DRAFT Cyber NVIC 05 17 PDF
DRAFT Cyber NVIC 05 17 PDF
DRAFT Cyber NVIC 05 17 PDF
Ave
U.S. Coast Guard Washington, DC 20593-7501
Staff Symbol: CG-5P
COMDTPUB xxxxxxx
NVIC 05-17
Ref: (a) Title 33 of the Code of Federal Regulations (CFR) Subchapter H, Maritime
Security
(b) National Institute of Standards and Technology (NIST) Cybersecurity
Framework (NIST CSF)
1. PURPOSE. In accordance with 33 CFR parts 105 and 106, MTSA-regulated facilities are
instructed to analyze vulnerabilities with computer systems and networks in their Facility
Security Assessment (FSA). This Navigation and Vessel Inspection Circular (NVIC) will assist
Facility Security Officers (FSOs) in completing this requirement. Additionally, this NVIC
provides guidance and recommended practices for Maritime Transportation Security Act
(MTSA) regulated facilities to address cyber related vulnerabilities. Until specific cyber risk
management regulations are promulgated, facility operators may use this document as guidance
to develop and implement measures and activities for effective self governance of cyber
vulnerabilities.
2. ACTION.
Enclosure (1) provides draft interpretive guidance regarding existing regulatory requirements in
33 CFR parts 105 and 106, which instruct facilities to conduct FSAs and address any
vulnerabilities identified in the FSA in the Facility Security Plan (FSP). This guidance would
detail how those existing requirements relate to cybersecurity measures, and what would be
recommended to be included in the FSP.
Enclosure (2) provides draft guidance on implementing a cyber risk management governance
program to include establishment of a cyber risk management team, policies, programs, and
identification of critical systems. This guidance is based on the National Institute of Standards
and Technology (NIST) Cybersecurity Framework (CSF) and NIST Special Publication 800-82,
and provides more detail regarding the development of a Cyber Risk Management Program
(CRMP) and specific examples as to how such a program can be implemented in a variety of
system and business configurations.
3. BACKGROUND
a. Maritime Transportation Security Act (MTSA) regulations are designed to provide the
general parameters for port and facility security while allowing facility owners and operators
the discretion to determine the details of how they will comply. The result is that the owners
and operators are responsible for assessing vulnerabilities and ensuring the security of their
facilities with Coast Guard oversight and guidance. The Coast Guard currently has the
regulatory authority to instruct facilities and Outer Continental Shelf (OCS) facilities
regulated under MTSA to analyze computer systems and networks for potential
vulnerabilities within their required FSA and, if necessary, FSP.
b. The maritime industry continues to increase use of cyber technology. Facility operators
use computers and cyber dependent technologies for communications, engineering, cargo
control, environmental control, access control, passenger and cargo screening, and many
other purposes. Facility safety and security systems, such as security monitoring, fire
detection, and general alarm installations increasingly rely on computers and networks.
d. There are many resources, technical standards, and recommended practices available to
the marine industry that can help their governance of cyber risks. Facility operators should
use those resources to promote a culture of effective and proactive cyber risk management.
4. DISCLAIMER. This guidance is not a substitute for applicable legal requirements, nor is it itself
a rule. It is not intended to nor does it impose legally binding requirements on any party. It
represents the Coast Guard’s current thinking on this topic and may assist industry, mariners, the
general public, and the Coast Guard, as well as other federal and state regulators, in applying
statutory and regulatory requirements.
a. The development of this NVIC and the general policies contained within it have been
thoroughly reviewed by the originating office, and are categorically excluded (CE) under
current USCG CE # 33 from further environmental analysis, in accordance with Section
2.B.2. and Figure 2-1 of the National Environmental Policy Act Implementing Procedures
and Policy for Considering Environmental Impacts, COMDTINST M16475.1 (series).
Because this NVIC implements, without substantive change, the applicable Commandant
Instruction or other federal agency regulations, procedures, manuals, and other guidance
documents, Coast Guard categorical exclusion #33 is appropriate.
b. This NVIC will not have any of the following: significant cumulative impacts on the
human environment; substantial controversy or substantial change to existing
environmental conditions; or inconsistencies with any Federal, State, or local laws or
administrative determinations relating to the environment. All future specific actions
resulting from the general policies in this NVIC must be individually evaluated for
compliance with the National Environmental Policy Act (NEPA), DHS and Coast Guard
NEPA policy, and compliance with all other environmental mandates.
7. FORMS/REPORTS. None.
P. F. Thomas
Rear Admiral, U.S. Coast Guard
Assistant Commandant for Prevention Policy
Under current regulations in 33 CFR parts 105 and 106, facilities and outer continental
shelf (OCS) facilities (hereinafter described as “facilities”) are required to identify and
assess security threats, and develop a Coast Guard-approved Facility Security Plan (FSP)
to address and mitigate those threats. The specific threats are covered by the existing
language in parts 105 and 106 in general, but the Coast Guard interprets this language to
specifically include threats to computer systems and attacks in the electronic (cyber)
domain.
