Posts

Showing posts from December, 2024

IMO - Cybersecurity Regulations and Guidelines

Image
IMO - Cybersecurity Regulations and Guidelines The International Maritime Organization (IMO) recognizes the increasing cybersecurity threats in the maritime industry and has implemented regulations to enhance cyber risk management and protection of ship operations . 1. IMO Cybersecurity Regulations and Key Guidelines 1.1 IMO Resolution MSC.428(98) – Mandatory Cyber Risk Management In June 2017 , IMO adopted Resolution MSC.428(98) , which mandates that from January 1, 2021, all ships must integrate cyber risk management into their ISM Code (International Safety Management Code) compliance . 📌 Key Points: Cyber risk management must be incorporated into the vessel's Safety Management System (SMS). Cybersecurity measures must protect vessel safety and security, including IT and OT systems. Compliance is subject to audits by classification societies and flag states. 1.2 IMO Guidelines on Maritime Cyber Risk Management (MSC-FAL.1/Circ.3) IMO also published guidelines (MSC-F...

🚢 Before long, preparing for SIEM/IDS-based ship cybersecurity will be essential

Image
With the reinforcement of IMO and IACS UR E26/E27 regulations, the establishment of a real-time security monitoring system to protect IT/OT systems on ships is expected to become essential. To stay ahead of these regulatory requirements, it is crucial to prepare in advance. In this post, we will outline how to build a real-time security monitoring system based on SIEM (Security Information and Event Management) and IDS (Intrusion Detection System) that complies with classification societies' cybersecurity guidelines. ✅ What are SIEM and IDS? 🔍 SIEM (Security Information & Event Management) A system that collects, analyzes, and responds to security events in real time Centrally manages logs and events to detect and respond to abnormal activities 🔍 IDS (Intrusion Detection System) A system that monitors network traffic and detects intrusion attempts Uses signature-based (pattern recognition) and anomaly-based (behavioral analysis) techniques to identify attacks 🔍 Objectives of...

IACS UR (Unified Requirements) - Overview

Image
  IACS UR (Unified Requirements) are mandatory technical standards IACS UR (Unified Requirements) are mandatory technical standards established by the International Association of Classification Societies (IACS) to ensure uniformity in classification rules among member societies. These requirements supplement IMO regulations and industry standards by defining the minimum technical criteria that classification societies must apply when inspecting, certifying, and approving the design, construction, and maintenance of ships and offshore structures. Key Features of IACS UR Mandatory Compliance : All IACS member classification societies must incorporate URs into their own rules. IMO Alignment : URs complement IMO conventions such as SOLAS, MARPOL, and the IGC Code by providing detailed technical requirements. Regular Updates : IACS URs are continuously revised to reflect technological advancements, accident analyses, and industry needs. Diverse Coverage : URs cover various aspec...

🚢 A Must-Read for the Maritime Industry! Review of "A Study on Cyber Security Requirements of Ship Using Threat Modeling"

Image
  "A Study on Cyber Security Requirements of Ship Using Threat Modeling" Did you know that ships can be hacked? 🤯 As the shipbuilding and maritime industry integrates IT, smart ships (Smart Ship) and autonomous vessels (MASS) are becoming a reality. However, this also makes them prime targets for cyberattacks , making cybersecurity an essential component of maritime operations. Today, we’ll review the research paper "A Study on Cyber Security Requirements of Ship Using Threat Modeling" from Korea University’s Graduate School of Information Security. This study identifies cybersecurity threats in ships and provides essential security measures for shipbuilders, shipowners, port operators, and classification societies. 📌 1. Key Takeaways from the Paper This study utilizes the STRIDE threat modeling framework to analyze cybersecurity threats in ships and propose necessary security requirements. The research highlights how various maritime stakeholders (shipbuilders...