Vous êtes sur la page 1sur 8

This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles

for the
Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.

Designation: F3286 − 17

Standard Guide for


Cybersecurity and Cyberattack Mitigation1
This standard is issued under the fixed designation F3286; the number immediately following the designation indicates the year of
original adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. A
superscript epsilon (´) indicates an editorial change since the last revision or reapproval.

1. Scope 2. Referenced Documents


1.1 This guide addresses the company or government orga- 2.1 Federal Standards:2
nizational need to mitigate the likelihood of cyberattacks and 46 CFR 140.910 Equipment
reduce the extent of potential cyberattacks, which can leave
sensitive personal data, corporate information, and critical 3. Terminology
infrastructure vulnerable to attackers.
3.1 Definitions:
1.2 These recommendations are meant to serve as a guide-
3.1.1 access control, n—practice of selective limiting of the
line for corporate and government organizations to adopt for
ability and means to communicate with or otherwise interact
the protection of sensitive personal information and corporate
with a system, use system resources to handle information,
data against hackers.
gain knowledge of the information the system contains, or
1.3 Cybersecurity and cyberattacks are not limited to the control system components and functions.
maritime industry. With greater advancement in computer and 3.1.2 application programming interface, API, n—set of
information technology (IT), cyberattacks have increased in routines, protocols, and tools for building software and appli-
frequency and intensity over the past decade. These advance- cations.
ments provide hackers with more significant tools to attack
vulnerable data and communication infrastructures. Cyberat- 3.1.3 botnet, n—number of internet-connected computers
tacks have become an international issue to all governments communicating with other similar machines in which compo-
and companies that interact with each other. nents located on networked computers communicate and
coordinate their actions by command and control or by passing
1.4 Cybersecurity and the safety of cyber-enabled systems messages to one another.
are among the most prevailing issues concerning the maritime
industry as well as the global economy. Cyberattacks could 3.1.4 capability, n—ability to execute a specified course of
affect the flow of trade or goods, but operator errors in action.
complex, automated systems may also cause disruptions that 3.1.5 communications, n—means for a vessel to communi-
may be mitigated with proper policies and personnel training. cate with another ship or an onshore facility.
1.5 This guide is meant to provide strategies for protecting 3.1.6 compression, n—reduction in the number of bits
sensitive data onboard vessels and offshore operations. needed to store or transmit data.
1.6 This standard does not purport to address all of the 3.1.7 cybersafety, n—guidelines and standards for
safety concerns, if any, associated with its use. It is the computerized, automated, and autonomous systems that ensure
responsibility of the user of this standard to establish appro- those systems are designed, built, operated, and maintained so
priate safety, health, and environmental practices and deter- as to allow only predictable, repeatable behaviors, especially in
mine the applicability of regulatory limitations prior to use. those areas of operation or maintenance that can affect human,
1.7 This international standard was developed in accor- system, enterprise, or environmental safety.
dance with internationally recognized principles on standard- 3.1.8 cybersecurity, n—activity or process, ability or
ization established in the Decision on Principles for the capability, or state whereby information and communication
Development of International Standards, Guides and Recom- systems and the information contained therein are protected
mendations issued by the World Trade Organization Technical from and defended against damage, unauthorized use or
Barriers to Trade (TBT) Committee. modification, or exploitation.
1
This guide is under the jurisdiction of ASTM Committee F25 on Ships and
Marine Technology and is the direct responsibility of Subcommittee F25.05 on
2
Computer Applications. Available from U.S. Government Printing Office, Superintendent of
Current edition approved Dec. 1, 2017. Published January 2018. DOI: 10.1520/ Documents, 732 N. Capitol St., NW, Washington, DC 20401-0001, http://
F3286-17. www.access.gpo.gov.