In this draft document, the Coast Guard is laying out its interpretation of regulatory
provisions in parts 105 and 106 as applicable to electronic and cybersecurity systems.
This enclosure discusses the specific regulatory provisions that instruct owners/operators
of a Maritime Transportation Security Act (MTSA) regulated facility to address
cyber/computer system security in the Facility Security Assessment (FSA) and, if
applicable, provide guidance within their FSPs to address any vulnerabilities identified in
the Facility Security Assessment (FSA). This document intends to assist the
owner/operator in identifying cyber systems that are related to MTSA regulatory
functions, or whose failure or exploitation could cause or contribute to a Transportation
Security Incident. If there are electronic or cybersecurity-related vulnerabilities
identified in an FSA, an owner/operator may choose to provide this information in a
variety of formats, such as a stand-alone cyber annex to their FSP, or by incorporating
cybersecurity procedures alongside the physical security measures of their FSP.
In many cases, companies have established cybersecurity and risk management programs
that provide for strong cyber defense. For those situations, the owner/operator may
demonstrate that those policies meet or exceed the requirements of 33 CFR parts 105 and
106. Owners/operators that already employ a comprehensive cybersecurity plan for their
organization, or who wish to apply a standard security program that incorporates
cybersecurity to multiple facilities, may wish to submit a security plan under the
Alternative Security Program, 33 CFR 101.120.
Once this guidance is finalized, an owner/operator may demonstrate compliance with the
regulations by including cyber risks in their FSA and including a general description of
the cybersecurity measures taken in the FSP, if appropriate. Owners/operators do not
need to indicate specific or technical controls, but should provide general documentation
on how they are addressing their cyber risks.
1
Enclosure (1) 05-17
Personnel training
33 CFR 105.205
33 CFR 105.210
33 CFR 105.215
33 CFR 106.205
33 CFR 106.210
33 CFR 106.215
33 CFR 106.220
Describe how cyber security is included as part of personnel training, policies and
procedures.
2
Enclosure (1) 05-17
duties at all MARSEC levels and enable the Facility Security Officer (FSO) to identify
any related security deficiencies that need to be addressed.
Communications
33 CFR 105.235
33 CFR 106.240
Facility operators should be able to communicate security conditions to and between
vessels and facilities, to the Captain of the Port, and to national and local authorities. To
the extent that cyber dependent systems perform this function, describe how those systems
are protected and an alternative means of communication should the system be
compromised or degraded.
Describe how physical security and cybersecurity personnel will communicate security
conditions and threats to one another and how cyber related suspicious activity and
breaches of security will be communicated to the Coast Guard.
3
Enclosure (1) 05-17
Describe the security measures for access control at all MARSEC levels.
4
Enclosure (1) 05-17
third party or cybersecurity specialists within the organization. The audit report should
clearly indicate that the cybersecurity provisions detailed in the FSP are in place and are
believed to be appropriate and effective. The audit should include the name, position, and
qualification of the person conducting the audit.
5
Enclosure (2) 05-17
Cyber Governance and Cyber Risk Management Program Draft Implementation Guidance
4.1 Protect 10
4.1.1 Cyber Risk Awareness Program 10
4.1.2 Acceptable Use of Cyber Systems 11
4.1.3 Access Control 11
4.1.4 Network Segmentation 13
-Figure 1. System Segregation, “Air Gapping” 13
1
Enclosure (2) 05-17
4.2 Detect 17
4.2.1 Monitor Traffic 17
4.2.2 Reporting Responsibilities 17
4.2.3 Keep Logs 17
4.2.4 Run Tests 17
4.2.5 Deploy and Update Intrusion Detection Systems 18
4.3 Respond 19
4.3.1 Investigate Notifications 19
4.3.2 Plan Thoroughly 19
4.3.3 Limit Consequences 20
4.4 Recover 20
4.4.1 Back Up Information 21
4.4.2 Protect Back Up Storage 21
4.4.3 Maintain/Establish Redundancies 21
4.4.4 Perform Exercises 21
4.4.5 Integrate Cyber Recovery Into Enterprise Recovery Plan 22
4.4.6 Communication 22
2
Enclosure (2) 05-17
Background:
This enclosure is based on principals from various accepted references from the National
Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) and NIST
Special Publication 800-82 and provides guidelines that facility owners/operators may use to
identify and address the cyber-related risks to their cyber systems and applications. Facility
owner/operators should consider these guidelines in conjunction with their own risk management
policies to help ensure they account for cyber risks.
Sections 1 - 4 utilize the NIST CSF as the recommended foundation for development of a
cyber risk management program. The NIST CSF establishes the following functions that is
illustrated in Figure 1:
Identify – The administrative structure for cyber risk management as well as the
hardware, software, and other components of a system.
Protect – The technical, administrative, physical, and other procedures to protect systems
from failure or exploitation.
Detect – Procedures to monitor systems and detect when they may have become
compromised.
Respond – The initial actions and notifications needed to limit the consequences of a
cyber event.
Recover – Follow up actions needed to restore full functionality and operations.
Figure 1:
1
Enclosure (2) 05-17
1.1 Define Cyber Responsibilities and Create a Cyber Risk Management Team
Management, strategic planning, and employee engagement form the foundation of efforts to
improve information systems and operation systems security. Without a systematic process
to identify gaps and launch remedial action, even the most resource-intensive efforts could
fail to adequately secure a network. As described in the NIST CSF, the “Identify” step in the
process includes identifying the organizational structure responsible for assessing risk,
establishing priorities, and ongoing cyber governance procedures.
To assess cyber risk, management should designate a responsible individual who will
assemble and lead the CRMT. This individual may also be the organization’s Facility
Security Officer. This person should have:
Direct access to communicate with the highest level in the organization and with
appropriate intermediate management levels
Responsibility to monitor cyber risk management activities for facility operations
Authority to ensure adequate resources to meet cyber risk management objectives
A robust CRMT establishes a process to both initially develop and periodically review
policies and program for suitability, adequacy, and effectiveness. Cyber risk management
2
Enclosure (2) 05-17
should be added to the organization’s project management cycle to ensure that cybersecurity
risks are identified and addressed as part of any given project that may alter cyber systems or
organization. This should apply generally to all projects (e.g. a core business process, IT,
facility management, etc.).
A multi-disciplinary CRMT with a variety of perspectives and expertise will be best able to
identify safety and security critical systems, recognize the consequences, should those
systems fail or be exploited, and establish the most effective and efficient solutions. While
information technology (IT) specialists should be part of this effort, they may not fully
recognize the various operational systems on a waterfront, the potential consequences, should
they fail, or have an operator’s perspective on potential non-technical (and lower cost)
solutions. In short, a team consisting only of IT professionals will only identify IT related
threats and IT related solutions. Ideally, a risk management team will include:
Facility operators
Port engineers
Facility Security Officers
Information technology specialists
Safety management/industrial safety experts
Emergency managers
A CRMT may also include third-party experts in cyber technology, risk assessment
methodology, or other needed skills, or individuals serving in multiple capacities within the
team.
Some large organizations with diverse operations may centralize their cyber risk
management policies at the corporate level. While this can be useful to ensure consistency
across the organization, it is crucial that corporate cyber risk management policy addresses
facility-specific risks. Facility operators should be in communication with the corporate
cyber risk management policy office to ensure the policy is aligned with their specific
vulnerabilities and operations.
(Source: NIST SP800-82-4.2.2)
Management should define and approve a cyber risk management policy. The policy should
be communicated to employees and relevant external parties as needed. The CRMT is a
critical source of input for development of effective cyber risk policy. The policy should
include clear direction regarding:
3
Enclosure (2) 05-17
Management, with the input of the CRMT, should establish a cyber risk management
program to ensure that employees and contractors requiring access to the organization’s
networks, receive job-relevant cyber awareness training. In order to develop a managable
and realistic program, an organization’s cyber risk management policy should take into
account the organzation’s risk tolerance and available resources. Key cyber risk
management measures can also involve making potentially sensitive revisions to new and
existing employee, supplier, and third-party contracts to ensure cyber risk management
responsibilities are appropriately defined. The cyber risk management policy should include
a definition of roles and responsibilities, including those expected of all users, senior
management, privileged users, third-party stakeholders (e.g. suppliers, contractors,
customers, partners), and physical and information security personnel. The CRMT lead
should have responsibility for the development, review and evaluation of the policy, with
approval and oversight by senior management.
The suggested cyber risk management process begins with a full inventory of cyber-
connected systems (see Section 2). This inventory is then used to generate a list of systems
whose failure or disruption would have the most severe consequences (Section 3.1). These
systems should then be evaluated for exploitable vulnerabilities. Based on the evaluation of
the severity of vulnerability, operators can prioritize systems for mitigation. While these
functions are described sequentially, facility operators should think of them as a continuous,
repeating process.
4
Enclosure (2) 05-17
The purpose of these steps is to gain the knowledge that allows a company to focus and prioritize
its cybersecurity efforts, consistent with business needs.
To inform the cyber risk management process, the CRMT should inventory cyber-connected
systems and identify those systems that perform or support vital operational, safety, security,
or environmental protection functions. This inventory should include an on-scene survey of
cyber-dependent equipment, to identify any systems not on current network maps. Input
from operators, security personnel, and OT engineers may prove vital at this stage.
Perform inventory of facility cyber and cyber connected systems using the following
suggested process or equivalent:
2.1.1 Map the system. Map the entire system(s) and identify hardware, connections,
identify users, and major systems. One method to do this is to deploy an automated asset
inventory discovery tool and use it to build a preliminary inventory of systems connected
to the organization’s public and private network or networks. Automated tools enable
tracking, updating, and custom reporting of the inventory. This software is commonly
available; however, it is important that the selected version be capable of examining
proprietary and standard OT (industrial) systems as well as IT systems. Both active tools
that scan through network address ranges and passive tools that identify hosts based on
analyzing their traffic should be employed. Identify all ports, protocols, and services
with validated business needs running on each system.
