{"id":7266,"date":"2021-11-11T09:22:37","date_gmt":"2021-11-11T17:22:37","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7266"},"modified":"2021-11-11T09:22:37","modified_gmt":"2021-11-11T17:22:37","slug":"how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/","title":{"rendered":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#8217;s Second Security Directive"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a <\/span><a href=\"https:\/\/www.dhs.gov\/news\/2021\/07\/20\/dhs-announces-new-cybersecurity-requirements-critical-pipeline-owners-and-operators\"><span style=\"font-weight: 400;\">second Security Directive<\/span><\/a><span style=\"font-weight: 400;\"> that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the <\/span><a href=\"https:\/\/www.dhs.gov\/news\/2021\/05\/27\/dhs-announces-new-cybersecurity-requirements-critical-pipeline-owners-and-operators\"><span style=\"font-weight: 400;\">initial Security Directive<\/span><\/a><span style=\"font-weight: 400;\"> that was issued in May 2021 at the heels of a major ransomware attack on a major US pipeline company that caused widespread disruptions and long lines at the gas pumps for several regions in the country.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The directive requires implementing specific mitigation measures using guidelines published by the National Institute of Standards and Technology (NIST) and recommendations from recent CISA (Cybersecurity and Infrastructure Security Agency) alerts (such as AA21-131A, AA21-201A). It also requires pipeline owners and operators to develop a cybersecurity contingency\/response plan to reduce risk of disruptions after an attack, and have their cybersecurity architecture design reviewed by a third party so that businesses are using the most advanced technology and most recent information to minimize damage from cyber crime.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Secretary of Homeland Security, Alejandro N. Mayorkas, stressed the importance of protecting the country\u2019s critical infrastructure from evolving threats. \u201cThrough this Security Directive, DHS can better ensure the pipeline sector takes the steps necessary to safeguard their operations from rising cyber threats, and better protect our national and economic security\u201d, he said.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">DNS Security for Blocking Cyberattacks and Fulfilling some of the Security Directive Measures<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">90% of malware, including most ransomware, use DNS at some point in its lifecycle. When users click on phishing links or go to a website that may be hosting ransomware, it requires a DNS lookup before it connects.\u00a0 This initial connection is then followed by several back and forth communications between the device (which could now be infected) and the C&amp;C destination, which also happens over DNS. So, using threat intelligence and analytics on DNS can block these activities, effectively either preventing the initial infection or preventing C&amp;C callbacks that could result in downloads of further malicious code or encryption software. Thus DNS security offers a continuous threat monitoring and response solution and helps pipeline companies and others in critical infrastructure sectors to fulfill some of the measures put forth by the second Security Directive.\u00a0<\/span><\/p>\n<h4><i><span style=\"font-weight: 400;\">NSA and CISA\u2019s View\u00a0<\/span><\/i><\/h4>\n<p><span style=\"font-weight: 400;\">Anne Neuberger, Director of Cybersecurity at NSA (National Security Agency), recently noted that \u201cusing secure DNS would reduce the ability for 92 percent of malware attacks both from command and control perspective deploying malware on a given network.\u201d based on NSA analysis. Earlier this year, the NSA and CISA also put out a document on selecting a<\/span><a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_Selecting%20a%20Protective%20DNS%20Service_U00117652-21.PDF\"><span style=\"font-weight: 400;\"> Protective DNS Service<\/span><\/a><span style=\"font-weight: 400;\"> that talks about how DNS is central to modern networks and why it can be used as a key defense mechanism against cyberthreats.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">DNS is foundational Network Infrastructure for America\u2019s Critical Infrastructure<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As IT and OT systems converge and more systems become IP-aware, shifts in thinking are required both in terms of continuous asset discovery and knowing the external locations that certain systems are reaching out to &#8212; even if those systems have been historically considered safely walled off from the outside environment. As a ubiquitous foundational network protocol, DNS will be a trustworthy source of data on this front for years to come because a DNS resolver 1) captures the source of the outbound query and 2) distributes information on the external address in question. As a simple example, some of the domains used in the major pipeline attack were registered in risky corners of the Internet, on commonly abused top level domains (TLDs).\u00a0 Properly configured DNS servers serve as instant identifiers of this suspicious activity and as effective control points via Response Policy Zone implementation in this case. The DNS server can provide context around policy and tactical questions like \u201cWhy were systems on this network segment communicating with those TLDs? Should they be allowed to?\u201d.<\/span><\/p>\n<h4><i><span style=\"font-weight: 400;\">BloxOne Threat Defense for Comprehensive Visibility and DNS Security<\/span><\/i><\/h4>\n<p><span style=\"font-weight: 400;\">BloxOne Threat Defense is an award winning DNS security solution from Infoblox that uses a combination of highly accurate threat intelligence with ML\/AI analytics to detect threat activity and block C&amp;C communications. It also triggers remediation action in real time, as soon as the threat is detected, through integrations with other security ecosystem tools in the network such as vulnerability scanners, NAC, and ITSM.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Together with the underlying DNS, DHCP and IPAM platform, BloxOne Threat Defense provides unparalleled asset visibility and awareness by providing additional contextual info on a compromised system such as location in the network, type of device and an audit trail of all activity from that system. This helps administrators quickly identify systems that are reaching out to suspicious destinations and take quick, precise action.