implementation and verify that the developed system
is running appropriately.
In these guidelines, assessment is divided into
three levels, high level assessment, focused
assessment and comprehensive assessment. High
level assessment is the first stage of improving
enterprise cybersecurity and conducted by senior
management. The focus of this stage is mainly
technical aspect, cybersecurity awareness, policy and
cybersecurity implementation. Output of this stage is
cyber risk matrix.
The second stage, focused assessment, is
conducted by staffs with knowledge of IT, industrial
control/automation and risk methodology. In this
stage, threat to system is identified, barrier to prevent
the attack is planned and means to minimize risk of
threat is defined. Afterwards, assessment is done to
measure the impact of barrier weakening and the
means to prevent such cases.
Comprehensive assessment is performed based
on ISO/IEC 27001. In this stage, consequence of
successful cyber-attack is assumed which focused on
confidentiality, integrity, availability and
authenticity. The output of this assessment is
improvement related to technical aspect and security
management.
3.4 CCS (2020)
These Guidelines mainly explains about
implementation of cybersecurity onboard ships.
Focus of these guidelines is construction, operation,
maintenance and survey process of ships that
implements cybersecurity. There are two kind of
notation assigned to ships that comply with the
requirements of these guidelines that is P and S. P
notation denotes the lowest level of requirement,
while S notation is given to ships that comply with
highest level of requirements in these guidelines. This
guidelines uses references from IACS UR E22, IEC
and CCS own rules. Types of survey for ships with
cybersecurity notation is the same with any other
ships that is annual, intermediate and special survey.
The scope of the surveys is inspection and
assessments regarding ship cybersecurity
requirements and their management.
3.5 IRS Class (2017)
The IRS guidelines focus on implementation of
cybersecurity on board the ship and shore-based
facility. Notations given to ships that comply with
these guidelines are divided into 3 categories, CyS-I,
CyS-II, dan CyS-III. The roman numeral denotes the
level or complexity of the requirements and their
corresponding inspection where roman numeral I is
the lowest level and III is the highest level. In these
guidelines, for ships that is assigned with CyS
notation, their corresponding shore-based facility can
be awarded similar notation with additional qualifier
as per owner request.
3.6 LR Class (2017)
The guidelines published by LR class also focus on
cybersecurity on board the ship. The subject of these
guidelines is type of ship that is categorized by these
guidelines as “cyber enabled” – ships with on board
IT and OT system which is controlled conventionally
by crew or autonomously without crew. Assignment
of ship notation in these guidelines is divided into two
broad categories as follows:
Cyber Functionality
This notation is further divided into 4
categories as follows:
o Cyber safe: essential system in ship
operation that has remote access to
onboard ship operational data has proven
to be secure
o Cyber maintain: maintenance system in
ship that has remote access to onboard ship
operational data has proven to be secure
o Cyber perform: optimization system in
ship that has remote access to onboard ship
operational data has proven to be secure
o Cyber secure: remote access in ship has
proven to be secure
Cyber Assessment
This notation is further divided into 6
categories as follows:
o AL 0: no cyber access, no assessment is
needed
o AL 1: manual cyber access, no assessment
is needed
o AL 2: cyber access is used only for
autonomous/remote monitoring
o AL 3: cyber access is used for
autonomous/remote monitoring and
control (onboard permission required)
o AL 4: cyber access is used for
autonomous/remote monitoring and
control where onboard permission is
required and onboard override is possible
o AL 5: cyber access is used for
autonomous/remote monitoring and
control where onboard permission is not
required and onboard override is not
possible