by Leelin Thye

Cybersecurity touches nearly every aspect of personal and commercial life today — and rightly so, as the risk of business loss and personal identity theft continues to skyrocket. The TSA has embraced this urgency with its 2022 and 2023 cybersecurity mandates, which build upon one another. Here’s what they cover.
In 2022, the TSA required passenger and freight railroad carriers to:
This was an excellent high-level start, but the mandates didn’t address specific controls like network segmentation, monitoring, or patching. That changed with the 2023 amendment.
In 2023, the TSA augmented its earlier mandates with additional requirements designed to enhance resilience and prevent infrastructure disruption:
Develop network segmentation policies and controls. Don’t put all your IT eggs in one basket. Segregating network resources — through techniques such as micro-segmentation — helps ensure that even if one segment is compromised, the rest remains protected.
Create access control measures. Adopting a least-privilege posture reduces the likelihood of compromise from authorized access. A Zero Trust approach, where all access is validated and no one is inherently trusted, is the best mindset. This can be achieved through well-configured remote access systems and role-based access controls (RBAC), whether centralized or decentralized.
Implement continuous monitoring and detection policies and procedures. According to the TSA, this step will help “defend against, detect, and respond to cybersecurity threats and anomalies that affect critical cyber system operations.” Proactive solutions such as Intrusion Detection/Prevention Systems (IDPS), comprehensive system logging, application control, Security Information and Event Management (SIEM), and Managed Security Services are key to success here.
Reduce the risk of exploitation of unpatched systems. Security patches and updates for operating systems, applications, drivers, and firmware on critical cyber systems should be tested and applied as soon as feasible, based on infrastructure and corporate priorities. Vulnerability assessments can help establish that order. When formal patches aren’t yet available, virtual patching can reduce the risk of compromise by using firewall or IDPS rules to detect and block malicious behavior until updates are released.
Whether it involves micro-segmentation, access controls, continuous monitoring or patching (including virtual patching), SonicWall can help meet each of these additional TSA cybersecurity requirements.
TSA Cybersecurity Mandate | Applicable SonicWall Solutions |
|
|
| Develop network segmentation policies and controls | SonicWall Next-Generation Firewalls (NGFW) can easily enable network segmentation via security zones or interfaces (physical or virtual). Each segmentation can be isolated and protected through security and routing policies. Additionally, our switches can provide enhanced network segmentation, allowing for local or cloud-based management. |
|
|
| Create access control measures | All of our network security solutions provide least-privilege and RBAC to reduce the risk of unauthorized access. Zero Trust solutions, such as our Cloud Secure Edge (CSE) and Secure Mobile Access (SMA) enterprise-class remote access solutions, provide granular access to network resources based on various contexts, including role, device, time of day and location. |
|
|
| Implement continuous monitoring and detection policies and procedures | SonicWall’s IDS/IPS monitors for and blocks known threats. Additional monitoring and detection capabilities are provided through Deep Packet Inspection (DPI) and our Real-Time Threat Intelligence via SonicWall Capture Labs. SonicWall’s Network Security Manager (NSM) enables traffic analysis and reporting capabilities across security devices. Finally, Syslog/SIEM support integrates seamlessly with various tools for centralized logging and alerting. |
|
|
| Reduce the risk of exploitation of unpatched systems | SonicWall delivers automated firmware updates and alerts for vulnerabilities. NSM takes this a step further by providing a centralized dashboard to manage configurations, updates, and policy enforcement across distributed sites. The risk of exploiting unpatched infrastructure systems can be further reduced through Virtual patching capabilities, provided by SonicWall’s IPS and firewall policy engines, which can block threats even before official patches are applied. |
The TSA’s mandates address critical cybersecurity needs by requiring the implementation of cybersecurity plans, developing network segmentation policies and controls, and enforcing access control measures. They also emphasize continuous monitoring and detection, along with reducing the risk of exploitation of unpatched systems — including through virtual patching where appropriate.
SonicWall offers solutions to help organizations meet these requirements, from segmentation and access control to advanced threat detection and secure remote access.
New Cybersecurity Requirements for Airport and Aircraft Operators — TSA, March 2023
Cybersecurity Requirements for Passenger and Freight Railroad Carriers — TSA, October 2022
Share This Article

An Article By
An Article By
Leelin Thye
Senior Manager, Product Marketing
Leelin Thye
Senior Manager, Product Marketing