In response to the ongoing cybersecurity threat to pipeline systems, DHS’s Transportation Security Administration (TSA) has announced to pipeline owners and operators that the transportation of hazardous liquids and natural gas needs to implement a number of urgently needed protections against cyber intrusions.
The Department’s Cybersecurity and Infrastructure Security Agency (CISA) advised TSA on cybersecurity threats to the pipeline industry, as well as technical countermeasures to prevent those threats, during the development of this second Security Directive.
This Security Directive requires owners and operators of TSA-designated critical pipelines to implement specific mitigation measures to protect against ransomware attacks and other known threats to information technology and operational technology systems, develop and implement a cybersecurity contingency and recovery plan, and conduct a cybersecurity architecture design review.
This is the second Security Directive that TSA has issued to the pipeline sector this year, building upon an initial Security Directive that TSA issued in May 2021 following the ransomware attack on a major petroleum pipeline.
“The lives and livelihoods of the American people depend on our collective ability to protect our Nation’s critical infrastructure from evolving threats,” said Secretary of Homeland Security Alejandro N. Mayorkas. “Through this Security Directive, DHS can better ensure the pipeline sector takes the steps necessary to safeguard their operations from rising cyber threats, and better protect our national and economic security.
“Public-private partnerships are critical to the security of every community across our country and DHS will continue working closely with our private sector partners to support their operations and increase their cybersecurity resilience.”
The May 2021 Security Directive requires critical pipeline owners and operators to:
(1) report confirmed and potential cybersecurity incidents to CISA;
(2) designate a Cybersecurity Coordinator to be available 24 hours a day, seven days a week;
(3) review current practices;
(4) identify any gaps and related remediation measures to address cyber-related risks and report the results to TSA and CISA within 30 days.