Industry Aerospace
Methodology PASTA

Satellite Infrastructure - Complete PASTA Walkthrough

This case study demonstrates threat modeling applied to space satellite infrastructure. This walkthrough addresses a fundamentally different domain with unique constraints: systems you cannot physically access after deployment, extreme latency considerations, radio frequency vulnerabilities, and nation-state threat actors.

Satellite systems make fascinating threat modeling subjects because the consequences of getting security wrong are severe and often irreversible. You cannot SSH into a satellite to patch it. You cannot reboot the ground station while customers are mid-flight over the Atlantic. The attack surface spans from terrestrial facilities to orbital assets to user terminals scattered across the globe.


OrbitLink operates a commercial low Earth orbit (LEO) satellite constellation providing broadband connectivity to maritime, aviation, and remote enterprise customers. Here’s the system at a glance:

AttributeDetail
OrganizationCommercial satellite communications provider
Constellation180 LEO satellites at ~550km altitude
Ground Infrastructure12 ground stations across 4 continents
Customer Base~2,500 enterprise customers (shipping, airlines, oil/gas, government)
Key FunctionsBroadband data relay, maritime safety communications, aviation connectivity
Annual Revenue$850M
Regulatory ContextFCC (Part 25), ITU Radio Regulations, ITAR (some components)

The network handles commercial traffic but also serves as backup communications for emergency services and includes some government contracts. A compromise could disrupt maritime safety communications, expose confidential business data, or enable tracking of sensitive government movements.

Let’s threat model it.


Stage 1: Define Business Objectives

Satellite communications is a capital-intensive business with long planning horizons. A single satellite costs $5-15M to build and $50-80M to launch. The constellation represents over $3B in deployed assets that cannot be physically serviced. Business context matters enormously because security investments must be weighed against the irreversible nature of space infrastructure decisions.

Business Drivers

OrbitLink exists to provide reliable connectivity where terrestrial infrastructure doesn’t reach. Ships in the middle of the Pacific, aircraft over polar routes, oil rigs hundreds of miles offshore, and rural communities beyond fiber reach all depend on satellite connectivity. For many customers, OrbitLink isn’t a convenience—it’s their only option.

Revenue concentration creates specific business risks. The top 20 customers (major shipping lines, airlines, and government agencies) represent 65% of revenue. Losing a major airline contract due to a security incident would be catastrophic. Government customers have explicit security requirements in their contracts.

Competitive dynamics are intensifying. SpaceX’s Starlink and Amazon’s Project Kuiper are deploying massive constellations. Differentiation increasingly depends on service reliability and security posture, particularly for enterprise and government customers who won’t trust their data to the lowest bidder.

Security Objectives

PriorityObjectiveRationale
PrimaryProtect command and control integrityLoss of satellite control could result in debris, interference, or total asset loss
PrimaryEnsure service availabilityCustomers depend on connectivity for safety-critical operations
SecondaryProtect customer data confidentialityCompetitive intelligence, personal data, government communications
TertiaryMaintain regulatory complianceLicense to operate depends on meeting FCC/ITU requirements

Consequence of Failure

The consequences of security failures in satellite systems range from expensive to existential.

Command and Control Compromise

If an attacker gains control of satellite command systems, potential outcomes include:

ScenarioImpact
Satellite repositioningCollision risk, debris generation, total constellation loss
Thruster exhaustionPremature satellite decommissioning (~$60M per satellite)
Frequency interferenceFCC enforcement action, customer service disruption
Ransomware of ground systemsComplete service outage, ransom payment or lengthy recovery

The Kessler syndrome scenario (cascading debris collisions) is unlikely from a single satellite but represents existential risk to the space industry. Regulators and insurers are increasingly focused on debris mitigation.

Service Disruption

Impact TypeEstimated Cost
Revenue loss during outage$2.3M per day
SLA penaltiesUp to 50% of monthly fees for affected customers
Customer churn (major incident)$50-100M annual revenue loss
Emergency response degradationUnquantifiable human safety impact

Maritime customers rely on OrbitLink for GMDSS (Global Maritime Distress and Safety System) backup. Aviation customers depend on it for oceanic position reporting. Prolonged outages could result in regulatory action and, in worst cases, contribute to safety incidents.

