bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,359 @@
|
|
|
1
|
+
# TSA CRMP — Detailed Requirements and Implementation Guidance
|
|
2
|
+
|
|
3
|
+
Source: Based on publicly available TSA Security Directive summaries, Federal Register notices, and DHS/CISA publications.
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## CRMP Component 1: Cybersecurity Implementation Plan (CIP) / COIP
|
|
8
|
+
|
|
9
|
+
### Purpose
|
|
10
|
+
The CIP (or COIP under the NPRM) is the master compliance document that demonstrates how the covered entity implements and maintains all required cybersecurity measures. It must be submitted to TSA for review and approval.
|
|
11
|
+
|
|
12
|
+
### Required Sections
|
|
13
|
+
|
|
14
|
+
**Section 1: Leadership and Accountability**
|
|
15
|
+
- Identity of the Accountable Executive (named C-suite individual with authority over cybersecurity decisions and resources)
|
|
16
|
+
- Identity of the Cybersecurity Coordinator (primary) and backup designee
|
|
17
|
+
- Contact information for both (including 24/7 phone numbers)
|
|
18
|
+
- Reporting structure between coordinator and accountable executive
|
|
19
|
+
|
|
20
|
+
**Section 2: Critical Cyber System (CCS) Inventory**
|
|
21
|
+
- Complete list of systems designated as Critical Cyber Systems
|
|
22
|
+
- For each CCS: system name, type (IT/OT/ICS), function, owner, physical location, network zone
|
|
23
|
+
- Methodology used for CCS determination
|
|
24
|
+
- Process for updating the inventory when architecture changes
|
|
25
|
+
|
|
26
|
+
**Section 3: Network Architecture Overview**
|
|
27
|
+
- Current network topology diagrams (IT and OT — must be accurate and current)
|
|
28
|
+
- Description of IT/OT boundary mechanisms (firewalls, DMZs, data diodes)
|
|
29
|
+
- Remote access architecture into OT environments
|
|
30
|
+
- Third-party and vendor connectivity to CCS
|
|
31
|
+
- Identification of any legacy systems with limited segmentation capability
|
|
32
|
+
|
|
33
|
+
**Section 4: Cybersecurity Measures (Four Technical Domains)**
|
|
34
|
+
|
|
35
|
+
*Domain 1 — Network Segmentation:*
|
|
36
|
+
- Segmentation policy and how it is enforced
|
|
37
|
+
- Description of technical controls implementing the IT/OT boundary
|
|
38
|
+
- Compensating controls for systems that cannot be fully segmented
|
|
39
|
+
- Process for authorising exceptions
|
|
40
|
+
|
|
41
|
+
*Domain 2 — Access Controls:*
|
|
42
|
+
- Authentication requirements for CCS access (MFA for remote and privileged access)
|
|
43
|
+
- Account lifecycle management (provisioning, review, de-provisioning)
|
|
44
|
+
- Privileged access management approach
|
|
45
|
+
- Third-party/vendor access controls
|
|
46
|
+
|
|
47
|
+
*Domain 3 — Continuous Monitoring:*
|
|
48
|
+
- Monitoring tools and coverage (IT and OT)
|
|
49
|
+
- Log collection and retention policy
|
|
50
|
+
- Alerting thresholds and escalation procedures
|
|
51
|
+
- Integration with SOC or monitoring team
|
|
52
|
+
|
|
53
|
+
*Domain 4 — Patch Management:*
|
|
54
|
+
- Risk-based patch prioritisation methodology
|
|
55
|
+
- Patch timelines by severity (critical, high, medium, low)
|
|
56
|
+
- OT-specific patching process (vendor approval, testing, maintenance windows)
|
|
57
|
+
- Compensating controls for unpatched legacy OT systems
|
|
58
|
+
|
|
59
|
+
**Section 5: Incident Detection and Response**
|
|
60
|
+
- High-level description of how incidents are detected (monitoring, alerting, user reporting)
|
|
61
|
+
- Escalation path from detection to Cybersecurity Coordinator
|
|
62
|
+
- Reference to the Cybersecurity Incident Response Plan (separate document)
|
|
63
|
+
- CISA 24-hour reporting procedure
|
|
64
|
+
|
|
65
|
+
**Section 6: Annual Review Process**
|
|
66
|
+
- Frequency and process for reviewing and updating the CIP
|
|
67
|
+
- Triggers for out-of-cycle review (major architecture change, significant incident, new threat intelligence)
|
|
68
|
+
- Approval process for CIP updates
|
|
69
|
+
- TSA submission process for material changes
|
|
70
|
+
|
|
71
|
+
### CIP Approval Process
|
|
72
|
+
1. Covered entity submits CIP to TSA via designated secure channel
|
|
73
|
+
2. TSA reviews for completeness and alignment with directive requirements
|
|
74
|
+
3. TSA may approve, request modifications, or reject
|
|
75
|
+
4. Entity implements CIP; cannot claim TSA-approved CIP until approval is granted
|
|
76
|
+
5. Material changes to CIP require resubmission
|
|
77
|
+
|
|
78
|
+
---
|
|
79
|
+
|
|
80
|
+
## CRMP Component 2: Incident Response Plan (IRP / CIRP)
|
|
81
|
+
|
|
82
|
+
### Required IRP Elements
|
|
83
|
+
|
|
84
|
+
**1. Scope and Objectives**
|
|
85
|
+
- What systems are covered (all CCS)
|
|
86
|
+
- IRP objectives: contain, eradicate, recover, report
|
|
87
|
+
