Positionspapier Security in Space
Positionspapier Security in Space
Positionspapier Security in Space
BDLI Whitepaper
Security for
Space Systems
Content
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Threat Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
8. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Contact
Sentiana Schwerin
Manager Digitalization,
Cyber Security & UAS/AAM
[email protected]
+49 173 769 7881
www.bdli.de
Documents such as the above help to understand and manage the risks to
space missions and ensure secure and successful operations. This is espe-
cially important considering the increasing number of satellites in orbit.
Managing risks to space missions in a structured way leads to the imple-
mentation of necessary cyber security measures for future missions. Space
systems security — clearly distinguishing between safety and security —
exists to prevent malicious acts against space systems. The aim of space
systems security is, therefore, to prevent acts of unlawful interference.
1 https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfe�
-
hlungen/IT-Sicherheit-in-Luft-und-Raumfahrt/it-sicherheit-in-luft-und-raumfahrt.html
This document gives an overview of the mended for space systems. Next, a threat
national and international efforts regarding analysis shows the main threats that need
the definition of guidelines for the aerospace to be controlled by cyber security meas-
industry. It explains why and in which way ures. Furthermore, industry standards in the
cyber security needs to be implemented for fields of cyber security or cyber security of
space systems. space systems are mentioned. Then, the min-
imum requirements for space systems are
For this purpose, space systems architecture
explained, followed by a description of infor-
is described, followed by an explanation of
mation security for space systems.
the security-by-design approach recom-
In this context, architecture refers to differ- Satellite positioning and navigation systems
ent parts working together or interacting to enable the location of a position all over the
achieve a specific purpose. Space system world, on land, the sea, or in the air at any time,
architectures are based on the mission they allowing continuous information even when
perform, with each mission having a specific using a moving receiver. This is particularly
architecture. Nevertheless, space systems relevant where maps or orientation points
architectures generally have several compo- are unavailable or limited.3 Meteorological
nents in common. The general architecture missions consist of a series of satellites pro-
can be broken down into three physical parts: viding observations and measurements from
the space segment, the launch segment and orbit for numerical weather prediction and
the ground segment. also contributing to climate monitoring.4
Finally, remote sensing missions enable the
Relevant classes of space missions are com-
monitoring of the physical characteristics of
munication, positioning and navigation,
an area by measuring its reflected and emit-
weather, remote sensing and launch. Satel-
ted radiation at a distance.
lite communications enable the exchange of
data across the globe within the footprints Satellites contain payloads to accomplish
of the antennas of the network of communi- their primary mission and the necessary infra-
cation satellites. Such communication relies structure for operating the payload.
on ground telecommunication infrastructure,
transmitters and receivers to facilitate critical
communications under a wide range of cir-
cumstances and situations.2
2 https://www.esa.int/Enabling_Support/Preparing_for_the_Future/Space_for_Earth/Space_for_health/Satellite_communications
3 https://www.esa.int/Enabling_Support/Preparing_for_the_Future/Space_for_Earth/Space_for_health/Satellite_positioning_navigation
4 https://www.esa.int/About_Us/Business_with_ESA/Business_Opportunities/Meteorological_Missions
There are several different cyber security When it comes to cyber security for space
standards available. The following standards systems, some standards/guidelines have
are amongst the most commonly applied been published just recently or are still under
industry-wide standards: development:
The BSI IT-Grundschutz Profile5 Space Infra- However, security measures must be adapted
structures—Minimum Protection for Satellites to each mission profile. The document also
Covering their Entire Life Cycle defines mini- includes a list of relevant assets to be pro-
mum requirements for space systems. It pro- tected (applications, IT systems and prem-
vides assistance in formulating requirements ises), an assignment of corresponding BSI
for minimum protection measures during the IT-Grundschutz modules and a checklist to
planning, manufacturing and operation of a support the implementation of those secu-
satellite until the end of its mission. It covers rity requirements deemed necessary for the
at least the basic protection requirements for respective mission.
all types of satellite missions. The described
security measures protecting the confidenti-
ality, availability and integrity of information
aim to minimise material loss and intangible
damage across a satellite’s lifetime.
5 https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Grundschutz/profiles/Profile_Space-Infrastructures.
pdf?__blob=publicationFile&v=2
Apart from the minimum requirements Physical security measures consist of meas-
described in the profile, there are secu- ures concerning the setup of secured/
rity measures that are recommended for restricted areas (including monitored
space systems. The Technical Guideline6 BSI access), instalment of different types of
TR-03184 maps relevant security measures to environmental protection (e.g. fire alarm, fire
potential threats. Security measures include extinguishing systems, air quality monitoring,
the following: protecting equipment against moisture, radi-
ation monitoring, air conditioning), but also
Technical security measures are concerned
the use of clean rooms, fixing devices at their
with implementing certain concepts, such
workplace or keeping documents and media
as a backup concept, a configuration man-
under lock and key.
agement concept and a patch management
concept. Technical security measures also Security measures for software are integrity
include the use of specific systems such as checks of the software supply chain, allow-
intrusion detection and prevention systems ance of the installation of only tested and
or security information and event manage- approved software and software supplier
ment systems. In addition, certain methods, checks.
such as checksums, need to be applied to
Network-specific security measures include
check the integrity of sent/received informa-
setting up the network as a security zone
tion. One last important aspect is carrying out
or making use of separate task-specific
vulnerability scans or penetration tests.
networks.
Additional IT-based security measures are
Satellite-specific security measures are
concerned with the use of mobile devices
suitable frequency band management,
under lock and key, the use of virus protection
communication with the satellite in several
programs and remote access/remote dele-
communication channels/media, encrypted
tion in case of loss of equipment.
communication, and detection of communi-
On the other hand, organisational security cation problems.
measures are concerned with the training of
staff on specific topics, such as handling cer-
tain equipment, as well as general security
awareness. Emergency procedures also need
to be put in place. For visitors coming to site,
rules need to be implemented concerning
the visibility of badges and the supervised
presence in restricted zones. Another field
of organisation security measures includes
cyber threat intelligence and intelligence
sharing amongst organisations.
6 https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TR03184/BSI-TR-03184_part1.
pdf?__blob=publicationFile&v=2
The IEEE Standards Association P3349 - Space System Cybersecurity Working Group 7 is cur-
rently working on establishing international standardisation for space systems. For this pur-
pose, the working group is divided into several subgroups, as shown in the following graph.
Further resources:
7 https://sagroups.ieee.org/3349/the-project/
8 https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/12/6.2022-4302-Int-space-standard.pdf
9 https://aerospacecorp.medium.com/sparta-cyber-security-for-space-missions-4876f789e41c
10 https://spaceshield.esa.int/
ID Name Description
TA0043 Reconnaissance The adversary is trying to gather information they can use to plan future
operations.
TA0042 Resource Development The adversary is trying to establish resources they can use to support operations.
TA0001 Initial Access The adversary is trying to get into your network.
TA0006 Credential Access The adversary is trying to steal account names and passwords.
TA0008 Lateral Movement The adversary is trying to move through your environment.
TA0009 Collection The adversary is trying to gather data of interest to their goal.
TA0011 Command and Control The adversary is trying to communicate with compromised systems to control
them.
TA0040 Impact The adversary is trying to manipulate, interrupt, or destroy your systems and data.
11 https://attack.mitre.org/tactics/enterprise/
↗ https://spaceshield.esa.int
↗ https://spaceshield.esa.int Manipulation