Copyright © ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States

1
F3286 − 17
3.1.9 data assurance, n—perception or an assessment of 3.1.26.1 Discussion—Industrial control systems include su-
data’s fitness and integrity to serve its purpose in a given pervisory control and data acquisition (SCADA) systems used
context. to control geographically dispersed assets, as well as distrib-
3.1.10 data, n—quantities, characters, or symbols on which uted control systems (DCSs) and smaller control systems using
operations are performed by a computer being stored and programmable logic controllers to control localized processes.
transmitted in the form of electrical signals and recorded on 3.1.27 original equipment manufacturer, OEM,
magnetic, optical, or mechanical recording media. n—company that makes parts or subsystems that are used in
3.1.11 detection processes, n—methods of detecting intru- another company’s end product.
sions into computers and networks. 3.1.28 phishing, v—sending e-mails to a large number of
3.1.12 encryption, n—conversion of electronic data into potential targets asking for particular pieces of sensitive or
another form called ciphertext, which cannot be easily under- confidential information.
stood by anyone except authorized parties. 3.1.28.1 Discussion—Such an e-mail may also request that
3.1.13 exposure, n—measure of a system at risk that is an individual visits a fake website using a hyperlink included
available for inadvertent or malicious access. in the e-mail.
3.1.14 firewall, n—logical or physical break designed to 3.1.29 programmable logic controller, PLC, n—digital com-
prevent unauthorized access to information technology (IT) puter used for automation of industrial electromechanical
infrastructure and information. processes.
3.1.15 file transfer protocol, FTP, n—standard network 3.1.30 ransomware, n—malware that encrypts data on sys-
protocol used to transfer computer files between a client and tems until the distributor decrypts the information.
server on a computer network.
3.1.31 remote desktop protocol, RDP, n—proprietary proto-
3.1.16 flaw, n—unintended opening or access point in any col developed by Microsoft that provides a user with a
software. graphical interface to connect to another computer over a
3.1.17 human system, n—interaction and contact between a network connection.
human user and a computer system. 3.1.32 resilience, n—characteristics that enable a system to
3.1.18 hypertext transfer protocol, HTTP, n—primary tech- resist disruption and adapt to minimize the impact of disrup-
nology protocol on the web that allows linking and browsing. tions.
3.1.19 hypertext transfer protocol over secure socket layer, 3.1.33 risk, n—potential or threat of undesired conse-
HTTPS, n—protocol to transfer to encrypted data over the web. quences occurring to personnel, assets, or the environment as a
3.1.20 information technology, IT, n—equipment or inter- result of vulnerabilities in systems, staff, or assets.
connected system or subsystem of equipment that is used in the 3.1.34 risk assessment, n—process that collects information
automatic acquisition, storage, manipulation, management, and assigns values to risks for informing priorities, developing
movement, control, display, switching, interchange, or comparing courses of action, and informing decision mak-
transmission, or reception of data or information. ing.
3.1.21 internet of things, IoT, n—internetworking of physi- 3.1.35 risk management, n—process of identifying,
cal devices, such as vessels, vehicles, buildings and other items analyzing, assessing, and communicating risk and accepting,
embedded with electronics, software, sensors, actuators, and avoiding, transferring, or controlling it to an acceptable level
network connectivity that enable these objects to collect and considering associated costs and benefits of any actions taken.
exchange data.
3.1.36 router, n—device that forwards data from one net-
3.1.22 information security management system, ISMS,
work to another network regardless of physical location.
n—set of policies with information security management or
IT-related risks. 3.1.37 scanning, v—procedure for identifying active hosts
3.1.23 local area network, LAN, n—computer network that or potential points of exploit or both on a network, either for
interconnects computers within a particular area and does not the purpose of attacking them or network security assessment.
connect to the internet; this applies to onboard ship networks. 3.1.38 sensitive information, n—any digital data that can be
3.1.24 machinery control systems, MCS, n—IT systems that classified as private or corporate not meant for public access.
report operating parameters or control operation of equipment, 3.1.39 social engineering, n—nontechnical technique used
which commonly use programmable logic controllers (for by potential cyberattackers to manipulate insider individuals
example, fuel tank level indicators or throttle control systems). into breaking security procedures, typically, but not
3.1.25 network, n—infrastructure that allows computers to exclusively, through interaction via social media.
exchange data by wireless or cable wireless network interac- 3.1.40 social media, n—computer-mediated online tools
tions. that allow people, companies, and other organizations, includ-
3.1.26 operational technology, OT, n—information system ing nonprofit organizations and governments, to create, share,
used to control industrial processes such as manufacturing, or exchange information, career interests, ideas, and pictures/
product handling, production, and distribution. videos in virtual communities and networks.

