Navigation and Vessel Inspection Circular (NVIC) 01-20; Guidelines for Addressing Cyber Risks at Maritime Transportation Security Act (MTSA) Regulated Facilities, 16108-16115 [2020-05823]

Download as PDF jbell on DSKJLSW7X2PROD with NOTICES 16108 Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices Place: National Institutes of Health, 6701 Rockledge Dr., Bethesda, MD 20817 (Virtual Meeting). Contact Person: Sarita Kandula Sastry, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Bethesda, MD 20782, sarita.sastry@nih.gov. Name of Committee: Center for Scientific Review Special Emphasis Panel; Member Conflict: Chronic Neurodegenerative and Neurodevelopment Disorders. Date: April 9, 2020. Time: 8:00 a.m. to 5:00 p.m. Agenda: To review and evaluate grant applications. Place: National Institutes of Health, Rockledge II, 6701 Rockledge Dr., Bethesda, MD 20892 (Virtual Meeting). Contact Person: Seetha Bhagavan, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 5194, MSC 7846, Bethesda, MD 20892, (301) 237– 9838, bhagavas@csr.nih.gov. Name of Committee: Center for Scientific Review Special Emphasis Panel; RFA–GM– 19–001: Methods to Improve Reproducibility of Human iPSC Derivation, Growth and Differentiation (SBIR). Date: April 9, 2020. Time: 11:00 a.m. to 2:30 p.m. Agenda: To review and evaluate grant applications. Place: National Institutes of Health, 6701 Rockledge Drive, Bethesda, MD 20892 (Virtual Meeting). Contact Person: Raj K. Krishnaraju, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 6190, Bethesda, MD 20892, 301–435–1047, kkrishna@csr.nih.gov. Name of Committee: Center for Scientific Review Special Emphasis Panel; Member Conflict: Autoimmunity, Transplantation and Tumor. Date: April 9, 2020. Time: 11:00 a.m. to 5:00 p.m. Agenda: To review and evaluate grant applications. Place: National Institutes of Health, Rockledge II, 6701 Rockledge Drive, Bethesda, MD 20892 (Virtual Meeting). Contact Person: Alok Mulky, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 4203, Bethesda, MD 20892, (301) 435–3566, alok.mulky@nih.gov. Name of Committee: Center for Scientific Review Special Emphasis Panel; Member Conflict: Toxicology and Pharmacology. Date: April 9, 2020. Time: 11:00 a.m. to 3:00 p.m. Agenda: To review and evaluate grant applications. Place: National Institutes of Health, Rockledge II, 6701 Rockledge Dr., Bethesda, MD 20892 (Virtual Meeting). Contact Person: Julia Spencer Barthold, MD, Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Bethesda, MD 20892, 301–402–3073, julia.barthold@ nih.gov. VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 Name of Committee: Center for Scientific Review Special Emphasis Panel; RFA–NS– 20–005: Mechanistic Basis of TDP–43Dependent Pathobiology in Common Dementias. Date: April 14, 2020. Time: 11:00 a.m. to 6:00 p.m. Agenda: To review and evaluate grant applications. Place: National Institutes of Health, Rockledge II, 6701 Rockledge Dr., Bethesda, MD 20892 (Virtual Meeting). Contact Person: Laurent Taupenot, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 4188, MSC 7850, Bethesda, MD 20892, (301) 435– 1203, laurent.taupenot@nih.gov. Name of Committee: Center for Scientific Review Special Emphasis Panel; RFA panel: A2CPS—Multisite Clinical Centers. Date: April 14, 2020. Time: 12:00 p.m. to 4:00 p.m. Agenda: To review and evaluate grant applications. Place: National Institutes of Health, Rockledge II, 6701 Rockledge Dr., Bethesda, MD 20892 (Virtual Meeting). Contact Person: Jasenka Borzan, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 4214, MSC 7814, Bethesda, MD 20892–7814, 301– 435–1787, borzanj@csr.nih.gov. (Catalogue of Federal Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research, 93.306, 93.333, 93.337, 93.393–93.396, 93.837–93.844, 93.846–93.878, 93.892, 93.893, National Institutes of Health, HHS) Dated: March 16, 2020. Ronald J. Livingston, Jr., Program Analyst, Office of Federal Advisory Committee Policy. [FR Doc. 2020–05813 Filed 3–19–20; 8:45 am] BILLING CODE 4140–01–P DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG–2016–1084] RIN 1625–ZA39 Navigation and Vessel Inspection Circular (NVIC) 01–20; Guidelines for Addressing Cyber Risks at Maritime Transportation Security Act (MTSA) Regulated Facilities Coast Guard, DHS. Notice of availability. AGENCY: ACTION: SUMMARY: The Coast Guard announces the availability of Navigation and Vessel Inspection Circular (NVIC) 01–20, titled Guidelines for Addressing Cyber Risks at Maritime Transportation Security Act (MTSA) Regulated Facilities. This NVIC clarifies the existing MTSA PO 00000 Frm 00062 Fmt 4703 Sfmt 4703 requirements related to computer system and network vulnerabilities of MTSA-regulated facilities. It also provides owners and operators of the facilities with guidance on how to analyze these vulnerabilities in their required Facility Security Assessment (FSA) and address them in the Facility Security Plan (FSP). FOR FURTHER INFORMATION CONTACT: If you have questions on this notice, call or email, CDR Brandon Link, U.S. Coast Guard; telephone 202–372–1107, email Brandon.M.Link@uscg.mil. SUPPLEMENTARY INFORMATION: Discussion As discussed in the United States Coast Guard Cyber Security Strategy, released in June 2015,1 and the draft NVIC,2 published for public comment on July 12, 2017 (82 FR 32189), cyber security is one of the most serious economic and national security challenges for the maritime industry and our nation. Maritime facility safety and security systems, such as security monitoring, fire detection, and general alarm installations increasingly rely on computer systems and networks. While these computer systems and networks create benefits, they are inherently vulnerable and introduce new vulnerabilities. There are many resources, technical standards, and recommended practices available to the maritime industry that can help with identifying vulnerabilities to facility computer systems and networks and subsequently incorporating those vulnerabilities into FSPs. However, recent Coast Guard experience suggests the maritime industry may not be aware of or utilizing these resources. Therefore, this NVIC recommends how MTSAregulated facilities can address and mitigate cyber security risks while ensuring the continued operational capability of the nation’s Marine Transportation System (MTS). The Maritime Transportation Security Act of 2002 (MTSA) (Pub. L. 107–295, November 25, 2002, as codified in 46 U.S.C. Chapter 701) addresses the security of the MTS and authorizes the Coast Guard to prescribe regulations. Under the authority of MTSA, the Coast Guard promulgated regulations in subchapter H of Title 33 of the Code of Federal Regulations (CFR). These 1 https://www.uscg.mil/Portals/0/Strategy/ Cyber%20Strategy.pdf. 2 The Coast Guard assigns NVICs based on the year and order in which they are issued in the final form. The draft version of this NVIC was assigned NVIC number 05–17. However, since the final version of the NVIC will be issued in the year 2020, we have assigned it a new number 01–20. E:\FR\FM\20MRN1.SGM 20MRN1 Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices jbell on DSKJLSW7X2PROD with NOTICES regulations established general requirements for facility security and provided facility owners and operators discretion to determine the details of how they will comply with those requirements. This NVIC provides recommended practices for MTSA-regulated facilities to address computer system and network vulnerabilities, more commonly referred to as cyber security vulnerabilities.3 Based on industry comments, the Coast Guard has revised the NVIC and its Enclosures. We revised the NVIC to clarify its advisory nature and applicability. The Coast Guard also changed the title of the draft NVIC Enclosure (1) from Cyber Security and MTSA: 33 CFR parts 105 and 106 to Cyber Security and MTSA. The Coast Guard made this change because the revised Enclosure (1) consists of two separate sections: The first section advises on the nature and purpose of the MTSA regulations and the second section discusses specific provisions of 33 CFR parts 105 and 106 that may apply to a Facility Security Plan (FSP) if a Facility Security Assessment (FSA) identifies any computer system and network vulnerabilities. In addition, the revised Enclosure (1) clarifies that MTSA regulations in 33 CFR parts 105 and 106 include a facility’s obligation to assess cyber security vulnerabilities while retaining the discretion over the ways to address and mitigate them. We note in the Enclosure that MTSAregulated facilities must comply with MTSA regulations, but it is up to each facility to determine how to identify, assess, and address the vulnerabilities of their computer systems and networks. We added a line about discussing backup means of communication, which are required by 33 CFR 105.235(d) and 106.240(c) and are part of the information considered when developing the FSA. We also corrected two typos on page 1–4. In the paragraph titled Security measures for access control, we corrected the citation from ‘‘33 CFR 105.260’’ to ‘‘33 CFR 106.260’’ and in the paragraph titled Security measures for restricted areas, we corrected the citation from ‘‘33 CFR 105.265’’ to ‘‘33 CFR 106.265’’. The draft NVIC contained an Enclosure (2) titled Cyber Governance and Cyber Risk Management Program 3 The existing regulatory requirement for assessing and addressing vulnerabilities to ‘‘computer systems and networks’’ is written broadly enough to encompass the more common term ‘‘cyber security’’ and to account for advances in technology. Under current regulations, facility owners must regularly update their FSAs and FSPs (see, e.g., 33 CFR 105.310, 105.410, and 105.415) to address new or previously unidentified security vulnerabilities. VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 Implementation Guidance. This Enclosure provided recommended practices, including the National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) and NIST Special Publication 800–82. For the reasons described below, we have removed Enclosure (2) from the NVIC. The Coast Guard sought public comments on the draft NVIC’s necessity, robustness, and its costs. Specifically, we sought comments on the feasibility of the implementation of the NVIC’s guidance, its flexibility and usefulness in addressing the broad scope of vulnerabilities and risk facing regulated facilities, and its ability to remain valid when technology and industry’s use of technology changes. In addition, the Coast Guard sought comments on whether this guidance aligned with activities that industry has already implemented. After the 90-day public comment period closed on October 11, 2017,4 the Coast Guard reviewed and analyzed the comments contained in 25 letters received. Below we summarize and respond to the public comments. Comments Received 1. Comments on NVIC’s Enclosure (2) Many of the comments described concerns with Enclosure (2). Enclosure (2) described best practices and expectations for all MTSA regulated entities, and cited to the National Institute of Standards and Technology’s Cyber Security Framework (NIST CSF) to promote effective self-governance. Some commenters perceived Enclosure (2) as overly detailed and not suitable for application by small owners and operators. Other commenters suggested that the Coast Guard simply direct all owners and operators to use the NIST framework. Based on these comments, we have concluded that Enclosure (2) created more confusion than benefit for the owners and operators of MTSAregulated facilities. For example, some commenters mistook the described examples and the framework for recommended parts of an FSA. Others expressed an expectation for more specific recommendations on various technical specifications. Therefore, the Coast Guard has removed Enclosure (2) from the NVIC. However, in response to several comments supporting the NIST CSF, which was discussed in Enclosure (2), we added a sentence to paragraph (2) of the NVIC encouraging the use of the NIST CSF as a means to improve a 4 The Coast Guard extended the initial comment period end date from September 11, 2017, to October 11, 2017 (82 FR 42560). PO 00000 Frm 00063 Fmt 4703 Sfmt 4703 16109 facility’s cyber posture above what is outlined in the NVIC. 2. Comments on Flexibility and Adaptability Many commenters stated cyber security guidance should be flexible and should allow each facility to create solutions that fit its specific needs and changing risks. The Coast Guard agrees. This NVIC does not include a checklist or otherwise prescribe cyber security solutions. This NVIC emphasizes that existing regulations require MTSAregulated facilities to assess and address vulnerabilities in computer systems and networks and provides guidance on how to mitigate those cyber security vulnerabilities identified in the facility’s FSA. 3. Comments on the Implementation of the NVIC A. The draft NVIC stated that once it was finalized, facility owners and operators could demonstrate their compliance with MTSA regulations by including cyber security risks and a general description of cyber security measures in their FSPs. In response to that statement, many commenters expressed concerns regarding potential delays in reinspections and re-approvals of new FSPs, and economic burdens for ports and facilities (including small ports and facilities with a limited number of employees), that might have to perform new FSAs and re-write existing FSPs immediately after the NVIC’s issuance. Similarly, one other commenter suggested that a separate cyber section be added to FSAs and FSPs instead of using all other sections for cyber information. One of the commenters also suggested that smaller facilities with a limited number of employees should have more general roles when it comes to cyber security. The Coast Guard emphasizes this NVIC applies to MTSA-regulated facilities only and does not apply to ports. However, those ports that manage MTSA-regulated facilities are required to ensure that the facilities comply with MTSA requirements. This NVIC does not impose any new burdens or requirements on MTSAregulated facilities. As discussed above, current Coast Guard regulatory authority in 33 CFR parts 105 and 106 already requires MTSA-regulated facilities to evaluate their computer system and network vulnerabilities in their FSAs and address them in the FSPs. Thus, all owners or operators of MTSA-regulated facilities, regardless of size, have to comply with MTSA regulations. As the draft NVIC indicated, the owners and E:\FR\FM\20MRN1.SGM 20MRN1 jbell on DSKJLSW7X2PROD with NOTICES 16110 Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices operators could comply with the MTSA regulations by either revising current FSPs or attaching a cyber-annex to the FSP. If the owner or operator elects to create a cyber-annex, it would be the only part of the FSP subject to reinspection and re-approval. Likewise, if the owner or operator chooses to incorporate cyber security vulnerabilities into the FSP, then only those new parts would be subject to reinspection and re-approval. The MTSA regulations governing FSP amendments can be found in 33 CFR 105.415 and 106.415. As to the general roles of employees at small MTSA-regulated facilities, this NVIC does not prescribe individual roles within a facility’s organization. It is the facility’s responsibility to determine the individual roles of its employees and how they can address cyber security risks identified by the FSA. Based on comments received, we have revised the final text of the NVIC and Enclosure (1) to clarify the NVIC’s advisory nature and a facility’s obligations under the MTSA regulations. We also added a sentence to Enclosure (1) stating that the Coast Guard would only review the newly added cyber-annex or FSP parts related to cyber security. B. The draft NVIC recommended facility owners and operators describe the roles and responsibilities of facility cyber security personnel, and provide facility cyber security information to Coast Guard personnel conducting FSP reviews or approvals. Based on those recommendations, some commenters expressed concerns about the new methods of evaluation and approval of their FSAs and FSPs; the role and level of cyber security knowledge and training of Coast Guard personnel in reviewing FSAs and FSPs; and the level of knowledge, required qualifications, and duties of a Facility Security Officer (FSO). Some of the commenters also asked the Coast Guard to provide training and conduct exercises for inspectors and port personnel. In addition, the commenters asked if a facility’s IT department should become a part of the facility personnel with security duties; if the IT data stored offsite would be subject to the MTSA requirements; and if an FSA would be expected to extend to the building where critical cyber systems are housed. This NVIC does not alter the process the Coast Guard uses to conduct FSA and FSP evaluations and approvals. This NVIC provides guidance to facility owners and operators in complying with current statutory and regulatory VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 requirements to assess, document, and address computer system and network vulnerabilities. Therefore, facility owners and operators whose FSAs and FSPs do not currently address cyber security vulnerabilities should revise them in compliance with MTSA regulations, which require the FSAs and FSPs to be re-evaluated and reapproved. Facility owners and operators are encouraged to work with the local Captain of the Port to determine a suitable timeframe for MTSA-regulated facilities to update their FSAs with computer system and network security vulnerabilities. Some comments suggested that the Coast Guard personnel lacked cyber security knowledge and training necessary to assess cyber security vulnerabilities. The Coast Guard will assess its needs and may address this issue in the future through internal policy or guidance to Coast Guard personnel. However, it remains the legal obligation of the facility owner or operator to assess and address computer system and network vulnerabilities in the FSA and FSP. In our discussion of FSAs in the 2003 final rule, we explained that a facility’s security depends in large part on how well the owner or operator assess vulnerabilities that only he or she would know about.5 The rule requires that those involved in a FSA be able to draw upon expert assistance in variety of areas including current security threats, techniques used to circumvent security measures, and radio and telecommunications systems including computer systems and networks.6 The Coast Guard believes this includes the expertise needed to self-assess risk and establish security measures to counter the risks involved with a MTSA-regulated facility’s computer systems and networks. The level of cyber security knowledge and training of facility personnel is the responsibility of a facility’s owner or operator, as performed through their FSO. The FSO’s responsibilities are provided in MTSA regulations, 33 CFR 105.205 and 106.210. They include the responsibility to ensure the completion of an FSA and completeness of an FSP, which should capture all items identified by the FSA, including existing computer system and network vulnerabilities. At this time, the Coast Guard is not planning to provide specific cyber training nor lead cyber exercises for MTSA-regulated facilities 5 68 FR 60533. In the same paragraph we added that the facility owner or operator must assume that threats will increase against the vulnerable part of the facility and develop progressively increasing security measures, as appropriate. 6 33 CFR 105.300(d) and 106.300(d). PO 00000 Frm 00064 Fmt 4703 Sfmt 4703 or their personnel. However, in May 2018 the Coast Guard, in coordination with the American Bureau of Shipping (ABS) group, created a ‘‘Marine Transportation System Cyber Awareness’’ webinar. The webinar provides basic cyber awareness with a focus on maritime facility and vessel operations and provides personnel at all levels of an organization with an understanding of cyber terms and issues that may be encountered in the MTS. A recording of the webinar is available online.7 Maritime industry personnel are encouraged to reach out to their local Area Maritime Security Committee (AMSC) Executive Secretaries for additional information on this webinar. In response to the question regarding a facility IT department’s inclusion into facility personnel with cyber security duties, the Coast Guard notes this NVIC is not intended to dictate the structure of a facility organization. Each individual facility should determine its appropriate organizational structure and determine whether making a facility’s IT department a part of the security personnel would help the facility address its cyber security risks. In response to the question about offsite storage of IT data, the Coast Guard agrees with the commenter that the Coast Guard’s MTSA jurisdiction ends at the facility’s fence-line in the physical domain. The Coast Guard notes that the regulations found in 33 CFR part 105 or 106 are not drafted to exert regulatory control over computer systems physically located outside the regulated facility’s footprint (for example, in a building outside the facility footprint where the critical cyber system is housed). However, if an FSA identifies vulnerabilities to the facility, including to the onsite computer systems, originating from or via computer systems and networks outside of the MTSA-regulated facility’s footprint, then the owner or operator needs to address how they will mitigate those vulnerabilities. Based on the comments received, the Coast Guard added text on pages 1–1 and 1–2 of the NVIC’s Enclosure (1) to give the facility owners and operators an example of what they should consider within their broad discretion in addressing their facility cyber security vulnerabilities, including the facility’s structure, and its personnel training, roles and responsibilities. C. Several commenters stated that the NVIC should be revised to use only common cyber security language, and 7 https://mariners.coastguard.dodlive.mil/2018/06/ 08/6-8-2018-marine-transportation-system-cyberawareness-webinar-recording-available-online/. E:\FR\FM\20MRN1.SGM 20MRN1 jbell on DSKJLSW7X2PROD with NOTICES Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices reference specific standards (for example, the International Association of Drilling Contactors (IADC) Guidelines for Assessing and Managing Cyber Security Risks at Drilling Assets, and IADC Guidelines for Network Segmentation) to assist owners and operators in addressing computer system and network vulnerabilities. The Coast Guard recognizes the draft NVIC interchangeably used various terms such as, ‘‘cyber systems,’’ ‘‘cyber risks,’’ ‘‘cyber/computer system security,’’ and ‘‘cyber security.’’ We agree that the NVIC should use common cyber security language. Based on these comments, the Coast Guard revised the NVIC and its Enclosure (1) to clarify the meaning of provisions of 33 CFR parts 105 and 106. These MTSA regulations require facilities to evaluate their radio and telecommunication equipment, including computer systems and networks, for vulnerabilities. These provisions require facility owners and operators of MTSA-regulated facilities to analyze cyber security vulnerabilities within their facilities. In regard to the use of specific cyber security references and standards, the Coast Guard encourages facilities to use the NIST CSF, but does not prescribe any particular references or standards at this time. This is to avoid limiting facility owners and operators in the ways they may address computer system and network vulnerabilities at a specific facility. The Coast Guard did not make any edits to the text of the final NVIC in regards to specific references or standards. However, in response to several public comments supporting the NIST CSF, we added a sentence to paragraph (2) of the NVIC encouraging the use of the NIST CSF as a means to improve a facility’s cyber posture. D. The draft NVIC’s Enclosure (1) recommended facility owners and operators establish security measures to control access to the facility. Based on that recommendation, some industry commenters expressed concerns about the NVIC’s focus on physical security rather than cyber security. At the same time, other commenters indicated that MTSA was meant to address only physical security of computer systems and networks and did not apply to cyber security. MTSA requires that security plans address both physical security and communications systems, to deter to the maximum extent practicable a transportation security incident.8 MTSA 8 46 U.S.C. 70103(c)(3). We note that Congress was aware of cyber security issues as early as the 1980s, and specifically addressed viruses and VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 regulations in 33 CFR parts 105 and 106 require MTSA-regulated facilities to analyze their ‘‘radio and telecommunications equipment, including computer systems and networks.’’ 9 As such, the FSAs must identify vulnerabilities to the facility computer systems and networks, and, if any exist, the FSP must address mitigation for those identified vulnerabilities. Moreover, in the time since the Coast Guard solicited public comment on the draft NVIC, Congress has amended MTSA to explicitly state that FSAs and FSPs must cover cyber security risks.10 We disagree with assertions that the existing requirement to assess vulnerabilities to computer systems and networks refers only to physical security. In addition to the plain language of ‘‘computer systems and networks’’ used in the 2003 rule, the preamble to the rule specifically discussed camera monitoring as an alternative to human patrols, showing that the Coast Guard had contemplated electronic systems as part of the facility security systems covered by the rule.11 The existing regulatory text contemplates a regularly updated plan for responding to existing and developing threats the facility owner or operator identifies. When developing an FSA the facility security officer is expected to either be able to, or draw upon third parties that have expertise to, identify security vulnerabilities, including vulnerabilities to computer systems and networks.12 This requirement has been in place since 2003. It is not limited to physical threats, and the preamble said that the Trojan horses the year after passing MTSA. See, e.g., the Computer Fraud and Abuse Act of 1986, 18 U.S.C. 1030 (1986) (addressing malicious code and hacking, and under which successful prosecution was brought in the early 1990s for damage caused by internet-based worms); and the CAN–SPAM Act of 2003, 15 U.S.C. 7701, 7703(c)(1) (2003) (aiming to curb spam email containing viruses, spyware, and other malicious code). 9 See 33 CFR 105.305(c)(1)(v), 105.400(a)(3), and 105.405(a)(17) for Facilities and 33 CFR 106.305(c)(1)(v), 106.400(a)(3), and 106.405(a)(16) for Outer Continental Shelf Facilities. 10 Maritime Security Improvement Act of 2018, sec. 1801 et seq., Public Law 115–254, 132 Stat. 3186 (2018) (the Act is Division J of the FAA Reauthorization Act of 2018). The Coast Guard views this as a reaffirmation and an indication of congressional emphasis, rather than a new authority—a view supported by the House Report accompanying an earlier version of the Act, which said the language is clarifying and ‘‘removes ambiguity’’ as to the Coast Guard’s authority under MTSA (H. Rep. No. 115–356 (2018)). 11 68 FR 60531. 12 33 CFR 105.305(c) and (d). In the preamble to the 2003 rule, while discussing current security threats and patterns the Coast Guard stated that ‘‘Expertise in assessing risk is crucial for establishing security measures to accurately counter the risk’’ (68 FR 60515). PO 00000 Frm 00065 Fmt 4703 Sfmt 4703 16111 facility owner or operator must assume that threats will increase, and must develop progressively increasing security measures as appropriate.13 While initial FSAs and FSPs did focus primarily on physical security issues because those were readily identifiable, the Coast Guard has continually raised cyber security as an emerging issue for over a decade 14 and the NVIC issued today is another form of outreach to industry about this threat to facilities. We think it is clear, therefore, that the existing requirement to assess and mitigate vulnerabilities to computer systems and networks encompasses cyber security. Moreover, to the extent facility owners and operators have automated physical security measures—for example by controlling access gates with card readers and cameras instead of guards—MTSA’s physical security provisions encompass those electronic or virtual tools. The regulations specifically enumerate requirements to consider vulnerabilities to access, identification systems, utilities, and similar functions that, if automated, may be vulnerable to cyber security threats. At some facilities, operations and security are so reliant on networks to operate, that cyber security and physical security may be inextricably linked. We recognize that this is not true of all facilities; some facilities may have no computer systems or networks at all. The focus of this NVIC, therefore, is to highlight each facility’s responsibility to determine the existence of computer and network vulnerabilities and address them in their FSAs and FSPs. In response to these and other similar comments, the Coast Guard made clarifying changes to both the NVIC and its Enclosure (1). We added a sentence linking computer systems and networks to the term ‘‘cyber security.’’ We indicated that vulnerabilities in computer systems and networks, as referenced in 33 CFR parts 105 and 106, mean cyber security vulnerabilities. We also noted that it was up to each facility to identify, assess, and address the vulnerabilities of their computer systems and networks. E. Three commenters asked the Coast Guard to recommend specific cyber security technology (including state-of13 68 FR 60533. e.g., Maritime Transportation System Security Recommendations (October 2005) available at https://www.dhs.gov/sites/default/files/ publications/HSPD_MTSSPlan_0.pdf (‘‘Use industry outreach to help commercial operators understand what private information could be exploited by terrorists and what cybersecurity controls are appropriate for protecting the information.’’). 14 See, E:\FR\FM\20MRN1.SGM 20MRN1 jbell on DSKJLSW7X2PROD with NOTICES 16112 Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices the art market cyber security solutions) that a facility would need to have, and steps it would need to take, to implement the guidance described in the NVIC. At the same time, some commenters noted that mandating specific cyber risk management tools would not benefit MTSA-regulated facilities as those tools would not be tailored to each individual site. This NVIC is not intended to inform facilities which cyber security technology they need to use. Rather, it is intended to offer awareness of MTSA regulatory requirements while allowing each facility the discretion to determine the best way to assess and address any computer system and network vulnerabilities. The NVIC does not mandate that facilities use specific cyber security technology or take specific actions to mitigate a computer system or network vulnerabilities. It simply reminds facility owners and operators of existing MTSA regulations that require the assessment of computer system and network vulnerabilities in their FSAs and incorporation, where applicable, in their FSPs. Therefore, for an owner and operator of an MTSA-regulated facility to comply with the MTSA regulations referenced in the NVIC, they would need to ensure the FSA assesses and FSP addresses computer system and network vulnerabilities of their facility. Based on these comments, the Coast Guard added clarifying language in the final NVIC and its Enclosure (1). We stated that it is up to each facility to identify, assess, and address the vulnerabilities of their computer systems and networks. F. The draft NVIC’s Enclosure (1) recommended that facility owners and operators describe additional cyberrelated measures to be taken during changes in MARSEC levels. In response to that recommendation, several commenters stated that requiring enhanced cyber security measures as a result of a MARSEC level increase would be impractical, and asked the Coast Guard to eliminate this expectation of the facilities. One of the commenters also asked the Coast Guard to inform the industry on the level of cyber security and any necessary response, as it does for physical security, including changes in MARSEC levels. Although both 33 CFR 105.230 and 33 CFR 106.235 require facility owners and operators to implement additional security measures in the event of a MARSEC level change, the Coast Guard agrees that it may not always be practical to do the same with cyber security. Some changes in MARSEC level could involve cyber security VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 threats but others may not, and a change in cyber security posture may not always be appropriate. In response to public comments, the Coast Guard revised the NVIC’s Enclosure (1) to remove the language related to changes in MARSEC levels and references to 33 CFR 105.230 and 106.235. Under existing regulations including those at 33 CFR 105.405 and 106.405, however, the FSP must indicate how the facility will respond to a changing MARSEC level. G. The draft NVIC’s Enclosure (1) indicated that if any cyber security vulnerabilities were identified in an FSA, owners and operators could choose to provide that information in a variety of formats, such as a stand-alone cyber annex to an FSP, or by incorporating the vulnerabilities into the existing FSP. In response to this statement, some commenters expressed confusion regarding multiple formats in which the Coast Guard will require an incident report. The Coast Guard notes that an FSA, a stand-alone cyber annex, or an amendment to an approved FSP addressing computer system or network vulnerabilities, are documents completely separate from a cyberincident report. This NVIC addresses MTSA cyber security requirements related to FSAs and FSPs. For more information on reporting a cyber security incident, please consult the CG–5P Policy Letter 08–16 titled ‘‘Reporting Suspicious Activity and Breaches of Security,’’ available at https://homeport.uscg.mil. The Coast Guard did not revise the NVIC in response to these comments because this NVIC does not impose any new reporting requirements on owners and operators of MTSA-regulated facilities. H. The draft NVIC’s Enclosure (1) stated that security patches should be installed as they become available. One commenter had a question as to the intervals with which security patches should be installed at their facility. The draft NVIC’s Enclosure (1) indicated that it was best to install security patches as they became available. The Coast Guard notes that facilities can choose the intervals with which to install security patches. However, waiting for scheduled intervals to install security patches and other updates instead of performing such actions immediately provides opportunities for system exploitation. However, we have modified the paragraph titled Security systems and equipment maintenance in the NVIC’s Enclosure (1) to clarify that cyberrelated procedures for managing PO 00000 Frm 00066 Fmt 4703 Sfmt 4703 software updates and patch installations should be described in the FSP. I. One commenter asked about reporting a cyber security incident to a police department as an alternative to the established reporting requirements. Contacting a local police department does not meet the reporting requirements described in the MTSA regulations at 33 CFR 101.305 (‘‘Reporting’’). As noted above, the requirements for reporting suspicious cyber related activity or breaches of security for MTSA-regulated entities are outlined in CG–5P Policy Letter 08–16 titled ‘‘Reporting Suspicious Activity and Breaches of Security,’’ available at https://homeport.uscg.mil. J. Because the draft NVIC referred to various responsibilities of facility employees, two commenters expressed concerns about access facility employees may have to sensitive information and requested more clarity on the access process for such employees. One of the commenters also expressed concerns over making a company’s cyber security program more vulnerable to attack by including it into an FSP. Two other commenters specifically asked about the interplay between this NVIC and the Coast Guard’s TWIC regulations. Another commenter was concerned about the Coast Guard interfering with facility business models, which reflect facility operations. MTSA regulations require the inclusion of computer system and network vulnerabilities into an FSA and an FSP (See 33 CFR 105.305(c)(1)(v) and 105.405(a)(17) for Facilities and 33 CFR 106.305(c)(1)(v) and 33 CFR 106.405(a)(16) for OCS Facilities). This NVIC simply reminds owners and operators of the existence of MTSA regulations related to computer system and network vulnerabilities. These requirements are intended to reduce security risks, not create them. Although the process of granting access to facility employees was not meant to be addressed in this NVIC or prescribed by the Coast Guard, we note that it should be determined by each facility depending on its specific cyber security risks. This NVIC does not change any legal requirements including the existing requirements to operate in accordance with TWIC requirements (see, e.g., 33 CFR 105.115(c)). As to the comment regarding the inclusion of a facility’s cyber security risks into an FSP, the Coast Guard notes that FSPs are considered Sensitive Security Information under 49 CFR 1520.5(b), which can only be accessed by a covered person with a need to know. The risk of adding cyber E:\FR\FM\20MRN1.SGM 20MRN1 Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices jbell on DSKJLSW7X2PROD with NOTICES mitigation measures to an FSP is not higher than the risk currently posed for FSPs that address physical security mitigation measures. FSPs are not released to the public by the Coast Guard,15 nor should they be released by the facilities. In regard to the comment about the interplay between TWIC regulations and this NVIC, the Coast Guard notes that this NVIC has no direct impact on the TWIC regulations. MTSA-regulated facilities should continue to follow current TWIC regulations as written. We also note that this NVIC is not intended to interfere with facility business models, but reminds facility owners and operators of their responsibilities under the MTSA regulations, which are meant to help keep their facilities safe from transportation security incidents, including Transportation Security Incidents (TSI) caused by cyber security vulnerabilities. We made no changes to the final NVIC in response to these comments. K. Two commenters asked to see a national and port vulnerability assessment for better understanding of the Coast Guard’s expectations for individual operators. The Coast Guard does not believe that a national or port vulnerability assessment is necessary for an individual facility to assess its own cyber security vulnerabilities to comply with MTSA regulations. However, local AMSCs led by Coast Guard Captains of the Port, acting in their capacity as Federal Maritime Security Coordinators, address, discuss, and share maritime security information with the industry. The Coast Guard highly encourages personnel with security duties at MTSA-regulated facilities to participate and collaborate with local AMSCs to gain more insight into port level security issues. The Coast Guard made no changes to the final NVIC in response to these comments. 4. Comments on the Enforcement of the NVIC The draft NVIC’s Enclosure (1) noted that the italicized text of the enclosure provided general guidance on MTSA regulations that may apply to an FSP, if an FSA identifies any computer system and network vulnerabilities Based on that statement, many commenters believed the NVIC contained mandatory language. Some of those commenters also asked to clarify the purpose of the italicized text, and 15 See 33 CFR 105.400(c) and (d) and 33 CFR 106.400(c) and (d). VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 how the Coast Guard intended to enforce the NVIC and allocate its resources for this purpose. The Coast Guard clarifies that the NVIC itself is an advisory document and is not subject to enforcement as a regulation. MTSA regulations, however, are enforceable. Although the Coast Guard will not change the enforcement process as a result of the NVIC, we will verify that facility FSAs and FSPs address cyber security vulnerabilities as required by 33 CFR 105.305(c)(1)(v), 33 CFR 105.400(a)(3), 33 CFR 105.405(a)(17), 33 CFR 106.305(c)(1)(v), 33 CFR 105.40(a)(3), and 33 CFR 106.405(a)(16). The purpose of the bold text in Enclosure (1) is to provide the industry with a list of regulatory citations that may apply to a facility’s FSP. The Coast Guard’s recommendation on each regulatory citation, for both FSA and FSP, is contained in italics under each citation. Based on these comments, the Coast Guard has revised the NVIC and its Enclosure (1) to clarify that although the MTSA regulations in 33 CFR parts 105 and 106 are mandatory, it is up to each facility to identify, assess, and address the vulnerabilities of their computer systems and networks. We also added a sentence to the introduction of Enclosure (1) to explain the purpose of the italicized text. 5. Comments Suggesting New Provisions or Clarifying Language A. Several commenters asked the Coast Guard to add cyber security recommendations on monitoring activity. In response to these comments, the Coast Guard added the paragraph titled Security measures for monitoring to Enclosure (1) of the NVIC. B. The draft NVIC’s Enclosure (1) stated that facility owners and operators may utilize a security plan under the Alternative Security Program (ASP). In response to that statement, one commenter stated that requiring a focused cyber security plan to go through the ASP program would require facilities to design their own access control, restricted area, cargo handling, and other measures that are not directly related to cyber security. One other commenter suggested that the Coast Guard should allow amendments to the FSP to be submitted under an ASP at the time of the next scheduled revision of the ASP. One of the commenters also asked to clarify if a facility could reference their existing cyber security plan documents as an alternative to the Coast Guard’s review. The ASP does not require a detailed cyber security plan. Nor does it impose PO 00000 Frm 00067 Fmt 4703 Sfmt 4703 16113 any new or different requirements. The ASP is an option that owners and operators may use to comply with the MTSA regulations. In response to the comment about referencing an existing cyber security plan, we note that a facility owner or operator may reference other documents in the ASP, but they would need to be reviewed and considered in the Coast Guard’s approval of the ASP. We revised the NVIC’s Enclosure (1) to clarify that the information contained in the NVIC also applies to the ASP, per 33 CFR 101.120(b), which means that the Coast Guard will accept documentation showing equivalent levels of security required by MTSA regulations. C. Some commenters asked us to use different wording in various parts of the NVIC and its Enclosure (1), and we discuss those changes here. 1. ‘‘[P]revent unauthorized loading/ unloading cargo’’ instead of ‘‘prevent cargo that is not meant for carriage from being accepted’’; we made that change. 2. ‘‘FSPs are in place and are considered to be appropriate and effective’’ instead of ‘‘FSPs are in place and are believed to be appropriate and effective’’; we made that change. 3. ‘‘Describe how those systems are protected and an alternative means of communication as well as the communication responsibility should the system be compromised or degraded’’ instead of ‘‘describe how those systems are protected and an alternative means of communication should the system be compromised or degraded.’’ We made this change with some modifications. 4. ‘‘Describe cyber-related procedures for interfacing with vessels to include any network interaction, portable media exchange, or wireless access sharing or remote vendor servicing’’ instead of ‘‘Describe cyber-related procedures for interfacing with vessels to include any network interaction, portable media exchange, or wireless access sharing.’’ Similarly, another commenter suggested that we add the term ‘‘remote access’’ before the words ‘‘portable media exchange’’ in the original sentence. We added the term ‘‘remote access’’ and believe it captures the intent of both commenters. 5. ‘‘Describe cyber-related procedures for managing software updates and patch installations of systems used to perform or support functions identified in the FSP (e.g., identification of needed security updates, planning and testing of patch installations)’’ instead of ‘‘Cyber systems used to perform or support functions identified in the FSP should be maintained, tested, calibrated, E:\FR\FM\20MRN1.SGM 20MRN1 jbell on DSKJLSW7X2PROD with NOTICES 16114 Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices and in good working order (e.g., conduct regular software updates and install security patches as they become available).’’ We made this change. 6. ‘‘Describe how cyber security is included as part of personnel training, policies and procedures and how the cyber security training material will be kept current and monitored for effectiveness’’ instead of ‘‘Describe how cyber security is included as part of personnel training, policies and procedures.’’ We added language about keeping training material current. 7. Another commenter asked the Coast Guard to add the following sentence to the paragraph titled ‘‘Communications’’ in Enclosure (1): ‘‘During crew or shift changes, handover notes should include cyber security related information and updates.’’ The Coast Guard agrees that this recommendation may be useful to other facilities. We have added this recommendation as an example under the paragraph titled ‘‘Communications’’ in Enclosure (1). 8. One of these commenters also asked us to add the following sentence ‘‘In case gaps are identified, corrective actions should be taken in order for the provisions in the FSP to be satisfied.’’ to the end of ‘‘The audit should include the name, position, and qualification of the person conducting the audit.’’ We did not incorporate the new audit sentence into the NVIC because it is expected that the FSPs should account for gaps in security. D. One commenter requested that we add guidelines applicable to MTSAregulated vessels. The Coast Guard notes this NVIC was not meant to address vessels. It addresses MTSA-regulated facilities only. We will consider addressing cyber security vulnerabilities for vessels in the future. Based on this comment, we have revised the text of the final NVIC to clarify its applicability to MTSAregulated facilities only. E. Another commenter asked us to clarify where the abbreviation ‘‘N/A’’ was supposed to be placed as asked in the following sentence of Enclosure (1): ‘‘If the area or function has no cyber nexus, indicate ‘‘N/A.’’ We have added the clarification as requested and added the following to the end of the sentence: ‘‘‘N/A’’ in the FSA and FSP.’’ F. The Coast Guard was also asked to re-number the draft NVIC’s Enclosure (1) to preserve traditional NVIC formatting, which we have done. G. Five commenters asked us to clarify the definition of the term ‘‘general documentation’’ in the VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 paragraph titled MTSA regulations in 33 CFR parts 105 and 106 in the NVIC’s Enclosure (1). The Coast Guard used the term ‘‘general documentation’’ to indicate that owners and operators would not have to use any specific forms or indicate the use of any specific technology when demonstrating compliance with the MTSA regulations. In addition, the Coast Guard’s intent was to highlight that facility owners and operators could use an ASP to submit documentation showing equivalent levels of security required by MTSA. Based on these comments, we deleted the word ‘‘general’’ from Enclosure (1) and added a footnote stating ‘‘[i]n addition, facility owners and operators may rely on the Coast Guard Alternative Security Program to submit documentation showing equivalent levels of security required by MTSA.’’ H. Three other commenters requested a clarification of security requirements for ports, transportation sector facilities, seaport systems, offshore facilities, and individual operators, based on their operating environment. We note that this NVIC was not intended to address security requirements for ports, transportation sector facilities, or seaport systems. This NVIC applies to MTSA-regulated facilities, including offshore facilities, and individual operators subject to MTSA. The NVIC’s Enclosure (1) references MTSA regulations that may apply to MTSA-regulated facilities, depending on a facility’s operating environment and structure. It is each facility’s responsibility to determine what computer system and network vulnerabilities may be created by their operating environment and address those vulnerabilities in their FSAs and FSPs. Based on these comments, we have revised the final text of the NVIC and its Enclosure (1) to clarify the NVIC’s applicability. I. Two industry commenters asked the Coast Guard to provide additional language on Global Positioning Systems (GPS) and Internet of Things (IoT) devices. Specifically, one of the commenters asked the Coast Guard to include into the NVIC the following language: ‘‘A powerful but little recognized method of cyberattack, GPS disruption can disable end-use devices, interfere with communications links, and provide hazardously misleading information to users and databases. Because GPS signals undergird nearly every technology, DHS officials have called GPS a single point of failure for critical infrastructure.’’ PO 00000 Frm 00068 Fmt 4703 Sfmt 4703 If GPS systems or IoT devices present a vulnerability to a MTSA-regulated facility’s computer or network system, they fall within the existing regulations at 33 CFR parts 105 and 106, and should be addressed in the FSP. However, these concerns are broad and, in the case of IoT, still developing, and so we don’t think it is appropriate to devote a section of the NVIC to them at this time. Therefore, the Coast Guard did not make edits to the text of the final NVIC based on these two comments J. One other industry commenter asked for the NVIC to address the risks of third party contractor access to critical cyber systems and networks. These concerns are valid. However, it is up to the owner or operator of a particular facility to determine if a third party having access to the facility’s computer systems and networks presents a risk that should be mentioned in the facility’s FSA and FSP. We made no changes to the final NVIC in response to this comment. K. Three commenters suggested that we classify MTSA facilities as ‘‘critical control systems/controls’’ and require them to be air-gapped from business network systems. Two other commenters requested more clarity on mitigation of cyber security risks. This NVIC is not meant to impose requirements on the owners and operators of MTSA-regulated facilities or suggest specific ways cyber risks should be mitigated. This NVIC is meant to make facility owners and operators aware of the existence of the MTSA regulations, which are meant to assist them in protecting their facilities. It is up to each facility to determine if computer system and network vulnerabilities existing at the facility require air-gapping to mitigate vulnerabilities. We made no changes to the final NVIC in response to this comment. 6. Other Comments About the NVIC A. The draft NVIC stated: ‘‘[u]ntil specific cyber risk management regulations are promulgated, facility operators may use this document as guidance to develop and implement measures and activities for effective selfgovernance of cyber vulnerabilities.’’ Based on these statements, two commenters expressed concerns as to the Coast Guard’s regulatory authority to control how companies execute their cyber risk management and its authority to issue this NVIC without a notice of proposed rulemaking (NPRM). Another commenter asked the Coast Guard to perform a risk assessment and cost benefit analysis as a next step in the NVIC’s development. E:\FR\FM\20MRN1.SGM 20MRN1 jbell on DSKJLSW7X2PROD with NOTICES Federal Register / Vol. 85, No. 55 / Friday, March 20, 2020 / Notices The Coast Guard acknowledges the comments and notes that this NVIC is not a rule. As explained in detail earlier in this notice, the Coast Guard is also not using its regulatory authority to issue this NVIC or control how companies execute their cyber risk management decisions. To the contrary, this NVIC constitutes advisory guidance meant to assist facility owners and operators in complying with existing MTSA regulations. The NVIC emphasizes that a facility is already obligated by existing MTSA regulations to assess and address vulnerabilities in computer systems and networks, but it has discretion to determine how it will comply with the regulations and address its own cyber security risks. Based on these comments, we have revised the text of the NVIC and its Enclosure (1) to clarify the advisory nature of the NVIC. B. The U.S. Chamber of Commerce asked us to keep the NVIC in the draft form and to have an ongoing dialog facilitating input from industry stakeholders. The Chamber suggested that the Coast Guard present the NVIC as a voluntary risk management tool, which might become a beacon around which cyber security efforts could orient. The Coast Guard acknowledges this comment and agrees that the NVIC is a voluntary risk management tool, in that it informs owners and operators about their existing regulatory obligations, and provides suggestions for fulfilling those obligations. However, the Coast Guard believes that finalizing the NVIC will provide owners and operators with needed guidance on how to comply with the MTSA regulations relating to computer and network security. Dialogue about cyber risk management will continue to occur in a variety of forms, and the NVIC provides contact information should the regulated public wish to contact the Coast Guard with questions or concerns. Based on this comment, we did not make any revisions to the final NVIC. C. The draft NVIC stated the Coast Guard had the regulatory authority to instruct MTSA-regulated facilities to analyze computer systems and networks for potential vulnerabilities within their required FSA and, if necessary, address those vulnerabilities in their FSP. In response to that statement, three commenters suggested the Coast Guard state that the facilities, to comply with MTSA, could limit their cyber security measures to those information technology systems and networks that have a direct maritime nexus. One of the commenters also asked the Coast Guard to develop clear guidelines on cyber VerDate Sep<11>2014 19:01 Mar 19, 2020 Jkt 250001 TSIs and connections to MTSA facilities. The Coast Guard is vested with authority to verify that MTSA-regulated facilities comply with MTSA regulations, including the ones relating to computer systems and networks regardless of whether that system or network has a direct maritime nexus. In regards to a TSI and connections to MTSA facilities, the Coast Guard notes that this NVIC was not intended to discuss TSIs. However, we note that a TSI, as defined in 33 CFR 101.105, is not limited to incidents with a specific maritime cause. A TSI may result from a physical or cyber security incident which originates from outside of the maritime environment. For example, plausible TSIs caused by cyber threats could include: Deliberate disabling of a facility’s fire detection equipment, security cameras, or security locks; a hack or ransomware that leaves such systems inaccessible; damage to computer-controlled ventilation or temperature control features at chemical facilities; or tampering with or disabling the automated supply chain in a way that causes significant economic disruption. For the reasons stated, we did not make any changes to the text of the final NVIC. D. The draft NVIC’s Enclosure (1) recommended that owners and operators address cyber security vulnerabilities in their FSPs. In response to that recommendation, some commenters expressed general concerns about regulating fast-paced cyber security demands of the commercial industry, the NVIC’s focus on cyber vulnerabilities rather than cyber risk management, and provided a suggestion for the government to protect private companies from cyber-attacks. These comments are general in nature and do not raise any specific issues within the NVIC. The Coast Guard acknowledges these comments and will consider them as part of the general ongoing dialog on how to improve cyber security at maritime facilities. We did not make any changes to the final NVIC based on these comments. The Coast Guard appreciates all the comments received. We will continue to study this issue in light of the comments received before issuing other notices or policy letters on this matter. Dated: February 26, 2020. Karl L. Schultz, Admiral, U.S. Coast Guard, Commandant. [FR Doc. 2020–05823 Filed 3–19–20; 8:45 am] BILLING CODE 9110–04–P PO 00000 Frm 00069 Fmt 4703 Sfmt 4703 16115 DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA–2019–0028; OMB No. 1660–0080] Agency Information Collection Activities: Submission for OMB Review; Comment Request; Application for Surplus Federal Real Property Public Benefit Conveyance and BRAC Program for Emergency Management Use Federal Emergency Management Agency, DHS. ACTION: Notice and request for comments. AGENCY: SUMMARY: The Federal Emergency Management Agency (FEMA) will submit the information collection abstracted below to the Office of Management and Budget for review and clearance in accordance with the requirements of the Paperwork Reduction Act of 1995. The submission will describe the nature of the information collection, the categories of respondents, the estimated burden (i.e., the time, effort and resources used by respondents to respond) and cost, and the actual data collection instruments FEMA will use. DATES: Comments must be submitted on or before April 20, 2020. ADDRESSES: Submit written comments on the proposed information collection to the Office of Information and Regulatory Affairs, Office of Management and Budget. Comments should be addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency, and sent via electronic mail to dhsdeskofficer@ omb.eop.gov. FOR FURTHER INFORMATION CONTACT: Requests for additional information or copies of the information collection should be made to Director, Information Management Division, 500 C Street SW, Washington, DC 20472, email address FEMA-Information-CollectionsManagement@fema.dhs.gov or Anna Page Campbell, Realty Specialist, FEMA, Installations & Infrastructure Division, (202) 212–3631, Annapage.Campbell@FEMA.dhs.gov. SUPPLEMENTARY INFORMATION: This proposed information collection previously published in the Federal Register on December 19, 2019, at 84 FR 69758 with a 60 day public comment period. No comments were received. The purpose of this notice is to notify E:\FR\FM\20MRN1.SGM 20MRN1