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about BloxOne Threat Defense <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a second Security Directive that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the initial Security Directive that was issued in May 2021 at the [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":7267,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[596,360,597,598,333],"class_list":{"0":"post-7266","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-pipeline","9":"tag-dns-security","10":"tag-tsa","11":"tag-security-directive","12":"tag-cyberattack","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#039;s Second Security Directive<\/title>\n<meta name=\"description\" content=\"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#039;s Second Security Directive. Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a second Security Directive that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the initial Security Directive that was issued in May 2021 at the heels of a major ransomware attack on a major US pipeline company that caused widespread disruptions and long lines at the gas pumps for several regions in the country.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#039;s Second Security Directive\" \/>\n<meta property=\"og:description\" content=\"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#039;s Second Security Directive. Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a second Security Directive that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the initial Security Directive that was issued in May 2021 at the heels of a major ransomware attack on a major US pipeline company that caused widespread disruptions and long lines at the gas pumps for several regions in the country.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-11T17:22:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pipeline.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"509\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#8217;s Second Security Directive\",\"datePublished\":\"2021-11-11T17:22:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/\"},\"wordCount\":817,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pipeline.jpg\",\"keywords\":[\"pipeline\",\"DNS Security\",\"TSA\",\"security directive\",\"Cyberattack\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/\",\"name\":\"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pipeline.jpg\",\"datePublished\":\"2021-11-11T17:22:37+00:00\",\"description\":\"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive. Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a second Security Directive that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the initial Security Directive that was issued in May 2021 at the heels of a major ransomware attack on a major US pipeline company that caused widespread disruptions and long lines at the gas pumps for several regions in the country.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pipeline.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pipeline.jpg\",\"width\":509,\"height\":339,\"caption\":\"Three pipelines\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#8217;s Second Security Directive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive","description":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive. Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a second Security Directive that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the initial Security Directive that was issued in May 2021 at the heels of a major ransomware attack on a major US pipeline company that caused widespread disruptions and long lines at the gas pumps for several regions in the country.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/","og_locale":"en_US","og_type":"article","og_title":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive","og_description":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive. Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a second Security Directive that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the initial Security Directive that was issued in May 2021 at the heels of a major ransomware attack on a major US pipeline company that caused widespread disruptions and long lines at the gas pumps for several regions in the country.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/","og_site_name":"Infoblox Blog","article_published_time":"2021-11-11T17:22:37+00:00","og_image":[{"width":509,"height":339,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pipeline.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#8217;s Second Security Directive","datePublished":"2021-11-11T17:22:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/"},"wordCount":817,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pipeline.jpg","keywords":["pipeline","DNS Security","TSA","security directive","Cyberattack"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/","url":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/","name":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pipeline.jpg","datePublished":"2021-11-11T17:22:37+00:00","description":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA's Second Security Directive. Back in July of this year, DHS\u2019s Transportation Security Administration (TSA) issued a second Security Directive that requires owners and operators of critical pipeline systems and facilities to implement certain security measures to defend against threats like ransomware. This is on top of the initial Security Directive that was issued in May 2021 at the heels of a major ransomware attack on a major US pipeline company that caused widespread disruptions and long lines at the gas pumps for several regions in the country.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pipeline.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pipeline.jpg","width":509,"height":339,"caption":"Three pipelines"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-pipeline-owners-and-operators-can-use-dns-security-to-abide-with-some-of-tsas-second-security-directive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How Pipeline Owners and Operators Can Use DNS Security to abide with some of TSA&#8217;s Second Security Directive"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7266"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7266\/revisions"}],"predecessor-version":[{"id":7268,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7266\/revisions\/7268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7267"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}