Pipeline SCADA Cybersecurity: A Step-by-Step Guide to TSA Security Directive Compliance
Practical implementation guidance for meeting TSA pipeline cybersecurity requirements.
Roy Castillo
December 2025
7 min read
TSA Security Directives for pipeline operators have moved from advisory to mandatory, with significant penalties for non-compliance. This guide provides a practical, step-by-step approach to achieving and maintaining compliance while building genuine security capabilities.
Understanding the TSA Security Directives
TSA's Security Directives for pipeline operators (SD Pipeline-2021-01 and 02) require owner/operators of hazardous liquid and natural gas pipelines to implement specific cybersecurity measures. The directives cover network segmentation, access control, monitoring and detection, incident response planning, and cybersecurity assessment.
The directives apply to critical pipeline systems designated by TSA, including SCADA systems, industrial control systems, and supporting IT infrastructure. Non-compliance can result in penalties up to $100,000 per day.
Step 1: Asset Identification and Categorization
Begin with a comprehensive inventory of all OT assets, including SCADA servers, RTUs, PLCs, HMIs, historians, and network infrastructure. Categorize each asset by criticality level and document network connections, firmware versions, and access methods.
This inventory forms the foundation for all subsequent security controls. Most operators discover 20-30% more connected assets than they expected during this process — unknown assets represent unknown risk.
Step 2: Network Segmentation and Access Control
Implement network segmentation to separate OT networks from IT networks and further segment within the OT environment by criticality level. Deploy multi-factor authentication for all access to critical OT systems, especially remote access.
Document all allowed network flows and implement deny-by-default firewall policies. Remote access should traverse a hardened jump server with session recording and time-limited access tokens.
"Proper network segmentation is the single most effective security control for OT environments — it limits lateral movement and contains incidents."
Step 3: Monitoring, Detection, and Response
Deploy OT-aware network monitoring that understands SCADA protocols (DNP3, Modbus, IEC 61850). Establish baseline traffic patterns and alert on deviations. Integrate OT alerts with your security operations center.
Develop incident response plans specific to OT environments, including procedures for isolating compromised systems without disrupting critical operations. Conduct tabletop exercises quarterly and full-scale exercises annually.
Ready to implement these strategies?
Our team can help you assess your current capabilities and build a roadmap tailored to your operations.
Request a ConsultationRelated Articles
OT Cybersecurity Framework for Energy Infrastructure: Beyond TSA Compliance
SCADA to ETRM Data Pipeline: Best Practices for Operational Technology Integration