If a log is available, an attacker can delete logging onboard the spacecraft to hide illegitimate operations (a TC log service is usually not implemented). [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.