Airport authorities rely on a complex system of information technology (IT), operational technology (OT) and Internet of Things (IoT) to deter hostile actors and keep airport operations running smoothly.
Terminal operations technology is particularly vulnerable to disruption. Systems are network connected and have many components that expand the attack surface — from landside reservation check-in kiosks, flight information display screens, security cameras and explosive detection systems (EDS) to airside checked bag inspection systems, checked bag resolution areas and passenger boarding bridges. In addition, traditional security software may not work on many OT and IoT devices.
Recent news headlines show how a failure in one part of the system can ripple throughout the travel process and bring airport operations to a standstill. In July 2024, a flawed CrowdStrike software update shut down passenger check-in and screening checkpoints at multiple airports and grounded flights at major airlines around the world. In September, a ransomware attack at Seattle-Tacoma International Airport caused an internet outage that disrupted reservation check-in systems, flight information display screens, baggage-sorting systems and phone service.1
Airport authorities need a comprehensive cybersecurity strategy to protect terminal operations, meet specialized security requirements and comply with new Transportation Security Administration (TSA) regulations. This buyer’s guide covers key criteria and capabilities to keep critical airport infrastructure secure and available.
Download to continue reading and learn how Armis Centrix™ provides full visibility into landside and airside systems, strengthening their cybersecurity posture to protect against evolving threats and providing a path to regulatory compliance.