Information Security Considerations for Protecting NASA Mission Operations Centers (MOCs)

被引:0
作者
Takamura, Eduardo [1 ]
Mangum, Kevin [1 ]
Wasiak, Fran [1 ]
Gomez-Rosa, Carlos [2 ]
机构
[1] Gen Dynam Miss Syst, Seabrook, MD USA
[2] NASA, Goddard Space Flight Ctr, Greenbelt, MD USA
来源
2015 IEEE AEROSPACE CONFERENCE | 2015年
关键词
access control; asset protection; automation; change control; connection protection; continuous diagnostics and mitigation; continuous monitoring; ground segment; ground system; incident handling; information assurance; information security; information security leadership; information technology leadership; infrastructure protection; IT security metrics; least privilege; logical security; mission assurance; mission operations; mission operations center; NASA; network security; personnel screening; policies and procedures; physical security; risk management; scheduling restrictions; security controls; security hardening; software updates; system cloning and software licenses; system security; system security life cycle; unauthorized change detection; unauthorized change deterrence; unauthorized change prevention;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
In NASA space flight missions, the Mission Operations Center (MOC) is often considered "the center of the (ground segment) universe," at least by those involved with ground system operations. It is at and through the MOC that spacecraft is commanded and controlled, and science data acquired. This critical element of the ground system must be protected to ensure the confidentiality, integrity and availability of the information and information systems supporting mission operations. This paper identifies and highlights key information security aspects affecting MOCs that should be taken into consideration when reviewing and/or implementing protecting measures in and around MOCs. It stresses the need for compliance with information security regulation and mandates, and the need for the reduction of IT security risks that can potentially have a negative impact to the mission if not addressed. This compilation of key security aspects was derived from numerous observations, findings, and issues discovered by IT security audits the authors have conducted on NASA mission operations centers in the past few years. It is not a recipe on how to secure MOCs, but rather an insight into key areas that must be secured to strengthen the MOC, and enable mission assurance. Most concepts and recommendations in the paper can be applied to non-NASA organizations as well. Finally, the paper emphasizes the importance of integrating information security into the MOC development life cycle as configuration, risk and other management processes are tailored to support the delicate environment in which mission operations take place.
引用
收藏
页数:14
相关论文
共 13 条
[1]  
[Anonymous], 71207 NPR
[2]  
[Anonymous], 2004, NIST FED INF PROC ST, V199
[3]  
[Anonymous], NIST RISK MAN FRAM
[4]  
[Anonymous], 2011, NASA PROC REQ NPR 28
[5]  
CCSDS.org, CCSDS REC REP ALL PU
[6]  
Joint Task Force Transformation Initiative, 2011, NIST SPECIAL PUBLICA
[7]  
Joint Task Force Transformation Initiative Interagency Working Group, 2013, NIST SPECIAL PUBLICA
[8]  
National Institute of Standards and Technology, 2006, FED INF PROC STAND P
[9]  
Scarfone K., 2008, Tech. Rep. 115
[10]  
Security Guide for Mission Planners, 2011, 3507G1 CCSDS