Aviation Incident Response Guide: How to Respond to a Cyberattack on an Airline or Airport
A ransomware attack hits your airline at 03:00 on a Monday morning. Reservation systems are encrypted. Ground handling cannot process check-ins for the first departure bank at 06:00. You have three hours before operational disruption becomes public. What do you do? Who do you call? What must you report, and to whom? Aviation incident response is not the same as enterprise IT incident response. The operational, safety, regulatory, and reputational stakes are higher. The regulatory notification requirements span multiple authorities. And the media and public scrutiny is intense. This guide provides a practical framework for aviation cybersecurity incident response.
Aviation operators must notify the CAA (NIS incidents), ICO (personal data breaches within 72 hours), and potentially EASA — all while managing operational disruption and media scrutiny.
The First 24 Hours: Immediate Response Actions
The first 24 hours of an aviation cyber incident determine how much damage is done and how long recovery takes. Immediate actions:
- Activate incident response team: Assemble security, IT, operations, legal, communications, and senior management
- Contain and isolate: Isolate affected systems from networks to prevent further propagation — but check operational impact before disconnecting anything safety-critical
- Assess operational status: Can flights continue? Can passengers be checked in? What are the manual fallback options? Aviation must continue to operate wherever safe to do so
- Preserve evidence: Do not immediately rebuild affected systems — forensic evidence of the attack may be required by regulators, insurers, and law enforcement
- Notify key contacts: Cyber insurer, legal counsel, NCSC (for significant incidents), and CAA operational team
- Establish communications cadence: Internal incident management calls every 2–4 hours minimum; brief the Accountable Manager and board
Regulatory Notification Requirements
Aviation cyber incidents trigger multiple regulatory notification obligations:
- CAA (NIS): OES-designated operators must notify the CAA within the required timeframe for significant incidents affecting essential services. Contact the CAA's Aviation Security team.
- ICO: Any personal data breach (passenger data, staff data) must be reported within 72 hours of becoming aware — not 72 hours after the breach occurred
- EASA: For Part-IS incidents affecting safety, notify your National Aviation Authority (NAA)
- NCA/Police: For ransomware attacks — the National Crime Agency and Action Fraud should be notified; for critical infrastructure attacks, NCSC cyber incident management team
- Insurers: Cyber insurance notification requirements are typically contractual — check your policy for notification timelines (often 24–72 hours)
- Passengers: If passenger personal data is at high risk, affected individuals must be notified without undue delay under UK GDPR Article 34
Operational Continuity During a Cyber Incident
Aviation operators cannot simply shut down operations during a cyber incident. Operational continuity planning for cyber scenarios should be tested in advance:
- Manual check-in procedures: Paper manifests and manual passenger processing when DCS is unavailable — staff must be trained and materials available
- Manual flight dispatch: Ability to dispatch flights using paper fuel orders, MEL references, and manual weight and balance calculation
- Degraded ATC communication: VHF voice communications as backup when CPDLC or ACARS is unavailable
- Ground handling coordination: Radio-based communication with ground handlers when operational IT systems are unavailable
- Revenue management: Offline booking fallback for customer-facing disruption
- Passenger communications: Template communications for passengers affected by system-related disruption, pre-approved by legal and comms teams
Post-Incident Review and Regulatory Reporting
After the immediate incident is resolved, aviation operators must complete a structured post-incident review:
- Root cause analysis: Understand exactly how the attacker gained access, what they did, and what data or systems were affected
- Timeline reconstruction: Build a complete chronology of the attack — required for regulatory reports and insurers
- Control gap analysis: Identify which security controls failed or were absent that allowed the attack to succeed
- Regulatory final report: NIS regulations require a final incident report within defined timeframes — ensure your root cause analysis is sufficient to support this
- Lessons learned: Implement identified control improvements before closing the incident
- Exercise update: Update incident response playbooks based on what worked and what did not during the actual incident
Frequently Asked Questions
Should an aviation operator pay a ransomware demand?
The UK government advises against payment, but aviation operators face exceptional operational pressure. Before any payment decision: engage your cyber insurer (many policies require insurer involvement in payment decisions); take legal advice on sanctions risk (paying ransomware groups on sanctions lists is illegal); contact NCSC for incident response support (free for UK critical infrastructure); and assess the realistic recovery timeline without payment. If a ransom is paid, this must typically be disclosed to your cyber insurer and may need to be reported to relevant authorities.
What is the NCSC's role in aviation cyber incident response?
The NCSC (National Cyber Security Centre) provides free incident response support for significant cyber incidents affecting UK organisations, with priority given to critical national infrastructure including aviation. The NCSC's 24/7 incident hotline is available for critical infrastructure operators. NCSC support includes technical assistance with forensic investigation, advice on containment and recovery, and liaison with law enforcement. Aviation operators should have NCSC contact details in their incident response plans.
How long does aviation cyber incident investigation typically take?
Simple incidents (isolated ransomware on a non-critical system with good backups) can be resolved within days. Complex incidents involving OT system compromise, sophisticated threat actors with long dwell times, or large-scale data exfiltration can take weeks to months for full forensic investigation and recovery. Regulatory investigations by the CAA and ICO typically take 6–18 months and run parallel to the technical response. Legal claims from affected passengers or commercial partners may continue for years after the technical incident is resolved.
Test your aviation incident response readiness
Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.
Get in touchReady to secure your iGaming operation?
MGA-licensed operators across Malta trust Kyanite Blue.