As airports continue to embrace digital transformation and rely on advanced technologies, safeguarding critical assets and sensitive data has become paramount. In today's digital environment, the aviation industry faces increasing cyber threats, making robust cybersecurity measures a growing requirement based on risk. 

ACI World recognizes that no system can be immune to cyber threats, and our approach is to support airports in mitigating risks and building cyber resilient environments that can withstand, respond to, and recover from attacks. Our comprehensive approach focuses on equipping airports with training, tools, and guidance to mitigate risks, detect and respond to threats, and build resilient systems. 

 

 

Key Cybersecurity Resources

A modern, spacious building interior with silhouettes of people walking and overlaid digital network graphics, including data symbols and connecting lines, representing technology and connectivity.

APEX in Cybersecurity

The APEX Cybersecurity Assessment program is an onsite airport review led by industry peers and experts and serves as a starting point for assessing cybersecurity practices at airports. The program provides a holistic and proactive approach to assessing and enhancing an airport’s cybersecurity program. 

A man in a white shirt sits at a desk with multiple monitors displaying maps, graphs, and code during Airport Cybersecurity Training in a high-tech control room. Large screens show world maps and digital data.

Cybersecurity Courses

ACI’s training in cybersecurity provides airports with a comprehensive offer intended for all levels of airport managers and specialists. Through our training programs, ACI provides individuals with the knowledge and tools for the effective management of cybersecurity for their airport’s systems, networks, and data.

Cybersecurity External Resources

Below is an overview of regulations, standards, and guidance related to aviation cybersecurity at a global level. It is meant to be a starting point and will be regularly updated. 

For more information, comments, and suggestions related to this web page, or if you would like to engage with us on aviation cybersecurity, please contact us at airportit@aci.aero. 

Cybersecurity Publications

Explore ACI World publications to access expert handbooks, in-depth reports and datasets, as well as comprehensive guidance. Empower your airport with global insights across all areas of the airport business, including economics, sustainability, customer experience, and operations.

View all publications

  • Cybersecurity Incident Response Guidelines White Paper, First Edition
  • Cybersecurity Implementation Handbook
  • Cybersecurity for Airport Executives Handbook

Additional Resources on Cybersecurity

ACI World Insights

Access the latest expert opinions, global tends and data-driven insights on the ACI World Insights blog. Stay informed to make strategic decisions that drive innovation in the airport and wider aviation sector.

View all articles

  • Cybersecurity-by-design – from an airport IT enterprise architecture perspective
    Leong Yuh Khee, Senior Vice President of Airport Operations Technology & Corporate IT at Changi Airport Group, along with Chan Wee Lee, Associate General Manager of Airport Operations Technology & Corporate IT, and Jimmy Wong, a member of his team, explore the concept of cybersecurity-by-design from an IT practitioner’s perspective without delving into specific technical options. Cybersecurity-by-design is a mindset. Enterprise architecture is a discipline. Mindset is about how one views, values, and approaches things. It influences one’s behaviors, priorities, and how one judges whether an action is right, effective, and worth spending time...Read more
  • Ways to reduce DDoS attacks on airports
    Eric Vautier, the Chief Information Security Officer of Groupe ADP, discusses the changing nature of DDOS attacks. He also discusses the strategies to safeguard airport websites, information systems, and infrastructure against such attacks. A Distributed Denial of Service (DDoS) attack occurs when a website or online service is overwhelmed with excessive internet traffic. Excessive traffic can cause the website or service to malfunction. DDoS attacks can take various forms, including volume-based attacks, protocol-based attacks, and application layer attacks. DDoS attacks have been around for a long time; however, we can observe new trends...Read more