LegacyLeap Logo

Aviation Cybersecurity Compliance: Why Legacy Systems Fail TSA and FAA Audits

Aviation Cybersecurity Compliance

TL;DR

  • If you’re preparing for a TSA CIP assessment, the first thing auditors will look for is records, not intent. Network segmentation documentation, 90-day patch logs, application-level event streams, and MFA audit trails. If your systems cannot produce these, no compliance program fixes that.
  • VB6, Classic ASP, Java EE, and EJB cannot meet the patch requirement by design. There is no active vendor patch stream. The gap is not a missed cycle. It is permanent. CISA documents 1,484 confirmed-exploited CVEs from these stacks still being actively weaponized.
  • The incidents are documented and financially quantified. Delta’s $500M recovery, Southwest’s $140M DOT penalty, Sea-Tac’s ransomware entry through legacy systems. These are the audit findings that didn’t wait for an auditor.
  • The immediate action is a visibility exercise, not a modernization program. Identify which systems interface with aircraft networks, which have no active patch stream, and which produce no application-level logs. Most carriers cannot answer all three from existing documentation.

Table of Contents

Aviation’s Cybersecurity Regulators Have Moved. The Legacy Stack Hasn’t.

Three regulatory instruments are now simultaneously active in aviation cybersecurity, and none of them are operating as guidance.

TSA Security Directive SD 1544.240 requires TSA-regulated airports and Part 121 carriers to maintain active Cybersecurity Implementation Plans covering network segmentation, patch management, continuous monitoring, and access controls [1]. TSA’s January 2025 Enforcement Sanction Guidance lists operating without an approved CIP as a sanctionable violation. 

The FAA Reauthorization Act of 2024 gives the FAA exclusive rulemaking authority over civilian aircraft cybersecurity and directs the establishment of both a NAS Cyber Threat Management Process and a Civil Aviation Cybersecurity Rulemaking Committee. 

The FAA’s August 2024 NPRM converts current directives into binding airworthiness regulations. When that rule finalizes, operator discretion ends.

Aviation is now one of the industries where 2026 enforcement is converging. That is the frame for everything that follows.

The article’s argument is not that airlines lack compliance programs. It is that the legacy systems running airline operations, such as crew tracking, dispatch, ETOPS monitoring, ops control, are structurally incapable of producing what those programs now require.

What TSA and FAA Auditors Check: Evidence Requirements by Instrument

TSA Security Directive SD 1544.240 requires TSA-regulated airports and Part 121 air carriers to maintain a Cybersecurity Implementation Plan covering network segmentation, access control, continuous monitoring, and patch management for all critical cyber systems. 

Non-compliance with an approved CIP is a sanctionable violation under TSA’s January 2025 Enforcement Sanction Guidance and can result in fines, suspension, or certificate revocation.

The compliance obligation resolves to a specific set of auditable IT deliverables. Understanding what those deliverables are is the prerequisite for understanding where the legacy stack fails.

TSA SD 1544.240 requires carriers to produce and maintain:

  • Network segmentation documentation with enforced OT/IT boundaries
  • 90-day patch records for all Tier 1 and Tier 2 systems, with documented exceptions
  • Application-level event logs capable of supporting anomaly detection and forensic review
  • Application-layer MFA audit trails, not just perimeter authentication records
  • An annual Cybersecurity Assessment Plan with documented owners and review cadence
  • Periodic third-party penetration testing, scoped and tracked to remediation

Each item is an evidence obligation. A CIP assessment does not evaluate intent; it evaluates records.

  • FAA AC 119-1A (OpSpec D301) adds a continuous obligation: every Boeing or Airbus manufacturer security document update triggers a 30-day window in which the carrier must verify that all ground-interfacing IT systems remain consistent with the updated security posture and revise the Aircraft Network Security Program accordingly. That verification is evaluated against a documented, current inventory of ground-to-aircraft interface systems, not a general statement of compliance.
  • RTCA DO-355A explicitly scopes the requirement to ground support information systems: software loading platforms, maintenance record systems, ACARS communications infrastructure, and security log extraction from aircraft networks. Legacy applications in any of these functions are within scope, regardless of the rest of the carrier’s compliance posture.

