Caliche Energy Solutions
Cybersecurity

OT Cybersecurity Framework for Energy Infrastructure: Beyond TSA Compliance

Building a defense-in-depth strategy that exceeds regulatory requirements and protects critical operations.

Roy Castillo Roy Castillo January 2026 8 min read

TSA Security Directives have raised the baseline for pipeline cybersecurity, but compliance alone doesn't equal security. This article presents a comprehensive OT cybersecurity framework that builds on regulatory requirements to provide genuine defense-in-depth for energy infrastructure.

The Evolving OT Threat Landscape

The energy sector has become the most targeted critical infrastructure vertical for cyberattacks. Nation-state actors, ransomware groups, and hacktivists have all demonstrated capability and willingness to target OT systems. The consequences of a successful attack range from operational disruption to environmental catastrophe.

Legacy OT systems designed for isolated operation are now connected to IT networks, cloud services, and remote access points — each connection creating potential attack vectors. The attack surface is expanding faster than most organizations can secure it.

TSA Directives: Baseline, Not Ceiling

The TSA Security Directives (SD-01, SD-02) establish minimum cybersecurity requirements for pipeline operators: network segmentation, access control, monitoring, incident response planning, and cybersecurity assessment. These are necessary but insufficient for comprehensive protection.

Organizations should treat TSA requirements as the foundation and build additional layers: advanced threat detection, behavioral analytics, OT-specific endpoint protection, and regular adversary simulation exercises.

"67% of successful OT attacks exploit vulnerabilities not covered by regulatory compliance frameworks — defense-in-depth is essential."

A Practical OT Security Architecture

Our recommended architecture follows the Purdue Model with enhanced segmentation: Level 0-1 (physical process and control) isolated by data diodes, Level 2-3 (supervisory and operations) protected by industrial firewalls and IDS, Level 3.5 (DMZ) providing secure data exchange with IT systems.

Critical additions beyond the basic model include OT-specific threat detection using protocol-aware analytics, encrypted and authenticated communication between control system components, and automated backup and recovery for critical control system configurations.

Building an OT Security Operations Capability

Effective OT security requires dedicated monitoring and response capabilities. This doesn't necessarily mean a full OT SOC — it can be a hybrid model where IT security teams are trained on OT protocols and operations staff are trained on security awareness.

Key capabilities include: 24/7 monitoring of OT network traffic, automated alerting on anomalous control system behavior, incident response playbooks specific to OT scenarios, and regular tabletop exercises simulating OT attack scenarios.

Share this article:

Ready to implement these strategies?

Our team can help you assess your current capabilities and build a roadmap tailored to your operations.

Request a Consultation