Agencies

[Federal Register Volume 85, Number 55 (Friday, March 20, 2020)]
[Notices]
[Pages 16108-16115]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-05823]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

[Docket No. USCG-2016-1084]
RIN 1625-ZA39


Navigation and Vessel Inspection Circular (NVIC) 01-20; 
Guidelines for Addressing Cyber Risks at Maritime Transportation 
Security Act (MTSA) Regulated Facilities

AGENCY: Coast Guard, DHS.

ACTION: Notice of availability.

-----------------------------------------------------------------------

SUMMARY: The Coast Guard announces the availability of Navigation and 
Vessel Inspection Circular (NVIC) 01-20, titled Guidelines for 
Addressing Cyber Risks at Maritime Transportation Security Act (MTSA) 
Regulated Facilities. This NVIC clarifies the existing MTSA 
requirements related to computer system and network vulnerabilities of 
MTSA-regulated facilities. It also provides owners and operators of the 
facilities with guidance on how to analyze these vulnerabilities in 
their required Facility Security Assessment (FSA) and address them in 
the Facility Security Plan (FSP).

FOR FURTHER INFORMATION CONTACT: If you have questions on this notice, 
call or email, CDR Brandon Link, U.S. Coast Guard; telephone 202-372-
1107, email [email protected].

SUPPLEMENTARY INFORMATION:

Discussion

    As discussed in the United States Coast Guard Cyber Security 
Strategy, released in June 2015,\1\ and the draft NVIC,\2\ published 
for public comment on July 12, 2017 (82 FR 32189), cyber security is 
one of the most serious economic and national security challenges for 
the maritime industry and our nation. Maritime facility safety and 
security systems, such as security monitoring, fire detection, and 
general alarm installations increasingly rely on computer systems and 
networks. While these computer systems and networks create benefits, 
they are inherently vulnerable and introduce new vulnerabilities.
---------------------------------------------------------------------------

    \1\ https://www.uscg.mil/Portals/0/Strategy/Cyber%20Strategy.pdf.
    \2\ The Coast Guard assigns NVICs based on the year and order in 
which they are issued in the final form. The draft version of this 
NVIC was assigned NVIC number 05-17. However, since the final 
version of the NVIC will be issued in the year 2020, we have 
assigned it a new number 01-20.
---------------------------------------------------------------------------

    There are many resources, technical standards, and recommended 
practices available to the maritime industry that can help with 
identifying vulnerabilities to facility computer systems and networks 
and subsequently incorporating those vulnerabilities into FSPs. 
However, recent Coast Guard experience suggests the maritime industry 
may not be aware of or utilizing these resources. Therefore, this NVIC 
recommends how MTSA-regulated facilities can address and mitigate cyber 
security risks while ensuring the continued operational capability of 
the nation's Marine Transportation System (MTS).
    The Maritime Transportation Security Act of 2002 (MTSA) (Pub. L. 
107-295, November 25, 2002, as codified in 46 U.S.C. Chapter 701) 
addresses the security of the MTS and authorizes the Coast Guard to 
prescribe regulations. Under the authority of MTSA, the Coast Guard 
promulgated regulations in subchapter H of Title 33 of the Code of 
Federal Regulations (CFR). These

[[Page 16109]]

regulations established general requirements for facility security and 
provided facility owners and operators discretion to determine the 
details of how they will comply with those requirements.
    This NVIC provides recommended practices for MTSA-regulated 
facilities to address computer system and network vulnerabilities, more 
commonly referred to as cyber security vulnerabilities.\3\ Based on 
industry comments, the Coast Guard has revised the NVIC and its 
Enclosures. We revised the NVIC to clarify its advisory nature and 
applicability. The Coast Guard also changed the title of the draft NVIC 
Enclosure (1) from Cyber Security and MTSA: 33 CFR parts 105 and 106 to 
Cyber Security and MTSA. The Coast Guard made this change because the 
revised Enclosure (1) consists of two separate sections: The first 
section advises on the nature and purpose of the MTSA regulations and 
the second section discusses specific provisions of 33 CFR parts 105 
and 106 that may apply to a Facility Security Plan (FSP) if a Facility 
Security Assessment (FSA) identifies any computer system and network 
vulnerabilities. In addition, the revised Enclosure (1) clarifies that 
MTSA regulations in 33 CFR parts 105 and 106 include a facility's 
obligation to assess cyber security vulnerabilities while retaining the 
discretion over the ways to address and mitigate them. We note in the 
Enclosure that MTSA-regulated facilities must comply with MTSA 
regulations, but it is up to each facility to determine how to 
identify, assess, and address the vulnerabilities of their computer 
systems and networks. We added a line about discussing backup means of 
communication, which are required by 33 CFR 105.235(d) and 106.240(c) 
and are part of the information considered when developing the FSA. We 
also corrected two typos on page 1-4. In the paragraph titled Security 
measures for access control, we corrected the citation from ``33 CFR 
105.260'' to ``33 CFR 106.260'' and in the paragraph titled Security 
measures for restricted areas, we corrected the citation from ``33 CFR 
105.265'' to ``33 CFR 106.265''.
---------------------------------------------------------------------------

    \3\ The existing regulatory requirement for assessing and 
addressing vulnerabilities to ``computer systems and networks'' is 
written broadly enough to encompass the more common term ``cyber 
security'' and to account for advances in technology. Under current 
regulations, facility owners must regularly update their FSAs and 
FSPs (see, e.g., 33 CFR 105.310, 105.410, and 105.415) to address 
new or previously unidentified security vulnerabilities.
---------------------------------------------------------------------------

    The draft NVIC contained an Enclosure (2) titled Cyber Governance 
and Cyber Risk Management Program Implementation Guidance. This 
Enclosure provided recommended practices, including the National 
Institute of Standards and Technology (NIST) Cyber Security Framework 
(CSF) and NIST Special Publication 800-82. For the reasons described 
below, we have removed Enclosure (2) from the NVIC.
    The Coast Guard sought public comments on the draft NVIC's 
necessity, robustness, and its costs. Specifically, we sought comments 
on the feasibility of the implementation of the NVIC's guidance, its 
flexibility and usefulness in addressing the broad scope of 
vulnerabilities and risk facing regulated facilities, and its ability 
to remain valid when technology and industry's use of technology 
changes. In addition, the Coast Guard sought comments on whether this 
guidance aligned with activities that industry has already implemented. 
After the 90-day public comment period closed on October 11, 2017,\4\ 
the Coast Guard reviewed and analyzed the comments contained in 25 
letters received. Below we summarize and respond to the public 
comments.
---------------------------------------------------------------------------

    \4\ The Coast Guard extended the initial comment period end date 
from September 11, 2017, to October 11, 2017 (82 FR 42560).
---------------------------------------------------------------------------

Comments Received

1. Comments on NVIC's Enclosure (2)

    Many of the comments described concerns with Enclosure (2). 
Enclosure (2) described best practices and expectations for all MTSA 
regulated entities, and cited to the National Institute of Standards 
and Technology's Cyber Security Framework (NIST CSF) to promote 
effective self-governance. Some commenters perceived Enclosure (2) as 
overly detailed and not suitable for application by small owners and 
operators. Other commenters suggested that the Coast Guard simply 
direct all owners and operators to use the NIST framework. Based on 
these comments, we have concluded that Enclosure (2) created more 
confusion than benefit for the owners and operators of MTSA-regulated 
facilities. For example, some commenters mistook the described examples 
and the framework for recommended parts of an FSA. Others expressed an 
expectation for more specific recommendations on various technical 
specifications. Therefore, the Coast Guard has removed Enclosure (2) 
from the NVIC. However, in response to several comments supporting the 
NIST CSF, which was discussed in Enclosure (2), we added a sentence to 
paragraph (2) of the NVIC encouraging the use of the NIST CSF as a 
means to improve a facility's cyber posture above what is outlined in 
the NVIC.

2. Comments on Flexibility and Adaptability

    Many commenters stated cyber security guidance should be flexible 
and should allow each facility to create solutions that fit its 
specific needs and changing risks. The Coast Guard agrees. This NVIC 
does not include a checklist or otherwise prescribe cyber security 
solutions. This NVIC emphasizes that existing regulations require MTSA-
regulated facilities to assess and address vulnerabilities in computer 
systems and networks and provides guidance on how to mitigate those 
cyber security vulnerabilities identified in the facility's FSA.

3. Comments on the Implementation of the NVIC

    A. The draft NVIC stated that once it was finalized, facility 
owners and operators could demonstrate their compliance with MTSA 
regulations by including cyber security risks and a general description 
of cyber security measures in their FSPs.
    In response to that statement, many commenters expressed concerns 
regarding potential delays in re-inspections and re-approvals of new 
FSPs, and economic burdens for ports and facilities (including small 
ports and facilities with a limited number of employees), that might 
have to perform new FSAs and re-write existing FSPs immediately after 
the NVIC's issuance. Similarly, one other commenter suggested that a 
separate cyber section be added to FSAs and FSPs instead of using all 
other sections for cyber information. One of the commenters also 
suggested that smaller facilities with a limited number of employees 
should have more general roles when it comes to cyber security.
    The Coast Guard emphasizes this NVIC applies to MTSA-regulated 
facilities only and does not apply to ports. However, those ports that 
manage MTSA-regulated facilities are required to ensure that the 
facilities comply with MTSA requirements.
    This NVIC does not impose any new burdens or requirements on MTSA-
regulated facilities. As discussed above, current Coast Guard 
regulatory authority in 33 CFR parts 105 and 106 already requires MTSA-
regulated facilities to evaluate their computer system and network 
vulnerabilities in their FSAs and address them in the FSPs. Thus, all 
owners or operators of MTSA-regulated facilities, regardless of size, 
have to comply with MTSA regulations. As the draft NVIC indicated, the 
owners and

