broken image
broken image
GET IN TOUCH
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
broken image
broken image
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
GET IN TOUCH
broken image

Overview on Aviation Cybersecurity

· Compliance and Regulations,Technical and Security Deep Dives,Industry Applications and Use Cases

Maintaining safe, secure, and resilient operations is the highest priority for aviation. Although technology and digitization bring many advantages to aviation, it also creates challenges in managing cyber vulnerabilities in such a complex environment. The airline industry has always been an attractive target for cybercriminals with various motivations, spanning from stealing value in data or money to causing breakdowns and harm.

That's why IATA recommends adopting a minimal cybersecurity posture, consisting of two parts:

  • Part 1: Organization Culture and Posture relates to the cybersecurity of the organization;
  • Part 2: Aircraft relates to the cybersecurity of the aircraft and risk management.

Advancing an Industry Strategy

In order to address the ever-evolving cyber threats, IATA is developing an industry-wide Aviation Cyber Security Strategy. As part of it, IATA produced the Aviation Cyber Security position paper that outlines its cybersecurity vision and mission as well as the steps that should be taken to address the aviation cybersecurity issues. This work, guided by the Security Advisory Council (SAC), involves establishing partnerships with the original equipment manufacturers (OEMs), regional organizations, communities, and academia.

The cybersecurity issues such as inter alia, the privacy of data, safety, the Passenger Standards Conference (PSC), etc., will be jointly addressed with the Safety, Flight and Ground Operations Advisory Council (SFGOAC) and the Digital Transformation Advisory Council (DTAC). The strategy will be carried out by the Cyber Management Working Group (CMWG), which will address all the cybersecurity activities in support of the IATA airline members.

Collaboration with ICAO

IATA presented to the 40th ICAO Assembly their Information Paper A40-WP/395 Aviation Cyber Security - Moving Forwards, explaining the need for coordinated and proactive work on managing aviation cybersecurity risks. Through this paper, IATA gave its support to the creation of the ICAO Cyber Security Strategy.

Aviation Cyber Security Roundtable (ACSR)

Another important element of the cybersecurity strategy is the Aviation Cyber Security Roundtable. This annual event gathers industry stakeholders to work towards a 2030 vision for a coordinated approach to aviation cybersecurity.

The work of the ACSR is focused on the following elements:

  • Cybersecurity Culture: Promoting a positive cybersecurity culture and raising awareness across the industry;
  • Transparency and trust: Establishing a global approach to cybersecurity;
  • Communication and collaboration: Creating stronger relationships among industry participants and with external organizations to improve the best practices and handling of potential threats;
  • Workforce: Training aviation personnel to recognize and manage cybersecurity risks and inspire the next generation leaders.

IATA is constantly providing awareness on aviation cybersecurity, helping stakeholders build a strong aviation cybersecurity workforce and showing the current aviation personnel how to recognize and handle cyber threats. Additionally, IATA provides a Compilation of Cyber Security Regulations, Standards, and Guidance for Civil Aviation, where interested parties can go over a list of regulations, standards, and guidance related to aviation cybersecurity. This version is not a definitive one. The list is continuously updated based on the crucial developments in regulations, standards, and aviation cybersecurity guidance.

 

If you wish to learn more about aviation cybersecurity, get in touch with specialized experts.

Subscribe
Previous
Introduction to Horizontal EU-Wide Cybersecurity...
Next
Top 10 things You Should Know About FIDO Device...
 Return to site
Profile picture
Cancel
Cookie Use
We use cookies to improve browsing experience, security, and data collection. By accepting, you agree to the use of cookies for advertising and analytics. You can change your cookie settings at any time. Learn More
Accept all
Settings
Decline All
Cookie Settings
Necessary Cookies
These cookies enable core functionality such as security, network management, and accessibility. These cookies can’t be switched off.
Analytics Cookies
These cookies help us better understand how visitors interact with our website and help us discover errors.
Preferences Cookies
These cookies allow the website to remember choices you've made to provide enhanced functionality and personalization.
Save