No. 159 (Sept. 2018) - Network Security of Onboard Computer Based Systems (6 Pages)
No. 159 (Sept. 2018) - Network Security of Onboard Computer Based Systems (6 Pages)
No. 159 (Sept. 2018) - Network Security of Onboard Computer Based Systems (6 Pages)
159
No.
No. Network security of onboard computer based
159
159 systems
(Sep 2018)
(Cont)
1. Introduction
1.1. General
1.2. Objective
a) Provide a minimum set of recommended measures for the resilience of networks and
networked systems onboard against cyber-related risks, vulnerabilities and threats,
including awareness of operators about cybersecurity threats and procedures to
prevent and react to cyber incidents.
1.3. Scope
The provisions contained herein are relevant to networks connecting Cat. I, II and III systems
according to the definition in UR E22, however, the extent and level of application should be
proportional to the category of systems connected, considering the highest category as
leading.
The extent and level of application may also be affected by factors related to the ship as a
whole, like type of service and navigation, overall level of digitalization on board, extension
and interconnection of different networks, etc. (see also chapter 3)
This recommendation is intended for new ships and may be applied to ships in service.
1.4. Exclusion
Nonetheless, when the aforementioned systems are integrated with or connected to systems
No. under the scope of Class, measures should be provided in order to prevent or reduce as much
as possible the propagation of possible effects of adverse cyber events to and from such
159 systems.
(Cont)
1.5. Types of onboard networks
Each network type has specific properties and can be affected by specific vulnerabilities; it
can be subject to specific threats and, if compromised, its failure can lead to consequences
that have different impacts on safety and/or security.
a) Access to and use of the information generated, archived or transported in the network;
b) Quality of the communication service implemented by means of the network.
Threats are targeted to the exploitation of vulnerabilities and may come from many different
possible sources. Potential threat actors include: nation states; terrorists; cyber criminals;
organized crime, competitors; activist groups; careless, disgruntled or malicious insiders;
cyber vandals; opportunists and others.
Purposes and interests are different for each possible threat actor; likewise, their offensive
capability and the probability of an attack, either intentional or accidental, are not the same
and may depend on the ship type, operation, navigation, cargo, etc.
1.7. Responsibilities
The provisions of this Recommendation should be applied under the responsibility of the
System Integrators, Suppliers, and/or Owner according to the specific phase of their
implementation. Responsibilities of various stakeholders are detailed in the following
paragraphs.
2. References
The following list provides references to international or industrial standards that may be
considered as a technical background for this recommendation.
[1] IMO MSC-FAL.1/Circ.3, “Guidelines on Maritime Cyber Risk Management”, July 2017
[3] NIST “Framework for Improving Critical Infrastructure Cybersecurity”, version 1.1, 2017
[4] “The Guidelines on Cyber Security On board Ships”, version 2.0, BIMCO, CLIA, ICS,
No. INTERCARGO, INTERTANKO, OCIMF and IUMI, 2017
159 [5] “The CIS Critical Security Controls for Effective Cyber Defense”, version 6.0, Center of
(Cont) Internet Security, October 2015
[7] IACS UR E22 “On Board Use and Application of Computer Based Systems”, June 2016
3. Risk assessment
Under System Integrator and Supplier responsibility and supervision, a preliminary risk
assessment should be carried out. Risks should be evaluated taking into account:
As part of the risk assessment, acceptability thresholds should be defined, taking into account
the probability of occurrence of cyber incidents and the effects on safety and security that are
likely to occur as a consequence thereof.
The System Integrator and Supplier should prepare a risk assessment report. A copy of the
report should be given to the Owner upon delivery, retained by the Owner and made
available to the Classification Society upon request.
Under the responsibility of System Integrator and Suppliers, the following items should be
identified, to develop a suitable understanding and management of onboard networks and
their security:
a) Networks on board
b) Network types according to criteria described in 1.5
c) Networked IT and OT systems and their category according to UR E22
d) Data flows and network devices or resources potentially limiting them
e) Connections with external systems or networks
f) Access points and interfaces, including machine-to-machine (M2M) interfaces
g) Roles and responsibilities of users
h) Network vulnerabilities and threats, including those related to information security and
those related to the quality of communication service, e.g. leveraging vulnerability scan
tools, security information databases, etc.
The potential impact of network failures on safety and security should be analyzed and
acceptable risk thresholds should be defined. The definition of acceptable risk threshold is
functional to estimate the level and extent of application of safeguards and risk mitigating
measures described in the following paragraphs.
The System Integrator should prepare a document including the above-mentioned items. This
document could be part of, or an integration to an inventory of all of the vessel's computer
based systems, and/or other documents, e.g. those describing the onboard network
No. architecture. A copy of this/these document/s should be given to the Owner upon delivery,
retained onboard and made available to the Classification Society upon request.
159
(Cont) 5. Network protection safeguards
The System Integrator and Suppliers should consider and implement the following safeguards
aimed to prevent the occurrence of adverse cyber events on onboard networks. The level and
extent of implementation should be in accordance with the criteria described in 1.3.
The System Integrator and Supplier should prepare a document containing a description of the
above-mentioned safeguards and instructions on how to verify their effective implementation,
or a rationale for those not implemented. A copy of this document should be given to the Owner
upon delivery, retained onboard and made available to the Classification Society upon request.
The System Integrator and Suppliers should consider and implement the following safeguards
for a timely identification of adverse cyber events on onboard networks. The level and extent
of implementation should be in accordance with the criteria described in 1.3.
The System Integrator and Supplier should prepare a document containing a description of the
above-mentioned safeguards and instructions on how to verify their effective implementation,
or a rationale for those not implemented. A copy of this document should be given to the Owner
No. upon delivery, retained onboard and made available to the Classification Society upon request.
a) Development of a response plan in case of breach, including measures for confining the
breach to the minimum extension
b) Procedures for a timely acknowledgment and management of incident alerts
c) Assignment of roles and responsibilities
d) Continuous training of personnel
e) Periodic cyber incident drills
f) Preservation of logs and any elements related to cyber incidents (e.g. digital forensics)
The System Integrator and Supplier should prepare a document containing a description of the
above-mentioned measures and instructions on how to verify their effective implementation, or
a rationale for those not implemented. A copy of this document and of the documents
mentioned in the points above should be given to the Owner upon delivery, retained onboard
and made available to the Classification Society upon request.
The System Integrator and Suppliers should consider and implement the following measures
aimed to restore network capabilities or service that has been impaired due to a cybersecurity
event. The level and extent of implementation should be in accordance with the criteria
described in 1.3.
The System Integrator and Supplier should provide a document containing a description of the
above-mentioned measures and instructions on how to verify their effective implementation, or
a rationale for those not implemented. A copy of this document and of the documents
mentioned in the points above should be given to the Owner upon delivery and made available
to the Classification Society upon request.
Under the responsibility of System Integrator and Suppliers, for networks connecting systems
of Cat. II and III, vulnerability assessment and test campaigns should be carried out in the
operational configuration at least once before delivery, aimed at verifying the actual resilience
of onboard networks to cyber incidents.
The System Integrator, in cooperation with the Suppliers, should prepare a test plan and
execute the tests at least once before delivery in all the configurations and conditions specified
in the test plan. Relevant results should be recorded in a test report. In case of significant
identified breach or vulnerability, the System Integrator and Suppliers, possibly in cooperation
with the executor of the tests or other experts, should identify, design and implement suitable
No. countermeasures. Tests aimed to verify the effectiveness of such countermeasures should be
executed and relevant results recorded in the test report.
159
(Cont) For networks connecting systems of Cat. II and III, specific tests simulating selected single
failures and/or exceptional conditions should be carried out at least once before delivery, aimed
at verifying the effectiveness and efficiency of countermeasures as designed and implemented.
Specific tests should be carried out to verify the clear separation between networks connecting
Cat. I systems, or other uncontrolled networks, and Cat. II / Cat III systems.
A copy of the test plan and test report should be given to the Owner upon delivery, retained by
the Owner and made available to the Classification Society upon request. The Classification
Society may request to witness the execution of tests and/or execute additional tests.
If changes are made to the network configuration, network components or other items identified
as per paragraph 4:
- Details should be submitted by the Owner (for ships in service) or by the System
Integrator (before delivery) to the Classification Society in advance.
- The Owner (for ships in service) or the System Integrator (before delivery) should
update countermeasures and relevant documentation according to the changes made.
A clear description of changes should be given and kept as documentation.
End of
Document