Cybersecurity in the Marine Transportation System, 13404-13514 [2024-03075]
Download as PDF
13404
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Port and Facility Compliance, 202–372–
1107, or Commander Frank Strom,
Office of Design and Engineering
Standards, 202–372–1375.
SUPPLEMENTARY INFORMATION:
DEPARTMENT OF HOMELAND
SECURITY
Coast Guard
33 CFR Parts 101 and 160
Table of Contents for Preamble
[Docket No. USCG–2022–0802]
RIN 1625–AC77
Cybersecurity in the Marine
Transportation System
Coast Guard, Department of
Homeland Security (DHS).
ACTION: Notice of proposed rulemaking.
AGENCY:
The Coast Guard proposes to
update its maritime security regulations
by adding regulations specifically
focused on establishing minimum
cybersecurity requirements for U.S.flagged vessels, Outer Continental Shelf
facilities, and U.S. facilities subject to
the Maritime Transportation Security
Act of 2002 regulations. This proposed
rule would help to address current and
emerging cybersecurity threats in the
marine transportation system. We seek
your comments on this proposed rule
and whether we should: use and define
the term reportable cyber incident to
limit cyber incidents that trigger
reporting requirements, use alternative
methods of reporting such incidents,
and amend the definition of hazardous
condition.
DATES: Comments and related material
must be received by the Coast Guard on
or before April 22, 2024.
ADDRESSES: You may submit comments
identified by docket number USCG–
2022–0802 using the Federal DecisionMaking Portal at www.regulations.gov.
See the ‘‘Public Participation and
Request for Comments’’ portion of the
SUPPLEMENTARY INFORMATION section for
further instructions on submitting
comments. You may also find this
notice of proposed rulemaking, with its
100-word-or-less summary, in this same
docket at www.regulations.gov.
Collection of information. Submit
comments on the collection of
information discussed in section VI.D of
this preamble both to the Coast Guard’s
online docket and to the Office of
Information and Regulatory Affairs
(OIRA) in the White House Office of
Management and Budget (OMB) using
their website, www.reginfo.gov/public/
do/PRAMain. Comments sent to OIRA
on the collection of information must
reach OIRA on or before the comment
due date listed on their website.
FOR FURTHER INFORMATION CONTACT: For
information about this document, email
MTSCyberRule@uscg.mil or call:
Commander Brandon Link, Office of
lotter on DSK11XQN23PROD with PROPOSALS2
SUMMARY:
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
I. Public Participation and Request for
Comments
II. Abbreviations
III. Basis and Purpose
A. The Problem We Seek To Address
B. Recent Legislation and Policy
C. Legal Authority To Address This
Problem
IV. Background
A. The Current State of Cybersecurity in
the MTS
B. Current Cybersecurity Regulations
V. Discussion of Proposed Rule
VI. Regulatory Analyses
A. Regulatory Planning and Review
B. Small Entities
C. Assistance for Small Entities
D. Collection of Information
E. Federalism
F. Unfunded Mandates
G. Taking of Private Property
H. Civil Justice Reform
I. Protection of Children
J. Indian Tribal Governments
K. Energy Effects
L. Technical Standards
M. Environment
I. Public Participation and Request for
Comments
The Coast Guard views public
participation as essential to effective
rulemaking and will consider all
comments and material received during
the comment period. Your comment can
help shape the outcome of this
rulemaking. If you submit a comment,
please include the docket number for
this rulemaking, indicate the specific
section of this document to which each
comment applies, and provide a reason
for each suggestion or recommendation.
Submitting comments. We encourage
you to submit comments through the
Federal Decision-Making Portal at
www.regulations.gov. To do so, go to
www.regulations.gov, type USCG–2022–
0802 in the search box and click
‘‘Search.’’ Next, look for this document
in the Search Results column, and click
on it. Then click on the Comment
option. If you cannot submit your
material by using www.regulations.gov,
call or email the persons in the FOR
FURTHER INFORMATION CONTACT section of
this proposed rule for alternate
instructions.
Viewing material in docket. To view
documents mentioned in this proposed
rule as being available in the docket,
find the docket as described in the
previous paragraph, and then select
‘‘Supporting & Related Material’’ in the
Document Type column. Public
PO 00000
Frm 00002
Fmt 4701
Sfmt 4702
comments will also be placed in our
online docket and can be viewed by
following instructions on the
www.regulations.gov Frequently Asked
Questions (FAQ) web page. That FAQ
page also explains how to subscribe for
email alerts that will notify you when
comments are posted or if a final rule is
published. We review all comments
received, but we will only post
comments that address the topic of the
proposed rule. We may choose not to
post off-topic, inappropriate, or
duplicate comments that we receive.
Personal information. We accept
anonymous comments. Comments we
post to www.regulations.gov will
include any personal information you
have provided. For more about privacy
and submissions to the docket in
response to this document, see the
Department of Homeland Security’s
eRulemaking System of Records notice
(85 FR 14226, March 11, 2020).
Public meeting. We do not plan to
hold a public meeting, but we will
consider doing so if we determine from
public comments that a meeting would
be helpful. We would issue a separate
Federal Register notice to announce the
date, time, and location of such a
meeting.
II. Abbreviations
AMSC Area Maritime Security Committees
BLS Bureau of Labor Statistics
CEA Council of Economic Advisors
CFR Code of Federal Regulations
CGCSO Coast Guard Cyber Strategic
Outlook
CG–CVC Coast Guard Office of Commercial
Vessel Compliance
CGCYBER U.S. Coast Guard Cyber
Command
CG–ENG Coast Guard Office of Design and
Engineering Standards
CG–FAC Coast Guard Office of Port and
Facility Compliance
CIRCIA Cyber Incident Reporting for
Critical Infrastructure Act of 2022
CISA Cybersecurity and Infrastructure
Security Agency
COTP Captain of the Port
CPG Cybersecurity Performance Goal
CRM Cyber risk management
CSF Cybersecurity framework
CSRC Computer Secure Resource Center
CySO Cybersecurity officer
DHS Department of Homeland Security
FR Federal Register
FSA Facility security assessment
FSP Facility security plan
HMI Human-machine interface
ICR Information collection request
IEc Industrial Economics, Incorporated
IMO International Maritime Organization
IP internet protocol
IRFA Initial Regulatory Flexibility analysis
ISM International Safety Management
IT Information technology
KEV Known exploited vulnerability
MCAAG Maritime Cybersecurity
Assessment and Annex Guide
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
MISLE Marine Information for Safety and
Law Enforcement
MODU Mobile offshore drilling unit
MSC Marine Safety Center
MSC–FAL International Maritime
Organization’s Marine Safety Committee
and Facilitation Committee
MTS Marine transportation system
MTSA Maritime Transportation Security
Act of 2002
NAICS North American Industry
Classification System
NIST National Institute of Standards and
Technology
NMSAC National Maritime Security
Advisory Committee
NPRM Notice of proposed rulemaking
NRC National Response Center
NVIC Navigation and Vessel Inspection
Circular
OCMI Officer in Charge, Marine Inspection
OCS Outer continental shelf
OEWS Occupational Employment and
Wage Statistics
OMB Office of Management and Budget
OSV Offshore supply vessel
OT Operational technology
PII Personally identifiable information
QCEW Quarterly Census of Employment
and Wages
RIA Regulatory impact analysis
§ Section
SBA Small Business Administration
SME Subject matter expert
SMS Safety management system
TSI Transportation security incident
U.S.C. United States Code
VSA Vessel security assessment
VSP Vessel security plan
lotter on DSK11XQN23PROD with PROPOSALS2
III. Basis and Purpose
A. The Problem We Seek To Address
The maritime industry is undergoing
a significant transformation that
involves increased use of cyberconnected systems. While these systems
improve commercial vessel and port
facility operations, they also bring a new
set of challenges affecting design,
operations, safety, security, training,
and the workforce.
Every day, malicious actors
(including, but not limited to,
individuals, groups, and adversary
nations posing a threat) attempt
unauthorized access to control system
devices or networks using various
communication channels. An example
of a successful attempt occurred in May
2021, when the Colonial Pipeline
Company suffered a cyber-attack that
disrupted the supply of fuel to the east
coast of the United States. These
cybersecurity threats require the
maritime community to effectively
manage constantly changing risks to
create a safer cyber environment.
The purpose of this notice of
proposed rulemaking (NPRM) is to
safeguard the marine transportation
system (MTS) against current and
emerging threats associated with
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
cybersecurity by adding minimum
cybersecurity requirements to part 101
of title 33 of the Code of Federal
Regulations (CFR) to help detect,
respond to, and recover from
cybersecurity risks that may cause
transportation security incidents (TSIs).
This proposed rule would help address
current and emerging cybersecurity
threats to maritime security in the MTS.
Cybersecurity risks result from
vulnerabilities in the operation of vital
systems, which increase the likelihood
of cyber-attacks on facilities, Outer
Continental Shelf (OCS) facilities, and
vessels. Cyber-related risks to the
maritime domain are threats to the
critical infrastructure that citizens and
companies depend on to fulfill their
daily needs. Additionally, the proposed
rule is necessary because it would create
a regulatory environment for
cybersecurity in the maritime domain to
assist facilities, OCS facilities, and
vessel firms that may not have taken
cybersecurity measures on their own,
for various reasons. In a 2018 report by
the Council of Economic Advisors
(CEA), the CEA stated ‘‘[a] firm with
weak cybersecurity imposes negative
externalities on its customers,
employees, and other firms, tied to it
through partnerships and supply chain
relations. In the presence of
externalities, firms would rationally
underinvest in cybersecurity relative to
the socially optimal level. Therefore, it
often falls to regulators to devise a series
of penalties and incentives to increase
the level of investment to the desired
level.’’ 1
In the report, the CEA also
emphasized that ‘‘[c]ontinued
cooperation between the public and
private sectors is the key to effectively
managing cybersecurity risks. . . . The
government is likewise important in
incentivizing cyber protection—for
example, by disseminating new
cybersecurity standards, sharing best
practices, conducting basic research on
cybersecurity, protecting critical
infrastructures, preparing future
employees for the cybersecurity
workforce, and enforcing the rule of law
in cyberspace.’’ 2
Furthermore, the CEA acknowledged
that ‘‘[f]irms and private individuals are
often outmatched by sophisticated cyber
adversaries. Even large firms with
substantial resources committed to
cybersecurity may be helpless against
1 Economic Report of the President Together with
the Annual Report of the Council of Economic
Advisers (Feb. 2018), https://www.govinfo.gov/
content/pkg/ERP-2018/pdf/ERP-2018.pdf (accessed
Dec. 15, 2023). Page 323–324.
2 Id. at 324–325.
PO 00000
Frm 00003
Fmt 4701
Sfmt 4702
13405
attacks by sophisticated nation-states.’’ 3
As an example, the CEA stated, ‘‘firms
that own critical infrastructure assets,
such as parts of the nation’s power grid,
may generate pervasive negative
spillover effects for the wider
economy.’’ 4
Lastly, the CEA stated another
problem that exists in the marketplace
is, ‘‘firms’ reluctance to share
information on cyber threats and
exposures’’, which ‘‘impairs effective
cybersecurity.’’ 5 The CEA further stated
that ‘‘firms remain reluctant to increase
their exposure to legal and public affairs
risks. The lack of information on
cyberattacks and data breaches suffered
by other firms may cause less
sophisticated small firms to conclude
that cybersecurity risk is not a pressing
problem. . . . [T]he lack of data may be
stymying the ability of law enforcement
and other actors to respond quickly and
effectively and may be slowing the
development of the cyber insurance
market.’’ 6
This proposed rule would apply to
the owners and operators of U.S.-flagged
vessels subject to 33 CFR part 104
(Maritime Security: Vessels), facilities
subject to 33 CFR part 105 (Maritime
Security: Facilities), and OCS facilities
subject to 33 CFR part 106 (Marine
Security: Outer Continental Shelf (OCS)
Facilities). The proposed requirements
include account security measures,
device security measures, data security
measures, governance and training, risk
management, supply chain
management, resilience, network
segmentation, reporting, and physical
security.
This NPRM also seeks public
comments specifically on defining a
reportable cyber incident in 33 CFR
101.615 and using that term to limit
reporting requirements; whether certain
reports required under proposed
§§ 101.620 and 101.650 should be sent
to the Cybersecurity and Infrastructure
Security Agency (CISA); and whether to
amend the definition of hazardous
condition in 33 CFR part 160. We will
consider comments on these three
issues in deciding whether to amend the
regulatory text we have proposed.
The Coast Guard welcomes comments
on all aspects of this rulemaking,
including the proposed changes to
definitions and the assumptions and
estimates in section VI.A., Regulatory
Planning and Review. Section VI.A. of
this preamble addresses, for instance,
developing a Cybersecurity Plan and
3 Id.
at 326.
at 326.
5 Id. at 326.
6 Id. at 326.
4 Id.
E:\FR\FM\22FEP2.SGM
22FEP2
13406
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
cybersecurity drill components, the
affected population, device security
measures, supply chain management,
network segmentation, physical
security, implementing and maintaining
multifactor authentication, and owners
and operators’ existing practices on the
proposed cybersecurity measures.
lotter on DSK11XQN23PROD with PROPOSALS2
B. Recent Legislation, Regulations, and
Policy
In the Maritime Transportation
Security Act of 2002 (MTSA),7 Congress
provided a framework for the Secretary
of Homeland Security (‘‘Secretary’’),
acting through the Coast Guard,8 and
maritime industry to identify, assess,
and prevent TSIs in the MTS. MTSA
vested the Secretary with authorities for
broad security assessment, planning,
prevention, and response activities to
address TSIs, including the authority to
require and set standards for Facility
Security Plans (FSPs), OCS FSPs, and
Vessel Security Plans (VSPs), to review
and approve such plans, and to conduct
inspections and take enforcement
actions.9 The Coast Guard’s
implementing regulations address a
range of considerations to deter TSIs to
the maximum extent practicable,10 and
require, among other general and
specific measures, security assessments
and measures related to radio and
telecommunication systems, including
computer systems and networks.11
The Coast Guard has also issued
additional guidance and policies to
address potential cyber incidents in
FSPs, OCS FSPs, and VSPs,12 including
a cybersecurity risk assessment model
that was issued in January 2023,13 and
7 Public Law 107–295, 116 Stat. 2064, November
25, 2002.
8 The Secretary delegated this authority to the
Commandant of the Coast Guard via Department of
Homeland Security (DHS) Delegation
00170.1(II)(97)(b), Revision No. 01.3.
9 See generally, for example, 46 U.S.C. 70103.
10 See 46 U.S.C. 70103(c)(1).
11 See, for example, 33 CFR 104.300(d)(11),
104.305(d)(2)(v), 105.300(d)(11), 105.305(c)(1)(v),
106.300(d)(11), 106.305(c)(1)(v), and
106.305(d)(2)(v).
12 One of the Coast Guard’s guidance documents
is the Navigation and Vessel Inspection Circular
(NVIC) 01–20, Guidelines for Addressing Cyber
Risks at Maritime Transportation Security Act
Regulated Facilities (85 FR 16108). This NVIC
outlined Coast Guard’s view on requirements for
FSPs and facility security, including cybersecurity.
A similar understanding with regard to VSPs was
expressed in the Coast Guard’s Office of
Commercial Vessel Compliance’s (CG–CVC) Vessel
CRM Work Instruction CVC–WI–027(2), Vessel
Cyber Risk Management Work Instruction, October
27, 2020, https://www.dco.uscg.mil/Portals/9/CVCWI-27%282%29.pdf, accessed July 18, 2023.
13 See Maritime Cybersecurity Assessment and
Annex Guide (MCAAG) (January 2023), https://
dco.uscg.mil/Portals/9/CG-FAC/Documents/
Maritime%20Cyber%20Assessment
%20%20Annex%20Guide%20(MCAAG)_
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
voluntary guidance issued to Area
Maritime Security Committees (AMSC)
in July 2023.14 Congress has repeatedly
reaffirmed the MTSA framework,
including through amendments passed
in 2016,15 2018,16 and 2021.17 In the
2018 amendments, Congress amended
MTSA to specifically require VSPs and
FSPs to include provisions for detecting,
responding to, and recovering from
cybersecurity risks that may cause
TSIs.18 The proposed regulatory
amendments to 33 CFR part 101 reflect
the Coast Guard’s view on cybersecurity
under MTSA, including, but not limited
to, recent amendments to MTSA (such
as Title 46 of the United States Code
(U.S.C.) Section 70103). The proposed
amendments provide more detailed
mandatory baseline requirements for
U.S.-flagged vessels and U.S. facilities
subject to MTSA.
Through three administrations,
presidential policy has advanced
cybersecurity in the maritime domain.
Executive Order 13636 of February 12,
2013 (Improving Critical Infrastructure
Cybersecurity) recognized the Federal
Government’s efforts to secure our
nation’s critical infrastructure by
working with the owners and operators
of U.S. facilities, OCS facilities, and
U.S.-flagged vessels to prepare for,
prevent, mitigate, and respond to
cybersecurity threats.19
To defend against malicious cyberrelated activities, Executive Order 13694
of April 1, 2015 (Blocking the Property
of Certain Persons Engaging in
Significant Malicious Cyber-Enabled
Activities) recognized malicious cyberrelated activities as an ‘‘extraordinary
threat to the national security, foreign
policy, and economy of the United
States,’’ warranting a national
emergency.20 The National Emergency
with Respect to Significant Malicious
released%2023JAN2023.pdf, accessed Aug. 4, 2023.
The MCAAG was developed in coordination with
the National Maritime Security Advisory
Committee, AMSCs, and other maritime
stakeholders. The guide serves as a resource for
baseline cybersecurity assessments and plan
development and helps stakeholders address
vulnerabilities that could lead to transportation
security incidents.
14 NVIC 09–02, Change 6.
15 Public Law 114–120, 130 Stat. 27, February 8,
2016.
16 Public Law 115–254, 132 Stat. 3186, October 5,
2018.
17 Public Law 116–283, 134 Stat. 4754, January 1,
2021.
18 See Public Law 115–254, sec. 1805(d)(2)
(codified at 46 U.S.C. 70103(c)(3)(C)).
19 78 FR 11739, February 19, 2013.
20 80 FR 18077, April 2, 2015. Executive Order
13694 was later amended by Executive Order 13757
(82 FR 1, January 3, 2017), which outlined
additional measures the Federal Government must
take to address the national emergency identified in
Executive Order 13694.
PO 00000
Frm 00004
Fmt 4701
Sfmt 4702
Cyber-Enabled Activities has been
extended as of March 30, 2023.21
Executive Order 14028 of May 12,
2021 (Improving the Nation’s
Cybersecurity) also recognized that ‘‘the
private sector must adapt to the
continuously changing threat
environment, ensure its products are
built and operate securely, and partner
with the Federal Government to foster a
more secure cyberspace.’’ 22
On July 28, 2021, the President issued
the ‘‘National Security Memorandum on
Improving Cybersecurity for Critical
Infrastructure Control Systems,’’ 23
which required the Secretary of
Homeland Security to coordinate with
the Secretary of Commerce (through the
Director of the National Institute of
Standards and Technology (NIST)) and
other agencies, as appropriate, to
develop baseline Cybersecurity
Performance Goals (CPGs). These
baseline CPGs would further a common
understanding of the baseline security
practices that critical infrastructure
owners and operators should follow to
protect national and economic security,
as well as public health and safety.
CISA’s release of the CPGs in October
2022 was ‘‘intended to help establish a
common set of fundamental
cybersecurity practices for critical
infrastructure, and especially help
small- and medium-sized organizations
kickstart their cybersecurity efforts.’’ 24
The Coast Guard relied on CISA’s CPGs
as the benchmark for technical
requirements in this proposed rule.
In 2021, the Coast Guard published its
Cyber Strategic Outlook (CGCSO) to
highlight the importance of managing
cybersecurity risks in the MTS.25 The
CGCSO highlighted three lines of effort,
or priorities, to improve Coast Guard
readiness in cyberspace: (1) Defend and
Operate the Coast Guard Enterprise
Mission Platform; (2) Protect the MTS;
and (3) Operate in and through
Cyberspace.26 As outlined in the
21 88
FR 19209, March 30, 2023.
FR 26633.
23 The White House, National Security
Memorandum on Improving Cybersecurity for
Critical Infrastructure Control Systems, July 28,
2021, https://www.whitehouse.gov/briefing-room/
statements-releases/2021/07/28/national-securitymemorandum-on-improving-cybersecurity-forcritical-infrastructure-control-systems/, last
accessed on July 24, 2023.
24 CISA, ‘‘Cross-Sector Cybersecurity Performance
Goals,’’ https://www.cisa.gov/cross-sectorcybersecurity-performance-goals, accessed July 18,
2023.
25 U.S. Coast Guard, ‘‘Cyber Strategic Outlook,’’
August 2021, https://www.uscg.mil/Portals/0/
Images/cyber/2021-Cyber-Strategic-Outlook.pdf,
accessed July 18, 2023.
26 These lines of effort evolved from the three
‘‘strategic priorities’’ introduced in the Coast
Guard’s Cyber Strategy, June 2015. As cyber threats
22 86
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
CGCSO’s second line of effort, ‘‘Protect
the MTS,’’ the Coast Guard proposes to
implement a risk-based regulatory,
compliance, and assessment regime. We
propose to establish minimum
requirements for cybersecurity plans
that facilitate the use of international
and industry-recognized cybersecurity
standards to manage cybersecurity risks
by owners and operators of maritime
critical infrastructure.27 Specifically,
this proposed rule would promulgate
the Coast Guard’s baseline cybersecurity
regulations for U.S.-flagged vessels and
U.S. facilities (including OCS facilities)
subject to MTSA.
As noted, in January 2023, the Coast
Guard released the Maritime
Cybersecurity Assessment and Annex
Guide (MCAAG). The MCAAG was
developed through coordination with
the National Maritime Security
Advisory Committee, Area Maritime
Security Committees, and other
maritime stakeholders, consistent with
the activities described in section 2(e) of
the National Institute of Standards and
Technology Act (15 U.S.C. 272(e)). The
MCAAG provides more detailed
recommendations on implementing
existing MTSA regulations as they relate
to computer systems and networks. For
example, the Coast Guard recommended
a Cyber Annex Template for
stakeholders to address possible
cybersecurity vulnerabilities and risks.
This NPRM is meant to expand and
clarify the information required in
security plans to remain consistent with
46 U.S.C. 70103(c)(3), including section
70103(c)(3)(C)(v), which requires FSPs,
OCS FSPs, and VSPs to include
provisions for detecting, responding to,
and recovering from cybersecurity risks
that may cause TSIs. Some terms we use
in the MCAAG, such as cybersecurity
vulnerability, may have a set proposed
definition in this NPRM.
lotter on DSK11XQN23PROD with PROPOSALS2
C. Legal Authority To Address This
Problem
The Coast Guard is proposing to
promulgate these regulations under 43
and vulnerabilities evolve, so will the Coast Guard’s
posture. https://www.dco.uscg.mil/Portals/10/
Cyber/Docs/CG_Cyber_Strategy.pdf?ver=nejX4g9g
QdBG29cX1HwFdA%3D%3D, accessed July 18,
2023.
27 The Coast Guard is aware that some entities
already follow industry standards related to
cybersecurity. The proposed minimum
requirements seek to establish a common baseline
for all the regulated vessels and facilities that would
not be incompatible with such standards,
recognizing that in some instances these proposed
minimums may increase a requirement, but in other
circumstances will already be satisfied. The entity
would be able to indicate within their Cyber Plan
that they are following a particular standard and
highlight how their compliance with that standard
satisfies the Coast Guard requirements.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
U.S.C. 1333(d); 46 U.S.C. 3306, 3703,
70102 through 70104, 70124; and the
Department of Homeland Security
(DHS) Delegation No. 00170, Revision
No. 01.3.