Data Breach

Customer traffic includes:

  • Corporate communications (mergers, legal matters, competitive intelligence)
  • Personal data of passengers and crew
  • Government communications (some classified at CUI level)
  • Maritime cargo manifests and routing
Impact TypeEstimated Cost
Regulatory fines (GDPR, etc.)$10-50M
Government contract termination$120M annual revenue
Litigation$20-100M
Reputation damage15-30% customer churn

Total Potential Exposure Summary

ScenarioPotential Impact
Single satellite loss (adversary action)$60M + insurance implications
Constellation-wide control compromise$500M-3B + potential bankruptcy
Extended service outage (>7 days)$50-200M
Major data breach$100-300M
Combined attack (control + ransomware)$500M+ potential business closure

Risk Appetite

Risk TypeToleranceJustification
Command and control compromiseZeroExistential threat to assets and business
Extended outage (>4 hours)ZeroSafety implications, SLA obligations
Brief outage (<4 hours)LowAcceptable with proper communication
Customer data exposureVery LowContractual obligations, regulatory requirements
Non-sensitive internal data exposureLowReputational concern but manageable

The organization accepts that some risks cannot be fully eliminated given the nature of space operations. However, any credible path to command and control compromise requires immediate mitigation regardless of cost.

Key Stakeholders

RoleResponsibility
CEOOverall business risk acceptance
VP Space OperationsSatellite control, ground station operations
VP EngineeringSystem architecture, software development
CISOSecurity program, threat response
Chief Commercial OfficerCustomer relationships, contract obligations
General CounselRegulatory compliance, ITAR, government contracts
Insurance Liaison$2B space insurance policy requirements

Stage 2: Define Technical Scope

Satellite systems have three distinct segments, each with unique security considerations: the space segment (satellites themselves), the ground segment (control and gateway infrastructure), and the user segment (customer terminals). Attackers can target any segment or the links between them.

System Architecture

Space Segment

The 180-satellite constellation operates in six orbital planes at approximately 550km altitude. Each satellite includes:

ComponentFunctionSecurity Relevance
Software-defined radio payloadCustomer traffic relayConfiguration determines frequencies, power levels
Telemetry, Tracking, and Command (TT&C)Satellite operationsPrimary attack target for control compromise
Electric propulsionOrbit maintenanceThruster commands could reposition or deorbit
Flight computerOnboard processingLimited compute, runs custom RTOS
Inter-satellite links (ISL)Mesh networkingExtends attack surface to adjacent satellites

Satellites run custom firmware that cannot be fully updated after launch. Security patches must work within severe constraints: limited uplink bandwidth, tight timing windows, and zero tolerance for bricking a $60M asset.

Ground Segment

Facility TypeLocationsFunction
Satellite Operations Center (SOC)Primary: Colorado; Backup: NetherlandsTT&C, constellation management, anomaly resolution
Ground Stations12 globally distributedRF uplink/downlink, customer gateway
Network Operations Center (NOC)Colorado (co-located with SOC)Network management, customer service
Data CentersAWS (primary), Azure (DR)Backend services, billing, customer portal

The SOC is the crown jewel. It houses the command and control systems that can upload commands to any satellite in the constellation. Physical security includes biometric access, mantrap entry, and 24/7 security staff.

User Segment

Terminal TypeDeploymentCharacteristics
Maritime VSATShip-mountedStabilized antenna, always-on, challenging physical security
Aero terminalAircraft-mountedCertified avionics, airline-managed
Enterprise VSATFixed installationsControlled environment, IT-managed
Mobile terminalsVehicle/portableSmallest, most exposed

User terminals are managed devices but operate in environments OrbitLink doesn’t control. A compromised terminal could potentially be used to attack the network or other customers.

Component Inventory

LayerComponents
Space Segment180 LEO satellites, inter-satellite link mesh, TT&C subsystems, customer payload
Ground StationsRF equipment, antenna systems, baseband processing, network connectivity
Operations CentersSatellite control software, network management, monitoring systems
Cloud InfrastructureAWS (compute, storage, databases), Azure (DR), CDN
Customer SystemsBilling platform, customer portal, API gateway, provisioning systems
User TerminalsMaritime terminals, aero terminals, enterprise terminals, mobile units

Third-Party Dependencies

ServiceFunctionRisk Consideration
AWSPrimary cloud infrastructureAvailability, access control, shared responsibility model
SpaceX/ArianespaceLaunch servicesSupply chain, schedule dependencies
Terminal manufacturersUser equipmentFirmware security, supply chain
Teleport operatorsSome ground station facilities leasedPhysical security, operational security
Frequency coordination (ITU)Spectrum rightsRegulatory compliance

Data Classification

ClassificationData TypesProtection Level
CriticalTT&C encryption keys, satellite command authentication, orbit parametersHighest (destruction of business if compromised)
HighCustomer traffic (encrypted in transit), authentication credentials, network topologyStrong encryption, strict access control
MediumOperational telemetry, performance metrics, maintenance schedulesStandard protection
LowPublic marketing materials, general documentationMinimal
Government (CUI)Government customer traffic, some contractsPer NIST 800-171

Network Boundaries

BoundaryLocationConcern
Internet-facingCustomer portal, API gatewayStandard web application attacks
RF uplink/downlinkGround station to satelliteJamming, spoofing, interception
Inter-satellite linksBetween satellitesCompromise propagation
SOC perimeterOperations center network edgeCritical asset protection
Terminal boundaryCustomer terminal to customer networkManaged device in uncontrolled environment
Third-party boundaryCloud providers, launch providersSupply chain, shared responsibility

Stage 3: Application Decomposition

Stage 3 creates detailed data flows and identifies trust boundaries specific to satellite operations.

