Key Management Infrastructure Manipulation

Key infrastructures provide the technical means for managing the key life cycles as well as for the distribution of keys using security protocols or other means. If an attacker manipulates them, he can gain and maintain an authorized access to the protected resource. Encryption keys used to encrypt TM/TC can be replaced in order to gain permanent access to other functionalities, or to temporarily interrupt the owner's control.

Standard/references: [1] [2]

ID: T2013
Sub-techniques:  T2013.001, T2013.002
Tactic: Persistence
Platforms: Ground Segment
Version: 2.0
Created: 25 August 2022
Last Modified: 21 April 2023

Mitigations

ID Mitigation Description
M2060 Establish processes, procedures, and security measures to protect cryptographic keys / key management
M2059 Physical and network protection of key management systems
M2058 Physical protection and isolation of root keys

References