ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Air Force Space Command, activated Sept. 1, 1982, is a major command with headquarters at Peterson Air Force Base, Colo. AFSPC provides military focused space and cyberspace capabilities with a global perspective to the joint warfighting team. People More than 40,000 professionals assigned to 134 locations worldwide. Organization Fourteenth Air Force is located at Vandenberg AFB, Calif., and provides space capabilities for the joint fight through the operational missions of spacelift; position, navigation and timing; satellite communications; missile warning and space control. Twenty-fourth Air Force is located at Joint Base San Antonio - Lackland, Texas, and its mission is to provide combatant commanders with trained and ready cyber forces which plan and conduct cyberspace operations. The command extends, operates, maintains and defends its assigned portions of the Department of Defense network to provide capabilities in, through and from cyberspace. The Space and Missile Systems Center at Los Angeles AFB, Calif., designs and acquires all Air Force and most Department of Defense space systems. It oversees launches, completes on-orbit checkouts and then turns systems over to user agencies. It supports the Program Executive Office for Space on the Global Positioning, Defense Satellite Communications and MILSTAR systems. SMC also supports the Evolved Expendable Launch Vehicle, Defense Meteorological Satellite and Defense Support programs and the Space-Based Infrared System. AFSPC major installations include: Schriever, Peterson and Buckley Air Force Bases in Colorado; Los Angeles and Vandenberg Air Force Bases in California; and Patrick AFB in Florida. Major AFSPC units also reside on bases managed by other commands in New Mexico, Texas, Illinois, Virginia and Georgia. AFSPC manages many smaller installations and geographically separated units in North Dakota, Alaska, Hawaii and across the globe.

Air Force Space Command A.I CyberSecurity Scoring

AFSC

Company Details

Linkedin ID:

air-force-space-command

Employees number:

10,001

Number of followers:

14,486

NAICS:

928

Industry Type:

Armed Forces

Homepage:

af.mil

IP Addresses:

0

Company ID:

AIR_7653091

Scan Status:

In-progress

AI scoreAFSC Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/air-force-space-command.jpeg
AFSC Armed Forces
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreAFSC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/air-force-space-command.jpeg
AFSC Armed Forces
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

AFSC Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

AFSC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for AFSC

Incidents vs Armed Forces Industry Average (This Year)

No incidents recorded for Air Force Space Command in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Air Force Space Command in 2025.

Incident Types AFSC vs Armed Forces Industry Avg (This Year)

No incidents recorded for Air Force Space Command in 2025.

Incident History — AFSC (X = Date, Y = Severity)

AFSC cyber incidents detection timeline including parent company and subsidiaries

AFSC Company Subsidiaries

SubsidiaryImage

Air Force Space Command, activated Sept. 1, 1982, is a major command with headquarters at Peterson Air Force Base, Colo. AFSPC provides military focused space and cyberspace capabilities with a global perspective to the joint warfighting team. People More than 40,000 professionals assigned to 134 locations worldwide. Organization Fourteenth Air Force is located at Vandenberg AFB, Calif., and provides space capabilities for the joint fight through the operational missions of spacelift; position, navigation and timing; satellite communications; missile warning and space control. Twenty-fourth Air Force is located at Joint Base San Antonio - Lackland, Texas, and its mission is to provide combatant commanders with trained and ready cyber forces which plan and conduct cyberspace operations. The command extends, operates, maintains and defends its assigned portions of the Department of Defense network to provide capabilities in, through and from cyberspace. The Space and Missile Systems Center at Los Angeles AFB, Calif., designs and acquires all Air Force and most Department of Defense space systems. It oversees launches, completes on-orbit checkouts and then turns systems over to user agencies. It supports the Program Executive Office for Space on the Global Positioning, Defense Satellite Communications and MILSTAR systems. SMC also supports the Evolved Expendable Launch Vehicle, Defense Meteorological Satellite and Defense Support programs and the Space-Based Infrared System. AFSPC major installations include: Schriever, Peterson and Buckley Air Force Bases in Colorado; Los Angeles and Vandenberg Air Force Bases in California; and Patrick AFB in Florida. Major AFSPC units also reside on bases managed by other commands in New Mexico, Texas, Illinois, Virginia and Georgia. AFSPC manages many smaller installations and geographically separated units in North Dakota, Alaska, Hawaii and across the globe.

Loading...
similarCompanies

AFSC Similar Companies

Saudi Arabian National Guard المهمة الأساسية للحرس الوطني هي : الحفاظ على الأمن، والاستقرار الداخلي للوطن، والدفاع عن مقدّساته ومكتسباته الحضارية . ومن مـهامه الأخرى ما يلي: •حماية المنشآت الحيوية، والإستراتيجية التي يُكَلَّف بها. • المشاركة في

Welcome to the official U.S. Army LinkedIn page. The U.S. Army’s mission is to fight and win our Nation’s wars by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders. If you're looking for news about t

United States Department of War

The mission of the Department of War is to provide military forces necessary to protect the security of our country. The U.S. military defends the homeland, deters adversaries, and builds security around the world by projecting U.S. influence and working with allies and partners. In case deterrence

The United States is a maritime nation, and the U.S. Navy protects America at sea. Alongside our allies and partners, we defend freedom, preserve economic prosperity, and keep the seas open and free. Our nation is engaged in long-term competition. To defend American interests around the globe, the U

British Army

Joining the British Army, you’ll get much more from life than you ever would with a civilian career – you’ll have the opportunity to do something that really matters, with a team that are like family to you. The sense of belonging in the Army is next level: when you’ve trained with each other and ov

