| ID | Name |
|---|---|
| T1584.001 | Compromise Ground Segment |
| T1584.002 | Compromise Satellite(s) |
If a Ground System is located in a remote area with limited physical security controls, a physical violation of the site is possible. There should be authentication systems implemented that make difficult to use it without a proper authorization. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.