Css
Css
Css
The purpose of this document is to provide direction to those within the SDA
responsible for Safety outputs and their obligations regarding management of cyber
risks which may affect safety risk assessments or safety risks that may affect
cyber risk assessments in accordance with:
• JSP815 Defence Safety Management System [1]:
• Element 4 Risk Assessments and Safety Cases;
• Element 7: Equipment Design, Manufacture and Maintenance;
• E7.5 The Defence organisation has mechanisms in place to ensure physical
changes to equipment, (including major software changes), materials and associated
specifications are evaluated, risk assessed, approved, and documented.
• Element 8: Infrastructure Design, Build and Maintenance.
• Defence Maritime Regulations DSA02-DMR Regulations [2]:
• Regulation 302 - Safety and Environmental Management System(s). Accountable
Persons shall develop and maintain a proportionate SEMS for their area of
responsibility and operate in accordance with it.
• Regulation 304 - Safety and/or Environmental Case(s). Accountable Persons
shall develop and maintain Safety and/or Environmental Cases to demonstrate that
platforms, products, and activities (including software safety and cyber security)
meet and maintain Safety and Environmental Protection requirements.
• Regulation 208 - Platform Authorities. PA should provide assurance that, for
each ship within their Area of Responsibility (AoR) safety assessments of software
integrity and cyber security risk are conducted.
• Defence Maritime Regulator (DMR) 03/2020 Notice - Defence Maritime Cyber Risk
Management [3], now incorporated fully into DSA02-DMR Regulations 208 and 304.
Provides guidance on good practice and provides an excellent baseline for Cyber
Risk Management, although written for merchant fleet and commercial shipping
companies:
• Department for Transport Cyber Security Code of Practice for Ships July 2023
[4]
• Baltic and International Maritime Council (BIMCO et al) The Guidelines on
Cyber Security Onboard Ships [5].
• JSP440 – The Defence Manual of Security [6], which details policies and
management requirements with regards to both physical and digital security within
MOD operations.
• JSP 628 – Security Regulation of the Defence Nuclear Enterprise. This
publication sets out the regulatory expectations for security delivery and
assurance with regards to the Defence Nuclear Enterprise (DNE), inclusive of all
MOD-owned Accountable Nuclear Material, Defence Nuclear Information and Defence
Nuclear Assets.
• “Without security features on the software controlled systems, the vessel and
personnel are at risk of intentional malicious changes which could cause loss of
safety related functions or unexpected and potentially dangerous behaviours
resulting in loss of vessel and personnel.”
1.1 Update
This Process is an update and combining of the following previous documents:
• SDA Cyber Security Related SEMS Policy, Version 0.9, January 2021.[7]
• SDA Cyber Security and Safety Risk Alignment Guidance, Version 0.3, February
2024,Version 0.3. [8]
• SDA Cyber Security Related SEMS Policy – Approach To Compliance Case. [9]
2 Scope
This process describes the mandated arrangements for assessing Safety outputs and
their obligations regarding management of cyber risks which may affect safety risk
assessments or safety risks that may affect cyber risk assessments.
3 Document Classification
This document is to be reviewed, authorised, controlled, and retained in accordance
with CD- SEMS- Level 4.0.1 HSEP Document Management [10] and has been categorised
as Significance Level (SL) 2.
4 Applicability
This Safety Cyber Security Process is applicable to all SDA Teams which are
regulated by the Defence Maritime Regulator defined in DSA02-DMR. This process
applies to equipment or installation safety and where they may affect the overall
Submarine platform safety or the associated equipment safety.
This process is for Project Teams (PTs) and Delivery Teams (DTs) in all stages of
the Acquisition cycle.
Mitigation Actions that organisations and individuals can take to minimise and
address risks.
Reduce the Impact in accordance with the SubCap Directive. Security Risk Delegation
and Referral.[17]
An activity or measure that is expected to reduce the impact of a risk event should
it occur. [16]
Some identified causes that directly affect both security and safety risks are
identified below and could be used as a cross check with PTs on the completeness of
their Safety and Security assessments. This list is not exhaustive.
