— UTC
01
Course introduction · before Module 01
METEORSTORM
OVERVIEW

A 7-slide introduction. What METEORSTORM is, what problem it solves, the five functions, and the value points that distinguish it from the frameworks you already use.

DURATION~10 minutes NEXTModule 01 · Concept of Operations
INTRODUCTION
01/08
— UTC
02
The problem · why a converged framework

CROSS-WALKS LIVE IN
PEOPLE'S HEADS.

A modern commercial satellite operator defends against kinetic, directed-energy, electronic-warfare, cyber-warfare, and environmental hazards simultaneously — often within a single converged campaign. Adversaries coordinate across domains. Defenders, until now, have not had a shared framework to describe what they are defending against.

DisciplineReasons in
Cyber analystMITRE ATT&CK tactics & techniques
Space systems engineerECSS segments & subsystems
Space threat analystSPARTA techniques
Cloud security analystCSA CCM controls
NIST risk managerSP 800-53 control families · SP 800-160 resilience goals
AI risk practitionerNIST AI RMF · MITRE ATLAS · AICM
COSTThe fragmentation is borne at the point where converged defense actually happens — the analyst reasoning about one platform using four or five disconnected vocabularies. Cross-walks live in the analyst’s head, not in any system.
6VOCABULARIES
01 · BACKGROUND
02/08
— UTC
03
METEORSTORM’s answer

PUT THE CROSS-WALKS
IN THE FRAMEWORK.

Four structural layers describe the platform in a language every discipline can read. One analytic layer is the single layer where external frameworks (ATT&CK, SPARTA, ATLAS, AICM, 800-160, …) attach. Evolution in the peer-framework ecosystem becomes a taxonomy update at the analytic layer — not a re-architecting of the framework.

PCECapability Env.Where the platform operates — one of five environments5 VALUES
SEGSegmentOperational role within the architecture (ECSS-grounded)10 VALUES
SVCServiceFunctional capability — control plane / data plane / hybrid3 VALUES
ASTAssetConcrete elements that implement services6 VALUES
ANAnalytic LayerOverlays statements onto the four structural layers6 CATEGORIES
4+1LAYERS
01 · BACKGROUND
03/08
— UTC
04
What it stands for

METEORSTORM.

MMultiple
EEnvironment
TThreat
EEvaluation
Oof
RResources:
SSpace Threats &
TOperational
ORisk to
RMissions
▷ ONE-SENTENCE DEFINITION

A resilient cyber operations framework for converged terrestrial, aquatic, aerial, orbital, and deep-space platforms — providing the shared vocabulary, structural data model, and five-function process that lets cybersecurity, sat ops, RF engineering, maritime, and aviation teams collaborate in defense of the platforms they all touch.

01 · BACKGROUND
04/08
— UTC
05
The data model is static · the five-function process produces and consumes records in it

FIVE FUNCTIONS,
ONE CYCLE.

#FunctionPurpose · Output
F1Concept of Operations
(CONOPS)
Establishes the mission-grounded structural foundation. Enumerates PCE, SEG, SVC, AST. Output: the structural record every later function consumes.
F2Contextualized Threat ModelingOverlays threat logic onto the CONOPS. Identifies failure concerns and formalizes each as AN-THR attached to the structural elements it affects. Output: a mission-specific threat model.
F3Converged Detection EngineeringTransforms the threat model into operationally actionable detection capabilities. Output: detection signatures (AN-DET) and a resilience baseline.
F4Incident Response PreparednessTurns the resilience baseline into operational practice. Dashboards, compensating controls, tiered playbooks. Output: resilience measures (AN-RES) and a closed-loop improvement cycle.
F5Adversary ManagementMaintains structured adversary profiles synchronized with detection engineering so observation translates into concrete defensive action.
FLOWF1 → F2 → F3 → F4 → F5 — each function takes the previous one’s output as input. F5 feeds back into F2 as the threat landscape evolves.
5FUNCTIONS
02 · FIVE FUNCTIONS
05/08
— UTC
06
Why METEORSTORM is structured the way it is

FOUR VALUE POINTS.

▷ 01 · SHARED VOCABULARY
01

A single language across five disciplines

Cybersecurity, satellite operations, RF engineering, maritime security, and aviation security teams describe the same platform — and the same threat — in compatible terms. No translation step.

▷ 02 · STRUCTURAL TRACEABILITY
02

Every detection traces to its environment

Parent-child references mean a detection on an asset is automatically traceable to the service it implements, the segment that hosts it, and the environment it sits in.

▷ 03 · FRAMEWORK NORMALIZATION
03

External frameworks attach — they don’t replace

ATT&CK, SPARTA, ATLAS, AICM, 800-160 attach at the analytic layer. Evolution in the peer ecosystem becomes a taxonomy update — not a re-architecting of the framework.

▷ 04 · TOOL-AGNOSTIC
04

MISP is the example, not the prerequisite

The taxonomy-based tagging pattern applies to any platform that supports taxonomy tagging — OpenCTI, ThreatConnect, Anomali, in-house. The structural approach is portable across whatever stack you already use.

4POINTS
03 · VALUE POINTS
06/08
— UTC
07
How the course is organized

10 MODULES.
5 FUNCTIONS · 5 SIMULATIONS.

START HEREModule 1 · Concept of Operations — the structural foundation every other module depends on.
10MODULES
04 · COURSE
07/08
— UTC
08
Overview complete · you’re ready to start

START WITH
MODULE 01.

Concept of Operations — decompose a platform into the four structural METEORSTORM layers and produce the record every later function attaches to.

05 · GET STARTED
08/08