Cybersecurity in space involves the defense of all space assets (e.g. navigation systems, satellites, ground antennas, networks, etc.). The security of space can be affected by attacks such as disruption, corruption as well as the destruction of depended on assets/collected data. [1]
Government (e.g. militaries) and non-government sectors (e.g. financial industries) have started to become more reliant on numerous space-based services. Due to the criticality of these services, analysts[ who? ] have identified these assets as high-value targets (HVT) that can cause detrimental consequences to all of Earth. [1]
Space assets are broken down by three sub-sectors: the space component, the ground component, and the individual user component. The architecture of space assets is extremely complex and allows for a frequent attack vector utilized, the disruption by radio frequent (RF) cyber-attacks. [1]
In 2020, a memorandum was published by President Donald Trump, Space Policy Directive‑5 (SPD‑5). It established principles to ensure the safeguarding of all space assets. [1] In 2023, the National Institute of Standards and Technology’s (NIST) published IR 8270, Introduction to Cybersecurity for Commercial Satellite Operations. [2] This report established a baseline risk-management framework (RMF) to be implemented into space operations. [3]
During the Cold War in the 1950s-1960s, the United States and Russia entered what was called the “Space Race”. By 1957, the Soviet Union successfully launched the first satellite into space named Sputnik. [4] By 1961, the first key milestone was accomplished when the Soviet Union’s Yuri Gagarin became the first human to orbit Earth. [4] This was later followed by the first American, Alan Shepard, to be launched into space; this was followed by John Glenn becoming the first American to orbit Earth in 1962. [4] In 1969, a pinnacle milestone was reached when Apollo 11 launched into space and Neil Armstrong became the first man to walk on the moon. [4]
As space operations furthered, Commercial off-the-shelf products became increasingly popular but resulted in a rapid increase to the cyber-attack surface. Public space recognition did not increase until 2022, when the Viasat KA-SAT incident occurred. It resulted in the interruption of a mass number of modems across Europe. [5] The attack was later accredited to Russia by the U.S. and the U.K. [5]
Policy and standards started to rapidly increase by 2020. The establishment of SPD-5 was released in 2020 followed by asset hardening instructions in 2022, and NIST’s IR 8270 in 2023. It was not until 2025 that Europe published their own findings in the Space Threat Landscape 2025 Report. [6] This document led to the EU’s security proposals and standards. [6]
Space services are highly dependent on RF links for systems such as GNSS, however, a consequence of the dependency on RF was denial of service and deception. In 2017, the Black Sea maritime event occurred when numerous ships were subject to spoofing. [7]
Space services depend on RF links susceptible to jamming (denial) and spoofing (deception), including for GNSS/Positioning, Navigation, and Timing (PNT). Annotated incidents include the 2017 Black Sea maritime spoofing event affecting numerous ships, and extensive aviation GNSS spoofing patterns surveyed in various regions during 2024–2025. [7]
Cyber threats can intrude and infect assets with malware. They do this by finding misconfiguration vulnerabilities, remote-management interfaces, and/or supply-chain vulnerabilities mainly in ground networks and user terminals. When KA-SAT occurred, it resulted from bulk modem disturbances. [5] Forensic analysts later suggested malicious management controls and wiper malware as the root cause. [5]
The outsource of COTS components, external vendors, and software defined payloads allowed for vulnerabilities to emerge in the System/Product Lifecycle. In response, EU recommended the implementation of lifecycle-wide controls as mitigating factors. [6]
As Advanced Persistent Threats (APTs), Global Positioning System (GPS) intervention, and information warfare increased, assets such as transponders started to be attacked more frequently. [8]
The Viasat KA‑SAT incident of 2022, where a mass number of modems in Europe were disrupted, resulted in the loss of telemetry access to a vast amount of wind turbines in Germany. [5]
The mass GNSS deception of the Black Sea in 2017 affected numerous ships when they started to convey fake central locations in Russia. [7]
Between 2024 and 2025, there was a mass, repetitive aviation GNSS spoofing that affected the aircraft of various regions. [9]
SPD‑5 (U.S.) – This established risk-based engineering, verifying and ensuring positive control, and the implementation of risk mitigation controls. [1]
NIST IR 8270 – This created a RMF for COTS satellites. [2]
CISA/FBI SATCOM Advisory (AA22‑076) – Provided guidance on hardening techniques such as least-privileged, access control, encryption, etc.). [9]
ENISA Space Threat Landscape 2025 – The established the categorization of assets to organize threats, ensuring the observation of system/product lifecycle, and an RMF for COTS satellites. [6]
ECSS‑E‑ST‑80C (2024) – This established a standard for securing lifecycles in space, covering all segments (e.g. ground, launch, etc.). [10]
As of 2025, there is no international regulations established for space assets, but the U.S., EU, and ESA institutional initiatives have published standards to address security concerns. The U.S. implemented SPD-5 and the Federal Communications Commission (FCC); the FCC addressed orbital debris. [2] [10] While the EU created standards to address technological mandates as well as the support of the NIS2 implementation. [11] [12] Lastly, the ESA created a special operations center to safeguard their satellites. [10] International governance is still evolving, but forums have been held by the United Nations Committee on the Peaceful Uses of Outer Space. [6]
International conversations under forums such as the UN Committee on the Peaceful Uses of Outer Space (COPUOS) progressively note the cyber–space safety relationship, though formal global norms specific to space cybersecurity continue evolving. [6]
Through RMF mitigation controls have been implemented to lessen the risk of exploitation while increasing the security of space. Controls addressing mitigation include proper configuration, system hardening, zero-trust architectures, encryption, etc. Both the government and industries have placed an emphasis on incident response procedures to identify, contain, and remediate breaches. [2] [6]
{{cite web}}: Cite uses generic title (help)