the physical environment of space. Logical access is addressed not
through this control, but through AC-3.
Control Enhancement: 2
Space Supplemental Guidance: Space platforms do not have any portable digital media
or devices. Some space platforms in the past did have ejectable film canisters, but that
technology is no longer in use.
Space Supplemental Guidance: There is no need for human readable markings, as there
are no humans accessing the space platform in the environment of operation, no
removable media or removable media devices, and no display or print devices. However,
for reusable space platforms, such controls may be needed to support ground recovery
and refurbishment.
11
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Control Enhancement: 1
Control Enhancement: 3
Space Supplemental Guidance: The space platform does not support removable media.
Space Supplemental Guidance: Unmanned space platforms after launch are physically
inaccessible to personnel; therefore, physical access authorizations are not necessary.
Space Supplemental Guidance: Unmanned space platforms after launch are physically
inaccessible to personnel and have no facility, access points, or access control
mechanisms; therefore, physical access control is not necessary.
Control Enhancement: 3
Control Enhancement: 4
12
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Space Supplemental Guidance: Same as for the base control PE-3. Due to the SWaP
constraints, lockable casings are not practical on a space platform.
Space Supplemental Guidance: The threat addressed by this control is physical access to
wired information system distribution and transmission lines. Such lines do not exist for
the space platform; all communication is wireless.
Space Supplemental Guidance: Space platforms do not have output devices in the sense
used by this control.
Space Supplemental Guidance: Unmanned space platforms after launch are physically
inaccessible to personnel; therefore, physical access monitoring in the sense intended by
the control is not necessary. Objects in the space domain are monitored and tracked
using other systems not directly tied to the space platform.
Control Enhancement: 1
Space Supplemental Guidance: Unmanned space platforms after launch are physically
inaccessible to personnel; therefore, visitor control is not necessary.
Control Enhancement: 1
Space Supplemental Guidance: Unmanned space platforms after launch are physically
inaccessible to personnel; therefore, access records are not necessary.
Control Enhancement: 2
13
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Space Supplemental Guidance: Unmanned space platforms after launch have no
facilities or personnel; therefore, a manually-activated emergency power shutoff is not
necessary.
Control Enhancement: 1
Space Supplemental Guidance: Fire is not possible in the vacuum of space, as there is no
oxygen to burn. The control references features (e.g., smoke detectors, sprinklers, fire
extinguishers) necessary for manned facilities on the ground or in space (i.e., where
oxygen is present). These features are not necessary for completely self-contained,
unmanned space platforms. Concerns about overheating are addressed in PE-14.
Space Supplemental Guidance: Unmanned space platforms after launch are physically
inaccessible to personnel, have no facility with entry/exit points, and have no components
14
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
entering or exiting the space platform; therefore, there is no need to authorize, monitor,
control, or record components in this manner.
Space Supplemental Guidance: Unmanned space platforms after launch are physically
inaccessible to personnel; therefore, an alternate work site (e.g., telework location) is not
required or possible.
Control Enhancement: 5
SA-4, ACQUISITIONS
Control Enhancement: 1
Space Supplemental Guidance: Experience with space platforms has shown that software
and hardware assurance is critical to mission success. Failure of a software or hardware
component can result in the loss of a very expensive asset. Complete understanding of
the functional properties of the implemented security controls is critical at all integrity
impact levels to ensure there are no flaws in the space platform hardware and software
mechanisms.
Control Enhancement: 2
Space Supplemental Guidance: Experience with space platforms has shown that software
and hardware assurance is critical. Failure of a software or hardware component has
significant recovery costs and can result in the loss of a very expensive asset. Complete
understanding of the design and implementation details of security controls is critical at
all integrity impact levels to ensuring the reliability of the flight software and hardware.
Every effort should be made to incorporate this control into the statement of work
requirements for existing bids.
Control Enhancement: 3
15
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Space Supplemental Guidance: The emphasis of space platform development is on
minimization of flaws in flight software and hardware. Reuse of successful software is
considered a state-of-the-practice approach for space systems takes advantage of the
extensive testing already performed on the software. However, software reuse and
development is also affected by control SA-11(1), which requires the use of code analysis
tools. These tools should be run against reused software as well to ensure newly
identified common weaknesses are uncovered. For truly experimental payloads which
are not intended or allowed to be used to support real-world operational missions, the
authorizing official may be more risk tolerant and may not require the full set of controls.
