April 2019: (Requirements and Controls) (First Edition)
April 2019: (Requirements and Controls) (First Edition)
April 2019: (Requirements and Controls) (First Edition)
ClassNK has compiled the "ClassNK Cyber Security Approach" as a basic way of thinking about onboard cyber
security based on trends in international institutions and maritime bodies.
Based on these concepts, we will continually publish guidelines and standards that specify the parties
responsible for implementing cyber security controls and the details thereof as part of the "ClassNK Cyber
Security Series".
For the first edition of the Guidelines, we tried to extract minimum required controls for ships from standards on
cyber security. However, cyber security controls implemented in accordance with the Guidelines may be
insufficient or excessive. Therefore, we will continually revise and optimize the Guidelines for ships.
I
Cyber Security Management System for Ships
II
Cyber Security Management System for Ships
3. Controls for ensuring the health of 3. Controls for ensuring the health of 3. Controls for ensuring the health of
"operational controls" "operational controls" "operational controls"
4. Organizational controls designed for information 4. Organizational controls designed for information 4. Organizational controls designed for information
security management security management security management
5. Development of shipboard products with reduced cyber risks 5. Development of shipboard products with reduced cyber risks 5. Development of shipboard products with reduced cyber risks
III
Cyber Security Management System for Ships
IV
Cyber Security Management System for Ships
Revision History
No. Date Category Details of revision
1 April 1, 2019 New First issue
V
CONTENTS
INTRODUCTION ......................................................................................................................................................3
1 Background and context ............................................................................................................................... 3
2 Definitions .................................................................................................................................................... 3
PART 1: REQUIREMENTS ..............................................................................................................................5
Chapter 1 GENERAL ...........................................................................................................................................5
1.1 Objectives ..................................................................................................................................................... 5
1.2 Application ................................................................................................................................................... 5
1.3 Functional Requirements for a Cyber Security Management System (CSMS) ........................................... 5
Chapter 2 CYBER SECURITY POLICY ...........................................................................................................6
2.1 Establishment of the Cyber Security Policy ................................................................................................. 6
2.2 Implementation and Maintenance of the Cyber Security Policy .................................................................. 6
Chapter 3 COMPANY RESPONSIBILITIES AND AUTHORITY .................................................................7
3.1 Reporting of the Entity Who Is Responsible for the Operation of the Ship ................................................. 7
3.2 Definition of Responsibilities for Work Relating to Cyber Security ............................................................ 7
3.3 Company's Responsibility for Support ......................................................................................................... 7
Chapter 4 DESIGNATED PERSON(S)...............................................................................................................8
4.1 Appointment of Designated Person(s) and Their Responsibility and Authority .......................................... 8
Chapter 5 MASTER'S RESPONSIBILITY AND AUTHORITY .....................................................................9
5.1 Master's Responsibility ................................................................................................................................ 9
5.2 Master's Authority ........................................................................................................................................ 9
Chapter 6 RESOURCES AND PERSONNEL..................................................................................................10
6.1 Requirements for the Master ...................................................................................................................... 10
6.2 Requirements for Manning......................................................................................................................... 10
6.3 Familiarization ........................................................................................................................................... 10
6.4 Ensuring of Understanding by Personnel Involved .................................................................................... 10
6.5 Training ...................................................................................................................................................... 10
6.6 Establishment of Procedures for Providing Information ............................................................................ 10
6.7 Ensuring of Communication with the Ship's Personnel ............................................................................. 10
Chapter 7 SHIPBOARD OPERATIONS .......................................................................................................... 11
7.1 Establishment of Shipboard Operations ......................................................................................................11
Chapter 8 EMERGENCY PREPAREDNESS ..................................................................................................12
8.1 Establishment of Procedures to Respond to Emergency Situations ........................................................... 12
8.2 Establishment of Programs to Respond to Emergency Situations.............................................................. 12
8.3 Provision of Measures Ensuring Response to Emergency Situations ........................................................ 12
Chapter 9 REPORTS AND ANALYSIS OF NON-CONFORMITIES, ACCIDENTS AND HAZARDOUS
OCCURRENCES ...................................................................................................................................................13
9.1 Reports of Non-Conformities, Accidents and Hazardous Situations.......................................................... 13
9.2 Measures to Prevent Recurrence ................................................................................................................ 13
Chapter 10 MAINTENANCE OF THE SHIP AND EQUIPMENT .................................................................14
10.1 Establishment of Maintenance Procedures................................................................................................. 14
10.2 Requirements for Maintenance Procedures ................................................................................................ 14
10.3 Ensuring of the Continuity of Maintenance Procedures............................................................................. 14
10.4 Relationship with the Maintenance Routine............................................................................................... 14
Chapter 11 DOCUMENTATION.........................................................................................................................15
11.1 Establishment and Maintenance of Document Control Procedures ........................................................... 15
11.2 Requirements for Document Control Procedures....................................................................................... 15
11.3 Cyber Security Management Manual ......................................................................................................... 15
Chapter 12 COMPANY VERIFICATION, REVIEW AND EVALUATION ...................................................16
12.1 Audits of the Cyber Security Management System ................................................................................... 16
1
12.2 Supplier Relationships................................................................................................................................ 16
12.3 Evaluation of the Cyber Security Management System ............................................................................. 16
12.4 Implementation of Audits and Corrective Actions ..................................................................................... 16
12.5 Independence of Audits .............................................................................................................................. 16
12.6 Calling Attention to the Results of Reviews .............................................................................................. 16
12.7 Implementation of Corrective Actions ....................................................................................................... 16
Part 2 CONTROLS ......................................................................................................................................17
Chapter 1 GENERAL .........................................................................................................................................17
1.1 Objectives ................................................................................................................................................... 17
1.2 Application ................................................................................................................................................. 17
1.3 Relationships Between Risk Management and Controls for Cyber Security ............................................. 17
Chapter 2 CONTROLS IN SHIPBUILDING ..................................................................................................19
2.1 Functions and Operation for Cyber Security .............................................................................................. 19
2.2 Equipment .................................................................................................................................................. 20
2.3 Information Communication Devices ........................................................................................................ 21
2.4 Networks .................................................................................................................................................... 22
2.5 Information ................................................................................................................................................. 23
2.6 Access Control ........................................................................................................................................... 24
2.7 Physical Controls ....................................................................................................................................... 26
2.8 Contingency Plan ....................................................................................................................................... 27
2.9 Supplier Relationships................................................................................................................................ 27
Chapter 3 CONTROLS FOR THE COMPANY IN OPERATION ................................................................29
3.1 Preparation of Operation Rules .................................................................................................................. 29
3.2 Support and Management in Operation...................................................................................................... 29
3.3 Security Controls in Shore Information Communication Devices ............................................................. 30
3.4 Logging and Monitoring ............................................................................................................................ 30
3.5 Contingency Plan ....................................................................................................................................... 31
Chapter 4 CONTROLS FOR SHIPS IN OPERATION ..................................................................................32
4.1 Management of Equipment, Information Communication Devices, and Networks................................... 32
4.2 Contingency Plan ....................................................................................................................................... 32
Annex .............................................................................................................................................................33
1 Reference ............................................................................................................................................33
2 Applications of ICT and Cyber Risks in the Maritime Field ........................................................34
2
INTRODUCTION
"Cyber Security Management System for Ships" (NK-CSMS) provides guidelines for activities to establish, maintain, and
continually improve a management system for cyber security so that the company and ship can ensure safety of the ship in
operation. Integrating NK-CSMS into the processes and management structure of the company and ship will be helpful in properly
evaluating and managing cyber risks. When applying NK-CSMS, the needs, goals, and capabilities of the organization should be
taken into account in addition to the cyber security controls provided in this document.
This document consists of the following 2 parts.
"PART 1 REQUIREMENTS" defines the requirements for a Cyber Security Management System (CSMS). The requirements
apply to the company and ship.
"PART 2 CONTROLS" defines cyber security controls in shipbuilding and operation. The controls are implemented for the
company and ship.
Target
Company Ship
PART 1 REQUIREMENTS ○ ○
Part 2 CONTROLS Shipbuilding ○ Chapter 2 -
Operation ○ Chapter 3 ○ Chapter 4
2 Definitions
3
2.8 Major Non-Conformity
"Major non-conformity" means an identifiable deviation that poses a serious threat to the cyber security of personnel or the ship or
a serious risk to the environment that requires immediate corrective action or the lack of effective and systematic implementation
of a control of the CSMS.
2.9 Convention
"Convention" means the International Convention for the Safety of Life at Sea, 1974 as amended.
4
PART 1: REQUIREMENTS
Chapter 1 GENERAL
1.1 Objectives
1.1.1 General
The objective of Part 1 is to ensure cyber security in ship operation.
1.1.2 Cyber security management objectives of the company
Cyber security management objectives of the Company should, inter alia:
-1. Provide for safe practices in ship operation and a safe working environment;
-2. Assess all identified cyber risks to its ships, personnel and the environment and establish appropriate safeguards; and
-3. Continuously improve cyber security management skills of personnel ashore and aboard ships, including preparing for
emergencies related both to cyber security.
1.1.3 Compatibility with relevant rules, regulations, codes, and guidelines
The CSMS should ensure:
-1. Compliance with mandatory rules and regulations; and
-2. That applicable codes, guidelines and standards recommended by the Organization, Administrations, classification societies
and maritime industry organizations are taken into account.
1.2 Application
The controls defined in Part 2 may be applied to all ships and companies.
Every Company should develop, implement and maintain a cyber security management system (CSMS) which includes the
following functional requirements:
-1. A cyber security policy;
-2. Instructions and procedures to ensure cyber security of ships in compliance with relevant international and flag State
legislation;
-3. Defined levels of authority and lines of communication between, and amongst, shore and shipboard personnel;
-4. Procedures for reporting accidents and non-conformities with the provisions of the Requirements;
-5. Procedures to prepare for and respond to emergency situations; and
-6. Procedures for internal audits and management reviews.
5
Chapter 2 CYBER SECURITY POLICY
The Company should establish a cyber security policy which describes how the objectives given in paragraph 1.1 will be achieved.
The Company should ensure that the policy is implemented and maintained at all levels of the organization both, ship-based and
shore-based.
6
Chapter 3 COMPANY RESPONSIBILITIES AND AUTHORITY
3.1 Reporting of the Entity Who Is Responsible for the Operation of the Ship
If the entity that is responsible for the operation of the ship is other than the owner, the owner must report the full name and details
of such entity to the Administration.
The Company should define and document the responsibility, authority and interrelation of all personnel who manage, perform and
verify work relating to and affecting cyber security.
The Company is responsible for ensuring that adequate resources and shore-based support are provided to enable the designated
person or persons to carry out their functions.
7
Chapter 4 DESIGNATED PERSONS
To ensure the cyber security of each ship and to provide a link between the Company and those on board, every Company, as
appropriate, should designate a person or persons ashore having direct access to the highest level of management. The
responsibility and authority of the designated person or persons should include monitoring the cyber security aspects of the
operation of each ship and ensuring that adequate resources and shore-based support are applied, as required.
8
Chapter 5 MASTER'S RESPONSIBILITY AND AUTHORITY
The Company should clearly define and document the master's responsibility with regard to:
-1. Implementing the cyber security policy of the Company;
-2. Motivating the crew in the observation of that policy;
-3. Issuing appropriate orders and instructions in a clear and simple manner;
-4. Verifying that specified requirements are observed; and
-5. Periodically reviewing the CSMS and reporting its deficiencies to the shore-based management.
The Company should ensure that the CSMS operating on board the ship contains a clear statement emphasizing the master's
authority The Company should establish in the CSMS that the master has the overriding authority and the responsibility to make
decisions with respect to cyber security and to request the Company's assistance as may be necessary.
9
Chapter 6 RESOURCES AND PERSONNEL
6.3 Familiarization
The Company should establish procedures to ensure that new personnel and personnel transferred to new assignments related to
cyber security are given proper familiarization with their duties. Instructions which are essential to be provided prior to sailing
should be identified, documented and given.
The Company should ensure that all personnel involved in the Company's CSMS have an adequate understanding of relevant rules,
regulations, codes and guidelines.
6.5 Training
The Company should establish and maintain procedures for identifying any training which may be required in support of the
CSMS and ensure that such training is provided for all personnel concerned.
The Company should establish procedures by which the ship's personnel receive relevant information on the CSMS in a working
language or languages understood by them.
The Company should ensure that the ship's personnel are able to communicate effectively in the execution of their duties related to
the CSMS.
10
Chapter 7 SHIPBOARD OPERATIONS
The Company should establish procedures, plans and instructions, including checklist as appropriate, for key shipboard operations
concerning the cyber security of the personnel and ship. The various tasks should be defined and assigned to qualified personnel.
11
Chapter 8 EMERGENCY PREPAREDNESS
The Company should identify potential emergency shipboard situations, and establish procedures to respond to them.
The Company should establish programs for drills and exercises to prepare for emergency actions.
The CSMS should provide for measures ensuring that the Company's organization can respond at any time to hazards, accidents
and emergency situations involving its ships.
12
Chapter 9 REPORTS AND ANALYSIS OF NON-CONFORMITIES, ACCIDENTS
AND HAZARDOUS OCCURRENCES
The CSMS should include procedures ensuring that non-conformities, accidents and hazardous situations are reported to the
Company, investigated and analyzed with the objective of improving cyber security.
The Company should establish procedures for the implementation of corrective action, including measures intended to prevent
recurrence.
13
Chapter 10 MAINTENANCE OF THE SHIP AND EQUIPMENT
The Company should establish procedures to ensure that the ship is maintained in conformity with the provisions of the relevant
rules and regulations and with any additional requirements which may be established by the Company.
The Company should identify equipment and technical systems the sudden operational failure of which may result in hazardous
situations. The CSMS should provide for specific measures aimed at promoting the reliability of such equipment or systems. These
measures should include the regular testing of stand-by arrangements and equipment or technical systems that are not in
continuous use.
The inspections mentioned in 10.2 as well as the measures referred to in 10.3 should be integrated into the ship's operational
maintenance routine.
14
Chapter 11 DOCUMENTATION
The Company should establish and maintain procedures to control all documents and data which are relevant to the CSMS.
The documents used to describe and implement the CSMS may be referred to as the Cyber Security Management Manual.
Documentation should be kept in a form that the Company considers most effective. Each ship should carry on board all
documentation relevant to that ship.
15
Chapter 12 COMPANY VERIFICATION, REVIEW AND EVALUATION
The Company should carry out internal cyber security audits on board and ashore at intervals not exceeding twelve months to
verify whether cyber security activities comply with the CSMS. In exceptional circumstances, this interval may be exceeded by
not more than three months.
The Company should periodically verify whether all those undertaking delegated CSMS-related tasks are acting in conformity
with the Company’s responsibilities under the CSMS.
The Company should periodically evaluate the effectiveness of the CSMS in accordance with procedures established by the
Company.
The audits and possible corrective actions should be carried out in accordance with documented procedures.
Personnel carrying out audits should be independent of the areas being audited.
The results of the audits and reviews should be brought to the attention of all personnel having responsibility in the area involved.
The management personnel responsible for the area involved should take timely corrective action on deficiencies found.
16
Part 2 CONTROLS
Chapter 1 GENERAL
1.1 Objectives
Part 2 defines cyber security controls (hereafter called "controls") to be implemented in the company and onboard the ship in order
to properly respond to cyber risks in operation.
1.2 Application
1.3 Relationships Between Risk Management and Controls for Cyber Security
17
-1. Understanding of the context
The following context should be understood and documented about the ship.
(1) Onboard equipment and its specifications
Such equipment includes the main engine, steering gear, navigation support systems, generators, equipment for cargo
handling management, and equipment for responding to emergencies, etc. Information to be understood and documented
includes:
(a) Use of ICT in each equipment;
(b) Support of remote control functions and automatic control functions.
(2) Onboard information communication devices (including information systems, terminals, and network devices) and their
specifications
(3) Network configuration and use of communication
Equipment and information communication devices connected to networks, communication protocol and messages
communicated, ship-to-shore network connections via the internet, etc. should be included.
[Reference: IACS Recommendations, No. 156 (Sep 2018) Network Architecture, No. 159 (Sep 2018) Network security of
onboard computer based systems]
-2. Risk assessment
For risk assessment processes, JIS Q 31000:2010 Risk management-Principles and guidelines should be referred to.
(1) Cyber risk identification
Cyber risks that may affect equipment, information communication devices, and information related to operation of the ship
should be identified and described. When identifying cyber risks, information about the latest cyber security in the industry
should be obtained, and persons with accurate knowledge about cyber security should participate. "Annex 2 Applications of
ICT and Cyber Risks in the Maritime Field" provides examples of risk identification in typical information systems.
(2) Cyber risk analysis
For each of the identified cyber risks, its probability and effects should be examined. Analysis results may vary significantly
depending on the business circumstances of the target, such as the type of the ship/cargo, scheduled course, etc. In addition,
dependencies between cyber risks should be clarified to organize information for cyber risk evaluation.
(3) Cyber risk evaluation
Based on the analysis results, risks that need to be treated and their priorities should be examined. The Company should
clarify the differences from the pre-defined risk criteria and examine the need for treatment of each of the risks. The risk
criteria include the guidelines for evaluating the severity of risks (ISO/IEC 31000). Effects from standards and laws should
also be taken into account.
-3. Risk treatment
The Company should determine the details of risk treatment based on the result of risk assessment. For risk treatment, all controls
that are required must be selected and implemented. Part 2 describes the controls and implementation procedures. Part of the controls
should be implemented during shipbuilding because they involve equipment and information communication devices related to
operation of the ship. Therefore, the controls are divided into those to be implemented in shipbuilding and those to be implemented in
operation. Chapter 2 lists the controls in shipbuilding. In addition to the organizational controls for the company, shore-based controls
for supporting operation of the ship are also essential for the operation of the ship. Therefore, Chapter 3 lists the controls for the
company in operation, and Chapter 4 lists the controls for the ship in operation.
18
Chapter 2 CONTROLS IN SHIPBUILDING
Objective
To protect the ship from threats including cyber attacks by implementing controls selected in "Risk treatment" (1.3.2 -3) for cyber
security in shipbuilding.
19
[Reference: IACS Recommendations, No. 161 (Sep 2018) Inventory List of computer based systems]
-2. Implementation guidance
In shipbuilding, an inventory list of onboard equipment, information communication devices, and networks should be created and
maintained as they are determined. The inventory list should include information that identifies them, location, and network
configuration. Such information provides the basis to determine related controls and their implementation methods.
If equipment and information communication devices have software installed, information that identifies software, version, and
updates and patches applied should be recorded. The information is used to manage the application of patches when software
vulnerabilities are released and patches are distributed.
2.2 Equipment
Objective
To ensure cyber security controls for equipment to defend against threats including cyber attacks to onboard equipment.
20
2.2.3 Equipment siting
-1. Control
The Company should site equipment to reduce the risks from environmental threats, and opportunities for unauthorized access.
-2. Implementation guidance
The following examples should be considered to site equipment properly:
(1) Equipment should be sited to minimize unnecessary access into work areas;
(2) Storage facilities should be secured to avoid unauthorized access;
(3) Items requiring special protection should be sited and protected separate from other items;
(4) Controls should be adopted at the equipment location to minimize the risk of potential physical and environmental threats, e.g.
water (or water supply failure), dust, vibration, electrical supply interference, communications interference, electromagnetic
radiation and vandalism;
(5) Environmental conditions, such as temperature and humidity, should be monitored for conditions which could adversely
affect the operation of the equipment location;
(6) The use of special protection methods, such as keyboard membranes, should be considered for equipment in industrial
environments.
2.2.4 Implementation of manual control functions in equipment
-1. Control
For onboard equipment controlled remotely or automatically, manual control functions should be implemented in case that the
control becomes impossible.
-2. Implementation guidance
The main engine, rudder, and other equipment are controlled by management systems in distant areas such as the bridge, or
automatically controlled by the software embedded in the equipment. To ensure the operation of such equipment, manual control
functions that are independent of the management systems or embedded software should be implemented in the equipment.
[Reference: IACS Recommendations, No. 154 (Sep 2018) Recommendation concerning manual / local control capabilities for
software dependent machinery systems]
Objective
To ensure cyber security for information communication devices to defend against threats including cyber attacks that exploit the
vulnerabilities of onboard information communication devices.
21
(4) Collecting logs useful for detection of anomalies, detection of incidents, and understanding of the context;
(5) Allowing for the implementation of termination of network connections and contingency plans if detected anomalies or
incidents are serious for operation of the ship.
2.3.2 Information communication device configuration
-1. Control
The Company should identify and implement security configuration required for onboard information communication devices.
-2. Implementation guidance
Required security configuration includes:
(1) Adopting the latest version of software and applying updates and security patches;
(2) Taking vulnerability measures including blocking unused communication ports;
(3) Employing anti-virus measures;
(4) Enabling monitoring useful for detection of anomalies, detection of incidents, and understanding of the context;
(5) Enabling collection of logs useful for detection of anomalies, detection of incidents, and understanding of the context;
(6) Enabling functions for the implementation of contingency plans to respond to serious anomalies or incidents detected.
2.3.3 Information communication device siting
-1. Control
The Company should site information communication devices to reduce the risks from environmental threats, and opportunities for
unauthorized access.
-2. Implementation guidance
The following examples should be considered to site information communication devices properly:
(1) Information communication devices should be sited to minimize unnecessary access into work areas;
(2) Storage facilities should be secured to avoid unauthorized access;
(3) Controls should be adopted at the device location to minimize the risk of potential physical and environmental threats, e.g.
water (or water supply failure), dust, vibration, electrical supply interference, communications interference, electromagnetic
radiation and vandalism;
(4) Environmental conditions, such as temperature and humidity, should be monitored for conditions which could adversely
affect the operation of the device location;
(5) The use of special protection methods, such as keyboard membranes, should be considered for information communication
devices in industrial environments.
2.4 Networks
Objective
To ensure cyber security controls for networks to defend against threats including cyber attacks that exploit the vulnerabilities of
onboard networks.
22
(7) Partitioning of networks and network segments;
(8) Communication filtering and communication channel control with firewalls, switches, etc.;
(9) Anti-virus measures;
(10) Authentication for network access;
(11) Prevention, notification, and logging of unauthorized intrusions by intrusion prevention systems (IPSs).
[Reference: IACS Recommendations, No. 156 (Sep 2018) Network Architecture, No. 159 (Sep 2018) Network security of onboard
computer based systems, No. 162 (Sep 2018) Integration]
Especially for the following equipment related to navigational safety, controls should be determined by carefully examining cyber
risks associated with ship-shore communication and communication for control:
(12) Bridge systems/navigation support systems
(13) Main engine control system
(14) Bridge maneuvering
(15) Steering gear/heading control systems
(16) Electronic chart display systems
(17) Cargo control
(18) Ballast control
[Reference: IACS Recommendations, No. 164 (Nov 2018) Communication and Interfaces]
2.4.2 Implementation of networks
-1. Control
The Company should implement cyber security controls for onboard networks.
-2. Implementation guidance
Cyber security controls for onboard networks should be implemented based on the design (2.4.1).
2.5 Information
Objective
To provide protection for information related to operation control/management and shipboard operations according to the use and
importance of information to defend against threats including cyber attacks.
2.5.1 Protection of information
-1. Control
The Company should determine requirements for protection of information (Note) related to operation of the ship, and design and
implement safeguards.
[Reference: IACS Recommendations, No. 157 (Sep 2018) Data assurance]
Note: "Data" in the IACS Recommendation No. 157 is referred to as "information" in 2.5.
-2. Implementation guidance
The Company should determine requirements for protection of information related to operation of the ship, and design and
implement safeguards that meet the requirements. The target information is handled in onboard equipment, information
communication devices, and networks.
The impact of each requirement for protection of information can be expressed as, for example, High, Moderate, or Low, in terms
of confidentiality, integrity, and availability of information. Requirements for protection of information relate to system categories as
defined in "Annex D18.1.1 System categories" in Part D of the Guidance for the Survey and Construction for Steel Ships (2018). The
IACS Recommendations No. 157 (Sep 2018) Data assurance shows the relations between system categories I, II, and III and
confidentiality, integrity, and availability as shown below. The categorization may be used when determining requirements for
protection of each type of information onboard the ship.
23
System category Confidentiality Integrity Availability
I Low Moderate Low
II Moderate High Moderate
III Moderate High High
Information safeguards should be implemented with functions and operation for cyber security for onboard equipment,
information communication devices, and networks that handle the information (2.2, 2.3, and 2.4).
Information includes information at rest in equipment or information communication device and information in transit depending
on the status. Controls such as access control and encryption should be determined and implemented for each type.
Objective
To restrict access to information related to operation control/management and shipboard operations, as well as onboard equipment,
information communication devices, and networks.
24
(1) Using unique user IDs to enable users to be linked to and held responsible for their actions; the use of shared IDs should only
be permitted where they are necessary for business or operational reasons and should be approved and documented;
(2) Immediately disabling or removing user IDs of users who have left the organization;
(3) Periodically identifying and removing or disabling redundant user IDs;
(4) Ensuring that redundant user IDs are not issued to other users.
2.6.4 Management of privileged access rights
-1. Control
The Company should restrict and control the allocation and use of privileged access rights.
-2. Implementation guidance
The allocation of privileged access rights should be controlled through a formal authorization process in accordance with the
relevant access control policy (2.6.1).
2.6.5 Management of access authentication information of users
-1. Control
The Company should control the allocation of access authentication information through a formal management process.
-2. Implementation guidance
The allocation of access authentication information should take into account the following:
(1) When users are required to maintain their own access authentication information they should be provided initially with secure
temporary access authentication information, which they are forced to change on first use;
(2) Procedures should be established to verify the identity of a user prior to providing new, replacement or temporary access
authentication information;
(3) Temporary access authentication information should be given to users in a secure manner; the use of external parties or
unprotected (clear text) electronic mail messages should be avoided;
(4) Temporary access authentication information should be unique to an individual and should not be guessable;
(5) Users should acknowledge receipt of access authentication information;
(6) Default vendor access authentication information should be altered following installation of systems or software.
2.6.6 Removal or adjustment of access rights
1. Control
The Company should remove the access rights to information, information communication devices, and networks upon
termination of employment, contract or agreement, or adjust upon change.
-2. Implementation guidance
Upon termination, the access rights of an individual to information and assets associated with information communication devices
and networks should be removed or suspended. Changes of employment should be reflected in removal of all access rights that were
not approved for the new employment. The access rights that should be removed or adjusted include those of physical and logical
access. Removal or adjustment can be done by removal, revocation or replacement of keys, identification cards, information
processing facilities or subscriptions. Any documentation that identifies access rights of employees and contractors should reflect the
removal or adjustment of access rights. If a departing employee or external party user has known access authentication information
for user IDs remaining active, it should be changed upon termination or change of employment, contract or agreement.
2.6.7 Secure log-on procedures
-1. Control
Where required by the access control policy, the Company should control access to information, equipment, information
communication devices, and networks by a secure log-on procedure.
-2. Implementation guidance
A suitable authentication technique should be chosen to substantiate the claimed identity of a user. Where strong authentication
and identity verification is required, authentication methods such as cryptographic means, smart cards, token devices or biometric
means should be used in combination with passwords.
The log-on procedure should be designed to minimize the opportunity for unauthorized access. The log-on procedure should
therefore disclose the minimum of information about the system or application, in order to avoid providing an unauthorized user with
any unnecessary assistance.
25
2.6.8 Remote access and remote update
-1. Control
The Company should create a cyber security policy and implement controls for remote access and remote update for onboard
equipment and information communication devices.
-2. Implementation guidance
Equipment and information communication devices may be accessed remotely to:
(1) Monitor the states of the equipment and information communication devices;
(2) Diagnose the states of the equipment and information communication devices;
(3) Update software and data in the equipment and information communication devices.
Such accesses and processes involve the following threats:
(4) Communication channels used for access may be exploited, resulting in intrusions or other attacks;
(5) Administrative rights assigned for monitoring and diagnosis or other access rights may be exploited, or erroneous operations
may be performed with the access rights, impairing normal operations of the equipment or information communication
device;
(6) Software or data update process may fail, impairing normal processing of the equipment or information communication
device;
(7) Updated software or data may contain errors or other problems, impairing normal processing after the update;
(8) The equipment or information communication device may be infected by a virus as a result of an update of software or data.
To counter these threats, cyber security controls for remote update and remote access should be created and implemented.
Controls include:
(9) Identification of the target equipment and information communication devices and processes to be implemented;
(10) Authentication for access and communication as well as encryption of access control and communication;
(11) Identification of parties/persons and specification of the responsible person;
(12) Operational management for implementation, such as advanced application and training;
(13) Collection and checking of implementation records.
[Reference: IACS Recommendations, No. 163 (Sep 2018) Remote Update / Access]
Objective
To ensure physical cyber security controls including control of areas to defend against erroneous operation, destruction, damage,
and other threats to onboard equipment, information communication devices, and networks.
2.7.1 Areas
-1. Control
The Company should specify areas onboard the ship for cyber security controls and implement physical controls for the areas.
[Reference: IACS Recommendations, No. 158 (Oct 2018) Physical Security of onboard computer based system]
-2. Implementation guidance
A policy for physical controls for areas should be created. The policy should define, for example:
(1) Specification of areas appropriate for equipment, information communication devices, and networks;
(2) Who has permission to access areas and when they can access.
Physical controls for areas should be determined and implemented. Physical controls for areas include:
(3) Building perimeter walls around the areas to restrict access;
(4) Installing a lock on the doors into the areas to restrict access;
(5) Collecting logs related to the use of keys to record entries;
(6) Managing access to the records to protect them.
26
2.7.2 Physical protection of equipment, information communication devices, and networks
-1. Control
The Company should determine and implement physical controls to protect equipment, information communication devices, and
networks.
[Reference: IACS Recommendations, No. 158 (Oct 2018) Physical Security of onboard computer based system]
-2. Implementation guidance
Physical controls to protect equipment, information communication devices, and networks include:
(1) Siting equipment, information communication devices, and networks in areas with appropriate physical controls;
(2) Duplicating power systems, communication facilities, and air conditioning systems as required to ensure their operations;
(3) Prohibiting unauthorized removal of equipment.
Objective
To reduce damage caused by emergency situations by planning response in preparation for emergency situations relating to cyber
security.
Objective
To ensure enforcement and implementation of cyber security controls to defend against threats including cyber attacks to operation
related to outsourced operations and procured equipment and devices in shipbuilding.
27
2.9.1 Provision of cyber security requirements in supplier relationships
-1. Control
The provider should require the supplier to comply with the requirements for cyber security when outsourcing or procuring
operations for shipbuilding.
-2. Implementation guidance
The Company, the owner or manager of the ship, outsources shipbuilding to a system integrator. The system integrator procures
onboard equipment, information communication devices, and networks from suppliers and outsources construction of them to
suppliers.
This control applies to the Company and system integrator which outsource and/or procure part of operations in shipbuilding. The
Company, as the owner of the ship, should require the system integrator to implement this control via contracts with the system
integrator.
For outsourcing of operations for shipbuilding, the outsourcing contract may include the following as the requirements for cyber
security:
(1) Functions for cyber security provided in equipment, information communication devices, and networks;
(2) Requirements related to the work structure and work environment of the outsourcing contractor.
When determining the requirements for cyber security for the outsourcing contractor, the controls and implementation procedures
related to equipment, information communication devices, and networks (2.2, 2.3, and 2.4) may be consulted.
The system integrator may procure equipment, information communication devices, and/or networks externally. In such a case, the
system integrator should procure items that comply with the required cyber security requirements.
The requirements related to the work structure and work environment of the outsourcing contractor ensure the appropriateness of
work at the outsourcing contractor. Appropriate structure and management are required at the outsourcing contractor to ensure the
implementation and quality of the functions required in deliverables. In addition, the outsourcing contractor may be required to
separate the work environment from other operations.
The provider should determine, and include in the outsourcing contract, specification documents and inspection reports to be
delivered for cyber security when outsourcing shipbuilding operations.
2.9.2 Ensuring of cyber security requirements in supplier relationships
-1. Control
The provider should verify that deliverables satisfy the requirements for cyber security when procuring operations and equipment
for shipbuilding.
-2. Implementation guidance
The supplier should verify that deliverables satisfy the requirements for cyber security during a receiving inspection.
28
Chapter 3 CONTROLS FOR THE COMPANY IN OPERATION
Objective
To ensure that the ship's personnel can implement cyber security controls against threats including cyber attacks in operation of the
ship.
Objective
To ensure that the ship's personnel can implement cyber security controls against threats including cyber attacks in operation of the
ship.
29
3.3 Security Controls in Shore Information Communication Devices
Objective
To ensure the implementation of cyber security controls for shore information communication devices related to operation to
defend against threats including cyber attacks in operation of the ship.
3.3.1 Identification of shore information communication devices
-1. Control
The Company should identify shore information communication devices including information systems and terminals related to
cyber security in operation of the ship.
-2. Implementation guidance
Companies have information communication devices including information systems and terminals for various operations. Among
the information communication devices, the Company should identify the ones related to cyber security in operation of the ship. Such
information communication devices include:
(1) Devices that manage documents on the functions and operation for cyber security onboard the ship, including the
specifications of onboard equipment, information communication devices, and networks;
(2) Devices that manage the status of cyber security controls in operation of the ship;
(3) Devices for communications between the ship and Company in operation.
3.3.2 Configuration of shore information communication devices
-1. Control
The Company should implement security controls including identification and implementation of security configuration required
for shore information communication devices related to cyber security in operation of the ship.
-2. Implementation guidance
Security controls should be designed and implemented for the shore information communication devices identified above.
Especially, security configuration required for information communication devices includes:
(1) Adopting the latest version of software and applying updates and security patches;
(2) Taking vulnerability measures including blocking unused communication ports;
(3) Employing anti-virus measures;
(4) Performing monitoring useful for detection of anomalies, detection of cyber incidents, and understanding of the context;
(5) Collecting logs useful for detection of anomalies, detection of cyber incidents, and understanding of the context;
(6) Allowing for the implementation of contingency plans to respond to serious anomalies or incidents detected.
Objective
To detect and properly respond to events relating to cyber security in early stages and secure information for post-investigations
30
3.5 Contingency Plan
Objective
To reduce damage caused by emergency situations by ensuring that the Company responds to emergency situations relating to
cyber security onboard the ship in operation according to a contingency plan.
31
Chapter 4 CONTROLS FOR SHIPS IN OPERATION
Objective
To defend against threats including cyber attacks by ensuring the implementation of operations for cyber security onboard the ship
in operation.
Objective
To reduce damage caused by emergency situations by ensuring that the ship's personnel respond to emergency situations relating to
cyber security onboard the ship in operation according to a contingency plan.
4.2.1 Implementation of the contingency plan
-1. Control
The ship's personnel should take actions according to the defined contingency plan in case of an incident onboard the ship in
operation.
[Reference: IACS Recommendations, No. 155 (Sep 2018) Contingency plan for onboard computer based systems]
-2. Implementation guidance
The ship's personnel should take actions according to the defined contingency plan in case of an incident.
The ship's personnel should be trained timely according to the incident response and recovery plans to ensure the implementation
of these plans.
32
Annex
1 Reference
(1) IACS Recommendations, No. 153 (Sep 2018) Recommended procedures for software maintenance of computer based
systems on board
(2) IACS Recommendations, No. 154 (Sep 2018) Recommendation concerning manual / local control capabilities for software
dependent machinery systems
(3) IACS Recommendations, No. 155 (Sep 2018) Contingency plan for onboard computer based systems
(4) IACS Recommendations, No. 156 (Sep 2018) Network Architecture, No. 159 (Sep 2018) Network security of onboard
computer based systems
(5) IACS Recommendations, No. 157 (Sep 2018) Data assurance
(6) IACS Recommendations, No. 158 (Oct 2018) Physical Security of onboard computer based system
(7) IACS Recommendations, No. 159 (Sep 2018) Network security of onboard computer based systems
(8) IACS Recommendations, No. 160 (Nov 2018) Vessel System Design
(9) IACS Recommendations, No. 161 (Sep 2018) Inventory List of computer based systems
(10) IACS Recommendations, No. 162 (Sep 2018) Integration
(11) IACS Recommendations, No. 163 (Sep 2018) Remote Update / Access
(12) IACS Recommendations, No. 164 (Nov 2018) Communication and Interfaces
(13) JIS Q 27001:2014 Information technology-Security techniques-Information security management systems-Requirements
(14) JIS Q 31000:2010 Risk management-Principles and guidelines
33
Cyber Security Management System for Ships
I. Applications of II. Equipment III. Communication IV. Event 1: Action, V. Event 2: Direct cause of results VI. Risk
ICT equipment state, natural
phenomenon, etc.
1. Navigation systems
1-1 Bridge systems, GPS Compass Obtains GPS position GPS position information is Radio waves interfering with Correct position
navigation support information. disrupted high-frequency transmission of the information cannot be used
1-2 systems Gyro Compass Makes corrections with the High-frequency transmission of Doppler speed log and signals from Correct direction
- Display of maps, ship's speed information from the Doppler speed log or GPS GPS satellites information cannot be used
position, course, the Doppler speed log and GPS position information is disrupted (Protection from armed attacks using Heading control cannot be
and other ships position information. GPS signals) performed
1-3 - Navigation Heading Control Obtains GPS position High-frequency transmission of
instruction System information. the Doppler speed log or GPS
- Navigation Obtains direction information position information is disrupted
control from the gyro compass.
1-4 Voyage Data Records voyage data such as (1) High-frequency transmission Radio waves interfering with Correct voyage data cannot
Recorder GPS position, speed, data from of the Doppler speed log or GPS high-frequency transmission of the be accumulated
heading control systems, etc. position information is disrupted Doppler speed log and signals from
(2) Accumulated data is exploited GPS satellites
Intrusion via the real time monitor
(optional function)
1-5 Echo Sounder Measures water depth by Sound waves are disrupted Sound wave interference Correct water depth cannot
sending and receiving sound be measured, resulting in
waves from the ship's bottom. an increase risk of
grounding
1-6 Doppler Speed Log Measures the ship's speed by High-frequency transmission is High-frequency transmission Correct speed cannot be
sending and receiving disrupted interference measured, affecting ship
high-frequency waves. handling
1-7 Radar Measures the bearing and Radar waves are disrupted Radar wave interference Ship's surroundings cannot
distance of the target by sending be assessed
and receiving radar waves.