|
|
88
|
+
**2. Roles and Responsibilities**
|
|
89
|
+
- Incident Commander (typically Cybersecurity Coordinator)
|
|
90
|
+
- IT response team
|
|
91
|
+
- OT/ICS response team (may include OT vendor support)
|
|
92
|
+
- Legal and communications (for regulatory reporting)
|
|
93
|
+
- Executive escalation path
|
|
94
|
+
|
|
95
|
+
**3. Incident Classification**
|
|
96
|
+
Define severity tiers:
|
|
97
|
+
| Tier | Definition | Response Time |
|
|
98
|
+
|------|-----------|--------------|
|
|
99
|
+
| Critical | Active threat to CCS operations/safety | Immediate — all hands |
|
|
100
|
+
| High | Confirmed unauthorised access to CCS | Within 1 hour |
|
|
101
|
+
| Medium | Suspected compromise; investigation underway | Within 4 hours |
|
|
102
|
+
| Low | Indicator of compromise; no confirmed access | Within 24 hours |
|
|
103
|
+
|
|
104
|
+
**4. Detection and Initial Analysis**
|
|
105
|
+
- How anomalies are identified (monitoring alerts, user reports, third-party notification)
|
|
106
|
+
- Initial triage process: confirm vs false positive
|
|
107
|
+
- Evidence preservation from first moments
|
|
108
|
+
|
|
109
|
+
**5. Containment Procedures**
|
|
110
|
+
- IT containment: isolate affected systems from network
|
|
111
|
+
- OT containment: procedures for isolating OT from IT (IT/OT segregation under incident conditions)
|
|
112
|
+
- Manual operation fallback: how to operate OT assets if control systems are isolated
|
|
113
|
+
- Preserve operational capability while containing cyber threat
|
|
114
|
+
|
|
115
|
+
**6. Eradication and Recovery**
|
|
116
|
+
- Threat removal procedures
|
|
117
|
+
- Backup restoration: integrity verification before restoration
|
|
118
|
+
- System rebuild and hardening before reconnecting
|
|
119
|
+
- Phased return to operation
|
|
120
|
+
|
|
121
|
+
**7. CISA and TSA Notification**
|
|
122
|
+
- 24-hour CISA reporting trigger (see `tsa-incident-reporting.md`)
|
|
123
|
+
- TSA notification procedure
|
|
124
|
+
- Internal escalation to Accountable Executive
|
|
125
|
+
- Regulatory notification log (record of all notifications made)
|
|
126
|
+
|
|
127
|
+
**8. Post-Incident Review**
|
|
128
|
+
- After-action review within 30 days of incident closure
|
|
129
|
+
- Root cause analysis
|
|
130
|
+
- Lessons learned documented
|
|
131
|
+
- CIP/IRP updated based on findings
|
|
132
|
+
- Consider sharing with CISA/ISAC
|
|
133
|
+
|
|
134
|
+
### Annual IRP Testing
|
|
135
|
+
|
|
136
|
+
Covered entities must **test at least two IRP objectives annually**. Testing may be conducted via:
|
|
137
|
+
- **Tabletop exercise**: Discussion-based walkthrough of a scenario (minimum viable testing)
|
|
138
|
+
- **Functional exercise**: Partial activation of IRP with actual system interaction
|
|
139
|
+
- **Full-scale exercise**: Complete IRP activation with IT/OT teams
|
|
140
|
+
|
|
141
|
+
**Recommended test scenarios for TSA compliance**:
|
|
142
|
+
1. **IT/OT segregation drill**: Simulate IT compromise; test ability to isolate OT and continue operations manually
|
|
143
|
+
2. **Ransomware response drill**: Malware detected on IT; test containment, backup integrity check, restoration procedure
|
|
144
|
+
3. **Unauthorised access to OT**: Simulate credential compromise leading to OT access; test detection and response
|
|
145
|
+
4. **Vendor access abuse**: Simulate third-party remote access misuse; test detection and revocation
|
|
146
|
+
|
|
147
|
+
**Test documentation required**:
|
|
148
|
+
- Date and type of exercise
|
|
149
|
+
- Scenario description
|
|
150
|
+
- Participants
|
|
151
|
+
- Objectives tested
|
|
152
|
+
- Pass/fail for each objective
|
|
153
|
+
- Findings and corrective actions
|
|
154
|
+
- Corrective action closure tracking
|
|
155
|
+
|
|
156
|
+
---
|
|
157
|
+
|
|
158
|
+
## CRMP Component 3: Architecture Design Review (ADR)
|
|
159
|
+
|
|
160
|
+
### ADR Objectives
|
|
161
|
+
1. Confirm network diagrams are current, accurate, and complete
|
|
162
|
+
2. Assess effectiveness of IT/OT segmentation
|
|
163
|
+
3. Identify undocumented or unauthorised connections to CCS
|
|
164
|
+
4. Evaluate remote access security
|
|
165
|
+
5. Assess vendor/third-party connectivity risks
|
|
166
|
+
6. Produce findings and remediation plan
|
|
167
|
+
|
|
168
|
+
### ADR Process
|
|
169
|
+
|
|
170
|
+
**Step 1: Inventory and Documentation Review**
|
|
171
|
+
- Collect current network topology diagrams (IT and OT)
|
|
172
|
+
- Review CCS inventory for completeness
|
|
173
|
+
- Compare diagrams to actual architecture (passive discovery or authorised scan)
|
|
174
|
+
- Document any discrepancies
|
|
175
|
+
|
|
176
|
+
**Step 2: Segmentation Assessment**
|
|
177
|
+
For each IT/OT boundary connection:
|
|
178
|
+
- Is the connection documented and authorised?
