eHs FULL SPECTRUM SPACE CYBERSECURITY PROFESSIONAL
OUTLINE
  • M1: Concept of Operations
  • M2: Contextualized Threat Modeling
  • M3: Converged Detection Engineering
  • M4: Incident Response Preparedness
  • M5: Adversary Management
  • M6: Space Operations Exercise
  • M7: Guidance Modes Exercise
  • M8: Payload Operations Exercise
  • M9: Contested Space Operations
  • M10: Incident Response Exercise
1 / 40
CONTEXTUALIZED THREAT MODELING
METEORSTORM™ Function Two
Overlay threat logic onto the mission architecture
40 Slides | ~50 Minutes
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 2
Function Two Purpose

Function Two extends the CONOPS by asking: how could the mission fail or be deliberately disrupted?

It overlays threat logic onto the environments, segments, services, and assets defined in Function One.

The result: a threat model that is mission-specific, structurally grounded, and ready for detection engineering.

KEY QUESTION
Given YOUR mission architecture, what could cause each critical requirement to fail?
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 3
Why Mission-Anchored Threats Beat Generic Catalogs

Traditional approach: Start from a catalog of known threats and try to match them to your platform.

METEORSTORM approach: Start from YOUR mission requirements and reason outward about what could cause failure.

KEY INSIGHT
Generic catalogs miss platform-specific threats. Mission-anchored modeling ensures complete coverage by starting from what matters most: your mission.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 4
The Four Steps of Function Two
Step 1
Identify Failure Concerns
Step 2
Define Threat Elements
Step 3
Attach to CONOPS
Step 4
Validate Coverage

Each step builds on the previous, creating progressively more structured and traceable threat artifacts.

The output of Function Two feeds directly into Function Three: Converged Detection Engineering.

Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 5
STEP 1: IDENTIFY FAILURE CONCERNS
Reasoning From Mission Requirements
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 6
Reasoning From Mission Requirements

For each mission requirement, ask: what could cause this to fail?

Engage subject matter experts across ALL disciplines:

  • Cybersecurity analysts find cyber threats
  • RF engineers find signal-layer threats
  • Mission operators find timing and availability threats
  • Platform engineers find physical threats
KEY PRINCIPLE
No single discipline sees all the threats. Cross-discipline engagement is mandatory.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 7
Cross-Discipline Failure Analysis
CYBERSECURITY
Network intrusion, malware, supply chain compromise, insider threats
RF ENGINEERING
Jamming, spoofing, interference, signal degradation, link budget violations
MISSION OPERATIONS
Timing constraints, command windows, orbital mechanics, contact scheduling
PHYSICAL SECURITY
Ground station access, ASAT weapons, directed energy, co-orbital threats
The convergence of these perspectives reveals threats invisible to any single team.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 8
STARCOM-LEO: Requirements to Failure Concerns
Mission RequirementFailure Concern
Continuous broadband coverageLoss or degradation of RF or optical links disrupting service continuity
Accept and execute authorized commandsUnauthorized or spoofed commands reaching satellites, causing loss of control
Transmit telemetry to groundTelemetry data integrity compromise or interception
Relay user traffic with ≤50ms latencyDenial of service or traffic manipulation in the data plane
Maintain inter-satellite optical linksDisruption of optical links through dazzling, interference, or software exploitation
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 9
Exercise: Derive Your Own Failure Concerns
HANDS-ON EXERCISE
  1. Take 3 mission requirements from your platform’s CONOPS (or from Module 1).
  2. For each requirement, identify at least 2 failure concerns from different disciplines.
  3. Document which discipline identified each concern.
If you don’t have your own platform yet, use the STARCOM-LEO requirements from Module 1.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 10
STEP 2: DEFINE THREAT ELEMENTS
Formalizing Concerns as Analytical Objects
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 11
Formalizing Concerns as Threat Elements

Each failure concern becomes a formal Threat element (AN-THR) in the METEORSTORM analytical layer.

Assigned a structured identifier: AN: THR: Threat: XX

This transforms vague worries into analytically tractable, machine-readable objects.