Primary Data Flows

FlowPathTrust Boundaries Crossed
Customer trafficTerminal → Satellite → Ground Station → InternetTerminal→Satellite (RF), Satellite→Ground (RF), Ground→Internet
TT&C commandsSOC → Ground Station → SatelliteSOC→Ground (terrestrial), Ground→Satellite (RF, encrypted)
TelemetrySatellite → Ground Station → SOCSatellite→Ground (RF), Ground→SOC (terrestrial)
Inter-satellite routingSatellite A → Satellite BISL (optical/RF)
Customer provisioningPortal → Backend → Ground Station → SatelliteMultiple terrestrial + RF boundaries

Trust Boundary Analysis

Seven critical trust boundaries require focused analysis:

#BoundaryKey AssumptionsValidation Required
1RF Uplink (Ground → Satellite)Commands are authenticated and encrypted; transmitter is authorizedCryptographic authentication, frequency monitoring
2RF Downlink (Satellite → Ground)Telemetry is authentic; no injectionCryptographic signing, anomaly detection
3SOC → Ground StationGround station is not compromisedNetwork segmentation, mutual authentication
4Terminal → SatelliteTerminal is legitimate customer equipmentTerminal authentication, traffic analysis
5Internet → Customer SystemsStandard web threatsWAF, authentication, input validation
6Inter-satellite LinksAdjacent satellite is not compromisedLink-layer encryption, routing validation
7Cloud ProviderAWS/Azure are operating securelyShared responsibility model, monitoring

The RF links are unique attack surfaces that don’t exist in traditional IT systems. Understanding them is critical for satellite threat modeling.

Uplink Threats (Ground → Space)

ThreatDescriptionDifficulty
JammingOverwhelm legitimate signal with noiseLow (if attacker has RF equipment)
Command spoofingSend unauthorized commandsHigh (requires breaking encryption)
Replay attacksRe-transmit captured legitimate commandsMedium (depends on protocol design)
Signal analysisInfer operational patterns from RF emissionsMedium

Downlink Threats (Space → Ground)

ThreatDescriptionDifficulty
InterceptionCapture customer trafficLow (RF is broadcast)
Telemetry spoofingFake telemetry to mask attackHigh (requires authentication bypass)
Traffic analysisInfer usage patternsLow

Inter-Satellite Link Threats

ThreatDescriptionDifficulty
ISL injectionInsert traffic into meshHigh (optical links, geometric constraints)
Routing manipulationAlter traffic paths through constellationHigh (requires satellite compromise)

Asset Inventory

PriorityAssets
CriticalTT&C encryption keys, satellite flight software, command authentication system, SOC access credentials, orbit determination data
HighCustomer encryption keys, ground station control systems, network routing configuration, ISL encryption keys
MediumOperational telemetry, customer billing data, terminal firmware
LowerMarketing systems, general corporate IT

Stage 4: Threat Analysis

Stage 4 identifies threats using industry intelligence, STRIDE analysis, and attacker personas. Satellite systems face a unique threat landscape including nation-state actors with anti-satellite weapons (ASAT) capabilities.

Industry Threat Intelligence

Space systems are increasingly targeted as critical infrastructure and military assets.

MetricObservation
Nation-state interestRussia, China, Iran have demonstrated satellite disruption capabilities
ASAT testingMultiple kinetic and non-kinetic tests since 2007
Commercial targetingViasat KA-SAT attack (2022) disabled thousands of terminals at Ukraine invasion start
Ransomware targetingGround systems increasingly targeted as part of critical infrastructure
Regulatory attentionSpace systems added to CISA critical infrastructure sectors

The Viasat attack is particularly instructive. Attackers used VPN misconfiguration to access the management network, then pushed destructive firmware to customer terminals. The attack:

  • Disabled ~30,000 terminals
  • Disrupted Ukrainian military communications at invasion start
  • Affected wind turbine operations in Germany (collateral damage)
  • Recovery required physical terminal replacement in many cases

This demonstrated that attacks on space systems don’t require space capabilities. Ground segment and user segment attacks can be devastating.

