Maritime Cyber Security :recovery plan
Of course. A Maritime Cyber Security Recovery Plan is a critical component of a vessel’s or company’s Safety Management System (SMS), as mandated by the IMO 2021 (MSC.428(98)) regulations. It’s not just about restoring IT systems; it’s about ensuring the safety of the crew, vessel, cargo, and the environment after a cyber incident.
Here is a comprehensive framework for developing a Maritime Cyber Security Recovery Plan, broken down into key components, specific scenarios, and best practices.
Maritime Cyber Security Recovery Plan: A Framework
This plan outlines the procedures to recover from a cyber incident, restore critical systems, and return to normal operations in a safe and timely manner.
1. Core Principles
- Safety First: The safety of life at sea, the vessel, and the marine environment is the absolute priority. All recovery actions must be evaluated against this principle.
- OT before IT: Operational Technology (OT) systems (e.g., propulsion, navigation, steering) take precedence over Information Technology (IT) systems (e.g., crew email, business networks).
- Resilience over Restoration: The primary goal is to maintain essential functions, even if in a degraded or manual mode. Full restoration is a secondary goal.
- Clear Chain of Command: A clear command structure, both onboard and ashore, is essential to prevent confusion during a crisis.
Key Components of the Recovery Plan
A robust plan should be a formal, controlled document and include the following sections.
Section A: Introduction & Scope
- Purpose: State the plan’s objective: to guide recovery efforts following a cyber incident.
- Scope: Define which vessels, systems, and shore-side facilities this plan covers. Specify if it applies to IT, OT, or both.
- Activation Criteria: Clearly define what constitutes a “cyber incident” that triggers this plan (e.g., ransomware on a critical system, loss of GPS signal, unresponsive engine controls).
Section B: Roles and Responsibilities (The Cyber Recovery Team)
This is the most critical section. Everyone must know their role.
| Role | Onboard/Ashore | Key Responsibilities |
|---|---|---|
| Ship Master | Onboard | Overall commander of the incident response on the vessel. Makes final decisions regarding safety and manual operations. |
| Chief Engineer | Onboard | Leads recovery efforts for all OT systems (propulsion, power management, ballast, etc.). |
| Navigational Officer | Onboard | Leads recovery for navigation systems (ECDIS, GPS, Radar). Responsible for initiating manual/alternative navigation. |
| Company Security Officer (CSO) | Ashore | Overall coordinator of the recovery effort, liaising between the vessel, management, and external parties. |
| IT/OT Superintendent | Ashore | The technical lead for the recovery. Guides onboard crew, coordinates with vendors, and manages backup restoration. |
| Communications Lead | Ashore | Manages all external communications (Flag State, Port State, insurers, charterers, media). |
Section C: Recovery Phases (The Action Plan)
This is the step-by-step process to follow once the plan is activated.
Phase 1: Initial Assessment & Damage Control
- Isolate: Immediately disconnect the affected system(s) from the network to prevent the incident from spreading. This could mean physically unplugging network cables from critical equipment.
- Assess Impact: Determine which systems are affected. The Master and Chief Engineer conduct a rapid assessment of OT systems.
- Activate Manual Overrides: If automated controls are compromised, immediately switch to manual or emergency backup controls (e.g., manual steering, local engine control).
- Report: The Master reports the incident to the CSO ashore using a reliable, out-of-band communication method (e.g., Satphone).
Phase 2: System Triage & Prioritization Not all systems are equal. Recovery must be prioritized.
- Tier 1 (Mission Critical): Systems essential for safety and propulsion.
- Navigation (GPS, ECDIS, Gyro)
- Steering & Propulsion Control
- Power Management & Generation
- Onboard Safety & Alarm Systems
- Tier 2 (Operation Critical): Systems for efficient operation.
- Cargo Management (pumps, cranes, monitoring)
- Ballast Water Systems
- GMDSS (Global Maritime Distress and Safety System)
- Tier 3 (Business Support): Systems for administrative tasks.
- Crew Welfare Networks (Wi-Fi)
- Vessel Business LAN
- Administrative Software
Phase 3: Restoration & Recovery
- Use the Recovery Kit: Access the pre-prepared “Cyber Recovery Kit,” which should contain:
- Clean, tested backups of system software and configurations on isolated storage (e.g., encrypted USBs, DVDs).
- System installation media and license keys.
- Network diagrams and system manuals (in print!).