1-8 Electronic Chart (1) Displays GPS position GPS position information is Radio waves interfering with signals Ship's position becomes
Display and information on the electronic disrupted from GPS satellites unknown, affecting ship
Information System chart. Malware infection Virus infection due to internet handling
(ECDIS) (2) Uses the internet and USB connection or USB use
for installing and updating
electronic charts.
1-9 GPS (Global Receives position information GPS position information is Radio waves interfering with signals Ship's position becomes
Positioning System) from satellites. disrupted from GPS satellites unknown, affecting ship
handling
34
Cyber Security Management System for Ships
I. Applications of II. Equipment III. Communication IV. Event 1: Action, V. Event 2: Direct cause of results VI. Risk
ICT equipment state, natural
phenomenon, etc.
1-10 AIS (Automated Automatically sends information International VHF frequencies VHF wave interference Information about other
Identification System) including ship name, ship are disrupted ships becomes unknown,
position, course, etc. to other affecting ship handling
ships in the vicinity and land
stations via international VHF
frequencies.
1-11 BNWAS (Bridge Optionally connects with Virus infection occurs via Virus infection occurs via ECDIS. Officer falling asleep on
Navigational Watch navigation facilities such as ECDIS. duty may be overlooked,
Alarm System) ECDIS. which may cause a
dangerous situation
2. Engine systems
2-1 Automation of Main Engine Control Performs automatic monitoring An attacker hacks into the system Fraudulent information is fed to the Normal operation of the
engine operation System and sends information via the and steals information for attacks engine control system as input engine is disrupted
Boilers internet by interfacing with the
fuel management system.
2-2 Connects with the main engine
control system.
2-3 Bridge Maneuvering Connects to networks for remote
maneuvering from the bridge.
3. Steering
3-1 Computerized Steering Gear Connection with the heading Invalid steering signals are Connection with the heading control Accurate steering cannot be
steering instructions control system entered system performed
4. Cargo handling management
4-1 Cargo loading Loading Computer Communicates ship-to-shore via An attacker hacks into the system Fraudulent information is fed to the Cargo information is
the internet. and steals information for attacks system as input leaked
Malware infection Malware infection Ship's conditions become
off balance and stability is
lost, resulting in an
increased risk of rollover
4-2 Maintenance of the Ballast Water Communicates ship-to-shore via Movement and spreading
ship's conditions Management System the internet. of aquatic organisms
increase
4-3 Cargo Control Controls temperature and Boil off gas increases Increased temperature and pressure of Cargo volume decreases
pressure of liquefied gas bulk Perishable cargoes are spoiled liquefied gas cargoes Cargo value decreases
carriers. Increased temperature and oxygen
Controls temperature and concentration of cold storage
atmosphere of cold storage warehouses
warehouses.
4-4 Ballast Control Obtains information regarding Wrong information is entered Virus infection Ship's conditions become
the ballast tank, such as water off balance and stability is
level, draft, inclination, etc. lost, resulting in an
increased risk of rollover
35
Cyber Security Management System for Ships
I. Applications of II. Equipment III. Communication IV. Event 1: Action, V. Event 2: Direct cause of results VI. Risk
ICT equipment state, natural
phenomenon, etc.
5. Information communication
5-1 Transmission and VSAT (Very Small Sends/receives emails and Malware, ATP attacks, etc. (same PCs/servers are infected by malware Information is leaked
reception of Aperture Terminal) accesses the web via satellite as potential attacks and abnormal PCs/servers are hacked or operated by Communication with the
information via /INMARSAT communications (Inmarsat, etc.). states in outboard use of the an attacker company and other ships is
email, etc. internet) lost or delayed
Operations using PCs or
servers are disrupted
6. Emergency response
6-1 Distress response GMDSS (Global Establishes internet connections An attacker sends a fraudulent Fraudulent information is fed to the Fraudulent distress signals
Maritime Distress and via Inmarsat. distress signal system as input are sent
Safety System) Distress signals from other
ships cannot be received
6-2 Fire response Fire Detection System Does not connect with Fire Malware infection Fire detection system
communication systems. malfunctions
7. Software systems
7-1 Email software Onboard LAN Communication via the internet Potential cyber attacks Communication via the internet Information is leaked
7-2 Chart revision ECDIS Ship handling is affected
software
7-3 Weather information Onboard LAN Ship operation plans are
software affected
7-4 Loading computer Loading Computer Connects with the onboard Potential malware infection Connection with the onboard LAN Maintenance of
software LAN. seaworthiness is affected
7-5 Stowage planning Office PC connected Maintenance of
software to onboard LAN seaworthiness is affected
7-6 Maintenance Engine control room/ Normal operation of the
programs office PC connected engine is affected
to onboard LAN
7-7 Fuel control Engine control Communication via the internet Potential cyber attacks Fuel-efficient operation is
programs room/office PC affected
Communication via the internet
connected to onboard
LAN
36
Cyber Security Management System for Ships
Acknowledgments
We would like to express our deepest appreciation to the following committee members and working group
members for their guidance and support in the preparation of the Guidelines.
Committee members:
Shoji Kawano Chief Security Officer, CISSP, Microsoft Japan Co., ltd.
Koji Nakao Distinguished Researcher, Cybersecurity Research Institute, National Institute of Information
and Communications Technology
Shin Yamashita Technical Researcher, Cybersecurity Laboratory, Cybersecurity Research Institute, National
Institute of Information and Communications Technology
Hirofumi Takano Senior Corporate Officer, Director of Innovation Development Division, ClassNK
Toshiro Arima Corporate Officer, Director of Rule Development and ICT Division, ClassNK
Yasuhiro Ikeda Representative Director and President, Ship Data Center