[[Page 16110]]

operators could comply with the MTSA regulations by either revising 
current FSPs or attaching a cyber-annex to the FSP. If the owner or 
operator elects to create a cyber-annex, it would be the only part of 
the FSP subject to re-inspection and re-approval. Likewise, if the 
owner or operator chooses to incorporate cyber security vulnerabilities 
into the FSP, then only those new parts would be subject to re-
inspection and re-approval. The MTSA regulations governing FSP 
amendments can be found in 33 CFR 105.415 and 106.415.
    As to the general roles of employees at small MTSA-regulated 
facilities, this NVIC does not prescribe individual roles within a 
facility's organization. It is the facility's responsibility to 
determine the individual roles of its employees and how they can 
address cyber security risks identified by the FSA.
    Based on comments received, we have revised the final text of the 
NVIC and Enclosure (1) to clarify the NVIC's advisory nature and a 
facility's obligations under the MTSA regulations. We also added a 
sentence to Enclosure (1) stating that the Coast Guard would only 
review the newly added cyber-annex or FSP parts related to cyber 
security.
    B. The draft NVIC recommended facility owners and operators 
describe the roles and responsibilities of facility cyber security 
personnel, and provide facility cyber security information to Coast 
Guard personnel conducting FSP reviews or approvals.
    Based on those recommendations, some commenters expressed concerns 
about the new methods of evaluation and approval of their FSAs and 
FSPs; the role and level of cyber security knowledge and training of 
Coast Guard personnel in reviewing FSAs and FSPs; and the level of 
knowledge, required qualifications, and duties of a Facility Security 
Officer (FSO). Some of the commenters also asked the Coast Guard to 
provide training and conduct exercises for inspectors and port 
personnel. In addition, the commenters asked if a facility's IT 
department should become a part of the facility personnel with security 
duties; if the IT data stored offsite would be subject to the MTSA 
requirements; and if an FSA would be expected to extend to the building 
where critical cyber systems are housed.
    This NVIC does not alter the process the Coast Guard uses to 
conduct FSA and FSP evaluations and approvals. This NVIC provides 
guidance to facility owners and operators in complying with current 
statutory and regulatory requirements to assess, document, and address 
computer system and network vulnerabilities. Therefore, facility owners 
and operators whose FSAs and FSPs do not currently address cyber 
security vulnerabilities should revise them in compliance with MTSA 
regulations, which require the FSAs and FSPs to be re-evaluated and re-
approved. Facility owners and operators are encouraged to work with the 
local Captain of the Port to determine a suitable timeframe for MTSA-
regulated facilities to update their FSAs with computer system and 
network security vulnerabilities.
    Some comments suggested that the Coast Guard personnel lacked cyber 
security knowledge and training necessary to assess cyber security 
vulnerabilities. The Coast Guard will assess its needs and may address 
this issue in the future through internal policy or guidance to Coast 
Guard personnel. However, it remains the legal obligation of the 
facility owner or operator to assess and address computer system and 
network vulnerabilities in the FSA and FSP. In our discussion of FSAs 
in the 2003 final rule, we explained that a facility's security depends 
in large part on how well the owner or operator assess vulnerabilities 
that only he or she would know about.\5\ The rule requires that those 
involved in a FSA be able to draw upon expert assistance in variety of 
areas including current security threats, techniques used to circumvent 
security measures, and radio and telecommunications systems including 
computer systems and networks.\6\ The Coast Guard believes this 
includes the expertise needed to self-assess risk and establish 
security measures to counter the risks involved with a MTSA-regulated 
facility's computer systems and networks.
---------------------------------------------------------------------------

    \5\ 68 FR 60533. In the same paragraph we added that the 
facility owner or operator must assume that threats will increase 
against the vulnerable part of the facility and develop 
progressively increasing security measures, as appropriate.
    \6\ 33 CFR 105.300(d) and 106.300(d).
---------------------------------------------------------------------------

    The level of cyber security knowledge and training of facility 
personnel is the responsibility of a facility's owner or operator, as 
performed through their FSO. The FSO's responsibilities are provided in 
MTSA regulations, 33 CFR 105.205 and 106.210. They include the 
responsibility to ensure the completion of an FSA and completeness of 
an FSP, which should capture all items identified by the FSA, including 
existing computer system and network vulnerabilities. At this time, the 
Coast Guard is not planning to provide specific cyber training nor lead 
cyber exercises for MTSA-regulated facilities or their personnel. 
However, in May 2018 the Coast Guard, in coordination with the American 
Bureau of Shipping (ABS) group, created a ``Marine Transportation 
System Cyber Awareness'' webinar. The webinar provides basic cyber 
awareness with a focus on maritime facility and vessel operations and 
provides personnel at all levels of an organization with an 
understanding of cyber terms and issues that may be encountered in the 
MTS. A recording of the webinar is available online.\7\ Maritime 
industry personnel are encouraged to reach out to their local Area 
Maritime Security Committee (AMSC) Executive Secretaries for additional 
information on this webinar.
---------------------------------------------------------------------------

    \7\ https://mariners.coastguard.dodlive.mil/2018/06/08/6-8-2018-marine-transportation-system-cyber-awareness-webinar-recording-available-online/.
---------------------------------------------------------------------------

    In response to the question regarding a facility IT department's 
inclusion into facility personnel with cyber security duties, the Coast 
Guard notes this NVIC is not intended to dictate the structure of a 
facility organization. Each individual facility should determine its 
appropriate organizational structure and determine whether making a 
facility's IT department a part of the security personnel would help 
the facility address its cyber security risks.
    In response to the question about offsite storage of IT data, the 
Coast Guard agrees with the commenter that the Coast Guard's MTSA 
jurisdiction ends at the facility's fence-line in the physical domain. 
The Coast Guard notes that the regulations found in 33 CFR part 105 or 
106 are not drafted to exert regulatory control over computer systems 
physically located outside the regulated facility's footprint (for 
example, in a building outside the facility footprint where the 
critical cyber system is housed). However, if an FSA identifies 
vulnerabilities to the facility, including to the onsite computer 
systems, originating from or via computer systems and networks outside 
of the MTSA-regulated facility's footprint, then the owner or operator 
needs to address how they will mitigate those vulnerabilities.
    Based on the comments received, the Coast Guard added text on pages 
1-1 and 1-2 of the NVIC's Enclosure (1) to give the facility owners and 
operators an example of what they should consider within their broad 
discretion in addressing their facility cyber security vulnerabilities, 
including the facility's structure, and its personnel training, roles 
and responsibilities.
    C. Several commenters stated that the NVIC should be revised to use 
only common cyber security language, and

[[Page 16111]]

reference specific standards (for example, the International 
Association of Drilling Contactors (IADC) Guidelines for Assessing and 
Managing Cyber Security Risks at Drilling Assets, and IADC Guidelines 
for Network Segmentation) to assist owners and operators in addressing 
computer system and network vulnerabilities.
    The Coast Guard recognizes the draft NVIC interchangeably used 
various terms such as, ``cyber systems,'' ``cyber risks,'' ``cyber/
computer system security,'' and ``cyber security.'' We agree that the 
NVIC should use common cyber security language. Based on these 
comments, the Coast Guard revised the NVIC and its Enclosure (1) to 
clarify the meaning of provisions of 33 CFR parts 105 and 106. These 
MTSA regulations require facilities to evaluate their radio and 
telecommunication equipment, including computer systems and networks, 
for vulnerabilities. These provisions require facility owners and 
operators of MTSA-regulated facilities to analyze cyber security 
vulnerabilities within their facilities.
    In regard to the use of specific cyber security references and 
standards, the Coast Guard encourages facilities to use the NIST CSF, 
but does not prescribe any particular references or standards at this 
time. This is to avoid limiting facility owners and operators in the 
ways they may address computer system and network vulnerabilities at a 
specific facility. The Coast Guard did not make any edits to the text 
of the final NVIC in regards to specific references or standards. 
However, in response to several public comments supporting the NIST 
CSF, we added a sentence to paragraph (2) of the NVIC encouraging the 
use of the NIST CSF as a means to improve a facility's cyber posture.
    D. The draft NVIC's Enclosure (1) recommended facility owners and 
operators establish security measures to control access to the 
facility.
    Based on that recommendation, some industry commenters expressed 
concerns about the NVIC's focus on physical security rather than cyber 
security. At the same time, other commenters indicated that MTSA was 
meant to address only physical security of computer systems and 
networks and did not apply to cyber security.
    MTSA requires that security plans address both physical security 
and communications systems, to deter to the maximum extent practicable 
a transportation security incident.\8\ MTSA regulations in 33 CFR parts 
105 and 106 require MTSA-regulated facilities to analyze their ``radio 
and telecommunications equipment, including computer systems and 
networks.'' \9\ As such, the FSAs must identify vulnerabilities to the 
facility computer systems and networks, and, if any exist, the FSP must 
address mitigation for those identified vulnerabilities. Moreover, in 
the time since the Coast Guard solicited public comment on the draft 
NVIC, Congress has amended MTSA to explicitly state that FSAs and FSPs 
must cover cyber security risks.\10\ We disagree with assertions that 
the existing requirement to assess vulnerabilities to computer systems 
and networks refers only to physical security. In addition to the plain 
language of ``computer systems and networks'' used in the 2003 rule, 
the preamble to the rule specifically discussed camera monitoring as an 
alternative to human patrols, showing that the Coast Guard had 
contemplated electronic systems as part of the facility security 
systems covered by the rule.\11\ The existing regulatory text 
contemplates a regularly updated plan for responding to existing and 
developing threats the facility owner or operator identifies. When 
developing an FSA the facility security officer is expected to either 
be able to, or draw upon third parties that have expertise to, identify 
security vulnerabilities, including vulnerabilities to computer systems 
and networks.\12\ This requirement has been in place since 2003. It is 
not limited to physical threats, and the preamble said that the 
facility owner or operator must assume that threats will increase, and 
must develop progressively increasing security measures as 
appropriate.\13\ While initial FSAs and FSPs did focus primarily on 
physical security issues because those were readily identifiable, the 
Coast Guard has continually raised cyber security as an emerging issue 
for over a decade \14\ and the NVIC issued today is another form of 
outreach to industry about this threat to facilities. We think it is 
clear, therefore, that the existing requirement to assess and mitigate 
vulnerabilities to computer systems and networks encompasses cyber 
security.
---------------------------------------------------------------------------

    \8\ 46 U.S.C. 70103(c)(3). We note that Congress was aware of 
cyber security issues as early as the 1980s, and specifically 
addressed viruses and Trojan horses the year after passing MTSA. 
See, e.g., the Computer Fraud and Abuse Act of 1986, 18 U.S.C. 1030 
(1986) (addressing malicious code and hacking, and under which 
successful prosecution was brought in the early 1990s for damage 
caused by internet-based worms); and the CAN-SPAM Act of 2003, 15 
U.S.C. 7701, 7703(c)(1) (2003) (aiming to curb spam email containing 
viruses, spyware, and other malicious code).
    \9\ See 33 CFR 105.305(c)(1)(v), 105.400(a)(3), and 
105.405(a)(17) for Facilities and 33 CFR 106.305(c)(1)(v), 
106.400(a)(3), and 106.405(a)(16) for Outer Continental Shelf 
Facilities.
    \10\ Maritime Security Improvement Act of 2018, sec. 1801 et 
seq., Public Law 115-254, 132 Stat. 3186 (2018) (the Act is Division 
J of the FAA Reauthorization Act of 2018). The Coast Guard views 
this as a reaffirmation and an indication of congressional emphasis, 
rather than a new authority--a view supported by the House Report 
accompanying an earlier version of the Act, which said the language 
is clarifying and ``removes ambiguity'' as to the Coast Guard's 
authority under MTSA (H. Rep. No. 115-356 (2018)).
    \11\ 68 FR 60531.
    \12\ 33 CFR 105.305(c) and (d). In the preamble to the 2003 
rule, while discussing current security threats and patterns the 
Coast Guard stated that ``Expertise in assessing risk is crucial for 
establishing security measures to accurately counter the risk'' (68 
FR 60515).
    \13\ 68 FR 60533.
    \14\ See, e.g., Maritime Transportation System Security 
Recommendations (October 2005) available at https://www.dhs.gov/sites/default/files/publications/HSPD_MTSSPlan_0.pdf (``Use industry 
outreach to help commercial operators understand what private 
information could be exploited by terrorists and what cybersecurity 
controls are appropriate for protecting the information.'').
---------------------------------------------------------------------------