2
F3286 − 17
3.1.41 software, n—intellectual creation that represents the ments and need to know. For good practice, human and
real world as data and uses logic, that, when translated into machine access to sensitive information should be kept to a
electronically readable code and run on a computer, processes minimum level. Access needs for third parties (for example,
the data, allowing the requirements placed on the software to maintenance personnel, consultants, service engineers, and any
be realized in the real world. non-crew personnel) should be addressed in company or
3.1.42 Subchapter M, n—U.S. Coast Guard (USCG) regu- government policies and procedures, or both.
lations that legally define rules for the inspection, standards, 4.4 Companies and governments may use cybersecurity
and safety policies of towing vessels. training programs to educate the shoreside employees and
3.1.43 transportation worker identification credential, mariners of the organization. Training programs and materials
TWIC, n—provides a tamper-resistant biometric credential to should provide useful tools and strategies to:
maritime workers requiring unescorted access to secure areas 4.4.1 Reduce or prevent human errors in automated systems
of port facilities, outer continental shelf facilities, and vessels operations that could affect safety, correct system function, or
regulated under the Maritime Transportation Security Act of ship data; and
2002 (MTSA) and all USCG credentialed merchant mariners. 4.4.2 Identify when a cybersecurity event occurs and how to
3.1.44 water holing, v—establishing a fake website or com- stop or prevent one from happening.
promising a genuine site to exploit visitors. 4.5 Any implemented training program should apply to all
3.1.45 wide area network, WAN, n—network that can cross members, shoreside employees, and mariners of a government
regional, national, or international boundaries. or company operating seagoing vessels. Training programs
3.1.46 wi-fi, n—all short-range communications that use should begin at the top of an organization and work through to
electromagnetic spectrum to send and receive information the bottom thus following a hierarchical approach and response
without wires. to cyber-system events and their impacts on the company, ship,
or organization.
4. Summary of Guide 4.6 Training programs should focus on and follow a general
4.1 The maritime industry is globalized. Shipping occurs procedure including the following steps:
across the world, transporting goods to different nations and 4.6.1 Risk identification,
continents. Technology integration onboard seagoing ships and 4.6.2 Risk detection,
vessels has increased the quality and reliability of 4.6.3 Protection of personnel and vulnerable or critical
communications, data recording, navigation, and record keep- infrastructure,
ing. Wherever ships and marine craft go, there is a potential for 4.6.4 Mitigate effects of cyberattack,
cyber-enabled systems to impact ship operations and crew 4.6.5 Recover stolen or lost data, and
safety. At times, these impacts can emerge from human error or 4.6.6 Restoration of systems to fully operational status.
deliberate actions.
4.7 Ship systems have become increasingly integrated with
4.2 Commercial pressures and demands for efficiency and navigation, communications, recordkeeping, logistical data,
speed, as well as more control over shipboard systems, create corporate data, personal data, and ship-operating systems.
the need for integrated systems that may be subject to misuse, These systems may be running on the same information
abuse, or illicit access. Table 1 provides an overview of the infrastructure. With this interconnectedness comes complexi-
motivation and impacts of a cyberattack. ties and interdependencies that can result in unexpected vul-
4.3 Companies and governments that operate or own sea- nerabilities. Even systems that use air gaps for security, such as
going vessels should adopt measures and practices that will machinery control systems, may be vulnerable to errors and
shape personnel and system access according to job require- attacks because of contamination with malware or malicious

TABLE 1 Impacts of CyberattackA


Group Motivation Objective
Activists (including disgruntled employees) • Reputational damage • Destruction of data
• Disruption of operations • Publication of sensitive data
• Media attention

Criminals • Financial gain • Selling stolen data


• Commercial espionage • Ransoming stolen data
• Industrial espionage • Ransoming system operability
• Arranging fraudulent transportation of cargo

Opportunists • The challenge • Getting through cyber security defenses


• Financial gain

States • Political gain • Gaining knowledge


State-Sponsored Organizations • Espionage • Disruption to economies and critical national infrastructure
Terrorists
A
Courtesy of BIMCO, Guidelines on Cyber Security Onboard Ships, February 2016.

