Shopping Cart

No products in the cart.

BS EN IEC 63154:2021

$198.66

Maritime navigation and radiocommunication equipment and systems. Cybersecurity. General requirements, methods of testing and required test results

Published By Publication Date Number of Pages
BSI 2021 68
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 63154:2021 specifies requirements, methods of testing and required test results where standards are needed to provide a basic level of protection against cyber incidents (i.e. malicious attempts, which actually or potentially result in adverse consequences to equipment, their networks or the information that they process, store or transmit) for: a) shipborne radio equipment forming part of the global maritime distress and safety system (GMDSS) mentioned in the International Convention for Safety of Life at Sea (SOLAS) as amended, and by the Torremolinos International Convention for the Safety of Fishing Vessels as amended, and to other shipborne radio equipment, where appropriate; b) shipborne navigational equipment mentioned in the International Convention for Safety of Life at Sea (SOLAS) as amended, and by the Torremolinos International Convention for the Safety of Fishing Vessels as amended, c) other shipborne navigational aids, and Aids to Navigation (AtoN), where appropriate.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 English
CONTENTS
10 FOREWORD
12 INTRODUCTION
13 Figure 1 – Some examples of data transfer
14 1 Scope
2 Normative references
15 3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
18 3.2 Abbreviated terms
19 4 Module A: Data files
4.1 General
4.2 Requirements
4.2.1 Transport integrity
4.2.2 Source authentication
20 4.3 Methods of testing and required test results
21 5 Module B: Execution of executables
5.1 General
5.2 Requirements
22 5.3 Methods of testing and required test results
6 Module C: User authentication
6.1 General
6.2 Requirements
24 6.3 Methods of testing and required test results
25 7 Module D: System defence
7.1 General
7.2 Malware protection
7.2.1 Requirements
28 7.2.2 Methods of testing and required test results
30 7.3 Denial of service protection
7.3.1 Requirements
32 7.3.2 Methods of testing and required test results
34 8 Module E: Network access
8.1 General
8.2 Equipment which connects to a network
8.2.1 Requirements
8.2.2 Methods of testing and required test results
35 8.3 Equipment providing network access between controlled networks
8.3.1 Requirements
8.3.2 Methods of testing and required test results
36 8.4 Equipment providing network access between controlled and uncontrolled networks
8.4.1 Requirements
8.4.2 Methods of testing and required test results
37 9 Module F: Access to operating system
9.1 General
9.2 Requirements
9.3 Methods of testing and required test results
10 Module G: Booting environment
10.1 General
10.2 Requirements
38 10.3 Methods of testing and required test results
11 Module H: Maintenance mode
11.1 General
11.2 Requirements
39 11.3 Methods of testing and required test results
40 12 Module I: Protection against unintentional crash caused by user input
12.1 General
12.2 Requirements
41 12.3 Methods of testing and required test results
13 Module J: Interfaces for removable devices including USB
13.1 General
13.2 Requirements
13.2.1 Physical protection
42 13.2.2 Operational protection
13.3 Methods of testing and required test results
13.3.1 Physical protection
13.3.2 Operational protection
43 14 Module K: IEC 61162-1 or IEC 61162-2 as interface
15 Module L: IEC 61162-450 as interface
15.1 General
15.2 IEC 61162-1 sentences
15.3 IEC 61162-450 used for file transfer
44 16 Module M: Other interfaces
17 Module N: Software maintenance
17.1 General
45 17.2 Software maintenance in maintenance mode
17.2.1 Requirements
17.2.2 Methods of testing and required test results
17.3 Semi-automatic software maintenance by the crew onboard the vessel
17.3.1 General
17.3.2 Requirements
46 17.3.3 Methods of testing and required test results
47 18 Module O: Remote maintenance
18.1 General
18.2 Requirements
18.3 Methods of testing and required test results
48 19 Module P: Documentation
19.1 Requirements
19.2 Methods of testing and required test results
49 Annex A (informative)Guidance on implementing virus and malwareprotection on type approved equipment
51 Annex B (normative)File authentication
B.1 General
B.2 Digital signatures
B.2.1 Requirements
52 B.2.2 Methods of testing and required test results
53 B.3 Symmetric means based upon pre-shared secret keys
B.3.1 Requirements
54 B.3.2 Methods of testing and required test results
56 Annex C (informative)Methods of authentication of data files and executables – Examples
C.1 General
C.2 Explanations of terms
C.3 Asymmetric cryptography
57 C.4 Digital signatures
58 C.5 Public key infrastructure
C.5.1 General theory
60 C.5.2 Notes about shipboard use
C.6 Symmetric key authentication based on “pre-shared secret key”
62 Annex D (normative)USB class codes
Table D.1 – USB class codes
63 Annex E (informative)Cyber security configuration document for equipment
E.1 General for the document
E.2 Document parts
E.2.1 Hardening of the operating system
E.2.2 Update strategy for cyber security reasons
E.2.3 Strategies for detecting and reacting to future vulnerabilities
64 Annex F (informative)Guidance on interconnection between networks
F.1 General
F.2 Guidance
65 Figure F.1 – Examples for different types of network andassociated interconnecting devices
66 Bibliography
BS EN IEC 63154:2021
$198.66