Loss Prevention Bulletin Vol.42 Full
Loss Prevention Bulletin Vol.42 Full
42 May 2018
Contents
1. Introduction...........................................................................................................................1
2. Example of a ship communications system that has been infected with a virus..................................2
8. Conclusion.......................................................................................................................... 14
9. Appendix............................................................................................................................. 14
< Note >
Regarding the text and forms provided by ORCA CO., LTD. which were introduced in this bulletin, ORCA CO., LTD.
possess the primary copyright. However, we have permission to duplicate, edit, revise and distribute only for the
purpose of Club member SMS manual revision.
< Disclaimer >
This Loss Prevention Bulletin is issued for the purpose of supporting Club members and related parties with cyber
security countermeasure planning. The Japan Ship Owners’ Mutual Protection & Indemnity Association and ORCA
CO., LTD. are not liable for any damage caused as a result of using this bulletin.
JAPAN P& I CLUB
§1 Introduction
The threat of cyber attacks at sea have increased recently and our Club issues a circular entitled “Cyber risk and cyber
security” accordingly. The necessity of cyber security countermeasures and guidelines have been set forth by the IMO
(MSC-FAL.1/Circ.3 Guidelines on Maritime Cyber Risk Management) and each shipping organization.
For example, the following case would normally be New Generated Bridge System Voyager
subject to P&I insurance: The ship’s system gets infected with a virus via the onboard LAN system via the e-mail
PC used for work or a crew member’s personal PC. The onboard PC’s software for work use is updated without
permission or, as a result that particular crew member changed connection to the onboard LAN cable without
permission. The electronic aid for navigation and propulsion breaks down, which causes damage to harbour facilities
at the time of departure.
The following examples will not be covered by P&I insurance: For instance, there was a case whereby a certain
amount of the ship’s store was transmitted mistakenly due to a hacked e-mail. In another case, the ship’s schedule
was delayed because the crew was investigated by the authorities, because the uploaded video which was found in
his personal PC appeared to be associated with terrorism. Further, a threatening email was sent to the ship as a fake
money demand meaning that the ship might have been arrested. Such cases which do not develop into P&I accidents
were reported.
-1-
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
Except for GMDSS (Global Maritime Distress and Safety System, which is equipment that is installed on a
ship depending on the sea area that is to be sailed), V-SAT, Fleet Xpress, FBB, Iridium, internet using 4G,
e-mail, telephones and Faxes are frequently used on the ship. This ship communication equipment is not only a
communication tool between ship and shore, but also essential equipment for current navigation, such as weather
routing, chart correction and PMS (Planned Maintenance System).
The volume of ship communications via e-mail have increased due to this. Graph 1 shows the volume of ship
communications via e-mail by month over the last 12 years. Compared with 2005, the volume of communications in
2016 has increased by 18 times.
(Unit:MB)
160
144
140 Volume of ship communications(e-mail) 126
120
100
76
80
65
61
60 48 53
40
36
20 24
20 15
8
0
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
Graph 1 Volume of ship communications via e-mail by month over the last 12 years
-2-
JAPAN P& I CLUB
On the other hand, along with the volume increase in ship communications, the number of ship systems that are prone
to being infected with a virus are also occurring more frequently, and the way in which viruses infect systems are now
more varied.
By around the year 2000, ship viral infection was blocked by the e-mail provider. When it came to ship's local
network, because most vessels were not initially connected to an external network, there were many cases whereby
people or crew who boarded the ship brought viruses on board with them physically.
Server scanning
However, since around 2010, there have been some cases whereby an intrusion of the latest virus caused the ship to be
infected and, as a result, disrupted the e-mail system. This came about as a result of a member of crew using 3G/4G
when calling at port.
-3-
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
Server scanning
private 3G/4G
Updating definition files connection by crew
Actions such as the use of illegally copied software and illegally downloaded sites, as a result, are some of the causing
circumstances whereby a system may be easily infected by the latest virus.
It is needless to say that these ship communications devices and their connected onboard PCs, navigation electronics
and propulsion equipment etc. are essential when it comes to examining cyber security countermeasures. However,
there seems to be little known when it comes to taking a specific approach concerning the examination of risk
assessment, revisions to the SMS (Safety Management System) or SSP (Ship Security Plan).
