Aviation Cybersecurity Governance: Towards an Operational Framework and Solutions Agenda for the Airport Domain
Abstract
1. Introduction
2. Research Method
3. Results
3.1. RO1: To Develop a Provisional Conceptual Framework (PCF) for Subsequent Analysis of Cybersecurity Vulnerabilities in the Airport Domain
3.2. RO2: To Classify the Key Cybersecurity Vulnerabilities in the Airport Domain Based on the PCF
3.2.1. Technology Dimension
3.2.2. People Dimension
3.2.3. Organization Dimension
3.3. RO3: To Establish an Operational Framework for the Governance of Cybersecurity in the Airport Domain with an Associated Solutions Agenda
3.3.1. Technology Dimension
3.3.2. People-Related Dimension
3.3.3. Organization Dimension
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Civil Aviation Cybersecurity Landscape: Authorities and Industry Organizations, and Regulatory Instruments
| Related References | Authority/Agency/Institute | Standard/Regulation/Act/Document | Subject Area |
|---|---|---|---|
| [37] | IATA (International Air Transport Association) | Air Transport Security | Airlines |
| [28] | FAA (Federal Aviation Administration) Transportation Research Board | Airport Cooperative Research Program | US-based airlines and airports |
| [10] | Société Internationale de Télécommunications Aéronautiques (SITA): | Air Transport IT Insights | Airlines and Airports |
| [43,44,45] | EU | Directive on the Resilience of Critical Entities Network and Information Systems Directive 2 Cyber Resilience Act | EU member states |
| [9] | European Centre for Cybersecurity in Aviation (ECCSA) of the European Union Aviation Safety Agency (EASA) | Easy Access Rules for Information Security | Companies, Organizations, and Institutions in EASA Member States |
| [15] | UK Civil Aviation Authority (UKCAA) | Cyber Security Oversight Process for Aviation | UK airlines and airports |
| [11,12,13,46] | ICAO (International Civil Aviation Organization) | Aviation Cybersecurity Strategy Cybersecurity Policy Guidance Cybersecurity Culture | Countries |
| [40] | International Standards Organization | ISO/IEC 27001:2022 Information Security Management Standard | Countries |
| [34] | ENISA (the European Union Agency for Cybersecurity) | Securing Smart Airports | EU member states |
| [47] | Turkish Directorate General of Civil Aviation | Instruction on Cybersecurity for Civil Aviation Enterprises (SHT-SİBER, 2022) | Airlines, airports, and Air Traffic Control services in Türkiye |
| [25] | Qatar Civil Aviation Authority | Aviation Cyber Security Guidelines | Airlines, airports, and Air Traffic Control systems in Qatar |
| [42] | Airports Council International (ACI) | Airport Excellence (APEX) in Cybersecurity Assessment Program | Airports (cybersecurity assessment; airports of all sizes) |
References
- Leśnikowski, W. Threats from Cyberspace for Civil Aviation. Wiedza Obron. 2021, 276, 124–153. [Google Scholar] [CrossRef]
- Cooper, P. Aviation Cybersecurity: Finding Lift, Minimizing Drag; Atlantic Council, Brent Scowcroft Center on International Security: Washington, DC, USA, 2017. [Google Scholar]
- Mrežar, M. PNR Agreements and Related Cybersecurity Risks. Master’s Thesis, University of Zagreb, Zagreb, Croatia, 2023; pp. 34–38. [Google Scholar]
- Żmigrodzka, M. Cybersecurity—One of the Greatest Challenges for Civil Aviation in the 21st Century. Saf. Def. 2020, 6, 33–41. [Google Scholar] [CrossRef]
- Ukwandu, E.; Ben-Farah, M.A.; Hindy, H.; Bures, M.; Atkinson, R.; Tachtatzis, C.; Andonovic, I.; Bellekens, X. Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends. Information 2022, 13, 146. [Google Scholar] [CrossRef]
- Janson, M. Enhancing Cyberspace Monitoring in the United States Aviation Industry: A Multi-Layered Approach for Addressing Emerging Threats. Doctoral Dissertation, Embry-Riddle Aeronautical University, Daytona Beach, FL, USA, 2023. [Google Scholar]
- Hilderman, V. Why Aviation Needs to Prioritise Cybersecurity. Airport World. 2023. Available online: https://airport-world.com/why-aviation-needs-to-prioritise-cybersecurity/ (accessed on 20 April 2025).
