Government and Defense – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Tue, 09 Sep 2025 08:19:56 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png Government and Defense – Waterfall Security Solutions https://waterfall-security.com 32 32 TSA NOPR for Pipelines, Rail & Bussing – Enhancing Surface Cyber Risk Management https://waterfall-security.com/ot-insights-center/transportation/tsa-nopr-for-pipelines-rail-bussing-enhancing-surface-cyber-risk-management/ Tue, 26 Nov 2024 13:07:01 +0000 https://waterfall-security.com/?p=28561 The TSA Notice of Proposed Rulemaking for Enhancing Surface Cyber Risk Management is out. This is the long-awaited regulation that replaces the temporary security directives issued after the Colonial Pipeline incident.

The post TSA NOPR for Pipelines, Rail & Bussing – Enhancing Surface Cyber Risk Management appeared first on Waterfall Security Solutions.

]]>

TSA NOPR for Pipelines, Rail & Bussing – Enhancing Surface Cyber Risk Management

The TSA Notice of Proposed Rulemaking for Enhancing Surface Cyber Risk Management is out. This is the long-awaited regulation that replaces the temporary security directives issued after the Colonial Pipeline incident.
Picture of Andrew Ginter

Andrew Ginter

TSA NOPR for Pipelines Rail Bussing – Enhancing Surface Cyber Risk Management

“This…replaces the temporary security directives issued after the Colonial Pipeline incident…[which] had to be re-issued annually. The new regulation will be permanent – at least until it’s changed or revoked.

Oil PipelineThe TSA Notice of Proposed Rulemaking for Enhancing Surface Cyber Risk Management is out. This is the long-awaited regulation that replaces the temporary security directives issued after the Colonial Pipeline incident. Those directives had to be re-issued annually. The new regulation will be permanent – at least until it’s changed or revoked.

So I’m trying to read through the proposed rule, and the document is daunting – 105 pages of technical language intermixed with very legal language, riddled with cross-references, only some of which I understand. That said, at a high level, the new rule, if passed as-is, looks to apply to some:

  • 73 of 620 freight railroads in the USA,

  • 34 of 92 public transportation & passenger railroads,

  • 115 of 2,105 of the nation’s pipelines, and

  • 71 bus owner/operators,


though the bussing rules seem focused on incident reporting rather than full-blown cybersecurity programs.

Some of the most confusing legal language seems focused on rationalizing how the TSA issues security directives, since before this it seems there were different procedures for security directives applicable to different forms of transportation. Another bunch of confusing language seems to be rationalizing physical security requirements and separating them from cybersecurity requirements. And then it gets a little bit more readable:

  • 49 CFR Part 1580 – Freight Rail Transportation Security – starts on pp 71

  • 49 CFR Part 1582 – Public Transportation and Passenger Rail Security – starts on pp 82

  • 49 CFR Part 1584 – Highway and Motor Carrier Cybersecurity – starts on pp 92, and

  • 49 CFR Part 1586 – Pipeline Facilities and Systems Security – starts on pp 96

train railway

The freight rail, passenger rail & pipeline sections have a lot of familiar language. I haven’t gone through them line by line comparing them to the previous security directives – eg: TSA SD 2021-02E the current directive that applies to pipelines – but just reading through the requirements rings a lot of bells in terms of language I’ve read before.

At a high level, in-scope owners and operators will need to:

  • Carry out annual enterprise-wide evaluations documenting the current state of cybersecurity and comparing that state to a ‘target profile,’

  • Document a ‘target profile’ that includes at least the measures and outcomes described in the new law / rule, and ideally includes all of the applicable parts of the NIST Cybersecurity Framework (NIST CSF),

  • Develop an implementation plan and identify people responsible for carrying out the plan, and

    Identify critical cyber systems and detailed measures to protect those systems, as well as detailed measures to detect cyber incidents, respond to them and recover from them.


At a higher level, as you’ve probably guessed by now, I’m struggling to understand the legalese. I would welcome a call from someone who can explain how to make sense of the complicated cross-references. I promise to take detailed notes on the process and publish them as an article so other interested people can figure out how to do the same – with copious thanks to my generous instructor.

BTW – one of the reasons I’m trying to understand this new rule is because I’m hoping to include insights into the rule in a webinar that’s coming up: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving Them.

If you’re interested in seeing what’s common, what’s different, and what’s changing in this space, please do join us on Wednesday Nov 27.

I also invite you to get a complimentary copy of my latest book, Engineering-grade OT Security: A Manager’s Guide.

About the author
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post TSA NOPR for Pipelines, Rail & Bussing – Enhancing Surface Cyber Risk Management appeared first on Waterfall Security Solutions.

