Defining a cyber security strategy for the future of flight
Advanced Air Mobility (AAM) represents the next frontier in aviation, combining electric propulsion, autonomous systems, and vertical take-off and landing capabilities. As a revolutionary concept, AAM envisions a future where fast, efficient, reliable and sustainable means of passenger and cargo transportation become part of everyday life. With the potential to revolutionise urban transportation, connect remote areas, and alleviate ground congestion, AAM holds the promise of redefining how we travel and reshape the transportation landscape. By leveraging cutting-edge technologies and innovative aircraft designs, AAM aims to unlock new possibilities, offering faster, cleaner, and more accessible aerial transportation solutions for the future.
From world leading technical companies needing to protect their intellectual property (IP) and Flight Operators entrusted with personal data, though to Aerospace Management providers needing to ensure stable and uninterrupted operations, it is clear that cyber security and cyber resilience are crucial to the safe, stable, and reliable development and operation of AAM in the UK. Cyber security threats, impacts and risks will change over time as the development of AAM progresses from its current Initial State through to ubiquitous operations in its Mature State. Over this time, the quantity of systems employed will increase, new technology will be developed, and the threat landscape will evolve. To manage risk within acceptable limits, it is important that cyber security is considered at this early stage and a strategy developed that considers the unique challenges of AAM and provides a series of approaches for dealing with cyber security risk in this complex and evolving environment.
To explore these issues, we have defined a Cyber Security Strategy for the Future Flight Challenge, to provide strategic direction for cyber security decision making throughout the evolution of AAM. While not intended to prescribe solutions or specific implementation methods (although examples will be given), its intent is to provide an overarching approach to cyber security, and examples of relevant tools and techniques and how they can be applied in an AAM context.
Read the strategy here.