Section 4 of the Outer Continental
Shelf Lands Act of 1953, codified as
amended at 43 U.S.C. 1333(d),
authorizes the Secretary to promulgate
regulations with respect to lights and
other warning devices, safety
equipment, and other matters relating to
the promotion of safety of life and
property on the artificial islands,
installations, and other devices on the
OCS. This authority was delegated to
the Coast Guard by DHS Delegation No.
00170(II)(90), Revision No. 01.3.
Section 3306 of Title 46 of the United
States Code authorizes the Secretary to
prescribe necessary regulations for the
design, construction, alteration, repair,
equipping, manning and operation of
vessels and prevention and mitigation of
damage to the marine environment,
propulsion machinery, auxiliary
machinery, boilers, unfired pressure
vessels, piping, electric installations,
and accommodations for passengers and
crew. This authority was delegated to
the Coast Guard by DHS Delegation No.
00170(II)(92)(b), Revision No. 01.3.
Section 3703 of Title 46 of the United
States Code authorizes the Secretary to
prescribe similar regulations relating to
tank vessels that carry liquid bulk
dangerous cargoes, including the design,
construction, alteration, repair,
maintenance, operation, equipping,
personnel qualification, and manning of
the vessels. This authority was
delegated to the Coast Guard by DHS
Delegation No. 00170(II)(92)(b),
Revision No. 01.3.
Sections 70102 through 70104 of Title
46 of the United States Code authorize
the Secretary to evaluate for compliance
vessel and facility vulnerability
assessments, security plans, and
response plans. Section 70124
authorizes the Secretary to promulgate
regulations to implement Chapter 701,
including sections 70102 through
70104, dealing with vulnerability
assessments for the security of vessels,
facilities, and OCS facilities; VSPs,
FSPs, and OCS FSPs; and response
plans for vessels, facilities, and OCS
facilities. These authorities were
delegated to the Coast Guard by DHS
Delegation No. 00170(II)(97)(a) through
(c), Revision No. 01.3.
IV. Background
A. The Current State of Cybersecurity in
the MTS
The maritime industry is relying
increasingly on digital solutions for
PO 00000
Frm 00005
Fmt 4701
Sfmt 4702
13407
operational optimization, cost savings,
safety improvements, and more
sustainable business. However, these
developments, to a large extent, rely on
information technology (IT) systems and
operational technology (OT) systems,
which increases potential cyber
vulnerabilities and risks. Cybersecurity
risks result from vulnerabilities in
secure and safe operation of vital
systems, which increase the likelihood
of cyber-attacks on U.S. facilities, OCS
facilities, and U.S.-flagged vessels.
Cyber-attacks on public infrastructure
have raised awareness of the need to
protect systems and equipment that
facilitate operations within the MTS
because cyber-attacks have the potential
to disable the IT and OT onboard U.S.flagged vessels, U.S. facilities, and OCS
facilities. Autonomous vessel
technology, automated OT, and
remotely operated machines provide
further opportunities for cyber-attackers.
These systems and equipment are prime
targets for cyber-attacks stemming from
insider threats, criminal organizations,
nation state actors, and others.
Also, the MTS has become
increasingly susceptible to cyber-attacks
due to the growing integration of digital
technologies in their operations. These
types of cyber-attacks can range from
altering a vessel’s navigational systems
to disrupting its communication with
ports, which can lead to delays,
accidents, or even potential groundings
that could potentially disrupt vessel
movements and shut down port
operations, such as loading and
unloading cargo. This disruption can
also negatively affect the MTS by
interrupting the transportation and
commerce of goods, raw resources, and
passengers, as well as potential military
operations when needed.
An attack that compromises
navigational or operational systems can
pose a serious safety risk. It could result
in accidents at sea, potential
environmental disasters like oil spills,
and loss of life. The maritime industry
is not immune to ransomware attacks
where cybercriminals are targeting
critical systems or data. Given the
critical nature of marine transportation
to global trade, continued efforts are
being made to improve cybersecurity
measures in the sector.
Maritime stakeholders can better
detect, respond to, and recover from
cybersecurity risks that may cause TSIs
by adopting a range of cyber risk
management (CRM) measures, as
described in this proposed rule. It is
important that the Coast Guard work
with the maritime community to
address both safety and security risks to
better facilitate operations and to protect
E:\FR\FM\22FEP2.SGM
22FEP2
13408
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
MTS entities from creating hazardous
conditions within ports and waterways.
Updating regulations to include
minimum cybersecurity requirements
would strengthen the security posture
and increase resilience against
cybersecurity threats in the MTS.
In 2017, the International Maritime
Organization (IMO) took steps to
address cybersecurity risks in the
shipping industry by publishing the
Marine Safety Committee/Facilitation
Committee (MSC–FAL) Circular 3,
Guidelines on Maritime Cyber Risk
Management,28 and MSC Resolution
428(98).29 The IMO affirmed that an
approved Safety Management System
(SMS) should involve CRM to manage
cybersecurity risks in accordance with
the objectives and functional
requirements of the International Safety
Management (ISM) Code. An SMS is a
structured and documented set of
procedures enabling company and
vessel personnel to effectively
implement safety and environmental
protection policies that are specific to
that company or vessel.
For applicable U.S.-flagged vessels,
this proposed rule would establish a
baseline level of protection throughout
the MTSA-regulated vessel fleet. As the
flag state, the Coast Guard can ensure
these proposed cybersecurity
regulations are implemented
appropriately by approving
Cybersecurity Plans and conducting
routine inspections. This proposed rule
would also apply to U.S. facilities
regulated by 33 CFR part 105 and OCS
facilities regulated by 33 CFR part 106.
lotter on DSK11XQN23PROD with PROPOSALS2
B. Current Regulations Related to
Cybersecurity
The MTSA-implementing regulations
in 33 CFR parts 101, 103, 104, 105, and
106 give the Coast Guard the authority
to review and approve security
assessments and plans that apply
broadly to the various security threats
facing the maritime industry. Through
the Navigation and Vessel Inspection
Circular (NVIC) 01–20 30 (85 FR 16108,
March 20, 2020), the Coast Guard
interpreted 33 CFR parts 105 and 106 as
requiring owners and operators of U.S.
facilities and OCS facilities to address
28 https://www.cdn.imo.org/localresources/en/
OurWork/Facilitation/Facilitation/MSC-FAL.1Circ.3-Rev.1%20-%20Guidelines
%20On%20Maritime%20Cyber
%20Risk%20Management%20(Secretariat).pdf,
accessed July 18, 2023.
29 See the IMO resolution on CRM: Resolution
MSC.428(98), Annex 10, ‘‘Maritime Cyber Risk
Management in Safety Management Systems.’’
https://wwwcdn.imo.org/localresources/en/
OurWork/Security/Documents/Resolution
%20MSC.428(98).pdf, accessed July 18, 2023.
30 See footnote 12.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
cybersecurity in their facility security
assessments (FSAs) and OCS FSAs, as
well as in their FSPs and OCS FSPs, and
provided non-binding guidance on how
regulated entities could address these
issues.
This proposed rule would expand
upon the agency’s prior actions by
establishing minimum performancebased cybersecurity requirements for the
MTS within the MTSA regulations.
Similar to the existing requirements in
33 CFR parts 104, 105 and 106, the
Coast Guard would allow owners and
operators the flexibility to determine the
best way to implement and comply with
these new requirements. The Coast
Guard is proposing an implementation
period of 12 to 18 months following the
effective date of a final rule to allow
sufficient time for the owners and
operators of applicable U.S.-flagged
vessels, U.S. facilities, and OCS
facilities to comply with the
requirements of this proposed rule.31
Section 101.600—Purpose
This proposed section states that the
purpose of 33 CFR part 101, subpart F,
is to set minimum cybersecurity
requirements for U.S.-flagged vessels,
U.S. facilities, and OCS facilities to
safeguard and ensure the security and
resilience of the MTS. The proposed
requirements would help safeguard the
MTS from the evolving risks of cyber
threats and align with the DHS goal of
protecting critical U.S. infrastructure.
Section 101.605—Applicability
This section proposes to make subpart
F apply to the owners and operators of
the U.S.-flagged vessels listed in 33 CFR
104.105(a), the facilities listed in 33 CFR
105.105(a), and the OCS facilities listed
in 33 CFR 106.105(a). A list of the
vessels that would be subject to subpart
F is as follows:
• U.S. Mobile Offshore Drilling Units
(MODUs), cargo vessels, or passenger
vessels subject to the International
Convention for Safety of Life at Sea,
V. Discussion of Proposed Rule
1974, (SOLAS), Chapter XI–1 or Chapter
This NPRM proposes to add
XI–2;
minimum cybersecurity requirements to
• Self-propelled U.S. cargo vessels
33 CFR part 101. The Coast Guard
greater than 100 gross register tons
invites comment on whether any of the
subject to 46 CFR chapter I, subchapter
proposed requirements would overlap,
I, except commercial fishing vessels
conflict, or duplicate existing regulatory inspected under 46 CFR part 105;
requirements from other Federal
• U.S. vessels subject to 46 CFR
agencies. The requirements would
chapter I, subchapter L;
consist of the following sections:
• U.S. passenger vessels subject to 46
CFR chapter I, subchapter H;
• 101.600 Purpose
• U.S. passenger vessels certificated
• 101.605 Applicability
• 101.610 Federalism
to carry more than 150 passengers;
• 101.615 Definitions
• U.S. passenger vessels carrying
• 101.620 Owner or Operator
more than 12 passengers, including at
• 101.625 Cybersecurity Officer
least 1 passenger-for-hire, that are
• 101.630 Cybersecurity Plan
engaged on an international voyage;
• 101.635 Drills and Exercises
• U.S. barges subject to 46 CFR
• 101.640 Records and Documentation
chapter I, subchapter D or O;
• 101.645 Communications
• U.S. barges carrying certain
• 101.650 Cybersecurity Measures
dangerous cargo in bulk or barges that
• 101.655 Cybersecurity Compliance Dates
are subject to 46 CFR chapter I,
• 101.660 Cybersecurity Compliance
Documentation
subchapter I, that are engaged on an
• 101.665 Noncompliance, Waivers, and
international voyage;
Equivalents
• U.S. tankships subject to 46 CFR
chapter I, subchapter D or O; and
In addition, the Coast Guard seeks
• U.S. towing vessels greater than 8
comments on whether, in this
meters (26 feet) in registered length
rulemaking, we should: define the term
reportable cyber incident in proposed 33 inspected under 46 CFR subchapter M
that are engaged in towing a barge or
CFR 101.615 and use that term in the
barges and subject to 33 CFR part 104,
regulatory text to limit cyber incidents
except a towing vessel that—
that trigger reporting requirements;
Æ Temporarily assists another vessel
require certain reports identified in
engaged in towing a barge or barges
§§ 101.620 and 101.650 to be sent to
subject to 33 CFR part 104;
CISA; and amend the definition of
Æ Shifts a barge or barges subject to
hazardous condition in 33 CFR 160.202.
this part at a facility or within a fleeting
A section-by-section explanation of
facility;
the proposed additions and changes
Æ Assists sections of a tow through a
follows:
lock; or
Æ Provides emergency assistance.
31 Existing general requirements to address cyber
This proposed rule would not apply
issues in security plans will continue to apply
to any foreign-flagged vessels subject to
during this rulemaking.
PO 00000
Frm 00006
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
33 CFR part 104. Cyber regulations for
foreign-flagged vessels under domestic
law may create unintended
consequences with the ongoing and
future diplomatic efforts to address
maritime cybersecurity in the
international arena. The IMO addressed
cybersecurity measures for foreignflagged vessels through MSC–FAL.1/
Circ.3 and MSC Resolution 428(98).
Therefore, based on IMO guidelines and
recommendations, an SMS approved
under the ISM Code should address
foreign-flagged vessel cybersecurity.
In addition, the Coast Guard verifies
how CRM is incorporated into a vessel’s
SMS via the process described in the
October 27, 2020, CVC–WI–027(2),
Vessel Cyber Risk Management Work
Instruction.32 This process would
continue to be the Coast Guard’s
primary means of ensuring
cybersecurity readiness on foreignflagged vessels, which are exempt from
this proposed rule.
If your facility or vessel would be
subject to this proposed rule and you
view a portion of it as redundant with
the requirements of another Federal
agency, please let us know. We seek to
eliminate any unnecessary
redundancies.
lotter on DSK11XQN23PROD with PROPOSALS2
Section 101.610—Federalism
We discuss the purpose and contents
of this proposed section in section VI.E,
Federalism, in this preamble.
Section 101.615—Definitions
This section lists new cybersecurity
related definitions the Coast Guard
proposes to include in 33 CFR part 101,
in addition to the maritime security
definitions in 33 CFR 101.105. These
definitions explain concepts relevant to
cybersecurity and would help eliminate
uncertainty in referencing and using
these terms in 33 CFR part 101.
The Coast Guard consulted several
authoritative sources for these proposed
new definitions. These sources include
Executive Order 14028, 6 U.S.C. 148,
and the James M. Inhofe National
Defense Authorization Act for Fiscal
Year 2023 (the Act).33
Another source for definitions is the
‘‘Vocabulary’’ page on CISA’s National
Initiative for Cybersecurity Careers and
Studies website,34 which is an online
Federal resource for cybersecurity
training and education. The Coast Guard
also reviewed NIST’s Computer Security
32 See
footnote 12.
33 Public Law 117–263, Sec. 11224(a)(1) (2022).
34 National Initiative for Cybersecurity Careers
and Studies, Explore Terms: A Glossary of Common
Cybersecurity Words and Phrases, https://
niccs.cisa.gov/cybersecurity-career-resources/
glossary, accessed September 15, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Resource Center (CSRC).35 NIST
maintains CSRC to educate the public
on computer security, cybersecurity,
information security, and privacy.
Definitions from CISA and NIST are
authoritative sources in areas related to
technology and cybersecurity.
In addition, the Coast Guard proposes
to define the term cybersecurity risk
consistent with the definition at section
2200 of the Homeland Security Act of
2002 (Pub. L. 107–296), as amended, see
6 U.S.C. 650(7). The Coast Guard notes,
however, that it does not believe
paragraph (b) of subsection 2200(7),
which contains an exception for actions
that solely involve a ‘‘violation of a
consumer term of service or a consumer
licensing agreement’’ is relevant to the
facilities and vessels that are the subject
of this rulemaking. Nevertheless, for
consistency with the definition found in
the Homeland Security Act and the sake
of completeness, we have elected to
include the complete definition in this
proposal. See also 46 U.S.C. 70101(2);
Public Law 115–254, sec. 1805(b)(2).
The Coast Guard proposes to include
definitions for Cyber incident, Cyber
risk, Cyber threat, and Cybersecurity
vulnerability. Cyber incident would
relate to Information Systems and
would be inclusive of both Information
Technology and Operational
Technology, all of which the Coast
Guard is also proposing to define. The
Coast Guard also proposes new defined
terms that are applicable to maritime
cybersecurity, including Critical
Information Technology or Operational
Technology systems, Cyber Incident
Response Plan, Cybersecurity Officer or
CySO, and Cybersecurity Plan. A CySO,
for example, would be the person(s)
responsible for developing,
implementing, and maintaining
cybersecurity portions of the VSP, FSP,
or OCS FSP. The CySO would also act
as a liaison with the Captain of the Port
(COTP) and company, vessel, and
facility security officers.
In addition, the Coast Guard
welcomes comments on whether we
should define and use the term
Reportable cyber incident. The proposed
definition of a reportable cyber incident
would be based on the Cyber Incident
Reporting Council’s model definition in
DHS’s Report to Congress of September
19, 2023.36 If adopted, the term
reportable cyber incident would replace
35 CSRC, https://csrc.nist.gov/glossary, accessed
September 15, 2023.
36 See DHS Office of Strategy, Policy, and Plans,
Harmonization of Cyber Incident Reporting to the
Federal Government (Sept. 19, 2023), https://
www.dhs.gov/publication/harmonization-cyberincident-reporting-federal-government, accessed
Sept. 19, 2023.
PO 00000
Frm 00007
Fmt 4701
Sfmt 4702
13409
cyber incident in proposed
§§ 101.620(b)(7) and 101.650(g)(1).
Specifically, a reportable cyber incident
would mean an incident that leads to,
or, if still under investigation, could
reasonably lead to any of the following:
(1) Substantial loss of confidentiality,
integrity, or availability of a covered
information system, network, or OT
system;
(2) Disruption or significant adverse
impact on the reporting entity’s ability
to engage in business operations or
deliver goods or services, including
those that have a potential for
significant impact on public health or
safety or may cause serious injury or
death;
(3) Disclosure or unauthorized access
directly or indirectly of non-public
personal information of a significant
number of individuals;
(4) Other potential operational
disruption to critical infrastructure
systems or assets; or
(5) Incidents that otherwise may lead
to a TSI as defined in 33 CFR 101.105.
The Coast Guard’s existing regulations
in 33 CFR part 101 require regulated
entities to report suspicious activity that
may result in a TSI, breaches of security,
and TSIs involving computer systems
and networks. See 33 CFR 101.305. The
purpose of defining a reportable cyber
incident in this NPRM is to establish a
threshold between the cyber incidents
that must be reported and the ones that
do not. We request public comment on
the substance of this definition, its
elements, potential burden on industry,
as well as the need and effectiveness of
including it in this regulation. We also
invite comments on whether we should
define any terms we use in the proposed
rule that are not defined in proposed
§ 101.615.
In this NPRM, the Coast Guard is also
seeking comments on two alternative
potential regulatory measures for
reporting cyber incidents. In the first
alternative, the Coast Guard would
require that reportable cyber incidents
would be reported to the National
Response Center (NRC) without delay to
the telephone number listed in 33 CFR
101.305(a). Cyber incidents with no
physical or pollution effects could also
be reported directly to CISA via report@
cisa.gov or 1–888–282–0870. All such
reports would be shared between the
NRC and CISA Central and satisfy the
requirement to report to the Coast
Guard.
In the second alternative, the Coast
Guard seeks comments on whether it
should require that reportable cyber
incidents be reported to CISA. While
this alternative would be a change from
current practice, it could allow more
E:\FR\FM\22FEP2.SGM
22FEP2
13410
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
efficient use of DHS’ cybersecurity
resources and may advance the
cybersecurity vision laid out by
Congress in the Cyber Incident
Reporting for Critical Infrastructure Act
of 2022 (CIRCIA), which will be
implemented by regulations that are still
under development. Information
submitted to CISA would be shared
with the Coast Guard, ensuring
continued efficient responses.
If we were to use either alternative, to
the extent that the reporting obligation
imposed by this NPRM constitutes a
requirement to report ‘‘substantially
similar information . . . within a
substantially similar timeframe’’ when
compared to a rule implementing
CIRCIA, covered entities may be
excused from any duplicative reporting
obligations under the CIRCIA
rulemaking.37 In line with that
provision, we invite your comments on
whether we should expressly require
reporting of ransom payments in
connection with ransomware attacks.
We request comment on whether we
should use either of these two
alternatives in a final rule.
Section 101.620—Owner or Operator
This proposed section would require
each owner and operator of a U.S.flagged vessel, facility, or OCS facility to
assign qualified personnel to develop a
Cybersecurity Plan and ensure the
Cybersecurity Plan incorporates detailed
preparation, prevention, and response
activities for cybersecurity threats and
vulnerabilities.
Additional responsibilities of owners
and operators of U.S.-flagged vessels,
facilities, and OCS facilities would
include:
• Designating a CySO, in writing, by
name and title, and identifying how the
CySO can be contacted at any time. A
CySO would have to be accessible to the
Coast Guard 24 hours a day, 7 days a
week (see proposed § 101.620(b)(3));
• Ensuring that a Cybersecurity
Assessment is conducted annually or
sooner, under the circumstances
described in this NPRM (see proposed
§§ 101.620(b)(4) and 101.650(e)(1));
• Ensuring that a Cybersecurity Plan
is developed and submitted for Coast
Guard approval, either as a separate
document or as an addition to an
existing FSP, VSP, or OCS FSP (see
proposed §§ 101.620(b)(1) and
101.630(a));
• Operating the U.S.-flagged vessel,
facility, or OCS facility in accordance
37 See
6 U.S.C. 681b(a)(5)(B) (exception to
reporting requirements for certain substantially
similar reporting requirements ‘‘where the Agency
has an agreement in place that satisfies the
requirements of section 681g(a) of this title’’).
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
with the approved Cybersecurity Plan
(see proposed § 101.620(b)(5)); and
• Reporting all cyber incidents,
including TSIs, to the NRC and relevant
authorities according to the
Cybersecurity Plan (see proposed
§§ 101.305 and 101.620(b)(7)).
Section 101.625—Cybersecurity Officer
The CySO may be a full-time,
collateral, or contracted position. The
same person may serve as the CySO for
more than one vessel, facility, or OCS
facility. The CySO would need to have
general knowledge of a range of issues
relating to cybersecurity, such as
cybersecurity administration, relevant
laws and regulations, current threats
and trends, risk assessments,
inspections, control procedures, and
procedures for conducting exercises and
drills. When considering assignment of
the CySO role to the existing security
officer, the owner or operator should
consider the depth and scope of these
new responsibilities in addition to
existing security duties.
The most important duties a CySO
would perform include ensuring
development, implementation, and
finalization of a Cybersecurity Plan;
auditing and updating the Plan;
ensuring adequate training of personnel;
and ensuring the U.S.-flagged vessel,
facility, or OCS facility is operating in
accordance with the Plan and in
continuous compliance with this
subpart. The CySO would have the
authority to assign cybersecurity duties
to other personnel; however, the CySO
would remain responsible for the
performance of these duties.
Section 101.630—Cybersecurity Plan
This proposed section contains
minimum requirements for the
Cybersecurity Plan. The Cybersecurity
Plan would be maintained consistent
with the recordkeeping requirements in
33 CFR 104.235 for vessels, 33 CFR
105.225 for facilities, and 33 CFR
106.230 for OCS facilities. See proposed
§ 101.640. A Cybersecurity Plan would
incorporate the results of a
Cybersecurity Assessment and consider
the recommended measures appropriate
for the U.S.-flagged vessel, facility, or
OCS facility. A Cybersecurity Plan
could be combined with or complement
an existing FSP, VSP, or OCS FSP. A
Cybersecurity Plan could be kept in an
electronic format if it can be protected
from being deleted, destroyed,
overwritten, accessed, or disclosed
without authorization.