|
|
179
|
+
- What security controls enforce the boundary (firewall, DMZ, data diode)?
|
|
180
|
+
- Are firewall rules reviewed and minimised?
|
|
181
|
+
- Is there a default-deny rule on the OT side?
|
|
182
|
+
- Are any direct connections from internet to OT environment?
|
|
183
|
+
|
|
184
|
+
**Step 3: Remote Access Review**
|
|
185
|
+
- Inventory all remote access paths into OT (VPN, RDP, vendor jump servers)
|
|
186
|
+
- Confirm MFA is enforced for all remote OT access
|
|
187
|
+
- Confirm all remote access is logged and monitored
|
|
188
|
+
- Confirm vendor access is time-limited and requires explicit approval
|
|
189
|
+
|
|
190
|
+
**Step 4: Third-Party Connectivity**
|
|
191
|
+
- Map all third-party connections to CCS (vendor remote support, SCADA hosting, cloud-based OT monitoring)
|
|
192
|
+
- Assess contractual cybersecurity obligations of third parties
|
|
193
|
+
- Confirm third parties cannot access OT without entity approval and monitoring
|
|
194
|
+
|
|
195
|
+
**Step 5: Vulnerability and Risk Identification**
|
|
196
|
+
- Identify high-risk architecture patterns:
|
|
197
|
+
- Flat networks where IT and OT share the same subnet
|
|
198
|
+
- OT devices with direct internet connectivity
|
|
199
|
+
- Obsolete OT systems with no compensating controls
|
|
200
|
+
- Shared accounts between IT and OT
|
|
201
|
+
- Unencrypted protocols on OT networks (Telnet, FTP, HTTP to HMIs)
|
|
202
|
+
|
|
203
|
+
**Step 6: Findings and Remediation Plan**
|
|
204
|
+
For each finding:
|
|
205
|
+
| Finding ID | Description | Risk Level | Recommendation | Owner | Target Date |
|
|
206
|
+
|-----------|-------------|-----------|----------------|-------|-------------|
|
|
207
|
+
| ADR-001 | PLC subnet not segmented from corporate LAN | Critical | Deploy firewall; implement DMZ | OT Manager | Q2 |
|
|
208
|
+
|
|
209
|
+
### ADR Outputs
|
|
210
|
+
- Updated and validated network topology diagrams
|
|
211
|
+
- Findings report (findings, risk ratings, recommendations)
|
|
212
|
+
- Remediation action plan with owners and target dates
|
|
213
|
+
- Sign-off by Accountable Executive
|
|
214
|
+
|
|
215
|
+
---
|
|
216
|
+
|
|
217
|
+
## CRMP Component 4: Cybersecurity Assessment Plan (CAP)
|
|
218
|
+
|
|
219
|
+
### Purpose
|
|
220
|
+
The CAP documents how the entity will assess the effectiveness of its CRMP each year. It is not the assessment itself — it is the plan for conducting assessments. Results are reported to TSA annually.