- Contact lists for vendors and support.
- Wipe & Rebuild (if necessary): For compromised systems, the safest method is often to wipe the system completely and reinstall from a known-good, “golden” image or backup.
- Restore from Backup: Restore data from the most recent, clean backup. Adhere to the pre-defined Recovery Point Objective (RPO)—the maximum acceptable amount of data loss.
- Patch & Harden: Before reconnecting the system to any network, ensure all available security patches are applied.
Phase 4: Verification & Monitoring
- Test in Isolation: Test the restored system thoroughly while it is still isolated from the network.
- Supervised Reconnection: Reconnect the system to the network under close supervision. Monitor for any signs of reinfection or abnormal behavior.
- Full Functional Test: The crew performs a full functional test to confirm the system is operating per specifications. For example, testing the ECDIS by plotting a test route.
Phase 5: Post-Incident Activities
- Declare “All Clear”: The Master and CSO formally declare the recovery complete and the vessel returned to normal operations.
- Forensic Analysis: Preserve evidence (infected drives, log files) for later forensic analysis to understand the attack’s root cause.
- Lessons Learned: Conduct a debriefing session with all involved parties. Update the recovery plan based on what worked and what didn’t.
- Formal Reporting: Submit required reports to Flag State, insurers, and other relevant authorities.
Scenario-Specific Recovery Strategies
Scenario 1: Ransomware on the Cargo Management System
- Impact: Inability to monitor or control cargo pumps, valves, or tank levels. High commercial and environmental risk.
- Recovery Steps:
- Isolate: Immediately disconnect the cargo computer from the network.
- Manual Ops: Switch all cargo operations to local, manual control at the pump/valve stations.
- Do Not Pay: Follow company policy, which should be to never pay the ransom.
- Restore: Use the ashore IT/OT team to guide the crew. Wipe the affected machine and restore the operating system and software from the Cyber Recovery Kit. Restore cargo data from the last known-good backup.
- Verify: Before resuming automated operations, run a full diagnostic and test all sensors and actuators.
Scenario 2: GPS/GNSS Spoofing or Jamming
- Impact: Loss of position fixing, erroneous vessel position on ECDIS, potential for collision or grounding.
- Recovery Steps:
- Alert: The Bridge team immediately alerts the Master.
- Verify: Cross-reference position with other means: Radar overlay on charts, visual bearings, celestial navigation (if trained).
- Manual Plotting: Revert to plotting the vessel’s position on paper charts.
- Communicate: Inform VTS (Vessel Traffic Services) and nearby ships of the navigation difficulty.
- Isolate: If spoofing is suspected, disconnect the GPS antenna from the network to prevent the false signal from propagating to other systems (e.g., AIS, GMDSS).
Scenario 3: Malware in the Engine Control System (OT)
- Impact: The most dangerous scenario. Loss of propulsion control, erratic engine behavior, potential for catastrophic failure.
- Recovery Steps:
- Emergency Stop/Control: Immediately transfer control to the Emergency Telegraph or Local Control Station in the engine room. This decouples the bridge controls from the engine.
- Isolate: Power down and physically disconnect the affected control consoles and PLCs from the network.
- DO NOT ATTEMPT IT FIXES: The engineering crew should not attempt to “clean” the system with standard antivirus. This is a specialist OT task.
- Contact Vendor: The ashore team must contact the engine manufacturer/automation vendor for emergency support. Their technicians will have the proprietary tools and knowledge to safely restore the system.
- Restore: The vendor will likely have to perform a low-level format and reinstall the proprietary firmware from a clean source.
Best Practices for a Successful Plan
- Test, Test, Test: A plan that hasn’t been tested is a plan that will fail. Conduct regular drills and tabletop exercises, both onboard and with the shore team.
- Keep it Simple: The plan should be clear, concise, and easy to follow by a crew under immense stress. Use checklists and flowcharts.
- Make it Accessible: Keep printed copies in secure, accessible locations (Bridge, Engine Control Room, Company Office). Digital copies may be inaccessible during an incident.
- Integrate with SMS: The Cyber Recovery Plan must be a living document, fully integrated with the ship’s existing Safety Management System and emergency procedures.
- Maintain Your Backups: Backups are the cornerstone of recovery. Test them regularly to ensure they can be restored successfully. Follow the 3-2-1 rule: 3 copies of your data, on 2 different media, with 1 copy off-site (or off-system).