Aviation Cybersecurity for Airports: Why It Matters and What You Need to Know
Aviation cybersecurity for TSA-regulated airports, Part 139 facilities, Part 171 nav aids & FBOs. TSA requirements, recent attacks, systems at risk, and first steps to take.
Teddy Cooper
11/2/20259 min read


Quick Answer
Airport cybersecurity is no longer optional—it's mandatory. The FAA is convening the Civil Aviation Cybersecurity Aviation Rulemaking Committee to develop comprehensive cybersecurity standards for airports, aircraft, ground support systems, and air traffic control. Meanwhile, the TSA has already imposed emergency cybersecurity requirements on Part 139 airports. Recent ransomware attacks have disrupted major airports, including Seattle-Tacoma International (impacting 90,000 people) and multiple European airports, such as Heathrow, forcing staff to use whiteboards for flight information and manually check in passengers. Beyond servers and networks, airports must secure operational technology systems, including lighting controls, navigation aids, HVAC systems, access control systems, and ground equipment—vulnerabilities that many operators are unaware of.
The Aviation Cybersecurity Landscape Has Changed—Here's Why You Should Care Right Now
If you're an airport operations manager, fixed-base operator, or aviation facility director, cybersecurity may seem like an IT issue. It's not anymore. It's an operational safety issue, a regulatory compliance requirement, and increasingly, a business continuity imperative.
Three forces are converging to make aviation cybersecurity urgent in 2025:
1. Federal Mandates Are Here (And More Are Coming)
The Transportation Security Administration issued emergency cybersecurity requirements in March 2023 for TSA-regulated airports and aircraft operators. These aren't suggestions—they're enforceable regulations with severe penalties for non-compliance.
But that's just the beginning. Congress directed the FAA to establish the Civil Aviation Cybersecurity Aviation Rulemaking Committee by May 15, 2025, tasked with developing findings and recommendations on cybersecurity standards for civil aircraft, aircraft ground support information systems, airports, air traffic control mission systems, and aeronautical products and articles. This committee will shape the future regulatory landscape for aviation cybersecurity.
What this means for you: More regulations are coming. The airports that start building cybersecurity programs now will have a significant advantage when new mandates take effect.
2. Attacks Are Increasing—And They're Devastating
The aviation sector has experienced a significant increase in cyberattacks. The industry experienced a 24% increase in cyberattacks, with 52 reported in 2020, 48 in 2021, and 55 in 2022. Notably, 71% of these attacks involved the misappropriation of login credentials and unauthorized access to IT infrastructure.
Here's what that looks like in practice:
Port of Seattle/Seattle-Tacoma International Airport (August 2024): A ransomware attack knocked out airport Wi-Fi, baggage systems, check-in kiosks, ticketing, passenger display boards, the airport website, the flySEA app, and reserved parking. Employees had to use dry-erase boards for flight and baggage information, and airlines manually sorted through bags. The attack affected 90,000 people and disrupted operations for days.
Collins Aerospace System/European Airports (September 2025): A ransomware attack on Collins Aerospace's ARINC Multi-User System Environment software platform disrupted multiple airports, including Heathrow, Berlin Brandenburg, Brussels, and Dublin, resulting in flight cancellations and delays as staff resorted to manual procedures for electronic check-in and baggage handling.
Kuala Lumpur International Airport (March 2025): A ransomware attack with a $10 million ransom demand disrupted flight information display systems, check-in counters, and other services for hours, potentially even days.
These weren't theoretical vulnerabilities—these were operational shutdowns at major airports serving millions of passengers.
3. The Cybersecurity Skills Gap Is Real
Most airport operations teams are excellent at managing physical infrastructure, coordinating flight operations, and ensuring passenger safety. However, cybersecurity requires a different expertise—one that most facilities lack in-house.
The challenge? You're expected to comply with technical regulations, even if you don't have a technical staff member who understands the systems' vulnerabilities, their connections, or where to begin.
Beyond Servers: The Airport Systems Attackers Actually Target
Here's the critical insight most airport operators miss: When cybersecurity experts talk about "systems," they're not just talking about your email server or website.
From 28 years of experience working with aviation systems at the FAA, I can tell you that airports have dozens of connected systems that most people don't think about as "cyber" targets:
Navigation and Landing Systems
Instrument Landing Systems (ILS)
Precision Approach Path Indicators (PAPI)
Approach lighting systems (ALS)
Localizer and glideslope equipment
Very High Frequency Omni-Directional Range (VOR)
Airport Lighting and Signaling
Runway edge lights
Taxiway guidance signs
Airport beacon systems
Remote control systems for lighting intensity
Ground Operations Technology
Automated weather observation systems (AWOS/ASOS)
Fuel management systems
Ground power and air conditioning units
Baggage handling systems
Access control and security cameras
Communication and Data Systems
Airport communications systems
Flight information display systems (FIDS)
Public address systems
Network-connected HVAC controls
Building management systems
The concerning reality: Many of these systems were installed before cybersecurity considerations were a priority. They have default passwords, no encryption, outdated software, and direct connections to other networks.