Each threat gets a name, identifier, and detailed description — creating a shared vocabulary across all disciplines.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 12
Threat Identifier Structure

The naming convention breakdown:

AN Analytic Layer The analytical/threat modeling layer of the taxonomy
THR Threat Category Identifies this as a Threat element specifically
Threat Human-readable Label The descriptive name of the specific threat
XX Sequential Ordinal Unique number for each threat in the model
Example: AN: THR: Threat: 00 — “RF Link Interference”
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 13
THR:00 — RF Link Interference
AN: THR: Threat: 00
Identifier:AN: THR: Threat: 00
Name:RF Link Interference
Description:Deliberate or environmental disruption of Ku/Ka-band RF uplink/downlink or feeder link signals, reducing data availability and constellation command capacity.
EXPOSURE DOMAINS
Electronic Warfare, Environmental — spans both adversary action and natural phenomena.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 14
THR:01 — Unauthorized Command Injection
AN: THR: Threat: 01
Identifier:AN: THR: Threat: 01
Name:Unauthorized Command Injection
Description:Adversary attempts to inject unauthorized commands into the satellite command interface, targeting the control plane to achieve unauthorized maneuvers, mode changes, or software modification.
EXPOSURE DOMAINS
Cyber, Electronic Warfare — combines digital exploitation with signal-layer access.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 15
THR:02 — Telemetry Interception and Manipulation
AN: THR: Threat: 02
Identifier:AN: THR: Threat: 02
Name:Telemetry Interception and Manipulation
Description:Interception or alteration of telemetry data in transit between satellites and ground stations, degrading operator situational awareness and enabling adversary intelligence collection.
EXPOSURE DOMAINS
Cyber, Electronic Warfare — targets data integrity and confidentiality in the control plane.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 16
THR:03 — Data Plane Denial of Service
AN: THR: Threat: 03
Identifier:AN: THR: Threat: 03
Name:Data Plane Denial of Service
Description:Volumetric or targeted disruption of user broadband traffic relay, including gateway saturation, routing table manipulation, or selective traffic dropping.
EXPOSURE DOMAINS
Cyber — targets availability of the user data plane through network-layer attacks.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 17
THR:04 — Optical Link Disruption
AN: THR: Threat: 04
Identifier:AN: THR: Threat: 04
Name:Optical Link Disruption
Description:Disruption of inter-satellite laser links through ground-based or space-based dazzling, co-orbital interference, or exploitation of link handover logic in routing software.
EXPOSURE DOMAINS
Non-Kinetic Physical, Cyber — combines directed energy with software exploitation.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 18
THR:05 — Supply Chain Compromise
AN: THR: Threat: 05
Identifier:AN: THR: Threat: 05
Name:Supply Chain Compromise
Description:Introduction of malicious code or hardware modifications through the satellite manufacturing, software development, or ground station equipment supply chain.
EXPOSURE DOMAINS
Cyber — pre-deployment compromise that persists through the entire mission lifecycle.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 19
THR:06 — Space Environment Effects
AN: THR: Threat: 06
Identifier:AN: THR: Threat: 06
Name:Space Environment Effects
Description:Orbital debris impact, solar particle events, or radiation-induced faults causing hardware degradation, memory corruption, or temporary loss of satellite capability.
EXPOSURE DOMAINS
Kinetic, Environmental — natural phenomena that produce effects indistinguishable from some attacks.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 20
Complete Threat Element Table
IdentifierNameDescription
THR:00RF Link InterferenceDeliberate or environmental disruption of Ku/Ka-band RF signals
THR:01Unauthorized Command InjectionAdversary injection of unauthorized commands into satellite command interface
THR:02Telemetry Interception & ManipulationInterception or alteration of telemetry data in transit
THR:03Data Plane Denial of ServiceVolumetric or targeted disruption of user broadband traffic relay
THR:04Optical Link DisruptionDisruption of inter-satellite laser links through dazzling or software exploit
THR:05Supply Chain CompromiseMalicious code or hardware modifications via manufacturing/dev supply chain
THR:06Space Environment EffectsOrbital debris, solar particles, or radiation-induced faults
Seven threats span all five exposure domains: Kinetic (debris), Non-Kinetic Physical (dazzling), EW (jamming/spoofing), Cyber (command injection, supply chain), and Environmental (radiation, particles).
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 21
STEP 3: ATTACH THREATS TO CONOPS ELEMENTS
Structural Linkage for Cross-Domain Correlation
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 22
Why Structural Attachment Matters

Without attachment, threats are abstract concepts floating in space.