    Moreover, to the extent facility owners and operators have 
automated physical security measures--for example by controlling access 
gates with card readers and cameras instead of guards--MTSA's physical 
security provisions encompass those electronic or virtual tools. The 
regulations specifically enumerate requirements to consider 
vulnerabilities to access, identification systems, utilities, and 
similar functions that, if automated, may be vulnerable to cyber 
security threats. At some facilities, operations and security are so 
reliant on networks to operate, that cyber security and physical 
security may be inextricably linked. We recognize that this is not true 
of all facilities; some facilities may have no computer systems or 
networks at all. The focus of this NVIC, therefore, is to highlight 
each facility's responsibility to determine the existence of computer 
and network vulnerabilities and address them in their FSAs and FSPs.
    In response to these and other similar comments, the Coast Guard 
made clarifying changes to both the NVIC and its Enclosure (1). We 
added a sentence linking computer systems and networks to the term 
``cyber security.'' We indicated that vulnerabilities in computer 
systems and networks, as referenced in 33 CFR parts 105 and 106, mean 
cyber security vulnerabilities. We also noted that it was up to each 
facility to identify, assess, and address the vulnerabilities of their 
computer systems and networks.
    E. Three commenters asked the Coast Guard to recommend specific 
cyber security technology (including state-of-

[[Page 16112]]

the art market cyber security solutions) that a facility would need to 
have, and steps it would need to take, to implement the guidance 
described in the NVIC. At the same time, some commenters noted that 
mandating specific cyber risk management tools would not benefit MTSA-
regulated facilities as those tools would not be tailored to each 
individual site.
    This NVIC is not intended to inform facilities which cyber security 
technology they need to use. Rather, it is intended to offer awareness 
of MTSA regulatory requirements while allowing each facility the 
discretion to determine the best way to assess and address any computer 
system and network vulnerabilities. The NVIC does not mandate that 
facilities use specific cyber security technology or take specific 
actions to mitigate a computer system or network vulnerabilities. It 
simply reminds facility owners and operators of existing MTSA 
regulations that require the assessment of computer system and network 
vulnerabilities in their FSAs and incorporation, where applicable, in 
their FSPs. Therefore, for an owner and operator of an MTSA-regulated 
facility to comply with the MTSA regulations referenced in the NVIC, 
they would need to ensure the FSA assesses and FSP addresses computer 
system and network vulnerabilities of their facility. Based on these 
comments, the Coast Guard added clarifying language in the final NVIC 
and its Enclosure (1). We stated that it is up to each facility to 
identify, assess, and address the vulnerabilities of their computer 
systems and networks.
    F. The draft NVIC's Enclosure (1) recommended that facility owners 
and operators describe additional cyber-related measures to be taken 
during changes in MARSEC levels.
    In response to that recommendation, several commenters stated that 
requiring enhanced cyber security measures as a result of a MARSEC 
level increase would be impractical, and asked the Coast Guard to 
eliminate this expectation of the facilities. One of the commenters 
also asked the Coast Guard to inform the industry on the level of cyber 
security and any necessary response, as it does for physical security, 
including changes in MARSEC levels.
    Although both 33 CFR 105.230 and 33 CFR 106.235 require facility 
owners and operators to implement additional security measures in the 
event of a MARSEC level change, the Coast Guard agrees that it may not 
always be practical to do the same with cyber security. Some changes in 
MARSEC level could involve cyber security threats but others may not, 
and a change in cyber security posture may not always be appropriate. 
In response to public comments, the Coast Guard revised the NVIC's 
Enclosure (1) to remove the language related to changes in MARSEC 
levels and references to 33 CFR 105.230 and 106.235. Under existing 
regulations including those at 33 CFR 105.405 and 106.405, however, the 
FSP must indicate how the facility will respond to a changing MARSEC 
level.
    G. The draft NVIC's Enclosure (1) indicated that if any cyber 
security vulnerabilities were identified in an FSA, owners and 
operators could choose to provide that information in a variety of 
formats, such as a stand-alone cyber annex to an FSP, or by 
incorporating the vulnerabilities into the existing FSP. In response to 
this statement, some commenters expressed confusion regarding multiple 
formats in which the Coast Guard will require an incident report. The 
Coast Guard notes that an FSA, a stand-alone cyber annex, or an 
amendment to an approved FSP addressing computer system or network 
vulnerabilities, are documents completely separate from a cyber-
incident report. This NVIC addresses MTSA cyber security requirements 
related to FSAs and FSPs. For more information on reporting a cyber 
security incident, please consult the CG-5P Policy Letter 08-16 titled 
``Reporting Suspicious Activity and Breaches of Security,'' available 
at https://homeport.uscg.mil. The Coast Guard did not revise the NVIC 
in response to these comments because this NVIC does not impose any new 
reporting requirements on owners and operators of MTSA-regulated 
facilities.
    H. The draft NVIC's Enclosure (1) stated that security patches 
should be installed as they become available.
    One commenter had a question as to the intervals with which 
security patches should be installed at their facility.
    The draft NVIC's Enclosure (1) indicated that it was best to 
install security patches as they became available. The Coast Guard 
notes that facilities can choose the intervals with which to install 
security patches. However, waiting for scheduled intervals to install 
security patches and other updates instead of performing such actions 
immediately provides opportunities for system exploitation. However, we 
have modified the paragraph titled Security systems and equipment 
maintenance in the NVIC's Enclosure (1) to clarify that cyber-related 
procedures for managing software updates and patch installations should 
be described in the FSP.
    I. One commenter asked about reporting a cyber security incident to 
a police department as an alternative to the established reporting 
requirements.
    Contacting a local police department does not meet the reporting 
requirements described in the MTSA regulations at 33 CFR 101.305 
(``Reporting''). As noted above, the requirements for reporting 
suspicious cyber related activity or breaches of security for MTSA-
regulated entities are outlined in CG-5P Policy Letter 08-16 titled 
``Reporting Suspicious Activity and Breaches of Security,'' available 
at https://homeport.uscg.mil.
    J. Because the draft NVIC referred to various responsibilities of 
facility employees, two commenters expressed concerns about access 
facility employees may have to sensitive information and requested more 
clarity on the access process for such employees. One of the commenters 
also expressed concerns over making a company's cyber security program 
more vulnerable to attack by including it into an FSP. Two other 
commenters specifically asked about the interplay between this NVIC and 
the Coast Guard's TWIC regulations. Another commenter was concerned 
about the Coast Guard interfering with facility business models, which 
reflect facility operations.
    MTSA regulations require the inclusion of computer system and 
network vulnerabilities into an FSA and an FSP (See 33 CFR 
105.305(c)(1)(v) and 105.405(a)(17) for Facilities and 33 CFR 
106.305(c)(1)(v) and 33 CFR 106.405(a)(16) for OCS Facilities). This 
NVIC simply reminds owners and operators of the existence of MTSA 
regulations related to computer system and network vulnerabilities. 
These requirements are intended to reduce security risks, not create 
them. Although the process of granting access to facility employees was 
not meant to be addressed in this NVIC or prescribed by the Coast 
Guard, we note that it should be determined by each facility depending 
on its specific cyber security risks. This NVIC does not change any 
legal requirements including the existing requirements to operate in 
accordance with TWIC requirements (see, e.g., 33 CFR 105.115(c)).
    As to the comment regarding the inclusion of a facility's cyber 
security risks into an FSP, the Coast Guard notes that FSPs are 
considered Sensitive Security Information under 49 CFR 1520.5(b), which 
can only be accessed by a covered person with a need to know. The risk 
of adding cyber

[[Page 16113]]

mitigation measures to an FSP is not higher than the risk currently 
posed for FSPs that address physical security mitigation measures. FSPs 
are not released to the public by the Coast Guard,\15\ nor should they 
be released by the facilities.
---------------------------------------------------------------------------

    \15\ See 33 CFR 105.400(c) and (d) and 33 CFR 106.400(c) and 
(d).
---------------------------------------------------------------------------

    In regard to the comment about the interplay between TWIC 
regulations and this NVIC, the Coast Guard notes that this NVIC has no 
direct impact on the TWIC regulations. MTSA-regulated facilities should 
continue to follow current TWIC regulations as written.
    We also note that this NVIC is not intended to interfere with 
facility business models, but reminds facility owners and operators of 
their responsibilities under the MTSA regulations, which are meant to 
help keep their facilities safe from transportation security incidents, 
including Transportation Security Incidents (TSI) caused by cyber 
security vulnerabilities.
    We made no changes to the final NVIC in response to these comments.
    K. Two commenters asked to see a national and port vulnerability 
assessment for better understanding of the Coast Guard's expectations 
for individual operators.
    The Coast Guard does not believe that a national or port 
vulnerability assessment is necessary for an individual facility to 
assess its own cyber security vulnerabilities to comply with MTSA 
regulations. However, local AMSCs led by Coast Guard Captains of the 
Port, acting in their capacity as Federal Maritime Security 
Coordinators, address, discuss, and share maritime security information 
with the industry. The Coast Guard highly encourages personnel with 
security duties at MTSA-regulated facilities to participate and 
collaborate with local AMSCs to gain more insight into port level 
security issues.
    The Coast Guard made no changes to the final NVIC in response to 
these comments.

4. Comments on the Enforcement of the NVIC

    The draft NVIC's Enclosure (1) noted that the italicized text of 
the enclosure provided general guidance on MTSA regulations that may 
apply to an FSP, if an FSA identifies any computer system and network 
vulnerabilities
    Based on that statement, many commenters believed the NVIC 
contained mandatory language. Some of those commenters also asked to 
clarify the purpose of the italicized text, and how the Coast Guard 
intended to enforce the NVIC and allocate its resources for this 
purpose.
    The Coast Guard clarifies that the NVIC itself is an advisory 
document and is not subject to enforcement as a regulation. MTSA 
regulations, however, are enforceable. Although the Coast Guard will 
not change the enforcement process as a result of the NVIC, we will 
verify that facility FSAs and FSPs address cyber security 
vulnerabilities as required by 33 CFR 105.305(c)(1)(v), 33 CFR 
105.400(a)(3), 33 CFR 105.405(a)(17), 33 CFR 106.305(c)(1)(v), 33 CFR 
105.40(a)(3), and 33 CFR 106.405(a)(16).
    The purpose of the bold text in Enclosure (1) is to provide the 
industry with a list of regulatory citations that may apply to a 
facility's FSP. The Coast Guard's recommendation on each regulatory 
citation, for both FSA and FSP, is contained in italics under each 
citation.
    Based on these comments, the Coast Guard has revised the NVIC and 
its Enclosure (1) to clarify that although the MTSA regulations in 33 
CFR parts 105 and 106 are mandatory, it is up to each facility to 
identify, assess, and address the vulnerabilities of their computer 
systems and networks. We also added a sentence to the introduction of 
Enclosure (1) to explain the purpose of the italicized text.

