TSA Updates Cybersecurity Requirements for Pipeline Owners, Operators
(P&GJ) — The Transportation Security Administration (TSA) announced an update to its Security Directive regarding oil and natural gas pipeline cybersecurity. This revised directive will continue the effort to reinforce cybersecurity preparedness and resilience for the nation's critical pipelines.
Developed with input from industry stakeholders and federal partners, including the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Transportation, the reissued security directive for critical pipeline companies follows the initial directive announced in July 2021 and renewed in July 2022. The directive includes updates that seek to strengthen the industry's defenses against cyberattacks.
"Earlier versions required the development of processes and cybersecurity implementation plans. This version requires that operators test and evaluate those plans,” TSA Administrator David Pekoske said.
Following a May 2021 ransomware attack that disrupted the supply chain, TSA issued security directives mandating that critical pipeline owners and operators implement urgently needed cybersecurity measures in light of the significant cyber threat facing the industry.
Since that attack, the threat continues to evolve and intensify. With these revisions to the security directives, TSA continues to take steps to reduce risks to pipeline infrastructure through collaboration with the agency's public and private sector partners.
This security directive requires that TSA-specified owners and operators of pipeline systems take necessary action to prevent the disruption and degradation to their infrastructure. Updates to the security directive require oil and natural gas pipeline owners/operators to:
- Annually submit an updated Cybersecurity Assessment Plan to TSA for review and approval.
- Annually report the results from previous year assessments, with a schedule for assessing and auditing specific cybersecurity measures for effectiveness. TSA requires 100% of an owner/ operator's security measures to be assessed every three years.
- Test at least two Cybersecurity Incident Response Plan (CIRP) objectives and include individuals serving in positions identified in the CIRP in their required annual exercises.
Remaining in place are previously established requirements to report significant cybersecurity incidents to CISA, identify a cybersecurity point of contact, and conduct a cybersecurity vulnerability assessment (Security Directive Pipeline 2021-01C).
Related News
Related News
- Trump Aims to Revive 1,200-Mile Keystone XL Pipeline Despite Major Challenges
- Valero Considers All Options, Including Sale, for California Refineries Amid Regulatory Pressure
- ConocoPhillips Eyes Sale of $1 Billion Permian Assets Amid Marathon Acquisition
- ONEOK Agrees to Sell Interstate Gas Pipelines to DT Midstream for $1.2 Billion
- Energy Transfer Reaches FID on $2.7 Billion, 2.2 Bcf/d Permian Pipeline
- U.S. LNG Export Growth Faces Uncertainty as Trump’s Tariff Proposal Looms, Analysts Say
- Tullow Oil on Track to Deliver $600 Million Free Cash Flow Over Next 2 Years
- Energy Transfer Reaches FID on $2.7 Billion, 2.2 Bcf/d Permian Pipeline
- GOP Lawmakers Slam New York for Blocking $500 Million Pipeline Project
- Texas Oil Company Challenges $250 Million Insurance Collateral Demand for Pipeline, Offshore Operations
Comments