A Cyber Attack-Centric View of Commercial Space Vehicles and the Steps Needed to Mitigate

By Theresa Suloway, Ph.D. , Scott Kordella, Ph.D.

Companies should implement a robust monitoring strategy to detect and mitigate cyber attacks. Companies should share information with the Space ISAC to ensure the safety of space for all.

Download Resources

This paper is provided to inform commercial satellite operators on the workflow of a cyber attacker against their unique ecosystems; it provides techniques and best practices to mitigate steps of an attack. The paper’s principal recommendation is the need for robust monitoring of: the ground network, the RF and optical apertures, spacecraft bus, and command and telemetry. The Space ISAC can help members share findings from monitoring activities and provide indications and or signatures of attackers on their systems to the community.

Other members of the ISAC can hunt for these signatures on their network to defend and mitigate attacks, thus increasing the security of all commercial space. Progress toward sharing signatures and other threat intel has progressed greatly as membership in the ISAC has increased. Further participation and sharing information among members will increase greatly cyber protection for commercial space.