Control Enhancement: 5
Space Supplemental Guidance: The program office (i.e., the organization responsible for
development or acquisition) will specify the requisite delivered security configuration for
the space platform. It is essential space platforms are delivered in a securely configured
state, because it is more difficult to correct deficiencies on the space platform after it is
launched; and, such delivery ensures that what was delivered is in the same configuration
as when tested.
Control Enhancement: 4
Space Supplemental Guidance: Space platforms require additional analysis and testing of
the low-level design in order to understand and prevent anomalies before launch of the
space platform, and so that if anomalies occur after launch, the analysis is available to
repair the anomalies.
Control Enhancement: 5
Space Supplemental Guidance: This control is always applicable for anything other than
an experimental payload—the higher risk tolerance for some experimental payloads may
mean source code analysis is not essential. The space platform requires additional
analysis of source code in order to both understand and prevent anomalies before launch
of the space platform, so that if anomalies occur after launch, the analysis is available to
repair the anomalies. Satisfying this control may be a challenge for commercial space
platforms supporting national security missions—in such cases, use of proprietary
information protections (e.g., non-disclosure agreements, special handling requirements)
may be required in order to have the source code available for anomaly analysis.
Control Enhancement: 2
16
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
configuration management process and there are no viable alternatives (e.g., the
developer is the only source for a mission critical component).
Control Enhancement: 1
Control Enhancement: 2
Control Enhancement: 3
Space Supplemental Guidance: Space platforms are costly and difficult to repair or
replace; therefore, all vulnerabilities must be well understood before placing space
platforms in operation. Use of independent verification and validation agents to witness
the security test and evaluation executed against a security assessor-approved plan is
required to ensure impartial testing results (with all identified vulnerabilities) are
conveyed to the authorizing official for an informed authorization decision.
Control Enhancement: 4
Space Supplemental Guidance: This control is applicable for the security functionality
implemented on the space platform, and strongly encouraged for other mission functions.
Implementing largely independent modules reduces the risk that an anomaly in one
17
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
module will impact another module. As such, this supports both good engineering design
and mission assurance.
Space Supplemental Guidance: This control is required for all space platform buses to
ensure high priority functions are carried out, but it is particularly important when there
are multiple payloads sharing a bus providing communications and other services, where
bus resources must be prioritized based on mission.
Control Enhancement: 7
Space Supplemental Guidance: Space platforms do not use strict tunneling in the sense
intended by this control. However, when the ground system is communicating with the
space platform, other network communications from the ground segment may not be
routed through the space platform. Measures to ensure appropriate separation (e.g., on a
multi-payload hosting bus) must be considered on a case-by-case basis; however,
examples of measures to consider include cryptographic isolation, TEMPEST mitigation,
logical separation of information flows, etc.
Control Enhancement: 8
Control Enhancement: 14
Space Supplemental Guidance: Unmanned space platforms after launch are not
accessible to personnel, and this precludes malicious actors from making surreptitious
physical connections to bypass components after launch. Before launch, unauthorized
physical connections are prevented through rigorous systems engineering and design
processes to attain and maintain a secure configuration and by physical security
protections for the facilities housing the space platform before launch.
Control Enhancement: 15
Space Supplemental Guidance: For the space platform, this capability is provided by a
dedicated encryption device for the control plane. This is the approach commonly taken
on space platforms, where command and control typically uses a different algorithm and
encryptor from the algorithm and encryptor used for the data plan. NOTE: This control
is arguably not required for truly experimental space platforms.
18
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
SC-8, TRANSMISSION INTEGRITY
Control Enhancement: 1
Control Enhancements: 3
Control Enhancement: 2
Space Supplemental Guidance: The cryptography for space systems must be National
Security Agency (NSA) approved, as dictated by CNSSP No. 12. NOTE: CNSSP No.
12 requires NSA-approved cryptography at all classification levels. This doesn’t
necessarily mean NSA will require NSA-certified Type-1 encryption for all applications
requiring encryption.
Space Supplemental Guidance: The space platform does not provide collaborative
computing devices or support instant messaging clients.