When the FAA’s August 2024 NPRM finalizes, RTCA DO-326B becomes binding. Current carrier discretion over which standards to apply and how to document them will be replaced by requirements with no operator opt-out.

Evidence RequiredRegulatory InstrumentAudit Trigger
Network segmentation documentation (OT/IT boundaries)TSA SD 1544.240CIP assessment
90-day patch records for Tier 1/2 systemsTSA SD 1544.240CIP assessment
Application-level event logs and anomaly detection recordsTSA SD 1544.240CIP assessment
Application-layer MFA audit trailsTSA SD 1544.240CIP assessment
Ground-to-aircraft interface system inventoryFAA AC 119-1A (OpSpec D301)ANSP review
ANSP revision records (30-day obligation)FAA AC 119-1AEach manufacturer security update
Ground support IT documentation and patch statusRTCA DO-355AFAA NPRM (binding on finalization)
Aviation operations regulatory instruments

What Happens If an Airline Fails a TSA Cybersecurity Audit

TSA’s January 2025 Enforcement Sanction Guidance lists operating without an approved Cybersecurity Implementation Plan as a sanctionable violation. 

Consequences scale from warning letters and compliance orders to civil monetary penalties and, in severe cases, suspension or revocation of operating certificates. A failed CIP assessment does not result in an immediate shutdown, but it triggers a remediation clock with TSA oversight on every subsequent step.

The enforcement posture has changed in one specific way that matters operationally: the January 2025 guidance removes ambiguity about what constitutes a violation. Prior to that update, TSA’s enforcement language left room for carriers to argue that a partially implemented CIP represented a good-faith compliance effort. 

That argument is no longer available. An incomplete or unapproved CIP is, by the current guidance, a sanctionable condition, not a finding subject to remediation before penalties attach.

For Part 121 carriers, certificate-level consequences are the operational ceiling. The more immediate exposure for most carriers is the remediation clock itself: TSA oversight on every subsequent compliance step, compressed timelines, and the documentation burden that a remediation engagement creates on top of normal operations. 

Carriers that enter that process with undocumented legacy systems face it without the foundation the process requires.

Why Legacy Aviation Stacks Cannot Meet These Requirements

The relevant distinction is between operational failure and structural failure. 

  • Operational failure is misconfiguration, a setting correctable through process improvement.
  • Structural failure is architectural: the system cannot produce the required output because it was not built to, and no configuration change, overlay, or compensating control will change that.

The legacy stacks running airline operations fail in the second category. A North American carrier flagged by FAA auditors in 2025 was running a VB6 ETOPS compliance monitor with 11,000 lines of code, four database integrations (Informix, Oracle, SQL Server, Access), zero documentation, mandatory December 2025 remediation deadline. Nobody could map what systems it touched. That is not an edge case. It is what a TSA CIP assessment finds when it hits an undocumented legacy system. 

The legacy stacks running airline operations fail in the second category.

Patch Management

TSA’s 90-day patch cycle requires an active vendor patch stream. VB6, Classic ASP, Java EE (pre-8), and EJB have no such stream. The requirement is not periodically missed, but is permanently unmet. There is no patch to apply because no patch will be issued.

The CISA Known Exploited Vulnerabilities catalog documents 1,484 confirmed-exploited CVEs as of 2025, including vulnerabilities from 2007 through 2017 actively weaponized in current attacks [2]. A carrier running these stacks cannot close these exposures through patch management because the channel no longer exists.

Continuous Monitoring and Access Control

TSA CIP continuous monitoring requires application-level event streams. Systems built in the VB6 and Classic ASP era predate structured logging as a standard practice as they produce no such stream. Network-layer monitoring overlays detect perimeter activity; they do not produce the application audit trail a forensic reviewer requires. Adding a SIEM to the perimeter does not close the gap.

The same logic applies to access control. Application-layer MFA event records are a CIP audit requirement. Legacy session management in VB6 and Classic ASP cannot produce them. Proxy logs capture authentication at the network boundary; they do not close the application-layer authentication chain that an auditor will examine.