STRIDE Analysis: Satellite TT&C Subsystem

Spoofing

Attackers could attempt to impersonate ground stations to send unauthorized commands. The TT&C link uses spread-spectrum modulation and encryption, but vulnerabilities in the cryptographic implementation or key management could enable spoofing. Historical incidents include the 1998 ROSAT incident where attackers reportedly took control of a German satellite.

Threats identified:

  • THR-001: Ground station impersonation via compromised TT&C encryption keys
  • THR-002: Replay of captured command sequences with insufficient nonce protection
  • THR-003: Rogue ground station with stolen credentials

Tampering

Satellite firmware cannot be easily modified after launch, but the configuration can be updated. An attacker with command access could alter frequency allocations, power levels, or routing tables.

Threats identified:

  • THR-004: Malicious firmware update bricking satellite
  • THR-005: Configuration tampering to cause harmful interference
  • THR-006: Thruster command injection for deorbit or collision course

Repudiation

Command logging occurs at the ground station, but an attacker who compromises the SOC could potentially modify logs to hide their activity.

Threats identified:

  • THR-007: SOC log tampering to conceal unauthorized commands
  • THR-008: Insufficient satellite-side command logging

Information Disclosure

Telemetry reveals operational details including orbit parameters, fuel status, and subsystem health. This information could inform further attacks or provide intelligence value.

Threats identified:

  • THR-009: Telemetry interception revealing operational status
  • THR-010: Orbit determination data exposure enabling tracking
  • THR-011: Key extraction from captured telemetry

Denial of Service

Satellites have limited redundancy. Exhausting thrusters, damaging solar panels via attitude manipulation, or disrupting communications equipment would end the satellite’s useful life.

Threats identified:

  • THR-012: Thruster exhaustion through repeated unnecessary maneuvers
  • THR-013: RF jamming of TT&C link
  • THR-014: Attitude manipulation damaging solar arrays
  • THR-015: Commanding safe mode to disable customer payload

Elevation of Privilege

The satellite’s flight computer runs constrained software, but bugs could allow privilege escalation from payload operations to flight control.

Threats identified:

  • THR-016: Payload-to-bus escape via flight software vulnerability
  • THR-017: ISL compromise propagating to flight systems

STRIDE Analysis: Ground Station Systems

Spoofing

Ground stations authenticate to the SOC and to satellites. Compromising either authentication path enables attack escalation.

Threats identified:

  • THR-018: SOC impersonation to ground station
  • THR-019: Ground station credential theft enabling unauthorized command transmission
  • THR-020: Insider with valid credentials performing unauthorized operations

Tampering

Ground station software processes customer traffic and generates commands. Tampering could affect either stream.

Threats identified:

  • THR-021: Malicious command injection via compromised ground station software
  • THR-022: Customer traffic manipulation at ground station
  • THR-023: RF equipment misconfiguration causing interference

Repudiation

Ground stations are geographically distributed, some operated by third parties. Audit trail integrity varies.

Threats identified:

  • THR-024: Insufficient logging at leased teleport facilities
  • THR-025: Log integrity attacks at remote ground stations

Information Disclosure

Ground stations handle customer traffic in clear text during baseband processing before encryption for satellite uplink.

Threats identified:

  • THR-026: Customer traffic interception at ground station
  • THR-027: TT&C key exposure from ground station compromise
  • THR-028: Network topology disclosure via ground station reconnaissance

Denial of Service

Ground stations are single points of failure for their coverage areas.

Threats identified:

  • THR-029: Physical destruction of ground station antenna
  • THR-030: DDoS against ground station network connectivity
  • THR-031: RF jamming of ground station uplink
  • THR-032: Power grid attack affecting ground station

Elevation of Privilege

Ground station compromise could enable escalation to satellite control.

Threats identified:

  • THR-033: Ground station to SOC lateral movement
  • THR-034: Ground station operator privilege escalation

STRIDE Analysis: User Terminals

Spoofing

Terminals authenticate to the network. A spoofed terminal could gain free service or attack the network.

Threats identified:

  • THR-035: Cloned terminal credentials for unauthorized access
  • THR-036: Rogue terminal performing network reconnaissance

Tampering

Terminals in customer environments may be physically accessible to attackers.

Threats identified:

  • THR-037: Malicious terminal firmware installation
  • THR-038: Terminal hardware modification (wiretapping, backdoor)
  • THR-039: Supply chain attack on terminal manufacturing

Repudiation

Terminal usage attribution enables billing and abuse tracking.

Threats identified:

  • THR-040: Terminal identity spoofing for abuse attribution evasion

Information Disclosure

Terminals process customer traffic and may store credentials.