|
|
221
|
+
|
|
222
|
+
### Required CAP Elements
|
|
223
|
+
|
|
224
|
+
**1. Assessment Scope**
|
|
225
|
+
- Which CCS and CRMP components are in scope each assessment cycle
|
|
226
|
+
- Rationale for any CCS excluded from scope (with compensating coverage explanation)
|
|
227
|
+
|
|
228
|
+
**2. Assessment Methodology**
|
|
229
|
+
Define the types of assessments to be performed:
|
|
230
|
+
| Assessment Type | Description | Applicable To |
|
|
231
|
+
|----------------|-------------|---------------|
|
|
232
|
+
| Vulnerability scan | Automated scan of IT/OT assets for known CVEs | IT; limited OT (passive preferred) |
|
|
233
|
+
| Penetration testing | Authorised simulated attack to test defences | IT; OT where safe and agreed |
|
|
234
|
+
| Configuration review | Compare system configs against hardening standards | IT servers; network devices; OT where possible |
|
|
235
|
+
| Process review | Interview-based review of policies and procedures | All CRMP components |
|
|
236
|
+
| Red team exercise | Adversary simulation against CCS | Large/complex environments |
|
|
237
|
+
|
|
238
|
+
**OT assessment cautions**:
|
|
239
|
+
- Active scanning of OT networks can disrupt industrial communications — use passive monitoring tools
|
|
240
|
+
- Penetration testing in OT requires vendor coordination and operational approval
|
|
241
|
+
- Prioritise configuration review and architecture review over intrusive testing for OT
|
|
242
|
+
|
|
243
|
+
**3. Assessment Schedule**
|
|
244
|
+
Provide a 12-month schedule:
|
|
245
|
+
| Quarter | Assessment Activity | CCS in Scope |
|
|
246
|
+
|---------|-------------------|-------------|
|
|
247
|
+
| Q1 | Vulnerability scan (IT); IRP tabletop exercise | All IT CCS; IRP |
|
|
248
|
+
| Q2 | Configuration review (OT); ADR | OT CCS; architecture |
|
|
249
|
+
| Q3 | Penetration test (IT external + internal) | IT CCS |
|
|
250
|
+
| Q4 | Process review (all CRMP components); CAP results compilation | All |
|
|
251
|
+
|
|
252
|
+
**4. Responsible Parties**
|
|
253
|
+
- Internal assessment teams or third-party assessors
|
|
254
|
+
- OT assessment requires OT-qualified personnel (GICSP, GCIA, or equivalent)
|
|
255
|
+
- Independence requirements: assessors should not assess their own implementations
|
|
256
|
+
|
|
257
|
+
**5. Annual Reporting to TSA**
|
|
258
|
+
- Compile assessment findings and remediation status
|
|
259
|
+
- Submit results to TSA via designated secure channel annually
|
|
260
|
+
- Include: findings summary, risk ratings, remediation plan, open items, corrective action progress
|
|
261
|
+
|
|
262
|
+
---
|
|
263
|
+
|
|
264
|
+
## Four Technical Domains — Detailed Implementation Guidance
|
|
265
|
+
|
|
266
|
+
### Domain 1: Network Segmentation — Implementation Details
|
|
267
|
+
|
|
268
|
+
**Minimum acceptable architecture:**
|
|
269
|
+
```
|
|
270
|
+
[Internet] → [Edge Firewall] → [Corporate IT Network]
|
|
271
|
+
↓
|
|
272
|
+
[IT/OT Firewall / DMZ]
|
|
273
|
+
↓
|
|
274
|
+
[OT Network / ICS Network]
|
|
275
|
+
↓
|
|
276
|
+
[Field Devices: PLCs, RTUs, HMIs]
|
|
277
|
+
```
|
|
278
|
+
|
|
279
|
+
**Security controls for each boundary:**
|
|
280
|
+
- **Edge to IT**: Stateful firewall; DMZ for internet-facing services; IDS/IPS
|
|
281
|
+
- **IT to OT**: Dedicated firewall or data diode; default-deny; whitelist only required protocols/ports; no direct routing
|
|
282
|
+
- **OT to field**: Segmented VLANs for different process areas; restrict inter-VLAN traffic
|
|
283
|
+
|
|
284
|
+
**Data diodes / unidirectional gateways**: Preferred for highest-security OT environments. Data flows one way (OT → IT for monitoring/historian) — no return path possible. Vendors: Waterfall Security, Owl Cyber Defense, Bayshore Networks.