The ANSP 30-Day Revision Problem

The FAA’s 30-day revision obligation requires carriers to certify that all ground-interfacing systems remain consistent with updated manufacturer security posture. That certification requires current, documented system inventories with traceable ground-to-aircraft interface records.

The carrier from the opening of this section is the exact illustration. Zero documentation means the 30-day clock expires, and the required artifact cannot be produced because the system was never mapped.

That is the structural problem. It cannot be solved by process improvement. It requires knowing what you have.

StackAviation FunctionPrimary Compliance Failure
VB6Crew tracking, dispatch, ETOPS monitoringNo patch stream; no structured logging; no dependency documentation
Classic ASP / .NET Framework 1.x–4.xWeight and balance, ops controlNo application-level event records; no MFA audit trail
Java EE / EJBOCC systems, crew schedulingNo active vendor security updates; no interface documentation
Undocumented ACARS middlewareAircraft-to-ground communicationsOutside scope of any compliance review; RTCA DO-355A non-compliant by omission

Cyber insurance underwriting now flags the same legacy stacks that TSA auditors target. The convergence is not coincidental as both are evaluating the same structural exposure.

Before any compliance program can be credibly executed, you need to know exactly what you’re dealing with in which systems interface with aircraft networks, where the patch gap sits, and what is undocumented. 

Legacyleap’s $0 Modernization Assessment produces that map. No modernization commitment required.

The Incidents Are Not Warnings. They Are Documentation.

IncidentDateFinancial ImpactStack FailureRegulatory Consequence
Delta / CrowdStrikeJul 2024$500M recovery costCrew-tracking architecture could not recover without manual interventionDOT investigation opened
Southwest AirlinesDec 2022$140M DOT civil penaltyCrew reassignment software failed under cascading volumeLargest DOT consumer penalty ever assessed
Sea-Tac / RhysidaAug 2024$6M ransom demandedRansomware entered through legacy employee and parking systems90,000 individuals affected

The structural failures described above have already produced documented, quantified consequences. Three incidents in the past four years establish what the legacy stack costs when it encounters operational stress.

  • Delta Air Lines / CrowdStrike (July 2024). The CrowdStrike update is widely described as the trigger for Delta’s collapse. It was not. It exposed an existing condition: Delta’s crew-tracking and scheduling stack could not recover from an infrastructure event without manual intervention at scale. The system required approximately 40,000 manual server reboots and could not synchronize crew state automatically. American Airlines, running a different architecture, recovered the same day [3]. The result: 7,000+ flights canceled, 1.3 million passengers affected, an estimated $500M in recovery costs.
  • Southwest Airlines (December 2022). Southwest’s operational failure produced a $140M DOT civil penalty, the largest ever assessed for consumer protection violations [4]. The cause was crew reassignment software that could not handle cascading volume during a weather event. 17,000 flights were canceled over 15 days. This is not the result of an external attack. It failed because its architecture could not execute the reassignment logic at the volume the event required. Elliott Management later cited the failure explicitly as an IT governance breakdown in its board overhaul campaign.
  • Port of Seattle / Sea-Tac (August 2024). Rhysida ransomware entered Sea-Tac Airport through, in the Port’s own words, “primarily legacy systems used for employee, contractor and parking data” [5]. Baggage handling, check-in kiosks, and display boards went offline. Staff reverted to handwritten boarding passes. 90,000 individuals were affected; a $6M ransom was demanded. The entry point was not a sophisticated exploit against a hardened system. It was structural access through aging infrastructure.

In each case, the failure was not the external event but the software update, the weather, or the ransomware. It was the legacy stack’s inability to recover, segment, or document its state under stress.

The Agency Requiring Your Compliance Is Failing Its Own

The April 2026 DOT Office of Inspector General audit of the FAA’s 45 high-impact National Airspace System systems found 1,836 of 16,245 required security controls not fully implemented [6]. Fifteen of those 45 systems are still running NIST SP 800-53 Revision 4, the superseded standard. Every system supporting automation, communications, navigation, and weather had untracked vulnerabilities.