2.1.3 User Census. Develop a list of authorized users for each system to include
authorized levels and methods of access. Ensure out-of-date or expired profiles are
removed from the system. Attackers frequently discover and exploit legitimate but
inactive user accounts to impersonate legitimate users, thereby making discovery of
attacker behavior difficult for network managers.
2.1.4 Vendor and Employee Review. Review Contracts. Contractual obligations for
employees and contractors should reflect the organization’s policy for cyber risk
management. A code of conduct may be used to state employee or contractor cyber risk
management responsibilities, including but not limited to:
5
Enclosure (2) 05-17
Confidentiality
Data protection
Ethics
Appropriate use of the organization’s equipment and facilities
Reputable practices expected by the organization
2.1.5 Categorize Systems. Use the inventory to develop a list of Major Systems.
Major Systems are those that perform a significant process for the enterprise and are
made up of subsystems which perform individual steps in the process. For example, an
Emergency Management System (Major System) may be made up of fire alarm,
sprinkler, and smoke purge subsystems.
Major system categories can include physical security, safety, and environmental
protection systems that perform any of the following functions:
2.1.6 Conduct Business Impact Analysis. The purpose of Business Impact Analysis
(BIA) is to identify and prioritize system components by correlating them to the
mission/business process(es) the system supports, and using this information to
characterize the impact on the process(es) if the system were unavailable.
6
Enclosure (2) 05-17
Consequences of a cyber incident can be as varied as the threat actors, ranging from
negligible or even unnoticed effects to catastrophic incidents. The tables referenced in this
section are located in Appendix A. In evaluating potential consequences, operators should
not assume that cyber events will occur in isolation, or at the best possible times. Cyber
systems should be evaluated for both security and safety risks, as defined below.
Deliberate cyber attacks may occur before or in conjunction with physical attacks. Less
targeted, but equally significant cyber events may occur when key personnel are not
available, other equipment is down for repair, during natural disasters, or any time when
multiple risk factors will be present. It is important to not only plan for consequence
scenarios within the realm of possibility, but to objectively consider worst case scenarios.
MTSA plan holders may examine consequences by reviewing the scenarios used to develop
the Facility Security Plans or by examining system by system, asking, “What system failures
could cause the worst possible consequences?” and “What is the worst possible consequence
of a failure or disruption of this major system?”. This will create a picture of which systems
require the most rigorous examination.
As with the inventory, the most effective consequence determinations will involve input from
the entire CRMT. Using the inventory results along with this wide ranging personnel input
will help reveal cascading effects where one system failure or malfunction leads to another.
Failure of backup and failsafe systems, either electronic or manual, should be part of the
“worst case” examined during this process.
The use of a Maximum Tolerable Downtime (MTD) matrix will allow operators to assess the
total amount of time managers are willing to accept for a mission or business process outage
and consider all impact implications.
Event consequences are described in Table 1 (Appendix A, page 1) and will assist in
identifying systems for which further analysis is warranted. Consequences range in severity
from Catastrophic to Insignificant. Determining the severity of consequences will be one
factor that, along with the presence and severity of a vulnerability, will determine the level of
7
Enclosure (2) 05-17
facility, or any circumstance that impairs the safety or fitness for service of a facility or a
vessel at a facility.
A Major Event would result in one or more deaths, injuries requiring professional
medical treatment beyond first aid, damage to property, damage to or loss of a vessel at a
facility, destruction of a facility, or discharge or release of oil or hazardous substance.
Major events will generally have significant but acute impacts, or less severe but more
sustained effects on the MTS.
A Catastrophic Event would result in high consequence and long term effects on the
U U
The Table 1 consequence descriptions are provided for illustrative purposes only and
do not, of themselves, determine what systems require what level of protection.
Operators should focus further examination on systems with Catastrophic, Major, or
Moderate event consequences (those scoring 3, 4, or 5 in Table 1) as described in Table 2
(Appendix A, page 1). Prioritizing systems for which disruption would have the most severe
consequences is recommended. Operators may choose to further evaluate systems’
vulnerabilities with event consequences in the Minor and Insignificant categories (those
scoring 1 or 2) with the goal of protecting business systems, reputation, efficiency, safety,
and proprietary information. Good cyber practices and hygiene are recommended throughout
organizations.
In addition to systems that score 3, 4, or 5 in Table 1, systems that, in whole or part, perform
a function required by an FSP, such as running cameras or monitors for a restricted area,
should be considered high priority, similar to those scoring 3 or above, and be rigorously
examined for vulnerabilities, continuing with this or an equivalent process. Operators should
avoid connecting systems with components performing these functions to systems with lower
levels of protection. These connections can be vectors for cyber incidents to migrate from
system to system and should be limited to those serving a viable and necessary business,
1 A security incident resulting in a significant loss of life, environmental damage, transportation system disruption,
or economic disruption. (46 USCS § 70101)
8
Enclosure (2) 05-17
Now that critical systems and functions have been identified, examining to what other
systems they are connected is critical to gain thorough knowledge of vulnerabilities. This
will be done by examining both the connections and functions of each system. To determine
which systems should be examined for vulnerabilities, refer to Table 2 which provides
guidance based on the system’s assigned consequence score from Table 1.
Each major system should be evaluated using the questionnaire in Table 3, the Connective
Vector Assessment, to determine whether failure or disruption of a seemingly innocuous
system might have secondary and more severe consequences.
All “YES” responses from the Connective Vector Assessment in Table 3 should be
evaluated for vulnerability severity in the following step using Table 4 (Appendix A, page
3), the Cyber Infrastructure Vulnerability Assessment. In some cases, where a connection
between systems is deemed unnecessary, “air gapping” the critical system is advisable,
minimizing a vulnerability. An “air gap” is a system in which computers are not connected
directly to the internet, or to any computers that are connected to the internet (discussed
further in Section 5).
Once an organization has identified the systems of highest consequence and eliminated all
unnecessary connections, it should examine those systems for infrastructure vulnerabilities
using Table 4, the Cyber Infrastructure Vulnerability Assessment. Cyber infrastructure
vulnerabilities are flaws in a cyber system’s design, configuration, maintenance,
communication and data links, or software. This vulnerability assessment should be applied
to each major system identified by the CRMT as having a consequence score of 3 or higher
(Table 1). “NO” answers will identify vulnerabilities that could be exploited. “YES”
answers indicate that the element of infrastructure has appropriate security measures in place.
If the answer is not clearly “YES”, or is only partially “YES”, it should be marked “NO”.
Determining which systems have both an infrastructure vulnerability and a vector by which it
could be exploited is a key factor (along with consequence of disruption, covered in Section
3.1) in determining risk. Use Table 5 (Appendix A, pages 3-5) to assess the severity of
vulnerabilities and prioritize systems for mitigation. This will be done by answering the
questionnaire for each system with a “NO” answer from the Cyber Infrastructure
Vulnerability Assessment (Table 4). Systems with the highest TOTAL score (at the bottom
of Table 5) should be considered the most vulnerable.
Record all vulnerabilities and consequences noted during the assessment for review by the
COTP. Maintain records of risk assessment IAW MTSA requirements for an FSA.
9
Enclosure (2) 05-17
Once the CRMT recognizes their cyber risks, the organization can select strategies to reduce that
risk. However, adequately protecting digital information and cyber dependent system does not
usually entail a straight-forward, sequential implementation of specific mitigation measures.
Organizations should implement multiple layers of safeguards across a number of different
realms (e.g. contracting, human resource management, education and training, network design,
physical security, access control, etc).
Prevention and protection strategies reduce vulnerabilities and the frequency of successful
attacks or adverse events. While high-risk systems should have more robust protection
strategies, this does not necessarily require sophisticated technical solutions. For example,
physical access control and training may be sufficient for systems where the primary
vulnerability is an insider threat. Where risk managers choose technical solutions, they should
also recognize their limitations. Many systems are only capable of recognizing and blocking
known threats. Unfortunately, malware and associated delivery mechanisms used by malicious
actors are becoming increasingly sophisticated, and a strategy that relies exclusively on a
perimeter defense designed to filter out known threats is not likely to be successful.
Operators can also reduce risk by taking steps to minimize overall impact or consequences of a
cyber incident. Backups, kept at a remote location, can be an excellent way of building cyber
resilience and may be appropriate for situations where the cyber failure is disruptive, but does
not include immediate security, safety, or environmental impacts. However, these manual
backups, while functional, may now be the weakest link, significantly slowing operations.
Exercises can help identify the procedures to isolate a suspect system, purge it of malware, and
safely resume operations. Including a cyber aspect into an existing security, natural disaster,
salvage/recovery, or environmental response plan can help an organization prepare for a cyber
incident.
4.1 Protect
4.1.1 Cyber Risk Awareness Program. Facilities should maintain, and enforce a
cyber risk awareness program for employees and contractors. The awareness program
should ensure that new and existing employees, as well as contractors requiring access to
the organization’s IT/OT networks, receive job-relevant training and direction related to
the organization’s cyber risk management policy. This includes enhancing staff’s cyber
risk awareness (i.e., what can happen as a result of poor cyber practices) and cyber
preparedness (i.e., ensuring that staff are doing all they can to improve the organization’s
cyber integrity). The cyber risk awareness program could include guidance related to the
following:
10
Enclosure (2) 05-17
4.1.2 Acceptable Use of Cyber Systems. Define and communicate rules regarding the
acceptable use of cyber systems. Prior to gaining access to the organization’s cyber
systems, employees and external party users should be made aware of (and agree to) the
constraints and responsibilities associated with the use of these systems. These
constraints should be reflected in the organization’s cyber risk management policy.