The format of a Cybersecurity Plan
required under this proposed rule
would include the following individual
sections:
PO 00000
Frm 00008
Fmt 4701
Sfmt 4702
(1) Cybersecurity organization and
identity of the CySO (see proposed
§ 101.625 Cybersecurity Officer);
(2) Personnel training (see proposed
§ 101.625(d)(8), (9) Cybersecurity
Officer);
(3) Drills and exercises (see proposed
§ 101.635 Drills and Exercises);
(4) Records and documentation (see
proposed § 101.640 Records and
Documentation);
(5) Communications (see proposed
§ 101.645 Communications);
(6) Cybersecurity systems and
equipment with associated
maintenance; (see proposed
§ 101.650(e)(3) Cybersecurity Measures:
Routine Maintenance);
(7) Cybersecurity measures for access
control, including computer, IT, and OT
areas (see proposed § 101.650(a)
Cybersecurity Measures: Account
Measures);
(8) Physical security controls for IT
and OT systems (see proposed
§ 101.650(i) Cybersecurity Measures:
Physical Security);
(9) Cybersecurity measures for
monitoring (see proposed § 101.650(f)
Cybersecurity Measures: Supply Chain;
(h) Network Segmentation; (i) Physical
Security);
(10) Audits and amendments to the
Cybersecurity Plan (see proposed
§ 101.630(f) Cybersecurity Plan: Audits);
(11) Cybersecurity audit and
inspection reports to include
documentation of resolution or
mitigation of all identified
vulnerabilities (see proposed
§ 101.650(e) Cybersecurity Measures:
Risk Management);
(12) Documentation of all identified
unresolved vulnerabilities to include
those that are intentionally unresolved
due to risk acceptance by the owner or
operator (see proposed § 101.650(e)
Cybersecurity Measures: Risk
Management);
(13) Cyber incident reporting
procedures in accordance with part 101
of this subchapter (see proposed
§ 101.650(g) Cybersecurity Measures:
Resilience); and
(14) Cybersecurity Assessment (see
proposed § 101.650(e) Cybersecurity
Measures: Risk Management).
Depending on operational conditions
and cybersecurity risks, the owner or
operator may develop a Cyber Incident
Response Plan as a separate document
or as an addition to the Cybersecurity
Plan.
Submission and Approval of the
Cybersecurity Plan
An owner or operator would submit a
Cybersecurity Plan for review to the
cognizant COTP or the Officer in
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Charge, Marine Inspections (OCMI) for
U.S. facilities and OCS facilities, or to
the U.S. Coast Guard’s Marine Safety
Center (MSC) for U.S.-flagged vessels.
See proposed § 101.630(d). A letter
certifying that the Plan meets the
requirements of this subpart must
accompany the submission. Once the
COTP or MSC finds that the Plan meets
the cybersecurity requirements in
§ 101.630, they would send a letter to
the owner or operator approving the
Cybersecurity Plan or approving the
Plan under certain conditions.
If the cognizant COTP, OCMI, or MSC
requires additional time to review the
Plan, they would have the authority to
return a written acknowledgement to
the owner or operator stating that the
Coast Guard will review the
Cybersecurity Plan submitted for
approval, and that the U.S.-flagged
vessel, facility, or OCS facility may
continue to operate as long as it remains
in compliance with the submitted
Cybersecurity Plan. See proposed
§ 101.630(d)(1)(iv).
If the COTP, OCMI, or MSC finds that
the Cybersecurity Plan does not meet
the requirements in § 101.630, the Plan
would be returned to the owner or
operator with a letter explaining why
the Plan did not meet the requirements.
The owner or operator will have at least
60 days to amend the Plan and cure
deficiencies outlined in the letter. Until
the amendments are approved, the
owner or operator must ensure
temporary cybersecurity measures are
implemented to the satisfaction of the
Coast Guard. See proposed
§ 101.630(e)(1)(ii).
Deficiencies would have to be
corrected, and the Plan would have to
be resubmitted for approval within the
time period specified in the letter. If the
owner or operator fails to cure those
deficiencies within 60 days, the Plan
would be declared noncompliant with
these proposed regulations and other
relevant regulations in title 33 of the
CFR. If the owner or operator disagrees
with the deficiency determination, they
would have the right to appeal or
submit a petition for reconsideration or
review to the respective COTP, District
Commander, OCMI, or MSC per
§ 101.420.
Under proposed § 101.650(e)(1), a
cybersecurity assessment would have to
be conducted when one or both of the
following situations occurs:
• There is a change in ownership of
a U.S.-flagged vessel, facility, or an OCS
facility; or
• There are major amendments to the
Cybersecurity Plan.
Each owner or operator would
determine what constitutes a ‘‘major
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
amendment’’ as appropriate for their
organization based on types of changes
to their security measures and
operational risks. When submitting
proposed amendments to the Coast
Guard, either after a cybersecurity
assessment or at other times, you would
not be required to submit the
Cybersecurity Plan with the proposed
amendment. Under § 101.630(f)(1), the
CySO must ensure that an audit of the
Cybersecurity Plan and its
implementation is performed annually,
beginning no later than 1 year from the
initial date of approval. Additional
audits would need to be conducted if
there is a change in ownership or
modifications of cybersecurity
measures, but such audits may be
limited to sections of the Plan affected
by the modification. See proposed
§ 101.630(f)(2) and (3). Those
conducting an internal audit must have
a level of knowledge and independence
specified in § 101.630(f)(4). Under
§ 101.630(f)(5), if the results of the audit
require the Cybersecurity Plan to be
amended, the CySO must submit the
proposed amendments to the Coast
Guard for review within 30 days of
completing the audit.
Section 101.635—Drills and Exercises
Under this proposed section,
cybersecurity drills and exercises would
be required to test the proficiency of
U.S.-flagged vessel, facility, and OCS
facility personnel in assigned
cybersecurity duties and in the effective
implementation of the VSP, FSP, OCS
FSP, and Cybersecurity Plan. Drills and
exercises would also enable the CySO to
identify any related cybersecurity
deficiencies that need to be addressed.
Cybersecurity drills would generally
test an operational response of at least
one specific element of the
Cybersecurity Plan, as determined by
the CySO, such as access control for a
critical IT or OT system, or network
scanning. A drill would be required at
least once every 3 months and may be
held in conjunction with other drills, if
appropriate.
Cybersecurity exercises are a full test
of an organization’s cybersecurity
regime and would include substantial
and active participation of cybersecurity
personnel. The participants may include
local, State, and Federal Government
personnel. Cybersecurity exercises
would generally test and evaluate the
organizational capacity to manage a
combination of elements in the
Cybersecurity Plan, such as detecting,
responding to, and mitigating a cyber
incident.
The exercises would be required at
least once each calendar year, with no
PO 00000
Frm 00009
Fmt 4701
Sfmt 4702
13411
more than 18 months between exercises.
Exercises may be specific to a facility,
OCS facility, or a U.S.-flagged vessel, or
may serve as part of a cooperative
exercise program or port exercises. The
exercises for the Cybersecurity Plans
could be combined with other required
security exercises, if appropriate.
The proposed drill or exercise
requirements specified in this section
may be satisfied by implementing
cybersecurity measures required by the
VSP, FSP, OCS FSP, and Cybersecurity
Plan after a cyber incident, as long as
the vessel, facility, or OCS facility
achieves and documents the drill and
exercise goals for the cognizant COTP or
MSC. Any corrective action must be
addressed and documented as soon as
possible.
Section 101.640—Records and
Documentation
This proposed section would require
owners and operators to follow the
recordkeeping requirements in 33 CFR
104.235 for vessels, 33 CFR 105.225 for
facilities, and 33 CFR 106.230 for OCS
facilities. For example, records must be
kept for at least 2 years and be made
available to the Coast Guard upon
request. The records can be kept in
paper or electronic format and must be
protected against unauthorized access,
deletion, destruction, amendment, and
disclosure. Records that each vessel,
facility, or OCS facility keep would vary
because each organization would
maintain records specific to their
operations. At a minimum, the records
would have to capture the following
activities: training, drills, exercises,
cybersecurity threats, incidents, and
audits of the Cybersecurity Plan as set
forth in the cited recordkeeping
requirements above and made
applicable to records under this subpart
per § 101.640.
Section 101.645—Communications
This proposed section would require
the CySO to maintain an effective means
of communication to convey changes in
cybersecurity conditions to the
personnel of the U.S.-flagged vessel,
facility, or OCS facility. In addition, the
CySO is required to maintain an
effective and continuous means of
communicating with their security
personnel, U.S.-flagged vessels
interfacing with the facility or OCS
facility, the cognizant COTP, and
national and local authorities with
security responsibilities.
Section 101.650—Cybersecurity
Measures
This section proposes specific
cybersecurity measures to identify risks,
E:\FR\FM\22FEP2.SGM
22FEP2
13412
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
detect threats and vulnerabilities,
protect critical systems, and recover
from cyber incidents. Any intentional
gaps in cybersecurity measures would
be documented as accepted risks under
proposed § 101.630(c)(12). If the owner
or operator is unable to comply with the
requirements of this subpart, they may
seek a waiver or an equivalence
determination under proposed
§ 101.665.
A discussion of each component of
proposed § 101.650 follows.
lotter on DSK11XQN23PROD with PROPOSALS2
Section 101.650 Paragraph (a): Account
Security Measures
This paragraph would identify
minimum account measures to protect
critical IT and OT systems from
unauthorized cyber access and limit the
risk of a cyber incident. Access control
is a foundational category and is
highlighted as a ‘‘Protect’’ function of
NIST’s Cybersecurity Framework
(CSF).38 Existing regulations in
§§ 104.265, 105.255 through 105.260,
and 106.260 through 106.265 prescribe
control measures to limit access to
restricted areas and detect unauthorized
introduction of devices capable of
damaging U.S.-flagged vessels, U.S.
facilities, OCS facilities, or ports. This
proposed provision is derived from
NIST’s standards mentioned earlier for
the cyber domain and establish
minimum account security measures to
manage credentials and secure access to
critical IT and OT systems. We invite
your comments on the minimal
requirements proposed in § 101.650(a).
Account security measures for
cybersecurity would include lockouts
on repeated failed login attempts,
password requirements, multifactor
authentication, applying the principle of
least privilege to administrator or
otherwise privileged accounts, and
removing credentials of personnel no
longer associated with the organization.
Numerous consensus standards that are
generally accepted employ similar
requirements.39 Together, these
provisions would mitigate the risks of
brute force attacks, unauthorized access,
and privilege escalation. The owner or
operator would be responsible for
implementing and managing these
account security measures, including
ensuring that user credentials are
removed or revoked when a user leaves
the organization. The CySO would
ensure documentation of such measures
in Section 7 of the Cybersecurity Plan.
38 NIST CSF, www.nist.gov/cyberframework/
protect, accessed July 18, 2023.
39 See, for example, NIST CSF: PR.AC, CIS
Controls 1, 12, 15, 16, and COBIT DSS05.04,
DSS05.10, DSS06.10, and ISA 62443–2–1.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Section 101.650 Paragraph (b): Device
Security Measures
This paragraph would provide
specific proposed requirements to
mitigate risks and vulnerabilities in
critical IT and OT systems and
equipment. With increased connectivity
to public internet, networks on U.S.flagged vessels, U.S. facilities, and OCS
facilities have an expansive attack
surface. These provisions would reduce
the risks of unauthorized access,
malware introduction, and service
interruption. This paragraph would
apply the ‘‘Identify’’ function of the
NIST CSF.40 Existing regulations in 33
CFR 104.265, 105.255 through 105.260,
and 106.260 through 106.265 are
similar. For example, § 105.260 limits
access to areas that require a higher
degree of protection.
Proposed paragraph (b) would also
require owners and operators to
designate critical IT and OT systems.41
Developing and maintaining an accurate
inventory and network map would
reduce the risk of unknown or
improperly managed assets. The
Cybersecurity Plan would also govern
device management. The CySO would
maintain the network map and develop
and maintain the list of approved
hardware, software, and firmware. In
addition to identifying risks, these
provisions would aid in the proper
lifecycle management of assets,
including patching and end-of-life
management. These requirements are
foundational to many industry
consensus standards and would
reinforce Coast Guard regulations to
protect communication networks.
Section 101.650 Paragraph (c): Data
Security Measures
This paragraph would prescribe
fundamental data security measures that
40 NIST CSF; Identify, ‘‘NIST Cybersecurity
Publication by Category,’’ Asset Management
ID.AM, updated May 3, 2021, www.nist.gov/
cyberframework/identify, accessed July 18, 2023.
NIST Special Publication 800–53, Revision 5,
‘‘Security and Privacy Controls for Information
Systems and Organizations,’’ September 2020, page
107, https://doi.org/10.6028/NIST.SP.800-53r5,
accessed August 24, 2023.
41 To help CySOs identify which systems are
critical, the Coast Guard’s Office of Port and Facility
Compliance (CG–FAC) has published maritime
specific CSF profiles on its homepage at
www.dco.uscg.mil/Our-Organization/AssistantCommandant-for-Prevention-Policy-CG–5P/
Inspections-Compliance-CG–5PC-/Office-of-PortFacility-Compliance/Domestic-Ports-Division/
cybersecurity/, accessed July 18, 2023 and in pages
20 through 24 of Appendix A, Maritime Bulk
Liquid Transfer Profile at https://view.officeapps.
live.com/op/view.aspx?src=https%3A%2F
%2Fwww.dco.uscg.mil%2FPortals%2F9%2FCGFAC%2FDocuments%2FCyber%2520Profiles
%2520Overview.docx%3Fver%3D2018-01-10143126-467&wdOrigin=BROWSELINK, accessed
July 18, 2023.
PO 00000
Frm 00010
Fmt 4701
Sfmt 4702
stem from the ‘‘Protect’’ function of the
NIST CSF. Data security measures
protect personnel, financial, and
operational data and are consistent with
basic risk management activities of the
maritime industry. The IMO recognizes
the importance of risk management
related to data security on U.S.-flagged
vessels,42 and the Coast Guard
previously highlighted data security
measures in its policy for MTSAregulated U.S. facilities.43
Data security measures prevent data
loss and aid in detection of malicious
activity on critical IT and OT systems.
The fundamental measures proposed
here would establish baseline
protections upon which owners and
operators could build. This paragraph
would require data logs to be securely
captured, stored, and protected so that
they are accessible only by privileged
users, and would require encryption for
data in transit and data at rest. CySOs
would rely on generally accepted
industry standards and risk
management principles to determine the
suitability of specific encryption
algorithms for certain purposes, such as
protecting critical IT and OT data with
a more robust algorithm than for routine
data.44 A CySO would establish more
detailed data security policies in
Section 9 of the Cybersecurity Plan.
Those policies would be adapted to the
unique operations of the U.S.-flagged
vessel, facility, or OCS facility.
Section 101.650 Paragraph (d):
Cybersecurity Training for Personnel
This paragraph would specify
proposed cybersecurity training
requirements. Security training is a vital
aspect of the MTSA. Relevant
provisions in 33 CFR already require all
personnel to have knowledge, through
training or equivalent job experience, in
the ‘‘Recognition and detection of
dangerous . . . devices.’’ 45 Since 2020,
the Coast Guard has interpreted this
requirement to include relevant
cybersecurity training.46 While formal
42 MSC–FAL.1/Circ.3/Rev.1: ‘‘Implement risk
control processes and measures, and contingency
planning to protect against a cyber-event and ensure
continuity of shipping operations.’’
43 NVIC 01–20 at page 2: ‘‘Each facility should
also determine how, and where, its data is stored
and, if it is stored offsite, whether the data has a
critical link to the safety and/or security functions
of the facility. If such a critical link exists, the
facility should address any vulnerabilities . . . . ’’
44 See, for example, ISA 62443–3–3, CIS CSC 13,
14 in the EDM NIST Cybersecurity Framework
Crosswalks, available at www.cisa.gov/sites/default/
files/publications/4_NIST_CSF_EDM_Crosswalk_
v3_April_2020.pdf, accessed July 18, 2023.
45 33 CFR 104.225(c) (Vessels), 105.215(c)
(Facilities), and 106.220(c) (OCS Facilities).
46 NVIC 01–20 ENCL(1) at page 3: ‘‘Describe how
cybersecurity is included as part of personnel
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
training may be appropriate, the Coast
Guard is not proposing to mandate a
format of training. However, the training
would have to, at minimum, cover
relevant provisions of the Cybersecurity
Plan to include recognizing, detecting,
and preventing cybersecurity threats;
and reporting cyber incidents to the
CySO.
The types of training would also need
to be consistent with the roles and
responsibilities of personnel, including
access to critical IT and OT systems and
operating network-connected
machineries. Key cybersecurity
personnel and management would need
to have current knowledge of threats to
deal with potential cyber-attacks and
understand procedures for responding
to a cyber incident. The owner,
operator, or CySO would ensure all
personnel designated by the CySO
complete the core training within 5 days
of gaining system access, but no later
than 30 days after hiring, and annually
thereafter, and that key personnel
receive specialized training annually or
more frequently as needed. Existing
personnel would be required to receive
training on relevant provisions of the
Cybersecurity Plan within 60 days of the
Plan being approved, and for all other
required training within 180 days of the
effective date of a final rule, and
annually thereafter. (See
§ 101.650(d)(3)).
Section 101.650 Paragraph (e): Risk
Management
This paragraph would establish three
levels of Cybersecurity Assessment and
risk management: (1) conducting annual
Cybersecurity Assessments; (2)
completing penetration testing upon
renewal of a VSP, FSP, or OCS FSP; and
(3) ensuring ongoing routine system
maintenance. The CySO would ensure
that these activities, which are listed in
Sections 11 and 12 of the Cybersecurity
Plan, are documented and completed.
Following a Cybersecurity
Assessment, the CySO would
incorporate feedback from the
assessment into the Cybersecurity Plan
through an amendment to the Plan. A
Cybersecurity Assessment would be
conducted within 1 year from the
effective date of a final rule and
annually thereafter. The Assessment
must be conducted sooner than
annually in the following
circumstances:
• There is a change in ownership of
a U.S.-flagged vessel, facility, or an OCS
facility; or
training, policies, and procedures, and how this
material will be kept current and monitored for
effectiveness.’’
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
• There are major events requiring
amendments to the Cybersecurity Plan.
While Cybersecurity Assessments
provide a valuable picture of potential
security weaknesses, penetration tests
can add additional context by
demonstrating whether malicious actors
could leverage those weaknesses.
Penetration tests can also help prioritize
resources based on what poses the most
risk. Routine system maintenance
requires an ongoing effort to identify
vulnerabilities and would include
scanning and reviewing known
exploited vulnerabilities (KEVs) by
documenting, tracking, and monitoring
them. These proposed provisions would
mirror the security system and
equipment maintenance requirements in
33 CFR 104.260 for vessels, 33 CFR
105.250 for facilities, and 33 CFR
106.255 for OCS facilities, and reflect
the Coast Guard’s longstanding view on
cybersecurity. To improve risk
management across the maritime sector,
CySOs would establish, subject to any
applicable antitrust law limitations,47
information-sharing procedures for their
organizations, which would include
procedures to receive and act on KEVs,
as well as methods for sharing threat
and vulnerability information.
The ‘‘Protect’’ function of the NIST
CSF emphasizes the importance of
strong processes and procedures for
protecting information.48 For example,
organizations would have to ensure
information and records (data) are
managed consistently with the
organization’s risk strategy to protect the
confidentiality, integrity, and
availability of information. Risk
management is key in protecting IT and
OT components that may include
cybersecurity vulnerabilities in their
design, code, or configuration.
Owners and operators may use
information-sharing services or
organizations such as an Information
Sharing and Analysis Center or an
Information Sharing and Analysis
Organization. The Coast Guard would
not endorse specific information-sharing
organizations, so owners and operators
would be free to use informationsharing organizations to suit their
47 The sharing of competitively sensitive
information between or among competitors raises
antitrust concerns. For example, information
sharing is not exempted under the Cybersecurity
Information Sharing Act of 2015 if the information
shared results in price fixing, market allocation,
boycotting, monopolistic conduct, or other
collusive conduct.
48 NIST CSF Internal Controls, Appendix A, Table
A–1, PR.IP–12, page 261, link.springer.com/
content/pdf/bbm:978-1-4842-3060-2/1.pdf, accessed
July 18, 2023.
PO 00000
Frm 00011
Fmt 4701
Sfmt 4702
13413
needs.49 Industry consensus standards
provide generally accepted techniques
that sanitize and reduce attribution to
information to ensure information
sharing does not compromise
proprietary business information.50 In
addition, regardless of the services or
organizations used, owners and
operators should comply with
applicable antitrust laws and should not
share competitively sensitive
information, such as price or cost data,
that can result in unlawful price-fixing,
market allocation, or other forms of
competitor collusion. Use of any
information-sharing services or
organizations would not meet or replace
reporting requirements under 33 CFR
101.305.
The Coast Guard emphasized its
commitment to helping maritime
industry stakeholders identify and
address vulnerabilities in its 2021 Cyber
Trends and Insights in the Marine
Environment report.51 In that report, the
Coast Guard highlighted additional
resources that CySOs should leverage to
manage cybersecurity vulnerabilities.
Section 101.650 Paragraph (f): Supply
Chain
This proposed paragraph would
include provisions to specify measures
to manage cybersecurity risks in the
supply chain. Legitimate third-party
contractors and vendors may
inadvertently provide a means of attack
or vectors that allow malicious actors to
exploit vulnerabilities within the supply
chain. Section 1.1 of the NIST CSF
emphasizes managing cybersecurity
risks in the supply chain as part of the
‘‘Identify’’ function.52
Under this proposed paragraph, the
owner, operator, or CySO would ensure
that measures to manage cybersecurity
risks in the supply chain are in place to
mitigate the risks associated with
external parties. These measures would
include considering cybersecurity
capabilities in selecting vendors,
49 The Coast Guard encourages CySOs to explore
resources through CGCYBER Maritime Cyber
Readiness Branch, available at https://
www.uscg.mil/MaritimeCyber/; see also CISA’s
‘‘Information Sharing and Awareness,’’ available at
https://www.cisa.gov/information-sharing-andawareness, accessed July 18, 2023.
50 See, e.g., NIST Special Publication 800–150,
‘‘Guide to Cyber Threat Information Sharing,’’
Johnson et al., October 2016, nvlpubs.nist.gov/
nistpubs/specialpublications/nist.sp.800-150.pdf,
accessed July 18, 2023.
51 ‘‘2021 Cyber Trends and Insights in the Marine
Environment,’’ August 5, 2022, https://
www.dco.uscg.mil/Portals/9/2021CyberTrends
InsightsMarineEnvironmentReport.pdf.
52 NIST CSF, Version 1.1, ‘‘ID.SC: Supply Chain
Risk Management,’’ https://csf.tools/reference/nistcybersecurity-framework/v1-1/id/id-sc/, accessed
July 18, 2023.
E:\FR\FM\22FEP2.SGM
22FEP2
13414
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
establishing procedures for information
sharing and notifying relevant parties,
and monitoring third-party connections.
Through their contractual agreements,
vendors would ensure the integrity and
security of software and hardware, such
as software releases and updates,
notifications, and mitigations of
vulnerabilities. These provisions would
establish a minimum level of CRM
within the supply chain. Industry
standards provide additional
measures.53 The IMO also recognizes
that cybersecurity risks in the supply
chain, and these provisions would align
with the guidelines and
recommendations referenced in MSC–
FAL Circ. 3/Rev.1.54
Section 101.650 Paragraph (g):
Resilience
This paragraph proposes a few key
activities to ensure that U.S.-flagged
vessels, facilities, and OCS facilities can
recover from major cyber incidents with
minimal impact to critical operations.
Provisions under response and recovery
can help an organization recover from a
cyber-attack and restore capabilities and
services.
This proposed rule would require the
owner, operator, or CySO to ensure the
following response and recovery
activities: report any cyber incidents to
the Coast Guard; develop, implement,
maintain, and exercise the Cyber
Incident Response Plan; periodically
validate the effectiveness of the
Cybersecurity Plan; and perform
backups of critical IT and OT systems.
The Coast Guard would accept review of
a cyber incident as meeting the periodic
validation requirement in § 101.650(g).