Threats identified:

  • THR-041: Customer traffic interception via terminal compromise
  • THR-042: Credential extraction from terminal storage
  • THR-043: RF emissions analysis revealing traffic patterns

Denial of Service

Terminals could be attacked to disrupt customer connectivity or as part of broader attacks.

Threats identified:

  • THR-044: Mass terminal disabling via firmware attack (Viasat-style)
  • THR-045: Terminal RF jamming
  • THR-046: Terminal resource exhaustion via malformed traffic

Elevation of Privilege

A compromised terminal could attack the broader network.

Threats identified:

  • THR-047: Terminal to satellite attack (unlikely but considered)
  • THR-048: Terminal as pivot point to customer network

Attacker Persona Analysis

Satellite systems face a broader range of threat actors than typical IT systems.

PersonaCapabilitiesMotivationTarget Focus
Script KiddiePublic tools, RF equipment for sale onlineCuriosity, notorietyExposed web services, terminal vulnerabilities
CybercriminalRansomware, data theft, established infrastructureFinancial gainGround systems, customer data
CompetitorCorporate espionage, market intelligenceBusiness advantageCustomer data, operational details
HacktivistDisruption, message deliveryPolitical statementService availability, public-facing systems
Nation-State (Non-kinetic)Advanced persistent threat, zero-days, RF expertiseIntelligence, disruptionAll segments, particularly TT&C
Nation-State (Kinetic)ASAT weapons, ground-based lasers, cyber-kineticMilitary advantageSatellites directly
InsiderLegitimate access, operational knowledgeFinancial, ideological, coercedBased on role (SOC insider most dangerous)

The nation-state kinetic threat is unique to space systems. While traditional cybersecurity cannot defend against missiles, threat modeling should acknowledge this threat class and consider:

  • Redundancy and constellation resilience
  • Geopolitical risk assessment for orbit selection
  • Integration with space domain awareness

Threat Summary (Top 25 by Risk Score)

IDThreatCategoryLIRisk
THR-044Mass terminal firmware attack (Viasat-style)DoS4520
THR-001TT&C key compromise enabling command spoofingSpoofing3515
THR-006Thruster command injectionTampering3515
THR-019Ground station credential theftSpoofing4416
THR-021Malicious command injection via ground stationTampering3515
THR-027TT&C key exposure from ground stationInfo Disc3515
THR-050SOC ransomware attackDoS4416
THR-020Malicious insider at SOCSpoofing3515
THR-033Ground station to SOC lateral movementElevation3515
THR-039Terminal supply chain attackTampering3412
THR-013TT&C link jammingDoS4312
THR-029Physical ground station attackDoS3412
THR-026Customer traffic interceptionInfo Disc3412
THR-031Ground station uplink jammingDoS4312
THR-037Malicious terminal firmwareTampering3412
THR-051Cloud infrastructure compromise (AWS)Various3412
THR-052Customer portal SQLi/data breachInfo Disc4312
THR-004Malicious satellite firmware updateTampering2510
THR-035Cloned terminal credentialsSpoofing428
THR-012Thruster exhaustion attackDoS2510
THR-009Telemetry interceptionInfo Disc428
THR-053ISL mesh compromise propagationElevation248
THR-007SOC log tamperingRepudiation339
THR-023RF misconfiguration causing interferenceTampering339
THR-054Nation-state kinetic attackDoS155

Additional Documented Threats (THR-055 through THR-075):

The complete threat model documents 75 threats across categories:

CategoryCountExamples
Space Segment18Command spoofing, firmware attacks, ISL compromise
Ground Segment22SOC compromise, ground station attacks, lateral movement
User Segment15Terminal attacks, supply chain, credential theft
Support Systems12Cloud compromise, customer portal, billing
Physical/Kinetic8Ground station destruction, ASAT, sabotage

Stage 5: Vulnerability and Weakness Analysis

Stage 5 maps concrete weaknesses to identified threats.

Space Segment Weaknesses

FindingWeaknessRelated Threat
TT&C encryption uses 2010-era algorithmPotential cryptanalytic weaknessTHR-001, THR-002
Limited satellite-side command validationRelies heavily on ground-side securityTHR-006
Firmware update verification incompleteOnly checks signature, not payload integrityTHR-004
ISL authentication uses shared constellation keySingle key compromise affects all ISLsTHR-053
No satellite-side command loggingRecovery relies on ground logsTHR-007, THR-008

The satellite flight software was designed in 2018 and cannot be substantially redesigned. Security improvements must work within existing software architecture constraints.

Ground Segment Weaknesses

FindingWeaknessRelated Threat
SOC network segmentation incompleteTT&C systems reachable from corporate networkTHR-033, THR-050
Ground station VPN configuration variesInconsistent security posture across 12 sitesTHR-019
Third-party teleport facilitiesLimited visibility into physical securityTHR-024, THR-029
Legacy SCADA systems at some sitesUnpatched control systemsTHR-021
Privileged access management gapsShared accounts for some operationsTHR-020

The Viasat attack exploited exactly this type of ground segment weakness—VPN misconfiguration that allowed lateral movement to terminal management systems.

