{"id":1589,"date":"2021-05-25T11:37:43","date_gmt":"2021-05-25T09:37:43","guid":{"rendered":"https:\/\/www.cyberinflight.com\/?p=1589"},"modified":"2021-05-26T10:25:44","modified_gmt":"2021-05-26T08:25:44","slug":"the-space-overlay","status":"publish","type":"post","link":"https:\/\/www.cyberinflight.com\/?p=1589","title":{"rendered":"The Space Platform Overlay"},"content":{"rendered":"\n<p>Here is a mindmap of the Space Overlay. <\/p>\n\n\n\n<p>The <strong>NIST special publication&nbsp; SP 800-53 Rev. 5<\/strong> entitled \u201c<strong>Security and Privacy Controls for Information Systems and Organizations<\/strong>\u201d provides a <strong>catalog of security and privacy controls<\/strong> for information systems and organizations to protect organizational operations and assets.<\/p>\n\n\n\n<p>Government programs and organizations have attempted to take portions of NIST governance documents and <strong>apply it to space systems<\/strong>. The <strong>Space Overlay <\/strong>takes the existing control sets (such as the CNSSI No. 1253 and the NIST 800-53 Rev. 5) and articulates what could be <strong>applicable to the spacecraft<\/strong>.<\/p>\n\n\n\n<p><strong>Find out more in our strategic market intelligence report dedicated to Space Cybersecurity<\/strong>. Participate to the interview process here: <strong>contact@cyberinflight.com<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"363\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1-1024x363.png\" alt=\"\" data-id=\"1591\" data-full-url=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1.png\" data-link=\"https:\/\/www.cyberinflight.com\/?attachment_id=1591\" class=\"wp-image-1591\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1-1024x363.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1-300x106.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1-768x272.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1-1536x544.png 1536w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2021\/05\/Space-Overlay-Overview-1-2048x726.png 2048w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/figure><\/li><\/ul><figcaption class=\"blocks-gallery-caption\">Mindmapping of the Space Overlay<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Here is a mindmap of the Space Overlay. The NIST special publication&nbsp; SP 800-53 Rev. 5 entitled \u201cSecurity and Privacy Controls for Information Systems and Organizations\u201d provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets. Government programs and organizations have attempted to take portions of &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cyberinflight.com\/?p=1589\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The Space Platform Overlay&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1589","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1589"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1589\/revisions"}],"predecessor-version":[{"id":1594,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1589\/revisions\/1594"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}