In addition, the NIST CSF describes
numerous provisions within the
‘‘Recover’’ function aimed at improving
response and recovery.55 The IMO also
notes resilience.56
lotter on DSK11XQN23PROD with PROPOSALS2
Section 101.650 Paragraph (h): Network
Segmentation
This paragraph would require a CySO
to ensure the network is segmented and
to document those activities in the
Cybersecurity Plan. Network integrity is
a key provision under the ‘‘Protect’’
function of the NIST CSF.57 Network
53 See, for example, NIST Special Publication
800–161, ‘‘Supply Chain Risk Management
Practices for Federal Information Systems and
Organizations,’’ May 2022, https://doi.org/10.6028/
NIST.SP.800-161r1, accessed July 18, 2023.
54 MSC–FAL.1/Circ.3/Rev.1, 2.1.6 and 4.2; see
footnote 28.
55 NIST CSF, Version 1.1 ‘‘RC: Recover,’’ https://
csf.tools/reference/nist-cybersecurity-framework/v11/rc/, accessed July 19, 2023.
56 MSC–FAL Circ. 3/Rev. 1, 3.5.5; see footnote 28.
57 NIST CSF, Version 1.1, ‘‘PR.AC–5: Network
integrity is protected (e.g., network segregation,
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
architectures vary widely based on the
operations of a vessel or facility.
Separating IT and OT networks is
challenging, and it becomes increasingly
difficult with an increase in the various
devices connected to the network.
Network segmentation ensures valuable
information is not shared with
unauthorized users and decreases
damage that can be caused by malicious
actors. Nonetheless, the Coast Guard
recognizes that the IT and OT interface
represents a weak link. Industry
standards in this area are evolving, and
it is an area that NIST continues to
research.58
Section 101.650 Paragraph (i): Physical
Security
This paragraph would specify that,
along with the cybersecurity provisions
proposed for inclusion in this part,
owners, operators, and CySOs would
manage physical access to IT and OT
systems. As described in the ‘‘Protect’’
function of the NIST CSF, physical
security protects critical IT and OT
systems by limiting access to the
human-machine interface (HMI).59
Physical security measures proposed
here would supplement the existing
vessel security assessment (VSA), FSA,
and OCS FSA requirements in 33 CFR
104.270 for vessels, 33 CFR 105.260 for
facilities, and 33 CFR 106.260 for OCS
facilities. Similarly, under this proposed
paragraph, the CySO would designate
areas restricted to authorized personnel
and secure HMIs and other hardware.
Also under this proposed paragraph, the
CySO would establish policies to
restrict the use of unauthorized media
and hardware. These proposed
provisions would mirror existing Coast
Guard policy outlined in NVIC 01–20.60
Section 101.655—Cybersecurity
Compliance Dates
This proposed section would state
that a Cybersecurity Plan as required by
this proposed rule would be made
network segmentation).’’ csf.tools/reference/nistcybersecurity-framework/v1-1/pr/pr-ac/pr-ac-5/,
accessed July 19, 2023.
58 See NIST Special Publication 800–82r3,’’ Guide
to Operational Technology (OT) Security,’’ draft
published April 26, 2022; doi.org/10.6028/
NIST.SP.800-82r3.ipd, accessed July 19, 2023.
59 NIST CSF, Version 1.1, ‘‘PR.AC–2: Physical
Access to Assets is Managed and Protected.’’
csf.tools/reference/nist-cybersecurity-framework/v11/pr/pr-ac/pr-ac-2/, accessed July 19, 2023.
60 NVIC 01–20, enclosure (1), at page 4: ‘‘Security
measures for access control 33 CFR 105.255 and
106.260 Establish security measures to control
access to the facility. This includes cyber systems
that control physical access devices such as gates
and cameras, as well as cyber systems within secure
or restricted areas, such as cargo or industrial
control systems. Describe the security measures for
access control.’’ (85 FR 16108).
PO 00000
Frm 00012
Fmt 4701
Sfmt 4702
available to the Coast Guard for review
during the second annual audit of the
existing, approved VSP, OCS FSP, or
FSP after the effective date of a final
rule, as required by 33 CFR 104.415 for
vessels, 33 CFR 105.415 for facilities,
and 33 CFR 106.415 for OCS facilities.
The intent of this proposed
implementation period is to allow
adequate time for owners and operators
to develop a Cybersecurity Plan.
Section 101.660—Cybersecurity
Compliance Documentation
This proposed section would allow
the Coast Guard to verify an approved
Cybersecurity Plan for U.S.-flagged
vessels, facilities, and OCS facilities.
Each owner or operator would ensure
that the cybersecurity portion of their
Plan and penetration test results are
available to the Coast Guard upon
request.
Section 101.665—Noncompliance,
Waivers, and Equivalents
This proposed section would provide
the opportunity for waiver and
equivalence determinations for owners
and operators when they are unable to
meet the requirements in subpart F, as
outlined in 33 CFR 104.130, 104.135,
105.130, 105.135, and 106.130, to
include the cybersecurity regulations
proposed in this NPRM. It would also
expand temporary permission
provisions in 33 CFR 104.125, 105.125,
and 106.120.
Section 101.670—Severability
This proposed section would reflect
the Coast Guard’s intent that the
provisions of subpart F be considered
severable from each other to the greatest
extent possible. For instance, if a court
of competent jurisdiction were to hold
that the rule or a portion thereof may
not be applied to a particular owner or
operator or in a particular circumstance,
the Coast Guard would intend for the
court to leave the remainder of the rule
in place with respect to all other
covered persons and circumstances. The
inclusion of a severability clause in
subpart F would not be intended to
imply a position on severability in other
Coast Guard regulations.
Inviting Comments on Regulatory
Harmonization
As noted by the Office of the National
Cyber Director in an August 2023
Request for Information,61 the National
Cybersecurity Strategy 62 calls for
61 See
88 FR 55694 (Aug. 16, 2023).
The White House, National Cybersecurity
Strategy (Mar. 2023), https://www.whitehouse.gov/
wp-content/uploads/2023/03/National62 See
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
establishing cybersecurity regulations to
secure critical infrastructure where
existing measures are insufficient,
harmonizing 63 and streamlining new
and existing regulations, and enabling
regulated entities to afford to achieve
security.
The Coast Guard emphasizes its
commitment to regulatory
harmonization and streamlining, and
notes that this proposed rule, which is
grounded in NIST’s Framework for
Improving Critical Infrastructure
Cybersecurity, NIST’s standards and
best practices, and CISA’s CPGs, is
consistent with such priorities. The
Coast Guard also acknowledges the
ongoing rulemakings of other DHS
components, including ongoing
rulemakings on cybersecurity in surface
transportation modes 64 and
implementation of CIRCIA.65 The Coast
Guard notes potential differences in
terminology and policy as compared to
those rulemakings; although the Coast
Guard views such differences as
intentional and based on sector-specific
distinctions, we welcome comments on
opportunities to harmonize and
streamline regulations where feasible
and appropriate. Note that proposed
§ 101.665, Noncompliance, Waivers,
and Equivalents, could offer
stakeholders an option for requesting
compliance that is harmonized with
similar requirements.
lotter on DSK11XQN23PROD with PROPOSALS2
Cybersecurity-Strategy-2023.pdf. (accessed Sept. 19,
2023).
63 As used in this context, ‘‘harmonization’’ refers
to a common set of updated baseline regulatory
requirements that would apply across sectors.
Sector regulators such as the Coast Guard may
appropriately go beyond the harmonized baseline to
address cybersecurity risks specific to their sectors.
See 88 FR at 55694.
64 See TSA, Fall 2023 Unified Agenda, RIN 1652–
AA74: Enhancing Surface Cyber Risk Management,
https://www.reginfo.gov/public/do/
eAgendaViewRule?pubId=202310&RIN=1652-AA74
(accessed Jan. 19, 2024).
65 See CISA, Fall 2023 Unified Agenda, RIN
1670–AA04: Cybersecurity Incident Reporting for
Critical Infrastructure Act Regulations, https://
www.reginfo.gov/public/do/eAgendaViewRule?
pubId=202310&RIN=1670-AA04 (accessed Jan. 19,
2024).
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Inviting Comments on Whether To
Amend 33 CFR 160.202—Definitions
The Coast Guard invites comments on
whether we should amend the
definition of hazardous condition in 33
CFR 160.202 to help address current
and emerging cybersecurity threats to
the MTS. The amendment would likely
add ‘‘cyber incident (as defined in
§ 101.615 of this chapter),’’ to other
existing examples of hazardous
conditions—such as collision, allision,
fire, explosion, grounding, leaking,
damage, and personnel injury. Although
a hazardous condition as currently
defined can already involve a cyber
incident, this amendment would clearly
link the definition of a hazardous
condition to the concept of a cyber
incident.
Under 33 CFR 160.216, the owner,
agent, master, operator, or person in
charge of a vessel must immediately
notify the Coast Guard of certain
hazardous conditions. A hazardous
condition either on board the vessel or
caused by the vessel or its operation
would be reported by the vessels listed
in 33 CFR 160.203. Under the existing
regulations, this reporting requirement
already applies to U.S. commercial
service vessels and all foreign vessels
that are bound for or departing from
ports or places within the navigable
waters of the United States.
If we amend the definition of
hazardous condition in § 160.202, we
would consider a cyber incident report
under part 160 satisfied by those subject
to 33 CFR part 101, subpart F, who
report the incident consistent with
§ 101.620(b)(7). Given the variety of
hazardous conditions, for response
purposes, it is best that such conditions
be reported to the nearest Coast Guard
Sector Office or Group Office. The Coast
Guard would ensure that such officials
are advised of relevant cyber incidents
reported by vessels subject to 33 CFR
part 101, subpart F.
VI. Regulatory Analyses
We developed this proposed rule after
considering numerous statutes and
PO 00000
Frm 00013
Fmt 4701
Sfmt 4702
13415
Executive orders related to rulemaking.
A summary of our analyses based on
these statutes or Executive orders
follows.
A. Regulatory Planning and Review
Executive Order 12866 (Regulatory
Planning and Review), as amended by
Executive Order 14094 (Modernizing
Regulatory Review), and Executive
Order 13563 (Improving Regulation and
Regulatory Review), direct agencies to
assess the costs and benefits of available
regulatory alternatives and, if regulation
is necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health and safety
effects, distributive impacts, and
equity). Executive Order 13563
emphasizes the importance of
quantifying costs and benefits, reducing
costs, harmonizing rules, and promoting
flexibility.
This proposed rule is a significant
regulatory action under section 3(f) of
Executive Order 12866, as amended by
Executive Order 14094, but it is not
significant under section 3(f)(1) because
its annual effects on the economy do not
exceed $200 million in any year of the
analysis. Accordingly, OMB has
reviewed this proposed rule. A
regulatory impact analysis (RIA)
follows.
In accordance with OMB Circular A–
4 (available at www.whitehouse.gov/
omb/circulars/), we have prepared an
accounting statement showing the
classification of impacts associated with
this proposed rule.66
Agency/Program Office: U.S. Coast
Guard.
Rule Title: Cybersecurity in the
Marine Transportation System.
RIN#: 1625–AC77.
Date: July 2023 (millions, 2022
dollars).
BILLING CODE
66 The version of Circular A–4 issued November
9, 2023, is not effective until March 24, 2024.
Therefore, this new version does not apply to this
NPRM because this proposed rule was submitted to
OIRA on November 13, 2023.
E:\FR\FM\22FEP2.SGM
22FEP2
13416
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 1: 0MB Circular A-4 Accounting Statement Categorizing Impacts for the
Cybersecurity in the Marine Transportation System NPRM
Minimum
Estimate
Benefits
Primary
Estimate
Category
-
Annualiz.ed monetized
benefits ($ Mil)
High Estimate
7%
7%
3%
3%
7%
RA
3%
Annualiz.ed quantified,
but unmonctizcd, benefits
RA
Reduce the risk of cybcr incidents through enhanced
detection and correction of vulnerabilities in IT and OT
systems. Improve mitigation for the impacted entity and
downstream economic oarticioanls if an incident occurs.
Improve protection of MTS firm and customer data to
protect business operations, build consumer trust, and
oromote increased commerce in the U.S. economv.
Unquantifiable,
qualitative Benefits
Source
RA
Improve the minimum standard for cybersecurity to protect
the MTS and avoid supply chain disruptions, which is vital
to the U.S. economv and U.S. national securitv.
Costs
Annualiz.ed monetized
costs($ Mil)
$80.1
7%
7%
$79.4
3%
3%
Annualized quantified,
but unmonetized. costs
Qualitative (unquantified) costs
7%
3%
RA
RA
None
RA
The unquantifiable costs of this proposed rule would be
associated with the cyber risk mitigation actions identified as
a result ofthis NPRM. These actions may involve changes
lo Uie physical security of hardware and physical access
ports, network segmentation, the data space and encryption
required for data backups and data logging measures,
disabling applications running executable code, any
necessary future software or hardware upgrades in addition
lo U1e incompatibility between older and newer software, and
correcting vulnerabilities or issues identified during the
implementation of Uris proposed rule.
RA
Transfers
Annualiz.ed monetized
transfers: "on bude:et"
From whom to whom?
Annualized monetized
transfers: "off-budget"
From whom to whom?
NIA
NIA
NIA
RA
RA
NIA
NIA
NIA
NIA
NIA
NIA
NIA
Miscellaneous Analyses/Category
Effects on Tribal, Stale,
and/or local, governments
Effects on growih
Not measured
lotter on DSK11XQN23PROD with PROPOSALS2
The Coast Guard proposes to update
its maritime security regulations by
17:33 Feb 21, 2024
Jkt 262001
adding minimum cybersecurity
requirements to 33 CFR part 101 for
PO 00000
Frm 00014
Fmt 4701
Sfmt 4702
RA/IRFA
U.S.-flagged vessels subject to part 104,
facilities subject to part 105, and OCS
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.000
Effects on wages
We conducted an initial Regulatory Flexibility analysis
(TRFA) and estimate lhal this proposed rule may have a
significant economic impact on a substantial number of small
entities.
None
Effects on small
businesses
VerDate Sep<11>2014
None
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
facilities subject to part 106.
Specifically, this proposed rule would
require owners or operators of U.S.flagged vessels, facilities, and OCS
facilities to develop an effective
Cybersecurity Plan, which includes
actions to prepare for, prevent, and
respond to threats and vulnerabilities.
One of these actions is to assign
qualified personnel to implement the
Cybersecurity Plan and all activities
within the Plan. The Cybersecurity Plan
would include: designating a CySO;
conducting a Cybersecurity Assessment;
developing and submitting the Plan to
the Coast Guard for approval; operating
a U.S.-flagged vessel, facility, and OCS
facility in accordance with the Plan;
implementing security measures based
on new cybersecurity vulnerabilities;
and reporting cyber incidents to the
NRC, as defined in this preamble.
This proposed rule would further
require owners and operators of U.S.flagged vessels, U.S. facilities, and OCS
facilities to perform cybersecurity drills
and exercises in accordance with their
VSP, FSP, and OCS FSP. Owners and
operators of U.S.-flagged vessels,
facilities, and OCS facilities would also
be required to maintain records of
cybersecurity related information in
paper or electronic format.
Lastly, this proposed rule would
require certain cybersecurity measures
to identify risks, detect threats and
vulnerabilities, protect critical systems,
and to recover from cyber incidents.
These measures include account
security measures, device security
measures, data security measures,
cybersecurity training for personnel,
risk management, supply chain risk
measures, penetration testing, resilience
measures, network segmentation, and
physical security.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Baseline Summary
The Coast Guard is not codifying
existing guidance in this NPRM. The
requirements of this proposed rule and
the costs and benefits we estimate in
this RIA would be new. The Coast
Guard drafted the requirements of this
proposed rule based on NIST’s
Framework for Improving Critical
Infrastructure Cybersecurity, NIST’s
standards and best practices, and CISA’s
CPGs.
In February 2020, the Coast Guard
issued NVIC 01–20, which provided
clarity and guidance for MTSAregulated facility and OCS facility
owners and operators regarding existing
requirements in the MTSA for computer
systems and network vulnerabilities.
However, the NVIC does not contain
cybersecurity requirements for facility
and OCS facility owners. Furthermore,
the NVIC does not address the topic of
cybersecurity for vessel owners and
operators.
The IMO has issued other guidance
on Cybersecurity in the past 6 years. In
2017, the IMO adopted resolution
MSC.428(98) to the ISM Code on
‘‘Maritime Cyber Risk Management in
Safety Management Systems (SMS).’’
Generally, this resolution states that an
SMS should consider CRM and
encourages Administrations to
appropriately address cyber risks in an
SMS by a certain date, in accordance
with the ISM Code. In 2022, the IMO
provided further guidance on maritime
CRM in MSC–FAL.1/Circ.3–Rev.2,
Guidelines on Maritime Cyber Risk
Management, in an effort to raise the
awareness about cybersecurity risks.
In addition, survey data indicates that
some portions of the affected population
of facility and OCS facility owners and
operators are already implementing
cybersecurity measures consistent with
PO 00000
Frm 00015
Fmt 4701
Sfmt 4702
13417
select provisions of the proposed rule,
including 87 percent who have
implemented account security
measures, 83 percent who have
implemented multifactor
authentication, 25 percent who have
implemented annual cybersecurity
training, and 68 percent who conduct
penetration tests.67 While we lack
similar data on cybersecurity activities
in the affected population of U.S.flagged vessels, we acknowledge that it
is likely that many owners and
operators have implemented
cybersecurity measures in response to
private incentives and increasing
cybersecurity risks over time. For the
purposes of this analysis, however, we
assume that owners and operators have
no baseline cybersecurity activity, in the
areas in which we lack data.
Estimated Costs of the Proposed Rule
We estimate the total discounted costs
of this proposed rule to industry and the
Federal Government to be
approximately $562,740,969 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$80,121,654, using a 7-percent discount
rate. See table 2.
BILLING CODE
67 In this analysis, the Coast Guard references a
survey conducted by Jones Walker, a limited
liability partnership (Jones Walker LLP). The title
of the survey is ‘‘Ports and Terminals Cybersecurity
Survey,’’ which they conducted in 2022. This
survey helped the Coast Guard to gain an
understanding of the cybersecurity measures that
are currently in place at facilities and OCS facilities
in the United States. We cite relevant data from the
survey when calculating industry costs throughout
the regulatory analysis. Readers can access the
survey at https://www.joneswalker.com/en/insights/
2022-Jones-Walker-LLP-Ports-and-TerminalsCybersecurity-Survey-Report.html; accessed July 19,
2023.
E:\FR\FM\22FEP2.SGM
22FEP2
13418
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 2: Total Estimated Costs of the Proposed Rule to Industry and Government
(2022 Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
1
Facility and
OCS Facility U.S.-flagged Government
Vessel Costs
Total Costs
Costs
Costs
$351,638
$87,434,474
$33 469 773 $53,613,063
2
$37 053 260
$54,116,840
$16,921,067 $108,091,167
$94,411,011
$101,886,292
3
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$59,913,465
$67,168,260
4
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$55,993,893
$65,211,903
5
$30 859 773
$40.389.851
$2 146 947
$73.396.571
$52.330.741
$63.312.527
6
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$48,907,234
$61,468,473
7
$25,788,807
$49,425,867
$4,301,574
$79,516,248
$49,518,723
$64,653,986
8
$30 859 773
$40.389.851
$2 146 947
$73.396.571
$42.717.473
$57.939.931
9
$30 859 773
$40.389.851
$2 146 947
$73.396.571
$39.922.872
$56.252.360
10
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$37,311,095
$54,613,942
Total
$312,330,251
$439,884,727
$36,602,908
$788,817,886 $562,740,969
$677,395,513
$78,881,789
$79,411,419
Year
Annualized
7 Percent
3 Percent
$81,714,462
$84,887,839
$80,121,654
Note: Totals may not sum due to independent rounding.
We present a summary of the impacts
of this proposed rule in table 3.
Table 3: Summary of Impacts of the Proposed Rule
Category
Summary
Applicability:
Proposed new sections to 33 CFR part 101,
subpart F-Cybersecurity
Affected Population
•
•
EP22FE24.002
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00016
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.001
lotter on DSK11XQN23PROD with PROPOSALS2
•
Cybersecurity requirements for owners and
operators ofU.S.-flagged vessels, facilities,
and OCS facilities.
Approximately 1,708 facility owners and
operators of approximately 3,411 facilities.
Approximately 1,775 U.S.-flagged vessel
owners and operators of approximately 10,286
U.S.-flagged vessels (5,473 U.S.-flagged
vessels, excluding barges, where applicable).
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Total Costs of the Proposed Rule
(7-percent discount rate-all estimates in table)
13419
Costs to Industry:
Total discounted cost: $535,093,488
Annualized cost: $76,185,275
Total discounted cost to facilities and OCS
facilities cost: $221,437,074
Annualized cost: $31,527,658
Total discounted cost to U.S.-flaggcd vessels:
$313,656,415
Annualized cost: $44,657,617
Costs to Federal Government:
Total discounted cost: $27,647,481
Annuali7.ed cost: $3,936,379
Total Costs of Proposed Rule:
Total discounted cost: $562,740,969
Annualized cost: $80,121,654
•
•
•
•
•
•
Unquantified Benefits
lotter on DSK11XQN23PROD with PROPOSALS2
•
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00017
Fmt 4701
Costs associated with U1e physical security of
physical access ports and removable media
Costs associated with network segmentation.
The cost of data encryption and acquiring data
space needed to store data logs and backups.
Costs associated with disabling applications
running executable code.
Costs associated wiU1 any future software or
hardware upgrades needed to maintain system
compatibility in the face of evolving
cybersecurity threats.
Costs associated with the correction of
vulnerabilities identified during the
implementation of the provisions of the
proposed rule.
Reduce the risk of cyber incidents through
enhanced detection and correction of
vulnerabilities in IT and OT systems. Improve
mitigation for impacted entities and
downstream economic participants if an
incident occurs. Improve protection of MTS
firm and customer data to protect business
operations, build consumer trust, and promote
increased commerce in the U.S. economy.
Improve the minimum standard for
cybersecurity to protect the MTS and avoid
supply chain disruptions, which is vital to the
U.S. economy and U.S. national security.
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.003
•
Unquantified Costs
13420
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
Affected Population
This proposed rule would affect
owners and operators of U.S.-flagged
vessels subject to 33 CFR part 104
(Maritime Security: Vessels), facilities
subject to 33 CFR part 105 (Maritime
Security: Facilities), and OCS facilities
subject to 33 CFR part 106 (Marine
Security: Outer Continental Shelf (OCS)
Facilities). The Coast Guard estimates
this proposed rule would affect
approximately 10,286 vessels and 3,411
facilities (including OCS facilities).
The affected U.S.-flagged vessel
population includes:
• U.S. towing vessels greater than 8
meters (26 feet) in registered length
inspected under 46 CFR, subchapter M
that are engaged in towing a barge or
barges inspected under 46 CFR,
subchapters D and O;
• U.S. tankships inspected under 46
CFR, subchapters D and O;
• U.S. barges inspected under 46
CFR, subchapters I (includes
combination barges), D, and O, carrying
certain dangerous cargo in bulk or
barges and engaged on international
voyages;
• Small U.S. passenger vessels
carrying more than 12 passengers,
including at least 1 passenger-for-hire,
that are engaged on international
voyages;
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
• Small U.S. passenger vessels
inspected under 46 CFR, subchapter K
that are certificated to carry more than
150 passengers;
• Large U.S. passenger vessels
inspected under 46 CFR, subchapter H;
• Offshore supply vessels (OSVs)
inspected under 46 CFR, subchapter L;
• Self-propelled U.S. cargo vessels
greater than 100 gross register tons
inspected under 46 CFR, subchapter I,
except for commercial fishing vessels
inspected under 46 CFR part 105; and
• U.S. MODUs and cargo or passenger
vessels subject to SOLAS (1974),
Chapter XI–1 or Chapter XI–2.