|
|
285
|
+
|
|
286
|
+
**Compensating controls for flat networks** (where full segmentation is not immediately feasible):
|
|
287
|
+
- Host-based firewall on all IT systems to block OT traffic
|
|
288
|
+
- Enhanced monitoring and alerting at the flat network level
|
|
289
|
+
- Documented exception with remediation timeline
|
|
290
|
+
- Enhanced access controls at OT device level
|
|
291
|
+
|
|
292
|
+
### Domain 2: Access Controls — OT-Specific Guidance
|
|
293
|
+
|
|
294
|
+
**OT account management challenges**:
|
|
295
|
+
- Many OT systems have limited account management capability (single shared admin account)
|
|
296
|
+
- Legacy HMIs may not support MFA natively
|
|
297
|
+
- Vendor accounts are often needed for maintenance but may be always-on
|
|
298
|
+
|
|
299
|
+
**Solutions for OT access control limitations**:
|
|
300
|
+
| Challenge | Solution |
|
|
301
|
+
|-----------|---------|
|
|
302
|
+
| Legacy HMI, no MFA | Deploy a jump server/bastion host with MFA in front of HMI; access HMI only via jump server |
|
|
303
|
+
| Shared OT admin account | Log all access via PAM tool; require check-out with approval for shared account use |
|
|
304
|
+
| Vendor remote access | Use vendor-specific VPN with MFA; time-limited sessions; all sessions logged; revoke after job |
|
|
305
|
+
| No LDAP/AD support in OT | Maintain local accounts on OT devices with strong passwords; rotate quarterly |
|
|
306
|
+
|
|
307
|
+
**Privileged Access Management (PAM) for OT**:
|
|
308
|
+
- Check-out workflows for privileged OT credentials
|
|
309
|
+
- Session recording for all privileged OT access
|
|
310
|
+
- Automatic expiry of vendor sessions
|
|
311
|
+
- Alert on out-of-hours privileged access
|
|
312
|
+
|
|
313
|
+
### Domain 3: Continuous Monitoring — OT-Specific Tools
|
|
314
|
+
|
|
315
|
+
**Recommended OT monitoring approaches:**
|
|
316
|
+
| Approach | Tools | Notes |
|
|
317
|
+
|---------|-------|-------|
|
|
318
|
+
| Passive network monitoring | Claroty, Dragos Platform, Nozomi Networks Guardian, Armis | No traffic injection; learn by listening |
|
|
319
|
+
| Asset discovery | Passive discovery via monitoring tools | Builds CCS inventory automatically |
|
|
320
|
+
| Anomaly detection | Dragos, Claroty, Nozomi | Alert on deviations from OT communication baselines |
|
|
321
|
+
| Log collection | Syslog from OT-capable devices; SIEM with OT parsers | Not all PLCs support syslog |
|
|
322
|
+
| Threat intelligence | Dragos WorldView, Claroty Team82, CISA ICS-CERT advisories | OT-specific threat intelligence |
|
|
323
|
+
|
|
324
|
+
**What to monitor in OT environments:**
|
|
325
|
+
- New devices appearing on OT network (unauthorised asset)
|
|
326
|
+
- New communication paths (protocol, endpoint pair)
|
|
327
|
+
- Engineering workstation connections to PLCs outside maintenance windows
|
|
328
|
+
- Remote access sessions to OT
|
|
329
|
+
- Command injection attempts (Modbus, DNP3, EtherNet/IP abnormal commands)
|
|
330
|
+
- Authentication failures on OT devices
|
|
331
|
+
|
|
332
|
+
### Domain 4: Patch Management — OT-Specific Guidance
|
|
333
|
+
|
|
334
|
+
**OT patching lifecycle:**
|
|
335
|
+
1. **Vendor notification**: Receive patch/advisory from OT vendor
|
|
336
|
+
2. **Risk assessment**: Evaluate CVE severity vs operational impact of patching
|
|
337
|
+
3. **Vendor confirmation**: Confirm patch is supported for your firmware version
|
|
338
|
+
4. **Test environment**: Test patch in lab/test environment before production
|
|
339
|
+
5. **Change approval**: Change management ticket; operations approval for downtime window
|
|
340
|
+
6. **Deployment**: Apply during planned maintenance window
|
|
341
|
+
7. **Verification**: Confirm system operation post-patch
|
|
342
|
+
8. **Documentation**: Record patch applied, date, version
|
|
343
|
+
|
|
344
|
+
**Unpatched legacy OT systems (compensating controls)**:
|
|
345
|
+
| Compensating Control | Description |
|
|
346
|
+
|--------------------|-------------|
|
|
347
|
+
| Network isolation | Further isolate the legacy system to its own VLAN; restrict to minimum required communications |
|
|
348
|
+
| Enhanced monitoring | Increase monitoring sensitivity for the legacy system |
|
|
349
|
+
| Application whitelisting | If OS supports it, whitelist only authorised executables |
|
|
350
|
+
| Removal from internet path | Ensure no internet connectivity path to the legacy device |
|
|
351
|
+
| Documentation | Document the legacy system, its risks, and compensating controls in the CIP |
|
|
352
|
+
|
|
353
|
+
**Patch prioritisation (risk-based):**
|
|
354
|
+
| CVSS Score | Severity | Target Patch Timeline |
|
|
355
|
+
|-----------|---------|----------------------|
|
|
356
|
+
| 9.0–10.0 | Critical | 30 days (or compensating controls within 7 days) |
|
|
357
|
+
| 7.0–8.9 | High | 60 days |
|
|
358
|
+
| 4.0–6.9 | Medium | 90 days |
|
|
359
|
+
| 0.1–3.9 | Low | 180 days or next planned maintenance |
|
|
@@ -0,0 +1,187 @@
|
|
|
1
|
+
# TSA Cybersecurity Security Directives — Overview and Revision History
|
|
2
|
+
|
|
3
|
+
Source: Transportation Security Administration (TSA); Federal Register; DHS publications
|
|
4
|
+
https://www.tsa.gov/sd-and-ea
|
|
5
|
+
|
|
6
|
+
Note: TSA Security Directives are classified as Sensitive Security Information (SSI). Full directive text is not publicly available. This reference is based on publicly disclosed summaries, Federal Register notices, and TSA press releases.
