In space, there is no room for compromise.
Yet an increasing number of space missions rely on critical cyber systems that remain unsecured and vulnerable to attack. We work with you to design a clear, secure roadmap for your organization across all of your space mission lifecycle phases, from the initial design phase to post-delivery.
Threats and Impacts
The threat modeling phase aims to define the profile of attackers
The operator decides which risks can be considered acceptable and mitigated
Once the attacker profiles have been defined, a list of the potential risk
Each use case or mission scenario is unique, and each operator
Define relevant threats
and assess impacts
The threat modeling phase aims to define the profile of potential attackers, their level of knowledge, their resources, and their motivation as well as the impacts to the system should an attack occur. This phase is essential as it sets the foundation for the rest of the process and drives the ultimate outcome.
Minutes a new security vulnerability is identified
Days until know security vulnerabilities are remediated
Average of known and disclosed vulnerabilities each year
Days in the average that a vulnerability is exploited
Once the attacker profiles have been defined, a list of the potential risk scenarios can be established. This phase usually looks like a brainstorming session with inputs from both the operator’s technical team and an external offensive team with qualified ethical hackers.
Example 1 threat scenariosCompromised master keys or any encryption key, software defined radio cyber attack, HW failure (FPGA focused)
Example 2 threat scenariosEavesdropping payload downlink, hack into mission control, email phishing to inject malware
Once the list of scenarios has been created, the operator decides which risks can be considered acceptable and which ones must be mitigated.
An operator of a cubesat mission lasting two years would likely accept the risk associated with not being able to upgrade its cryptographic algorithms in orbit to prevent post-quantum attacks. However, the operator of a sensitive GEO satcom mission lasting 15 years may find this risk unacceptable.
There is no one-size-fits-all architecture. Each use case or mission scenario is unique, and each operator or client will have its own definition of what is the level of risk to be considered acceptable. However, some central concepts are important to comprehend before diving into the design phase.
Who is Proof Labs
Proof Labs delivers cybersecurity solutions to help protect critical military, aerospace, satellite, and national defense assets. We incorporate years of research and deep experience in military communications, real-world national defense, and space projects to mitigate the ever-growing threat landscape.