3
F3286 − 17
code from diagnostic equipment. Vulnerabilities that present 5.2.2 Many of these systems are critical to mariners while at
openings to outside connections can become weaknesses. So, it sea. If any of said systems failed or were compromised while
is vital for organizations to understand the origins of system at sea because of a cyberattack, then the ship and its security
vulnerabilities and likely means of attack. could be compromised.
4.8 As technology advances, IT systems require greater 5.3 By adopting these practices, mariners and shoreside
attention and resources to sustain and maintain them for employees at all levels of the organization should be able to
continued operations and system reliability. Many older IT identify potential threats or risk factors, as well as the abnormal
systems, especially in the maritime industry, use outdated indications that show a cyberattack underway.
technology that can endanger the confidentiality, integrity, and 5.4 Cyberattacks can occur in multiple forms including, but
availability of data, therefore, creating previously undetected not limited to, the following practices:
cyber risks and vulnerabilities. 5.4.1 Social engineering,
4.9 In the United States, recent cybersecurity legislation 5.4.2 Phishing,
passed by Congress and authorized by the President has begun 5.4.3 Waterholing,
to address the rapidly growing concerns for cybersecurity and 5.4.4 Ransomware,
points towards the development of new technologies for 5.4.5 Scanning,
government agencies and private industry in the years ahead. 5.4.6 Spear-phishing,
4.10 Governmental regulations, such as Subchapter M, 46 5.4.7 Deploying botnets, and
CFR 140.910, now permit and encourage the use of electronic 5.4.8 Subverting the supply chain.
records in addition to or in lieu of manual logging. The move 5.5 These suggested strategies extend to all individuals of a
to electronic recordkeeping and the sensitivity of the informa- corporation, government, or organization. By adopting a basic
tion these records contain impose new challenges to the secure and developed capability to defend from cyberattacks, mari-
access of the information, the sharing of the information with ners can continue proper practices out at sea while feeling
inspectors and auditors, the media to which this information is confident that safety critical systems, business-critical data,
securely stored and backed up, and the methods required to personal data, and records are safe.
access the information in a secure manner.
5.6 In the event of system error, or in the case of cyberattack
5. Significance and Use or infection, any files required to rebuild or repair a personal
computer (PC)-based onboard system shall be on the ship
5.1 To maintain the integrity of potentially vulnerable in- already rather than from off-board sources using satellite
formation systems while the vessel is at sea or in port, communications systems. Most vessels currently do not have
strategies and procedures can be used by every company, operating system disks on board, let alone proprietary software,
organization, and ship. Mitigating potential cyberattack events drivers, or patches. This connectivity constraint and lack of
will allow for a better economic environment through secure multiple failsafe outputs also provide a single point of failure
consumer, employee, and corporate data. Informational infra- and vulnerability. In the future, system software and firmware
structure between ships, platforms, and onshore facilities are may be kept current with over-the-air updates, which shall be
more interconnected today than a decade ago. The long-term encrypted.
health and economic viability of ship owners and operators
depend on establishing and maintaining security that can 5.7 There are cross-system considerations that shall be
measured and monitored. considered for cyber-enabled ships. They may include such
factors as:
5.2 With the increase in cyberattacks in recent decades, 5.7.1 Human-system interfaces;
maritime-based companies and governments have cited a need
5.7.2 Software availability, versions, and licensing;
to update and train their workforce to mitigate the loss of data
5.7.3 Network and communications, including remote ac-
or intellectual theft from onboard systems.
cess methods;
5.2.1 Vulnerable onboard systems can include, but are not
5.7.4 Data trustworthiness and availability (that is, data
limited to:
assurance);
5.2.1.1 Cargo management systems;
5.7.5 Diagnostic and evaluation equipment that may be
5.2.1.2 Bridge systems;
required to diagnose system problems;
5.2.1.3 Propulsion and machinery management and power
control systems; 5.7.6 Cybersecurity, especially as it applies to safety critical
5.2.1.4 Access control systems; and ship critical systems; and
5.2.1.5 Passenger servicing and management systems; 5.7.7 Onboard sensors and IoT infrastructure that provide
5.2.1.6 Passenger facing public networks; data for ship operations and command decisions.
5.2.1.7 Administrative and crew welfare systems; 5.8 By adopting these practices, companies and govern-
5.2.1.8 Communications systems; ments will notice the benefits of better cybersecurity. Some
5.2.1.9 Distributed computing devices that support an inter- benefits may include, but are not limited to:
net of things (IoT)-enabled ship; and 5.8.1 Better business performance;
5.2.1.10 Onboard sensors that facilitate wheelhouse 5.8.2 Increased bandwidth efficiency provided by modern
automation, alerting, and IoT transmission. satellite communications;

4
F3286 − 17
5.8.3 Better crew performance during drills or operations; necessary for suppliers to allow upload of system upgrades or
5.8.4 Reinforcing a healthy safety and security awareness perform remote servicing.
culture onboard seagoing vessels; 6.2 Partnerships:
5.8.5 Enhanced quality of life for ship crews; 6.2.1 Maritime companies and vessels should partner with
5.8.6 Better adherence to increasingly stringent regulations their respective governments to adopt cybersecurity measures
and the preservation of electronic records and logs; to defeat threats against safety- or ship-critical systems. With
5.8.7 Tighter security controls and access to objective evi- the sharing of information among law enforcement, maritime,
dence using biometrics, such as fingerprinting and a company/ and military cybersecurity programs, ship owners and opera-
government (that is, TWIC) issued personal identification card; tors can enhance the effectiveness of their cybersecurity
and operations for deterring, mitigating, and responding to mali-
5.8.8 Resilient systems that can minimize the impact of cious activity.
cyber disruptions. 6.2.2 Companies and vessels should join the Department of
Homeland Security’s (DHS) Automated Indicator Sharing
6. Procedure (AIS) initiative. By sharing unclassified cyber threat indicators,
6.1 Access: the DHS enables the detection, prevention, and mitigation of
6.1.1 Companies, governments, and organizations should cyber threats. The AIS initiative is available to:
adopt policies for appropriate use of, and access to, automated 6.2.2.1 Partners in critical infrastructure;
systems aboard ships, vessels, and offshore assets. System 6.2.2.2 Private sector;
access policies should address access to, and use of, general- 6.2.2.3 State, local, tribal, and territorial governments;
purpose systems (for example, PCs) as well as automated 6.2.2.4 Federal departments and agencies;
utility systems (for example, cranes and cargo-handling sys- 6.2.2.5 Information sharing and analysis centers (ISACs);
tems) and control systems (for example, ship control, 6.2.2.6 Information sharing and analysis organizations
machinery, propulsion, and so forth). At a minimum, the (ISAOs); and
company policy set should include an IT security policy and an 6.2.2.7 Foreign partners and companies.
acceptable use policy to ensure that employees and users 6.2.3 For more information, see the AIS initiative.3
within each company understand how company resources and 6.3 Policies:
data should be used. These policies ensure that standards are 6.3.1 Cyber Assessments—Ship owners, operators, and
consistent, understood, and enforced. stakeholders should include in their cybersecurity program
6.1.1.1 A company should only grant access privileges policies the necessity to conduct a baseline assessment before
according to employee roles and responsibilities and the making amendments to or developing a cybersecurity program.
employee’s need to know. The baseline assessment serves as a platform for taking
6.1.1.2 Access policies should limit individual access to inventory and mapping of assets and systems and creating an
critical or sensitive system, data, and records onboard seagoing understanding of vulnerabilities and the associated potential
ships starting from the top of the organization down. By business and operational impacts that may ensue from unpro-
restricting access to job description requirements and need to tected or vulnerable systems.
know, fewer people will have the credentials to access infor- 6.3.2 Information Security Management System (ISMS)—
mation onboard ships with less possibility for credential theft Based on the configuration and systems onboard, each compa-
by hackers. ny’s ISMS policy should include the concept of cybersecurity
(1) Local administrative privileges can allow mariners too and the potential damages that could occur.
many rights for ordinary work, and they can provide cyber- 6.3.2.1 The ISMS should identify the critical systems
intruders a way to move through a ship’s network. The aboard that have computer controls and cyber-enabled func-
reduction of administrative privileges can make the difference tions.
between a single system and user account being compromised 6.3.2.2 The ISMS should prioritize critical systems in ac-
versus the entire organization’s computer systems being cor- cordance with their importance to the ship.
rupted. 6.3.2.3 The ISMS should predict the extent of damage that
(2) The system administrator privileged accounts are the could occur if the ship’s critical systems were jeopardized,
most sensitive access levels. Careful control of privileged either through human error or cybersecurity issues.
accounts can make the difference between a simple perimeter 6.3.2.4 The ISMS should describe, in detail, the recovery
breach and a significant cybersecurity event. Organizations are steps for each failure or breach type and any notifications,
expected to ensure that they continuously audit and discover alerts, or actionable items that should occur in the event of a
privileged accounts and applications that require privileged breach.
access, remove administrator rights where they are not 6.3.3 Personal Devices—The use of personal devices, such
required, and implement two-factor authentication methods to as a crew members’ smartphones or wireless hotspots, presents
prevent easy compromise of user accounts when attacked.
6.1.2 Networks that provide suppliers with remote access to 3
Available from Department of Homeland Security/United States Computer
navigation systems or software, and to any control systems or Emergency Readiness Team (DHS/US-CERT), ATTN: NPPD/CS&C/NCCIC/US-
other operational technology (OT) system software on ship- CERT, Mailstop: 0635, 245 Murray Lane SW Bldg 410, Washington, DC 20528,
board equipment should be controlled. Such networks may be https://www.us-cert.gov/ais.