U.S. Navy Reserve

MISSION Throughout all 50 states and around the world, the Navy Reserve force delivers real-world capabilities and expertise to support the Navy mission — building a more lethal, warfighting culture focused on great power competition. VISION The Navy Reserve provides essential naval warfighting cap

U.S. Air Force Reserve

The Air Force Reserve is an integral component of our Nation's air defense and military support network. Reservists bring knowledge, skills and expertise from their civilian experiences to support critical missions and training around the globe, while working alongside their Active Duty Air Force me

Swedish Armed Forces

The Swedish Armed Forces is one of the biggest authorities in Sweden and is headed by a Supreme Commander. The deputy leader of the authority is the Director General. As the only authority permitted to engage in armed combat, the Swedish Armed Forces are Sweden’s ultimate security policy resource

Sri Lanka Army

The Army Act was enacted in parliament on the 10th of October 1949 which is recognized as the day, the Ceylon Army was raised. The Army was to be comprised of a Regular and a Volunteer force. In May 1972, when Ceylon became the Republic of Sri Lanka, all Army units were renamed accordingly Regime

newsone

AFSC CyberSecurity News

November 05, 2025 08:00 AM
The race to defend satellites from cyberattacks

A small satellite named Deloitte-1 is hunting for hackers in orbit. Launched in March, it's the first of nine spacecraft the consulting firm...

November 03, 2025 08:00 AM
Colorado’s attorney general sues Trump administration over Space Command relocation

The lawsuit also names Defense Secretary Pete Hegseth, the Department of the Air Force and Air Force Secretary Troy Meink as plaintiffs.

October 01, 2025 07:00 AM
Space Force domain-awareness and software-acquisition program gains operational acceptance

SPACE SYSTEMS COMMAND -- Peterson Space Force Base, Colorado Springs, Colo. & Los Angeles Air Force Base, El Segundo, Calif.

September 16, 2025 07:00 AM
Commission on U.S. Cyber Force Generation

The CSIS Commission on U.S. Cyber Force Generation will convene leading experts to examine how the United States can best build a dedicated...

September 11, 2025 07:00 AM
Space Force Building Tools to Detect Cyberattacks on Satellites

U.S. Space Force contractors are building an AI-powered tool to detect cyberattacks on satellites by monitoring their behavior and...

September 04, 2025 03:01 AM
CHARLEEN D. LAUGHLIN

Ms. Charleen Laughlin, a member of the Senior Executive Service, is the Deputy Chief of Space Operations (DCSO) for Cyber and Data (SF/S6) at United States...

June 25, 2025 07:00 AM
Army Blocks Air Force’s AI Program Over Data Security Concerns

The Army has blocked the Air Force generative AI chatbot, NIPRGPT, from its networks, citing cybersecurity and data governance.

May 15, 2025 07:00 AM
Securing the space-based assets of NATO members from cyberattacks

This paper proposes a three-tiered framework – based on mitigation, adaptation and resilience – for strengthening NATO's space cybersecurity approach.

April 28, 2025 07:00 AM
Cyber Threats Loom Large Over U.S. Space Systems, Warns Pentagon Official

At last week's Space Force's Space Systems Command Cyber Expo 2025, Director for Cyber Warfare John Garstka warned in his keynote address...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

AFSC CyberSecurity History Information

Official Website of Air Force Space Command

The official website of Air Force Space Command is http://www.afspc.af.mil.

Air Force Space Command’s AI-Generated Cybersecurity Score

According to Rankiteo, Air Force Space Command’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.

How many security badges does Air Force Space Command’ have ?

According to Rankiteo, Air Force Space Command currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Air Force Space Command have SOC 2 Type 1 certification ?

According to Rankiteo, Air Force Space Command is not certified under SOC 2 Type 1.

Does Air Force Space Command have SOC 2 Type 2 certification ?

According to Rankiteo, Air Force Space Command does not hold a SOC 2 Type 2 certification.

Does Air Force Space Command comply with GDPR ?

According to Rankiteo, Air Force Space Command is not listed as GDPR compliant.

Does Air Force Space Command have PCI DSS certification ?

According to Rankiteo, Air Force Space Command does not currently maintain PCI DSS compliance.

Does Air Force Space Command comply with HIPAA ?

According to Rankiteo, Air Force Space Command is not compliant with HIPAA regulations.

Does Air Force Space Command have ISO 27001 certification ?

According to Rankiteo,Air Force Space Command is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Air Force Space Command

Air Force Space Command operates primarily in the Armed Forces industry.

Number of Employees at Air Force Space Command

Air Force Space Command employs approximately 10,001 people worldwide.

Subsidiaries Owned by Air Force Space Command

Air Force Space Command presently has no subsidiaries across any sectors.

Air Force Space Command’s LinkedIn Followers

Air Force Space Command’s official LinkedIn profile has approximately 14,486 followers.

Air Force Space Command’s Presence on Crunchbase

No, Air Force Space Command does not have a profile on Crunchbase.

Air Force Space Command’s Presence on LinkedIn

Yes, Air Force Space Command maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/air-force-space-command.

Cybersecurity Incidents Involving Air Force Space Command

As of November 28, 2025, Rankiteo reports that Air Force Space Command has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Air Force Space Command has an estimated 779 peer or competitor companies worldwide.

Air Force Space Command CyberSecurity History Information

How many cyber incidents has Air Force Space Command faced ?

Total Incidents: According to Rankiteo, Air Force Space Command has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Air Force Space Command ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=air-force-space-command' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge