ABS 221-2016 GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS VOLUME 1 CYBERSECURITY.pdf
《ABS 221-2016 GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS VOLUME 1 CYBERSECURITY.pdf》由会员分享,可在线阅读,更多相关《ABS 221-2016 GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS VOLUME 1 CYBERSECURITY.pdf(35页珍藏版)》请在麦多课文档分享上搜索。
1、 Guidance Notes on the Application of Cyber Safety Principles to Marine and Offshore Operations GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS VOLUME 1: CYBERSECURITY FEBRUARY 2016 American Bureau of Shipping Incorporated by Act of Legislature of the
2、State of New York 1862 Copyright 2016 American Bureau of Shipping ABS Plaza 16855 Northchase Drive Houston, TX 77060 USA Foreword Foreword ABS recognizes that automation methods and increasingly, autonomy have penetrated nearly all aspects of shipboard and platform systems. Because these systems con
3、trol multiple aspects of asset, ship or platform operations, they become integral parts of system and operational safety. ABS supports our community by compiling best practices, deriving new methods, and developing the standard for marine and offshore cybersecurity in a commitment to safety and secu
4、rity of life and property and preservation of the environment. This document is Volume 1 of the ABS CyberSafety series. It provides best practices for cybersecurity, as a foundational element of overall safety and security within and across the marine and offshore communities. The best practices are
5、 meant to provide insights for operations, maintenance and support of cyber-enabled systems, to better assure safety and security in those systems. These Guidance Notes become effective on the first day of the month of publication. Users are advised to check periodically on the ABS website www.eagle
6、.org to verify that this version of these Guidance Notes is the most current. We welcome your feedback. Comments or suggestions can be sent electronically by email to rsdeagle.org. ii ABSGUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE White House Cyberspace Policy Review, May
7、 2009. Source: https:/niccs.us-cert.gov/glossary) Information Technology (IT): Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception
8、 of data or information. (From: NIST SP 800-53 Rev 4 (glossary). Source: http:/nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf0 Operational Technology (OT): An information system used to control industrial processes such as manufacturing, product handling, production, and distribu
9、tion. Industrial control systems include supervisory control and data acquisition (SCADA) systems used to control geographically dispersed assets, as well as distributed control systems (DCSs) and smaller control systems using programmable logic controllers to control localized processes. (Adapted f
10、rom: NIST SP 800-53 Rev 4. Source: http:/nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf Smart Asset: Marine and offshore assets built with significant degrees of automated control of vessel or platform operations, system management and monitoring, and data communications. Automat
11、ion provides labor-saving capabilities; augments human strength; augments human decision-making and error-checking processes; provides operational situational awareness; enables multiple simultaneous system control and management; and provides for controlled data storage. A Smart Asset may possess a
12、utomated or autonomous processes that operate without routine human intervention. 2 ABSGUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE even so, the listed practices are primarily based on lessons learned by implementers that have paved the way in cybersecurity program develop
13、ment and can arguably enable a practitioner to stand up a functional cybersecurity program more rapidly and logically than would be possible without this or similar guidance These Guidance Notes are organized as best practices and recommendations for each of the Capabilities shown in the preceding c
14、ybersecurity program graphics. The Basic Capability list deemed to be essential to a nascent program is provided first, followed by the Developed Capability list. 4.1 Basic Capability 1. Exercise Best Practices 2. Build the Security Organization 3. Provision for Employee Awareness and Training 4. Pe
15、rform Risk Assessment 5. Provide Perimeter Defense 6. Prepare for Incident Response and Recovery 7. Provide Physical Security 8. Execute Access Management 9. Ensure Asset Management 4.2 Developed Capability 10. Perform Policy Management 11. Provide Standards and Governance 12. Provide and Guide Cybe
16、rsecurity Hygiene 13. Gather and Use Threat Intelligence 14. Perform Vulnerability Assessment 15. Perform Risk Management 16. Provide Data Protection 17. Protect Operational Technology (OT) 18. Perform System and Security Continuous Monitoring (SCM) 19. Plan for Disaster Recovery (DR) 20. Provide Un
17、ified Identity Management 21. Perform System, Software and Application Test 22. Perform System and Application Patch and Configuration Management 23. Execute Change Control as an Enterprise Process Each Capability section contains a series of identified recommendations and best practices that minima
18、lly satisfy the Capability, a short discussion of the section, and a list of references that are useful for further reading and understanding. 6 ABSGUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE for security contract management; and, for system output analysis and use. It al
19、so should also consider a look forward for employees and their skills by anticipating the changes in threat and risk environments, skills needed in the future, and career development enhancers that keep security personnel fresh, interested, and intellectually stimulated. An important part of buildin
20、g the organization and the personnel is placing of expectations. Capability assessments for the organization, with status reports and plans for development, help keep personnel involved as the organization builds capabilities and matures. 2.1 References i) United States National Institute of Standar
21、ds and Technology (NIST) National Initiative for Cybersecurity Education (NICE), http:/csrc.nist.gov/nice/ ii) European Union Agency for Network and Information Security (ENISA), Training Material for SMEs, https:/www.enisa.europa.eu/publications/archive/training-material-SMEs iii) Health Informatio
22、n Trust Alliance (HITRUST), “Building an Information Security Organization,” https:/ iv) United States National Institute of Standards and Technology (NIST), Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, SP 800-84, Sep 2006. http:/csrc.nist.gov/publications/nistpubs/8
23、00-84/SP800-84.pdf 3 Provision for Employee Awareness and Training a) The organization has an acceptable use policy that spells out to relevant personnel the permitted uses for information technology, operational technology, and organizational data and assets. b) The organization has enforcement mec
24、hanisms in place to confirm that acceptable use policies are trained, acknowledged, monitored and enforced throughout the enterprise. c) The organization conducts periodic cybersecurity awareness training so that all personnel understand organizational policies, procedures, and safeguards needed to
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ABS2212016GUIDANCENOTESONTHEAPPLICATIONOFCYBERSECURITYPRINCIPLESTOMARINEANDOFFSHOREOPERATIONSVOLUME1CYBERSECURITYPDF

链接地址:http://www.mydoc123.com/p-400819.html