Attachment transforms them into analytically tractable objects linked to specific platform elements.

Every threat connects to:

PCE
Environment
SEG
Segment
SVC
Service
AST
Asset
KEY PRINCIPLE
This structural linkage is what enables cross-domain correlation in Function Three.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 23
Threat-to-CONOPS Mapping Structure

The mapping format links each threat to all four taxonomy layers:

Threat
PCE
SEG
SVC
AST
EXAMPLE MAPPING

THR:00 RF Link Interference

PCE: OR + TE    SEG: SP + GR + LI    SVC: CP + DP

AST: HW:00, AST:SI:00, AST:SI:02

Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 24
STARCOM-LEO: RF Link Interference Mapping
THR:00 — Detailed CONOPS Attachment
LayerElementsDescription
PCEOR, TEOrbital (satellite RF systems) + Terrestrial (ground antennas)
SEGSP, GR, LISpace segment, Ground segment, Link segment
SVCCP, DPControl Plane (command path) + Data Plane (user traffic)
ASTHW:00, HW:02, HW:03, SI:00, SI:02Sat transceiver, ground antenna, gateway antenna, RF signals, feeder links
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 25
STARCOM-LEO: Command Injection Mapping
THR:01 — Detailed CONOPS Attachment
LayerElementsDescription
PCEOR, TEOrbital (flight software) + Terrestrial (ground management)
SEGSP, GR, LISpace segment, Ground segment, Link segment
SVCCPControl Plane only — targets the command path
ASTSW:00, SW:01, DA:01, SI:00Flight software, ground constellation mgmt, command packages, RF uplink
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 26
Complete Threat Attachment Matrix
ThreatPCESEGSVCAST
THR:00 RF Link InterferenceOR, TESP, GR, LICP, DPHW:00, HW:02, HW:03, SI:00, SI:02
THR:01 Command InjectionOR, TESP, GR, LICPSW:00, SW:01, DA:01, SI:00
THR:02 Telemetry InterceptionOR, TESP, GR, LICPDA:00, SI:00, SW:00
THR:03 Data Plane DoSOR, TESP, GR, US, LIDPSW:02, DA:02, HW:03, HW:04
THR:04 Optical Link DisruptionORSP, LICP, DPHW:01, SI:01, SW:02
THR:05 Supply Chain CompromiseTESP, GRCP, DPSW:00, SW:01, HW:00-04
THR:06 Space EnvironmentORSPCP, DPHW:00, HW:01, DA:00, SI:00, SI:01
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 27
Visualizing Threats on the CONOPS Diagram

The CONOPS diagram from Module 1 is now updated to show threat nodes.

Each threat connects to the specific PCEs, segments, services, and assets it affects.

This creates a visual threat map — the reference artifact for Function Three.

The threat-enriched CONOPS diagram becomes the primary input for detection engineering. It visually shows WHERE threats intersect with your mission architecture.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 28
STEP 4: VALIDATE COVERAGE
Ensuring No Mission Requirement Goes Unprotected
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 29
Ensuring Complete Threat Coverage

Return to mission requirements and confirm: does every critical requirement have at least one associated threat?

Coverage gaps = blind spots in your security posture.

Gaps should be documented, assigned for follow-up, and tracked.

MISSION QUESTION
Can you trace every mission requirement to at least one identified threat? If not, where are your blind spots?
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 30
Coverage Validation Matrix
Mission RequirementAssociated ThreatsCoverage Status
Continuous broadband coverageTHR:00, THR:04, THR:06COVERED
Accept authorized commandsTHR:01, THR:05COVERED
Transmit telemetry to groundTHR:02, THR:06COVERED
Relay user traffic ≤50msTHR:03, THR:00COVERED
Maintain optical linksTHR:04, THR:06COVERED
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 31
Identifying and Documenting Gaps

What if a requirement has NO associated threats? That’s a gap.