- Grygorov, O.; Basysta, A.; Yedeliev, R.; Paziuk, A.; Tropin, Z. International Cyber Security Strategy as a Tool for Comprehensive Security Assurance of Civil Aviation Security: Methodological Considerations. Int. J. Comput. Sci. Netw. Secur. 2021, 21, 332–337. [Google Scholar]
- European Centre for Cybersecurity in Aviation (ECCSA). Easy Access Rules for Information Security. 2023. Available online: https://www.easa.europa.eu/en/document-library/easy-access-rules/first-easy-access-rules-information-security-regulations-eu (accessed on 27 May 2025).
- SITA. 2018 Air Transport Cybersecurity Insights. SITA. 2018. Available online: https://www.sita.aero/resources/surveys-reports/air-transport-cybersecurity-insights-2018/ (accessed on 27 May 2025).
- ICAO. Cybersecurity Action Plan. 2022. Available online: https://www.icao.int/aviationcybersecurity/Pages/Cybersecurity-Action-Plan.aspx (accessed on 9 April 2024).
- ICAO. Aviation Cybersecurity Strategy. 2019. Available online: https://www.icao.int/aviationcybersecurity/Pages/Aviation-Cybersecurity-Strategy.aspx (accessed on 9 April 2025).
- ICAO. Cybersecurity Policy Guidance. 2022. Available online: https://www2023.icao.int/aviationcybersecurity/Documents/Cybersecurity%20Policy%20Guidance.EN.pdf (accessed on 9 April 2025).
- UK Civil Aviation Authority. Policy, Oversight, Strategy, Regulations. 2018. Available online: https://www.caa.co.uk/commercial-industry/cyber-security/ (accessed on 27 May 2025).
- UK Civil Aviation Authority CAP1753. Cyber Security Oversight Process for Aviation. 2024. Available online: https://www.caa.co.uk/our-work/publications/documents/content/cap1753/ (accessed on 27 May 2025).
- Snyder, H. Literature review as a research methodology: An overview and guidelines. J. Bus. Res. 2019, 104, 333–339. [Google Scholar] [CrossRef]
- Bell, E.; Harley, B.; Bryman, A. Business Research Methods, 6th ed.; Oxford University Press: Oxford, UK, 2022. [Google Scholar]
- de-Miguel-Molina, B.; de-Miguel-Molina, M.; Albors, J. How to undertake a literature review through bibliometrics. An example with review about user innovation. In 1st International Conference on Business Management; Universitat Politècnica de València: Valencia, Spain, 2015; Available online: https://www.semanticscholar.org/paper/How-undertake-a-literature-review-through-An-with-de-Miguel-Molina-de-Miguel-Molina/4954253df6065920aa633275cf6ae89d091405c1 (accessed on 8 May 2025).