In the last part of this bulletin, we will take a look at ORCA CO., LTD., which has practical accomplishments in the
shipping IT field, and introduce a SMS template that simulates the MSC-FAL.1/Circ.3 Guidelines on Maritime Cyber
Risk Management, using the risk assessment approach method for cyber security countermeasures.
-4-
JAPAN P& I CLUB
Here, we would like to define cyber risk as potential factors which may cause problems or affect the IT system which
may even also cause disorder in the carrying out of duties and lead to economic loss.
Implementation of
Risk tolerance
countermeasures
Regarding IACS, the importance of security countermeasures of a computer system are to be considered. In order to
specify the requirements related to a person’s role in a computer system used on board, security countermeasures of
both software and hardware to be used in the computer system and the quality of management, such as the procedure
of software changes etc., the Unified Requirement of IACS E22(Rev.2) was adopted in June, 2016.
Following this, a notice of revised related rules and inspection procedures in the Class NK technical information
-5-
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
Table 2.1 System categories in Annex D18.1.1, Part D of the Guidance for the Survey and Construction for Steel Ships
Category Effects Typical system functionality
Those systems, failure of which will not lead to
- Monitoring function for informational or administrative
Ⅰ dangerous situations for human safety, safety of the
tasks
vessel and/or threat to the environment.
Those systems, failure of which could immediately lead - Control functions for maintaining the vessel’s
Ⅲ to dangerous situations for human safety, safety of the propulsion and steering
vessel and/or threat to the environment. - Vessel safety functions
Category III
System Examples of detailed machinery and system
Engine control system, Engine remote control system, Main boiler control system, CPP
Main propulsion systems
control system, Electric propulsion control system
Electric power systems Generator engine control system, Electric power converter (for electric propulsion ship, etc.)
Fire detection and fighting system, Flooding detection and fighting system, Internal
Safety systems
communication system, System involved in operation of life saving appliances equipment
Category II
Cargo control system (e.g. cargo control console, cargo valve remote control system, cargo
Liquid cargo transfer control machinery emergency shut-down system),
systems Reliquefaction system, Inert gas generator (including nitrogen generator), Oil discharge
monitoring and control system
Fuel oil treatment systems Viscosity control system, Fuel oil purifier
Stabilization and
Fin stabilizer, Jetfoil
ride control systems
Ballast transfer valve remote control system, Oily water separator, Oil content meter, Waste
Other systems oil incinerator, Sewage treatment plant, Aux. boiler control system, Ballast water treatment
system, SOx/NOx scrubber, NOx exhaust gas recirculation system
-6-
JAPAN P& I CLUB
It is defined that the responsibility for cyber security countermeasures of each computer system is down to the supplier
of each computer system. However, in the event of networking systems, the system integrator will be responsible
because there will be new risks, which were not taken into account when operating a system as a single unit.
The role of the shipowner and ship management company is to keep receiving necessary information, such as a list of
equipment that uses computers and risk assessment results etc. from the shipyard and system integrator; this is all that
is required of them.
However, with respect to the revision of the SMS in the future (cyber security countermeasures), the concept “System
integrator bears a certain amount of the responsibility” will play a key role. Regarding the onboard PC for duty
use, loading computer, V-SAT, FBB and so on, which are classified into Class Category I, it will be necessary for a
shipowner or ship management company to implement a risk assessment as a cyber security countermeasure.
Although external factors such as unauthorized access and system hacking are mainly the focus when it comes to
cyber risk, it will be important to consider reviewing internal factors, such as the existence of operation mistakes and
general system failure.
General
Viruses
System failure
Unauthorized
zzz...
access
Social
Operation
Engineering Abuse
mistake
-7-
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
❶ To identify the IT systems After identifying the IT systems installed on the ship, list them up.
Captain/Bridge PC
- E-mail software
- Nautical chart correction software
V-Sat / FBB
- Weather information software
❷
For each listed-up IT system, risk assessment is to be implemented by exam-
Implementation of risk ining the possible outcomes of a cyber attack (damage), frequency and current
assessment management method.