The affected facility population
includes:
• Facilities subject to 33 CFR parts
126 (Handling of Dangerous Cargo at
Waterfront Facilities) and 127
(Waterfront Facilities Handling
Liquefied Natural Gas and Liquefied
Hazardous Gas);
• Facilities that receive vessels
certificated to carry more than 150
passengers, except vessels not carrying
and not embarking or disembarking
passengers at the facility;
• Facilities that receive vessels
subject to SOLAS (1974), Chapter XI;
• Facilities that receive foreign cargo
vessels greater than 100 gross register
tons;
PO 00000
Frm 00018
Fmt 4701
Sfmt 4702
• Facilities that receive U.S. cargo
vessels, greater than 100 gross register
tons, inspected under 46 CFR,
subchapter I, except facilities that
receive only commercial fishing vessels
inspected under 46 CFR part 105; and
• Barge fleeting facilities that receive
barges carrying, in bulk, cargoes
regulated by 46 CFR subchapter I,
inspected under 46 CFR, subchapters D
or O, or certain dangerous cargoes.
Table 4 presents the affected
population of U.S.-flagged vessels,
facilities, and OCS facilities of this
proposed rule.68 For the vessel
population, the Coast Guard assumes
the same number of vessels that leave
and enter service. Therefore, we assume
the population to be constant over the
10-year period of analysis. We also
make the same assumption for facilities
and OCS facilities. Additionally, we
assume that changes in the ownership of
vessels and facilities would be very rare
and any audits that would result from
a change in ownership would be
accounted for by the annual audit
requirements. We request public
comments on these assumptions, and
generally, on the affected population.
68 This data was retrieved from the Coast Guard’s
Marine Information for Safety and Law Enforcement
(MISLE) database in September 2022.
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
13421
Table 4: Estimated Affected U.S. Population of the Proposed Rule
Population Group
Total Number of Vessels or Facilities
Vessels
U.S. towing vessels greater than 8 meters
(26 feet) in registered length inspected
under 46 CFR subchapter M that are
engaged in towing a barge or barges
inspected under 46 CFR subchapters D and
0.
3,921
U.S. tankships inspected under 46 CFR
88
subchapters D and O.
Self-propelled U.S. cargo and
miscellaneous vessels-self-propelled
vessels greater than 100 gross register tons
inspected under 46 CFR subchapter I,
except for commercial fishing vessels
inspected under 46 CFR part 105.
574
Small U.S. passenger vessels carrying more
than 12 passengers, including at least 1
passenger-for-hire, that are engaged on
international voyages.
50
Small U.S. passenger vessels inspected
under 46 CFR subchapter K (certificated to
carry more than 150 passengers).
379
Large U.S. passenger vessels inspected
under 46 CFR subchapter H.
34
OSVs inspected under 46 CFR subchapter L
426
U.S. MODUs subject to SOLAS Chapter
XI-1 or Chapter XI-2 that are inspected
under 46 CFR subchapter I-A.
1
U.S. barges inspected under 46 CFR
subchapters D, 0, or I (includes
combination barges) carrying certain
dangerous cargo in bulk or barges engaged
on international voyages.
Total U.S.-flagged vessel population
4,813
10,286 (1,775 owners and operators)
Total facilities and OCS facilities (includes
MTSA-regulated facilities)
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00019
Fmt 4701
3,411 (1,708 owners and operators)
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.004
lotter on DSK11XQN23PROD with PROPOSALS2
Facilities
13422
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
Cost Analysis of the Proposed Rule
This proposed rule would impose
costs on the U.S. maritime industry for
cybersecurity requirements that include:
• Developing a Cybersecurity Plan,
which includes designating a CySO, in
proposed 33 CFR 101.630;
• Performing drills and exercises in
proposed 33 CFR 101.635; and
• Ensuring and implementing
cybersecurity measures in proposed 33
CFR 101.650, such as account security
measures, device security measures,
data security measures, cybersecurity
training for personnel, training for
reporting an incident, risk management,
supply chain management, resilience,
network segmentation, and physical
security.
We present the costs associated with
some of the regulatory provisions in the
following analysis; however, we are not
able to estimate the costs fully for
certain provisions because of the lack of
data and the uncertainty associated with
these provisions. Also, some regulatory
provisions may be included in
developing the Cybersecurity Plan and
maintaining it on an annual basis;
therefore, we may not have estimated a
cost for these specific provisions in this
analysis. We clarify this in the analysis
where applicable and request public
comment regarding these analyses.
In addition, U.S. barges inspected
under 46 CFR, subchapters D, O, or I
(including combination barges), carrying
certain dangerous cargo in bulk or
barges engaged on international
voyages, represent a special case in our
analysis of cybersecurity-related costs.
Unlike other vessels in the affected
population of this NPRM, in most cases,
barges do not have IT or OT systems
onboard. Many types of barges rely on
the IT and OT systems onboard their
associated towing vessels or the
facilities where they deliver their cargo.
This also means that barges are typically
unmanned, making the costs associated
with provisions such as cybersecurity
training difficult to estimate. While we
acknowledge that there are some barges
with IT or OT systems onboard, for the
purposes of this analysis, we calculate
costs only for the affected population of
barges related to developing,
resubmitting, maintaining, and auditing
the Cybersecurity Plan, as well as
developing cybersecurity-related drill
and exercise components.
We believe that the hour-burden
estimates associated with the
components of the Cybersecurity Plan
should still be sufficient to capture the
implementation of any cybersecurity
measures identified as necessary by the
owner or operator of a barge. In
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
addition, we believe it should capture
any burden associated with requests for
waivers or equivalents for provisions
that would not apply to a vessel or
vessel company lacking significant IT or
OT systems. The Coast Guard requests
comment on our assumptions and cost
estimates related to barges and their
cybersecurity activities.
Cybersecurity Plan Costs
Each owner and operator of a U.S.flagged vessel, facility, or OCS facility
would be required to develop and
submit a Cybersecurity Plan to the Coast
Guard. The CySO would develop,
implement, and verify a Cybersecurity
Plan for each U.S.-flagged vessel,
facility, or OCS facility. The owner or
operator would submit the Plan for
approval to the cognizant COTP or the
OCMI for a facility or OCS facility, or to
the MSC for a U.S.-flagged vessel. The
contents of the Cybersecurity Plan are
detailed in proposed § 101.630.
Unless otherwise stated, we used
information and obtained estimates in
this RIA from subject matter experts
(SMEs) in the Coast Guard’s offices of
Design and Engineering Standards (CG–
ENG), Commercial Vessel Compliance
(CG–CVC), and Port and Facility
Compliance (CG–FAC). We also
obtained information from the U.S.
Coast Guard Cyber Command
(CGCYBER) and the National Maritime
Security Advisory Committee (NMSAC).
The Coast Guard acknowledges that
some owners and operators of mediumsized and larger facilities, OCS facilities,
and U.S.-flagged vessels may have
already adopted a cybersecurity posture
and implemented measures to counter
and prevent a cyber incident. We also
acknowledge that owners and operators
of smaller facilities, OCS facilities, and
U.S.-flagged vessels may not have any
cybersecurity measures in place. For the
purpose of this analysis, we assume that
all owners or operators of facilities, OCS
facilities, and U.S.-flagged vessels
would be required to comply with the
full extent of the requirements of this
proposed rule. However, we have
survey data indicating that a portion of
owners and operators of affected
facilities and OCS facilities already have
some cybersecurity measures in place.69
We present this survey data in the
applicable sections of the cost analysis.
For other regulatory provisions, we do
not estimate regulatory costs for
industry because the Coast Guard does
not have data on the extent of
69 Readers can access the survey at https://
www.joneswalker.com/en/insights/2022-JonesWalker-LLP-Ports-and-Terminals-CybersecuritySurvey-Report.html; accessed July 19, 2023.
PO 00000
Frm 00020
Fmt 4701
Sfmt 4702
cybersecurity measures currently in the
industry for these provisions. The Coast
Guard requests owners and operators of
facilities, OCS facilities, and U.S.flagged vessels who have some or most
of the required cybersecurity processes
and procedures in their current
operations to provide comments on the
outlining processes and procedures they
have implemented.
We list the regulatory provisions
included in developing and maintaining
a Cybersecurity Plan that we did not
estimate costs for in other sections of
this RIA:
• Device security measures in
§ 101.650(b)(1) through (4);
• Supply chain management in
§ 101.650(f)(1) through (3);
• Cybersecurity Assessment in
§ 101.650(e)(1);
• Documentation of penetration
testing results and identified
vulnerabilities in § 101.650(e)(2);
• Routine system maintenance
measures in § 101.650(e)(3)(i) through
(v); and
• Development and maintenance of a
Cyber Incident Response Plan in
§ 101.650(g)(2).
Developing a Cybersecurity Plan has
five cost components: the initial
development of the Plan; annual
maintenance of the Plan (including
amendments); revision and
resubmission of the Plan as needed;
renewal of the Plan after 5 years; and
the cost for annual audits. Owners and
operators of U.S.-flagged vessels,
facilities, and OCS facilities would be
required to submit their Cybersecurity
Plan to the Coast Guard during the
second annual audit of the currently
approved VSP, FSP, or OCS FSP
following the effective date of this
proposed rule; therefore, submitting a
Cybersecurity Plan for approval would
likely not occur until the second year of
the 10-year period of analysis.
The CySO would be responsible for
all aspects of developing and
maintaining the Cybersecurity Plan. The
Coast Guard does not have data on
whether owners and operators of
facilities, OCS facilities, and vessels
would hire a dedicated, salaried
employee to serve as a CySO. Proposed
§ 101.625 states that a CySO may
perform other duties within an owner or
operator’s organization, and that a
person may serve as a CySO for more
than one U.S.-flagged vessel, facility, or
OCS facility. For facilities and OCS
facilities, this person may be the Facility
Security Officer. For vessels, this person
may be the Vessel Security Officer.
When considering assigning the CySO
role to the existing security officer, the
owner or operator should consider the
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
depth and scope of these new
responsibilities in addition to existing
security duties. For the purpose of this
analysis, we assume that an existing
person in a facility, OCS facility, or
U.S.-flagged vessel company or
organization would assume the duties
and responsibilities of a CySO, and that
owners and operators would not have to
hire an individual to fill this position.
This means that any costs associated
with obtaining security credentials
(including a Transportation Worker
Identification Card) would already be
incurred prior to the implementation of
this proposed rule. Additionally, in the
event that the designated CySO has
security responsibilities that overlap
with an existing Vessel, Facility, or
Company Security Officer, we assume
that those individuals will work
together to handle those duties.
We use the Bureau of Labor Statistics’
(BLS) ‘‘National Occupational
Employment and Wage Estimates’’ for
the United States for May 2022. A CySO
would be comparable to the
occupational category of ‘‘Information
Security Analysts’’ according to BLS’s
labor categories with an occupational
code of 15–1212 and an unloaded mean
hourly wage rate of $57.63.70 In order to
obtain a loaded mean hourly wage rate,
we use BLS’s ‘‘Employer Costs for
Employee Compensation’’ database to
calculate the load factor, which we
applied to the unloaded mean hourly
wage rate using fourth quarter data from
2022.71 We determine the load factor for
70 Readers can access BLS’s website at https://
www.bls.gov/oes/2022/may/oes151212.htm to
obtain information about the wage we used in this
analysis; accessed May 5, 2023.
71 A loaded mean hourly wage rate is what a
company pays per hour to employ a person, not the
hourly wage an employee receives. The loaded
mean hourly wage rate includes the cost of nonwage benefits (health insurance, vacation, etc.). We
calculated the load factor by accessing BLS’s
website at https://www.bls.gov/ and selecting the
topic ‘‘Subjects’’ from the menu on this web page.
From the categories listed on this page, under the
category titled ‘‘Pay and Benefits,’’ we then selected
the category of ‘‘Employment Costs.’’ The next page
is titled ‘‘Employment Cost Trends;’’ in the left
margin, we selected the category ‘‘ECT Databases’’
at https://www.bls.gov/ncs/ect/data.htm. At this
page, we selected the database titled ‘‘Employer
Costs for Employee Compensation’’ using the
‘‘Multi-Screen’’ feature at https://data.bls.gov/cgibin/dsrv?cm. We then selected the category of
‘‘Private Industry Workers’’ at screen 1. At screen
2, we first selected the category ‘‘Total
Compensation,’’ then we continued to select
‘‘Transportation and Materials Moving
Occupations’’ at screen 3, then ‘‘All Workers’’ at
screens 4 and 5, and then for ‘‘Area,’’ we selected
‘‘United States’’ at screen 6. At screen 7, we
selected the category ‘‘Employer Cost for Employee
Compensation.’’ At screen 8, we selected the
category ‘‘not seasonally adjusted.’’ At screen 9, we
selected the series ID, CMU2010000520000D. We
used the ‘‘Cost of Compensation’’ for quarter 4 of
2022, or $33.07. We performed this process again
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
this occupational category to be about
1.46, rounded. We then multiply this
load factor by the unloaded mean
hourly wage rate of $57.63 to obtain a
loaded mean hourly wage rate of about
$84.14, rounded ($57.63 × 1.46).
Cybersecurity Plan Cost for Facilities
and OCS Facilities
This proposed rule would require
owners and operators of facilities and
OCS facilities to create a Cybersecurity
Plan for each facility within a company.
For the purpose of this analysis, the cost
to develop a Cybersecurity Plan is a
function of the number of facilities, not
the number of owners and operators,
because an owner or operator may own
more than one facility. Based on data
obtained from the Coast Guard’s Marine
Information for Safety and Law
Enforcement (MISLE) database, we
estimate this NPRM would affect about
3,411 facilities and OCS facilities
(including MTSA-regulated facilities),
and about 1,708 owners and operators of
these facilities. MISLE data contains
incomplete information on owners and
operators for 748 of the 3,411 facilities
and OCS facilities included in the
affected population. Of the 2,663
facilities and OCS facilities with
complete information for owners and
operators, we found 1,334 unique
owners. This means that, on average,
each owner owns approximately 2
facilities (2,663 ÷ 1,334 = 2.0, rounded).
We apply this rate of ownership to the
remaining facilities and OCS facilities
without complete ownership
information to arrive at our total of
1,708 owners [1,334 + (748 ÷ 2)].
We use hour-burden estimates from
Coast Guard SMEs and the currently
approved OMB Information Collection
Request (ICR), Control Number 1625–
0077, titled, ‘‘Security Plans for Ports,
Vessels, Facilities, and Outer
Continental Shelf Facilities and other
Security-Related Requirements.’’ The
hour-burden estimates are 100 hours for
developing the Cybersecurity Plan
(average hour burden), 10 hours for
annual maintenance of the
Cybersecurity Plan (which would
include amendments), 15 hours to
resubmit Cybersecurity Plans every 5
years, and 40 hours to conduct annual
audits of Cybersecurity Plans.
While the Cybersecurity Plan can be
incorporated into an existing FSP for a
facility or OCS facility, this does not
mean that the Cybersecurity Plan is
to obtain the value for ‘‘Wages and Salaries,’’ which
we selected on screen 2. On screen 9, we selected
the series ID CMU2020000520000D and obtained a
value of $22.64. We divided $33.07 by $22.64 and
obtained a load factor of 1.46, rounded; accessed
May 3, 2023.
PO 00000
Frm 00021
Fmt 4701
Sfmt 4702
13423
expected to be less complex to develop
or maintain than an FSP. In general, the
provisions outlined in this proposed
rule are meant to reflect the depth and
scope of the physical security
provisions established by MTSA. As a
result, we feel the hour-burden
estimates for developing and
maintaining the FSP represents a fair
proxy for what is expected with respect
to a Cybersecurity Plan. Nevertheless,
the Coast Guard requests comment on
the accuracy of these hour-burden
estimates as they relate to developing a
Cybersecurity Plan.
Based on estimates from the Coast
Guard’s FSP reviewers at local
inspections offices, approximately 10
percent of Plans would need to be
revised and resubmitted in the second
year, which is consistent with the
current resubmission rate for FSPs.
Plans must be renewed after 5 years
(occurring in the seventh year of the
analysis period), and we estimate that
10 percent of renewals would also
require revision and resubmission. We
estimate the time to revise and resubmit
the Cybersecurity Plan to be about half
the time to develop the Plan itself, or 50
hours in the second year of submission,
and 7.5 hours after 5 years (in the
seventh year of the analysis period).
Because we include the annual
Cybersecurity Assessment in the cost to
develop Cybersecurity Plans, and we do
not assume that owners and operators
will wait until the second year of
analysis to begin developing the Plan or
implementing related cybersecurity
measures, we divide the estimated 100
hours to develop Plans equally across
the first and second years of analysis.
We estimate the first- and second-year
(the first year of Plan submission)
undiscounted cost to develop a
Cybersecurity Plan for owners and
operators of U.S. facilities and OCS
facilities to be about $28,700,154 (3,411
Plans × 100 hours × $84.14). We
estimate the second-year undiscounted
cost for owners and operators to
resubmit Plans for facilities or OCS
facilities (or to send amendments) for
corrections to be about $1,434,587 (341
Plans or amendments × 50 hours ×
$84.14). Therefore, we estimate the total
undiscounted first- and second-year cost
to facility and OCS facility owners and
operators to develop, submit, and
resubmit a Cybersecurity Plan to be
approximately $30,134,741 ($28,700,154
+ $1,434,587)).
In years 3 through 6 and years 8
through 10 of the analysis period,
owners and operators of U.S. facilities
and OCS facilities would be required to
maintain their Cybersecurity Plans. This
may include recordkeeping and
E:\FR\FM\22FEP2.SGM
22FEP2
13424
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
documenting cybersecurity items at a
facility or OCS facility, as well as
amending the Plan. The CySO would be
required to maintain each Plan for each
facility or OCS facility. Maintaining the
Plan does not occur in the second year
(initial year of Plan submission) or in
the renewal year, year 7 of the analysis
period. We again obtain the hourburden estimate for the annual
maintenance of Plans from ICR 1625–
0077, which is 10 hours.
In the same years of the analysis
period, this proposed rule would also
require owners and operators of
facilities and OCS facilities to conduct
annual audits. The audits would be
necessary for owners and operators of
facilities and OCS facilities to identify
vulnerabilities (via the Cybersecurity
Assessment) and to mitigate them.72
Audits would also be necessary if there
lotter on DSK11XQN23PROD with PROPOSALS2
72 The Jones Walker survey (see footnote 69)
reports about 72 percent of ports and terminals
conduct a risk assessment at least once a year. We
did not estimate a separate cost for this item
because the Coast Guard believes that a risk
assessment can be a part of an annual audit.
Readers can access the survey at https://
www.joneswalker.com/en/insights/2022-JonesWalker-LLP-Ports-and-Terminals-CybersecuritySurvey-Report.html; accessed July 19, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
is a change in the ownership of a
facility, but because the costs for audits
are estimated annually, this should
capture audits as a result of very rare
changes in ownership each year as well.
The CySO would be responsible for
ensuring the audit of a Cybersecurity
Plan. Based on input provided by Coast
Guard SMEs who review Plans at the
Coast Guard, we estimate the time to
conduct an audit to be about 40 hours
for each Plan. We estimate the
undiscounted cost for the annual
maintenance of Cybersecurity Plans for
facility and OCS facility owners and
operators to be approximately
$2,870,015 (3,411 facility Plans × 10
hours × $84.14). We estimate the
undiscounted cost for annual audits of
Cybersecurity Plans to be approximately
$11,480,062 (3,411 facility Plans × 40
hours × $84.14). We estimate the total
undiscounted annual cost each year in
years 3 through 6 and 8 through 10 for
Cybersecurity Plans to be approximately
$14,350,077 ($2,870,015 + $11,480,062).
Because a Cybersecurity Plan
approved by the Coast Guard is valid for
5 years, in year 7 of the analysis period,
owners and operators of facilities and
PO 00000
Frm 00022
Fmt 4701
Sfmt 4702
OCS facilities would be required to
renew the approval of their Plans with
the Coast Guard. We use the hourburden estimate in ICR 1625–0077for
renewing the Plan, which is 15 hours.
The hour-burden estimate for revision
and resubmission of renewals is half of
the original hour-burden for renewals,
or 7.5 hours. The CySO would be
responsible for resubmitting the
Cybersecurity Plan to the Coast Guard
for renewal, including additional
resubmissions because of corrections.
We estimate the undiscounted cost for
renewing and resubmitting a
Cybersecurity Plan due to corrections to
be approximately $4,520,211 [(3,411
facility Plans × 15 hours × $84.14) +
(341 resubmitted facility Plans × 7.5
hours × $84.14)].
We estimate the total discounted cost
of this proposed rule for developing
Cybersecurity Plans for facility and OCS
facility owners and operators to be
approximately $95,920,412 over a
10-year period of analysis, using a
7-percent discount rate. We estimate the
annualized cost to be approximately
$13,656,909, using a 7-percent discount
rate. See table 5.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
VerDate Sep<11>2014
Jkt 262001
PO 00000
Number of
Companies
Number of
Submissions
Year
(a)
(b)
1
1708
2
Number of
Resubmissions
Frm 00023
Fmt 4701
Sfmt 4725
(c)
CySO
Wage
(d)
Development
Hours
(e)
3411
0
$84.14
1708
3411
341
3
1708
3411
4
1708
5
Annual
Maintenance
Hours
Total Cost
=[(bx d x (e + f
Resubmission
Hours
Audit Hours +h))+(c xd x
E:\FR\FM\22FEP2.SGM
22FEP2
m
ra,
{h)
~)l
7 Percent
3 Percent
50
0
0
0
$14,350,077
$13,411,287
$13,932,114
$84.14
50
0
50
0
$15,784,664
$13,786,937
$14,878,560
0
$84.14
0
10
0
40
$14 350 077
$11 713.937
$13.132 353
3411
0
$84.14
0
10
0
40
$14,350,077
$10,947,605
$12,749,858
1708
3411
0
$84.14
0
10
0
40
$14,350,077
$10,231,407
$12,378,502
6
1708
3411
0
$84.14
0
10
0
40
$14,350,077
$9,562,062
$12,017,964
7
1708
3411
341
$84.14
15
0
7.5
0
$4,520,211
$2,814,960
$3,675,345
8
1708
3411
0
$84.14
0
10
0
40
$14 350 077
$8 351 875
$11.328 083
9
1708
3411
0
$84.14
0
10
0
40
$14,350,077
$7,805,491
$10,998,139
10
1708
3411
0
$84.14
0
10
0
40
$14,350,077
$7,294,851
$10,677,805
Total
$135,105 491
$95,920,412
$115768723
Annualized
$13,510,549
$13,656,909
$13,571,626
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Table 5: Estimated Cost of the Proposed Rule for Facility and OCS Facility Cybersecurity Plans (2022 Dollars, 10-year Period
of Analysis, 7- and 3-percent Discount Rates)
Note: Totals may not sum due to independent rounding.
13425
EP22FE24.005
13426
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
Cybersecurity Plan Cost for U.S.-Flagged
Vessels
The methodology for owners and
operators of U.S.-flagged vessels to
develop a Cybersecurity Plan is the
same as for U.S. facilities and OCS
facilities. We estimate the affected
vessel population to be about 10,286.
We estimate the number of owners and
operators of these vessels to be about
1,775.
