{"id":374616,"date":"2024-10-20T02:39:29","date_gmt":"2024-10-20T02:39:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-631542021\/"},"modified":"2024-10-26T04:37:53","modified_gmt":"2024-10-26T04:37:53","slug":"bs-en-iec-631542021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-631542021\/","title":{"rendered":"BS EN IEC 63154:2021"},"content":{"rendered":"

IEC 63154:2021 specifies requirements, methods of testing and required test results where standards are needed to provide a basic level of protection against cyber incidents (i.e. malicious attempts, which actually or potentially result in adverse consequences to equipment, their networks or the information that they process, store or transmit) for: a) shipborne radio equipment forming part of the global maritime distress and safety system (GMDSS) mentioned in the International Convention for Safety of Life at Sea (SOLAS) as amended, and by the Torremolinos International Convention for the Safety of Fishing Vessels as amended, and to other shipborne radio equipment, where appropriate; b) shipborne navigational equipment mentioned in the International Convention for Safety of Life at Sea (SOLAS) as amended, and by the Torremolinos International Convention for the Safety of Fishing Vessels as amended, c) other shipborne navigational aids, and Aids to Navigation (AtoN), where appropriate.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nAnnex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
10<\/td>\nFOREWORD <\/td>\n<\/tr>\n
12<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
13<\/td>\nFigure 1 \u2013 Some examples of data transfer <\/td>\n<\/tr>\n
14<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
15<\/td>\n3 Terms, definitions and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
18<\/td>\n3.2 Abbreviated terms <\/td>\n<\/tr>\n
19<\/td>\n4 Module A: Data files
4.1 General
4.2 Requirements
4.2.1 Transport integrity
4.2.2 Source authentication <\/td>\n<\/tr>\n
20<\/td>\n4.3 Methods of testing and required test results <\/td>\n<\/tr>\n
21<\/td>\n5 Module B: Execution of executables
5.1 General
5.2 Requirements <\/td>\n<\/tr>\n
22<\/td>\n5.3 Methods of testing and required test results
6 Module C: User authentication
6.1 General
6.2 Requirements <\/td>\n<\/tr>\n
24<\/td>\n6.3 Methods of testing and required test results <\/td>\n<\/tr>\n
25<\/td>\n7 Module D: System defence
7.1 General
7.2 Malware protection
7.2.1 Requirements <\/td>\n<\/tr>\n
28<\/td>\n7.2.2 Methods of testing and required test results <\/td>\n<\/tr>\n
30<\/td>\n7.3 Denial of service protection
7.3.1 Requirements <\/td>\n<\/tr>\n
32<\/td>\n7.3.2 Methods of testing and required test results <\/td>\n<\/tr>\n
34<\/td>\n8 Module E: Network access
8.1 General
8.2 Equipment which connects to a network
8.2.1 Requirements
8.2.2 Methods of testing and required test results <\/td>\n<\/tr>\n
35<\/td>\n8.3 Equipment providing network access between controlled networks
8.3.1 Requirements
8.3.2 Methods of testing and required test results <\/td>\n<\/tr>\n
36<\/td>\n8.4 Equipment providing network access between controlled and uncontrolled networks
8.4.1 Requirements
8.4.2 Methods of testing and required test results <\/td>\n<\/tr>\n
37<\/td>\n9 Module F: Access to operating system
9.1 General
9.2 Requirements
9.3 Methods of testing and required test results
10 Module G: Booting environment
10.1 General
10.2 Requirements <\/td>\n<\/tr>\n
38<\/td>\n10.3 Methods of testing and required test results
11 Module H: Maintenance mode
11.1 General
11.2 Requirements <\/td>\n<\/tr>\n
39<\/td>\n11.3 Methods of testing and required test results <\/td>\n<\/tr>\n
40<\/td>\n12 Module I: Protection against unintentional crash caused by user input
12.1 General
12.2 Requirements <\/td>\n<\/tr>\n
41<\/td>\n12.3 Methods of testing and required test results
13 Module J: Interfaces for removable devices including USB
13.1 General
13.2 Requirements
13.2.1 Physical protection <\/td>\n<\/tr>\n
42<\/td>\n13.2.2 Operational protection
13.3 Methods of testing and required test results
13.3.1 Physical protection
13.3.2 Operational protection <\/td>\n<\/tr>\n
43<\/td>\n14 Module K: IEC 61162-1 or IEC 61162-2 as interface
15 Module L: IEC 61162-450 as interface
15.1 General
15.2 IEC 61162-1 sentences
15.3 IEC 61162-450 used for file transfer <\/td>\n<\/tr>\n
44<\/td>\n16 Module M: Other interfaces
17 Module N: Software maintenance
17.1 General <\/td>\n<\/tr>\n
45<\/td>\n17.2 Software maintenance in maintenance mode
17.2.1 Requirements
17.2.2 Methods of testing and required test results
17.3 Semi-automatic software maintenance by the crew onboard the vessel
17.3.1 General
17.3.2 Requirements <\/td>\n<\/tr>\n
46<\/td>\n17.3.3 Methods of testing and required test results <\/td>\n<\/tr>\n
47<\/td>\n18 Module O: Remote maintenance
18.1 General
18.2 Requirements
18.3 Methods of testing and required test results <\/td>\n<\/tr>\n
48<\/td>\n19 Module P: Documentation
19.1 Requirements
19.2 Methods of testing and required test results <\/td>\n<\/tr>\n
49<\/td>\nAnnex A (informative)Guidance on implementing virus and malwareprotection on type approved equipment <\/td>\n<\/tr>\n
51<\/td>\nAnnex B (normative)File authentication
B.1 General
B.2 Digital signatures
B.2.1 Requirements <\/td>\n<\/tr>\n
52<\/td>\nB.2.2 Methods of testing and required test results <\/td>\n<\/tr>\n
53<\/td>\nB.3 Symmetric means based upon pre-shared secret keys
B.3.1 Requirements <\/td>\n<\/tr>\n
54<\/td>\nB.3.2 Methods of testing and required test results <\/td>\n<\/tr>\n
56<\/td>\nAnnex C (informative)Methods of authentication of data files and executables \u2013 Examples
C.1 General
C.2 Explanations of terms
C.3 Asymmetric cryptography <\/td>\n<\/tr>\n
57<\/td>\nC.4 Digital signatures <\/td>\n<\/tr>\n
58<\/td>\nC.5 Public key infrastructure
C.5.1 General theory <\/td>\n<\/tr>\n
60<\/td>\nC.5.2 Notes about shipboard use
C.6 Symmetric key authentication based on “pre-shared secret key” <\/td>\n<\/tr>\n
62<\/td>\nAnnex D (normative)USB class codes
Table D.1 \u2013 USB class codes <\/td>\n<\/tr>\n
63<\/td>\nAnnex E (informative)Cyber security configuration document for equipment
E.1 General for the document
E.2 Document parts
E.2.1 Hardening of the operating system
E.2.2 Update strategy for cyber security reasons
E.2.3 Strategies for detecting and reacting to future vulnerabilities <\/td>\n<\/tr>\n
64<\/td>\nAnnex F (informative)Guidance on interconnection between networks
F.1 General
F.2 Guidance <\/td>\n<\/tr>\n
65<\/td>\nFigure F.1 \u2013 Examples for different types of network andassociated interconnecting devices <\/td>\n<\/tr>\n
66<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Maritime navigation and radiocommunication equipment and systems. Cybersecurity. General requirements, methods of testing and required test results<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n68<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":374626,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[792,2641],"product_tag":[],"class_list":{"0":"post-374616","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-47-020-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/374616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/374626"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=374616"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=374616"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=374616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}