How do the Guidelines address cybersecurity? These are not all made publicly available, and we therefore do not speak to them in this article.
#Remote access to a user’s pc can be implemented with a how to
We'll tackle how to handle this balance here too.īear in mind that TSA has issued two security directive addendums in addition to the Pipeline Security Guidelines. It's important to balance the need for remote access with security requirements such as access requests, authentication, logging, and segmentation/session isolation. Remote access can be a valuable tool to troubleshoot operational problems and address issues quickly. This post describes best practices for implementing secure remote access, including how to meet the five requirements in order to allow remote access control within the framework set forth by the Transportation Security Administration. Included in the Guidelines are new mandatory conditions governing how remote access to critical infrastructure is permitted. The Guidelines address malicious cyber activity targeting natural gas and oil pipelines by working to mitigate risk associated with operational technology systems through the adoption of baseline and enhanced standards within the industry. These mandate new security requirements for pipeline owners including rules governing cybersecurity around operational technology (OT).
Responding to cyberattacks against Colonial Pipeline and other critical infrastructure, the Transportation Security Administration (TSA) announced the Pipeline Security Guidelines in 2021 ( Guidelines) and two security directive additions.