- Braun, V.; Clarke, V. Using thematic analysis in psychology. Qual. Res. Psychol. 2006, 3, 77–101. [Google Scholar] [CrossRef]
- Heeks, R. Information Systems and Developing Countries: Failure, Success, and Local Improvisations. Inf. Soc. 2002, 18, 101–112. [Google Scholar] [CrossRef]
- Clegg, C.; Axtell, C.; Damodaran, L.; Farbey, B.; Hull, R.; Lloyd-Jones, R.; Nicholls, J.; Sell, R.; Tomlinson, C. Information technology: A study of performance and the role of human and organizational factors. Ergonomics 1997, 40, 851–871. [Google Scholar] [CrossRef]
- Yusof, M.; Takeda, T.; Shima, Y.; Mihara, N.; Matsumura, Y. Evaluating health information systems-related errors using the human, organization, process, technology-fit (HOPT-fit) framework. Health Inform. J. 2025, 30, 14604582241252763. [Google Scholar] [CrossRef] [PubMed]
- Metin, B.; Özhan, F.G.; Wynn, M. Digitalisation and Cybersecurity: Towards an Operational Framework. Electronics 2024, 13, 4226. [Google Scholar] [CrossRef]
- Hill, M. Airports Ill-Equipped to Deal with Major Cyber-Attacks. InfoSecurity Magazine. 2018. Available online: https://www.infosecurity-magazine.com/news/airports-illequipped-cyberattacks/#:~:text=increased%20technology%20usage%2C%20hyper%2Dconnectivity%2C%20data%2Dsharing%20obligations%2C%20customer,remote%20towers%20and%20airports%20as%20mega%20hubs (accessed on 12 November 2025).
- Qatar Civil Aviation Authority. Aviation Cybersecurity Guidelines. 2019. Available online: http://books.caa.gov.qa/books/whlt/#p=1 (accessed on 27 May 2025).
- Kör, B.; Metin, B. Understanding human aspects for an effective information security management implementation. Int. J. Appl. Decis. Sci. 2021, 14, 105–122. [Google Scholar] [CrossRef]
- Pratt, M. What is GRC? The Rising Importance of Governance, Risk, and Compliance. CIO. 2023. Available online: https://www.cio.com/article/230326/what-is-grc-and-why-do-you-need-it.html (accessed on 9 July 2025).
- Murphy, J.R.; Sukkarieh, M.; Haas, J.; Hriljac, P. Airport Cooperative Research Program Report 140: Guidebook on Best Practices for Airport Cybersecurity; FAA: Washington, DC, USA; Transportation Research Board: Washington, DC, USA; The National Academies Press: Washington, DC, USA, 2015.
- Spaniel, D.; Eftekhari, P. Hacking Our Nation’s Airports: Cyber-Kinetic Threats to the Technologies Running Airport Operations; Institute for Critical Infrastructure Technology: Washington, DC, USA, 2019. [Google Scholar]
- Goudge, S. Cyber Security and Resilience Symposium: Towards a Resilient Aviation Cyber Space; ICAO MID: Amman, Jordan, 2019.
- Lykou, G.A.; Anagnostopoulou, A.; Gritzalis, D. Smart Airport; PWC: New York, NY, USA, 2018. [Google Scholar]
- Mutluturk, M.; Kor, B.; Metin, B. The Role of Edge/Fog Computing Security in IoT and Industry 4.0 Infrastructures: Edge/Fog-based Security in Internet of Things. In Research Anthology on Edge Computing Protocols, Applications, and Integration; IGI Global: Hershey, DC, USA, 2021. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access 2020, 8, 207602–207618. [Google Scholar] [CrossRef]
- ENISA. Securing Smart Airports; ENISA: Heraklion, Greece, 2016. Available online: https://www.enisa.europa.eu/publications/securing-smart-airports (accessed on 7 July 2025).
- Mutluturk, M.; Metin, B. Mapping the Phishing Attacks Research Landscape: A Bibliometric Analysis and Taxonomy. J. Theor. Appl. Inf. Technol. 2023, 101, 21. [Google Scholar]
- SITA. 2023 Air Transport IT Insights; Société Internationale de Télécommunications Aéronautiques (SITA): Geneva, Switzerland, 2023. [Google Scholar]
- IATA. Air Transport Security: 2040 and Beyond; International Air Transport Association: Montreal, QC, Canada, 2019. [Google Scholar]
- Dursun, S.M.; Mutluturk, M.; Taskin, N.; Metin, B. An Overview of the IT Risk Management Methodologies for Securing Information Assets. In Cases on Optimizing the Asset Management Process; IGI Global: Hershey, PA, USA, 2022; pp. 30–47. [Google Scholar] [CrossRef]
- Metin, B.; Duran, S.; Telli, E.; Mutlutürk, M.; Wynn, M. IT Risk Management: Towards a System for Enhancing Objectivity in Asset Valuation that Engenders a Security Culture. Information 2024, 15, 55. [Google Scholar] [CrossRef]
- ISO/IEC 27001:2022; Information Technology—Security Techniques—Information Security Management Systems—Requirements. International Organization for Standardization: Geneva, Switzerland, 2022.
