NASA announced a $20 billion plan to construct a permanent lunar base on March 24, 2026. The announcement came from Jared Isaacman, the agency's administrator, and it landed alongside a Government Accountability Office report documenting a cybersecurity program that doesn't exist yet.
The GAO found in March 2025 that NASA had not fully implemented its cybersecurity risk management program across the agency's space development portfolio, which includes 36 major projects with a planned investment of roughly $80 billion over their lifecycles. The audit made 16 recommendations to NASA. Every one remains open. NASA concurred with seven, partially concurred with four, and did not concur with five.
This is the foundation under a $20 billion construction project.
Operational technology — the category of computing that monitors and controls physical hardware, from life support to power distribution — is not the same as enterprise IT. It cannot be patched the same way, patched on the same timeline, or monitored by the same tools. A server running unpatched software can be isolated until a fix is available. A habitat module on the lunar surface running unpatched control systems cannot. When SpaceX launched 49 Starlink satellites on February 3, 2022, a moderate geomagnetic storm caused atmospheric expansion that increased drag on the deployed constellation — within days, roughly 40 satellites had reentered or were predicted to reenter. There was no dramatic failure, no explosion caught on camera. The craft simply lost altitude and came back. That is what quiet-failure looks like in space OT, and it is the same mode by which a clever intrusion into lunar surface systems would proceed — slowly, invisibly, until the moment it isn't.
The policy vacuum compounds the technical one. For enterprise IT cybersecurity, the National Institute of Standards and Technology publishes a framework that federal agencies follow. For OT in terrestrial critical infrastructure, the Cybersecurity and Infrastructure Security Agency issues mandatory vulnerability advisories and maintains a catalog of known exploited vulnerabilities that creates legal obligations for federal contractors. For OT on the lunar surface, there is no equivalent. The National Space Council, which once coordinated civil space policy across agencies, is disbanded. There is no coordination body filling that role.
Isaacman's announcement came wrapped in a specific number — $20 billion over an unspecified horizon — but NASA's budget is simultaneously contracting. Artemis, the program the base is meant to extend, is behind schedule. Artemis II launched on April 1, 2026, according to NASA. The crewed lunar landing that Artemis III promises has slipped multiple times. The agency's cybersecurity posture is being asked to scale with a budget moving in the wrong direction.
The historical analogy NASA reaches for is the post-Apollo period. Apollo 13 produced a crisis. The crisis produced hearings. The hearings produced institutional change. That model works when failure is visible and attributable — when a spacecraft breaks apart on ascent or a seal fails in vacuum, there is an engineering answer and a chain of command that can act on it.
OT cybersecurity does not produce those moments. The Sony Pictures breach did not start with a press release. The Colonial Pipeline interruption did not begin with a visible failure. OT intrusions proceed through long periods of quiet access, lateral movement, and dwell time measured in months. By the time the consequence arrives, attribution is difficult and liability is unclear.
The $20 billion lunar base announced in March does not yet exist. Neither does the cybersecurity program that its operational systems require. The gap between those two facts is not a gap in the press release. It is a gap in the regulatory architecture, the procurement requirements, and the governance structure that would make fixing it mandatory rather than optional.
What NASA has done before — respond to a crisis with institutional reform — is a reasonable instinct. It is not a substitute for building the standards before the hardware flies. Right now, those two things are racing each other, and only one of them has a deadline.