Limit administrative privileges to very few users who have both the knowledge necessary
to administer the operating system and a business need to modify the configuration of the
underlying operating system. This will help limit installation of unauthorized software
and other abuses of administrator privileges.
process that permits a user to enter one name and password in order to access multiple
applications – is one strategy for managing authentications. SSO can reduce the amount
0T
of secret authentication information that users are required to protect and thus can
increase the effectiveness of this control (the more authentication-related information
users are asked to remember, the more likely they are to forget it or write it down). In
order to protect access to critical systems, a secure password management system should:
Enforce the use of individual user IDs and passwords to maintain accountability
Allow users to select and change their own passwords and include a confirmation
procedure to allow for input errors
Enforce a choice of quality passwords
Force users to change their passwords at the first log-on
Enforce regular password changes and as needed
Maintain a record of previously used passwords and prevent re-use
Not display passwords on the screen when being entered
Store password files separately from application system data
Store and transmit passwords in protected form (if passwords are transmitted in
clear text during the log-on session over a network, they can be captured by a
network "sniffer" program)
The password management system should reflect that overly complicated passwords,
which are changed too frequently, are at risk of being written on a piece of paper and kept
near the computer. The value of password protection should be weighed against the risks
associated with time-sensitive operations. In cases where rapid access is vital to
11
Enclosure (2) 05-17
operations or safety, risks may be better mitigated with manual backups or other
procedures.
The use of firewall and access control lists for traffic through corporate systems such that
external parties have access only to the functions needed should also be considered. This
is particularly important where suppliers need to upload systems upgrades or perform
remote servicing.
12
Enclosure (2) 05-17
assets
Secure user registration to ensure that access credentials are only issued to
authentic users – such as using an independent Registration Authority for the
process
Authentication using digital certificates, passwords, biometrics or smartcards
Firewalls and access control lists to prevent unauthorized user access
Role based access control to limit the function the user is permitted to perform
Review web application logs for attack identification and containment
4.1.4 Network Segmentation. One method of managing the security of large networks
is to divide them into separate network zones (i.e., domains) or organizational units. The
most common approach for managing such an approach is through network segmentation
and segregation.
While network segregation and segmentation can involve the physical separation of
networks, it generally relies on the use of firewalls and/or Virtual Local Area Networks
(VLANs) to segment the organization’s network(s) into multiple zones with varying
security requirements. Both tools – of which there are a variety of options, each with its
own capabilities/uses – can be layered and/or used in combination to increase network
security. Firewalls and VLANS should be configured (e.g. through access lists) to
enforce access management rules set by the organization.
Most accepted national standards recommend segregating functional systems into
separate network zones using such methods as air gapping. Figure 1 illustrates an “air
gap” between business and control systems networks.
BUSINESS
Workstations Printers Security File
NETWORK Update Server Server
AIR GAP
CONTROL SYSTEM Engineering
Workstation
NETWORK
Programmable Logic
Controller
x x x x x x x x x x
FI Flow
Indicator
Human Machine
Interface
x x x x x x x x x x LI Level
Indicator
Transfer Facility Emergency
Pump Shutdown Valve
Minimize connections between business and operational technology. Evaluate connected systems based
on the highest consequences and vulnerabilities to either system.
Properly air-gapped and segregated systems may still be vulnerable to insider threats,
third parties, and technical failure. Figure 2 shows all the potential ports and access
points in an air-gapped control system compared to systems that are not segregated into
separate networks.
13
Enclosure (2) 05-17
4.1.5 Protect Equipment. Define and implement practices and procedures that
establish a protective perimeter and layered defenses around critical equipment.
4.1.5.2 Establish safe and secure processes to track and manage system updates
(i.e., configuration management). Ensure procedures that provide comprehensive
updates to all hardware and software installations (including routers, switches,
firewalls and other elements of the network infrastructure) are properly managed
and documented system-wide, thus improving the organization’s security posture.
4.1.5.4 Ensure physical access control to areas where cyber assets are stored or
used. The physical location of the IT/OT infrastructure within a site (e.g., on
board a waterfront facility) is important to consider, particularly with a view to
restricting access and maintaining physical security of the network installation
and access to control points.
14
Enclosure (2) 05-17
4.1.5.6 Ensure that cyber assets are not taken off-site without prior authorization.
Perform spot checks to detect unauthorized removal of assets and to detect
installation of unauthorized devices.
4.1.5.8 Establish and implement controls regarding access to cyber systems from
off-site (e.g. tele-working), or at remote sites (e.g. field office). Organizations
allowing remote activities should issue a policy that defines the conditions and
restrictions of off-site activities. In addition, organizations should ensure the
security of personal computers, mobile phones, or other devices, used to access
cyber systems (e.g. home working or travel outside the normal work location).
User training
Physical security of mobile devices (i.e., off-site use and protection of
devices)
Relatively weaker wireless security protocols.
Inactivity timer lock policy
Disabling of unused wireless interfaces, services and applications to
mitigate against unauthorized access.
