BS EN IEC 63154:2021
$198.66
Maritime navigation and radiocommunication equipment and systems. Cybersecurity. General requirements, methods of testing and required test results
Published By | Publication Date | Number of Pages |
BSI | 2021 | 68 |
IEC 63154:2021 specifies requirements, methods of testing and required test results where standards are needed to provide a basic level of protection against cyber incidents (i.e. malicious attempts, which actually or potentially result in adverse consequences to equipment, their networks or the information that they process, store or transmit) for: a) shipborne radio equipment forming part of the global maritime distress and safety system (GMDSS) mentioned in the International Convention for Safety of Life at Sea (SOLAS) as amended, and by the Torremolinos International Convention for the Safety of Fishing Vessels as amended, and to other shipborne radio equipment, where appropriate; b) shipborne navigational equipment mentioned in the International Convention for Safety of Life at Sea (SOLAS) as amended, and by the Torremolinos International Convention for the Safety of Fishing Vessels as amended, c) other shipborne navigational aids, and Aids to Navigation (AtoN), where appropriate.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications |
7 | English CONTENTS |
10 | FOREWORD |
12 | INTRODUCTION |
13 | Figure 1 – Some examples of data transfer |
14 | 1 Scope 2 Normative references |
15 | 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions |
18 | 3.2 Abbreviated terms |
19 | 4 Module A: Data files 4.1 General 4.2 Requirements 4.2.1 Transport integrity 4.2.2 Source authentication |
20 | 4.3 Methods of testing and required test results |
21 | 5 Module B: Execution of executables 5.1 General 5.2 Requirements |
22 | 5.3 Methods of testing and required test results 6 Module C: User authentication 6.1 General 6.2 Requirements |
24 | 6.3 Methods of testing and required test results |
25 | 7 Module D: System defence 7.1 General 7.2 Malware protection 7.2.1 Requirements |
28 | 7.2.2 Methods of testing and required test results |
30 | 7.3 Denial of service protection 7.3.1 Requirements |
32 | 7.3.2 Methods of testing and required test results |
34 | 8 Module E: Network access 8.1 General 8.2 Equipment which connects to a network 8.2.1 Requirements 8.2.2 Methods of testing and required test results |
35 | 8.3 Equipment providing network access between controlled networks 8.3.1 Requirements 8.3.2 Methods of testing and required test results |
36 | 8.4 Equipment providing network access between controlled and uncontrolled networks 8.4.1 Requirements 8.4.2 Methods of testing and required test results |
37 | 9 Module F: Access to operating system 9.1 General 9.2 Requirements 9.3 Methods of testing and required test results 10 Module G: Booting environment 10.1 General 10.2 Requirements |
38 | 10.3 Methods of testing and required test results 11 Module H: Maintenance mode 11.1 General 11.2 Requirements |
39 | 11.3 Methods of testing and required test results |
40 | 12 Module I: Protection against unintentional crash caused by user input 12.1 General 12.2 Requirements |
41 | 12.3 Methods of testing and required test results 13 Module J: Interfaces for removable devices including USB 13.1 General 13.2 Requirements 13.2.1 Physical protection |
42 | 13.2.2 Operational protection 13.3 Methods of testing and required test results 13.3.1 Physical protection 13.3.2 Operational protection |
43 | 14 Module K: IEC 61162-1 or IEC 61162-2 as interface 15 Module L: IEC 61162-450 as interface 15.1 General 15.2 IEC 61162-1 sentences 15.3 IEC 61162-450 used for file transfer |
44 | 16 Module M: Other interfaces 17 Module N: Software maintenance 17.1 General |
45 | 17.2 Software maintenance in maintenance mode 17.2.1 Requirements 17.2.2 Methods of testing and required test results 17.3 Semi-automatic software maintenance by the crew onboard the vessel 17.3.1 General 17.3.2 Requirements |
46 | 17.3.3 Methods of testing and required test results |
47 | 18 Module O: Remote maintenance 18.1 General 18.2 Requirements 18.3 Methods of testing and required test results |
48 | 19 Module P: Documentation 19.1 Requirements 19.2 Methods of testing and required test results |
49 | Annex A (informative)Guidance on implementing virus and malwareprotection on type approved equipment |
51 | Annex B (normative)File authentication B.1 General B.2 Digital signatures B.2.1 Requirements |
52 | B.2.2 Methods of testing and required test results |
53 | B.3 Symmetric means based upon pre-shared secret keys B.3.1 Requirements |
54 | B.3.2 Methods of testing and required test results |
56 | Annex C (informative)Methods of authentication of data files and executables – Examples C.1 General C.2 Explanations of terms C.3 Asymmetric cryptography |
57 | C.4 Digital signatures |
58 | C.5 Public key infrastructure C.5.1 General theory |
60 | C.5.2 Notes about shipboard use C.6 Symmetric key authentication based on “pre-shared secret key” |
62 | Annex D (normative)USB class codes Table D.1 – USB class codes |
63 | Annex E (informative)Cyber security configuration document for equipment E.1 General for the document E.2 Document parts E.2.1 Hardening of the operating system E.2.2 Update strategy for cyber security reasons E.2.3 Strategies for detecting and reacting to future vulnerabilities |
64 | Annex F (informative)Guidance on interconnection between networks F.1 General F.2 Guidance |
65 | Figure F.1 – Examples for different types of network andassociated interconnecting devices |
66 | Bibliography |