08 Nov 2022 | IN-6743
Related Insights
NIS2 Regulation Comes into Force: EU Cybersecurity Market set for Growth
Insight | 1Q 2023 | IN-6809
EU To Adopt New Cybersecurity Regulations
Insight | 2Q 2022 | IN-6498
Competitive & Market Intelligence
Sharpen positioning, deliver actionable insights, and support key stakeholders.
Executive & C-Suite
Drive organizational success, capture growth, and mitigate risks with rapid access to strategic intelligence.
Marketing
Boost engagement, repurpose compelling content, and generate qualified leads with research-driven thought leadership.
Product Strategy
Accelerate product success, secure executive buy-in, gain third-party endorsement, and strengthen positioning.
Startup Leader & Founder
Validate markets, secure funding, raise awareness, and scale confidently.
Users & Implementers
Maximize ROI, streamline adoption, find the best partners, and optimize outcomes with expert guidance.
Hyperscalers
Adapt quickly, stay competitive, and meet customer demands amid AI disruption and shifting geopolitical challenges.
Industrial & Manufacturing
Accelerate digital transformation, secure operations, and turn competitive advantages into measurable revenue.
Industry & Trade Organizations
Boost membership, unify stakeholders, accelerate standards, and strengthen influence to deliver member value.
Semiconductor
Secure operations, advance digital transformation, and maintain market leadership with confidence and clarity.
Supply Chain
Build resilience, reduce risks, and streamline operations while driving digital transformation success.
Telco & Communications
Monetize 5G, capture enterprise opportunities, and accelerate cloud-native transformation for sustainable growth.
All News & Resources
Log In to unlock this content.
This content falls outside of your subscription, but you may view up to five pieces of premium content outside of your subscription each month
You have x unlocks remaining.
Directive Raises the Bar on Cybersecurity in the Sector |
NEWS |
The U.S. Transportation Security Administration (TSA) issued the Rail Cybersecurity Mitigation Actions and Testing directive in October, mandating Class I freight carriers, rail transporters of security-sensitive materials in high-threat urban areas, and railroads that host them to take certain cybersecurity actions to enhance cyber resilience. The directive emphasizes that the “ongoing cybersecurity threat to transportation systems and associated infrastructure” prompted the order.
Based on the directive, carriers need to:
The directive comes on the heels of a recent incident when a cyberattack stopped trains in Denmark last week. All trains operated by the country’s largest operator, DSB, were canceled for hours. The attack was not on OT systems, but on a third-party IT service provider, leading to a server shutdown. This led to a piece of software used by train drivers to cease working.
Reporting Mandates, Exposure of Attacks, and Increasing Costs |
IMPACT |
The new directive further builds on the December 31, 2021 Security Directive 1580-21-01, “Enhancing Rail Cybersecurity,” adding new freight and passenger carriers that the TSA determined were at high risk of attacks. The new directive is an indicator of the federal government exacting granular policies on critical industries it deems at risk of cyberattacks. All the requirements mentioned in the new directive should be included in carriers’ cybersecurity plans and must be submitted to the TSA by February 21, 2023. This means stakeholders will need to brief employees responsible for implementing both the plan and the security directive. The mandate to report breaches to the TSA, coupled with an annual report of cybersecurity vulnerability assessments, mean security teams will now have more requirements to meet, putting IT and OT security personnel under more strain with more obligations. Owners or rail operators should increase cybersecurity budgets or face fatigued security and IT personnel. Companies that lack a Chief Information Security Officer (CISO) could face challenges implementing cybersecurity plans, as they will have to rely on other departments of their organization, such as IT and executive leadership, to compensate. While the directive does not cite any penalties for non-compliance, companies that do not meet the requirements could face litigation costs or brand damage. The cyberattack reporting mandate of the directive means security breaches will be exposed and could lead to reputational risk for operators and cybersecurity vendors.
Identification of Threats, OT/IT Separation |
RECOMMENDATIONS |
Carriers need to design strategies to separate OT and IT systems when one is compromised. Internet networks used by passengers should be air-gapped and separated from train and railway networks. Operators should particularly focus on monitoring and detection strategies at the OT level. OT traffic is the weak link in the industry because the usual IT solutions cannot adequately capture incoming data from OT components. Sharing relevant cyber data between industry players is an important strategy that can allow players throughout the industry to communicate insights and learn mitigation strategies from others.
As the rail industry increasingly embraces wireless and digital solutions, the threat surface of attacks will expand to include signaling systems, train controls, and station infrastructure. The long lifecycle of equipment in the industry, increased connectivity with digital systems, and the diversity of the supply chain in rail systems mean cybercriminals will find the sector an easier target to infiltrate compared to less connected and less diverse industries. The sector’s historical symbolism for activism and labor strikes mean hacktivists could target rail infrastructure to amplify social grievances as well.
Insight | 1Q 2023 | IN-6809
Insight | 2Q 2022 | IN-6498