Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity Education & TrainingLogical SecurityGovernment: Federal, State and Local

How military-civilian cooperation is transforming space cybersecurity

By Darron Makrokanis
NASA satellite

Image via Unsplash

March 1, 2024

Over the past decade, there has been a proliferation of space-based technology. Increased affordability and accessibility of satellite and other space technology have led many countries and enterprises to get involved. Space technology is playing an increasing role in the day-to-day operations of businesses, militaries and the lives of individual civilians.

With greater affordability and accessibility of space has come greater cooperation between public and private entities and military and civilian organizations. For example, SpaceX is a private company that regularly delivers humans and equipment to space for NASA. The Pentagon has also contracted with SpaceX for use of its Starshield satellite network for military purposes. The overall increase in scale, scope and interdependency of space technologies across public and private sectors also drives a need for more cybersecurity capabilities tailored to rapidly evolving space infrastructure — and the ground-based technology that supports it.

This combination of rapid growth and technology proliferation with increased public-private collaboration is driving several major cybersecurity trends in space. First, there is an increased demand for distributed cybersecurity technology that can work across organizations and widely distributed assets, such as ground stations and satellites. Second is the adoption of zero trust technology to enable secure connections and data sharing across different organizations, classification levels and more. And finally, the increased public awareness of potential cyberattacks in space, which is driving discussion around whether space should be considered a critical infrastructure sector.

Increased cross-sector collaboration in space

Historically, satellite technology, both hardware and software, was custom-built and only available to government agencies. Only a small number of countries had the ability to launch satellites into space. This provided a degree of “security by obscurity” against cyberattacks that are rapidly evaporating. Over the past several decades, private companies have accelerated innovation in space technology and have outpaced government space agency launches. In Q1 2023, SpaceX launched over 700 spacecraft into orbit, the majority of which were communications satellites. As private companies move rapidly to both build and launch satellites, governments are looking to collaborate, to tap into the value and pace of innovation enabled by private companies.

This raises urgent cybersecurity challenges. Governments hoping to use commercial communications satellite networks to rapidly relay data across the globe must be assured that the sensitive data they are transmitting is secure. If a government purchases satellites manufactured by a private company, they need to know that the technology has been built with the highest cybersecurity standards in mind. Private companies may use commercial, off-the-shelf technology in building their satellites, as confirmed in a talk at BlackHat 2023 in which a researcher found basic security flaws in several models of commercial and government-used satellites.

Governments know they need to rely on private companies' innovation to create new technologies to achieve cybersecurity goals in space, as much as they have come to rely on private companies to build and launch satellites. As more and more critical government functions, and the livelihoods of civilians, rely on an interconnected web of public- and privately owned space and ground infrastructure, cybersecurity across these assets grows more important than ever. There has been ongoing discussion as to whether space should be designated a critical infrastructure sector by the U.S. government. This would potentially increase regulatory guidance and funding for the cybersecurity of space resources. Currently, space forms one component of several existing critical infrastructure sectors, but is not, in itself, designated as such.

The establishment of the Space Force represents a substantial stride in fostering collaboration and underscores the evolving nature of warfare. It also kicked off a much-needed educational campaign about space safety. Now, all are beginning to understand that funding, next-generation research, and securing all types of space infrastructure is paramount. This requires striking a delicate balance between international collaboration and the protection of sensitive military intelligence, as well as the intellectual property of government contractors and the defense industrial base.

Growing adoption of distributed cyber

The highly distributed nature of space assets creates tough cybersecurity challenges. Many satellites are already in orbit, and updating their built-in cybersecurity measures is difficult or impossible. Ground stations that send and receive signals to and from many different satellites could be targeted by attackers hoping to either steal valuable remote sensing data, intercept classified military data, or even sabotage satellites in orbit. Securing all of these assets, while still allowing them to do their job of gathering and distributing data at a speed that enables worldwide private and public business and military activity, is a nontrivial challenge.

One of the core challenges is that of sending and receiving sensitive data among these assets while being sure that the data is not tampered with, corrupted or accessed by unauthorized individuals along the way. Remote sensing data, for example, high-resolution cameras, and other sensors mounted on satellites, is valuable but must be transmitted rapidly to retain that value for mission assurance. How do users capture images on a satellite, transmit them across a network of other private and public satellites, and ultimately to a ground station, to someone who needs to make a life-or-death decision, while ensuring that data’s integrity along the way?

Secure data sharing across various space systems introduces a large challenge in distributed cybersecurity, particularly concerning redundancy and trust. The ramifications of data tampering can be substantial. Even a minor deviation from specifications during a space launch, caused by tampering, can have real-world consequences, potentially resulting in the loss of human life.

A holistic perspective should be maintained regarding all participants in the cyber landscape. To illustrate this, consider the example of Putin's invasion of Ukraine, where a satellite internet provider widely utilized throughout Europe and by the Ukrainian military faced an unprecedented cyberattack. This is a stark reminder that as space systems continue to become more interconnected and intricate, cyberattacks are rising — and electronic warfare has arrived.

Acceleration of zero trust adoption

The realization is dawning upon nations that the same zero-trust principles that have proven essential for securing systems on Earth must now extend to those operating in space. This shift is underscored by the Defense Department's Zero Trust Roadmap, highlighting that both the defense industrial base and military organizations have already identified zero trust as a top priority. However, the current challenge lies in the practical implementation of zero trust within the unique context of space.

Many areas must be secured rapidly with zero trust tech, such as ground communications and satellites. For ground station operations, securing legacy access while also bridging to modern assets is a critical need. Protecting launch facilities is also important, as they are massive facilities with complex, potentially vulnerable industrial control systems. The U.S. Space Force is leading the way in adopting innovative, privately developed security solutions and, more generally, in fostering productive collaboration between commercial entities and defense agencies to secure the space domain.

Uptick in public awareness of cyber threats in space

In a proactive move to expand visibility around space vulnerabilities, the U.S. government launched a satellite into space in August of 2023 with the explicit purpose of serving as a target for hacking exercises. This strategic initiative aimed to assess the cybersecurity landscape of space technology while simultaneously elevating public awareness regarding potential threats in the cosmos. This mission not only shed light on the ease of hacking into space assets but also caught the broader public's attention, increasing global support for space cyber-hardening.

Despite the evident risks and growing awareness of space vulnerabilities, space being officially designated as a critical infrastructure sector is still an ongoing discussion. The designation would acknowledge the intrinsic importance of secure space technology and establish a framework for implementing regulations and oversight. It is a necessary step to protecting not only our nations but the future of space exploration — and having support from the broader public may just be key.

Space as the new cybersecurity frontier

As space enters its new era and is reprioritized, technology — and those that create it — continue to sit at the forefront of all space-related initiatives. With attacks rising, there’s no question that deep collaboration and cybersecurity for space needs to evolve rapidly to protect the growing and changing space landscape. Zero trust innovation and strong collaboration between public and commercial entities must be our guiding star to ensure a future where space is secure.

KEYWORDS: critical infrastructure cyber security initiatives federal government security government cyber security NASA

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Darron Makrokanis is Chief Revenue Officer at Xage Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • laptop screen with video conferencing

    Three ways the hybrid workplace is transforming the security industry

    See More
  • technology-network-cyber-freepik.jpg

    Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

    See More
  • group of women sitting around an office table

    Security leaders discuss how to make space for women in the workplace

    See More

Events

View AllSubmit An Event
  • September 29, 2025

    Global Security Exchange (GSX)

     
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing