Significance and Use

American National Standards Institute Inc.

5.1 To maintain the integrity of potentially vulnerable information systems while the vessel is at sea or in port, strategies and procedures can be used by every company, organization, and ship. Mitigating potential cyberattack events will allow for a better economic environment through secure consumer, employee, and corporate data. Informational infrastructure between ships, platforms, and onshore facilities are more interconnected today than a decade ago. The long-term health and economic viability of ship owners and operators depend on establishing and maintaining security that can measured and monitored.

5.2 With the increase in cyberattacks in recent decades, maritime-based companies and governments have cited a need to update and train their workforce to mitigate the loss of data or intellectual theft from onboard systems.

5.2.1 Vulnerable onboard systems can include, but are not limited to:

5.2.1.1 Cargo management systems;

5.2.1.2 Bridge systems;

5.2.1.3 Propulsion and machinery management and power control systems;

5.2.1.4 Access control systems;

5.2.1.5 Passenger servicing and management systems;

5.2.1.6 Passenger facing public networks;

5.2.1.7 Administrative and crew welfare systems;

5.2.1.8 Communications systems;

5.2.1.9 Distributed computing devices that support an internet of things (IoT)-enabled ship; and

5.2.1.10 Onboard sensors that facilitate wheelhouse automation, alerting, and IoT transmission.

5.2.2 Many of these systems are critical to mariners while at sea. If any of said systems failed or were compromised while at sea because of a cyberattack, then the ship and its security could be compromised.

5.3 By adopting these practices, mariners and shoreside employees at all levels of the organization should be able to identify potential threats or risk factors, as well as the abnormal indications that show a cyberattack underway.

5.4 Cyberattacks can occur in multiple forms including, but not limited to, the following practices:

5.4.1 Social engineering,

5.4.2 Phishing,

5.4.3 Waterholing,

5.4.4 Ransomware,

5.4.5 Scanning,

5.4.6 Spear-phishing,

5.4.7 Deploying botnets, and

5.4.8 Subverting the supply chain.

5.5 These suggested strategies extend to all individuals of a corporation, government, or organization. By adopting a basic and developed capability to defend from cyberattacks, mariners can continue proper practices out at sea while feeling confident that safety critical systems, business-critical data, personal data, and records are safe.

5.6 In the event of system error, or in the case of cyberattack or infection, any files required to rebuild or repair a personal computer (PC)-based onboard system shall be on the ship already rather than from off-board sources using satellite communications systems. Most vessels currently do not have operating system disks on board, let alone proprietary software, drivers, or patches. This connectivity constraint and lack of multiple failsafe outputs also provide a single point of failure and vulnerability. In the future, system software and firmware may be kept current with over-the-air updates, which shall be encrypted.

5.7 There are cross-system considerations that shall be considered for cyber-enabled ships. They may include such factors as:

5.7.1 Human-system interfaces;

5.7.2 Software availability, versions, and licensing;

5.7.3 Network and communications, including remote access methods;

5.7.4 Data trustworthiness and availability (that is, data assurance);

5.7.5 Diagnostic and evaluation equipment that may be required to diagnose system problems;

5.7.6 Cybersecurity, especially as it applies to safety critical and ship critical systems; and

5.7.7 Onboard sensors and IoT infrastructure that provide data for ship operations and command decisions.

5.8 By adopting these practices, companies and governments will notice the benefits of better cybersecurity. Some benefits may include, but are not limited to:

5.8.1 Better business performance;

5.8.2 Increased bandwidth efficiency provided by modern satellite communications;

5.8.3 Better crew performance during drills or operations;

5.8.4 Reinforcing a healthy safety and security awareness culture onboard seagoing vessels;

5.8.5 Enhanced quality of life for ship crews;

5.8.6 Better adherence to increasingly stringent regulations and the preservation of electronic records and logs;

5.8.7 Tighter security controls and access to objective evidence using biometrics, such as fingerprinting and a company/government (that is, TWIC) issued personal identification card; and

5.8.8 Resilient systems that can minimize the impact of cyber disruptions.

Scope

1.1 This guide addresses the company or government organizational need to mitigate the likelihood of cyberattacks and reduce the extent of potential cyberattacks, which can leave sensitive personal data, corporate information, and critical infrastructure vulnerable to attackers.

1.2 These recommendations are meant to serve as a guideline for corporate and government organizations to adopt for the protection of sensitive personal information and corporate data against hackers.