5
F3286 − 17
an unknown but significant variable in the overall security of a (3) Consider the interface between the OEM and vessel
ship. Also, the popularity of mobile apps and social media network, including any special considerations to protect both
expose additional vulnerabilities that are unique to the particu- the OEM gear and the vessel network;
lar app, site, application programming interface (API), or (4) Request from the integrator a statement of conformance
service. For that reason, a company should adopt policies to the manufacturer’s stated policy and installation best prac-
pertaining to the usage of personal devices. Such policies tices; and
should include whether those devices are allowed to connect to (5) Consider the impact equipment or configuration
onboard services (that is, wireless network) and whether those changes have on the overall cybersecurity strategy of the
devices are allowed to be used to contain or manage company vessel.
data. 6.3.5 Organizations—Companies, governments, and organi-
6.3.4 Communication-Capable Systems—All communica- zations should consult the National Institute of Standards and
tion devices onboard, such as a router, satellite phone, laptop, Technology (NIST) cyber security framework, which can help
PC, or smartphone, should be restricted to use secure protocols, companies quantify the approach being taken to cybersecurity
such as hypertext transfer protocol over secure socket layer using common principles and standards.
(HTTPS) instead of hypertext transfer protocol (HTTP). All
6.3.5.1 Maritime companies and organizations should de-
protocols not used should be disabled, such as remote desktop
sign their programs around an objective that ensures and
protocol (RDP) or file transfer protocol (FTP).
creates a protective infrastructure concerning a ship’s onboard
6.3.4.1 All applications, devices, or systems transmitting
IT and OT systems.
data to or from the vessel should encrypt and compress the data
before transmittal. This process could include software 6.3.5.2 Companies, governments, and organizations should
systems, IoT devices, and original equipment manufacturer adopt a general and advanced list of procedures to promote
(OEM)-enabled sensors. good cybersecurity practices and address situations and meth-
6.3.4.2 Operators may use OEM equipment installed by ods to minimize the extent of cyberattacks. These lists of
third-party integrators on their vessels. The operator may think procedures may vary by the entity but should follow USCG
that cybersecurity is the responsibly of the OEM manufacturer and DHS recommendations.
and integrator, whereas the OEM manufacturer and integrator 6.3.5.3 Cyberattacks should be reported to the proper au-
may think it is the responsibility of the operator. This miscom- thority on a scale of low, moderate, or high regarding the
munication often leads to a false sense of security and potential impact (see Table 2). Also, any anomaly should be
increased vulnerabilities. Operators should: reported to the shoreside management staff trained in the field,
(1) Communicate and discuss cybersecurity concerns with as per company governance. Any disruption to computer-based
the OEM and the integrator during the planning stage and systems that threatens the safety of the crew and the vessel, or
before installation; is a factor in a near-miss or marine casualty, should be reported
(2) Request from the OEM detailed information as to the to the company shoreside management and the proper port
types of threats associated with the equipment and what state control authorities (such as the USCG) in accordance with
mitigation techniques are available; the latest guidance.