Document gaps with: which requirement, what disciplines were consulted, what follow-up is needed.

  • New services not yet threat-modeled
  • Cross-domain interactions not considered
  • Environmental factors overlooked
  • Third-party dependencies not assessed
MISSION QUESTION
Are there mission requirements from your CONOPS that no threat currently addresses?
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 32
STARCOM-LEO: Coverage Validation Results

All five mission requirements are covered by at least two threats.

Cross-domain coverage confirmed: threats span Kinetic, Non-Kinetic Physical, EW, Cyber, and Environmental domains.

The model accounts for both deliberate adversary action AND natural environmental effects.

This validated threat model feeds directly into Function Three: Converged Detection Engineering. Every detection rule will trace back to a specific threat, which traces back to a mission requirement.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 33
FRAMEWORK INTEGRATION
Enriching the Threat Model with External Intelligence
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 34
Cross-Referencing with MITRE ATT&CK

METEORSTORM threat elements can be mapped to ATT&CK techniques:

  • THR:01 (Command Injection) maps to multiple ATT&CK techniques in Initial Access, Execution
  • THR:05 (Supply Chain) maps to T1195 Supply Chain Compromise
  • This enriches the threat model with the broader community’s adversary intelligence
KEY PRINCIPLE
METEORSTORM doesn’t replace ATT&CK — it provides the converged structure to apply it across all domains.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 35
Cross-Referencing with SPARTA and SPACE-SHIELD

SPARTA catalogs space-specific adversary tactics targeting spacecraft and ground segments.

SPACE-SHIELD covers European space system threats.

METEORSTORM can ingest these frameworks, mapping their TTPs to the taxonomy layers. Space-specific TTPs get linked to PCE, SEG, SVC, AST elements in your CONOPS.

The ingested framework content becomes operationally actionable because it’s linked to YOUR mission architecture.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 36
Layered Enrichment Model

Multiple frameworks layer into METEORSTORM’s unified threat model:

ATT&CK Maps to AN layer — techniques become threat enrichments
SPARTA Maps to PCE-OR, SEG-SP — space segment threats
SPACE-SHIELD Maps to space segment threats — European focus
ATLAS Maps to AI/ML threats on autonomy-enabled platforms
FiGHT Maps to 5G telecommunications threats
The result: a single, unified threat model incorporating all relevant domain knowledge.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 37
Recording the Threat Model in MISP
  • Create AN-THR tagged events in MISP for each identified threat
  • Apply METEORSTORM taxonomy tags: PCE, SEG, SVC, AST for each threat
  • Attach cross-references to ATT&CK, SPARTA, SPACE-SHIELD techniques
  • Link threat events to CONOPS elements via MISP object relationships
The MISP-recorded threat model becomes the machine-readable, shareable foundation for all subsequent work — from detection engineering to incident response.
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 38
The Function Two Output

A contextualized threat model where every identified threat is structurally linked to platform elements.

Full traceability chain:

Mission
Requirements
Failure
Concerns
Threat
Elements
CONOPS
Attachment
Coverage
Validation
CONOPS (F1)
Threat Model (F2)
Detection Architecture (F3)
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 39
Threat Model Quality Checklist
  • Every mission requirement has at least one associated threat
  • Threats span multiple exposure domains (not just cyber)
  • Each threat is formally defined with AN-THR identifier
  • Every threat is attached to specific PCE, SEG, SVC, AST elements
  • Cross-references to existing frameworks are documented
  • Coverage gaps are identified and assigned for follow-up
  • The threat-enriched CONOPS diagram is updated and published
Module 2 — Contextualized Threat Modeling OPERATOR: —
SCORP² Practitioner | eHs® | TLP-GREEN 40
Module 2 Summary
  • Function Two overlays threat logic onto the CONOPS from Function One
  • Seven STARCOM-LEO threats span all five exposure domains
  • Structural attachment transforms abstract concerns into traceable analytical objects
  • The validated threat model is THE input for detection engineering in Module 3
Next: Module 3 — Converged Detection Engineering
VIDEO
MISSION STATUS
STUDENT
SECTIONSession 2 — Threat Modeling
START00:00
REMAINING