TSA issues new cybersecurity requirements for airport and aircraft operators

Airplane - TSA and new cybersecurity rules

Share this content

Facebook
Twitter
LinkedIn

The US Transportation Security Administration (TSA) has issued a new cybersecurity amendment on an emergency basis to the security programs of certain TSA-regulated airport and aircraft operators.

According to the TSA, this is part of the Department of Homeland Security’s efforts to increase the cybersecurity resilience of US critical infrastructure and follows extensive collaboration with aviation partners. 

“Protecting our nation’s transportation system is our highest priority and TSA will continue to work closely with industry stakeholders across all transportation modes to reduce cybersecurity risks and improve cyber resilience to support safe, secure and efficient travel,” said TSA Administrator David Pekoske. “This amendment to the aviation security programs extends similar performance-based requirements that currently apply to other transportation system critical infrastructure.”

The TSA says it is taking this emergency action because of persistent cybersecurity threats against US critical infrastructure, including the aviation sector. The new emergency amendment requires that impacted TSA-regulated entities develop an approved implementation plan that describes measures they are taking to improve their cybersecurity resilience and prevent disruption and degradation to their infrastructure. They must also proactively assess the effectiveness of these measures, which include the following actions:

  1. Develop network segmentation policies and controls to ensure that operational technology systems can continue to safely operate in the event that an information technology system has been compromised and vice versa
  2. Create access control measures to secure and prevent unauthorized access to critical cyber systems
  3. Implement continuous monitoring and detection policies and procedures to defend against, detect and respond to cybersecurity threats and anomalies that affect critical cyber system operations
  4. Reduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on critical cyber systems in a timely manner using a risk-based methodology
Newsletter
Receive the latest breaking news straight to your inbox