5.5.1 Insider Threat:
• Sabotage – deliberate introduction of ransomware, malware into systems or
destruction of critical components which impact on the mission and could cause loss
of life / submarine.
• Accidental introduction of ransomware, malware through poor maintenance
practices submarine through loss of critical information which may impact on the OT
so that it cannot operate safely.
5.5.2 Supply Chain Security :
• Attacks on suppliers and vulnerabilities built into the supply chain
components which can later be exploited may affect the overall function of the
submarine. The submarine may use a piece of OT hardware that only the supplier can
maintain and update or the supplier may have built in an unknown remote access
route. This introduces several risks:
The OT hardware breaks whilst at sea and cannot be fixed meaning the
submarine is stranded for several days.
The supplier network is breached, and the attacker uses the remote access
route to shut down the operation of the OT hardware making the submarine unable to
operate safely.
The supplier goes out of business leaving the organisation operating the OT
hardware with no updates or maintenance which makes it vulnerable to attack or
unable to operate until new hardware / software is installed.
5.5.3 Technical and Electronic attack:
• TEMPEST attack using equipment to pick up side-band electromagnetic
transmissions from electronic devices to recover data about what the device is
doing based on things such as the unintentional transmissions that most electronic
devices will emit when in use.
• Poor software, firmware or hardware maintenance practices lead to risks that
unpatched vulnerabilities in OT and IT may be used by an attacker to compromise the
safe operation of the submarine.
• Phishing: fake servers / websites set up to trick individuals to enter their
credentials into a website that looks like the real thing.
5.5.4 Network attack:
• Shoreside port infrastructure attacks using social engineering with a browser
credential stealer to gather credentials for accessing more sensitive systems and
networks.
5.5.5 Unauthorised access to equipment / systems.
• Unauthorised personnel gain access to the submarine and compromise the system
/ equipment by attaching a laptop to download malware or physically destroy /
damage the components.
5.6 Secure by Design
Secure by Design (SbD) is a principle in that emphasises the importance of
integrating security flaws and best practise throughout the acquisition lifecycle.
Instead of treating securities as an afterthought or something that can be added
once a system is fully operational, secure by design focuses on bedding security
from the very beginning of the design phase the goal is to reduce vulnerabilities
ensure that system resilient against potential threats or attacks from the outset.
a. All new programmes have been subject to SbD from 28 Jul 23.
b. All programmes in Concept phase should have transitioned to Secure by Design
by 31 Dec 23.
c. Programmes that are in the Assessment, Demonstrate or Manufacture phases
shall transition to SbD before 31 Jul 24.
d. In-Service capabilities whose accreditation expires before 31 Jul 24 can re-
accredited for a maximum of 12 months and transition to SbD when their
accreditation subsequently expires.
e. In-Service capabilities whose accreditation expires after 31 Jul 24 should
plan to transition to SbD as soon as possible. Planning should consider that
necessary work to transition will take time and therefore must be started before
accreditation expiry.
6 Roles and Responsibilities
6.1 Roles and Responsibilities
Roles and Responsibilities within a delivery team, with regards to risk which have
an implication upon both Safety and Security, can vary on a project basis. JSP440
Leaflet 5C [19] defines the following Security roles with their respective
responsibilities in accordance with SbD principles.
In the Submarine cyber environment, the risk owner is either the Defence Nuclear
Organisation (DNO) or the Navy Command Senior Responsible Owners (SRO) [19] and the
relevant equipment or safety case owners are responsible for the risk mitigation
controls put in place.
The potential safety impacts resulting from cyber risk need to be understood and
managed. Cyber risk may affect a cause, control hazard or accident so both the
safety and security teams must liaise to ensure that the effect of potential cyber
risks on the safety of the submarine are captured within the system risk register.
Roles and responsibilities on a project must be defined and documented. Safety
teams should document this within a RACI (Responsible, Accountable, Consulted,
Informed) chart within the project SEMS. Security teams should document this within
the project Security Case.
Documented post holders remain accountable but may delegate responsibility for risk
toleration within their organisation, however the risk should be owned at the
appropriate level in accordance with JSP 892 Risk Management. [20]
6.2 Cross Team Collaboration
Security and Safety teams need to collaborate, throughout the acquisition
lifecycle, to enable Security risks affecting Safety and Safety risk affecting
Security to be fully included in the Security and Safety Analysis and maintain
alignment throughout the process.
PTs/ DTs need to identify early in a project lifecycle where the touchpoints are
between cybersecurity and safety are where information must be exchanged, and
activities should be performed, and co-assurance achieved. These touchpoints
between the 2 domains and risk assessments to ensure that the necessary and
relevant collaboration occurs and should be outlined in the Project Management Plan
and Stakeholder Matrix. These should be inclusive of, but not limited to, all areas
of the Defence Lines of Development (DLoDs); Training, Equipment, People,
Infrastructure, Doctrine, Organisation, Information and Logistics.
Although PTs/DTs should hold their own Safety and Security risk registers, as shown
in Section 6.3 they should document their risks where there is overlap and knock on
effects and dependencies upon one another.
PTs own, track, and manage their own risks with the Senior Responsible Owner (SRO)
taking ownership of the associated project Cyber Security, as the Accountable
Person (AP) does for the Safety risks.
6.2.1 Safety and Security Interaction
A risk which is deemed to adversely affect the integrity and availability of a
Platform, should be considered as both a Security and a Safety Risk.
The Security team is to assess the platforms Programmable Elements (PE) for viable
attack paths and introduce Cyber Controls and to liaise with Safety team to assess
the impact to overall Platform Safety. The Safety team seeking to reduce those
risks to ALARP and report residual risk to the Platform Authority (PA).
Conversely Safety Analysis may identify new mitigations to reduce Safety risk which
may introduce a new vulnerability and will subsequently need to be assessed by the
Cyber Team.
These 2 risks could produce a conflict in how to mitigate either the Safety or
Cyber Risk.
6.3 Risk Registers/ Hazard Logs
Cyber Security and Safety risk registers may be held at different classifications.
As such risk classifications must be considered when transposing them between
registers, ensuring risks are carried or referenced in the correct documentation as
per their respective classification. Teams are to be cognisant; they can reference
a Security Risk in their register using unique identification numbers without a
need to raise the classification of the document to that of the associated risk.
It is still important that enough information is contained within the respect risk
registers such that it is meaningful but without making them unusable. It may be
necessary to include a cross reference between the two sets of documentation.
6.4 Safety and Security Representation in Committees
To ensure there is appropriate liaison between both cybersecurity and safety it is
recommended that security representation is made part of the appropriate safety
committees / working groups and vice versa. This will ensure that the relationship
between the two domains remains.
6.5 Security Defined Roles and Responsibilities
The SRO is accountable for making IA decisions however, PTs should have at least
one delegated individual who is responsible for making Information Assurance (IA)
decisions as shown in Table 1. When identified risks also have an impact upon
Safety there must be engagement with the PA in accordance with DSA02-DMR Regulation
208.
Role Responsibility
Capability Sponsors Hold responsibility for the sponsorship of the capability,
its requirement development, concept of operation and ensuring the capability can
address the risks in-service.
Senior Responsible Owners (SROs) Accountable for the delivery of cyber secure
outcomes throughout the capability lifecycle, must ensure that appropriate and
effective governance and procedures are in place within their areas of
responsibility to implement cyber security controls from the outset of programmes
as a critical development and identify, record, and manage cyber risks throughout
the whole lifecycle of the system.
Likely also to be the Senior Accountable Person in accordance with DSA02-DMR.
Project/ Delivery Team Leaders Responsible for the development and delivery of
secure capabilities that support Defence Outcomes throughout the capability’s
lifecycle.
Capability Owners In-service owners of the capability and are responsible for
operating the capability to support Defence Outcomes.
Commercial Officers Responsible for the implementation of contract terms and
conditions in the MOD that ensure that security is enforced throughout the
capability’s lifecycle
Project/ Delivery Team Security Leads Individuals within the Delivery Team
responsible for advising Delivery Team Leaders on security and risk management.
