Homeland Security UNCLASSIFIED Coast Guard Cyber Strategy Awareness Training
Background and Purpose __________________________________________________ Protecting maritime critical infrastructure is one of the three primary goals contained in the CG’s cyber strategy. Maritime Critical Infrastructure includes: -Vessels -Facilities -Port Complexes -Intermodel Conenctions -Bridges Most Importantly it includes those people who operate these systems.
3 -In general cyber is simply an additional threat vector that must be taken into account when executing existing responsibilities. -As with other technological, personnel, or material failures the Coast Guard IS NOT responsible for repairing or remediating cyber incidents that occur to commercial vessels or facilities. -The Coast Guard will respond to immediate impacts of such events(i.e SAR, collisions, groundings ect) What this means for the Operator
What operators can do Operators are encouraged to cooperate with the NST cyber security framework. - This useful tool and others can be found at Homeport. Be proactive in evaluating, indentifying and mitigating cyber vulnerabilities. A list of DHS approved tools and resources to address vulnerabilities is available on Homeport.
What operators can do CON’T While a cyber incident can be isolated event, there is potential for a cyber event to cause be a contributing factor towards a TSI. If a cyber incident occurs you can contact The Coast Guard Cyber Security Operations Center(CSOC), CG Cyber’s hub can be reached at (866) Cyber is not just a security issue, it is part of an overall risk management issue.
WHAT IS THE NEXT STEP? 6 CGHQ is currently drafting an update to ALCOAST 122/14. Updates will come once complete.
HAVE A CYBER RELATED INCIDENT OR SUSPECT ONE? Industry notify NRC (MTSA regulated vsl/fac reporting falls within provisions of 33CFR ) CG’s focus is on responding to the consequences of a cyber incident (MTS disruption, grounding, pollution, etc…) and on MTS recovery. Criminal investigation into the cyber causal events lies with FBI, ICS/US CERT and other agencies. CGIS may also have a role depending on the incident. 7