Share This
Get in Touch

//Mission
Mission
Mission

In space, there is no room for compromise.

Yet an increasing number of space missions rely on critical cyber systems that remain unsecured and vulnerable to attack. We work with you to design a clear, secure roadmap for your organization across all of your space mission lifecycle phases, from the initial design phase to post-delivery.

Proof Labs helps both government and commercial satellite operators and manufacturers assess and consolidate their cyber security posture through a series of risk-based analyses of their existing systems and processes.

Threats and Impacts

The threat modeling phase aims to define the profile of attackers

Risk Trade-Off

The operator decides which risks can be considered acceptable and mitigated

Risk Analysis

Once the attacker profiles have been defined, a list of the potential risk

Architecture Design

Each use case or mission scenario is unique, and each operator

Define relevant threats
and assess impacts

The threat modeling phase aims to define the profile of potential attackers, their level of knowledge, their resources, and their motivation as well as the impacts to the system should an attack occur. This phase is essential as it sets the foundation for the rest of the process and drives the ultimate outcome.

SCENARIOS
0
Minutes a new security vulnerability is identified
0
Days until know security vulnerabilities are remediated
0
Average of known and disclosed vulnerabilities each year
0
Days in the average that a vulnerability is exploited
Risk Analysis //

Risk Analysis

Once the attacker profiles have been defined, a list of the potential risk scenarios can be established. This phase usually looks like a brainstorming session with inputs from both the operator’s technical team and an external offensive team with qualified ethical hackers.

Example 1 threat scenarios

Compromised master keys or any encryption key, software defined radio cyber attack, HW failure (FPGA focused)
01. -
Example 1 threat scenarios

Example 2 threat scenarios

Eavesdropping payload downlink, hack into mission control, email phishing to inject malware

Video Presentation

//Risk Trade-Off

Risk Trade-Off

Once the list of scenarios has been created, the operator decides which risks can be considered acceptable and which ones must be mitigated.

Example

An operator of a cubesat mission lasting two years would likely accept the risk associated with not being able to upgrade its cryptographic algorithms in orbit to prevent post-quantum attacks.  However, the operator of a sensitive GEO satcom mission lasting 15 years may find this risk unacceptable.

Architecture Design

There is no one-size-fits-all architecture. Each use case or mission scenario is unique, and each operator or client will have its own definition of what is the level of risk to be considered acceptable. However, some central concepts are important to comprehend before diving into the design phase.

DESIGN
//Architecture
// About Us

Who is Proof Labs

Proof Labs delivers cybersecurity solutions to help protect critical military, aerospace, satellite, and national defense assets. We incorporate years of research and deep experience in military communications, real-world national defense, and space projects to mitigate the ever-growing threat landscape.

© Proof Labs 2022 / All rights reserved.

Get in Touch
Close