An attacker doesn't need to compromise your primary server to cause operational chaos. They can target:
A remote lighting controller that hasn't been updated in 10 years
A weather observation system with a known vulnerability
A building management system running on Windows XP
A contractor's laptop that connects to multiple airport systems
The Regulatory Framework: What's Already Required and What's Coming
Aviation cybersecurity regulations come from multiple agencies, and understanding how they intersect is crucial. Depending on your facility type, you may be subject to one or more of these frameworks:
Understanding the Regulatory Landscape
TSA Airport Security Programs (49 CFR Part 1542): These requirements apply to airports that regularly serve certain air carrier operations, including:
Scheduled passenger service with aircraft of 61+ seats
Public charter service with 61+ seats
Smaller scheduled services that deplane into sterile areas
Airports serving aircraft operators under Part 1544 or foreign carriers under Part 1546
FAA Part 139 Airport Certification: Approximately 520 U.S. airports are certificated under Part 139, which covers:
Scheduled passenger operations: Aircraft with 10+ passenger seats
Unscheduled passenger operations: Aircraft with 31+ passenger seats
Part 139 airports are required to maintain Airport Operating Certificates and comply with safety and emergency response requirements. As of February 2023, particular Part 139 airports must also develop and implement Safety Management Systems (SMS) to identify and manage hazards and risks.
FAA Part 171—Non-Federal Navigation Facilities: If your facility operates non-federal navigation aids (ILS, VOR, DME, etc.), you're subject to Part 171 requirements for equipment reliability and accuracy. While these regulations don't explicitly address cybersecurity yet, compromised navigation systems directly impact the safety requirements.
Important Note: The TSA cybersecurity requirements apply to TSA-regulated airports, which is a broader category than just Part 139 certificated airports. Similarly, aviation facilities with navigation aids under Part 171, FBOs with critical systems, and general aviation airports may also face cybersecurity compliance requirements—especially as new regulations emerge from the Civil Aviation Cybersecurity ARC.
TSA Cybersecurity Requirements (Current—Since March 2023)
TSA's emergency amendment (issued March 7, 2023) imposes four core requirements on TSA-regulated airports and aircraft operators, including those committed to the Department of Defense's Civil Reserve Air Fleet:
Network Segmentation: Separate operational technology (OT) systems from information technology (IT) systems so that if one is compromised, the other can continue operating safely
Access Control Measures: Implement security controls to prevent unauthorized access to critical cyber systems
Continuous Monitoring and Detection: Deploy policies and procedures to defend against, detect, and respond to cybersecurity threats and anomalies
Patch Management: Apply security patches and updates promptly using a risk-based methodology
FAA Part 139 and Safety Management Systems (SMS)
Part 139 certificated airports are required to maintain Airport Operating Certificates and comply with safety requirements that cover signs, lights, markings, runway safety, aircraft rescue and firefighting, and other related aspects.
As of February 2023, particular Part 139 airports must develop and implement Safety Management Systems to identify and quantify potential hazards and risks. Cybersecurity incidents can now be classified as safety events requiring reporting and investigation under SMS frameworks.
The Civil Aviation Cybersecurity ARC (Coming Soon)
The FAA must convene the Civil Aviation Cybersecurity Aviation Rulemaking Committee, which will provide findings and recommendations to the FAA on cybersecurity standards. The committee will submit interim reports every 6 months, meaning new guidance and potentially new regulations will be forthcoming.
Bottom line: Whether you're TSA-regulated under Part 1542, FAA-certificated under Part 139, operate navigation aids under Part 171, or run an FBO or general aviation facility, the regulatory bar is rising. Airports and aviation facilities that invest in cybersecurity infrastructure now won't have to scramble when new mandates arrive.
The Single Most Important First Step: Know What You Have
From my experience helping airports navigate these challenges, here's what I tell every operations manager who's just waking up to the cybersecurity requirement:
You cannot protect what you don't know exists.
The most critical first step isn't buying expensive security software or hiring a cybersecurity firm. It's conducting a comprehensive asset inventory and vulnerability assessment.
What This Actually Means:
Asset Inventory:
Document every system connected to a network (even air-gapped systems can have vulnerabilities)
Identify who has access to each system
Determine what data each system holds or transmits
Map how systems connect
Vulnerability Assessment:
Identify outdated software and firmware
Find systems with default or weak passwords
Discover unsecured remote access points
Locate systems with known security vulnerabilities
Why This Matters:
Many airport operators discover through this process that they have:
Legacy systems running software that's no longer supported
Shadow IT—systems installed by contractors or vendors that nobody realized were still on the network
Interconnected systems—the lighting controller that somehow connects to the same network as passenger Wi-Fi
Forgotten access points—remote access accounts created years ago for maintenance that were never disabled
Once you understand what you have, you can prioritize risks and develop a realistic cybersecurity roadmap that aligns with your budget and staffing needs.
What Happens If You Don't Take This Seriously
The consequences of ignoring aviation cybersecurity aren't abstract:
Operational Disruption: At Seattle-Tacoma International, employees had to use dry-erase boards for flight information, and airlines had to sort through bags manually—imagine trying to manage that during the peak holiday travel season.