- Lufthansa Industry Solutions. Cyber Security Survey: Only One in Two Employees Believe Their Company is at Risk from Hackers. 2024. Available online: https://www.lufthansa-industry-solutions.com/de-en/newsroom-downloads/news/new-white-paper-and-survey-on-cyber-security (accessed on 9 November 2025).
- Airports Council International (ACI). APEX in Cybersecurity Assessment Program. Available online: https://aci.aero/programs-and-services/apex/host-an-apex-review/apex-in-cybersecurity-assessment-program/ (accessed on 9 November 2025).
- CER Directive. Directive (EU) 2022/2557 of the European Parliament and of the Council of 14 December 2022, on the Resilience of Critical Entities. Official Journal of the European Union, L333/99. 2022. Available online: https://eur-lex.europa.eu/eli/dir/2022/2557/oj/eng (accessed on 15 December 2025).
- NIS2 Directive. Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on Measures for a High Common Level of Cybersecurity Across the Union (OJ L 333, 27 December 2022, pp. 80–134). EUR-Lex. Available online: https://eur-lex.europa.eu/eli/dir/2022/2555/oj/eng (accessed on 15 December 2025).
- CRA. Cyber Resilience Act, 2024. European Parliament and the Council of the European Union. Available online: https://www.europarl.europa.eu/doceo/document/TA-9-2024-0130_EN.html (accessed on 30 May 2025).
- ICAO. Cybersecurity Culture in Civil Aviation. 2022. Available online: https://www.icao.int/sites/default/files/Security/documents/ICAO-Cybersecurity-Culture-in-Civil-Aviation_EN.pdf (accessed on 9 April 2025).
- Turkish DGCA (Directorate General of Civil Aviation). Instruction on Cybersecurity for Civil Aviation Enterprises. 2022. Available online: https://web.shgm.gov.tr/documents/sivilhavacilik/files/mevzuat/sektorel/talimatlar/2022/SHT-Siber.pdf (accessed on 9 November 2025).
- Filinovych, V.; Hu, Z. Aviation and the Cybersecurity Threats. Adv. Econ. Bus. Manag. Res. 2021, 188, 120–126. [Google Scholar]





| Interviewee | Experience (yrs) | Age | Gender | Role/Position | Organization |
|---|---|---|---|---|---|
| P1 | 3 | 26 | Female | Air Traffic Control/Electronics Engineer | General Directorate of State Airports Authority |
| P2 | 3 | 37 | Male | IT Infrastructure & Operations Senior Manager | Airline Company |
| P3 | 17 | 45 | Male | Information Security and Compliance Lead Analyst | Airline Company |
| P4 | 18 | 43 | Male | Cyber Security Manager | Airline Company |
| P5 | 20 | 38 | Male | Chief Information Security Officer | Airport Company |
| P6 | 28 | 50 | Female | IT and Automation Director | Airport Company |
| P7 | 25 | 49 | Male | VP of Information Technology | Airline Company |
| P8 | 5 | 35 | Female | Senior Information Security Engineer | Airline Company |
| P9 | 26 | 49 | Male | Information Security and Business Continuity Manager | Airport Company |
| P10 | 22 | 50 | Male | Chief Information Security Officer | Airport Company |
| Dimension | Sub-Theme | Initial Codes (Analytical Segments) | Synthesis | Interviewees | Representative Interview Quotations |
|---|---|---|---|---|---|
| Technology | Legacy IT/OT weaknesses | Outdated hardware; Protocols built 50 years ago; Lack of patch support; Windows XP machines. | Decades-old IT and OT platforms (e.g., baggage SCADA, avionics) cannot support modern security controls and remain unpatched. | P2, P3, P5, P6, P8, P10 | “Some airports still run systems on Windows XP machines.”—P6 “There are protocols running in operators, built like 40–50 years ago. Still, text-based protocols are running…”—P2 |
| API & web-application exposure | API security criticality; Bot-driven attacks; Web application vulnerability; Millions of daily users. | Public APIs serving millions of users become prime bot-driven attack vectors without mature authentication & monitoring. | P7 | “Millions of users connect through web applications and APIs daily.”—P7 “Microservices and the environments where APIs are hosted… must be protected.”—P7 | |
