New TSA security directive is a needed shock to the system
The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the Department to better identify, protect against, and respond to threats to critical companies in the pipeline sector.
“The cybersecurity landscape is constantly evolving and we must adapt to address new and emerging threats,” said Secretary of Homeland Security Alejandro N. Mayorkas. “The recent ransomware attack on a major petroleum pipeline demonstrates that the cybersecurity of pipeline systems is critical to our homeland security. DHS will continue to work closely with our private sector partners to support their operations and increase the resilience of our nation’s critical infrastructure.”
The Security Directive will require critical pipeline owners and operators to report confirmed and potential cybersecurity incidents to the DHS Cybersecurity and Infrastructure Security Agency (CISA) and to designate a Cybersecurity Coordinator, to be available 24 hours a day, seven days a week.
It will also require critical pipeline owners and operators to review their current practices as well as to identify any gaps and related remediation measures to address cyber-related risks and report the results to TSA and CISA within 30 days.
TSA is also considering follow-on mandatory measures that will further support the pipeline industry in enhancing its cybersecurity and that strengthen the public-private partnership so critical to the cybersecurity of our homeland.
“This directive is a greatly needed shock to the system for a historically voluntary approach to cyber resiliency. Pipeline companies have been able to opt out of implementing cybersecurity controls for way too long, creating intolerable risk levels to our nation’s safety. While taking the mandatory steps to fulfill these new requirements may be painful at first, the time-bound implementation will drive urgency and needed action. While the initial response will drive compliance, over time the directive will also enhance governance, cyber safety and resiliency,” said Grant Geyer, Chief Product Officer, Claroty.
“The directive also takes the right approach in terms of drawing a line in the sand on the outcomes that pipeline owners and operators need to achieve, while giving them tremendous latitude in terms of how they choose to implement various technical controls and safeguards in order to achieve those outcomes. Over time, pipeline companies will equip themselves to make better decisions around cyber policies, awareness, training, skill development, and the many other aspects that go into a holistic cybersecurity program.”
“Industry-wide compliance is not something that can happen overnight and this may be an arduous process for some organizations, depending on the current state of their cybersecurity posture. The important thing is that organizations get started, no matter where they are on their cybersecurity journey now. The requirements laid out in this directive will drive better transparency, accountability, and ultimately resiliency of the nation’s pipeline infrastructure,” Geyer concluded.
Since 2001, TSA has worked closely with pipeline owners and operators as well as its partners across the federal government to enhance the physical security preparedness of U.S. hazardous liquid and natural gas pipeline systems. As the nation’s lead agency for protecting critical infrastructure against cybersecurity threats, CISA provides cybersecurity resources to mitigate potential risks, including through a dedicated hub that disseminates information to organizations, communities, and individuals about how to better protect against ransomware attacks.
This new TSA Security Directive also highlights the critical role that CISA plays as the country’s national cyber defense center. Last December, Congress, through the National Defense Authorization Act, empowered CISA to execute its mission to secure federal civilian government networks and our nation’s critical infrastructure from physical and cyber threats.