User Segment Weaknesses

FindingWeaknessRelated Threat
Terminal firmware update mechanismInsufficient authentication for updatesTHR-044
Physical terminal security variesMaritime installations particularly exposedTHR-038
Terminal credential storageKeys stored in software, extractableTHR-042
Supply chain visibility limitedMultiple contract manufacturersTHR-039

Configuration Issues

IssueRiskSeverity
AWS IAM policies overly permissiveBlast radius if credentials compromisedMedium
SOC workstations have internet accessPotential malware vectorHigh
Some ground stations lack redundant connectivitySingle point of failureMedium
Backup systems not air-gappedRansomware could affect backupsHigh
Key rotation manual and infrequentKey compromise window extendedMedium

Penetration Testing Results

StatusFindings
Critical (Fixed)SQL injection in legacy billing system
High (In Progress)SOC network segmentation bypass via printer
High (Pending)Ground station VPN using deprecated cipher suite
MediumCustomer portal session management weaknesses
MediumSeveral terminals have debug interfaces enabled

Weakness-to-Threat Mapping

ThreatRoot WeaknessFix Approach
THR-044 (Mass terminal attack)Insufficient firmware update authenticationCryptographic signing with per-terminal verification
THR-033 (Lateral movement)Incomplete network segmentationRedesign SOC network architecture
THR-050 (SOC ransomware)SOC internet access, backup not isolatedAir-gap critical systems, immutable backups
THR-019 (Credential theft)Inconsistent ground station securityStandardize VPN configuration, zero trust
THR-001 (TT&C key compromise)Key management, algorithm ageKey rotation automation, crypto agility roadmap

Stage 6: Attack Modeling

Stage 6 creates detailed attack trees showing how adversaries could achieve high-value goals.

Attack Tree 1: Satellite Constellation Control Compromise

Goal: Gain ability to send commands to any satellite in the constellation

PathDescriptionDifficultyPrerequisitesDetection
ASOC network compromise → TT&C system access → Command capabilityMedium-HighInitial access to corporate networkSIEM, network monitoring
BGround station compromise → Credential theft → SOC impersonationMediumPhysical or remote ground station accessGround station monitoring, anomaly detection
CInsider threat → Legitimate access abuse → Unauthorized commandsMediumRecruitment/coercion of SOC operatorCommand validation, two-person integrity
DTT&C key theft → Rogue ground station → Direct satellite commandHighKey extraction, RF equipmentFrequency monitoring, command validation
ESupply chain → Compromised SOC hardware/software → Backdoor accessHighSupply chain accessSupply chain verification, monitoring

Path A Deep Dive: SOC Network Compromise

StageActivitiesControlsGaps
Initial AccessPhishing SOC employee, exploit public-facing serviceEmail filtering, patching, trainingSpearphishing effectiveness varies
Establish FootholdDeploy RAT, persist via scheduled taskEDR, application whitelistingEDR bypass possible
Lateral MovementEscalate to admin, move to TT&C networkNetwork segmentation, PAMSegmentation incomplete (known gap)
Command AccessAccess TT&C workstation, authenticate to systemMFA, command validationMFA fatigue, operator bypass
Command ExecutionSend malicious commands to satellitesCommand rate limiting, anomaly detectionAnomaly detection requires baseline

Critical Chokepoint Analysis:

Network segmentation between corporate and TT&C systems appears in multiple attack paths. Properly implementing this segmentation would disrupt paths A, C (partially), and E.

Command validation requiring two-person integrity would disrupt paths A, C, and D. Even with TT&C access, an attacker would need to compromise two separate accounts.

Attack Tree 2: Mass Terminal Disabling (Viasat-Style Attack)

Goal: Disable thousands of customer terminals simultaneously

PhaseActivitiesDetection Points
1. Initial AccessCompromise terminal management network (VPN exploit, phishing)VPN monitoring, authentication logs
2. ReconnaissanceMap terminal management systems, identify push mechanismUnusual queries, access patterns
3. WeaponizationDevelop destructive firmware or configurationN/A (off-network)
4. StagingPosition for simultaneous deploymentUnusual file transfers, staging behavior
5. ExecutionPush malicious update to all terminalsUpdate volume anomaly, terminal behavior
6. PersistenceTerminals bricked, require physical replacementToo late for prevention

Disruption Controls:

PhaseDisruption Mechanism
Initial AccessVPN hardening, zero trust network access, MFA
ReconnaissanceHoneypots, access logging, behavior analytics
StagingFile integrity monitoring, change management
ExecutionRate limiting on updates, staged rollout requirements, cryptographic verification
Post-ExecutionRapid incident response, replacement terminal inventory

The Viasat attack demonstrated that execution-phase controls were insufficient. Rate limiting and staged rollouts would have limited blast radius even after initial compromise.