|
|
7
|
+
|
|
8
|
+
---
|
|
9
|
+
|
|
10
|
+
## Overview
|
|
11
|
+
|
|
12
|
+
Following the May 2021 Colonial Pipeline ransomware attack, TSA issued mandatory cybersecurity Security Directives requiring critical transportation infrastructure owners and operators to implement baseline cybersecurity measures. These directives have been updated through multiple revisions and now cover pipelines, freight rail, passenger rail, public transit, and (via NPRM) bus operators.
|
|
13
|
+
|
|
14
|
+
Directives are renewed annually and carry the force of law under 49 U.S.C. § 114. Non-compliance can result in civil penalties. Each directive identifies specific "covered entities" by name — not all operators in a sector are automatically covered.
|
|
15
|
+
|
|
16
|
+
---
|
|
17
|
+
|
|
18
|
+
## Pipeline Security Directives
|
|
19
|
+
|
|
20
|
+
### SD Pipeline-2021-01 Series — Immediate Measures
|
|
21
|
+
**Purpose**: Established minimum immediate cybersecurity requirements for pipeline operators following the Colonial Pipeline incident.
|
|
22
|
+
|
|
23
|
+
**Current revision**: Pipeline-2021-01G (effective January 2026)
|
|
24
|
+
|
|
25
|
+
| Revision | Issued | Key Changes |
|
|
26
|
+
|----------|--------|-------------|
|
|
27
|
+
| Pipeline-2021-01 | May 2021 | Initial directive: incident reporting, coordinator, practices review |
|
|
28
|
+
| Pipeline-2021-01A | July 2021 | Minor clarifications |
|
|
29
|
+
| Pipeline-2021-01B/C | 2022–2023 | Renewed with refinements |
|
|
30
|
+
| Pipeline-2021-01D | May 2024 | Extended; clarified applicability and reporting requirements |
|
|
31
|
+
| Pipeline-2021-01E | 2025 | Extended; additional clarifications |
|
|
32
|
+
| Pipeline-2021-01G | January 2026 | Current revision |
|
|
33
|
+
|
|
34
|
+
**Core requirements of SD Pipeline-2021-01 series**:
|
|
35
|
+
1. Report cybersecurity incidents to CISA within 24 hours
|
|
36
|
+
2. Designate a Cybersecurity Coordinator (24/7 availability; backup designee)
|
|
37
|
+
3. Review current cybersecurity practices and identify gaps relative to TSA/CISA guidance
|
|
38
|
+
4. Develop and implement remediation measures to address identified gaps
|
|
39
|
+
|
|
40
|
+
**Covered entities**: Owners and operators of TSA-designated critical hazardous liquid and natural gas pipelines and LNG facilities.
|
|
41
|
+
|
|
42
|
+
---
|
|
43
|
+
|
|
44
|
+
### SD Pipeline-2021-02 Series — Comprehensive CRMP
|
|
45
|
+
**Purpose**: Established comprehensive Cyber Risk Management Program requirements for pipeline operators.
|
|
46
|
+
|
|
47
|
+
**Current revision**: Pipeline-2021-02F (latest)
|
|
48
|
+
|
|
49
|
+
| Revision | Issued | Key Changes |
|
|
50
|
+
|----------|--------|-------------|
|
|
51
|
+
| Pipeline-2021-02 | July 2021 | Initial comprehensive CRMP requirements |
|
|
52
|
+
| Pipeline-2021-02A/B | 2022 | Performance-based approach introduced; replaced prescriptive controls |
|
|
53
|
+
| Pipeline-2021-02C/D | 2023 | Further refinements; feedback incorporated from operators |
|
|
54
|
+
| Pipeline-2021-02E | July 2024 | Extended; strengthened; additional clarity on OT/IT requirements |
|
|
55
|
+
| Pipeline-2021-02F | 2025/2026 | Current revision |
|
|
56
|
+
|
|
57
|
+
**Core requirements of SD Pipeline-2021-02 series**:
|
|
58
|
+
1. **Cybersecurity Implementation Plan (CIP)**: Submit to TSA for review and approval
|
|
59
|
+
2. **Cybersecurity Incident Response Plan (IRP/CIRP)**: Document + test two objectives annually
|
|
60
|
+
3. **Architecture Design Review (ADR)**: Annual review of IT/OT network architecture
|
|
61
|
+
4. **Cybersecurity Assessment Plan (CAP)**: Annual assessment + results reported to TSA
|
|
62
|
+
5. **Four technical domains**: Network segmentation, access controls, continuous monitoring, patch management
|
|
63
|
+
6. **Accountable Executive**: C-suite individual with authority for cybersecurity decisions
|
|
64
|
+
|
|
65
|
+
**Sensitive Security Information (SSI)**: The full text of SD Pipeline-2021-02 and its revisions is SSI. Covered entities receive the directive directly from TSA.