The GAO documented the same condition in September 2024: 51 of 138 air traffic control systems classified as unsustainable, with some modernization completions projected 10 to 13 years out.

The January 2023 NOTAM outage is the concrete proof. A corrupted database file in an aging FAA ATC system triggered the first nationwide ground stop since September 11, 2001. No external threat actor. No sophisticated intrusion. Data corruption in a system without adequate redundancy.

The executive instinct when a regulator’s own failures become public is to read that as enforcement slack. The data points the other direction. NIST SP 800-53 Rev 5 is the control framework against which TSA CIP assessments are evaluated. 

The FAA’s Rev 4 gap is the same category of gap it will flag in carrier audits and an agency under Congressional scrutiny for its own infrastructure failures does not loosen its enforcement posture toward the carriers it regulates. It tightens it.

Why Network Monitoring Does Not Close the Audit Gap

TSA CIP assessments do not evaluate whether threats are being detected. They evaluate whether the evidence of compliant system behavior exists and can be produced on demand.

Network monitoring tools identify anomalous traffic at the perimeter. They do not make a VB6 system patchable. They do not generate the application-level event logs a CIP auditor requires. They do not produce the ground-to-aircraft interface inventory FAA AC 119-1A demands.

A SIEM deployed over a legacy stack produces perimeter visibility. It does not produce compliance documentation. The audit finding is written against the system, not the monitoring layer above it. Carriers that have invested in network monitoring and assume that investment closes their CIP exposure will discover the gap at the point of audit, not before it.

For carriers concerned about zero-downtime continuity during any remediation process, that question is addressed separately. The audit gap itself is not a continuity problem. It is a documentation and architecture problem, and monitoring tools are not designed to solve either.

The Stack You’re Running Is Now the Risk You Need to Quantify

Before any TSA CIP engagement or FAA ANSP revision process can proceed, three things need to be documented:

  • Which systems interface with aircraft networks – the ANSP inventory requirement
  • Which of those systems has no active vendor patch stream – the TSA 90-day patch gap
  • Which systems produce no application-level event logs – the continuous monitoring gap

Most carriers cannot answer all three from existing documentation. That is the starting condition a structured assessment addresses.

The incident record shows what structural failure costs at an operational scale. And the April 2026 DOT OIG findings confirm that the agency responsible for setting the compliance standard is under pressure to demonstrate it can enforce one.

The immediate action is not a modernization program. It is a visibility exercise: a structured inventory of which systems interface with undocumented aircraft networks, and where the patch gap sits. That inventory is what any TSA CIP engagement or FAA ANSP revision process requires before anything else can proceed. 

To understand the path forward once that picture exists, see our analysis of airline legacy system modernization.

If you cannot confirm which ground-interfacing systems have an active patch stream, that is the gap a TSA CIP assessment will find first. Legacyleap’s $0 Assessment maps it in 2 to 5 days: dependency graph, patch status, and interface inventory. No modernization work is required to start. 

Book a Demo to see how Legacyleap executes structured modernization of the stacks named in this article (VB6, Classic ASP, Java EE, and EJB) within the governance and audit requirements aviation compliance now demands.

FAQs

Q1. What does TSA Security Directive 1544.240 require from airlines?

TSA SD 1544.240 requires TSA-regulated airports and Part 121 air carriers to develop and maintain an approved Cybersecurity Implementation Plan covering four domains: network segmentation, patch management, continuous monitoring, and access control. The CIP must be submitted to TSA for approval and kept current. Operating without an approved CIP is explicitly listed as a sanctionable violation under TSA’s January 2025 Enforcement Sanction Guidance. Carriers must also maintain annual assessment cadences and document compensating controls wherever patch exceptions are declared.

Q2. What happens if an airline fails a TSA cybersecurity audit?

Consequences under TSA’s January 2025 Enforcement Sanction Guidance scale from formal warning letters and compliance orders to civil monetary penalties and, in severe cases, certificate suspension or revocation. A failed audit does not trigger an immediate shutdown, but it starts a remediation clock under active TSA oversight. Every subsequent compliance step is monitored, and the documentation burden intensifies precisely when operational teams are least resourced to absorb it. Carriers with undocumented legacy systems enter that process without the system inventory the remediation requires.

