471
have developed these guidelines, which are designed
to assist companies develop resilient approaches to
cyber security onboard ships.
Approach to cyber security will be company and
ship-specific, but should be guided by appropriate
standards and the requirements of relevant national
regulations. The guidelines provide a risk-based
approach to identifying and responding to cyber
threats. An important aspect is that relevant ship
personnel should have training in identifying the
typical modus operandi of cyber attacks.
In accordance with chapter 8 of the ISPS Code, the
ship is obliged to conduct a security assessment,
which should include all operations that are
important to protect. Thus, the assessment should
address radio and telecommunication systems,
including computer systems and networks (part B,
paragraph 8.3 of the ISPS Code). This calls for
controlling and monitoring “the ship to shore” path of
the internet connection, which is important owing to
the fast adoption of sophisticated and digitalized
onboard OT systems that in many cases have not been
designed to be cyber resilient.
The objective of the company’s Safety
Management System (SMS) is to provide a safe
working environment by establishing appropriate safe
practices and procedures based on an assessment of
all identified risks to the ship, onboard personnel and
the environment. In the context of ship operations,
cyber incidents are anticipated to result in physical
effects and potential safety and/or pollution incidents.
This means that the company needs to assess risks
arising from the use of IT and OT onboard ships and
establish appropriate safeguards against cyber
incidents. The SMS solutions should include
instructions and procedures to ensure the safe
operation of ships and protection of the environment
in compliance with relevant international and flag
state legislation. These instructions and procedures
should consider risks arising from the use of IT and
OT on board, as appropriate, taking into account
applicable codes, guidelines and recommended
standards.
The IMO office has developed guidelines that
provide high-level recommendations on maritime
cyber risk management to safeguard shipping from
current and emerging cyber threats and
vulnerabilities. In fact, the IMO guidelines on cyber
security onboard ships are aligned with the IMO
guidelines and provide practical recommendations on
maritime cyber risk management covering both cyber
security and cyber safety. The aim of this document is
to offer guidance to shipowners and operators on how
to assess their operations and put in place the
necessary procedures and actions to maintain the
security of cyber systems onboard their ships. The
guidelines are not intended to provide a basis for and
should not be interpreted as calling for auditing or
vetting the individual approach to cyber security
taken by companies and ships.
Company plans and procedures for cyber risk
management should be complementary to the existing
security and safety risk management requirements
contained in the International Safety Management
(ISM) Code2 and ISPS Code3. Cyber security should
be considered at all levels of the company, from senior
management ashore to onboard personnel, as an
inherent part of the safety and security culture
necessary for the safe and efficient operation of the
GMDSS ships.
Availability of Internet connectivity via satellite
and/or other wireless communication can drastically
increase the vulnerability of GMDSS ships. Namely,
the existing cyber defense mechanisms onboard ships
implemented by the IT service provider should be
carefully considered but should not be solely relied
upon to secure every shipboard systems and data.
Ships are becoming more and more integrated with
shoreside operations because digital communication
is being used to conduct business, manage operations,
and stay in touch with head office. However,
vulnerable systems, equipment and technologies for
assessing their exposure to cyber risk may include:
Communication systems, Software operating systems,
Threats against IT and OT systems Bridge systems,
Propulsion and machinery management and power
control systems, Access control systems, Cargo
management systems, Crew and passenger servicing
and management systems.
Further, critical GMDSS ships onboard
communication systems have been increasingly
digitalized and connected to the Internet to perform a
wide variety of legitimate functions such as: (1)
Obsolete and unsupported operating systems; (2)
Outdated or missing antivirus software and
protection from malware; (3) Inadequate security
configurations and best practices, including
ineffective network management and the use of
default administrator accounts and passwords; (4)
Ineffective network management which is not based
on the principle of least privilege, shipboard
computer networks, which lack boundary protection
measures and segmentation of networks; (5) Safety
critical equipment or systems always connected with
the shore side; and (6) Inadequate access controls for
third parties including contractors and service
providers.
Protection measures should be implemented in a
way that maintains the system’s integrity during
normal operations as well as during a cyber incident.
Every network onboard ship has several endpoints
such as workstations, servers, routers, input and
output modules, transducers etc. The endpoints are
very important as they control the operation and the
security of the system. A secure running environment
can be established by using a testing environment
isolated from networks and computers, which
provides additional protection against cyber threats
by isolating executable software from the underlying
operating system. This prevents unauthorized access
to the operating systems, on which the software is
running. The sandbox enables software to be run
under a specific set of rules and this adds control over
processes and computer resources. Therefore, the
sandbox system helps prevent malicious,
malfunctioning, or untrusted software from affecting
the rest of the system.