|
|
66
|
+
|
|
67
|
+
---
|
|
68
|
+
|
|
69
|
+
## Freight Rail Security Directives
|
|
70
|
+
|
|
71
|
+
### SD 1580-21-01 Series — Freight Rail Cybersecurity
|
|
72
|
+
**Purpose**: Requires freight railroad carriers and related entities to implement cybersecurity measures equivalent in scope to the pipeline directives.
|
|
73
|
+
|
|
74
|
+
**Current revision**: SD 1580-21-01E (effective January 15, 2026)
|
|
75
|
+
|
|
76
|
+
| Revision | Issued | Key Changes |
|
|
77
|
+
|----------|--------|-------------|
|
|
78
|
+
| SD 1580-21-01 | 2021 | Initial rail cybersecurity: incident reporting, coordinator |
|
|
79
|
+
| SD 1580-21-01A/B/C | 2022–2023 | CRMP requirements added; performance-based updates |
|
|
80
|
+
| SD 1580-21-01D | October 2024 | Updated; aligned with pipeline directive structure |
|
|
81
|
+
| SD 1580-21-01E | January 15, 2026 | Current revision |
|
|
82
|
+
|
|
83
|
+
**Core requirements of SD 1580-21-01 series**:
|
|
84
|
+
1. Report cybersecurity incidents to CISA within 24 hours
|
|
85
|
+
2. Designate a Cybersecurity Coordinator (24/7)
|
|
86
|
+
3. Implement CRMP including CIP, IRP (annual testing), ADR, CAP
|
|
87
|
+
4. Four technical domains: segmentation, access controls, monitoring, patching
|
|
88
|
+
5. Specific attention to ICS/SCADA systems controlling rail operations (switches, signals, dispatch)
|
|
89
|
+
|
|
90
|
+
**Covered entities**: TSA-designated freight railroad owners and operators with higher cybersecurity risk profiles. Includes Class I railroads and potentially higher-risk Class II/III operations.
|
|
91
|
+
|
|
92
|
+
---
|
|
93
|
+
|
|
94
|
+
## Public Transportation and Passenger Rail Security Directives
|
|
95
|
+
|
|
96
|
+
### SD 1582-21-01 Series — Transit and Passenger Rail Cybersecurity
|
|
97
|
+
**Purpose**: Requires public transportation agencies and passenger railroad operators to implement cybersecurity measures.
|
|
98
|
+
|
|
99
|
+
**Current revision**: SD 1582-21-01E (effective January 15, 2026)
|
|
100
|
+
|
|
101
|
+
| Revision | Issued | Key Changes |
|
|
102
|
+
|----------|--------|-------------|
|
|
103
|
+
| SD 1582-21-01 | 2021 | Initial transit cybersecurity requirements |
|
|
104
|
+
| SD 1582-21-01A/B/C | 2022–2023 | CRMP additions; performance-based approach |
|
|
105
|
+
| SD 1582-21-01D | October 2024 | Updated requirements |
|
|
106
|
+
| SD 1582-21-01E | January 15, 2026 | Current revision |
|
|
107
|
+
|
|
108
|
+
**Core requirements of SD 1582-21-01 series**: Same structure as freight rail — incident reporting, coordinator, CRMP (CIP, IRP, ADR, CAP), four technical domains.
|
|
109
|
+
|
|
110
|
+
**Covered entities**: TSA-designated public transportation agencies (metro, light rail, commuter rail, bus rapid transit) and passenger railroad operators (Amtrak and designated commuter rail agencies).
|
|
111
|
+
|
|
112
|
+
**OT focus for transit**: Automatic Train Control (ATC) systems, SCADA for traction power and ventilation, Communications-Based Train Control (CBTC), Electronic Ticketing Systems (where they interface with operational systems), CCTV/access control integration.
|
|
113
|
+
|
|
114
|
+
---
|
|
115
|
+
|
|
116
|
+
## Aviation Cybersecurity
|
|
117
|
+
|
|
118
|
+
Aviation cybersecurity directives are issued separately by TSA to airport operators and aircraft operators. These are largely SSI and address:
|
|
119
|
+
- Incident reporting to CISA within 24 hours
|
|
120
|
+
- Cybersecurity Coordinator designation
|
|
121
|
+
- Access controls for aviation systems
|
|
122
|
+
- Network segmentation between passenger and operational networks
|
|
123
|
+
- Passenger screening system security
|
|
124
|
+
|
|
125
|
+
The aviation sector also operates under FAA cybersecurity requirements for aircraft systems, which are distinct from TSA directives.