Financial Impact: Ransom demands can reach $10 million, and that doesn't include the cost of recovery, lost revenue, or potential legal liability.
Regulatory Penalties: Non-compliance with TSA cybersecurity requirements can result in daily fines exceeding $10,000, as well as potential operational restrictions or revocation of the certificate.
Reputational Damage: News coverage of a cybersecurity incident at your facility can affect passenger confidence, airline relationships, and community trust.
Safety Risk: In the worst-case scenario, compromised systems could affect navigation aids, lighting, or communications, creating genuine safety hazards.
Getting Started: A Practical Roadmap
Here's a realistic approach for small to medium-sized airports:
Immediate (This Month):
Schedule an asset inventory walkthrough with your operations and IT staff
Review TSA cybersecurity requirements and identify gaps
Change default passwords on critical systems
Document who has access to what systems
Short-Term (Next 90 Days):
Conduct a formal vulnerability assessment
Develop an incident response plan
Segment your networks (separate OT from IT)
Establish basic monitoring and alerting
Medium-Term (Next 6-12 Months):
Implement continuous monitoring capabilities
Develop a patch management program
Create cybersecurity training for all staff
Build relationships with cybersecurity resources
Long-Term (Ongoing):
Regular security assessments and penetration testing
Update and test incident response plans
Stay current with evolving regulations
Integrate cybersecurity into SMS/operations
Why Aviation Cybersecurity Requires Specialized Expertise
You wouldn't ask an IT professional to certify runway lighting—so why would you ask someone without aviation experience to secure aviation systems?
Effective aviation cybersecurity sits at the intersection of three domains:
Information Security—understanding cyber threats, vulnerabilities, and protections
Aviation Operations—knowing how airports actually function and what systems are critical
Regulatory Compliance—navigating FAA, TSA, and other aviation-specific requirements
Finding professionals who understand all three is rare. Most IT security firms understand cybersecurity, but they often lack a comprehensive understanding of ILS systems. Most aviation professionals understand operations but not information security.
That's why specialized aviation cybersecurity education and consulting exist—to bridge that gap.
Conclusion: The Time to Act Is Now
Aviation cybersecurity is no longer emerging—it's here. Federal agencies are actively developing new standards and regulations. Attacks are increasing at a rate of 24% year over year. And the airports that wait will face the dual burden of catching up on both security infrastructure and regulatory compliance simultaneously.
The good news? You don't have to become a cybersecurity expert overnight. You need to:
Understand what you're protecting (asset inventory)
Know what regulations apply (TSA, Part 139, future FAA rules)
Build a realistic roadmap (prioritized, budgeted, achievable)
Get specialized help (aviation cybersecurity expertise)
The airports that start now will be positioned not just to comply with mandates, but to actually protect their operations, passengers, and communities from real threats.
Next Steps: Deep-Dive Resources
This post provides the foundation. Here are specific topics we'll cover in upcoming articles:
TSA Cybersecurity Requirements: A Complete Implementation Guide for TSA-regulated airports
Securing ILS and Navigation Systems: Technical guidance for Part 171 facilities and ground systems engineers
Aviation Cybersecurity on a Budget: High-impact, low-cost measures for small airports and FBOs
Legacy System Risks: Assessing and mitigating vulnerabilities in older infrastructure
Building an Aviation Incident Response Plan: What to do when a cyber event occurs
Want to go deeper? The Aviation Cybersecurity Academy offers comprehensive training on these topics, specifically designed for airport operators, FBO managers, ground systems engineers, and aviation facility managers who need to understand both the technical and regulatory aspects of aviation cybersecurity, regardless of their facility type or the applicable regulatory framework. You can find the first academy module here for free. You can find module 1 here for free.
Contact Aviation Relations for a free 30-minute discovery call to assess your facility's specific cybersecurity posture and regulatory compliance needs.
About the Author: Teddy Cooper is an ILS Electronic Engineer with the FAA's Advanced System and Design Service, with 28 years of aviation experience spanning military avionics and FAA engineering, specializing in navigation aids and airport ground equipment. He holds an MSIT degree with a specialization in Information Security and operates Aviation Relations, providing cybersecurity education and consulting services to aviation facilities nationwide.
© 2025. All rights reserved.
Need to know:
I AM EMPLOYED AS AN ILS ELECTRONICS ENGINEER WITH THE FEDERAL AVIATION ADMINISTRATION. MY CYBERSECURITY WRITING IS CONDUCTED IN MY PERSONAL CAPACITY, BASED ON MY MSIT EDUCATION, AND MAINTAINED WITH CLEAR ETHICAL BOUNDARIES.
I do not provide Part 171 equipment compliance consulting or services within my federal job scope. All content uses personal time and resources, is based on publicly available information, and does not represent FAA positions or policy.
The views and guidance provided through Aviation Relations represent my professional opinion and experience as an individual and do not represent official FAA policy, positions, or endorsements. All content is provided in a personal capacity and is separate from any official FAA duties or responsibilities.