Name of Group
Short Name
Area
Chairperson
Chairperson E-Mail Address
Chairperson Agency
Deputy Chairperson
Deputy Chairperson E-Mail Address
Deputy Chairperson Agency
Mailing List
Scope of Activity
Rationale for Activity
Goals
Survey of Similar Standards Efforts Undertaken in Other Bodies and elsewhere in CCSDS
Patent Licensing Applicability for Future Standards
Technical Risk Mitigation Strategy
Management Risk Mitigation Strategy
Description of Change
Weiss Howard (11/12/2012 1:02 PM): Restructured the goals - moved several items into the the 2nd list of "develop, revise, and maintain" to more clearly show the work of the SecWG.  Also edited several of the goals to make them more relevant to the program of work.
CCSDS Tech Support (1/24/2012 1:26 PM): Added a new work area to create an adaptation profile of IPsec to provide network layer security for CCSDS.
CCSDS Tech Support (9/22/2011 10:33 AM): This is the first major re-write of the Security WG charter which was revised in committee by the WG.   The goals have been updated to reflect the current state of work in the WG.
Disable Alert
Area Director E-Mail Address
Deputy Area Director E-Mail Address
Create Poll
CC Yourself
Completed/Closed
Approval Status
Attachments

Name of Group

1.02 Security Working Group

Area

Systems Engineering Area (SEA)

Chairperson

Howard Weiss

Chairperson E-Mail Address

howard.weiss@parsons.com

Chairperson Agency

NASA

Deputy Chairperson

Marcus Wallum

Deputy Chairperson E-Mail Address

marcus.wallum@esa.int

Deputy Chairperson Agency

ESA

Mailing List

sea-sec@mailman.ccsds.org

Scope of Activity

The CCSDS Security Working Group develops security guidance, security standards, and provides advice & guidance to other CCSDS working groups.

Rationale for Activity

CCSDS develops communications and mission operation standards that support inter and intra agency operations and cross support. CCSDS standards include elements of flight and ground systems that are developed and operated by different agencies and organizations.

Given that ubiquitous network connectivity among principal investigators and mission operations has become the norm, mission operations have become more exposed than in the past when operations were carried out over closed, mission-only networks.  Furthermore, the threat of sophisticated cyber attacks has increased over recent years and will continue to increase.  Thus, the security risks to both spacecraft and ground systems have increased to the point where CCSDS must introduce Information Security standards, either by adopting existing standards or developing (as necessary) them in order to protect both flight and ground mission critical resources and protect sensitive mission information and selected communication protocol data fields.

Mission planners must perform mission security threat analyses to better understand threats that they should plan to counter via security requirements. Mission planners must also design security into their systems from the outset to balance security with mission ensure requirements.  CCSDS must promote secure interoperability for mission resources.  CCSDS also requires Information Security standards as part of, or as an accompaniment to its communications and mission operations standards.

In order to help the mission planner successfully design-in security the CCSDS Security Working Group will provide “tools” such as security standards, guides, and architectures which must be identified, defined, maintained, and updated to ensure relevance with current threats identified by CCSDS as well as other sources.

Goals

The goals of the Security Working Group are to:

1) provide advice and guidance on information security to all CCSDS activities,  working groups, and the general space community;

2) identify information security issues across the full spectrum of CCSDS activities and provide solutions;

3) adopt or develop (as necessary) interoperable security standards for CCSDS and CCSDS cross support infrastructure (e.g., authentication, encryption, integrity, key management, key distribution);

4) formulate courses of actions to incorporate security policies, security services, and security mechanisms into CCSDS work items across all Working Groups;

5) hold working meetings with other Working Groups to develop agreed approaches and formulate the plans for integrating them into the work of these other Working Groups



The Security Working Group shall develop, revise, and maintain guides (Green Books), best practice documents (Magenta Books), and recommendations (Blue Books) such as:

1) an information security guide for mission planners;

2) a policy framework for developing trust agreements, rules for operational engagement, ensuring security compliance of legacy systems, and standard, secure interfaces between systems and across security domains;

3) a CCSDS security architecture;

4) an Information Security threat statement for CCSDS which is periodically reviewed in order to remain relevant with the evolving threat environment against space missions;

5) an integration of relevant existing and arising standards into the development of mission security requirements and other documents;

6) key management guide and recommendations;

7) a description of guidelines for secure development, implementation, and testing;

8) a guide to standardized cryptographic algorithms and the particulars of their application to space mission security;

9)     an adaptation profile for the use of IPsec to provide network layer security for CCSDS missions

Survey of Similar Standards Efforts Undertaken in
Other Bodies and elsewhere in CCSDS

Patent Licensing Applicability for Future Standards

There are no known or potential patent license that would be required for users to implement standards from this group.
 