E-mail communication
5 Continued...
The above is one example, because risk assessment and the SMS can differ depending on the crew structure, sea area for shipping operation, ship
type and management company.
-8-
JAPAN P& I CLUB
❸ Establishment of necessary
countermeasures
As a result of risk assessment, additional
countermeasures are to be planned,
implemented and operated, if necessary.
❶・・・・・・・・・・ Identify the IT systems on the ship in order to list them up.
❷ ❸・ ・・・ In the same way that dangerous work and hazardous areas designated on the ship are operated using the current
SMS, identify the onboard IT systems and implement a risk assessment while examining the possible outcome
of a cyber attack (damage), frequency of and current management method, and carry out a countermeasure,
if necessary. When confronted with a cyber risk, it is also necessary to consider trends in the IT field, types and
versions of systems and equipment, and so on.
❹・・・・・・・・・・ Check the operational status of additional countermeasures and verify as to whether there were no incompatibilities
or defects using reports of incidents and near misses from the ship, or an ISM internal audit carried out by a SI.
❺ ❻・・・・ Companies are to implement the statistical analysis based on the reports of incidents and near misses from
the ship, and the results reported from the ISM internal audit. Following the results of the statistical analysis,
review (management review) as to whether the additional countermeasures were effective, and if the additional
countermeasures were insufficient or if any new risks were reported, a risk assessment is to be implemented
again, in the same way that the operation would be carried out with the existing SMS, and the necessary
countermeasures are to be examined.
Regarding the reporting of incidents and near misses, the following examples can be said to be occurring recently:
A crew member inserted a USB memory stick which is not permitted by the company, into their work PC, or he/she
downloaded non-permitted software or a programme onto the onboard PC.
In addition, in order to receive visitors (external factors of cyber risk), not dissimilar to that of the SMS, it could be
necessary to review the SSP, also, as an unspecified number of visitors and dock workers will get on board, especially
at the port of call, and multi-purpose offshore support vessels and research vessels carrying a large number of
researchers and workers may embark.
-9-
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
We believe that it will be desirable to appoint an IT designated person when it comes to drawing up and implementing
cyber security countermeasures that can be incorporated into the SMS. In the future, when countermeasures in a state
of emergency and the introduction of systems maintenance on board a ship are required, the role of the IT Manager
and the importance of this role will become more essential. In addition, it will be important to have a system in place
that allows for consultation to be carried out with an external ship IT system expert.
President
Emergency Response Team
Auditing Team
Crew Department
IT Manager
Marine Department Technical Department
Master IT consultant
- 10 -
JAPAN P& I CLUB
The establishment of an IT standard will allow for the smooth integration of operation and management (maintenance
etc.) if your organization is managing a large fleet of ships. With an IT standard in place, it will be much easier to deal
with any problems that arise, compared to not having established one.
FBB V-SAT
Back up HDD
Firewall / Router
L2 switch
Onboard WiFi
ECDIS PC NAS
Access Point
It is important to organize the specification, software and purpose of each onboard PC. For reference, it will be useful
if a substitute PC is available in case a PC breaks down or new software is added.
- 11 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
Standard type:
Date of Record:
IT Manager:
Designated Person:
- 12 -
JAPAN P& I CLUB
Regarding the IT standard (ship's LAN/onboard PC specification), risk assessment is to be implemented following
the procedure that was established in the introduction of this guide “3-4 How to make a plan for cyber security
countermeasures”.
Please note that systems that have already been risk assessed, IT systems that do not directly interfere with work being
carried out even when a system failure occurs, stand-alone use computers etc. in Class Category II and III can be
excluded from the risk assessment.
§7 S
MS manual to include IT control documents
Having implemented a risk assessment and incorporation of the IT control documents into SMS manual, it is
recommendable that a ship and shore joint drill that simulates a severe IT incident be implemented, even if only once.
It would be a good opportunity to review as to whether the manual and instructions for cyber security countermeasures
which were established in the SMS manual work effectively, and as to whether both personnel on shore and crew on
the ship are familiar with the new manual and so on.
