Not so out of this world: There are connections between the protection of a spacecraft and that of corporate systems. What the International Space Station ISS teaches about protecting critical and largely isolated corporate IT.
Analogous to the ISS, companies should also prioritize resilience principles to protect their business-critical systems.
(Image: freely licensed / Photo by NASA on Unsplash / Unsplash)
Paul Butnaru is Director of Product Management Gravity Zone Solutions at Bitdefender.
At least in the normal realms of physics, the same natural laws prevail in space as they do on Earth. This is similarly the case with IT security at isolated critical locations—in production, at remote sites, or in the Internet of Things. With AI autonomously recognizing threats, setting up redundantly, and considering failure scenarios already during development: the IT implemented on the ISS shows the way for terrestrial IT security.
250 miles above the Earth, aboard the International Space Station ISS and in the European Columbus module, Dropcoal, a complex scientific experiment developed by the Romanian company Romanian In Space Engineering (RISE), performs its daily tasks and relies on real-time operation from the ground. However, real-time operations require real-time protection that meets the stringent cybersecurity standards of the European Space Agency (ESA) and the National Space Administration (NASA). Secured by an Extended Detection and Response (XDR), the project demonstrates that resilience and autonomy are the cornerstones for securing critical systems in space.
There are striking parallels between the protection of a spacecraft device and that of critical corporate systems operating in remote or resource-constrained environments: both scenarios require autonomy and the ability to work efficiently with minimal resources.
When Real-Time Intervention is Not Possible
For Dropcoal, an implemented Extended Detection and Response, or XDR, provides autonomous protection by recognizing and neutralizing threats without real-time updates—this is important in space where intervention is impossible. Similarly, enterprise systems at remote locations, such as offshore areas or industrial IoT, require security mechanisms that can operate independently and resource-efficiently.
In both cases, the key to resilience lies in extensive isolation. Hardware in space is not completely separated from Earth and does occasionally have internet access and network connectivity—but not continuously. Whether in space or at a remote industrial location, these systems must be able to defend themselves without room for failure.
It is important to automatically detect threats with minimal resources. Security technologies capable of this offer protection when systems cannot be directly monitored. It is also crucial to protect data during transmission, as research results are a valuable target for cyber spies.
Derived Insights for Companies to Protect Critical Infrastructure
The case study of the ISS illustrates that systems designed to operate with only sporadic connectivity require a fundamental rethink. In space missions, systems must remain resilient and continue to operate independently in case of disruptions. When such a system is 250 miles above the Earth, its resilience is fundamental. Companies should follow the same strategy in protecting their critical infrastructures when preparing for events like network outages or an interrupted supply chain. Three important insights are highlighted:
Proactive Approach: Dropcoal does not react to problems, but anticipates them. Devices for space use are designed to foresee disruptions. Tests before deployment verify this. However, resilience begins with securely designed systems, based on the Security-by-Design approach. Developers must already build in robust security. Adding it later is hardly feasible. The systems need protection against specific attackers, such as state actors trying to disrupt operations or steal sensitive data.
Autonomy Through AI: Systems used in space are designed for operation without real-time support and can independently detect and resolve problems. Similarly, companies need autonomous technologies that function without immediate input and ensure operations continue in disconnected environments. Companies can achieve this with AI-driven IT security that automates threat detection and response, thus ensuring continuous, reliable operation.
Redundancy: Intermittent isolated connectivity does not equate to invulnerability. Redundancy and adaptability are crucial everywhere. Space missions establish backups to ensure functionality in case of failure. Similarly, companies must ensure that a backup is available for each of their critical components to step in during emergencies. To achieve this, they can diversify network paths, set up an uninterruptible power supply for emergencies, and integrate failover mechanisms.
Adopting these three space-ready principles can help companies build a resilient infrastructure.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
Innovations That Can Be Transferred to Corporate Systems in the Near Future
The Dropcoal experiment investigates how water and ethanol droplets of different sizes behave when they collide at varying speeds. A high-speed camera records the interaction and mixing process. This research helps improve pharmaceutical formulations and models for the combustion of fuels in microgravity.
(Image: Romanian In Space Engineering)
Space projects like Dropcoal often rely on time-tested cybersecurity principles but approach them in new ways tailored to extreme environments. These adaptations have the potential to change how companies secure critical systems, especially in remote or resource-limited scenarios. For example, in securing non-connected systems, offline updates and resource-efficient techniques are not new, but space missions elevate them to a new level of precision and autonomy. In industries like manufacturing or healthcare, where connectivity is only sporadic, these advanced approaches ensure that systems remain protected and resilient without external input.
Behavioral analysis is also evolving for the extreme case of space. The concept is not new, but locations like space require a redefinition of how systems detect and respond to anomalies. Companies can leverage these technological advances by refining behavioral models to operate in constrained environments and proactively detect threats with limited visibility.
Ultimately, the resilience strategy from space exploration is a central element of a secure corporate infrastructure. Systems designed to operate independently and recover quickly ensure business continuity during major disruption events, from cyberattacks to natural disasters. The necessary challenge is to adapt and optimize these principles to address the complexity and sophistication of current threats. Innovations in space research lead to tools that not only secure business operations but also make them future-proof. Whether it's about achieving autonomy, implementing resilience during development, or preparing for unexpected events with robust recovery mechanisms—what applies in space also applies on Earth.
Future-Proof Authentication with Universal RFID Readers