TABLE 2 Cyberattacks Reporting ScaleA


Potential
Definition In Practice
Impact
Low The loss of confidentiality, integrity, or availability could be A limited adverse effect means that a security breach might: (1) cause a
expected to have a limited adverse effect on company and degradation in ship operation to an extent and duration that the
ship, organizational assets, or individuals. organization can perform its primary functions but the effectiveness of the
functions is noticeably reduced, (2) result in minor damage to
organizational assets, (3) result in minor financial loss, or (4) result in
minor harm to individuals.

Moderate The loss of confidentiality, integrity, or availability could be A substantial adverse effect means that a security breach might: (1) cause
expected to have a substantial adverse effect on company a significant degradation in ship operation to an extent and duration that
and ship, company and ship assets, or individuals. the organization can perform its primary functions but the effectiveness of
the functions is significantly reduced, (2) result in significant damage to
organizational assets, (3) result in significant financial loss, or (4) result in
significant harm to individuals that does not involve loss of life or serious
life-threatening injuries.

High The loss of confidentiality, integrity, or availability could be A severe or catastrophic adverse effect means that a security breach might:
expected to have a severe or catastrophic adverse effect (1) cause a severe degradation in or loss of ship operation to an extent
on company and ship operations, company and ship and duration that the organization is not able to perform one or more of
assets, or individuals. its primary functions, (2) result in major damage to organizational assets,
(3) result in major financial loss, or (4) result in severe or catastrophic
harm to individuals involving loss of life or serious life-threatening injuries.
A
Courtesy of BIMCO, Guidelines on Cyber Security Onboard Ships, February 2016.

6
F3286 − 17
6.4 Protection: supplier, maintenance organization, and so forth) should be
6.4.1 Overall, companies, organizations, and governments allowed to make software changes to critical systems without
should enact a cyber-threat indicator onboard their vessels, direct permission from the owner and master of the vessel.
whether it is an adopted procedure or installing software and 6.5 Training:
programming that monitor and alerts employees to a potential 6.5.1 All employees, regardless of seniority or experience,
attack. should subscribe to the training program adopted by the
6.4.2 The company should define a distinction between how company, agency, or international governmental body on the
the informational resources onboard a ship are used (that is, risks, approach, and prevention of cyberattacks.
personal and work systems, business resources, and so forth). 6.5.2 Employee training programs should educate mariners,
6.4.3 Operations—Vessels should install software recom- shoreside employees, and administrators on the normal oper-
mended by the DHS, the International Maritime Organization ating characteristics of their cyber-enabled systems to help
(IMO), and the Baltic and International Maritime Council them understand when they may have a system malfunction or
(BIMCO) to update and protect all onboard information cybersecurity incident occurring. Abnormal conditions, when
systems. Updating IT and OT systems will allow for evaluation recognized, may indicate that a cyberattack is underway.
and analysis as well as provide a measurable response to Relevant training should include recognition signs of the four
potential or active threats for the 21st century. These updates stages of a cyberattack that include the following:
should be viewed as a vessel’s first line of defense when a 6.5.2.1 Survey/Reconnaissance—Using different strategies
human does not detect a cyberattack. to find a weakness in the critical infrastructure of a ship;
6.4.4 Companies should, where possible, secure digital 6.5.2.2 Delivery—This can be done through the ship or
assets using a two-factor authentication biometric access, such company while connected to the internet;
as a fingerprint scanner, and/or a company/government (that is,
6.5.2.3 Breach—While it may not be obvious, breaches can
TWIC) issued personal identification card. Such access is
attain critical information such as cargo manifests and passen-
superior to the traditional username/password architecture, as a
ger lists; and
password is more easily compromised and does not require a
6.5.2.4 Effect—The motivation and objectives of the at-
physical presence.
tacker will determine what effect they have on the company or
6.4.5 Client certificates or cookies used to cache access
ship system and data. An attacker may explore systems, expand
credentials should be set to low expiration periods and fre-
access, and ensure that they can return to the system. Some
quently renewed as needed. While this may slightly increase
potential outcomes may be that attackers access confidential
data consumption, if a credential is ever compromised, a short
data, manipulate crew or passenger lists, or disrupt systems by
expiration period limits the exposure to a small window of
overloading them or taking them offline.
time.
6.5.3 Officers and crewmembers onboard vessels should
6.4.6 All I/O connections to PCs, laptops, programmable
perform at least one cybersecurity risk assessment training
logic controller (PLC) boards, and so forth should be contem-
exercise or course during a three- or six-month voyage. This
plated in an overall security strategy and only those that are
exercise should be done before entering international waters.
necessary should be enabled. That could include disabling
6.5.4 When conducting exercises, crews and administrators
things such as USB ports, CD/DVD drives, Bluetooth, wi-fi,
should practice worst-case scenarios in which sustainable
VPN, built-in modems, and related I/O points.
damage is taken by a cyberattack against ship safety critical,
6.4.7 Companies and organizations should continuously
mission-critical, or function systems, as well as thinking of the
update their IT and control systems with each generation of
response to cyberattacks as a process that has multiple ways to
newly developed software while carefully tracking software
approach the problem.
versions and adhering to their business or organizational
6.5.5 These exercises will vary from organization to
management of change policies and procedures.
organization, but may include the following:
6.4.8 Companies and governments should adopt perimeter
6.5.5.1 Safety management system/ISO procedures,
defenses and protections for their databases and onboard
6.5.5.2 MTSA required security plans,
recordkeeping systems through local access networks.
6.4.9 Companies and organizations should adopt and imple- 6.5.5.3 Operations manuals,
ment a technology solution that records when mariners and 6.5.5.4 Continuity of operations/continuity of business
officers are on and off the vessel. This software can allow plans, and
correlation of personnel accesses to critical systems in cases of 6.5.5.5 Company training programs and policies.
system issues, cyber intrusions, and so forth.
6.4.10 Companies and organizations should control their 7. Keywords
systems and software deliberately. No third party (for example, 7.1 cyberattacks; cybersecurity; maritime industry