Attack Tree 3: Ransomware Attack on Ground Operations

Goal: Encrypt SOC and ground station systems, demand ransom

StageKill Chain PhaseActivities
1ReconnaissanceResearch OrbitLink infrastructure, identify targets
2Initial AccessSpearphishing, exploit public services
3Establish FootholdDeploy Cobalt Strike, establish persistence
4Privilege EscalationKerberoasting, credential harvesting
5Lateral MovementMove to ground stations, SOC systems
6Data ExfiltrationSteal data for double extortion
7PreparationDisable backups, stage ransomware
8ExecutionSimultaneous encryption across infrastructure

Impact Analysis:

ScenarioImpact
SOC encrypted, backups intact24-48 hour recovery, SLA penalties
SOC encrypted, backups compromised1-2 week recovery, $30-50M loss
SOC + ground stations encrypted2-4 week recovery, customer loss, potential satellite safe-mode
Satellite commanded to safe mode before encryptionExtended recovery, potential satellite loss if timing critical

If attackers command satellites to safe mode before encrypting ground systems, recovery becomes more complex because safe mode commands may need ground infrastructure to reverse.

Kill Chain Disruption Priority

PhaseControlsInvestment Priority
Initial AccessEmail security, patching, attack surface reductionHigh
Establish FootholdEDR, application whitelistingHigh
Lateral MovementNetwork segmentation, zero trustCritical
Privilege EscalationPAM, credential hygieneHigh
Data ExfiltrationDLP, network monitoringMedium
Backup DestructionAir-gapped/immutable backupsCritical
ExecutionDetection and responseHigh

Stage 7: Risk and Impact Analysis

Stage 7 prioritizes threats and creates an actionable remediation plan.

Risk Priority Summary

PriorityScore RangeCountTimelineKey Threats
Critical15-208ImmediateTHR-044 (terminal attack), THR-050 (ransomware), THR-001/006 (TT&C compromise)
High10-141830 daysGround station security, lateral movement, customer data
Medium5-93090 daysVarious component-level threats
Low<519MonitorLower-probability or lower-impact threats

Business Impact Quantification

THR-044 (Mass Terminal Attack)

The Viasat attack provides a real-world benchmark. Assuming similar scope:

  • 50% of terminals affected: ~125,000 terminals
  • Replacement cost per terminal: $2,000 (including logistics)
  • Terminal replacement: $250M
  • Service outage (2 weeks average): $32M revenue loss
  • SLA penalties: $15M
  • Customer churn (government contracts): $50M+ annually
  • Total: $350M+ immediate, ongoing revenue impact

THR-050 (SOC Ransomware)

ComponentCost
Ransom payment (if made)$10-50M
Recovery (without payment)$20M
Revenue loss during outage$2.3M/day × 14 days = $32M
SLA penalties$15M
Insurance implicationsPremium increases, coverage questions
Total$70-120M

THR-001/006 (Satellite Control Compromise)

Worst-case: attacker commands satellites into collision courses, generating debris.

ComponentCost
Lost satellites$60M × 10-180 = $600M-10B
Launch replacement$60M × satellites
Liability for debrisPotentially unlimited
Business closureProbable

Even partial control compromise leading to a single satellite loss would cost ~$120M (satellite + launch) plus insurance and regulatory implications.

Mitigation Plan

Immediate Actions (Week 1-2)

ThreatMitigationOwnerCost
THR-044Cryptographic verification for terminal updates, staged rollout enforcementVP Engineering$500K
THR-050Air-gap critical SOC systems, implement immutable backupsVP Space Ops$300K
THR-033Emergency network segmentation for TT&C systemsCISO$200K

30-Day Actions

ThreatMitigationOwnerCost
THR-001/006Two-person integrity for critical commands, enhanced command validationVP Space Ops$800K
THR-019Ground station VPN standardization, zero trust pilotCISO$600K
THR-020Privileged access management implementationCISO$400K
THR-039Terminal supply chain audit, enhanced verificationVP Engineering$300K

90-Day Actions

ThreatMitigationOwnerCost
SOC architectureComplete network redesign, TT&C isolationVP Space Ops$2M
Ground station securityConsistent security controls across all sitesCISO$1.5M
Crypto agilityPlan for TT&C encryption upgrade pathVP Engineering$500K
ISL securityPer-link encryption key implementationVP Engineering$800K
Incident responseSatellite-specific IR playbooks, tabletop exercisesCISO$200K