Technical Risk Mitigation Strategy

Security is a key part of rigorous systems engineering. In the past, it has been met with resistance in CCSDS.  However, there is now general acceptance of the need for security services even for civilian space missions and, as a result interactions with other working groups are increasing.  Working group resources have increased and need to remain at their current level.

Management Risk Mitigation Strategy

Unavailability of resources will delay achievement of milestones. Fallback option would be to reschedule the milestones.

Identification of specific security guidelines may result in additional work items being agreed upon with other working groups.
Version:
Created at by
Last modified at by

Note - To view "Draft" projects, which are not yet approved Click Here.

Approved Projects

|Export to Spreadsheet|
Currently 24 Projects     
Document Type
Project Status
Project Phase
Modified By
Revise Key Management Green BookGreenOn ScheduleFinal WB submitted to AD for further processingHoward Weiss 
Revise Cryptographic Algorithm BBBlueN/A - No Tasks CompletedFirst draft circulated to WGHoward Weiss 
Revise Security Architecture for Space Data SystemsMagentaOn ScheduleFirst draft circulated to WGHoward Weiss 
Secure Interconnection Guide Magenta BookMagentaOn ScheduleFirst draft comments dueHoward Weiss 
Revise Application of Security to CCSDS ProtocolsGreenOn ScheduleFirst draft comments dueHoward Weiss 
Security Architecture for Space Data SystemsMagentaAll Tasks CompletedProject CompletedCCSDS Tech Support 
CCSDS Key Management GuideGreenAll Tasks CompletedProject CompletedCCSDS Tech Support 
CCSDS Symmetric Key Management RecommendationsMagentaAll Tasks CompletedProject CompletedBrian Oliver 
CCSDS Security Guide for Mission PlannersGreenAll Tasks CompletedProject CompletedCCSDS Tech Support 
CCSDS Secure Interconnection GuideGreenAll Tasks CompletedProject CompletedCCSDS Tech Support 
CCSDS Cryptographic AlgorithmsBlueAll Tasks CompletedProject CompletedCCSDS Tech Support 
Information Security GlossaryGreenAll Tasks CompletedProject CompletedCCSDS Tech Support 
CCSDS Cryptographic Algorithms Green BookGreenAll Tasks CompletedProject CompletedCCSDS Tech Support 
Security Threats against Space Missions RevisionGreenAll Tasks CompletedProject CompletedCCSDS Tech Support 
Network Layer Security Adaptation ProfileBlueOn ScheduleProject CompletedLaura Stafford 
CCSDS Authentication CredentialsBlueAll Tasks CompletedProject CompletedBrian Oliver 
The Application of CCSDS Protocols to Secure SystemsGreenAll Tasks CompletedProject CompletedBrian Oliver 
CCSDS Guide for Secure System InterconnectionGreenAll Tasks CompletedProject CompletedBrian Oliver 
Security Guide for Mission Planners GB RevisionGreenAll Tasks CompletedProject CompletedBrian Oliver 
Information Security Glossary of Terms RevisionMagentaAll Tasks CompletedProject CompletedLaura Stafford 
Revise Cryptographic Algorithms Green BookGreenAll Tasks CompletedProject CompletedBrian Oliver 
Revise Security Threats against Space Missions Green BookGreenAll Tasks CompletedProject CompletedLaura Stafford 
Secure Software Engineering for Space MissionsMagentaOn ScheduleRID ResolutionHoward Weiss 
Intergovernmental Cloud-based Certification AuthorityMagentaOn ScheduleSecretariat Document ProcessingHoward Weiss