smal allsa sat cyber ber secu ecuri rity ty
play

Smal allsa sat Cyber ber Secu ecuri rity ty IQM Research - PowerPoint PPT Presentation

Smal allsa sat Cyber ber Secu ecuri rity ty IQM Research Institute September 25, 25, 2018 2018 24 Frank Lloyd Wright Drive Michigan A Aerospace M e Manufactures es A Association Space S e Symposium Ann Arbor, Michigan 48106 IQM


  1. Smal allsa sat Cyber ber Secu ecuri rity ty IQM Research Institute September 25, 25, 2018 2018 24 Frank Lloyd Wright Drive Michigan A Aerospace M e Manufactures es A Association Space S e Symposium Ann Arbor, Michigan 48106

  2. IQM Research Institute IQM Focuses on Three Horizons of Innovation Value • Heritage ERIM model • Physics-based Applied R&D Projects • Independent 501.C.3 Revenue • Innovation Delivery • Multi-user Collaboration and Consortiums • TRL/MRL 3 through TRL/MRL 7+ Time (years) • Focus • Disruptive Applications (Gaps, Barriers & Pain Points) • Reshape Underserved & Emerging Markets • Manufactured Products (Commercial and Aerospace) • Trusted Position Member Ref: McKinsey • Locations • Ann Arbor, MI (HQ & Labs) • Offices -- Washington, DC, Atlanta, GA, Palo Alto, CA 2 9/21/2018

  3. Foc ocus s Area eas of of Sp Space System em Cyber ersec ecurity • Mission Payload System • Subsystems • Integrated • Mission Support Systems • Checkout & Launch • Satellite Control • Data Link • Enterprise Support Systems • 3 rd Party Providers

  4. Fr Framing th the Issues Safe & Secure Space Systems Operations System S/W Reliability System Cyber IT Security Counterfeit Components Protection against malware, cyber Detection of corrupt parts, Protection against S/W errors, glitches,. attack,…. Ground Systems/Comm ….. Bug Errors – 9-20 Bugs/1000 LOC Links/Data Reliability, Cyber Security, & Trusted Components 5

  5. Smalls llsat/Cub ubesat Cy Cyber T Thr hreat C Construct Threat Cost & Complexity • Level I – Hacker Threat $ • Close Hacker Pathways • Level II – Unknown/Unknown Threat • Evolve new Architectures and Subsystems $$ • Protect design, manufacture, infrastructure • Level III – Nation State Attack • Outside Industry R&D Purview $$$$ • Partnership with DoD Organizations Gap Exists Between Current State of Practice and the Escalating Creativity of Threat Actors 6

  6. • Presidential Policy Directive (PPD-4) “National Space Policy of the United States of America” • Committee on National Security Systems (CNSS) Series “National Information Assurance Policy for Space Systems Used to Support National Security Space Systems” • CNSSD 505 – Supply Chain Risk Management Cyber Policy • CNSSI 1200 – Risk Management Framework • DoD CIO for DoD Space • DCIO 8581-01- Information Assurance Policy for Space Systems Used by the DoD ( new Memo in 2019) Systems • Encryption to and from platform & payload generated data • CNSS Secretariat – Responsible for tracking Member and Observer Organizations • USSTRATCOM – Responsible for Enforcing Across Multiple DoD Agencies • AFSPC/SMC – Implementation in Acquisition Programs • Contract Terms and Conditions

  7. • Presidential Policy Directive (PPD-4) – Focus on Intent • National Space Council & Federal Aviation Agency Commercial Activities – Focus on Space Traffic Management & Space Debris Prevention Space • Pure Commercial Smallsats/Cubesats Systems Standards • Open Source Architectures & Components • Applicable NIST Standards (NIST 800 Series) & Practices • Security Information & Event Managers/SCAP Validated Products for Cyber • Gray Area – National Defense Authorization Acts (2016/2017/2018) Defense Industrial Base Security • Standards Organizations • IEEE • SAE • CEN/CENELEC

  8. Smallsat Cyber Workforce Education Issues Severe Shortages University & College Student Grand within Cybersecurity Education Limitations Challenges Workforce Curriculum Planning & Content Laboratory Equipment

  9. Where are We Today? Organization DoD & NASA Capability Requirements Threats & Vulnerabilities Lagging Design Accelerating Standards Growing Evolving Commercial Requirements Open

  10. The Smallsat/Cubesat Cyber Future • Smallsat Cyber Security is not a “One and Done” Issue • Growing Market Continues to Attract Evolving Threat Actors • Unacceptable Current Status Quo Against Evolving Threats • State of Practice - Bimodal Mix of Secured & Unsecured Designs • Leaning Forward in Mission Assurance • Increased Use of Encryption • Emerging Policies, Better Design Standards & Best Practices Structural Weaknesses • • Poor Cyber Hygiene in Enterprise Systems • Lack of Wide Scale Engagement of Federal-sponsored Cyber Resources • Component and System Level Compliance Testing • Workforce

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend