Key Management Infrastructure Manipulation

Key infrastructures provide the technical means for managing the key life cycles as well as for the distribution of keys using security protocols or other means. If an attacker manipulates them, he can gain and maintain an authorized access to the protected resource. Encryption keys used to encrypt TM/TC can be replaced in order to gain permanent access to other functionalities, or to temporarily interrupt the owner's control.

Standard/references: [1] [2]

ID: T2013
Sub-techniques:  T2013.001, T2013.002
Tactic: Persistence
Platforms: Ground Segment
Version: 2.0
Created: 25 August 2022
Last Modified: 21 April 2023

Mitigations

References