Caliche Energy Solutions
Cybersecurity

Pipeline SCADA Cybersecurity: A Step-by-Step Guide to TSA Security Directive Compliance

Practical implementation guidance for meeting TSA pipeline cybersecurity requirements.

Roy Castillo Roy Castillo December 2025 7 min read

TSA Security Directives for pipeline operators have moved from advisory to mandatory, with significant penalties for non-compliance. This guide provides a practical, step-by-step approach to achieving and maintaining compliance while building genuine security capabilities.

Understanding the TSA Security Directives

TSA's Security Directives for pipeline operators (SD Pipeline-2021-01 and 02) require owner/operators of hazardous liquid and natural gas pipelines to implement specific cybersecurity measures. The directives cover network segmentation, access control, monitoring and detection, incident response planning, and cybersecurity assessment.

The directives apply to critical pipeline systems designated by TSA, including SCADA systems, industrial control systems, and supporting IT infrastructure. Non-compliance can result in penalties up to $100,000 per day.

Step 1: Asset Identification and Categorization

Begin with a comprehensive inventory of all OT assets, including SCADA servers, RTUs, PLCs, HMIs, historians, and network infrastructure. Categorize each asset by criticality level and document network connections, firmware versions, and access methods.

This inventory forms the foundation for all subsequent security controls. Most operators discover 20-30% more connected assets than they expected during this process — unknown assets represent unknown risk.

Step 2: Network Segmentation and Access Control

Implement network segmentation to separate OT networks from IT networks and further segment within the OT environment by criticality level. Deploy multi-factor authentication for all access to critical OT systems, especially remote access.

Document all allowed network flows and implement deny-by-default firewall policies. Remote access should traverse a hardened jump server with session recording and time-limited access tokens.

"Proper network segmentation is the single most effective security control for OT environments — it limits lateral movement and contains incidents."

Step 3: Monitoring, Detection, and Response

Deploy OT-aware network monitoring that understands SCADA protocols (DNP3, Modbus, IEC 61850). Establish baseline traffic patterns and alert on deviations. Integrate OT alerts with your security operations center.

Develop incident response plans specific to OT environments, including procedures for isolating compromised systems without disrupting critical operations. Conduct tabletop exercises quarterly and full-scale exercises annually.

Share this article:

Ready to implement these strategies?

Our team can help you assess your current capabilities and build a roadmap tailored to your operations.

Request a Consultation