We use estimates provided by Coast
Guard SMEs and ICR 1625–0077 for the
hour-burden estimates for vessels as we
did for facilities and OCS facilities. The
hour-burden estimates are 80 hours for
developing the Cybersecurity Plan, 8
hours for annual Plan maintenance, 12
hours to renew the Plan every 5 years,
and 40 hours to conduct annual audits
of Plans for vessels. Similar to facilities,
10 percent of all Cybersecurity Plans for
vessels would need to be resubmitted
for corrections in the second year
(initial year of Plan submission), and 10
percent of Cybersecurity Plans for
vessels would need to be revised and
resubmitted in the seventh year of the
analysis period. Based on information
from Coast Guard SMEs, we estimate the
time to make corrections to the Plan in
the second year would be about half of
the initial time to develop the Plan, or
40 hours in the second year, and 6 hours
in the seventh year. We include the
annual Cybersecurity Assessment in the
cost to develop Plans, and we do not
assume that owners and operators will
wait until the second year of analysis to
begin developing the Cybersecurity Plan
or implementing related cybersecurity
measures. Therefore, we divide the
estimated 80 hours to develop Plans
equally across the first and second years
of analysis.
The methodology to determine the
cost to develop a Cybersecurity Plan for
U.S.-flagged vessels is slightly different
than the methodology for facilities and
OCS facilities. The Coast Guard does not
believe that a CySO for U.S.-flagged
vessels would expend 80 hours
developing a Plan for each vessel in a
company’s fleet. For example, if a vessel
owner or operator has 10 vessels, it
would take a CySO 800 hours of time to
develop Plans for all 10 vessels, which
is nearly 40 percent of the total hours of
work in a calendar year. It is more likely
that the CySO would create a master
Cybersecurity Plan for all the vessels in
the fleet, and then tailor each Plan
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
according to a specific vessel, as
necessary.
Because a large portion of the
provisions required under this proposed
rule would impact company-wide
policies regarding network, account,
and data security practices, as well as
company-wide cybersecurity training,
reporting procedures, and testing, we do
not believe there will be much variation
in how these provisions are
implemented between specific vessels
owned by the same owner or operator.
Therefore, the cost to develop a
Cybersecurity Plan for vessels becomes
a function of the number of vessel
owners and operators and not a function
of the number of vessels.
When a vessel owner or operator
submits a Plan to the Coast Guard for
approval, the owner or operator would
send the master Cybersecurity Plan,
which might include a more tailored or
abbreviated Plan for each vessel. For
example, the owner or operator of 10
vessels would send the master
Cybersecurity Plan along with the
tailored Plans for each vessel in one
submission to the Coast Guard for
approval, instead of 10 separate
documents. The Coast Guard requests
comments on these assumptions related
to master and tailored vessel
Cybersecurity Plans.
We estimate the first- and second-year
(initial year of Plan submission)
undiscounted cost for owners and
operators of U.S.-flagged vessels to
develop a Cybersecurity Plan to be
approximately $11,947,880 (1,775 Plans
× 80 hours × $84.14) split over the first
two years of analysis. We estimate the
second-year undiscounted cost for
owners and operators to resubmit vessel
Plans (or send amendments) for
corrections to be approximately
$599,077 (178 Plans or amendments ×
40 hours × $84.14). Therefore, we
estimate the total undiscounted firstand second-year cost to the owners and
operators of U.S.-flagged vessels to
develop a Cybersecurity Plan to be
approximately $12,546,957 ($11,947,880
+ $599,077).
As with facilities and OCS facilities,
in years 3 through 6 and years 8 through
10 of the analysis period, CySOs, on
behalf of owners and operators of U.S.flagged vessels, would be required to
maintain their Cybersecurity Plans. We
again obtain the hour-burden estimate
for annual maintenance of Plans from
ICR 1625–0077, which is 8 hours. In the
same years of the analysis period, this
PO 00000
Frm 00024
Fmt 4701
Sfmt 4702
proposed rule would also require
owners and operators of U.S.-flagged
vessels to conduct annual audits. The
audits would be necessary for owners
and operators of U.S.-flagged vessels to
identify vulnerabilities through the
Cybersecurity Assessment and to
mitigate them. Audits would also be
necessary if there is a change in the
ownership of a vessel. The CySO would
likely conduct an audit of the master
Cybersecurity Plan, which would
include each vessel, instead of
conducting a separate audit for each
individual vessel.
The time estimate for a CySO to
conduct an audit for U.S.-flagged vessels
in a fleet is the same as it is for facilities
and OCS facilities, or 40 hours per Plan.
We estimate the undiscounted cost for
the annual maintenance of
Cybersecurity Plans for the owners and
operators of U.S.-flagged vessels to be
about $1,194,788 (1,775 Plans × 8 hours
× $84.14). We estimate the
undiscounted cost for annual audits of
Cybersecurity Plans to be approximately
$5,973,940 (1,775 Plans × 40 hours ×
$84.14). We estimate the total
undiscounted annual cost each year in
years 3 through 6 and 8 through 10 for
Cybersecurity Plans to be approximately
$7,168,728 ($1,194,788 + $5,973,940).
Again, as with facilities and OCS
facilities, Coast Guard approval for the
Cybersecurity Plan is valid for 5 years.
Therefore, in year 7 of the analysis
period, owners and operators of U.S.flagged vessels would be required to
renew their Plans with the Coast Guard.
We use the hour-burden estimate in ICR
1625–0077 for Plan renewal, which is
12 hours. The CySO would be
responsible for resubmitting the
Cybersecurity Plan to the Coast Guard
for renewal. We estimate the
undiscounted cost for owners and
operators of U.S.-flagged vessels to
renew the Plan to be approximately
$1,882,044 [(1,775 Plans × 12 hours ×
$84.14) + (178 resubmitted vessel Plans
× 6 hours × $84.14)].
We estimate the total discounted cost
of this proposed rule for owners and
operators of U.S.-flagged vessels to
develop Cybersecurity Plans to be
approximately $45,420,922 over a
10-year period of analysis, using a
7-percent discount rate. We estimate the
annualized cost to be approximately
$6,466,917, using a 7-percent discount
rate. See table 6.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
VerDate Sep<11>2014
Jkt 262001
PO 00000
Year
Number of Number of
Number of
Companies Submissions Resubmissions
(b)
(c)
(a)
CySO
Wage
(d)
Annual
Development Maintenance Resubmission
Hours
Hours
Hours
(!,)
(e)
(t)
Total Cost
Audit
Hours
= [(b x d x (e + f
(h)
e)l
7 Percent
3 Percent
+h))+(cxdx
Frm 00025
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
1
1775
1775
0
$84.14
40
0
0
0
$5,973,940
$5,583,121
$5,799,942
2
1775
1775
178
$84.14
40
0
40
0
$6,573,017
$5,741,128
$6,195,699
3
1775
1775
0
$84.14
0
8
0
40
$7,168,728
$5,851,817
$6,560,402
4
1775
1775
0
$84.14
0
8
0
40
$7,168,728
$5,468,988
$6,369,322
5
1775
1775
0
$84.14
0
8
0
40
$7,168,728
$5,111,204
$6,183,808
6
1775
1775
0
$84.14
0
8
0
40
$7,168,728
$4,776,826
$6,003,697
7
1775
1775
178
$84.14
12
0
6
0
$1,882,044
$1,172,042
$1,530,274
8
1775
1775
0
$84.14
0
8
0
40
$7,168,728
$4,172,265
$5,659,060
9
1775
1775
0
$84.14
0
8
0
40
$7,168,728
$3,899,313
$5,494,233
10
1775
1775
0
$84.14
0
8
0
40
$7,168,728
$3,644,218
$5,334,207
Total
$64,610,097
$45,420,922
$55,130,644
Annualized
$6,461,010
$6,466,917
$6,462,993
Note: Totals may not sum due to independent rounding.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Table 6: Estimated Cost of the Proposed Rule for U.S.-Flagged Vessel Cybersecurity Master Plan Development (2022 Dollars,
10-year Period of Analysis, 7- and 3-percent Discount Rates)
13427
EP22FE24.006
13428
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Drills
In proposed § 101.635(b), this NPRM
would require drills that test the
proficiency of U.S.-flagged vessel,
facility, and OCS facility personnel who
have assigned cybersecurity duties. The
drills would enable the CySO to identify
any cybersecurity deficiencies that need
to be addressed. The CySO would need
to conduct the drills every 3 months or
quarterly, (which is consistent with the
MTSA regulations for drills for vessels,
facilities, and OCS facilities in 33 CFR
parts 104, 105 and 106, respectively),
and they may be held in conjunction
with other security or non-securityrelated drills, as appropriate. The drills
would test individual elements of the
Plan, including responses to
cybersecurity threats and incidents.
The Coast Guard does not have data
on who is currently conducting
cybersecurity drills in either the
population of facilities and OCS
facilities or the population of
U.S.-flagged vessels. Therefore, we
assume that the entire population of
facilities and U.S.-flagged vessels would
need to develop new cybersecurity
related drills to comply with the
proposed requirements. However,
because the affected populations are
already required to conduct drills in
accordance with 33 CFR parts 104, 105,
and 106, and the proposed rule allows
for owners and operators to hold
cybersecurity drills in conjunction with
other security and non-security related
drills, we assume that owners and
operators will hold these new drills in
conjunction with existing drills and will
not require additional time from
participants. This means that the only
new cost associated with the proposed
cybersecurity drills is the development
of cybersecurity components to add to
existing drills. Coast Guard SMEs who
are familiar with MTSA’s requirements
and practices for drills and exercises
estimate that it would take a CySO 0.5
hours (30 minutes) to develop new
cybersecurity components to add to
existing drills. This time estimate is
based on the expected ease with which
a CySO can access widely available
resources and planning materials for
developing cybersecurity drills online.
The Coast Guard requests the public to
comment on the accuracy of our
estimates related to the development of
cybersecurity drill components.
The CySO would be the person who
develops cybersecurity components to
add to existing drills. Each CySO, on
behalf of the owner or operator of a
facility or OCS facility, would be
required to develop the drill’s
components beginning in the first year
of the analysis period and document
procedures in the Cybersecurity Plan.
Using the number of facilities owners
and operators we presented earlier—or
1,708—the CySO’s loaded mean hourly
wage rate, the estimated time to develop
the drill’s components or 0.5 hours (30
minutes), and the frequency of the drill,
or every 3 months, we estimate the cost
for facilities to develop cybersecurity
components for drills. We estimate the
undiscounted annual cost of drills for
facility and OCS facility owners and
operators to be approximately $287,422
(1,708 facility CySOs × 4 drills per year
× 0.5 hours per drill × $84.14. We
estimate the total discounted cost of
drills for owners and operators of
facilities and OCS facilities to be
approximately $2,018,733 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
$287,422, using a 7-percent discount
rate. See table 7.
Table 7: Estimated Drill Costs of the Proposed Rule for Facilities and OCS Facilities
(2022 Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
Year
Number of
Facility
Comoanies
CySO
Wa2e
Drill
Development Frequency
of Drills
Hours
1
1708
$84.14
0.5
4
$287 422
$268 619
$279 050
2
1708
$84.14
0.5
4
$287 422
$251 046
$270 923
3
1708
$84.14
0.5
4
$287,422
$234,622
$263,032
4
1708
$84.14
0.5
4
$287 422
$219 273
$255 371
5
1708
$84.14
0.5
4
$287 422
$204 928
$247 933
6
1708
$84.14
0.5
4
$287,422
$191,521
$240,711
7
1708
$84.14
0.5
4
$287,422
$178,992
$233,700
8
1708
$84.14
0.5
4
$287 422
$167,282
$226 894
9
1708
$84.14
0.5
4
$287,422
$156,339
$220,285
10
1708
$84.14
0.5
4
$287,422
$146,111
$213,869
Total Cost
$2,874 220
Total
$2,018,733 $2,451,768
$287,422
Annualized
$287,422
Note: Totals may not sum due to independent rounding.
We use the same methodology and
estimates for U.S.-flagged vessel drills.
As we presented previously, there are
about 1,775 CySOs, on behalf of owners
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
and operators of U.S.-flagged vessels,
who would be required to develop drills
with this proposed rule. We estimate the
undiscounted annual cost of drills for
PO 00000
Frm 00026
Fmt 4701
Sfmt 4702
the owners and operators of U.S.-flagged
vessels to be approximately $298,697
(1,775 vessel CySOs × 4 drills per year
× 0.5 hours per drill × $84.14). We
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.007
lotter on DSK11XQN23PROD with PROPOSALS2
7 Percent 3 Percent
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
estimate the total discounted cost of
drills for U.S.-flagged vessels to be
approximately $2,097,922 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
13429
$298,697, using a 7-percent discount
rate. See table 8.
Table 8: Estimated Drill Costs of the Proposed Rule for U.S.-flagged Vessels (2022
Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
Year
Number of
Vessel
Companies
CySO
Wage
Drill
Development Frequency of
Hours
Drills
Total Cost
1
1775
$84.14
0.5
4
2
1775
$84.14
0.5
3
1775
$84.14
4
1775
5
7 Percent
3 Percent
$298 697
$279 156
$289 997
4
$298 697
$260 894
$281 551
0.5
4
$298,697
$243,826
$273,350
$84.14
0.5
4
$298 697
$227 875
$265 388
1775
$84.14
0.5
4
$298 697
$212 967
$257 659
6
1775
$84.14
0.5
4
$298,697
$199,034
$250,154
7
1775
$84.14
0.5
4
$298,697
$186,013
$242,868
8
1775
$84.14
0.5
4
$298 697
$173 844
$235 794
9
1775
$84.14
0.5
4
$298 697
$162 471
$228 926
10
1775
$84.14
0.5
4
$298,697
$151,842
$222,259
$2 986 970
$2,097,922
$2,547,946
$298,697
$298,697
Total
Annualized
Note: Totals may not sum due to independent rounding.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
approximately $4,116,655 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
PO 00000
Frm 00027
Fmt 4701
Sfmt 4702
$586,119, using a 7-percent discount
rate. See table 9.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.008
lotter on DSK11XQN23PROD with PROPOSALS2
We estimate the total discounted cost
of this proposed rule for drills for the
owners and operators of facilities, OCS
facilities, and U.S.-flagged vessels to be
13430
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Year
Facilities Drill
Cost
Vessel Drill
Cost
Total Cost
7 Percent
3 Percent
1
$287 422
$298 697
$586 119
$547,775
$569 048
2
$287,422
$298,697
$586,119
$511,939
$552,473
3
$287,422
$298,697
$586,119
$478,448
$536,382
4
$287 422
$298 697
$586 119
$447.147
$520 759
5
$287 422
$298 697
$586 119
$417.895
$505 591
6
$287,422
$298,697
$586,119
$390,556
$490,865
7
$287 422
$298 697
$586 119
$365.005
$476 568
8
$287 422
$298 697
$586 119
$341.127
$462 688
9
$287,422
$298,697
$586,119
$318,810
$449,211
10
$287,422
$298,697
$586,119
$297,953
$436,128
Total
$2 874 220
$2 986,970
$5 861,190
$4,116,655
$4,999,713
$586,119
$586,119
Annualized
Note: Totals may not sum due to independent rounding.
lotter on DSK11XQN23PROD with PROPOSALS2
Exercises
In proposed § 101.635(c), this NPRM
would require exercises that test the
communication and notification
procedures of U.S.-flagged vessels,
facilities, and OCS facilities. These
exercises may be vessel- or facilityspecific, or part of a cooperative
exercise program or comprehensive port
exercises. The exercises would be a full
test of the cybersecurity program with
active participation by the CySO and
may include Government authorities
and vessels visiting a facility. The
exercises would have to be conducted at
least once each calendar year, with no
more than 18 months between exercises.
As with drills, we assume that exercises
will begin in the first year of the
analysis period as CySOs develop
Cybersecurity Plans. We also assume
that the exercises developed to satisfy
§ 101.635(c) would also satisfy the
exercise requirements outlined in
§ 101.650 (g)(2) and (3), which requires
the exercise of the Cybersecurity Plan
and Cyber Incident Response Plan.
The Coast Guard does not have data
on who is currently conducting
cybersecurity exercises in either the
population of facilities and OCS
facilities or the population of
73 For example, CISA offers free resources on
cybersecurity scenarios and cybersecurity exercises
on their website. See https://www.cisa.gov/
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
U.S.-flagged vessels. Therefore, we
assume that the entire populations
would need to develop new
cybersecurity-related exercises to
comply with the proposed
requirements. However, because the
affected populations are already
required to conduct exercises in
accordance with 33 CFR parts 104, 105,
and 106, and because this proposed rule
allows for owners and operators to hold
cybersecurity exercises in conjunction
with other exercises, we assume that
owners and operators will hold these
new exercises in conjunction with
existing exercises. This will not require
any additional time from participants,
which means that the only new cost
associated with the proposed
cybersecurity exercises is the
development of cybersecurity
components to add to existing exercises.
Coast Guard SMEs familiar with
MTSA’s requirements and practices for
drills and exercises estimate that it
would take a CySO 8 hours to develop
new cybersecurity components to add to
existing exercises. This time estimate is
based on the expected ease with which
a CySO can access widely available
resources and planning materials for
developing cybersecurity exercises
online 73 and the proliferation of
cybersecurity components already being
added to AMSC exercises around the
United States.74 The Coast Guard
requests comment on the accuracy of
our estimates related to the
development of cybersecurity exercise
components.
We assume each CySO, on behalf of
the owner and operator of a facility or
OCS facility, would develop the
exercises specified in the proposed rule.
Using the 1,708 facility owners and
operators we presented earlier, the
CySO’s loaded mean hourly wage rate,
the 8-hour estimate for developing the
exercise components, and one annual
exercise, we estimate the cost for
facilities to develop cybersecurity
exercise components. We estimate the
undiscounted annual cost of exercises
for owners and operators of facilities
and OCS facilities to be approximately
$1,149,689 (1,708 facility CySOs × 8
hours per exercise × $84.14). We
estimate the total discounted cost of
exercises for facility owners and
operators to be about $8,074,935 over a
10-year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$1,149,689, using a 7-percent discount
rate. See table 10.
cybersecurity-training-exercises, accessed July 19,
2023.
74 See https://digitaleditions.walsworth
printgroup.com/publication/?i=459304&article_
id=2956672&view=articleBrowser for just one
example of AMSC cyber exercises in recent years;
accessed July 19, 2023.
PO 00000
Frm 00028
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.009
Table 9: Estimated Costs of the Proposed Rule for Drills (Facilities, OCS Facilities,
and U.S.-Flagged Vessels) (2022 Dollars, 10-year period of Analysis, 7- and 3percent Discount Rates)
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
13431
Table 10: Estimated Exercise Costs of the Proposed Rule for Facilities and OCS
Facilities (2022 Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
Year
Number of
Facility
Companies
CySO
Wage
Exercise
Develop men Exercises
per Year
t Hours
1
1708
$84.14
8
2
1708
$84.14
3
1708
4
Total Cost
7 Percent
3 Percent
1
$1,149,689
$1 074,476
$1 116 203
8
1
$1,149,689
$1 004,183
$1 083 692
$84.14
8
1
$1,149,689
$938,489
$1,052,128
1708
$84.14
8
1
$1 149.689
$877.092
$1 021 484
5
1708
$84.14
8
1
$1 149.689
$819.712
$991 732
6
1708
$84.14
8
1
$1,149,689
$766,086
$962,846
7
1708
$84.14
8
1
$1,149,689
$715,969
$934,802
8
1708
$84.14
8
1
$1 149.689
$669.129
$907 575
9
1708
$84.14
8
1
$1 149.689
$625.355
$881 141
10
1708
$84.14
8
1
$1,149,689
$584,444
$855,477
$11496890
$8,074,935
$9,807,080
$1,149,689
$1,149,689
Total
Annualized
Note: Totals may not sum due to independent rounding.
We use the same methodology and
estimates for vessel exercises that we
use for facilities. About 1,775 CySOs, on
behalf of vessel owners and operators,
would be required to conduct exercises
with this proposed rule. We estimate the
undiscounted annual cost of exercises
for the owners and operators of
U.S.-flagged vessels to be approximately
$1,194,788 (1,775 vessel CySOs × 8
hours per exercise × $84.14). We
estimate the total discounted cost of
exercises for U.S.-flagged vessels to be
approximately $8,391,691 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
$1,194,788, using a 7-percent discount
rate. See table 11.
CySO
Wage
Exercise
Development
Hours
Exercises
per Year
Total Cost
7 Percent
3Percent
1
1775
$84.14
8
1
$1,194,788
$1,116 624
$1159 988
2
1775
$84.14
8
1
$1,194,788
$1,043 574
$1126 202
3
1775
$84.14
8
1
$1,194,788
$975,303
$1,093,400
4
1775
$84.14
8
1
$1,194,788
$911,498
$1,061,554
5
1775
$84.14
8
1
$1,194,788
$851 867
$1030 635
6
1775
$84.14
8
1
$1,194,788
$796,138
$1,000,616
7
1775
$84.14
8
1
$1,194,788
$744,054
$971,472
8
1775
$84.14
8
1
$1.194.788
$695 377
$943 177
9
1775
$84.14
8
1
$1.194.788
$649 886
$915 706
10
1775
$84.14
8
1
$1,194,788
$607,370
$889,034
Total
$11,947,880 $8,391,691
$10,191,784
$1.194.788
$1.194.788
Annualized
Note: Totals may not sum due to independent rounding.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00029
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.011
Year
Number of
Vessel
Companies
EP22FE24.010
lotter on DSK11XQN23PROD with PROPOSALS2
Table 11: Estimated Drill Costs of the Proposed Rule for U.S.-flagged Vessels (2022
Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
13432
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
We estimate the total discounted cost
of this proposed rule for the owners and
operators of U.S. facilities, OCS
facilities, and U.S.-flagged vessels for
exercises to be approximately
$16,466,625 over a 10-year period of
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
be approximately $2,344,477, using a 7percent discount rate. See table 12.
Table 12: Estimated Cost of the Proposed Rule for Exercises (Facilities, OCS
Facilities, and U.S.-Flagged Vessels) (2022 Dollars, 10-year Period of Analysis, 7and 3-percent Discount Rates)
Year
Facilities Exercise
Cost
Vessel Exercise
Cost
Total Cost
7 Percent
3 Percent
1
$1,149,689
$1,194,788
$2,344,477
$2,191,100
$2,276,191
2
$1,149,689
$1,194,788
$2,344,477
$2,047,757
$2,209,894
3
$1,149,689
$1,194,788
$2,344,477
$1,913,792
$2,145,529
4
$1,149,689
$1,194,788
$2,344,477
$1,788,590
$2,083,037
5
$1,149,689
$1,194,788
$2,344,477
$1,671,580
$2,022,366
6
$1,149,689
$1,194,788
$2,344,477
$1,562,224
$1,963,463
7
$1,149,689
$1,194,788
$2,344,477
$1,460,022
$1,906,274
8
$1,149,689
$1,194,788
$2,344,477
$1,364,507
$1,850,752
9
$1,149,689
$1,194,788
$2,344,477
$1,275,240
$1,796,846
10
$1,149,689
$1,194,788
$2,344,477
$1,191,813
$1,744,511
Total
$11,496,890
$11,947,880
$23,444,770
$16,466,625
$19,998,863
$2,344,477
$2,344,477
Annualized
Note: Totals may not sum due to independent rounding.
We estimate the total discounted cost
of this proposed rule for the owners and
operators of facilities, OCS facilities,
and U.S.-flagged vessels, to conduct
annual drills and exercises to be
approximately $20,583,281 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$2,930,596, using a 7-percent discount
rate. See table 13.
Table 13: Summary of Drill and Exercise Discounted Costs of the Proposed Rule
(2022 Dollars, 10-year Discounted Costs, 7-percent Discount Rate)
Facilities and OCS
Facilities
U.S.-flagged
Vessels
Total Cost
Drills
$2,018,733
$2,097,922
$4,116,655
Exercises
$8.074.935
$8 391.691
$16,466,626
Total
$10 093 668
$10.489 613
$20,583.281
The remaining regulatory provisions
with associated costs are the
cybersecurity measures in proposed
§ 101.650. There are five cost provisions
associated with cybersecurity measures:
account security measures;
cybersecurity training for personnel;
penetration testing; resilience; and risk
management.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
The first provision is account security
measures in proposed § 101.650(a). The
owners and operators of each U.S.flagged vessel, facility, and OCS facility
would ensure that account security
measures are implemented and
documented. This includes general
account security measures in proposed
§ 101.650(a)(1) through (3) and (5)
through (7) and multifactor
authentication for end users in proposed
PO 00000
Frm 00030
Fmt 4701
Sfmt 4702
§ 101.650(a)(4). Based on the Jones
Walker ‘‘Ports and Terminals
Cybersecurity Survey,’’ (see footnote
69), 87 percent of facilities currently
have account security measures, and 83
percent of facilities currently use
multifactor authentication software.
Using the total number of 1,708 facility
and OCS facility owners and operators,
we multiply this number by 0.13 and
0.17, respectively, to obtain the number
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.012
lotter on DSK11XQN23PROD with PROPOSALS2
Cybersecurity Measure Costs
$2,930,596
EP22FE24.073
Annualized
Note: Totals may not sum due to independent rounding.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
of facility owners and operators who
would need to implement security
measures and have multifactor
authentication software under this
proposed rule, or about 222 and 290,
respectively. The Coast Guard
acknowledges that the survey data used
here may lead us to underestimate the
costs incurred by the population of
facilities and OCS facilities, given the
high rate of respondents who indicated
that they have these measures in place.
Accordingly, we request comments on
the accuracy of these rates of
implementation in the population of
facilities and OCS facilities.
We obtain the hour estimates and the
labor category for these security
measures for implementing and
managing account security from
NMSAC members with extensive
experience in contracting to implement
similar account security measures for
facilities and OCS facilities in the
affected population. A Database
Administrator would ensure that
account security measures are
implemented. Using wage data from
BLS’s Occupational Employment and
Wage Statistics (OEWS) program as
previously referenced, the unloaded
mean hourly wage rate for this labor
category, occupational code of 15–1242,
is $49.29.75 Using Employer Costs for
Employee Compensation data from BLS,
we apply the same load factor of 1.46 to
the aforementioned wage rate to obtain
a loaded mean hourly wage rate of
approximately $71.96.
It would take a Database
Administrator about 8 hours to
implement the account security
measures and 8 hours for account
security management annually
thereafter for 222 U.S. facility and OCS
facility companies. We estimate the
undiscounted initial-year cost to
implement account security for 222
lotter on DSK11XQN23PROD with PROPOSALS2
75 See https://www.bls.gov/oes/2022/may/
oes151242.htm, accessed July 12, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
facilities and OCS facilities and the
annually recurring cost of account
security management to be
approximately $127,801, rounded [(222
facilities × ($71.96 × 8 hours)].
The number of facility and OCS
facility companies that would need
multifactor authentication security is
about 290. Based on estimates from CG–
FAC SMEs with experience
implementing multifactor
authentication at other Government
agencies, implementation of multifactor
authentication would cost each facility
anywhere from $3,000 to $15,000 in the
initial year for setup and configuration.
For the purposes of this analysis, we use
the average of approximately $9,000 for
the costs of initial setup and
configuration. It would also cost each
facility approximately $150 per end user
for annual maintenance and support of
the implemented multifactor
authentication system. These costs
represent the average costs for
implementing and maintaining a
multifactor authentication system across
different organization and company
sizes based on the SMEs’ experience.
We use the total number of estimated
employees at an affected facility
company in our analysis of costs
because the Coast Guard currently lacks
data on (1) which systems in use at a
facility or OCS facility would need
multifactor authentication, and (2)
whether only a subset of the total
employees would require access. This is
largely because owners and operators
have the discretion to designate both
critical IT and OT systems as well as the
number of employees needing access.
Therefore, for the purpose of this
analysis, we assume all employees
would need multifactor authentication
access. The Coast Guard requests
comment on the accuracy of our cost
estimates for implementing and
maintaining multifactor authentication,
and if only select systems or certain
PO 00000
Frm 00031
Fmt 4701
Sfmt 4702
13433
employees would require multifactor
authentication access in most cases.
We obtain the average number of
facility employees from a Coast Guard
contract that uses D&B Hoovers’
database for company employee data
(available in the docket for this
rulemaking, see the Public Participation
and Request for Comments section of
this preamble.) The average number of
employees at a facility company is 74.
We estimate the undiscounted initialyear cost to implement multifactor
authentication for 290 facility and OCS
facility companies to be approximately
$2,610,000 (290 facilities × $9,000). We
estimate the undiscounted initial-year
and annual cost for multifactor
authentication support and maintenance
at facilities and OCS facilities to be
approximately $3,219,000 (290 facility
companies × 74 employees × $150).
We estimate the total undiscounted
initial-year cost to implement account
security measures for facilities and OCS
facilities to be approximately $5,956,801
($127,801 cost to implement account
security measures + $2,610,000 cost to
set up and configure multifactor
authentication + $3,219,000 cost for
multifactor authentication support). We
estimate the undiscounted annual cost
in years 2 through 10 to be
approximately $3,346,801 ($127,801
cost to manage account security +
$3,219,000 cost to maintain and provide
multifactor authentication support).
We estimate the total discounted cost
to implement account security measures
for (1) 222 facilities and OCS facilities
that would need to implement general
account security measures and (2) 290
facilities and OCS facilities that would
need to implement multifactor
authentication to be approximately
$25,945,783 over a 10-year period of
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
be approximately $3,694,096, using a 7percent discount rate. See table 14.
E:\FR\FM\22FEP2.SGM
22FEP2
13434
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 14: Estimated Account Security Measure Costs of the Proposed Rule for
Facilities and OCS Facilities (2022 Dollars, 10-year Discounted Costs, 7- and 3percent Discount Rates)
Year
Account Security
Management
Multifactor
Authentication Costs
Costs
Total Cost
7 Percent
3 Percent
1
$127,801
$5,829,000
$5,956,801
$5,567,104
$5,783,302
2
$127,801
$3,219,000
$3,346,801
$2,923,226
$3,154,681
3
$127,801
$3,219,000
$3,346,801
$2,731,987
$3,062,797
4
$127,801
$3,219,000
$3,346,801
$2,553,258
$2,973,589
5
$127 801
$3,219 000
$3,346 801
$2,386 223
$2 886 980
6
$127 801
$3.219 000
$3.346 801
$2.230 115
$2 802 893
7
$127 801
$3.219 000
$3.346 801
$2.084 219
$2 721 255
8
$127,801
$3,219,000
$3,346,801
$1,947,869
$2,641,996
9
$127,801
$3,219,000
$3,346,801
$1,820,438
$2,565,044
10
$127,801
$3,219,000
$3,346,801
$1,701,344
$2,490,334
Total
$36,078,010
$25,945,783
$31,082,871
Annualized
$3 607 801
$3,694,096
$3,643,861
Owners and operators of U.S.-flagged
vessels would need to implement the
same account security measures as
facilities. The population of vessels
affected, where applicable, would be
about 5,473, rather than 10,286, because
we subtract the barge population of
4,813 from 10,286, the total number of
affected vessels. Because barges are
unmanned, we assume they do not have
computer systems onboard and,
therefore, may not require account
security measure implementation.
The number of affected vessel owners
and operators would be about 1,602,
excluding 173 barge owners and
operators that do not own or operate
other affected vessels. Based on the
NMSAC estimates detailed above, it
would take a Database Administrator
about 8 hours to implement the account
security measures and 8 hours to
manage account security annually
thereafter on behalf of each owner and
operator of a vessel. We estimate the
undiscounted initial-year cost to
implement and annually recurring cost
to manage account security measures for
owners and operators of U.S.-flagged
vessels, excluding barge owners and
operators, to be approximately $922,239
[(1,602 vessel owners and operators × (8
hours × $71.96)].
The number of owners and operators
who would require multifactor
authentication security is about 1,602,
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
for approximately 5,473 vessels. Based
on Coast Guard information, multifactor
authentication systems would be
implemented at the company level
because networks and account security
policies would be managed at the
company level, and not for each
individual vessel. Any security updates
or multifactor authentication programs
implemented at the company level
could be pushed out to devices located
on board vessels owned or operated by
the company. We use the same cost
estimate from CG–FAC that we use for
facilities. It would cost the owner or
operator of a vessel approximately
$9,000 to implement multifactor
authentication in the first year and
about $150 annually for multifactor
authentication support and maintenance
per end user. To determine the number
of employees for each vessel company,
we use data from the certificate of
inspection manning requirements in
MISLE for each vessel subpopulation.76
We assume 2 crews and multiply the
total number of seafaring crew by 1.33
to account for shoreside staff in order to
obtain an estimate of total company
employees per vessel.77 We estimate the
76 Manning requirements for U.S.-flagged vessels
were established by regulation in 46 CFR part 15.
77 To estimate the average number of mariners
and shoreside employees for each company, Coast
Guard conducted an internet search for publicly
available employment data for the owners and
PO 00000
Frm 00032
Fmt 4701
Sfmt 4702
total undiscounted initial-year cost to
implement multifactor authentication
for 1,602 vessel owners and operators to
be approximately $14,418,000 (1,602
vessel owners and operators × $9,000).
To calculate the annual cost per end
user, we multiply the number of vessels
for a given vessel type by the average
number of employees per vessel and the
$150 annual cost of support and
maintenance. For example, there are
about 426 OSVs in the affected
population, with an average number of
16 employees for each OSV. Therefore,
the undiscounted annual cost of support
and maintenance for OSV owners and
operators would be approximately
$1,022,400 (16 employees per each OSV
(including shoreside) × $150 × 426
OSVs). We perform this calculation for
each vessel type in the affected
population and add the costs together to
obtain the total initial-year cost and
annual cost thereafter. We estimate the
total undiscounted annual cost for
multifactor authentication maintenance
operators of MTSA-regulated vessels. In total, Coast
Guard was able to identify eight MTSA-regulated
vessel owners and operators that publicly provided
their shoreside and seafarer employment numbers.
Using this data, we calculated the percentage of
total employees working shoreside for each vessel.
We then took an average of these percentages and
applied that average to the population of MTSA
vessel owners and operators. The percentage of
shoreside employees ranged from 8 to 87 percent,
with an average of 33 percent, which we used for
each subpopulation of vessels.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.013
lotter on DSK11XQN23PROD with PROPOSALS2
Note: Totals may not sum due to independent rounding.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
and support on vessels to be about
$18,938,100 (number of employees for
each vessel type × $150 × number of
vessels for each vessel type). See table
15. We add these costs to the previously
calculated implementation costs to
obtain the initial-year costs associated
with multifactor authentication of
13435
$33,356,100 ($14,418,000
implementation costs + $18,938,100
annual support and maintenance costs)
as seen in column 3 of table 15.
Table 15: Estimated Annual Multifactor Authentication Support and Maintenance
Costs of the Proposed Rule for U.S.-flagged Vessels Companies by Vessel Type
(2022 Dollars)
Multifactor
Authentication
Number of Number of Employees Per Annual Cost Per End
Vessels Vessel (Includes Shoreside'
User
MODU
1
372
$150
$55 800
Subchapter I Vessels
574
82
$150
$7,060,200
OSVs
Subchapter H Passenger
Vessels
Subchapter K Passenger
Vessels
Subchapter M Towing
Vessels
Subchapter D and
Combination
Subchapters O&D Tank
Vessels
Subchapters K and T
International Passenger
Vessels
426
16
$150
$1,022,400
34
85
$150
$433,500
379
35
$150
$1,989,750
3921
13
$150
$7,645,950
88
40
$150
$528,000
50
27
$150
$202,500
Total
Note: Totals may not sum due to independent rounding.
We estimate the total undiscounted
initial-year cost to implement account
security measures in proposed
§ 101.650(a)(1) through (3), and (5)
through (7) and multifactor
authentication for end users in proposed
§ 101.650(a)(4) for 1,602 U.S.-flagged
vessels to be approximately $34,278,339
($922,239 cost to implement account
security + $33,356,100 cost to
lotter on DSK11XQN23PROD with PROPOSALS2
Annual Costs
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
$18,938,100
implement and provide multifactor
support costs). We estimate the total
undiscounted annual cost in years 2
through 10 to be approximately
$19,860,339 ($922,239 cost to manage
account security + $18,938,100 cost to
maintain and provide multifactor
authentication).
We estimate the total discounted cost
to implement all the account security
PO 00000
Frm 00033
Fmt 4701
Sfmt 4702
measures in proposed § 101.650(a)(1)
through (3), and (5) through (7) and
multifactor authentication for end users
in proposed § 101.650(a)(4) for 1,602
U.S.-flagged vessels to be approximately
$152,965,477 over a 10-year period of
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
be approximately $21,778,843 using a 7percent discount rate. See table 16.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.014
Vessel Tvne
13436
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 16: Estimated Account Security Measure Costs of the Proposed Rule for U.S.flagged Vessels (2022 Dollars, 10-year Discounted Costs, 7- and 3-percent Discount
Rates)
Year
Account Security
Management
Multifactor
Authentication Costs
Costs
Total Cost
7Percent
3Percent
1
$922,239
$33,356,100
$34,278,339
$32,035,831
$33,279,941
2
$922 239
$18 938 100
$19 860 339
$17 346,789
$18 720,274
3
$922,239
$18,938,100
$19,860,339
$16,211,953
$18,175,024
4
$922,239
$18,938,100
$19,860,339
$15,151,358
$17,645,654
5
$922,239
$18,938,100
$19,860,339
$14,160,147
$17,131,703
6
$922 239
$18 938 100
$19 860 339
$13 233.782
$16 632.721
7
$922 239
$18 938 100
$19 860 339
$12 368.021
$16 148.273
8
$922,239
$18,938,100
$19,860,339
$11,558,898
$15,677,935
9
$922,239
$18,938,100
$19,860,339
$10,802,709
$15,221,296
10
$922,239
$18,938,100
$19,860,339
$10,095,989
$14,777,957
Total
$213,021,390
$152,965,477
$183,410,778
Annualized
$21302 139
$21,778,843
$21,501,338
Note: Totals may not sum due to independent rounding.
We estimate the total discounted cost
to implement account security measures
for owners and operators of U.S.-flagged
vessels, facilities, and OCS facilities,
including multifactor authentication, to
be approximately $178,911,259 over a
10-year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$25,472,938, using a 7-percent discount
rate. See table 17.
U.S.-flagged
Vessels Cost
Total Cost
7Percent
3 Percent
1
$5 956 801
$34 278 339
$40 235 140
$37,602,935
$39 063 243
2
$3 346 801
$19 860 339
$23 207 140
$20.270.015
$21874 955
3
$3,346,801
$19,860,339
$23,207,140
$18,943,939
$21,237,821
4
$3,346,801
$19,860,339
$23,207,140
$17,704,616
$20,619,243
5
$3,346,801
$19,860,339
$23,207,140
$16,546,370
$20,018,683
6
$3,346,801
$19,860,339
$23,207,140
$15,463,897
$19,435,614
7
$3,346,801
$19,860,339
$23,207,140
$14,452,240
$18,869,529
8
$3,346,801
$19,860,339
$23,207,140
$13,506,767
$18,319,931
9
$3,346,801
$19,860,339
$23,207,140
$12,623,147
$17,786,340
10
$3,346,801
$19,860,339
$23,207,140
$11,797,333
$17,268,292
Total
$249,099,400
$178,911,259
$214,493,651
Annualized
$24,909,940
$25,472,938
$25,145,199
Note: Totals may not sum due to independent rounding.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00034
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.016
Year
Facilities and
OCS Facilities
Cost
EP22FE24.015
lotter on DSK11XQN23PROD with PROPOSALS2
Table 17: Summary of Account Security Measure Costs of the Proposed Rule for
Facilities, OCS Facilities, and U.S.-flagged Vessels (2022 Dollars, 10-year
Discounted Costs, 7- and 3-percent Discount Rate)
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Cybersecurity Training Cost
The second cost provision under
cybersecurity measures, in proposed
§ 101.650(d), would be training. All
persons with access to IT and OT would
need annual training in topics such as
the relevant aspects of the owner or
operator’s specific cybersecurity
technology and concerns, recognition of
threats and incidents, and incident
reporting procedures. Given the
importance of having a workforce
trained on onsite cybersecurity systems
as soon as possible to detect and
mitigate cyber incidents, cybersecurity
training would be verified during
annual inspections following the
implementation of this proposed rule.
This means we assume there will be
costs related to training in the first year
of analysis. The Coast Guard requests
comment on the ability of affected
owners and operators to develop and
provide relevant cybersecurity training
within the first year of implementation.
Based on information from the Jones
Walker ‘‘Ports and Terminals
Cybersecurity Survey,’’ (see footnote
69), about 25 percent of facilities are
currently conducting cybersecurity
training on an annual basis.78 Therefore,
we estimate the number of facility and
OCS facility owners and operators
needing to implement training to be
about 1,281 (1,708 owners and operators
× 0.75).
Based on information from CISA’s
SMEs, we assume that the CySO at a
facility or OCS facility would spend 2
hours per year to develop, update, and
provide cybersecurity training. SMEs at
CISA also estimate that it would take 1
hour per facility employee to complete
the training annually, based on existing
industry-leading cyber awareness
training programs. This proposed rule
would also require part-time employees
and contractors to complete the training.
However, the Coast Guard has data only
on the number of full-time employees at
facilities and OCS facilities, so we use
this estimate with the acknowledgement
that costs may be higher for facilities
than we estimate in this analysis if we
take other employees into account, such
as part-time employees and contractors.
As before, we use the estimate of the
average number of employees at
facilities and OCS facilities, or 74.
To obtain the unloaded mean hourly
wage rate of employees at facilities and
OCS facilities, we use BLS’s Quarterly
Census of Employment and Wages
(QCEW) data. We also use the North
American Industry Classification
System (NAICS) code for ‘‘Port and
13437
Harbor Operations,’’ which is 488310, to
obtain the representative hourly wage
for employees at facilities and OCS
facilities. The BLS reports the weekly
wage to be $1,653.79 Dividing this value
by the standard number of hours in a
work week, or 40, we obtain the
unloaded hourly wage rate of
approximately $41.33. We once again
apply a load factor of 1.46 to this wage
to obtain a loaded mean hourly wage
rate for facility employees of
approximately $60.34 (($1,653 ÷ 40
hours) × 1.46)).
We estimate the undiscounted initialyear and annual cost for facility and
OCS facility owners and operators to
train employees on aspects of
cybersecurity to be approximately
$5,935,437, rounded [1,281 facility
owners and operators × ((74 employees
at each facility company × $60.34 × 1
hour) + (1 CySO developing training ×
$84.14 × 2 hours))].
We estimate the discounted cost for
facility and OCS facility owners and
operators to complete annual training to
be approximately $41,688,025 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$5,935,437, using a 7-percent discount
rate. See table 18.
Year
Total Cost
7%
3%
1
$5,935,437
$5,547,137
$5,762,560
2
$5,935,437
$5,184,241
$5,594,719
3
$5,935,437
$4,845,085
$5,431,766
4
$5,935,437
$4,528,116
$5,273,559
5
$5,935,437
$4,231,885
$5,119,960
6
$5,935,437
$3,955,032
$4,970,835
7
$5,935,437
$3,696,292
$4,826,053
8
$5,935,437
$3,454,478
$4,685,489
9
$5,935,437
$3 228,484
$4 549 018
10
$5,935,437
$3,017,275
$4,416,523
$41.688.025
$50.630.482
$5.935.437
$5.935.437
Total
$59 354 370
Ammalized
Note: Totals may not sum due to independent rounding.
78 See footnote 69 and page 48 of the survey in
the docket.
79 Readers can access this web page at
www.bls.gov/cew/. In the menu at the top of the
page, readers should use the dropdown menu under
‘‘QCEW Data,’’ and select ‘‘Databases.’’ Doing this
will bring the reader to https://www.bls.gov/cew/
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
data.htm. On this page, select the multi-screen tool
(https://data.bls.gov/cgi-bin/dsrv?en). On screen 1,
select ‘‘488310 NAICS 488310 Port and harbor
operations.’’ On screen 2, select ‘‘US000 U.S.
TOTAL.’’ Select ‘‘5 Private,’’ ‘‘4 Average Weekly
Wage,’’ and ‘‘0 All establishment sizes’’ on screens
3, 4, and 5, respectively. Screen 6 shows the
PO 00000
Frm 00035
Fmt 4701
Sfmt 4725
relevant Series ID (ENUUS000405488310). Select
‘‘Retrieve Data.’’ Please consider that 2022 data
from QCEW are preliminary and may change from
the estimate in the text. For the purposes of this
analysis, we used Q1 2022 QCEW data. Accessed
on July 13, 2023.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.017
lotter on DSK11XQN23PROD with PROPOSALS2
Table 18: Estimated Training Costs of the Proposed Rule for Facility and OCS
Facility Owners and Operators (2022 Dollars, 10-year Discounted Costs, 7- and 3percent Discount Rates)
13438
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
categories, ‘‘Captains, Mates, and Pilots
of Water Vessels,’’ with an occupational
code of 53–5021, ‘‘Sailors and Marine
Oilers,’’ with an occupational code of
53–5011, and ‘‘Ship Engineers,’’ with an
occupational code of 53–5031.80 The
unloaded mean hourly wage rates from
May 2022 for these occupations are
$50.09, $25.65, and $48.55, respectively.
We also use an assortment of labor
categories to estimate a mean hourly
wage for the industrial personnel
identified in the certificate of inspection
for MODUs in the affected population.
According to SMEs with CG–CVC,
industrial personnel aboard MODUs
generally include a mixture of hotel and
steward staff; laborers and riggers;
Employees on board U.S.-flagged
vessels would also be required to
complete annual cybersecurity training.
The hour estimates for the CySO to
develop cybersecurity training and
employees to complete the training are
the same as for facility estimates, 2
hours and 1 hour, respectively. The
training costs for U.S.-flagged vessels
are based upon the number of
employees for each vessel type, similar
to the cost analysis for account security
measures. We chose several
representative labor categories of vessel
employees based on the manning
requirements listed in the certificates of
inspection for each vessel. From the
BLS OEWS program, we use the labor
specialized technicians; and mechanics,
electricians, and electronic technicians
for maintenance. For these groups, we
find a combined unloaded weighted
mean hourly wage of $25.16. For each
vessel type, we weight the
representative wages based on the
average occupational ratios across
vessels in the population. See Appendix
A: Wages Across Vessel Types, for more
details on how the industrial personnel
and weighted mean hourly wages for
each vessel type were calculated.81 We
apply the same load factor we used
previously in this analysis, 1.46, to
these wage rates, to obtain the loaded
mean hourly wage rates shown in table
19.82
Vessel Type
Loaded Weighted Mean Hourly
Wae:e
MODU
$39.60
Subchapter I Vessels
$46.36
OSVs
$54.92
Subchapter H Passenger Vessels
$41.85
Subchapter K Passenger Vessels
$45.52
Subchaoter M Towing Vessels
Subchapter D and Combination
Subchapters O&D Tank Vessels
Subchapters K and T International
Passenger Vessels
$51.28
$55.94
$44.59
We estimate the undiscounted initialyear and annual cost of cybersecurity
training for vessel employees to be
approximately $6,166,909 (number of
vessels for each affected vessel category
× number of employees for each vessel
type × representative mean hourly wage
for vessel type × 1 hours for training).
