Securing CBI

Cybersecurity considerations for Computer-Based Interlocking signaling systems
Talk with an expert
White right arrow
Securing CBTC main image

What is CBI?

CBI, or Computer Based Interlocking, is an arrangement of signal devices that prevent conflicting movements through computer-based technologies. Interlocking systems, or IXL, prevent trains from conflicting movements along the track and make it impossible to display a signal to proceed unless the route is proven safe. Trains are guided by signals and appliances like relays and mechanics through control cables. A CBI system uses computers, which provides more advanced reliability and security than earlier mechanical or electrical systems.

Why is it Important to Protect CBI Systems?

Safety commands are controlled by computers

Previously interlockings were fully mechanical and not compertized. Computer-Based Interlocking can be compromised via software exploitation, leading to safety and security disruptions.

Interlocking communications can be unencrypted

Leading safety standard make the assupmtion that interlocking systems are always air-gapped and therefore shouldn't be encrypted, while air gaps are a known as an unreliable security measure.

CBI is prone to Denial-of-Service (DoS)

Computer Based Interlocking is a fail safe system, and therefore most abnormal commands can lead to an immediate halt. Threat actors can leverage these halts to cause harm.

How We Can Help Protect Your CBI Systems?

icon for asset visibility

Asset Visibility

Complete information regarding interlocking features, maintenance servers, light signals, point machines, and all CBI functions.

icon for threat detection and response

Threat Detection and Response

Cutting-edge threat discovery and DPI for vendor-specific interlocking protocols and detection of abnormal commands, attack attempts, and cyber-inflicted disruptions.

icon for automates compliance

Automates Compliance

Supports compliance with leading cybersecurity standards, such as TS 50701, IEC 62443 and NIST 800-82 using automatic validation of security controls.

Securing All Rail-Specific Systems


(Communications-Based Train Control)

arrow icon


(Positive Train Control)

arrow icon


(European Rail Traffic Management System)

arrow icon

Learn More Here


July 31, 2023

Rails & Resilience: the Convergence of Safety and Cybersecurity | Eddy Thesee | S1E6

Case Study

July 30, 2023

Uplifting Rail Infrastructure Security Postures with Advanced Visibility, Threat Detection, and Response


July 3, 2023

Navigating the Intersection of Rail Operations & Cybersecurity in the Age of Digitalization | Christoffer Neesen | S1E5

Show more
White right arrow
Let’s Talk About Securing Your Rail
Our experts will get you back on track
Show More
Blue right arrowWhite right arrow