| Cloud services shortcomings (data-localisation constraints) | Data localization laws; Domestic hosting mandates; Sovereignty constraints. | National data-localisation laws block adoption of secure cloud platforms, forcing on-prem legacy stacks. | P6, P7 | “Regulations keep data within the country, impacting the use of cloud services.”—P7 Cloud computing—airports are not allowed as ‘critical infrastructure’—must be hosted in Turkey.”—P6 | |
| Emerging technology (AI/IoT) attack-surface growth | Aviation 4.0 risks; Sensor proliferation; Zero-day threats in automation; Uncontrolled AI usage. | Rapid rollout of IoT sensors & AI workflows increases zero-day and supply-chain exposures that legacy controls cannot track. | P5, P7, P9, P10 | “With new technologies like AI, there’s a potential for more vulnerabilities.”—P7 “Baggage handling system has many sensors—increases the threat surface area.”—P9 | |
| Need for proactive security operations & testing | Penetration tests on all infrastructure; Vulnerability scanning; Red teaming exercises; Continuous monitoring. | The shift from reactive to proactive security through a continuous cycle of technical validation (e.g., penetration testing, red teaming) to identify and remediate infrastructure vulnerabilities before they can be exploited by adversaries. | P8, P9, P10 | “…proactive threat modeling, using ‘Red Team’ and ‘Purple Team’ exercises to find vulnerabilities before they are exploited”—P8 “Conduct regular penetration testing, including red teaming exercises… to proactively find and fix vulnerabilities.”—P10 “Penetration tests undertaken on all infrastructure… The agenda is built on a cycle of continuous security operations.”—P9 | |
| Insufficient Threat Intelligence & Information Sharing | Aviation cyber-threat-intelligence network; Sharing threat intelligence across ecosystem; Inadequate information sharing regarding incidents; Weak communication hindering sharing. | Besides existing cyber threat intelligent solutions, the imperative for a centralized, aviation-specific intelligence-sharing framework to overcome existing information asymmetry between stakeholders and enhance the collective defensive posture of the entire airport ecosystem. | P1, P3, P5, P8 | “Aviation cyber-threat-intelligence network… information asymmetry in a hyper-connected industry is fatal.”—P1 “Threat intelligence should be shared across the aviation ecosystem as a process improvement.”—P3 “Lack of information shared about incidents involving airlines or third parties is a major gap.”—P8 | |
| People-related | Poor cyber awareness levels (and phishing) | Tick-box training; Forgetting procedures; Phishing susceptibility. | Mandatory training is seen as a tick-box; staff, crew & management remain vulnerable to phishing & social engineering. | P2, P5, P6, P8, P10 | “I believe the current cybersecurity awareness programs are not working well. They are just procedures that people forget in two hours.”—P2 “Airport staff are vulnerable to spam emails, which can lead to computer compromises.”—P8 |
| Skills shortage & retention | Salary competition; Loss of historical memory; Cyber-talent drain; Expertise gap. | Shortage of aviation-savvy cyber talent and high turnover undermine in-house security capability. | P4, P6, P2, P8, P9, P10 | “It is difficult to find qualified cyber-security staff… a global problem.”—P6 “I believe the current cybersecurity awareness programs are not working well. They are just procedures that people forget in two hours.”—P2 “Airport staff are vulnerable to spam emails, which can lead to computer compromises.”—P8 | |
| Unregulated social media usage | Sharing badge cards online; Unauthorized duplication risk; Personal device leaks. | Sharing badge cards online, personal device comprimise risks, phising using social media | P5, P8 | “Employees unknowingly expose security risks by sharing images of their badge cards on social media.”—P5 “Crew’s limited training on detecting phishing attempts; social media can be a cybersecurity risk.”—P8 | |