15
Enclosure (2) 05-17
16
Enclosure (2) 05-17
4.2 Detect
Even with a well-defined cyber risk management policy and program, unauthorized
intrusions and compromises of critical systems remain a possibility. Therefore, it is
necessary to put in place applications and processes to detect these intrusions.
4.2.3 Keep Logs. Create, keep, protect, and regularly review event logs recording user
activities, exceptions, faults and cyber events. It is important that logs be
protected against tampering and unauthorized access. To help identify significant
events for security monitoring purposes, consider copying appropriate log entries
automatically to a second log, or the use of other tools to perform file analysis.
To ensure accuracy of event logs and subsequent reports, the clocks of all relevant
IT/OT systems within an organization should be synchronized.
17
Enclosure (2) 05-17
4.2.4 Run Tests. Run penetration testing of the organization’s critical IT/OT
infrastructure, if feasible. Penetration tests of critical IT/OT infrastructure can
detect whether the actual cybersecurity level matches the level set forth in the
cyber risk management policy. Penetration tests performed by external
experts employ attacks using both cyber and social engineering-based
elements.
4.2.5 Deploy and Update Intrusion Detection Systems. Deploy intrusion detection
and protection systems as appropriate. Ensure the software is properly installed,
configured, maintained, and updated. Network Intrusion Detection Systems (IDS)
work by monitoring and analyzing network traffic, then generating and
disseminating suspicious activity alerts in real time. Organizations may also
choose to incorporate Intrusion Prevention Systems (IPS). IPS, an extension of
the IDS, monitors, logs and reports on network activity and attempts to block
malicious traffic with the potential to compromise critical systems once detected.
The majority of IDS and IPS are attack Signature Based, comparing known
threats against observed events to identify possible incidents. Therefore, the
value of the system is only as good as the attack signature database against which
events are analyzed. IDS may also leverage Anomaly Based Detection, which
compares definitions of what activity is considered normal against observed
events to identify significant deviations at the system level. Anomaly-based
systems rely on profiles representing the normal behavior of such things as users,
hosts, network connections, or applications. Profiles are developed by monitoring
the characteristics of typical activity over a period of time.
Finally, IDS may also use more complex Protocol Analysis, which attempts to
identify deviations between what are generally accepted activities at the
application level against observed events.
Timeliness of updates
Effectiveness of internal distribution
Implementation
System impact
It is also important to note that technology alone is not sufficient to detect system
intrusions. Organizations should ensure that the evaluation, selection, installation,
operation, and maintenance of intrusion detection software are performed by
qualified technical staff. For example, IDS should be configured to closely
monitor traffic taking place within network zones housing critical information.
This support should be integrated in the organization’s cyber risk management
policy.
18
Enclosure (2) 05-17
4.3 Respond
Even with strong access controls and a well-designed cyber network that may include
sophisticated anti-virus software, and intrusion detection and protection systems,
compromises could occur. Response procedures are therefore necessary. An incident
response plan will detail the response priorities, roles, and responsibilities of personnel,
procedures and communication process necessary to effectively respond to a cyber incident.
A planned response to an incident can aid in minimizing disruption/damage, recover
compromised data and preserve evidence for legal action.
19
Enclosure (2) 05-17
1. Detect intrusion
2. Isolate system
3. Shut down system (if necessary)
4. Purge intrusion
5. Verify system safe
6. Restart
4.3.3 Limit Consequences. Include controls to deal with loss of computer based
systems and cyber networks, such as a denial of service attack. The plan should
address actions necessary to minimize, if not eliminate, propagation of the
incident. The action could be, but not limited to:
Isolation functions
Software management (e.g. patching vulnerabilities)
Strengthened controls to prevent reoccurrence
20
Enclosure (2) 05-17
4.4 Recover
Taking steps to put in place backups and alternative methods of carrying out core business
and supporting functions allows an organization to continue operations and maintain
continuity of safety and security processes despite a cyber attack. These redundancies and
mitigation measures will prove valuable not only in the event of a cyber incident, but also
during the recovery phase of a non-cyber safety or security event.
Facility operators should ensure that they have identified the sources of any backup data or
software needed to restore critical functions in a timely manner. Storage areas (e.g.
lockers/closets) may need additional capabilities such as dehumidifiers or water resistant
closures to protect electronic equipment stored in the maritime environment.
4.4.1 Back Up Information. Create, manage, and periodically test backup copies of
information, software and system images per cyber risk management policy.
Provide adequate backup facilities to ensure that all essential information and
software can be recovered following a disaster, cyber attack, or media failure.
4.4.2 Protect Back Up Storage. Ensure that backups are adequately protected via
physical security or encryption when they are stored, as well as when they are
moved across the network. Require the creation of multiple backups over time, so
that, in the event of malware infection, restoration can be from a version that is
believed to predate the original infection. Consideration should be given to the
protection of remote backups and cloud services. Ensure that key systems have at
least one backup destination that is not automatic and should be initiated by an
operator.
21
Enclosure (2) 05-17
used to monitor access to restricted areas in the event that cyber dependent access
control and monitoring systems are compromised.
