Skip to content

Knowledge Of Sea

We will keep you updated

  • Home
  • Video
  • Chartering Terms
  • Rule of the Road (COLREG)
    • Nautical Flags
    • Rule of the Roads – CARDS
  • Tanker Definitions
  • Downloads
  • ORAL NOTES
    • ORAL NOTES- 2ND OFFICER
    • ORAL NOTES- CHIEF MATE
    • ASM ORAL NOTES 1
    • ASM ORAL NOTES 2
    • ASM ORAL NOTES 3
  • About Me
  • Toggle search form

Cyber security management plan

Posted on August 25, 2024August 25, 2024 By admin No Comments on Cyber security management plan

Contents of the Plan

  1. Introduction & training
  2. Threats / risks
  3. Managing the risk
  4. General Data Protection
  5. Cyber security policy & General Data Protection policy
  6. Office contingency plan
  7. Vessel contingency plan
  8. Cyber security incident investigation
  9. Forms (including Data Protection impact Assessment & Privacy Note)
  10. Risk assessment library (with already prepared assessments)

The ISM Code, supported by the IMO Resolution MSC.428(98), requires ship owners and managers to assess cyber risk and implement relevant measures across all functions of their safety management system, until the first Document of Compliance after 1 January 2021.

In combination with the resolution, the IMO also released Guidelines on Maritime Cyber Risk Management (MSC-FAL.1/Circ.3) in July 2017. As both leave much of the interpretation to the company responsible for the safety management system, there are still many uncertainties of how to handle the requirements.

Below follow some concrete suggestions on how to ensure compliance with the IMO requirements and recommendations.

Recommended steps to ensure IMO`s Cyber Security compliance


The IMO agreed that cyber risk management should be integrated into existing management systems under the ISM Code and ISPS Code.

Accordingly, the following PDCA process should be applied:

Plan

The first step is to identify cyber security objectives relevant for the safe operation of the vessel. In addition to the IMO requirements, other internal and external stakeholder requirements on cyber security should be accounted for when determining the objectives.

Pursuant to the defined objectives, an inventory list of all safety and business-critical systems and software should be generated. The inventory, as well as network drawings showing the system connectivity, are prerequisites for executing a cyber risk assessment. The assessment should include:

  1. Consequence analysis in terms of loss of confidentiality, integrity and availability of each system
  2. Likelihood analysis to determine how often the specific system is expected to be compromised
  3. Ranking of the asset according to its cyber security risks
  4. Determination of required barriers in terms of people, processes and technology improvements (for suggestions of barriers, see DNV’s Cyber secure class notation)

Do

The cyber risk assessment results should be utilized to define an implementation plan for rolling out suitable barriers.

Furthermore, as a minimum, the following functional requirements for the Safety Management System are applicable:

  1. A cyber security policy
  2. Instructions and procedures to ensure cyber-secure operation
  3. Defined levels of authority and lines of communication between, and amongst, shore and shipboard personnel concerning cyber security
  4. Procedures for reporting cyber-attacks, incidents and non-conformities
  5. Procedures to prepare for and respond to cyber-attacks and incidents
  6. Procedures for internal cyber security audits and management reviews

Check

The effectiveness of the cyber security measures must be checked on a continuous basis.

Internal checks include:

  1. Evaluation of effectiveness of achieving cyber security objectives
  2. Analysis of cyber incident and event reports
  3. Evaluation of logs and intrusion detection systems
  4. Execution of internal audits of cyber security
  5. Execution of cyber security incident response drills

Furthermore, external checks are recommended in order to ensure

  1. increased cyber security resilience,
  2. improved customer and business partner confidence, and
  3. compliance with IMO requirements.

Act

Based on the findings of the internal and external review reports, corrective and preventive actions should be implemented.

As the vessels and systems are increasingly interconnected and malicious cyber threats are continually changing, key to future successful cyber security resilience is to continuously improve by updating the cyber risk assessment, policies and procedures.

Merchant Shipping Tags:cyber security, cyber security management plan

Post navigation

Previous Post: Weather associated with cold fronts
Next Post: GMDSS equipment power

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Bulk Carrier
  • Cargo handling
  • Engine Room Operations
  • LSA & FFA
  • Maritime Industry
  • Maritime Law
  • Merchant Shipping
  • Navigation
  • Rules and Regulation
  • Ship Construction
  • Shipboard operation
  • Stability
  • Tanker
  • Uncategorized

Blog is primarily for candidates appearing for certificate of competency exams but such is the detail that while being equally suitable for the beginner, it is also reference work for experienced seaman, and the layout and style of blog make it suitable for shipboard training where practical experience can be allied to the theoretical approach.

Recent Comments

  • capt on Radar Best Practice -ARPA
  • admin on Dry Docking (Theory & Numericals)
  • Stelios Karamplakas on Dry Docking (Theory & Numericals)
  • Farid OMARI on Demurrage
  • admin on Tanker Cargo Calculations

Copyright © 2018 knowledge of sea – All Rights Reserved.

If you’re unsure about what type of training will work best for you, just tell us a little more about your needs. We will get back to you as soon as possible with the answers you need!

All answers will be from sailor mouth, who is practically working on board.

January 2026
S M T W T F S
 123
45678910
11121314151617
18192021222324
25262728293031
« Dec    

Copyright © 2026 Knowledge Of Sea.

Powered by PressBook WordPress theme