| Organization | Uneven vendor/third-party security postures | Retail shops autonomy; Catering risks; Ecosystem maturity variance; Audit difficulty. Ground handling turnover; Contractor awareness gaps; Vendor as weakest link. | Hundreds of external entities with uneven security postures create back-door risk to airport core. Contractor staff lack security maturity, becoming the “weakest link”. Breaches in vendor systems propagate into airport operations, amplifying impact. | P3, P4, P5, P6, P7, P8, P10 | “Airports are ecosystems… suppliers are difficult to control.”—P6 “A breach in any vendor can back door the airport’s critical infrastructure.”—P3 “Outsourced and third-party companies constitute risk. Need to be managed.”—P4 “It recently changed actually… and it became the weakest link. Is the vendor right now?”—P3 “Suppliers are assessed… but difficult to control—e.g., cashier in Macdonalds.”—P6 |
| Continuous service requirements (24 × 7 operations vs. security) | Availability over patching; Downtime pressure; Deferred maintenance window. | Continuous service requirements delay patching and slow incident response, prioritising uptime over security. | P2, P5, P8, P10 | “In aviation, availability is very important. If a system goes down for two hours, thousands of passengers can be stuck.”—P2 “Inability to apply security patches during flight operations.”—P8 “Information security, cybersecurity-related risks should be considered the same as safety risks, as it can eventually affect people’s lives.”—P3 “Cybersecurity can be better if risks are evaluated very well. Managing risks effectively leads to solving problems effectively.”—P8 | |
| Change management & procedural weaknesses | Bypassing procedures for speed; Inadequate CNS protocols; Non-standardized setups. | Weak change-management and missing certifications allow insecure updates and configurations. | P1, P2, P7, P8 | “Importance of following procedures for technology updates.”—P7 “In operations, time is very critical… they should not bypass procedures. Instead, they must follow the procedures.”—P1 “Everyone acts differently across countries… lacking standards leads to workarounds.”—P2 | |
| Lack of corporate data ownership/data governance deficit | Data classification deficit; Integration mapping gaps; Missing owner roles. | Missing data ownership, classification & integration mapping elevates systemic risk. | P3, P7 | “Labeling data and understanding integrations is more vital than the cyber-security of the systems.”—P7 “Missing data ownership, classification & integration mapping elevates systemic risk.”—P3 | |
| Reactive security posture | Bolting on security late; Old cultural behaviors; Post-incident investment. | Security bolted on after deployment; limited executive oversight leads to reactive culture. | P3, P5, P6 | “Some old cultural behaviours and reactive approaches still exist.”—P3 “Many organizations only invest in cybersecurity improvements after regulatory audits or security incidents.”—P5 | |
| Overlapping & inconsistent regulations | Regulatory lag; Duplicate audits; Country maturity variance; Compliance fatigue. Global certification needs; Independent global audit; Sector-wide standardization. | Multiple national frameworks impose duplicate audits and conflicting controls. | P6, P8, P10 | “Many overlaps within these regulations.”—P8 “The maturity level of standards varies from country to country.”—P10 “Independent audits are not conducted on suppliers… International standards must be complied with; establish independent audit organizations.”—P1 | |
| Weak management structure | Non-unified protocols; Disjointed response plans; Reporting line ambiguity. | Non-unified security processes between airlines, airport vendors, authorities; Disjointed response plans; Indirect reporting lines (Cyber operations to CIO) | P3, P6, P8, P10 | “Multiple entities… working together without unified cybersecurity protocols. Disjointed incident response plans can lead to delays.”—P10 “Strategic Imperative: Create centralized governance for cybersecurity to streamline efforts across stakeholders.”—P10 “Governance must understand the business side requirements.”—P8 “Cyber Security does not report directly to CIO but dotted line to IT/CIO.”—P3 | |