4.4.4 Perform Exercises. Develop, manage, execute (as appropriate), and regularly
exercise recovery plans for cyber incidents that compromise critical systems.
Recovery plans (i.e. business continuity plans and disaster recovery plans) should
be concise and accessible to those with responsibilities defined in the plans. The
purpose and scope of each specific plan should be defined, agreed to by the
CRMT and senior management, and understood by those who will invoke the
plan. Any relationship to other relevant plans or documents within the
organization, particularly to business continuity plans, should be clearly
referenced and the method of obtaining and accessing these plans described. The
following is a non-exhaustive list of elements that should be contained in
organizational recovery plans:
4.4.5 Integrate Cyber Recovery into Enterprise Recovery Plan. Include cyber risk
management within the business continuity and disaster recovery management
processes. Existing business continuity or resumption plans can be implemented
to restore operations and maintain essential mission functions to supplement
and/or restore computer networks. Cyber networks should be tested prior to
resuming full operational capability to verify the problem is isolated and the
network is not vulnerable to a similar, or the same, threat.
22
Appendix A 05-17
Injury
Moderate requiring
Minor or short term
Moderate Consequence, medical
localized economic 3
Event Moderate Term treatment or
disruption
Effect on MTS. first aid,
and/or Death
Business
Minor Disruption: disruption
Minor Event Local/Short Term noticeable Negligible 2
Disruption outside
organization
Insignificant Business
None None 1
Event Disruption
1
Appendix A 05-17
containing:
- Shore areas immediately adjacent to each vessel moored at the
facility
- Certain dangerous cargoes
- Manufacturing or processing areas and control rooms
Systems containing cargo documentation?
Security measures to protect cargo and vessel stores at the facility
(including measuring, tracking, or moving cargo)?
Systems that identify cargo approved for loading, restrict entry of
unauthorized cargo, or ensure the release of cargo only to
authorized carriers/recipients?
Security or monitoring measures for delivery of stores and bunkers?
Identification, monitoring, screening, tracking, or direction of guests
or passengers?
Sensors, alarms, or notification systems for a security or safety
incident?
Emergency communications with outside parties?
(Source: NIST SP800-82-4.2.6)
2
Appendix A 05-17
Table 4: Cyber Infrastructure Vulnerability Assessment (Encl. 2, sections 3.2 and 3.3)
YES NO
Are installed security capabilities enabled and checked?
Is there incorporation of security into architecture and design?
Are there safeguards against system reprogramming?
Are there safeguards against and warnings for spoofing?
Is manipulation of control data logic prevented?
Is there sufficient backup power?
Is there an identity authentication policy?
Are there incident detection and response plans and procedures?
Have unsecured physical ports been eliminated?
Are vendor software patches developed after a vulnerability is identified?
Are vendor software patches installed after a vulnerability is identified?
Is data accessible only to personnel with a legitimate business need?
Is malware protection installed and up-to-date?
Are critical configurations stored and backed up properly and regularly?
Is there redundancy in critical system functions (avoiding single point failure)?
Are logs of software alterations, suspicious activity, cyber attacks/ incidents, and
system modifications maintained?
Are there backup or shut-down options in case of loss of environmental control?
Are you able to isolate, contain, or shut down compromised operations or systems in
the event of a cyber-related disruption?
Is operational data and configuration information removed from systems before they
are decommissioned?
(Source: NIST SP800-82-4.2.6)
3
Appendix A 05-17
Guest and
Who has access to
Remote Access: corporate
wireless ports?
Router access
Are guests permitted to All
Vendor Network points are
access wireless ports, employees
Satellite logically Significant
particularly on their have
Provider No wireless separated; number of
own devices? N/A access;
Network access limited users and
Are wireless ports guests have
Wireless Access number of access points
password protected? substantial
Points users and
Are only approved access
Wireless access
devices able to access
Protocols points,
wireless networks?
o Are user-developed
technologies and user
computing that support
critical activities No user-
Large Large
(includes Microsoft developed Few
incidence of incidence
Software Excel spreadsheets and software instances of
user- of user-
Software Access databases or OSS, user
developed, developed,
Defects and other user-developed No user- developed or
user- user-
Bugs tools) in use? N/A modified modified
modified, or modified,
Configuration o Are internally hosted software software,
OSS or OSS
and developed (or supporting
supporting supporting
vendor developed but No OSS non-critical
non-critical critical
user modified) functions
functions functions
applications supporting
critical activities?
o Is Open Source
Software (OSS) in use?
Minimal
connections
o What ISP connections No ISP Several
to ICS, connections
link to ICS, security, or connections connections
security to ICS,
business systems? to ICS, to ICS,
systems, or security
o Are ISP configurations security security
ISP Connections N/A relevant systems, or
overly complex? systems, or systems, or
business relevant
o Are policies on ISP use relevant relevant
systems business
sufficiently restrictive business business
systems
and adhered to? systems systems
Low
complexity
4
Appendix A 05-17