- 13 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
§8 Conclusion
- 14 -
JAPAN P& I CLUB
ORCA-MN-02-00
Revision: 1
Page: 1 of 1
Date: 01 Feb,2018
1. Purpose
(snipped)
(snipped)
- 15 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
President
President
Ship Management
Designated Person
Committee
Auditing Team
Auditing Team
Head- Crew Department Head- Ship Management Dept. IT Manager
IT consultant
Head- Crew Department
Manning Company Head- Ship Management Dept. IT Manager
Master
IT consultant
Manning Company
Master
Chief Officer Chief Engineer Radio Officer Shipboard
(Radio & Management
(Deck dept.) (Engine dept.) Pursers) Committee
- 16 -
JAPAN P& I CLUB
ORCA-MN-20-00
Revision: 0
Page: 1 of 5
Date: 01 Feb. 2018
1. Purpose
2. Application
This regulation is applicable to the Company and all vessels under management of the
Company.
3. Reference regulations
SOLAS XI-2
MSC-FAL-1/Circ. 3
4. Definition
4.1 IT system
“IT system” is a computer-based system used for all kind of operations. The
system can be total packaged equipment or install based software for PC. Any
device, equipment or services based on computer are defined as a part of "IT
System".
4.2 Cyber-risk
“Cyber-risk” is a potential risk to lead operation failure of the IT systems, which
will cause financial loss, disruption or damage to the reputation of an
organization. Cyber-risk includes external factors (such as computer virus,
Trojans, or attack over network, etc.) and internal factors (malfunction, miss-
operation, or system bug, etc.).
4.3 IT incident
“IT incident” is an occurrence, which actually or potentially results in adverse
consequences to IT systems, includes all deficiencies and non-conformities
involving to the IT systems.
- 17 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-00
Revision: 0
Page: 2 of 5
Date: 01 Feb. 2018
5. Requirements
5.3.1 The IT manager should identify all IT systems onboard and ashore using the
“List of IT Systems” (ORCA-SM-07-51).
5.3.2 The IT manager should process the risk assessment regarding cyber-risk for each
IT systems and prepare for countermeasure if so required.
5.3.3 During the risk assessment, if a part of the IT systems had already assessed in
the IT standard, the part of risk assessment can be omitted.
5.3.4 In case of addition, replacement, or abolition of the IT system had been taken,
the IT manager must re-process risk assessment to the part of modification.
- 18 -
JAPAN P& I CLUB
ORCA-MN-20-00
Revision: 0
Page: 3 of 5
Date: 01 Feb. 2018
In order to ensure the proper operation of IT systems, the IT Manager shall set
up a maintenance plan (on the OMPS software) for the periodic maintenance of
IT systems, including its important elements as well as associated software. The
maintenance plan should include the following factors:
(1) Maintenance operation designated by each IT system vender.
(2) Minor software update.
(3) Backup operation of data.
(4) Condition check of each IT systems.
Maintenance of the IT systems should be processed in reference to the
“Regulation for Maintenance of Hull, Machinery and Equipment”
5.6.1 The IT manager should control version tables of firmware or software of the IT
systems.
5.6.2 If any update version has been released, the update should be applied as possible.
5.6.3 However, major update might affect to compatibility or connectivity among
other IT systems. In this case, sufficient verification and risk assessment must be
done by the IT manager before applying the update.
5.6.4 The IT manager should judge if the update is major or minor appropriately.
- 19 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-00
Revision: 0
Page: 4 of 5
Date: 01 Feb. 2018
- 20 -
JAPAN P& I CLUB
ORCA-MN-20-00
Revision: 0
Page: 5 of 5
Date: 01 Feb. 2018
5.10.2 Master or each Department of the Company must inform the IT manager for any
newly identified cyber-risk.
6. Applicable procedures
7. Applicable records:
- 21 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-01
Revision: 0
Page: 1 of 5
Date: 01 Feb. 2018
1. Area of application
This procedure defines the guidance for the management of IT systems onboard and
ashore and apply to the Company and vessels under the management of the Company
2. References
3.1 The IT manager should design IT Standard using “Record for IT Standard
Design” (ORCA-SM-07-50) to standardize the IT system integration.
