TSA Updates Cybersecurity Requirements for Pipeline Owners, Operators
(P&GJ) — The Transportation Security Administration (TSA) announced an update to its Security Directive regarding oil and natural gas pipeline cybersecurity. This revised directive will continue the effort to reinforce cybersecurity preparedness and resilience for the nation's critical pipelines.
Developed with input from industry stakeholders and federal partners, including the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Transportation, the reissued security directive for critical pipeline companies follows the initial directive announced in July 2021 and renewed in July 2022. The directive includes updates that seek to strengthen the industry's defenses against cyberattacks.
"Earlier versions required the development of processes and cybersecurity implementation plans. This version requires that operators test and evaluate those plans,” TSA Administrator David Pekoske said.
Following a May 2021 ransomware attack that disrupted the supply chain, TSA issued security directives mandating that critical pipeline owners and operators implement urgently needed cybersecurity measures in light of the significant cyber threat facing the industry.
Since that attack, the threat continues to evolve and intensify. With these revisions to the security directives, TSA continues to take steps to reduce risks to pipeline infrastructure through collaboration with the agency's public and private sector partners.
This security directive requires that TSA-specified owners and operators of pipeline systems take necessary action to prevent the disruption and degradation to their infrastructure. Updates to the security directive require oil and natural gas pipeline owners/operators to:
- Annually submit an updated Cybersecurity Assessment Plan to TSA for review and approval.
- Annually report the results from previous year assessments, with a schedule for assessing and auditing specific cybersecurity measures for effectiveness. TSA requires 100% of an owner/ operator's security measures to be assessed every three years.
- Test at least two Cybersecurity Incident Response Plan (CIRP) objectives and include individuals serving in positions identified in the CIRP in their required annual exercises.
Remaining in place are previously established requirements to report significant cybersecurity incidents to CISA, identify a cybersecurity point of contact, and conduct a cybersecurity vulnerability assessment (Security Directive Pipeline 2021-01C).
Related News
Related News
![](/media/2035/pgj-enews-graphic-300x1404.jpg)
- Mexican President: Billionaire Slim Interested in Pemex Natural Gas Project
- Freeport LNG Sues Three Contractors Over Defects at Texas Plant
- Energy Transfer Adds 6,000 Miles of Pipeline with $3.25 Billion WTG Midstream Acquisition
- FERC Approves Transco's Texas to Louisiana Gas Pipeline Project
- Williams Says Court Rules in Its Favor in Pipeline Dispute with Energy Transfer
- U.S. to Buy 4.5 Million Barrels of Oil to Replenish Strategic Petroleum Reserve
- Kurdish Oil Smuggling to Iran Flourishes
- U.S. Court Overturns Alaska Oil Lease Sale, Halting Energy Development
- Second Gas Pipeline Rupture in Texas’ Reeves County Raises Environmental Concerns
- Williams Begins Louisiana Pipeline Construction Despite Ongoing Legal Dispute with Energy Transfer
Comments