Space Supplemental Guidance: Although VoIP traffic might go through the payload and
bus of space platforms, there are no VoIP client connections to space platform
components.
Control Enhancement: 2
19
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Space Supplemental Guidance: Although advanced space platforms may support user
sessions, termination of a session is through commanding or closure of an access
window, not through a “logout” button on a graphical user interface.
Control Enhancement: 4
Control Enhancement: 7
Space Supplemental Guidance: The space platform does not have the capability to notify
specific personnel. The goal of the notification is to identify broad-based attacks. For
the space platform, this is addressed better through the coordination of space platform
monitoring and ground system monitoring provided through controls SI-4 and SI-4(16).
As for actions to terminate suspicious events, typically the decision to terminate is made
on the ground and the action is performed via the command uplink. However, automated
termination of processes or selected sessions is plausible, if the implications are well
thought out in advance.
Space Supplemental Guidance: The space platform does not serve as the terminus of
electronic messages, where spam would have an adverse effect. If the space platform
mission supports messaging, any spam protection mechanisms are implemented either in
the user segment or in the point of connection to the source of the messages.
20
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
over certain areas, it is important to prevent bogus data from being accepted; otherwise,
valid data might be denied storage space.
Control Enhancement: 4
Space Supplemental Guidance: On the space platform, the transition might not be fully
transparent, as space platform operators must be aware of the state of the space platform
and must often initiate the transition after careful consideration, so as not to jeopardize
operations. The assignment values are based on mission specifics.
Table 2 contains specific parameter values unique to the Space Platform Overlay.
7. Regulatory/Statutory Controls
None of the security controls in the Space Platform Overlay are required for regulatory or
statutory purposes.
21
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
8. Tailoring Considerations
This section provides general considerations when tailoring the set of security controls for a
space platform, followed by more specific considerations relevant to each family of security
controls. The set of security controls resulting from application of overlays may need some
modification to address mission-specific technologies, designs, threats, and concept of
operations. Such modifications are permitted with the authorizing official’s approval on a case-
by-case basis.
Space systems have constraints—some security controls could be implemented on the space
platform, but it is often better or only possible to implement them on the ground. The ground vs.
space platform tradeoff must be examined as part of the SA-8 systems engineering process. For
example, Account Management, Individual Identification and Authentication, Authorization,
Auditing, Configuration Management, and similar controls are often better implemented within
ground-based systems and inherited by the space platform. Robust systems engineering limits
the impacts due to SWaP, complexity, technology, and cost constraints, while enabling assured
implementations from ground-based systems, which often offer cost-competitive and
continuously improving designs.
When tailoring security controls, consider all connections and interfaces with other external
systems to address system-of-systems security challenges. Modifications may be required to
address special or more stringent mission or enterprise needs to detect, defend against, survive,
and operate through or quickly recover from attacks. Consideration should be given to any
likely changes in mission operations or concept of operations (e.g., degree of interconnectivity
with other domains, size and composition of the communities of interest, inclusion of coalition or
civil entities as users) to minimize future security risks without incurring additional costs.
Additional controls beyond those selected in the integrity baseline may be necessary for the
space platform. Unless it is data upon which no decisions or actions will be based (e.g.,
entertainment purposes only), the integrity of all data processed, stored, and received or
transmitted by space platforms is critical. Corrupting the integrity of commands or software
uploads to space platforms can lead to loss of the space platform and/or damage to other space
platforms or missions. Corrupting the integrity of telemetry generated onboard a space platform
can degrade or deny the ability of operators to monitor and maintain the space platform in a safe
and secure state. Corrupting the integrity of data generated or received by payloads onboard the
space platform may result in mission failure, depending on how much data is corrupted and also
on whether or not the data is easily identified as corrupted. Therefore, controls selection shall
take into account the impact that a loss of integrity has on space platforms.
22
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
are also vulnerable to traffic analysis, radio fingerprinting and other threats. In view of the
above, all space systems are required to determine what TRANSEC controls are necessary for
their mission and concept of operations. These controls must be implemented to adequately
protect the links over the life of the system.