7
F3286 − 17

BIBLIOGRAPHY

(1) ABS, Guidance Notes on The Application of Cybersecurity Prin- (10) NIST, Guide to Industrial Control Systems (ICS) Security, Special
ciples To Marine and Offshore Operations, September 2016. Publication 800-82 rev2, May 2015.
(2) BIMCO, Guidelines on Cyber Security Onboard Ships, February (11) Recommended Practice: Improving Industrial Control Systems
2016. Cybersecurity with Defense-In-Depth Strategies, DHS, October
(3) DHS, Automated Indicator Sharing Initiative. 2009.
(4) DNV, Integrated Software Dependent Systems (ISDS). (12) United States Coast Guard (USCG), Cyber Strategy, June 2015.
(5) ENISA, Methodologies for the identification of Critical Informa- (13) United States Coast Guard (USCG) Cyber Risks in the Marine
tion Infrastructure assets and services, December 2014. Transportation System.
(6) ESC Global Security, Maritime Cyber Security White Paper. (14) United States Coast Guard (USCG) Policy Letter CG-5P, 14 De-
(7) IMO, Interim Guidelines on Maritime Cyber Risk Management.
cember 2016, Reporting Breaches of Security and Suspicious Activ-
(8) Lloyd’s Register, Cyber-Enabled Ships, First Edition, February 2016.
ity.
(9) National Institute of Standards and Technology (NIST), Frame-
work for Improving Critical Infrastructure Cybersecurity, February
2014.

ASTM International takes no position respecting the validity of any patent rights asserted in connection with any item mentioned
in this standard. Users of this standard are expressly advised that determination of the validity of any such patent rights, and the risk
of infringement of such rights, are entirely their own responsibility.

This standard is subject to revision at any time by the responsible technical committee and must be reviewed every five years and
if not revised, either reapproved or withdrawn. Your comments are invited either for revision of this standard or for additional standards
and should be addressed to ASTM International Headquarters. Your comments will receive careful consideration at a meeting of the
responsible technical committee, which you may attend. If you feel that your comments have not received a fair hearing you should
make your views known to the ASTM Committee on Standards, at the address shown below.

This standard is copyrighted by ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959,
United States. Individual reprints (single or multiple copies) of this standard may be obtained by contacting ASTM at the above
address or at 610-832-9585 (phone), 610-832-9555 (fax), or service@astm.org (e-mail); or through the ASTM website
(www.astm.org). Permission rights to photocopy the standard may also be secured from the Copyright Clearance Center, 222
Rosewood Drive, Danvers, MA 01923, Tel: (978) 646-2600; http://www.copyright.com/

Vous aimerez peut-être aussi