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## November 2024 NPRM — Proposed Permanent Rule
|
|
130
|
+
|
|
131
|
+
**Title**: "Enhancing Surface Transportation Cybersecurity"
|
|
132
|
+
**Published**: Federal Register, November 2024
|
|
133
|
+
**Comment period**: Closed February 5, 2025
|
|
134
|
+
|
|
135
|
+
### What the NPRM proposes:
|
|
136
|
+
The NPRM would formalise current Security Directive requirements into permanent federal regulations under 49 CFR, making them enforceable as regulation rather than directive.
|
|
137
|
+
|
|
138
|
+
**Proposed covered entities**:
|
|
139
|
+
| Sector | Coverage |
|
|
140
|
+
|--------|---------|
|
|
141
|
+
| Pipelines | Same as current directives; higher-risk designated operators |
|
|
142
|
+
| Freight railroad | Higher-risk Class I and designated Class II/III |
|
|
143
|
+
| Passenger rail/transit | Higher-risk passenger rail and transit agencies |
|
|
144
|
+
| Bus operators | Incident reporting requirements only (less prescriptive) |
|
|
145
|
+
|
|
146
|
+
**Three core proposed requirements**:
|
|
147
|
+
1. **Annual Cybersecurity Evaluation**: Enterprise-wide evaluation comparing current profile vs target profile (explicitly using NIST CSF 2.0 as the framework)
|
|
148
|
+
2. **Cybersecurity Operational Implementation Plan (COIP)**: TSA-approved plan (equivalent to current CIP) with accountable executive, CCS inventory, network architecture description, and measures for all four domains
|
|
149
|
+
3. **Cybersecurity Assessment Plan (CAP)**: Annual assessment schedule and reporting to TSA
|
|
150
|
+
|
|
151
|
+
**Framework alignment**:
|
|
152
|
+
- **NIST CSF 2.0**: Primary framework for the annual profile-based evaluation
|
|
153
|
+
- **CISA Cross-Sector Cybersecurity Performance Goals (CPGs)**: Baseline performance measures referenced in the NPRM
|
|
154
|
+
- CPGs are grouped into IT and OT goals and map closely to NIST CSF subcategories
|
|
155
|
+
|
|
156
|
+
**Status as of 2026**: Comment period closed; final rule not yet published. Current Security Directives remain in force.
|
|
157
|
+
|
|
158
|
+
---
|
|
159
|
+
|
|
160
|
+
## Relationship to Other Frameworks
|
|
161
|
+
|
|
162
|
+
| Framework | Relationship to TSA Directives |
|
|
163
|
+
|-----------|-------------------------------|
|
|
164
|
+
| **NIST CSF 2.0** | Referenced in 2024 NPRM for annual profile evaluation; GV/ID/PR/DE/RS/RC maps to TSA domains |
|
|
165
|
+
| **CISA CPGs** | Baseline goals for critical infrastructure; TSA directives align with IT and OT CPGs |
|
|
166
|
+
| **NIST SP 800-82** | Guide to ICS/OT security; informative reference for implementing TSA's OT requirements |
|
|
167
|
+
| **NERC CIP** | Electric sector parallel; some operators subject to both TSA and NERC CIP |
|
|
168
|
+
| **IEC 62443** | OT/ICS security standard; applicable for implementing TSA's Domain 1–4 requirements |
|
|
169
|
+
| **NIST SP 800-53** | Federal controls; FedRAMP-covered systems within covered entities may have dual obligations |
|
|
170
|
+
|
|
171
|
+
---
|
|
172
|
+
|
|
173
|
+
## Key Definitions
|
|
174
|
+
|
|
175
|
+
| Term | Definition |
|
|
176
|
+
|------|-----------|
|
|
177
|
+
| **Critical Cyber System (CCS)** | IT or OT system whose compromise could disrupt operations, safety, or security |
|
|
178
|
+
| **Cybersecurity Coordinator** | 24/7 designated contact person for TSA and CISA |
|
|
179
|
+
| **CIP / COIP** | Cybersecurity Implementation Plan / Cybersecurity Operational Implementation Plan |
|
|
180
|
+
| **IRP / CIRP** | (Cybersecurity) Incident Response Plan |
|
|
181
|
+
| **ADR** | Architecture Design Review — annual IT/OT network architecture assessment |
|
|
182
|
+
| **CAP** | Cybersecurity Assessment Plan — annual CRMP effectiveness assessment |
|
|
183
|
+
| **CRMP** | Cyber Risk Management Program — the collective set of CIP, IRP, ADR, CAP requirements |
|
|
184
|
+
| **SSI** | Sensitive Security Information — information protected under 49 CFR Part 1520 |
|
|
185
|
+
| **OT** | Operational Technology — hardware/software controlling physical industrial processes |
|
|
186
|
+
| **ICS** | Industrial Control System — subset of OT |
|
|
187
|
+
| **SCADA** | Supervisory Control and Data Acquisition — OT system for monitoring/controlling distributed assets |
|