5. Comments Suggesting New Provisions or Clarifying Language

    A. Several commenters asked the Coast Guard to add cyber security 
recommendations on monitoring activity. In response to these comments, 
the Coast Guard added the paragraph titled Security measures for 
monitoring to Enclosure (1) of the NVIC.
    B. The draft NVIC's Enclosure (1) stated that facility owners and 
operators may utilize a security plan under the Alternative Security 
Program (ASP).
    In response to that statement, one commenter stated that requiring 
a focused cyber security plan to go through the ASP program would 
require facilities to design their own access control, restricted area, 
cargo handling, and other measures that are not directly related to 
cyber security. One other commenter suggested that the Coast Guard 
should allow amendments to the FSP to be submitted under an ASP at the 
time of the next scheduled revision of the ASP. One of the commenters 
also asked to clarify if a facility could reference their existing 
cyber security plan documents as an alternative to the Coast Guard's 
review.
    The ASP does not require a detailed cyber security plan. Nor does 
it impose any new or different requirements. The ASP is an option that 
owners and operators may use to comply with the MTSA regulations. In 
response to the comment about referencing an existing cyber security 
plan, we note that a facility owner or operator may reference other 
documents in the ASP, but they would need to be reviewed and considered 
in the Coast Guard's approval of the ASP.
    We revised the NVIC's Enclosure (1) to clarify that the information 
contained in the NVIC also applies to the ASP, per 33 CFR 101.120(b), 
which means that the Coast Guard will accept documentation showing 
equivalent levels of security required by MTSA regulations.
    C. Some commenters asked us to use different wording in various 
parts of the NVIC and its Enclosure (1), and we discuss those changes 
here.
    1. ``[P]revent unauthorized loading/unloading cargo'' instead of 
``prevent cargo that is not meant for carriage from being accepted''; 
we made that change.
    2. ``FSPs are in place and are considered to be appropriate and 
effective'' instead of ``FSPs are in place and are believed to be 
appropriate and effective''; we made that change.
    3. ``Describe how those systems are protected and an alternative 
means of communication as well as the communication responsibility 
should the system be compromised or degraded'' instead of ``describe 
how those systems are protected and an alternative means of 
communication should the system be compromised or degraded.'' We made 
this change with some modifications.
    4. ``Describe cyber-related procedures for interfacing with vessels 
to include any network interaction, portable media exchange, or 
wireless access sharing or remote vendor servicing'' instead of 
``Describe cyber-related procedures for interfacing with vessels to 
include any network interaction, portable media exchange, or wireless 
access sharing.'' Similarly, another commenter suggested that we add 
the term ``remote access'' before the words ``portable media exchange'' 
in the original sentence. We added the term ``remote access'' and 
believe it captures the intent of both commenters.
    5. ``Describe cyber-related procedures for managing software 
updates and patch installations of systems used to perform or support 
functions identified in the FSP (e.g., identification of needed 
security updates, planning and testing of patch installations)'' 
instead of ``Cyber systems used to perform or support functions 
identified in the FSP should be maintained, tested, calibrated,

[[Page 16114]]

and in good working order (e.g., conduct regular software updates and 
install security patches as they become available).'' We made this 
change.
    6. ``Describe how cyber security is included as part of personnel 
training, policies and procedures and how the cyber security training 
material will be kept current and monitored for effectiveness'' instead 
of ``Describe how cyber security is included as part of personnel 
training, policies and procedures.'' We added language about keeping 
training material current.
    7. Another commenter asked the Coast Guard to add the following 
sentence to the paragraph titled ``Communications'' in Enclosure (1): 
``During crew or shift changes, handover notes should include cyber 
security related information and updates.'' The Coast Guard agrees that 
this recommendation may be useful to other facilities. We have added 
this recommendation as an example under the paragraph titled 
``Communications'' in Enclosure (1).
    8. One of these commenters also asked us to add the following 
sentence ``In case gaps are identified, corrective actions should be 
taken in order for the provisions in the FSP to be satisfied.'' to the 
end of ``The audit should include the name, position, and qualification 
of the person conducting the audit.'' We did not incorporate the new 
audit sentence into the NVIC because it is expected that the FSPs 
should account for gaps in security.
    D. One commenter requested that we add guidelines applicable to 
MTSA-regulated vessels.
    The Coast Guard notes this NVIC was not meant to address vessels. 
It addresses MTSA-regulated facilities only. We will consider 
addressing cyber security vulnerabilities for vessels in the future.
    Based on this comment, we have revised the text of the final NVIC 
to clarify its applicability to MTSA-regulated facilities only.
    E. Another commenter asked us to clarify where the abbreviation 
``N/A'' was supposed to be placed as asked in the following sentence of 
Enclosure (1): ``If the area or function has no cyber nexus, indicate 
``N/A.''
    We have added the clarification as requested and added the 
following to the end of the sentence: ```N/A'' in the FSA and FSP.''
    F. The Coast Guard was also asked to re-number the draft NVIC's 
Enclosure (1) to preserve traditional NVIC formatting, which we have 
done.
    G. Five commenters asked us to clarify the definition of the term 
``general documentation'' in the paragraph titled MTSA regulations in 
33 CFR parts 105 and 106 in the NVIC's Enclosure (1).
    The Coast Guard used the term ``general documentation'' to indicate 
that owners and operators would not have to use any specific forms or 
indicate the use of any specific technology when demonstrating 
compliance with the MTSA regulations. In addition, the Coast Guard's 
intent was to highlight that facility owners and operators could use an 
ASP to submit documentation showing equivalent levels of security 
required by MTSA.
    Based on these comments, we deleted the word ``general'' from 
Enclosure (1) and added a footnote stating ``[i]n addition, facility 
owners and operators may rely on the Coast Guard Alternative Security 
Program to submit documentation showing equivalent levels of security 
required by MTSA.''
    H. Three other commenters requested a clarification of security 
requirements for ports, transportation sector facilities, seaport 
systems, offshore facilities, and individual operators, based on their 
operating environment.
    We note that this NVIC was not intended to address security 
requirements for ports, transportation sector facilities, or seaport 
systems. This NVIC applies to MTSA-regulated facilities, including 
offshore facilities, and individual operators subject to MTSA. The 
NVIC's Enclosure (1) references MTSA regulations that may apply to 
MTSA-regulated facilities, depending on a facility's operating 
environment and structure. It is each facility's responsibility to 
determine what computer system and network vulnerabilities may be 
created by their operating environment and address those 
vulnerabilities in their FSAs and FSPs.
    Based on these comments, we have revised the final text of the NVIC 
and its Enclosure (1) to clarify the NVIC's applicability.
    I. Two industry commenters asked the Coast Guard to provide 
additional language on Global Positioning Systems (GPS) and Internet of 
Things (IoT) devices. Specifically, one of the commenters asked the 
Coast Guard to include into the NVIC the following language: ``A 
powerful but little recognized method of cyberattack, GPS disruption 
can disable end-use devices, interfere with communications links, and 
provide hazardously misleading information to users and databases. 
Because GPS signals undergird nearly every technology, DHS officials 
have called GPS a single point of failure for critical 
infrastructure.''
    If GPS systems or IoT devices present a vulnerability to a MTSA-
regulated facility's computer or network system, they fall within the 
existing regulations at 33 CFR parts 105 and 106, and should be 
addressed in the FSP. However, these concerns are broad and, in the 
case of IoT, still developing, and so we don't think it is appropriate 
to devote a section of the NVIC to them at this time.
    Therefore, the Coast Guard did not make edits to the text of the 
final NVIC based on these two comments
    J. One other industry commenter asked for the NVIC to address the 
risks of third party contractor access to critical cyber systems and 
networks.
    These concerns are valid. However, it is up to the owner or 
operator of a particular facility to determine if a third party having 
access to the facility's computer systems and networks presents a risk 
that should be mentioned in the facility's FSA and FSP.
    We made no changes to the final NVIC in response to this comment.
    K. Three commenters suggested that we classify MTSA facilities as 
``critical control systems/controls'' and require them to be air-gapped 
from business network systems. Two other commenters requested more 
clarity on mitigation of cyber security risks.
    This NVIC is not meant to impose requirements on the owners and 
operators of MTSA-regulated facilities or suggest specific ways cyber 
risks should be mitigated. This NVIC is meant to make facility owners 
and operators aware of the existence of the MTSA regulations, which are 
meant to assist them in protecting their facilities. It is up to each 
facility to determine if computer system and network vulnerabilities 
existing at the facility require air-gapping to mitigate 
vulnerabilities.
    We made no changes to the final NVIC in response to this comment.

6. Other Comments About the NVIC

    A. The draft NVIC stated: ``[u]ntil specific cyber risk management 
regulations are promulgated, facility operators may use this document 
as guidance to develop and implement measures and activities for 
effective self-governance of cyber vulnerabilities.''
    Based on these statements, two commenters expressed concerns as to 
the Coast Guard's regulatory authority to control how companies execute 
their cyber risk management and its authority to issue this NVIC 
without a notice of proposed rulemaking (NPRM). Another commenter asked 
the Coast Guard to perform a risk assessment and cost benefit analysis 
as a next step in the NVIC's development.

[[Page 16115]]

    The Coast Guard acknowledges the comments and notes that this NVIC 
is not a rule. As explained in detail earlier in this notice, the Coast 
Guard is also not using its regulatory authority to issue this NVIC or 
control how companies execute their cyber risk management decisions. To 
the contrary, this NVIC constitutes advisory guidance meant to assist 
facility owners and operators in complying with existing MTSA 
regulations. The NVIC emphasizes that a facility is already obligated 
by existing MTSA regulations to assess and address vulnerabilities in 
computer systems and networks, but it has discretion to determine how 
it will comply with the regulations and address its own cyber security 
risks.
    Based on these comments, we have revised the text of the NVIC and 
its Enclosure (1) to clarify the advisory nature of the NVIC.
    B. The U.S. Chamber of Commerce asked us to keep the NVIC in the 
draft form and to have an ongoing dialog facilitating input from 
industry stakeholders. The Chamber suggested that the Coast Guard 
present the NVIC as a voluntary risk management tool, which might 
become a beacon around which cyber security efforts could orient.
    The Coast Guard acknowledges this comment and agrees that the NVIC 
is a voluntary risk management tool, in that it informs owners and 
operators about their existing regulatory obligations, and provides 
suggestions for fulfilling those obligations. However, the Coast Guard 
believes that finalizing the NVIC will provide owners and operators 
with needed guidance on how to comply with the MTSA regulations 
relating to computer and network security. Dialogue about cyber risk 
management will continue to occur in a variety of forms, and the NVIC 
provides contact information should the regulated public wish to 
contact the Coast Guard with questions or concerns.
    Based on this comment, we did not make any revisions to the final 
NVIC.
    C. The draft NVIC stated the Coast Guard had the regulatory 
authority to instruct MTSA-regulated facilities to analyze computer 
systems and networks for potential vulnerabilities within their 
required FSA and, if necessary, address those vulnerabilities in their 
FSP.
    In response to that statement, three commenters suggested the Coast 
Guard state that the facilities, to comply with MTSA, could limit their 
cyber security measures to those information technology systems and 
networks that have a direct maritime nexus. One of the commenters also 
asked the Coast Guard to develop clear guidelines on cyber TSIs and 
connections to MTSA facilities.
    The Coast Guard is vested with authority to verify that MTSA-
regulated facilities comply with MTSA regulations, including the ones 
relating to computer systems and networks regardless of whether that 
system or network has a direct maritime nexus. In regards to a TSI and 
connections to MTSA facilities, the Coast Guard notes that this NVIC 
was not intended to discuss TSIs. However, we note that a TSI, as 
defined in 33 CFR 101.105, is not limited to incidents with a specific 
maritime cause. A TSI may result from a physical or cyber security 
incident which originates from outside of the maritime environment. For 
example, plausible TSIs caused by cyber threats could include: 
Deliberate disabling of a facility's fire detection equipment, security 
cameras, or security locks; a hack or ransomware that leaves such 
systems inaccessible; damage to computer-controlled ventilation or 
temperature control features at chemical facilities; or tampering with 
or disabling the automated supply chain in a way that causes 
significant economic disruption.
    For the reasons stated, we did not make any changes to the text of 
the final NVIC.
    D. The draft NVIC's Enclosure (1) recommended that owners and 
operators address cyber security vulnerabilities in their FSPs.
    In response to that recommendation, some commenters expressed 
general concerns about regulating fast-paced cyber security demands of 
the commercial industry, the NVIC's focus on cyber vulnerabilities 
rather than cyber risk management, and provided a suggestion for the 
government to protect private companies from cyber-attacks.
    These comments are general in nature and do not raise any specific 
issues within the NVIC. The Coast Guard acknowledges these comments and 
will consider them as part of the general on-going dialog on how to 
improve cyber security at maritime facilities. We did not make any 
changes to the final NVIC based on these comments.
    The Coast Guard appreciates all the comments received. We will 
continue to study this issue in light of the comments received before 
issuing other notices or policy letters on this matter.

    Dated: February 26, 2020.
Karl L. Schultz,
Admiral, U.S. Coast Guard, Commandant.
[FR Doc. 2020-05823 Filed 3-19-20; 8:45 am]
 BILLING CODE 9110-04-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.