TÜV Rheinland Blog - Insights from Asia and Africa

Case Study: Cybersecurity Management System for Ships (CSMS)

Posted by TUV Rheinland on Jul 11, 2019 12:00:00 PM
TUV Rheinland

80132779_l

The past decade or so has seen an exponential rise in Industrial Control System and Operational Technology (OT) vulnerabilities around the globe. The top 5 industries that have seen their operations affected are manufacturing, power & utilities, transportation, telecommunications, and oil & gas.

These vulnerabilities have risen due to the adoption of digitization and inter-connectivity, as industries seek to continually optimize their processes and remain cost-efficient.

Our client is a ship classification society that holds over 23% of market share. It has actively engaged with a growing range of ship-related activities and services aimed at contributing/promoting the protection of human life and property at sea, as well as the marine environment at large.

Client Situation

With our client supporting the transformation of the maritime industry in addressing its cybersecurity/OT needs, it has taken on the responsibility of developing the Cybersecurity Management Systems for Ships (CSMS) guidelines per International Maritime Organization (IMO) requirements.

It needed assistance in the review of said guidelines and in developing a cybersecurity assessment plan to perform onboard vessel assessments for cybersecurity risks. One of the subjects of this cybersecurity assessment is a large shipping company, which is one of the oldest and largest shipping companies in the world.

With the guidelines and the assessment plan in mind, TÜV Rheinland developed a 2-phase approach to perform the cybersecurity assessment onboard vessels of different classes.

How TÜV Rheinland added value + plus points

Based on the framework developed for CSMS guidelines, we can help perform cybersecurity assessments for ship operators, ship owners, and ship builders. TÜV Rheinland will continue to collaborate with them in the future. 

*Anonymity of client is intentional

For more information, or to contact one of our experts, click below:

Contact us now

Topics: OT Security