]]>
OT Cybersecurity: Can the Government Save Us? https://waterfall-security.com/ot-insights-center/government-and-defense/ot-cybersecurity-can-the-government-save-us/ Thu, 21 Mar 2024 13:19:35 +0000 https://waterfall-security.com/?p=21098 Governments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement.

The post OT Cybersecurity: Can the Government Save Us? appeared first on Waterfall Security Solutions.

]]>

OT Cybersecurity: Can the Government Save Us?

Governments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement.
Picture of Andrew Ginter

Andrew Ginter

Can Government Save OT Security

Why do we need to do any kind of robust OT cybersecurity at all? After all, in the physical domain, we expect individual citizens to take reasonable measures to protect themselves from petty burglars and car thieves, and not from a squadron of tanks rolling down the street blowing holes in buildings. We expect our governments and militaries to protect us from the most capable and consequential adversaries and attacks. Should the same not be true in the cyber world?

For example, some governments have declared that significant cyber attacks on critical infrastructures shall constitute acts of war. But – significant attacks on critical infrastructures have occurred, with neither physical retaliation nor declarations of war by those same governments. Why? Well, in part this is because reliable attribution of cyber attacks can be made arbitrarily difficult by attackers – after the attack, we do not know who to declare war against. In part the problem is that the consequences of launching an all-out physical war are truly monstrous and are widely seen as a disproportionate response to a cyber attack, even an attack on critical infrastructures.

“We expect our governments and militaries to protect us from the most capable and consequential adversaries and attacks. Should the same not be true in the cyber world?”

Real Time Response

government computerMany governments have invested heavily in protective measures for their infrastructures: establishing threat information sharing systems, providing classified threat briefings, establishing national cyber emergency response teams, imposing cybersecurity regulations and sometimes even mandating central government security and incident monitoring systems. Most governments also have powerful systems in place to ferret out spies, terrorist conspiracies, sleeper cells and even have systems to identify trustworthy employees who are becoming susceptible to compromise or blackmail because of gambling debts, extra-marital relationships, and other aspects of their personal lives.

While these measures have enormous value, they tend to be slow-moving. Ransomware and other attacks have gone from initial compromise to fully-encrypted and extorting payment in only 45 minutes – faster than any government can respond. Another example – I was talking a couple of years ago to an expert who was called in to carry out a post-mortem on a hacktivist attack that took down a number of water treatment systems. His conclusion: the attacks succeeded because the water utilities failed to implement the defenses the government had ordered them to implement. The lesson? Some kinds of attacks can be defeated only by the targets of those attacks – this is why there are government cybersecurity regulations for the most consequential of critical infrastructures.

Role of Government

Government definedGovernments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement. Why? Because there are some kinds of attacks that only the industrial targets can mount credible defenses against.

To read more about defenses against ransomware, hacktivists and even nation-states, click here to request your free copy of the author’s new book: Engineering-Grade OT Security: A manager’s guide.

About the author
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post OT Cybersecurity: Can the Government Save Us? appeared first on Waterfall Security Solutions.

]]>
Cybersecurity for Government Networks https://waterfall-security.com/ot-insights-center/government-and-defense/cybersecurity-for-government-networks/ Mon, 19 Feb 2024 12:40:46 +0000 https://waterfall-security.com/?p=19819 Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing sensitive data from leaking into or being exfiltrated from external, low-security/unclassified networks.

The post Cybersecurity for Government Networks appeared first on Waterfall Security Solutions.

]]>

Cybersecurity for Government Networks

Defending Critical Government Operations From Cyber Threats
Government Network Cybersecurity
Customer:

A Government Security Agency in Asia-Pacific

Customer Requirement:

Enable real-time transfer of arbitrary files into a secure network environment from open-source networks via file transfer, HTTP and email transports, while providing absolute protection from online data leakage and data exfiltration attacks from the secure network.

Waterfall’s Unidirectional Solution:

Secures the classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing sensitive data from leaking into or being exfiltrated from external, low-security/unclassified networks.

Preventing Data Exfiltration Attacks on High-Security Networks

Government security agencies, public utilities, financial institutions and other sensitive sites world-wide are vulnerable to online cyber attacks aiming to exfiltrate sensitive data. As all software can be hacked, protecting an organization’s most sensitive information with only software and firewalls is not sufficient from a national security standpoint. Software and firewalls can be exploited by malicious and sophisticated adversaries seeking to gain access to sensitive data stored in high-security networks.

The Challenge icon
The challenge

Seamlessly and efficiently transfer files from an open source network into a highly-sensitive secure network, while removing embedded malware from the files and preventing absolutely any data exfiltration back into the source network. Support file movement via HTTP, file transfer and emailed transports.