3.2 In order to prevent any problem in connection of software and hardware,
following factor should be verified;
(1) Compatibility
(2) Convertibility
(3) Conflict
(4) System response speed
3.3 The IT manager should prepare IT Standard for vessel and company.
3.4 The IT manager should categorize the IT system as following;
Company Effects
Category
A Those systems, failure of which will not directly affect to
commercial shipping operation.
B Those systems, failure of which could eventually impact to
commercial shipping operation.
C Those systems, failure of which could immediately cause an
impact to commercial shipping operation.
3.5 Regarding Category B and C, The IT manager should prepare a specific measure
to ensure those systems working continuously.
- 22 -
JAPAN P& I CLUB
ORCA-MN-20-01
Revision: 0
Page: 2 of 5
Date: 01 Feb. 2018
3.6 The ship manager should also categorize the IT system defined by NK TEC-
1145 as followings;
Class Effects
Category
I Those systems, failure of which will not lead to dangerous
situations for human safety, safety of the vessel and/or threat to
the environment.
II Those systems, failure of which could eventually lead to
dangerous situations for human safety, safety of the vessel
and/or threat to the environment.
III Those systems, failure of which could immediately lead to
dangerous situations for human safety, safety of the vessel
and/or threat to the environment.
3.7 The ship manager should process risk assessment regarding IT standard.
4.1 The IT manager should process risk assessment regarding identified risks on IT
systems using the “Record for Risk Assessment of IT Systems” (ORCA-SM-07-
52).
4.2 If any connection had made among multiple IT systems, risk of the connection
should be also verified.
4.3 Following factors should be assessed for each risk;
(1) Possibility
(2) Frequency
(3) Damage
4.4 In conclusion of the assessment, following option should be selected;
(1) Accept the risk
(2) Measures required
(3) To be re-evaluate later
4.5 If any countermeasure required, the IT manager should plan a measure and
process it with approval of the Designated Person.
4.6 As risk assessment requires highly knowledge and experience of IT, it is
preferable to have an advice from IT consultant or IT expert.
- 23 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-01
Revision: 0
Page: 3 of 5
Date: 01 Feb. 2018
6.1 The IT manager shall refer to the IT standard and integrate IT systems onboard
the ship with reference to the “Guideline for IT System Integration” (ORCA-
MN-20-01A) and record the same on the “list of IT Systems” (ORCA-SM-07-
51).
6.2 The IT manager should process risk assessment for each IT systems using
“Record for Risk Assessment of IT Systems” (ORCA-SM-07-52).
6.3 In this assessment, if the IT system is already assessed in IT Standard,
assessment of this part can be omitted.
6.4 Also, if the IT system is categorized as Category II or III in NK TEC-1145, and
the system is operated as standalone, assessment of this part can be omitted.
These systems should be assessed by the system vender.
6.5 The IT manager should prepare a maintenance plan including following tasks;
(1) Maintenance operation which instructed by the system vender.
(2) Minor update of software/firmware which approved by the IT manager
(3) Backup of the data
(4) Condition check
6.6 These preparations should be approved by the Designated Person.
- 24 -
JAPAN P& I CLUB
ORCA-MN-20-01
Revision: 0
Page: 4 of 5
Date: 01 Feb. 2018
7.1 The IT manager should correct or delete the data of every IT systems onboard,
referring “List of IT Systems” (ORCA-SM-07-51).
9.1 The IT manager should handle IT incident occurred both onboard and ashore.
9.2 In case of following situation, the IT manager must report the occurrence to the
Designated Person as critical incident.
(1) The incident can directly affect to the vessel’s safety navigation.
(2) Or, the incident can lead to commercial damage to outside of the company.
(3) Or, delay of the solution may lead to situation (1) or (2).
9.3 In case of critical incident, the Designated Person must setup Emergency
Response Team to handle the situation in reference of “Regulation of
Emergency Preparedness” (ORCA-MN-10-00).
9.4 The Designated Person can contact IT consultant or IT expert for advice, if so
required.
9.5 The “Procedure for Cyber Risk Management” (ORCA-MN-20-02) must also to
be referred to.
