Securing CBI

Cybersecurity considerations for Computer-Based Interlocking signaling systems
Talk with an expert
White right arrow
Securing CBTC main image

What is CBI?

CBI, or Computer Based Interlocking, is an arrangement of signal devices that prevent conflicting movements through computer-based technologies. Interlocking systems, or IXL, prevent trains from conflicting movements along the track and make it impossible to display a signal to proceed unless the route is proven safe. Trains are guided by signals and appliances like relays and mechanics through control cables. A CBI system uses computers, which provides more advanced reliability and security than earlier mechanical or electrical systems.

Why is it Important to Protect CBI Systems?

Safety commands are controlled by computers

Previously interlockings were fully mechanical and not compertized. Computer-Based Interlocking can be compromised via software exploitation, leading to safety and security disruptions.

Interlocking communications can be unencrypted

Leading safety standard make the assupmtion that interlocking systems are always air-gapped and therefore shouldn't be encrypted, while air gaps are a known as an unreliable security measure.

CBI is prone to Denial-of-Service (DoS)

Computer Based Interlocking is a fail safe system, and therefore most abnormal commands can lead to an immediate halt. Threat actors can leverage these halts to cause harm.

How We Can Help Protect Your CBI Systems?

icon for asset visibility

Asset Visibility

Complete information regarding interlocking features, maintenance servers, light signals, point machines, and all CBI functions.

icon for threat detection and response

Threat Detection and Response

Cutting-edge threat discovery and DPI for vendor-specific interlocking protocols and detection of abnormal commands, attack attempts, and cyber-inflicted disruptions.

icon for automates compliance

Automates Compliance

Supports compliance with leading cybersecurity standards, such as TS 50701, IEC 62443 and NIST 800-82 using automatic validation of security controls.

Securing All Rail-Specific Systems


(Communications-Based Train Control)

arrow icon


(Positive Train Control)

arrow icon


(European Rail Traffic Management System)

arrow icon

Learn More Here


April 9, 2024

Rails Redefined: Navigating the Cybersecurity Evolution in Transportation | Greg Adamson | S2E7


March 13, 2024

From Segmentation to SOC: a Multilayered Approach to Cybersecurity in Rail Operations | Manvendra Singh | S2E6


March 4, 2024

Claves para gestionar la ciberseguridad en la intersección de IT y OT | Esther Mateo Rodriguez | S2E5

Show more
White right arrow
Let’s Talk About Securing Your Rail
Our experts will get you back on track
Show More
Blue right arrowWhite right arrow