Long-Term Actions (Year 1-2)

InitiativeDescriptionCost
Next-gen TT&C encryptionPrepare for quantum-resistant cryptography$3M
Ground station redundancyEliminate single points of failure$10M
Constellation resiliencePlan for graceful degradation if satellites lost$2M
Security operations center24/7 security monitoring capability$2M/year

Risk Treatment Decisions

DecisionThreatRationale
MitigateAll critical/high threatsPer mitigation plan
TransferGeneral liability, business interruption$50M cyber insurance, $2B space insurance
AcceptTHR-054 (Nation-state kinetic)Cannot defend against missiles; rely on deterrence and constellation design
AcceptSome ground station physical threatsCost of hardening all sites exceeds benefit; focus on redundancy

Risk Acceptance: Nation-State Kinetic Attack

OrbitLink cannot defend against ASAT weapons. This risk is accepted with the following conditions:

  • Constellation design allows continued service with 20% satellite loss
  • Geographic distribution of ground stations limits single-point vulnerability
  • Integration with Space Force space domain awareness for warning
  • Review trigger: geopolitical situation changes significantly

Residual Risk Assessment

ThreatBeforeAfterJustification
THR-044 (Terminal attack)208Cryptographic verification + staged rollout limits blast radius
THR-050 (Ransomware)168Air-gapped backups, network segmentation enable recovery
THR-001 (TT&C compromise)156Two-person integrity, enhanced validation
THR-033 (Lateral movement)155Network segmentation, zero trust
THR-019 (Credential theft)168Standardized VPN, PAM, monitoring

Summary: Critical threat count drops from 8 to 2. High threat count drops from 18 to 7. Remaining critical risks relate to highly sophisticated nation-state attacks and physical threats where full mitigation is impractical.

Budget Summary

PhaseCost
Immediate (Week 1-2)$1M
30-Day Actions$2.1M
90-Day Actions$5M
Year 1-2 Long-Term$17M
Ongoing Annual (Security Ops)$2M
First-Year Total$10.1M
Two-Year Total$27.1M

ROI Analysis:

A mass terminal attack (Viasat-style) would cost $350M+. The terminal security mitigations cost $500K immediate plus ongoing costs. ROI is clear even at low attack probability.

SOC ransomware would cost $70-120M. The mitigation investment of $2.5M over 90 days provides strong protection. Even a 5% annual attack probability justifies the investment.

Total security investment of $27M over two years protects against potential losses of $500M+ for the most likely attack scenarios.


Key Findings Summary

FindingImplication
Ground segment is the weakest linkMost attacks don’t require space capabilities; ground/terminal compromise sufficient
Viasat attack pattern directly applicableTerminal management security requires immediate attention
Network segmentation gaps are criticalSOC compromise enables catastrophic outcomes
Satellite firmware cannot be easily patchedPrevention more important than response for space segment
Nation-state threats are real but manageableFocus on non-kinetic nation-state threats; accept kinetic risk with design mitigations

Unique Satellite Considerations

This threat model highlighted several concerns unique to space systems:

ConsiderationImplication for Threat Modeling
IrreversibilitySatellite damage/loss is permanent; prevention emphasis critical
Long timelinesSecurity decisions made today affect assets for 15+ years
RF attack surfaceJamming and spoofing threats have no IT equivalent
Geographic distributionGround stations in multiple jurisdictions with varying security
Constellation interdependenceISL compromise could propagate across constellation
Launch windowsReplacement satellites can’t be deployed instantly
Limited bandwidthSecurity controls must work within severe bandwidth constraints
Regulatory obligationsFCC, ITU, ITAR requirements constrain some security options

Appendix: Comparison with Healthcare Threat Model

DimensionHealthcare (Part 3)Satellite Infrastructure
Primary assetPHI (data)Command and control (capability)
IrreversibilityData breach recoverable (with difficulty)Satellite loss permanent
Attacker sophisticationScript kiddie through targetedIncludes nation-state kinetic
Physical attack surfaceLimited (facilities)Extensive (ground stations, terminals, RF)
Regulatory focusHIPAA (privacy)FCC/ITU (interference), ITAR (export)
Recovery optionsRestore from backup, rebuildLaunch replacement, manage constellation
Time sensitivityBreach notification timelinesOrbital mechanics, fuel constraints

Both threat models use PASTA methodology but highlight how domain context shapes threat analysis. The healthcare model focuses heavily on data protection and privacy. The satellite model focuses on command integrity and availability because the consequences of losing satellite control are more severe and irreversible than data breach.


Part 3b Complete | Satellite Infrastructure Threat Model