Use of commercial space services for launch, communications, remote sensing, etc., to support
national security system (NSS) missions and the use of commercial space platforms to host NSS
payloads will likely require tailoring of the set of selected security controls in order to provide
the appropriate level of protections otherwise not provided for in a commercial best practice
scenario. Provision of protections may have to be negotiated with the commercial provider
and/or the authorizing official may be asked to assume higher residual risk due to many controls
being absent in a specific service provider’s system.
25
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
reduce the risk of the primary and the alternate being disabled by the same hazard in a
narrow time frame.
The potential avenues of single-point-of-failure must be identified when considering
ground-to-space platform communications. One concern is the network connecting to a
range tracking station (such as the Air Force Satellite Control Network (AFSCN)).
Because all communications are over-the-air, they all have similar failure modes
depending on their frequency or spectrum.
Continuity of Operations Plans must take a holistic view, addressing loss of the space
platform, loss of ability to communicate with the space platform, and loss of various
components of the ground and user segments. Consideration should be given to the
impact on all missions, whether directly or indirectly supported, resulting from the loss of
a space platform.
Aspects of contingency planning are inherited from ground segments. Table-top
exercises or simulations are preferred methods of testing contingency plans.
26
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
result in loss of control of the entire space platform. Dynamic reconfiguration capability
in a specific payload may be more practical operationally.
27
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
Surveillance Network provides a level of space situational awareness, such that the
controls dealing with “gates, guards, and guns.”
Some aspects of environmental controls remain of concern for the space platform, such as
power, temperature, and radiation. Other aspects of the environment are not relevant to
the vacuum of space, such as fire protection or water protection. In general, engineering
for the space environment is already a part of space system engineering; therefore, the
controls in this family are often redundant with existing space system design standards.
Although humidity is not a concern in the vacuum of space, temperature is a concern.
Space platform design includes temperature sensors and systems designed to keep the
space platform components within operating temperature ranges. As such, temperature
controls are addressed by standard space platform engineering and no additional
mechanisms are required. Still, ground operators need training in understanding
temperature readings and how to address them when they go out of range.
Space platform power distribution is focused on moving power from the solar arrays or
batteries to the bus, and from the bus to the payloads. The protection of these distribution
mechanisms from the hazards of the environment is critical, and a standard part of space
platform system design. Ground-based aspects of power distribution tend not to apply to
the space platform, such as the provisions for uninterruptable power supplies (the space
platform is essentially its own self-contained generator, by definition).
Emanations leakage concerns exist between multiple payloads and between payloads and
the bus within a single space platform.
30
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
prior to launch occurs prior to authorization to operate but must be addressed through
assignment and implementation of controls for that portion of the life cycle.
Logical intrusion has a different focus, as space platforms rarely provide general-purpose
operating systems or publically available interfaces.
Frequency of scanning on space platforms can be less than for ground-based systems, due
to infrequent changes to system components or less accessibility to the space platform.
Further, the nature of the scanning may be different, looking more at software versions as
opposed to patches applied, due to the way software is loaded into the space platform.
Processes and procedures need to be in place to assure all software uploaded to the space
platform—either by organizational users or non-organizational users with hosted
payloads—is appropriately scanned. Arbitrary code cannot be uploaded onto space
platforms; therefore, scanning for malicious code is performed by ground personnel
before any code is uploaded to the space platforms. Although a space platform could
perform malware scanning, the overhead of this scanning combined with the fact that
space platforms do not use susceptible commodity operating systems make ground-based
scanning more effective.
There are no direct non-privileged users on the space platform. However, the threat to be
addressed is that hosted payload software might bypass malicious code detection.
Monitoring of events is not the traditional network or host-based intrusion detection
system (IDS), but rather looking at space platform-specific attack patterns (e.g. jamming)
and geolocation of attackers. This could conceivably include examination of
communications to the space platform, both before decryption and after decryption. The
nature of the sensors might thus include both traditional software monitors as well as
specialized detectors.
The nature of testing—and more importantly, the frequency of testing—will be different,
because most space platforms do not use traditional network communications, and thus
commodity test packages would be inappropriate. Further, the nature of space platform
software means there is less capability for the tools to change, meaning that testing could
be restricted to known maintenance windows. The decision depends on the specific
mission of the space platform, the ease of testing, and the volatility of the mechanism.