- 25 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-01
Revision: 0
Page: 5 of 5
Date: 01 Feb. 2018
- 26 -
JAPAN P& I CLUB
ORCA-MN-20-01A
Revision: 0
Page: 1 of 4
Date: 01 Feb. 2018
Appendix
Guideline for IT system integration
Client PC
(1) Following points should be considered for selection of client PC model.
(a) Sufficient CPU power, memory, HDD space to operate the IT systems.
Especially, security software requires these resources.
(b) PC model which has enough reliability to operate onboard.
(2) Language model might affect to the IT systems. The IT manager must verify it if
PCs are supplied from different countries.
OS
(1) In order to apply necessary security update, “auto update function” should be ON as
possible.
(2) However, major updating of OS might affect to the other IT systems or peripherals.
If the IT manager decides to update the OS’s version, sufficient verification and risk
assessment must be taken.
Basic software
(1) “Basic software” is software which acts as system requirements of each IT systems,
such as MS-Office, PDF reader, etc.
(2) Major update of basic software might affect to related IT systems. So if the IT
manager decides to update the version of basic software, sufficient verification and
risk assessment must be taken.
Application software
(1) All application software should be verified in IT standard environment by the IT
manager before installation.
(2) If the application software has a communication function, detail of the function
(communication port, destination IP, etc.) must be clarified. If communication detail
of the software is not disclosed, the software shall not be adopted.
(3) Application software might have conflict to the other applications. In order to
prevent conflicts, the IT manager must proceed sufficient verification before
adoption.
- 27 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-01A
Revision: 0
Page: 2 of 4
Date: 01 Feb. 2018
Anti-virus software
(1) Anti-virus software (or any kind of security software) must be installed to all
operational official PCs.
(2) The IT manager should prepare an appropriate method to update definition files (or
pattern files) to keep Anti-virus software operational.
(3) Especially, in the vessel which has an ability to access to the Internet in the ocean,
“online updating function” is required.
Communication infrastructure
(1) In order to ensure communication reliability, it is preferred to have more than two
different kinds of communication infrastructure.
(2) The IT systems onboard are preferred to operate as “Open system” which will not be
affected by any specific communication infrastructure. The IT systems onboard
should be independent from communication.
(3) To control the latest cyber-risks, maintaining the version of OS and applications by
auto is very crucial. If the vessel has no ability to apply “auto updating” via satellite,
shore side communication such as 4G should be adapted.
Peripheral equipment
(1) The IT manager must clarify the detail of communication function of all LAN
connected peripheral equipment on board (port, destination IP, etc.). If the
- 28 -
JAPAN P& I CLUB
ORCA-MN-20-01A
Revision: 0
Page: 3 of 4
Date: 01 Feb. 2018
communication details are not disclosed, the equipment shall not be adopted.
License compliance
(1) The IT manager must ensure that all software and hardware have appropriate
license.
(2) In order to avoid unknown cyber risks, following systems are prohibited.
(a) Illegal copy
(b) Pirated edition
(c) A hardware which have unauthorized modification.
(d) Any illegal network devices.
Network router
(1) It is preferred to have a network router independent from communication
infrastructure. So, the vessel LAN can be operated without dependency.
(2) Network router should have an ability to switch multiple communication
infrastructures.
- 29 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-01A
Revision: 0
Page: 4 of 4
Date: 01 Feb. 2018
(3) Network router should have a function to control internal network traffic.
(4) In order to avoid un-controlled traffic or cyber-attack from outside, un-necessary
port must be closed in filter settings.
- 30 -
JAPAN P& I CLUB
ORCA-MN-20-02
Revision: 0
Page: 1 of 2
Date: 01 Feb. 2018
1. Area of application
This procedure defines the guidance for taking necessary measures to response to cyber
security incidents of IT systems apply to the Company and all ships under the
management of the Company.
2. References
3.1 The Head of the Shipmanagement Department, under the direction of the
Designated Person, is responsible for cyber risks management, including IT
systems, onboard ships and the shore-based Company.
3.2 The IT Manager is responsible for the smooth operation of IT systems and,
supervise, monitoring, and timely response to cyber incidents.
3.3 The Master onboard is responsible for the smooth operation of IT systems and,
supervise, monitoring, and report any deficiency, non-conformity or cyber
incident to the Company in accordance with the “Procedure for Management of
Deficiencies and Non-conformities” (ORCA-MN-13-01).
4. Procedure
4.1 Identify threats- The IT Manager, under the direction of the Head of the
Shipmanagement Department, and the Designated Person, is to take measures to
make all relevant personnel understand the external cyber security threats to the
ship and the Company and to understand the internal cyber security threat posed
by inappropriate use and lack of awareness.
4..2 Identify vulnerability- The IT Manager is to develop inventories the Company and
shipboard systems with direct or indirect communication links with referring to
the “List of IT Systems” (ORCA-SM-07-51) and understand the consequences of
a cyber security threat on these systems also understand the capabilities and
limitations of existing protection measures.
- 31 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
ORCA-MN-20-02
Revision: 0
Page: 2 of 2
Date: 01 Feb. 2018
4..3 Assess risk exposure- The IT Manager is to assess and determine the likelihood of
vulnerabilities being exploited by external threats, by inappropriate use, and the
security and safety impact of any individual or combination of vulnerabilities
being exploited. The form “Records for Risk Assessment of IT Systems” (ORCA-
SM-07-52) is to be applied.
4.4 Develop protection and detection measures- The IT Manager, under the direction
of the Head of the Shipmanagement Department, and the Designated Person, is to
take measures to the likelihood of vulnerabilities being exploited through
protection measures also to reduce the potential impact of a vulnerability being
exploited.
4.5 Establish contingency plans- The IT Manager shall develop a response plan to
reduce the impact of the treats under the approval and direction by the Designated
person in accordance with the “Procedure for Management of Deficiencies and
Non-conformities” (ORCA-MN-13-01).
4.6 Response to and recover from cyber security incidents- After recover cyber
security incidents by using the response plan, the IT Manager shall assess the
impact of the effectiveness of the response plan and re-assess threats and
vulnerabilities.
4.7 Investigating cyber incidents- The IT Manager, under the direction of the Head of
the Shipmanagement Department, and the Designated Person, is to investigate
cyber incidents in order to archive a better understanding of the potential cyber
risks, identification of lessons learned also updates to technical and procedural
measures to prevent a recurrence.
4.8 Response to cyber incidents of IT systems - The IT manager shall assess its
vulnerability and impact and give a response in accordance with the “Procedure
for Management of Deficiencies and Non-conformities” (ORCA-MN-13-01), and
coordinate with the makers of the operational technology system to ensure its
safety and security.
- 32 -
JAPAN P& I CLUB
Standard type:
Date of Record:
IT Manager:
Designated Person:
- 33 -
PC setting detail
MS-OFFICE
Peripherals
Laser Printer
Single or Multipul function, B/W or Color
- 34 -
Inkjet Printer
Single or Multipul function, B/W or Color
Scanner install
Install Driver/standard soft/quality adjust
Printer
Scanner
P&I Loss Prevention Bulletin
Network Diagram Plan
(Free Form)
- 35 -
JAPAN P& I CLUB
Vessel Computer Systems List
Vessel Name:
Date Report:
1. Application Software
Category Version Data
System Name Supplier Remark
Class Company No. Update Property Backup Action
8. List of the IT Systems SM0751
JAPAN P& I CLUB
2. Network
Category Version Data
System Name Supplier Remark
Class Company No. Update Property Backup Action
- 36 -
3. Navigational Equipment
Category Version Data
System Name Supplier Remark
P&I Loss Prevention Bulletin
Vessel Name
Date Report
ISSUE
Assessment
Date Found Description Evaluation Countermeasures Due Date Status
Possibility Frequency Damage
ISSUE
