News

TSA issues urgent requirements for critical pipeline owners, operators to launch cybersecurity efforts

Pushing back against the string of cybersecurity threats instigated this year, the U.S. Transportation Security Administration (TSA) issued a new Security Directive this week that requires owners and operators of critical pipelines to roll out urgent cyber protections.

“I’m pleased to see today’s steps, including mandatory standards, by @TSA to protect the safety of our nation’s critical energy infrastructure,” Rich Glick, chairman of the Federal Energy Regulatory Commission, tweeted after the requirements were announced.

The demand will apply to any hazardous liquid or natural gas transporting pipelines the TSA has deemed critical. It is TSA’s second directive this year, building on one from May that required pipeline owners and operators to report confirmed and potential cybersecurity incidents to the Cybersecurity and Infrastructure Security Agency (CISA), designate a Cybersecurity Coordinator, review current practices and identify gaps and measures to patch cyber-related risks.

“The lives and livelihoods of the American people depend on our collective ability to protect our Nation’s critical infrastructure from evolving threats,” Secretary of Homeland Security Alejandro Mayorkas said. “Through this Security Directive, DHS can better ensure the pipeline sector takes the steps necessary to safeguard their operations from rising cyber threats and better protect our national and economic security. Public-private partnerships are critical to the security of every community across our country, and DHS will continue working closely with our private sector partners to support their operations and increase their cybersecurity resilience.”

CISA, as a fellow part of the Department of Homeland Security, advised TSA on cybersecurity threats to the pipeline industry and technical countermeasures needed to prevent such threats for the creation of this directive. Owners and operators of affected pipelines will need to apply specific mitigation measures for their protection, develop and deploy cybersecurity contingency and recovery plans, and undertake cybersecurity architecture design reviews.

Chris Galford

Recent Posts

San Diego municipal power ballot initiative needs signatures following city council rejection

The San Diego City Council on Thursday rejected a proposal to directly add a question to the ballot on whether…

14 hours ago

Avangrid receives last shipment of panels needed to finish Texas solar project

The True North solar project in Falls County, Texas crossed one of its last major hurdles to construction this week,…

1 day ago

General Services Administration, El Paso Electric to develop carbon pollution-free means of electricity for federal facilities

As a result of a new agreement between the U.S. General Services Administration (GSA) and El Paso Electric (EPE), carbon…

1 day ago

Clean energy companies urge Congress to pass siting, permitting and transmission reform

On Wednesday, nearly 200 solar and storage companies urged Congressional leaders to improve permitting, project siting, transmission, and public lands…

1 day ago

Umbriel Solar facility becomes Entergy Texas’ first solar resource

In a bid to meet sustainability goals, Entergy Texas recently announced the addition of its first solar resource: the 150…

1 day ago

Report: Global wind industry installed record 117 GW of new capacity in 2023

Despite a cited need for policy actions and turbulent macroeconomic developments, the Global Wind Energy Council’s (GWEC) recent Global Wind…

2 days ago

This website uses cookies.