Waterfall solution - icon
Waterfall solution

A Waterfall Unidirectional Gateway was installed to transmit files from the low-security to the high-security network. Unidirectional Gateway software connectors gather files in real time from the low-security network and populate those files into file and email servers in the high security network. Government and law enforcement applications and personnel can interact normally and bi-directionally with the copies on the secure network, while the Unidirectional Gateway hardware physically prevents any data leakage back into the low-security network.

Results and benefits - icon
Results & benefits

Hardware-Enforced Security: The classified/high-sensitivity network is now physically protected from online data exfiltration attacks.

Seamless Integration: with a wide variety of CDR solutions

Common Criteria Certification: for the utmost in assurance of resistance to cyber attacks

Network Appliance: with web-based user interface for all administration, monitoring, management and even troubleshooting activities, with no additional software required to be installed on source or destination networks or servers.

vertical red line
Theory of Operation
Cybersecurity for Government Networks
Click to enlarge

Waterfall Unidirectional Security Gateways replace one layer of firewalls in the defensive design of classified high-security network environments, providing absolute protection from online data exfiltration attacks. Unidirectional Gateways contain both hardware and software components. Unidirectional Gateway technology represents a plug-and-play replacement for firewalls, without the vulnerabilities and maintenance issues that accompany firewall deployments.

vertical red line
Unidirectional Security Gateways Benefits:

arrow red right Safe cross-domain integration of classified and non-classified networks

arrow red rightEliminates any risk of online data leakage through the gateway from classified and other high-security networks

arrow red rightSimplifies compliance with even the most demanding cybersecurity regulations, standards and best-practice guidance, including USDHS, ANSSI, Australian Government Information Security, and more

arrow red rightSimplifies audits and change reviews

arrow red rightReplacing at least one of the layers of firewalls in a defense-in depth architecture with Unidirectional Security Gateways disables online data exfiltration attacks

vertical red line
Global Certifications and Compliance:

Certified: Common Criteria EAL 4+, ANSSI CSPN, NITES Singapore

Assessed by: US DHS SCADA Security Test Bed & Japanese Control Systems Security Center Bed, Idaho National Labs, Digital Bond Labs, GE Bently Nevada Systems Labs, and NISA Israel

Complies with: global ICS Standards & Regulations, NERC CIP, IEC 62443, NRC 5.71, NIST 800-82r2, CFATS, ISO, IIC SF, ANSSI, Australian Signals Directorate, and many more

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Cybersecurity for Government Networks appeared first on Waterfall Security Solutions.

]]>
eBook: Unidirectional Security Gateways for Government Networks https://waterfall-security.com/ot-insights-center/government-and-defense/unidirectional-security-gateways-for-government-networks/ Mon, 19 Feb 2024 10:39:52 +0000 https://waterfall-security.com/?p=19702 The cyber threat environment is getting worse, and our adversaries are developing more powerful attack tools. Government agencies need to increase automation and network connectivity to maintain strategic military, governance, and economic advantages.

The post eBook: Unidirectional Security Gateways for Government Networks appeared first on Waterfall Security Solutions.

]]>

eBook: Unidirectional Security Gateways for Government Networks

The cyber threat environment is getting worse, and our adversaries are developing more powerful attack tools. Government agencies need to increase automation and network connectivity to maintain strategic military, governance, and economic advantages. This increases both the number of targets for cyber assaults and the number of opportunities for such assaults. The solution is robust, hardware-based, physical protection, such as Waterfall’s Unidirectional Security Gateways and hardware-enforced security solutions, which protect from even the most sophisticated nation-state adversaries.

In this eBook

arrow red right  Unique benefits of Unidirectional Security Gateways.

arrow red right  The hardware behind Unidirectional Security Gateways.

arrow red right  Connector software for Unidirectional Security Gateways.

arrow red right  Waterfall’s Blackbox – tamperproof logs.

arrow red right  How it all comes together  for protecting government networks.

Download your copy today and learn how to fully secure government networks against all remote cyber threats including nation-state adversaries.

About the author
Picture of Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

At Waterfall, Andrew leads a team of experts who work with the world’s most secure industrial sites. He is author of two books on industrial security, a co-author of the Industrial Internet Consortium’s Security Framework, and the co-host of the Industrial Security Podcast. Andrew spent 35 years designing SCADA system products for Hewlett Packard, IT/OT connectivity products for Agilent Technologies, and OT/ICS security products for Industrial Defender and Waterfall Security Solutions.

Share

Fill out the form and get it by email​

The post eBook: Unidirectional Security Gateways for Government Networks appeared first on Waterfall Security Solutions.

]]>