An attacker can compromise another system which can be used to get access to an interconnected one by exploiting a trusted relationship between the two. In space missions context this can be e.g. in case of Federated missions.
| ID | Mitigation | Description |
|---|---|---|
| M2044 | Application of Least Privilege principle | |
| M2041 | Multi-factor authentication | |
| M2043 | Zero Trust Architecture |