| Lack of AI governance & defensive integration | Trusted AI environments; Controlled AI usage; AI-driven threat detection; AI-enhanced attack resilience; Regulatory lag regarding AI. | Establishing a strategic framework to manage the dual-nature of Artificial Intelligence in aviation; focusing on controlled deployment within trusted environments to mitigate new vulnerabilities while leveraging AI-driven analytics for advanced threat detection and defensive automation. | P1, P3, P4, P5, P7, P8, P10 | “AI is used, but closely controlled. Using AI in uncontrolled, open-source environments may introduce new vulnerabilities.”—P4 “With new technologies like AI, there’s a potential for more vulnerabilities to be found… alongside the possibility of AI helping to patch them.”—P7 “Continuous and intelligent sophisticated attacks with AI and automations… airport operating processes.”—P10 |
| Governance/Compliance Objective | Dimension | Concrete Actions to Mitigate Risk | Priority | Implementation Term | Interviewee Support |
|---|---|---|---|---|---|
| Secure the expanding digital surface | Technology | Defence-in-Depth modernisation: upgrade legacy HW/SW, robust encryption, continuous monitoring & resilient back-ups (P1); AI & Advanced Monitoring: Deploy API bot-mitigation, Zero-Trust controls, and AI-based SOC analytics (P5, P7, P8, P10); Proactive Testing: Conduct continuous penetration testing, vulnerability scanning, and Red/Purple Teaming exercises (P8, P9, P10) | Critical | Short to Medium Term | P1, P5, P6, P7, P8, P9, P10 |
| Treat cyber risk as a flight-safety hazard | Technology/Organisational | Integrate cyber scenarios into Safety Management System & run joint tabletops (P3, P7); continuous third-party risk scoring & right-to-audit (P6, P10). | High | Immediate/Ongoing | P3, P6, P7, P10 |
| Institutionalize practical, role-specific training | People-related | Scenario-based drills & run-books (P1); micro-learning & phishing simulations (P2, P10); bonded scholarship/apprenticeship pipeline (P6, P8). Implement phishing simulations and awareness campaigns and policy regarding “uncontrolled social media usage” (P5, P8) | High | Immediate | P1, P2, P5, P6, P8, P10 |
| Embed procedural discipline & 24 × 7-safe change | Organisational/Technology/People-related | Specialised OT change-control procedures (P1); change windows tied to Safety Risk Matrix, patch rollback rehearsals (P5, P10); tier-1 SOC with safety-critical playbooks (P7, P8). OT Mindset Shift: Transition OT management from TCO focus to a full security lifecycle approach (P10) | Medium | Medium Term | P1, P5, P7, P8, P10 |
| Elevate cyber governance & shared intelligence | Organisation/Technology | Aviation Cyber Threat-Intelligence Network: Establish a sector-wide intelligence sharing network to eliminate information asymmetry (P1, P3, P5, P8); board-level Cyber Governance Council with safety-linked KPIs (P3, P6); data-integration inventory & owner assignment (P7). Unified Leadership: Establish a board-level Cyber Governance Council and address weak management structures by unifying disjointed protocols across stakeholders (P10); AI & Data Governance: Enforce trusted AI environments, formalize data ownership, and implement data classification (P4, P7) | Strategic | Medium to Long Term | P1, P3, P4, P5, P6, P7, P8, P10 |
| Modernize and harmonize oversight | Organisation | Update standards & create independent global audit bodies (P1); ICAO/EASA binding cyber-certifications (P7); recognise secure-cloud equivalence, streamline audits (P6, P8, P10). | Strategic | Long Term | P1, P6, P7, P8, P10 |
| Statement | P1 | P2 | P5 | P8 | P10 | P11 | P12 |
|---|---|---|---|---|---|---|---|
| 1. Overall, the framework provides a realistic assessment of current cybersecurity vulnerabilities and related governance and compliance issues in the airport domain | SA | A | SA | A | A | A | SA |
| 2. The Risk–Governance–Compliance perspective is appropriate for a comprehensive assessment of cybersecurity in the airport domain. | SA | SA | SA | A | A | SA | SA |