Assessment
Date Found Description Evaluation Countermeasures Due Date Status
Possibility Frequency Damage
- 37 -
9. Records for Risk Assessment of the IT Systems SM0752
ISSUE
Assessment
Date Found Description Evaluation Countermeasures Date Start Status
Possibility Frequency Damage
JAPAN P& I CLUB
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
Our club’s original poster
Be aware of
Cyber Risk
CyberRisk0010101000000
0100101010010100010100
1000010010100101010110
0100010001001001010001
0010010010010010010100
1010001000010001001001
0100010010010010010010
0101001010001000010001
0010010100010010010010
Maritime Cyber Risk Management 0100100101001010001000
0100010011110CyberRisk
0000100001000000000100101010010100010100100001101010100101000010101
0000101100101010000100010010001000010000010010010010100010100101001
0000100001000000000100101010010100010100100001101010100101000010000
n Bridge
- 38 -
JAPAN P& I CLUB
Be aware of
Cyber Risk
CyberRisk0010101000000
0100101010010100010100
1000010010100101010110
0100010001001001010001
0010010010010010010100
1010001000010001001001
0100010010010010010010
0101001010001000010001
0010010100010010010010
Maritime Cyber Risk Management 0100100101001010001000
0100010011110CyberRisk
0000100001000000000100101010010100010100100001101010100101000010101
0000101100101010000100010010001000010000010010010010100010100101001
0000100001000000000100101010010100010100100001101010100101000010000
ICS Bridge Procedure Guide say; ECDIS is an aid to safe navigation. ECDIS does not conduct safe
navigation or relieve the Master or OOW of their responsibilities for conducting safe navigation.
To be posted on Bridge
- 39 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
Be aware of
Cyber Risk
CyberRisk0010101000000
0100101010010100010100
1000010010100101010110
0100010001001001010001
0010010010010010010100
1010001000010001001001
0100010010010010010010
0101001010001000010001
0010010100010010010010
Maritime Cyber Risk Management 0100100101001010001000
0100010011110CyberRisk
0000100001000000000100101010010100010100100001101010100101000010101
0000101100101010000100010010001000010000010010010010100010100101001
0000100001000000000100101010010100010100100001101010100101000010000
malfunction
IACS UR E22(Rev.1) specifies requirements related to composition and function of computer based
systems used for machinery systems such as monitoring systems.
3.3.2 Change management
The owner shall ensure that necessary procedures for software and hardware change management exist
on board, and that any software modification/upgrade are performed according to the procedure. All
changes to computer based systems in the operational phase shall be recorded and be traceable.
1 2 3 4
5 6 7 8
- 40 -
JAPAN P& I CLUB
Be aware of
Cyber Risk
CyberRisk0010101000000
0100101010010100010100
1000010010100101010110
0100010001001001010001
0010010010010010010100
1010001000010001001001
0100010010010010010010
0101001010001000010001
0010010100010010010010
Maritime Cyber Risk Management 0100100101001010001000
0100010011110CyberRisk
0000100001000000000100101010010100010100100001101010100101000010101
0000101100101010000100010010001000010000010010010010100010100101001
0000100001000000000100101010010100010100100001101010100101000010000
- 41 -
JAPAN P& I CLUB
P&I Loss Prevention Bulletin
The author
● Principal Office(Tokyo)
2-15-14, Nihonbashi-Ningyocho Chuoh-ku, Tokyo 103-0013, Japan
Tel:03-3662-7229 Fax:03-3662-7107
● Kobe Branch 6th Floor Shosen-Mitsui Bldg. 5, Kaigandori Chuoh-ku, Kobe, Hyogo 650-0024, Japan
Tel:078-321-6886 Fax:078-332-6519
● Fukuoka Branch 6th Floor Meiji-Dori Business Center 1-1, Shimokawabata-machi, Hakata-ku, Fukuoka 812-0027, Japan
Tel:092-272-1215 Fax:092-281-3317
● Imabari Branch 2-2-1, Kitahorai-cho, Imabari, Ehime 794-0028, Japan
Tel:0898-33-1117 Fax:0898-33-1251
● Singapore Branch 80 Robinson Road #14-01B SINGAPORE 068898
Tel:65-6224-6451 Fax:65-6224-1476
● Japan P&I Club (UK) Services Ltd 5th Floor, 38 Lombard Street, London EC3V 9BS U.K.
Tel:44-20-7929-3633 Fax:44-20-7929-7557