Cyber Security Assessors Responsible for independent assessment of PT’s
adherence to SbD and relevant risk and security policies and standards. They
coordinate between PTs dealing with similar security challenges to optimise
solutions and minimise duplication of effort. They are responsible for consistent,
coherent advice and support to relevant capabilities
Table 2 SbD Defined Roles and Responsibilities
6.6 Safety Roles and Responsibilities
Safety Roles are defined within DSA02-DMR and throughout the individual projects
Safety Baseline in accordance with CD SEMS 3.0.03 HSEP - Organisational Baseline
Process [21] and safety roles defined in CD SEMS 3.1.03 Safety - SQEP Process [22].
The safety roles are shown in Table 2.
Role Responsibility
Senior Accountable Person DSA02- DMR Regulation 203- The Senior Accountable
Person in each organisation shall have ultimate accountability for safety and
environmental protection of their organisation’s Defence Maritime Activities, and
compliance with the Defence Maritime Regulations.
Likely to be the SRO as defined in JSP440 Leaflet 5C [19].
Accountable Person DSA02- DMR Regulation 204- The Accountable Person shall
assure the Senior Accountable Person that the Health, Safety and Environmental
Management System(s) for Defence Maritime Activities are fit for purpose.
Platform Authorities DSA02- DMR Regulation 208- Accountable Persons shall have
Platform Authorities, or equivalents, responsible to them for ensuring all Ships
within their Area of Responsibility are safe to operate by providing safety and
environmental protection assurance of the design, system and equipment integration,
and through-life support.
Executive Safety Responsible (ESR) Corporate responsibility for material safety of
submarines / systems /equipment.
Ensures safety is funded, carried out by competent people and assured in accordance
with CD SEMS 3.1.03 Safety - SQEP Process [22]
There are a plethora of standards for the Supply Chain (Defence Standards) to
follow in Safety and Cyber Security which form a patchwork of semi-applicable
standards. Unfortunately, none of the standards are wholly applicable to the
Submarine Safety and Cyber Domain.
Standard Description with Respect to Safety and Cyber Risks
Defence Def-Stan 00-056 Def-Stan 00 -056 [29] has limited guidance for how
to consider cyber security for safety. The principal requirements require a
contractor to ensure cyber security is considered where security breaches may be a
contributory cause of a hazard and of a failure mode respectively.
Defence
Def-Stan 05-138
Provides requirements and guidance for the levels of cyber protection required to
be achieved by Defence Suppliers. It should be noted that Def Stan 05-138 [30] is
a key component of the demonstration of cyber security but it is focussed on
Information Technology (IT) whereas most SDA systems are Operational Technology
(OT).
Defence
Def-Stan 00-055
The requirements and guidance for the achievement, assurance, and management of
safety of Programmable Elements (PE) within Products, Services and Systems (PSS).
It also encourages the use of open, civil standards where possible.
Open
IEC 61508
However, it explicitly warns that the PE open standards including International
Electrotechnical Commission (IEC) 61508, referred to in Def-Stan 00-055, do not
meet the full military requirements including for cyber security – indeed, IEC61508
specifically states that it does not cover cyber security aspects.
Open IEC 62443 Therefore, suitable alternative guidance and open standards
should be considered to ensure full compliance with Def-Stan 00-056. IEC 61508,
however does further refer to IEC 62443 which requires systems to be “secure by
design”. The cyber security principles advocated by the NCSC Advice & Guidance
webpage should be a reference point for “secure by design”.
Open RTCA DO-326A Aerospace Recommended Practice (ARP) 4754A, ARP 4761, DO-178C,
and DO-254 Additional open standards could be pertinent to both Astute Build,
Dreadnought and SSNR.
From this assessment one could deduce that following Safety Standard DefStan 00-56,
which references 00-55 and open standards IEC61508 and IEC 62443 Cyber Security
Standard requires systems to be “Secure by Design”, therefore following a Cyber
Security Standard requiring Secure by Design with relevant linking between the
styles of 2 assessment.