Every business and every individual can be subject to cyber threats. Cyber-crime is a massive business; hackers are very well-organized, and they put a lot of time and effort before launching a cyber-attack. The last couple years, cyber security has become a significant challenge for the maritime industry as well. In this regard, IMO took the decision to embed cyber security into Safety Management Systems; not much time has left for this new requirement and one thing is for sure: from next year, a new era begins for ship operators.
Even though we have witnessed several cyber attacks during the last years, cyber-criminal activities seem to have increased, exploiting the vulnerability of users working from home. These are the following: malware attacks, encrypted threats, crypto jacking, intrusion attempts, ransomware attacks and IoT malware. So, what shipping players should be doing in order to name themselves as cyber-secured?
The new IMO Requirement
According to Resolution MSC.428(98), operators need to ensure that their existing SMS appropriately address cyber risks by their 2021 annual verification. The risks as explained above are too many. With MSC-FAL 1/ Circ 3, IMO provides guidelines which consist of six pages and provide detailed recommendations on maritime cyber risk identification and management to safeguard shipping from current and emerging cyber threats and vulnerabilities.
The recommendations are designed to be incorporated into existing SMS manuals and procedures and associated ISPS systems so as to update and enhance these processes. ‘’The overall goal is to support safe and secure shipping, which is operationally resilient to cyber risks.’’, IMO explains.
In particular, IMO issued “Guidelines on Maritime Cyber Risk Management”, to provide the required guidance on how a Company should respond to MSC. 428 (98), with reference to the following:
- Guidelines on Cyber Security Onboard Ships issued by BIMCO, CLIA, ICS, INTERCARGO, INTERTANKO, OCIMF and IUMI.
- ISO/IEC 27001 standard on Information technology
- United States National Institute of Standards and Technology’s Framework for Improving Critical Infrastructure Cybersecurity (the NIST Framework).
Key Items to be addressed
Safety Management System is the key document of every shipping company, explaining how to conduct safe operations, based on the ISM code and the required policies for safe operations, protection of people, ship, cargo and environment. In essence, SMS are dynamic systems, meaning that they need to adapt to new requirements and address current needs and possible risks.
Addressing cyber risks in Safety Management System, requires additional focus, a new approach and more interaction between company and vessels. The real focus point of the system is to achieve the protection of Company (office) and onboard installed systems from cyber threats (of any kind). The aim is to have specific procedures in place and a cyber security culture to minimize the possibility of being attacked or affected by an attack. Additionally, operators can create response technics to overcome challenges from a cyber attack, ensuring continuity of operations.
The new IMO requirements can either addressed as a stand-alone system (Cyber Security Management Plan as part of existing SMS) or a revised SMS which will incorporate all required steps.
- Set the policy for cyber security. This is the base of cyber structure. It is a declaration of Company’s setting targets and main actions for cyber security. It may cover additional items (like General Data protection) as all such items are related.
- Conduct a thorough assessment both in office and on-board ships, in order to identify related systems that may be subject to cyber threat. Systems are to be identified, listed, prioritised on vulnerability as critical or not. All systems should be approved to be used for specific tasks. The supportive software should be authentic, updated and installed by competent personnel.
- Implement procedures for cyber policy. The procedures should include the actions for everyone related to above identified systems, setting the privileges, the authority levels and specific actions (in form Dos and Don’ts) for each position. Procedures should include as minimum:
- Privileges and authority, including access level for each system
- Password instructions
- Removal media instructions
- Third party access to systems instructions (eg agents, constructors, system technicians, pilots, terminal personnel and any other individual or organization that requires to be granted access to shore or on board systems)
- Set an effective response system. The system should have immediate response actions, backup procedures, rectification procedures and alternative ways of conducting day to day routine in order to retain a flawless operation.
- As per shipping industry’s culture, all related incidents should be investigated, and lessons learnt and best practices to be used for avoiding similar issues in the future.
- Conduct periodical assessment of systems and procedures through audit / management review in order to check effectiveness.
It is highly recommended to follow the practice of ship shore drills with cyber scenarios. The Guidelines on Cyber Security Onboard Ships produced and supported by BIMCO, CLIA, ICS, INTERCARGO, INTERTANKO, OCIMF and IUMI, version 4.0 include useful real life incidents that can be used as sample scenarios for such drills.
Additionally as COVID-19 outbreak has altered operations, more and more Companies now use remote inspections and audits to monitor their managed vessels. These actions require procedures that can affectively produce monitoring results but simultaneously protect the systems used to conduct such operations.
Ship Managers should:
- Revise existing SMS to include cyber risk management and related procedures
- Verify implementation of policies and procedures both ashore and on board
- Provide all required resources for equipment (hardware) and/or software upgrades in order to support procedures
- Provide ashore and on-board training to personnel for cyber threats/risks and best practices to address them.
Seafarers and Office personnel should:
- Follow the procedures and guidance on cyber risk management
- Do not use personal equipment on Company’s systems (ashore or onboard)
- Be aware of all risks and threats related to cyber
- Notify immediately authorized Company’s personnel for any suspicious or identified cyber issue in order to initiate response actions.
The industry is currently fighting with the thought whether operators are ready or not to comply. One way or another, from January 1st of January 2021, SMS will feature a new requirement, resulting to increased awareness over cyber security which is a critical issue as we have accelerated our path towards digitalization.
Click below for : The Guidelines on Cyber Security Onboard Ships Version 4