| 3. The classification of issues around the three change dimensions of technology–process–people provides a logical basis for developing appropriate solutions. | SA | SA | SA | A | SA | A | SA |
| 4. The framework can be used in practice as a guide to support the monitoring and analysis of cybersecurity issues in the airport domain. | SA | A | SA | A | SA | SA | SA |
| 5. The governance objectives and concrete actions are clear, actionable and aligned with the operational framework. | SA | A | SA | A | A | A | SA |
| 6. The framework adequately covers key third-party and supply-chain dependencies (e.g., airlines, ground handlers, OT vendors, regulators) that materially influence airport cybersecurity risk. | A | A | SA | A | A | N | SA |
| 7. Implementing the framework is feasible in typical airport operating conditions (legacy OT, outsourcing, budget/skills constraints), and the framework provides sufficient guidance to prioritize actions over time | A | A | SA | N | A | SA | A |
| Identify Vulnerabilities | Implement Governance Measures & Policies | Monitor & Apply Regulatory & Legislative Requirements | |
|---|---|---|---|
| Technology Aspects | Legacy IT/OT weaknesses Cloud services shortcomings AI/IoT attack surface growth API & web-application exposure Need for Proactive Security Operations & Testing Insufficient Threat Intelligence & Information Sharing | Upgrade legacy hardware and software Zero-Trust policy for legacy OT segments Resilient back-up procedures Exploit AI-driven analytics Apply ubiquitous encryption Vendor risk scoring/contractual right to audit Incorporate cyberattacks simulations in safety management system Secure the expanding digital surface Continuous Proactive Testing (Red/Purple Teaming) | Data security: Adhere to ISO/IEC 27001 Monitor ICAO cybersecurity platform Proactive Security Operations & Testing |
| People-related Factors | Unregulated social media use Poor cyber awareness levels Skills shortage & retention problems | Scenario-based drills Innovative schemes for cyber-talent retention Immersive learning for current staff Phishing simulations Policy for uncontrolled social media usage | Institutionalize practical, role specific training |
| Organizational Issues | Lack of corporate data ownership Reactive security posture Weak management structures Overlapping/inconsistent regulations Uneven vendor/third-party security postures Continuous service requirements (vs. cyber resilience) Change management & procedural weaknesses Lack of AI Governance & Defensive Integration Budget-driven (TCO) vs. Security-driven mindset | Formalize data ownership Embed procedural discipline Tailored change-control Implement tier-1 security-operations centre Data integration mapping/cross-sector data trust models Inter-organizational cyber-threat-intelligence network Treat cyber risk as flight-safety hazard Supply chain/ISP governance AI Governance & Trusted AI environments OT Mindset Shift (Security Lifecycle focus) | Elevate cyber governance & shared intelligence Modernize & harmonize oversight |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Metin, B.; Dümer, H.B.; Wynn, M. Aviation Cybersecurity Governance: Towards an Operational Framework and Solutions Agenda for the Airport Domain. Information 2026, 17, 177. https://doi.org/10.3390/info17020177
Metin B, Dümer HB, Wynn M. Aviation Cybersecurity Governance: Towards an Operational Framework and Solutions Agenda for the Airport Domain. Information. 2026; 17(2):177. https://doi.org/10.3390/info17020177
Chicago/Turabian StyleMetin, Bilgin, Hasan Burak Dümer, and Martin Wynn. 2026. "Aviation Cybersecurity Governance: Towards an Operational Framework and Solutions Agenda for the Airport Domain" Information 17, no. 2: 177. https://doi.org/10.3390/info17020177
APA StyleMetin, B., Dümer, H. B., & Wynn, M. (2026). Aviation Cybersecurity Governance: Towards an Operational Framework and Solutions Agenda for the Airport Domain. Information, 17(2), 177. https://doi.org/10.3390/info17020177

