ABS 250-2016 GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS ABS CyberSafety VOLUME 1.pdf
《ABS 250-2016 GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS ABS CyberSafety VOLUME 1.pdf》由会员分享,可在线阅读,更多相关《ABS 250-2016 GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS ABS CyberSafety VOLUME 1.pdf(45页珍藏版)》请在麦多课文档分享上搜索。
1、 Guidance Notes on the Application of Cyber Safety Principles to Marine and Offshore Operations ABS CyberSafetyTM Volume 1 GUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE AND OFFSHORE OPERATIONS ABS CyberSafetyTMVOLUME 1 SEPTEMBER 2016 American Bureau of Shipping Incorporated
2、 by Act of Legislature of the State of New York 1862 2016 American Bureau of Shipping. All rights reserved. ABS Plaza 16855 Northchase Drive Houston, TX 77060 USA Foreword Foreword ABS recognizes that automation methods and increasingly, autonomy have penetrated nearly all aspects of shipboard and p
3、latform systems. Because these systems control multiple aspects of asset, ship or platform operations, they become integral parts of system and operational safety. ABS supports our community by compiling best practices, deriving new methods, and developing the standard for marine and offshore cybers
4、ecurity in a commitment to safety and security of life and property and preservation of the environment. This document is Volume 1 of the ABS CyberSafety series. It provides best practices for cybersecurity, as a foundational element of overall safety and security within and across the marine and of
5、fshore communities. The best practices are meant to provide insights for operations, maintenance and support of cyber-enabled systems. These Guidance Notes have been updated to align with Volume 2 of this series, ABS Guide for Cybersecurity Implementation for the Marine and Offshore Operations ABS C
6、yberSafety Volume 2. It has been expanded to reflect the full set of 37 Capabilities that define competencies for the ABS CyberSafety environment. These Guidance Notes become effective on the first day of the month of publication. Users are advised to check periodically on the ABS website www.eagle.
7、org to verify that this version of these Guidance Notes is the most current. We welcome your feedback. Comments or suggestions can be sent electronically by email to rsdeagle.org. ii ABSGUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE White House Cyberspace Policy Review, May
8、2009. Source: https:/niccs.us-cert.gov/glossary) Information Technology (IT): Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception
9、of data or information. (From: NIST SP 800-53 Rev 4 (glossary). Source: http:/nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf) Operational Technology (OT): An information system used to control industrial processes such as manufacturing, product handling, production, and distribut
10、ion. Industrial control systems include supervisory control and data acquisition (SCADA) systems used to control geographically dispersed assets, as well as distributed control systems (DCSs) and smaller control systems using programmable logic controllers to control localized processes. (Adapted fr
11、om: NIST SP 800-53 Rev 4. Source: http:/nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf) Smart Asset: Marine and offshore assets built with significant degrees of automated control of vessel or platform operations, system management and monitoring, and data communications. Automat
12、ion provides labor-saving capabilities; augments human strength; augments human decision-making and error-checking processes; provides operational situational awareness; enables multiple simultaneous system control and management; and provides for controlled data storage. A Smart Asset may possess a
13、utomated or autonomous processes that operate without routine human intervention. 2 ABSGUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE it is the training and documentation of processes and procedures that help insure against these categories of errors. For natural disasters,
14、we plan for business continuity, designing resilience into systems, processes and assets. The first step to improved cybersecurity is knowledge of the approaches developed and implemented by other practitioners in the field who have gained and shared valuable experiences and lessons learned. This do
15、cument contains practical information that has been researched and vetted for application to the marine and offshore industries. It is a collection of best practices deemed to be useful both to novice specialists just beginning to establish cybersecurity programs, and to seasoned experts who want to
16、 review the best practices of others in order to continue improving their cybersecurity programs and implementations. 3 Best Practices (1 September 2016) ABS CyberSafety is the ABS process for adding cybersecurity rigor to both the operational systems aboard ships and platforms, and to the linked bu
17、siness systems that support their missions. The best practices in these Guidance Notes will help the reader understand how to frame and prioritize cybersecurity work efforts in going about building rigor, security and safety into systems. This volume concentrates on the establishment of Basic and De
18、veloped Capabilities that fully enable a cybersecurity work effort. In this context, a Capability is broad in that it includes people, systems, data, and processes. A Company builds these Capabilities incrementally based on security needs, staff competencies, available acquisition resources, and org
19、anizational maturity in cybersecurity. Capabilities built according to this method become the Companys support framework for security controls, policies and procedures. The program laid out in this way becomes an overlay that can be used with any compliance frameworks security controls, or it can be
20、 a measurable compliance set in its own right. The arrangement of the Capabilities is consciously structured to provide supportability and life cycle management inside the personnel structures built and maintained by the Company, for both cybersecurity and system safety. Section 2, Figure 1 illustra
21、tes the most basic Capabilities that are required to build a cyber-safe program to support cyber-secure systems. At the core of the program are the baseline controls and tasks the information technology fundamentals commonly employed to support a business or operational (shipboard, offshore or port
22、facility) system. Surrounding this baseline are Capabilities needed to shape an environment that is ready to sustain a robust cybersecurity program. 4 ABSGUIDANCE NOTES ON THE APPLICATION OF CYBERSECURITY PRINCIPLES TO MARINE even so, the listed practices are primarily based on lessons learned by im
23、plementers that have paved the way in cybersecurity program development and can arguably enable a practitioner to stand up a functional cybersecurity program more rapidly and logically than would be possible without this or similar guidance These Guidance Notes are organized as best practices and re
24、commendations for each of the Capabilities shown in the preceding cybersecurity program graphics. The Basic Capability list deemed to be essential to a nascent program is provided first, followed by the Developed Capability list. 4.1 Basic Capability 1. Exercise Best Practices 2. Build the Security
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ABS2502016GUIDANCENOTESONTHEAPPLICATIONOFCYBERSECURITYPRINCIPLESTOMARINEANDOFFSHOREOPERATIONSABSCYBERSAFETYVOLUME1PDF

链接地址:http://www.mydoc123.com/p-400844.html