{"id":65128,"date":"2021-06-23T19:46:52","date_gmt":"2021-06-24T02:46:52","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?page_id=65128"},"modified":"2025-05-06T14:17:13","modified_gmt":"2025-05-06T18:17:13","slug":"tsa-security-directive","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/","title":{"rendered":"TSA Security Directive"},"content":{"rendered":"<h1>TSA Security Directive<\/h1>\n<h2 class=\"c-title\">Forescout Assists with TSA Security Directive Compliance<\/h2>\n<p class=\"x_MsoNormal\">The U.S. Transportation Security Administration\u2019s (TSA) directive requires pipeline owners and operators to designate a cybersecurity coordinator, report cyber incidents to the TSA and Cybersecurity and Infrastructure Security Agency (CISA) within 12 hours of discovery, and review current security practices against existing TSA guidance to identify gaps and develop remediation measures.<\/p>\n<p class=\"x_MsoNormal\">Forescout can help pipeline owners\/operators meet the requirements of TSA\u2019s\u00a0<a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.tsa.gov%2Fsites%2Fdefault%2Ffiles%2Fpipeline_security_guidelines.pdf&amp;data=04%7C01%7C%7Cdf3985304a2c464fdbb308d95094b585%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C637629421895887060%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=K4UrEFTRFjTEfZcYQOqft0g1CdJwq84gu%2BLlda9BFZ0%3D&amp;reserved=0\">Pipeline Security Guidelines<\/a>\u00a0and help you secure your pipeline assets and OT network. Click <a href=\"https:\/\/www.forescout.com\/resources\/mapping-guide-how-to-align-with-tsa%e2%80%99s-pipeline-security-guidelines\/\">here<\/a> for more information on how Forescout can address section 7 security measures of TSA\u2019s security guidelines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TSA Security Directive Forescout Assists with TSA Security Directive Compliance The U.S. Transportation Security Administration\u2019s (TSA) directive requires pipeline owners and operators to designate a cybersecurity coordinator, report cyber incidents to the TSA and Cybersecurity and Infrastructure Security Agency (CISA) within 12 hours of discovery, and review current security practices against existing TSA guidance to [&hellip;]<\/p>\n","protected":false},"author":149,"featured_media":0,"parent":80153,"menu_order":137,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[663],"class_list":["post-65128","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TSA Security Directive - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TSA Security Directive - Forescout\" \/>\n<meta property=\"og:description\" content=\"TSA Security Directive Forescout Assists with TSA Security Directive Compliance The U.S. Transportation Security Administration\u2019s (TSA) directive requires pipeline owners and operators to designate a cybersecurity coordinator, report cyber incidents to the TSA and Cybersecurity and Infrastructure Security Agency (CISA) within 12 hours of discovery, and review current security practices against existing TSA guidance to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-06T18:17:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/\",\"url\":\"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/\",\"name\":\"TSA Security Directive - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2021-06-24T02:46:52+00:00\",\"dateModified\":\"2025-05-06T18:17:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/www.forescout.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"TSA Security Directive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TSA Security Directive - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/","og_locale":"en_US","og_type":"article","og_title":"TSA Security Directive - Forescout","og_description":"TSA Security Directive Forescout Assists with TSA Security Directive Compliance The U.S. Transportation Security Administration\u2019s (TSA) directive requires pipeline owners and operators to designate a cybersecurity coordinator, report cyber incidents to the TSA and Cybersecurity and Infrastructure Security Agency (CISA) within 12 hours of discovery, and review current security practices against existing TSA guidance to [&hellip;]","og_url":"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-05-06T18:17:13+00:00","twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/","url":"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/","name":"TSA Security Directive - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2021-06-24T02:46:52+00:00","dateModified":"2025-05-06T18:17:13+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/solutions\/tsa-security-directive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.forescout.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"TSA Security Directive"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/65128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/149"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=65128"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/65128\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=65128"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=65128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}