The VPN traffic concern does not apply to the space platform—note the distinction
between information transmitted to the space platform, as opposed to information
transmitted through the space platform. For the latter, intrusion detection is best provided
on the ground, as the traffic is treated as opaque blocks by the space platform. For traffic
terminating on the space platform, this is a valid concern. Space platform
communications are encrypted, and the intrusion monitoring must look for anomalous
patterns after the traffic is decrypted.
Generally, rogue wireless devices have the implication of traditional Internet wireless
communications (“Wi-Fi”), not the type of wireless device. There might be a similar risk
in fractionated space platform constellations (i.e., of a rogue fraction attempting to enter
the constellation); however, the nature of space is such that such a space platform would
be easily identified through monitoring of space objects and launches. There is, however,
the possibility a rogue space platform might have more than one mission, which may not
be discernible through normal space monitoring.
Information Assurance Vulnerability Alert (IAVA) would rarely be issued on software
used in conventional space platform. There are a number of reasons for this:
31
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
conventional space platform software tends to be unique to the space platform, and space
platform software is rarely reused as a single component. Reuse remains a concern: the
operating organization should be on alert for IAVAs related to third-party components or
modules integrated into the space platform software. For more advanced space platforms
using COTS products, IAVAs may be issued, and the space platform must be designed
such that IAVAs could be implemented.
Predictable failure prevention addresses proactive transfer to a spare in the space segment
based on statistical mean time to failure (MTTF) analysis (i.e., before a component is
expected to fail). However, redundancy has its limitations; the space platform cannot
carry an unlimited number of spares. Given this and that (i) components often run longer
than their MTTF before failure, and (ii) transfer to the redundant component carries its
own risks of failure, it is more appropriate for space platforms to transfer when the
component fails, and not before. Although there have been cases where a spare was used
and an older asset was put in an inactive state and used for another purpose or as a spare,
this is not done in a proactive fashion based on MTTF. There are risks associated with
transferring space platform components; therefore, it makes more sense to transfer only
when needed to maintain service rather than perform transfers on a routine schedule.
9. Duration
Overarching or space-specific policy or instructions (e.g., CNSSP No. 12) are revised,
replaced, or terminated
New space-specific threat assessments are issued by appropriate authorities
There are significant changes in space system or cyber security technology
There are significant changes in the space
operational concepts or architectures.
10. Definitions
This overlay uses terms in NIST SP 800-53, Rev. 3, CNSSI No. 4009, National Information
Assurance (IA) Glossary, or CNSSP No. 12. The following space-unique terms are defined in
CNSSP No. 12: bus, launch vehicle, NSA-approved cryptographies, payload, space platform,
and space system. Terms unique to this overlay and not defined elsewhere are defined below.
Advanced platform An advanced platform is a space platform that may be networked using a
network protocol stack (such as IP protocols); may require relatively
powerful on-board processors; in addition to simple command
authentication, may support asymmetric encryption for authentication/
signatures (in addition to symmetric encryption); may use digitally-signed
32
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F
commanding; may support multiple communities of interest; may support
user accounts (with unique login); may have relatively high on-board
storage requirements; in terms of communications, may support more
advanced interfaces, such as a flexible/adaptable bit rate interface; may be
capable of supporting packet-based encryption for commands, telemetry, or
data; and may use both switchable and routable relaying.
Conventional platform A conventional platform is a space platform that is not networked; uses
command authentication for access control (that is, verification the
command is valid as opposed to verification of the source of the
command); has a serial/constant bit rate (CBR) interface; uses link
encryption for commands, telemetry, and data; and may use a bent-pipe
approach to relaying.
Ground segment That portion of a space system used to command and control space
segment components. The ground segment consists of mission operations
centers, tracking stations, and relay stations.
Launch segment That portion of a space system that launches a space platform into space. It
consists of launch vehicles, launch range, payload adapter, and launch site
services (such as range safety and payload integration and processing).
Space segment That portion of a space system consisting of the primary mission space
platforms, mission payloads flown on other space platforms, and any relay
satellites necessary for mission operations.
User segment That portion of a space system consisting of land, sea, air, and/or space-
borne terminals used by those in the field to carry out the mission of the
space system.
33
Space Platform Overlay
06/01/2013 Attachment 2 to Appendix F