1.3 Cybersecurity and cyberattacks are not limited to the maritime industry. With greater advancement in computer and information technology (IT), cyberattacks have increased in frequency and intensity over the past decade. These advancements provide hackers with more significant tools to attack vulnerable data and communication infrastructures. Cyberattacks have become an international issue to all governments and companies that interact with each other.

1.4 Cybersecurity and the safety of cyber-enabled systems are among the most prevailing issues concerning the maritime industry as well as the global economy. Cyberattacks could affect the flow of trade or goods, but operator errors in complex, automated systems may also cause disruptions that may be mitigated with proper policies and personnel training.

1.5 This guide is meant to provide strategies for protecting sensitive data onboard vessels and offshore operations.

1.6 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety, health, and environmental practices and determine the applicability of regulatory limitations prior to use.

1.7 This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for the Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.

Go to ASTM F3286 at ASTM.org

Add your thoughts about the standard.

1375 - Demolition Materials (549) 1377 - Cartridge and Propellant Actuated Devices and Components (524) 4720 - Hose and Flexible Tubing (552) 4730 - Hose, Pipe, Tube, Lubrication, and Railing Fittings (1823) 5120 - Hand Tools, Nonedged, Nonpowered (1124) 5305 - Screws (781) 5306 - Bolts (996) 5310 - Nuts and Washers (864) 5330 - Packing and Gasket Materials (583) 5340 - Hardware, Commercial (953) 5905 - Resistor (753) 5910 - Capacitors (783) 5930 - Switches (1012) 5935 - Connectors, Electrical (4357) 5940 - Lugs, Terminals, and Terminal Strips (564) 5945 - Relays and Solenoids (733) 5950 - Coils and Transformers (856) 5960 - Electron Tubes and Associated Hardware (1630) 5961 - Semiconductor Devices and Associated Hardware (707) 6145 - Wire and Cable, Electrical (1629) 6240 - Electric Lamps (662) 6505 - Drugs and Biologicals (1343) 6515 - Medical and Surgical Instruments, Equipment, and Supplies (1907) 6520 - Dental Instruments, Equipment, and Supplies (790) 6530 - Hospital Furniture, Equipment, Utensils, and Supplies (745) 6610 - Flight Instruments (540) 6625 - Electrical and Electronic Properties Measuring and Testing Instruments (1241) 6640 - Laboratory Equipment and Supplies (1187) 6810 - Chemicals (1114) 8010 - Paints, Dopes, Varnishes, and Related Products (2046) 8030 - Preservative and Sealing Compounds (554) 8140 - Ammunition and Nuclear Ordnance Boxes, Packages and Special Containers (797) 8305 - Textile Fabrics (910) 8415 - Clothing, Special Purpose (660) 8455 - Badges and Insignia (3093) 8915 - Fruits and Vegetables (531) 9330 - Plastics Fabricated Materials (759) FACR (1647) ISDA (1776) ISDD (786) ISDF (1827) ISDN (581) MISC (1045) PACK (539) SESS (581)
Aerospace Material (225) Aircraft Air Conditioning, Heating, and Pressurizing Equipment (334) Aircraft Hydraulic, Vacuum, and De-icing System Components (263) Ammunition, 75mm through 125mm (192) Ammunition, over 30mm up to 75mm (208) Ammunition, through 30mm (349) Analytical Chemistry (180) Bombs (192) Building (414) Bulk Explosives (261) Cartridge and Propellant Actuated Devices and Components (524) Consumer Product Evaluation (267) Copper (192) Demolition Materials (549) Electrical and Magnetic Conductor (162) Electronics (153) Environmental Toxicology (187) Fire Control Computing Sights and Devices (338) Fire Control Radar Equipment, except Airborne (197) Fuzes and Primers (454) Geotechnical Engineering (217) GUN (640) Land Mines (276) Medical Device and Implant (427) Military Chemical Agents (156) Miscellaneous Aircraft Accessories and Components (231) Miscellaneous Fire Control Equipment (216) Nondestructive Testing (246) Nonferrous Metal and Nonferrous Alloy (367) Nuclear Technology (274) Optical Sighting and Ranging Equipment (451) Paint and Related Coating (456) Parachutes; Aerial Pick Up, Delivery, Recovery Systems; and Cargo Tie Down Equipment (324) Petroleum (378) Plastic Pipe (248) Pyrotechnics (175) Road and Paving (177) Rockets, Rocket Ammunition and Rocket Components (368) Rubber (166) Security System Pedestrian and Walkway Safety (157) Specialized Test and Handling Equipment, Nuclear Ordnance (150) Sports and Recreation (316) Steel (908) Torpedos and Components, Inert (258) (621)