Q3. What is an Aircraft Network Security Program under FAA AC 119-1A?

FAA AC 119-1A governs the Aircraft Network Security Program requirement for OpSpec D301 carriers. An ANSP is a documented set of policies, procedures, and controls covering all IT systems that interface with aircraft networks, including ground support systems, maintenance platforms, and ACARS infrastructure. The 30-day revision obligation is the most operationally demanding aspect: every manufacturer security document update requires carriers to verify that all ground-interfacing systems remain consistent with the updated posture and revise the ANSP accordingly. That verification cannot be executed without a current, documented system inventory.

Q4. Why can VB6 and Java EE systems not meet TSA patch management requirements?

TSA SD 1544.240 requires a 90-day patch cycle for all Tier 1 and Tier 2 systems. That requirement assumes an active vendor patch stream. VB6, Classic ASP, and Java EE (pre-version 8) have no active vendor support and no patch stream. There is no patch to apply. The compliance gap is not a missed cycle but a permanent structural condition. No process improvement, monitoring overlay, or compensating control substitutes for patches that do not exist. CISA’s Known Exploited Vulnerabilities catalog confirms that CVEs from these stacks dating to 2007 remain actively weaponized.

Q5. Are MRO software systems subject to FAA cybersecurity requirements?

Yes, where those systems interface with aircraft networks or ground support functions covered by RTCA DO-355A. The standard explicitly covers software loading systems, maintenance record platforms, and security log extraction from aircraft networks. An MRO system that interfaces with any of these functions falls within the DO-355A scope and, once the FAA’s pending NPRM finalizes, within binding airworthiness regulations. Carriers and MRO providers that treat maintenance software as outside the cybersecurity compliance perimeter are applying a scope interpretation the forthcoming rule does not support.

References

[1] TSA Security Directive SD 1544.240 and Emergency Amendment (March 2023) + TSA Enforcement Sanction Guidance (January 2025). https://www.tsa.gov/for-industry/surface-transportation-cybersecurity 

[2] CISA Known Exploited Vulnerabilities (KEV) Catalog (2025). https://www.cisa.gov/known-exploited-vulnerabilities-catalog 

[3] Delta Air Lines / CrowdStrike Incident (July 2024). https://www.transportation.gov/briefing-room/us-dot-statement-delta-air-lines-cancellations 

[4] Southwest Airlines DOT Civil Penalty (December 2022 / Settlement 2023). https://www.transportation.gov/briefing-room/biden-harris-administration-fines-southwest-airlines-140-million-holiday-2022-meltdown 

[5] Port of Seattle / Sea-Tac Rhysida Ransomware Attack (August 2024). https://www.portseattle.org/news/port-seattle-statement-cyber-security-incident 

[6] DOT Office of Inspector General Audit Report (April 1, 2026). https://www.oig.dot.gov/library-item/43100 

Share the Blog

Latest Blogs

Legacy Software Compliance Risk: The 2026 Enforcement Guide

Legacy Software Compliance Risk: The 2026 Enforcement Landscape

Airline Operations Software Modernization

Airline Operations Software Modernization: A Guide for Aviation IT Teams Who Cannot Afford Downtime

Policy Administration System Modernization

Transportation Management System Modernization: A Guide for Logistics Companies on Legacy TMS Platforms

Policy Administration System Modernization

Policy Administration System Modernization: A 2026 Guide for Insurance IT Teams Ready to Act

Zero-downtime migration

How to Modernize a Business-Critical Application That Cannot Go Offline During Migration

Manufacturing Execution System (MES) Modernization

Manufacturing Execution System Modernization: A Guide for Industrial Teams Upgrading Legacy Production Software

Technical Demo

Book a Technical Demo

Explore how Legacyleap’s Gen AI agents analyze, refactor, and modernize your legacy applications, at unparalleled velocity.

Watch how Legacyleap’s Gen AI agents modernize legacy apps ~50-70% faster

Want an Application Modernization Cost Estimate?

Get a detailed and personalized cost estimate based on your unique application portfolio and business goals.