smal allsa sat cyber ber secu ecuri rity ty
play

Smal allsa sat Cyber ber Secu ecuri rity ty IQM Research - PowerPoint PPT Presentation

Smal allsa sat Cyber ber Secu ecuri rity ty IQM Research Institute September 25, 25, 2018 2018 24 Frank Lloyd Wright Drive Michigan A Aerospace M e Manufactures es A Association Space S e Symposium Ann Arbor, Michigan 48106 IQM


  1. Smal allsa sat Cyber ber Secu ecuri rity ty IQM Research Institute September 25, 25, 2018 2018 24 Frank Lloyd Wright Drive Michigan A Aerospace M e Manufactures es A Association Space S e Symposium Ann Arbor, Michigan 48106

  2. IQM Research Institute IQM Focuses on Three Horizons of Innovation Value • Heritage ERIM model • Physics-based Applied R&D Projects • Independent 501.C.3 Revenue • Innovation Delivery • Multi-user Collaboration and Consortiums • TRL/MRL 3 through TRL/MRL 7+ Time (years) • Focus • Disruptive Applications (Gaps, Barriers & Pain Points) • Reshape Underserved & Emerging Markets • Manufactured Products (Commercial and Aerospace) • Trusted Position Member Ref: McKinsey • Locations • Ann Arbor, MI (HQ & Labs) • Offices -- Washington, DC, Atlanta, GA, Palo Alto, CA 2 9/21/2018

  3. Foc ocus s Area eas of of Sp Space System em Cyber ersec ecurity • Mission Payload System • Subsystems • Integrated • Mission Support Systems • Checkout & Launch • Satellite Control • Data Link • Enterprise Support Systems • 3 rd Party Providers

  4. Fr Framing th the Issues Safe & Secure Space Systems Operations System S/W Reliability System Cyber IT Security Counterfeit Components Protection against malware, cyber Detection of corrupt parts, Protection against S/W errors, glitches,. attack,…. Ground Systems/Comm ….. Bug Errors – 9-20 Bugs/1000 LOC Links/Data Reliability, Cyber Security, & Trusted Components 5

  5. Smalls llsat/Cub ubesat Cy Cyber T Thr hreat C Construct Threat Cost & Complexity • Level I – Hacker Threat $ • Close Hacker Pathways • Level II – Unknown/Unknown Threat • Evolve new Architectures and Subsystems $$ • Protect design, manufacture, infrastructure • Level III – Nation State Attack • Outside Industry R&D Purview $$$$ • Partnership with DoD Organizations Gap Exists Between Current State of Practice and the Escalating Creativity of Threat Actors 6

  6. • Presidential Policy Directive (PPD-4) “National Space Policy of the United States of America” • Committee on National Security Systems (CNSS) Series “National Information Assurance Policy for Space Systems Used to Support National Security Space Systems” • CNSSD 505 – Supply Chain Risk Management Cyber Policy • CNSSI 1200 – Risk Management Framework • DoD CIO for DoD Space • DCIO 8581-01- Information Assurance Policy for Space Systems Used by the DoD ( new Memo in 2019) Systems • Encryption to and from platform & payload generated data • CNSS Secretariat – Responsible for tracking Member and Observer Organizations • USSTRATCOM – Responsible for Enforcing Across Multiple DoD Agencies • AFSPC/SMC – Implementation in Acquisition Programs • Contract Terms and Conditions

  7. • Presidential Policy Directive (PPD-4) – Focus on Intent • National Space Council & Federal Aviation Agency Commercial Activities – Focus on Space Traffic Management & Space Debris Prevention Space • Pure Commercial Smallsats/Cubesats Systems Standards • Open Source Architectures & Components • Applicable NIST Standards (NIST 800 Series) & Practices • Security Information & Event Managers/SCAP Validated Products for Cyber • Gray Area – National Defense Authorization Acts (2016/2017/2018) Defense Industrial Base Security • Standards Organizations • IEEE • SAE • CEN/CENELEC

  8. Smallsat Cyber Workforce Education Issues Severe Shortages University & College Student Grand within Cybersecurity Education Limitations Challenges Workforce Curriculum Planning & Content Laboratory Equipment

  9. Where are We Today? Organization DoD & NASA Capability Requirements Threats & Vulnerabilities Lagging Design Accelerating Standards Growing Evolving Commercial Requirements Open

  10. The Smallsat/Cubesat Cyber Future • Smallsat Cyber Security is not a “One and Done” Issue • Growing Market Continues to Attract Evolving Threat Actors • Unacceptable Current Status Quo Against Evolving Threats • State of Practice - Bimodal Mix of Secured & Unsecured Designs • Leaning Forward in Mission Assurance • Increased Use of Encryption • Emerging Policies, Better Design Standards & Best Practices Structural Weaknesses • • Poor Cyber Hygiene in Enterprise Systems • Lack of Wide Scale Engagement of Federal-sponsored Cyber Resources • Component and System Level Compliance Testing • Workforce

Recommend


More recommend