TroutTrout
Back to Blog
TransportationRailOT SecurityNIS2

Rail Signaling Cybersecurity: Protecting Safety-Certified Infrastructure

Trout Team7 min read

Rail Signaling Is Not Like Other OT

Rail signaling equipment operates under the highest safety integrity levels in any industry. An interlocking system — the logic that prevents conflicting train movements — is certified to SIL 4 under EN 50129, meaning the probability of a dangerous failure must be below 10⁻⁹ per hour. That is the same safety threshold as aircraft flight controls.

This certification comes with a non-negotiable constraint: you do not modify SIL 4 equipment. Not the software, not the configuration, not the network stack. Any change invalidates the safety case and requires full recertification — a process measured in years and millions of euros.

Meanwhile, NIS2 classifies rail operators as essential entities with mandatory cybersecurity requirements. As covered in our overview of NIS2 enforcement timelines and what to do first, the directive does not care about safety certification constraints. It requires risk management, access control, incident reporting, and supply chain security. Rail operators are caught between two regulatory frameworks with fundamentally different assumptions.

The Safety Certification Constraint

Rail OT systems are certified under a family of European standards (the CENELEC EN 50xxx series):

  • EN 50126 — Reliability, Availability, Maintainability, and Safety (RAMS)
  • EN 50128 — Software for railway control and protection systems
  • EN 50129 — Safety-related electronic systems for signaling

A safety case documents every aspect of a system's design, implementation, testing, and operational environment. The safety case is the certification artifact. If you install a security agent on a SIL 4 interlocking controller, you have introduced uncertified software into a safety-critical system. The safety case is invalidated. The system cannot legally operate until recertified.

This is not a theoretical concern. Railway safety authorities enforce this rigorously. The cost of recertification for a single interlocking system starts at €2M and takes 18–36 months.

Rail OT Systems and Their Certification Constraints

SystemFunctionSafety LevelAgent Feasible?Why Not
InterlockingPrevents conflicting train routesSIL 4NoSafety case invalidation, recertification required
ATP (Automatic Train Protection)Enforces speed limits and signal complianceSIL 4NoSafety-certified onboard and trackside components
ETCS (European Train Control System)Continuous train supervision via GSM-R/FRMCSSIL 4NoType-approved equipment, modification voids approval
Axle countersDetect train presence on track sectionsSIL 4NoEmbedded systems with no general-purpose OS
Points machines (controllers)Operate rail switchesSIL 2–4NoProprietary embedded controllers
Level crossing systemsControl road traffic barriers and signalsSIL 3–4NoSafety-certified, tamper-evident enclosures
SCADA (traction power)Monitor and control overhead line/third rail powerSIL 0–2Possible but riskyLegacy systems, no patch path, uptime critical
Passenger information systemsStation displays, announcementsSIL 0PossibleOften Windows-based, but low security priority

The pattern is clear: the systems that matter most for safety are the ones where endpoint security is impossible.

The Unique Challenge of Distributed Rail Infrastructure

Rail networks are not factories. The infrastructure is spread across hundreds or thousands of kilometers:

  • Wayside cabinets house interlocking controllers, axle counters, and communications equipment at each signal location along the track
  • Station equipment rooms contain local SCADA terminals, passenger information servers, and network switches
  • Operations control centers run centralized traffic management and traction power SCADA
  • Maintenance depots connect diagnostic tools and vendor laptops to signaling equipment

These locations are connected by wide-area networks — often a mix of fiber, microwave, and legacy copper — with varying levels of physical security. A wayside cabinet on a rural stretch of track has a different threat profile than a control center, but both connect to the same signaling network.

Network-Level Security for Rail

The approach that works within safety certification constraints is network-level enforcement — securing the communications between systems rather than modifying the systems themselves:

  1. Overlay segmentation at wayside cabinets — Deploy Access Gate appliances in equipment rooms and cabinets to create encrypted, authenticated network segments. The signaling equipment connects to the same physical ports as before; the security layer is transparent to the certified systems.

  2. Zero-trust access for maintenance — Replace persistent VPN connections and shared credentials with per-user, per-session, audited access. When a signaling engineer needs to connect a diagnostic laptop at a wayside cabinet, they authenticate through the Access Gate. The session is logged, time-limited, and restricted to the specific equipment they need.

  3. East-west traffic control — In a flat signaling network, any compromised node can reach every other node. Network-level micro-segmentation limits lateral movement so that a compromised passenger information system at a station cannot reach the interlocking controllers.

  4. Distributed deployment without centralized dependency — Each Access Gate operates independently. If the WAN link to a wayside cabinet goes down, the local security policy continues to enforce. This matches the distributed, resilient architecture that rail operators already require for safety.

NIS2 Requirements Specific to Rail

Under NIS2, rail operators must implement:

  • Risk analysis and information system security policies — Network segmentation and access control are foundational risk management measures
  • Incident handling — The ability to detect, log, and report security events across distributed infrastructure
  • Business continuity and crisis management — Security controls must not compromise operational availability
  • Supply chain security — Vendor and contractor access to signaling equipment must be controlled and audited
  • Encryption and access control — NIS2 Article 21(2)(h) specifically calls out cryptography and access management

The penalty for non-compliance is up to €10M or 2% of global annual turnover. For major rail operators, that is a material financial risk.

Mapping Security to Rail Operations

Deploying network-level security in rail requires understanding the operational model:

  • Planned possessions — Track maintenance windows are the primary opportunity for physical installation of appliances at wayside locations
  • Signaling technician workflows — Security must integrate with existing maintenance procedures, not create parallel processes
  • Safety authority coordination — While network-level security does not modify certified equipment, the railway safety authority should be informed as part of change management
  • Phased rollout by line — Start with a single line or corridor, validate the approach, then expand across the network

What Compliance Looks Like

A rail operator that deploys network-level security can demonstrate to NIS2 auditors:

  • Asset inventory — Every device on the signaling network is identified through network discovery
  • Access control — Every connection to signaling equipment is authenticated, authorized, and logged
  • Segmentation — Critical signaling systems are isolated from lower-security systems
  • Incident detection — Anomalous network behavior is detected and alerted in real time
  • Supply chain controls — Vendor access is brokered, time-limited, and auditable

All of this without a single modification to safety-certified equipment. The safety case remains intact. The NIS2 obligations are met. Airport operators face the same certification-vs-security dilemma with baggage handling systems — our analysis of securing airport BHS without requalification covers that parallel challenge. Rail operators do not have to choose between safety certification and cybersecurity compliance — network-level enforcement satisfies both.


Full NIS2 on-premise compliance guide → /resources/nis2-on-premise