For example, using OSVs, there are
about 426 OSVs, with 16 employees for
each OSV. Therefore, we estimate the
annual training cost for OSVs to be
about $374,335 (426 OSVs × 16
employees × $54.92 × 1 hour), rounded.
We perform this calculation for all for
the affected vessel types in this
proposed rule and add it to the
estimated costs for training
development. We estimate the
undiscounted annual cost to develop
cybersecurity training to be
approximately $269,585 (1,602 vessel
companies × 1 CySO per vessel
company × $84.14 × 2 hours to develop
training)]. This means the total
undiscounted annual training cost for
the affected population of U.S.-flagged
vessels is $6,436,494 ($6.166,909
employee training costs + $269,585
training development costs). Table 20
displays the total employee training
costs for each vessel type impacted by
the proposed training requirement.
80 See https://www.bls.gov/oes/2022/may/oes_
nat.htm#00-0000 for 2022 wage rates associated
with the listed occupations. Accessed September 9,
2023.
81 It should be noted that the wage calculations
in Appendix A: Wages Across Vessel Types are
conducted with occupational ratios based on
employee counts without the 1.33 shoreside
employee modifier applied. Applying this
multiplier evenly across all the employee counts
would not have an impact on the occupational
ratios, and thus would not impact our estimated
weighted mean hourly wages. Because we do not
have a good grasp on what occupations the
shoreside employees would have, we simply apply
the weighted mean hourly wages to all employees
in the give population of vessels.
82 See footnote 71.
83 See Appendix A: Wages Across Vessel Types
for more information on how these wages rates were
calculated.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00036
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.018
lotter on DSK11XQN23PROD with PROPOSALS2
Table 19: Estimated Weighted Mean Hourly Wage Rates for Employees Aboard
U.S.-flagged Vessels 83
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
13439
Table 20. Estimated Training Costs of the Proposed Rule for U.S.-Flagged Vessels
by Type (2022 Dollars)
Vessel Type
Number of Vessels
Number of
Employees
(Includes
Shoreside)
MODU
1
372
$39.60
$14 731
Subchaoter I Vessels
574
82
$46.36
$2.182 072
OSVs
Subchapter H Passenger
Vessels
Subchapter K Passenger
Vessels
Subchapter M Towing
Vessels
Subchapter D and
Combination
Subchapters O&D Tank
Vessels
Subchapters K and T
International Passenger
Vessels
426
16
$54.92
$374,335
34
85
$41.85
$120,947
379
35
$45.52
$603,823
3921
13
$51.28
$2,613,895
88
40
$55.94
$196,909
50
27
$44.59
$60,197
Trainee Wage
Total
$6,166,909
Total
Note: Totals may not sum due to independent rounding.
We estimate the discounted cost for
employees aboard U.S.-flagged vessels
to complete annual cybersecurity
training to be approximately
$45,207,239 over a 10-year period of
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
be approximately $6,436,494, using a 7percent discount rate. See table 21.
Total Cost
7%
3%
1
$6 436 494
$6,015 415
$6,249,023
2
$6 436 494
$5,621883
$6,067,013
3
$6,436,494
$5,254,096
$5,890,304
4
$6 436 494
$4.910 370
$5.718.742
5
$6 436 494
$4.589 131
$5.552.176
6
$6,436,494
$4,288,908
$5,390,462
7
$6,436,494
$4,008,325
$5,233,459
8
$6 436 494
$3.746 098
$5.081.028
9
$6,436,494
$3,501,026
$4,933,037
10
$6,436,494
$3,271,987
$4,789,356
Total
$64,364,940
$45.207.239
$54,904,600
$6,436,494
$6,436,494
Annualized
Note: Totals may not sum due to independent rounding.
We estimate the total discounted cost
of cybersecurity training for facilities
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
and vessels to be approximately
$86,895,266 over a 10-year period of
PO 00000
Frm 00037
Fmt 4701
Sfmt 4702
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.020
Year
EP22FE24.019
lotter on DSK11XQN23PROD with PROPOSALS2
Table 21: Estimated Training Costs of the Proposed Rule for U.S.-Flagged Vessels
(2022 Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
13440
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
be approximately $12,371,931, using a
7-percent discount rate. See table 22.
Year
Facilities and
OCS Facilities
U.S.-Flagged
Vessels
Total Cost
7%
3%
1
$5.935 437
$6 436 494
$12 371 931
$11 562 552
$12 011 583
2
$5,935,437
$6,436,494
$12,371,931
$10,806,124
$11,661,732
3
$5,935,437
$6,436,494
$12,371,931
$10,099,181
$11,322,069
4
$5.935 437
$6 436 494
$12 371 931
$9 438.487
$10 992 300
5
$5.935 437
$6 436 494
$12 371 931
$8 821.016
$10 672 136
6
$5,935,437
$6,436,494
$12,371,931
$8,243,940
$10,361,297
7
$5,935 437
$6 436 494
$12 371 931
$7 704,617
$10 059 512
8
$5,935 437
$6 436 494
$12 371 931
$7 200 576
$9766517
9
$5,935,437
$6,436,494
$12,371,931
$6,729,511
$9,482,055
10
$5,935,437
$6,436,494
$12,371,931
$6,289,262
$9,205,879
Total
$59,354,370
$64,364,940
$123,719,310
$86,895,266
$105,535,080
$12,371,931
$12,371,931
lotter on DSK11XQN23PROD with PROPOSALS2
Annualized
Note: Totals may not sum due to independent rounding.
Penetration Testing
The third proposed provision under
cybersecurity measures that would
impose costs on industry is penetration
testing, in proposed § 101.650(e)(2). The
CySO for each U.S.-flagged vessel,
facility, and OCS facility would ensure
that a penetration test is completed in
conjunction with renewing the FSP,
VSP, or OCS FSP. We assume facility
and vessel owners and operators in the
affected population would pay a third
party to conduct a penetration test to
maintain safety and security within the
IT and OT systems for all KEVs. The
cost for penetration testing is a function
of the number of vessel and facility
owners and operators, because networks
are typically managed at a corporate
level. At the conclusion of the test, the
CySO would also need to document all
identified vulnerabilities in the FSA,
OCS FSP, or VSA—a cost that is
included in our analysis of annual
Cybersecurity Plan maintenance.
Further, it is expected that the CySO
would also work to correct or mitigate
the identified vulnerabilities. However,
the methods employed and time taken
to correct or mitigate these
vulnerabilities represent a source of
uncertainty in our analysis, and we are
unable to estimate the associated costs.
Based on the Jones Walker survey (see
footnote number 69), 68 percent of
facilities and OCS facilities are currently
conducting penetration testing. Using
1,708 affected facility owners and
operators, the number of facility and
OCS facility owners and operators
needing to conduct penetration testing
is about 547 (1,708 × 0.32). Using cost
estimates for penetration testing from
NMSAC members who have experience
conducting and contracting with
facilities and OCS facilities to conduct
penetration tests, we estimate it would
cost each facility owner or operator
$5,000 for the initial penetration test
and an additional $50 for each
employee’s internet Protocol (IP)
address,84 to capture the additional
costs of network complexity. The
number of employees for each facility is
74. Facility and OCS facility owners and
operators would incur penetration
testing costs in conjunction with
submitting and renewing the
Cybersecurity Plan, or every 5 years.
This means penetration testing costs
would be incurred in the second and
seventh year of analysis. We estimate
the undiscounted second- and seventhyear costs to facilities and OCS facilities
for penetration testing to be about
$4,758,900 [(547 facility owners and
operators × $5,000) + (74 employees ×
547 facility owners and operators ×
$50)]. We estimate the discounted cost
for owners and operators of facilities
and OCS facilities to conduct
penetration testing to be about
$7,120,212 over a 10-year period of
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
be about $979,477 using a 7-percent
discount rate. See table 23.
84 An IP address is a unique numerical identifier
for each device or network that connects to the
internet. Because we do not have data on the
number of devices each organization uses, we use
the number of employees as a proxy because each
employee could have a device using the
organizational network.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00038
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.021
Table 22: Summary of Training Costs of the Proposed Rule for U.S.-Flagged
Vessels, Facilities, and OCS Facilities (2022 Dollars, 10-year Discounted Costs, 7and 3-percent Discount Rates)
13441
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 23: Estimated Penetration Testing Costs of the Proposed Rule for Facilities
and OCS Facilities (2022 Dollars, 10-year Discounted Costs, 7- and 3-percent
Discount Rates)
Number of
Employees
Cost of
Cost per IP
uer Facilitv Penetration Test Address Total Cost
1
0
0
$0
$0
547
74
$5,000
$50
3
0
0
$0
$0
$0
$0
$0
4
0
0
$0
$0
$0
$0
$0
5
0
0
$0
$0
$0
$0
$0
6
0
0
$0
$0
$0
$0
$0
7
547
74
$5,000
$50
8
0
0
$0
$0
$0
$0
$0
9
0
0
$0
$0
$0
$0
$0
10
0
0
$0
$0
$0
$0
$0
$4,758,900 $4,156,608
$4,758 900 $2,963,604
$9,517,800 $7,120,212
$1,013,758
Annualized
Note: Totals may not sum due to independent rounding.
lotter on DSK11XQN23PROD with PROPOSALS2
Owners and operators of U.S.-flagged
vessels would also need to conduct
penetration testing, similar to facilities.
We do not include barges or bargespecific owners and operators, given the
unmanned nature of barges and their
relatively limited onboard IT and OT
systems. All estimates for vessel
VerDate Sep<11>2014
17:33 Feb 21, 2024
$0
3%
2
Total
$0
7%
Jkt 262001
penetration testing are the same as for
facilities and OCS facilities. We estimate
the undiscounted second- and seventhyear costs for owners and operators of
vessels to conduct penetration testing to
be approximately $14,322,700 [(1,602
vessel owners and operators × $5,000) +
(number of vessels for each vessel type
PO 00000
Frm 00039
Fmt 4701
Sfmt 4702
$0
$4,485,720
$3,869,421
$8,355,141
$979,477
× number of employees for each vessel
type × $50)]. See table 24 for a
calculation of the costs per IP address
for the various vessel populations,
which can be added to the costs per
owner or operator costs, or $8,010,000
(1,602 owners and operators × $5,000)
in years 2 and 7.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.022
Year
Number of
Facilities
13442
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 24: Estimated Penetration Testing Costs of the Proposed Rule for U.S.Flagged Vessels by Vessel Type (2022 Dollars, Undiscounted)
Vessel Type
Number of
Vessels
Number of
Employees per
Vessel
Cost per IP Address
Total for Population
MODU
1
372
$50
$18,600
Subchaoter I Vessels
574
82
$50
$2 353 400
OSVs
Subchapter H Passenger
Vessels
Subchapter K Passenger
Vessels
Subchapter M Towing
Vessels
Subchapter D and
Combination Subchapters
O&D Tank Vessels
Subchapters K and T
International Passenger
Vessels
426
16
$50
$340 800
34
85
$50
$144 500
379
35
$50
$663 250
3921
13
$50
$2 548 650
88
40
$50
$176 000
50
27
$50
$67,500
Total
Note: Totals may not sum due to independent rounding.
We estimate the discounted cost for
owners and operators of vessels to
conduct penetration testing to be
$6,312,700
approximately $21,429,459 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$3,051,073 using a 7-percent discount
rate. See table 25.
Total Cost
7%
3%
1
$0
$0
$0
2
$14,322,700
$12,510,001
$13,500,518
3
$0
$0
$0
4
$0
$0
$0
5
$0
$0
$0
6
$0
$0
$0
7
$14,322,700
$8,919,458
$11,645,666
8
$0
$0
$0
9
$0
$0
$0
10
$0
$0
$0
Total
$28.645.400
$21.429.459
$25.146.184
Annualized
$3,051,073
Note: Totals may not sum due to independent rounding.
$2,947,900
We estimate the total discounted cost
to conduct penetration testing for
owners and operators of facilities, OCS
facilities, and U.S.-flagged vessels to be
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
approximately $28,549,669 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
PO 00000
Frm 00040
Fmt 4701
Sfmt 4702
$4,064,831 using a 7-percent discount
rate. See table 26.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.024
Year
EP22FE24.023
lotter on DSK11XQN23PROD with PROPOSALS2
Table 25: Estimated Penetration Testing Costs of the Proposed Rule for Population
of U.S.-Flagged Vessels (2022 Dollars, 10-year Discounted Costs, 7- and 3-percent
Discount Rates)
13443
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 26: Estimated Penetration Testing Costs of the Proposed Rule for Facilities,
OCS Facilities, and U.S.-Flagged Vessels (2022 Dollars, 10-year Discounted Costs, 7and 3-percent Discount Rates)
U.S.-Flagged
Vessel Cost
7 Percent
Total Cost
1
$0
$0
$0
$0
$0
2
$4,758,900
$14,322,700
$19,081,600
$16,666,608
$17,986,238
3
$0
$0
$0
$0
$0
4
$0
$0
$0
$0
$0
5
$0
$0
$0
$0
$0
6
$0
$0
$0
$0
$0
7
$4 758 900
$14 322 700
$19 081 600
$11 883 061
$15 515 087
8
$0
$0
$0
$0
$0
9
$0
$0
$0
$0
$0
10
$0
$0
$0
$0
$0
Total
$9,517,800
$28,645,400
$38,163,200
$28,549,669
$33,501,325
$4,064,831
$3,927,377
Annualized
Note: Totals may not sum due to independent rounding.
The fourth cost provision under
cybersecurity measures would be
resilience, in proposed § 101.650(g).
Each CySO for a facility, OSC facility,
and U.S.-flagged vessel would be
required to report any cyber incident to
the NRC, develop a Cyber Incident
Response Plan, validate the
effectiveness of Cybersecurity Plans
through annual tabletop exercises or
periodic reviews of incident response
cases, and perform backups of critical IT
and OT systems. Of these proposed
requirements, the costs associated
development of a Cyber Incident
Response Plan are already captured in
the overall costs to develop the
Cybersecurity Plan, and any subsequent
annual maintenance for the Cyber
Incident Response Plan would be
captured in the costs for annual
maintenance of the Cybersecurity Plan.
In addition, costs associated with
validating and conducting exercise of
Cybersecurity Plans through annual
tabletop exercises or periodic reviews of
incident response cases is already
captured in the costs estimated for drills
and exercises in proposed § 101.635.
To estimate the costs associated with
cyber incident reporting, the Coast
Guard uses historical cyber incident
reporting data from the NRC. From 2018
to 2022, the NRC fielded and processed
an average of 18 cyber incident reports
from facilities and OCS facilities, and an
average of 2 cyber incident reports from
U.S.-flagged vessels, for a total of 20
cyber incident reports per year. While
we anticipate that this number could
increase or decrease following the
publication of a rule focused on
cybersecurity standards and procedures,
we use the historical averages to
estimate costs for the affected
population.85 Due to the uncertainty
surrounding how these regulatory
changes may impact the number of
incident reports made in the future, the
Coast Guard requests comment on the
expected number of incident reports
submitted each year.
For both the population of facilities
and OCS facilities and the population of
U.S.-flagged vessels, we assume that it
will take 8.5 minutes (0.15 hours) of a
CySO’s time to report a cyber incident
to the NRC. We base this estimated hour
burden on the time to report suspicious
maritime activity to the NRC in
currently approved OMB ICR, Control
Number 1625–0096 titled ‘‘Report of Oil
or Hazardous Substance Discharge and
Report of Suspicious Maritime
Activity.’’ For the population of
facilities and OCS facilities, we estimate
annual undiscounted costs of $227 (18
cyber incident reports × 0.15 hours to
report × $84.14 CySO wage). We
estimate the discounted cost for owners
and operators of facilities and OCS
facilities to report cyber incidents to be
about $1,592 over a 10-year period of
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
be about $227 using a 7-percent
discount rate. See table 27.
85 The Coast Guard believes that cyber incident
reports could increase following publication of this
NPRM due to greater enforcement of reporting
procedures and greater awareness surrounding the
need to report. However, the Coast Guard
acknowledges that cyber incident reports could also
decrease because greater prevention measures
would be implemented because of this proposed
rule. As a result, we use historical cyber incident
reporting data to analyze costs moving forward.
Resilience
lotter on DSK11XQN23PROD with PROPOSALS2
3 Percent
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00041
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.025
Year
Facilities and
OCS Facilities
Cost
13444
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 27: Estimated Cyber Incident Reporting Costs of the Proposed Rule for the
Population of Facilities and OCS Facilities (2022 Dollars, 10-year Discounted Costs,
7- and 3-percent Discount Rates)
Year
Number of Incident
Reoorts Per Year
CvSOWa2e
Hours to Report
Incident
Total Cost
7%
3%
1
18
$84.14
0.15
$227
$212
$220
2
18
$84.14
0.15
$227
$198
$214
3
18
$84.14
0.15
$227
$185
$208
4
18
$84.14
0.15
$227
$173
$202
5
18
$84.14
0.15
$227
$162
$196
6
18
$84.14
0.15
$227
$151
$190
7
18
$84.14
0.15
$227
$141
$185
8
18
$84.14
0.15
$227
$132
$179
9
18
$84.14
0.15
$227
$123
$174
10
18
$84.14
0.15
$227
$115
$169
$2,270
$1,592
$1,937
$227
$227
$227
Total
Annualized
Note: Totals may not sum due to independent rounding.
For the population of U.S.-flagged
vessels, we estimate annual
undiscounted costs of $25 (2 cyber
incident reports × 0.15 hours to report
× $84.14 CySO wage). We estimate the
discounted cost for owners and
operators of facilities and OCS facilities
to report cyber incidents to be about
$250 over a 10-year period of analysis,
using a 7-percent discount rate. We
estimate the annualized cost to be about
$25 using a 7-percent discount rate. See
table 28.
Number of Incident
Reoorts Per Year
CvSOWa2e
Hours to Report
Incident
Total Cost
7%
3%
1
2
$84.14
0.15
$25
$23
$24
2
2
$84.14
0.15
$25
$22
$24
3
2
$84.14
0.15
$25
$20
$23
4
2
$84.14
0.15
$25
$19
$22
5
2
$84.14
0.15
$25
$18
$22
6
2
$84.14
0.15
$25
$17
$21
7
2
$84.14
0.15
$25
$16
$20
8
2
$84.14
0.15
$25
$15
$20
9
2
$84.14
0.15
$25
$14
$19
10
2
$84.14
0.15
$25
$13
$19
$250
$177
$214
$25
$25
$25
Total
Annualized
Note: Totals may not sum due to independent rounding.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00042
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.027
Year
EP22FE24.026
lotter on DSK11XQN23PROD with PROPOSALS2
Table 28: Estimated Cyber Incident Reporting Costs of the Proposed Rule for the
Population of U.S.-flagged Vessels (2022 Dollars, 10-year Discounted Costs, 7- and
3-percent Discount Rates)
13445
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
We estimate the total discounted cost
for owners and operators of facilities,
OCS facilities, and U.S.-flagged vessels
to be approximately $1,771 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$252 using a 7-percent discount rate.
See table 29.
Table 29: Estimated Cyber Incident Reporting Costs of the Proposed Rule for the
Population of Facilities, OCS Facilities, and U.S.-flagged Vessels (2022 Dollars, 10year Discounted Costs, 7- and 3-percent Discount Rates)
$252
7%
$236
$245
$25
$252
$220
$238
$227
$25
$252
$206
$231
4
$227
$25
$252
$192
$224
5
$227
$25
$252
$180
$217
6
$227
$25
$252
$168
$211
7
$227
$25
$252
$157
$205
8
$227
$25
$252
$147
$199
9
$227
$25
$252
$137
$193
10
$227
$25
$252
$128
$188
$2,520
$1,771
$2,151
$252
$252
Facilities
Vessels
Total Cost
1
$227
$25
2
$227
3
Total
lotter on DSK11XQN23PROD with PROPOSALS2
Annualized
Note: Totals may not sum due to independent rounding.
The Coast Guard does not have data
on the IT resources that owners and
operators would need to back up data,
either internally or externally. Coast
Guard SMEs indicate that most of the
affected population is likely already
performing data backups. The time
burden of backing up data is minimal
because they can occur in the
background through automated
processes, making any new costs a
function of data storage space. The
external storage of data would require
cloud storage (storage on an external
server), and the cost would be
dependent upon the capacity needed;
for example, 1 terabyte or 100 terabytes
of space. These costs would likely be
incurred on a monthly basis, although
we do not know how much additional
data space a given owner or operator
would need, if any. Coast Guard SMEs
with CG–CYBER indicate that the
current market prices for cloud storage
subscriptions range from $21 to $41 per
month for 1 terabyte of data, $54 to $320
per month for 10 terabytes, and up to
$402 to $3,200 per month for 100
terabytes of data. There may also be
costs associated with the encryption of
data that we are not able to estimate in
this analysis. The Coast Guard requests
public comment on the costs associated
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
with data backup storage and
protection.
Routine System Maintenance for Risk
Management
The final cost provision under
cybersecurity measures would be
routine system maintenance for risk
management, in proposed
§ 101.650(e)(3)(i) through (vi). This
proposed rule would require the CySO
of a U.S.-flagged vessel, facility, or OCS
facility to ensure patching (software
updates) or implementing controls for
all KEVs in critical IT and OT systems
in paragraph (e)(3)(i), maintain a
method to receive or act on publicly
submitted vulnerabilities in paragraph
(e)(3)(ii), maintain a method to share
threat and vulnerability information
with external stakeholders in paragraph
(e)(3)(iii), ensure there are no
exploitable channels exposed to internet
accessible systems in paragraph
(e)(3)(iv), ensure that no OT is
connected to the publicly accessible
internet unless explicitly required for
operation in paragraph (e)(3)(v), and
conduct vulnerability scans according to
the Cybersecurity Plan in paragraph
(e)(3)(vi).
Based on information from CGCYBER
and NMSAC, we estimate costs for only
the vulnerability scans in this analysis,
because it is expected that CySOs will
PO 00000
Frm 00043
Fmt 4701
Sfmt 4702
3%
incorporate many of these provisions
into the initial development and annual
maintenance of the Cybersecurity Plan.
Provisions that require setting up
routine patching, developing methods
for communicating vulnerabilities, and
ensuring limited network connectivity
of OT and other exploitable systems are
expected to be less time-intensive efforts
that will be completed following an
initial Cybersecurity Assessment and
documented in the Cybersecurity Plan.
As a result, we include those costs in
that portion of the analysis. However, if
an OT system does need to be taken
offline or segmented from other IT
systems, the Coast Guard does not have
information on how long or intensive
that process would be because of the
great degree of variability in OT systems
within the affected population.
We discuss network segmentation and
uncertainty more in later sections in this
NPRM. We request public comment on
the expected costs of network
segmentation, particularly from those in
the affected population who have
completed these processes in the past.
Based on information from CGCYBER,
the cost to acquire third-party software
capable of vulnerability scans would be
approximately $3,390 annually (which
includes the software subscription cost)
for each U.S.-flagged vessel, facility, and
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.028
Year
13446
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
OCS facility. We base our analysis on
the cost of a prevalent vulnerability
scanner or virus software for business.
Vulnerability scans can occur in the
background while systems are
operational and represent a less
intensive method of monitoring IT and
OT systems for vulnerabilities, which
complements more intensive
penetration tests that would be required
every 5 years. For this reason, we do not
estimate an hour burden in addition to
the annual subscription cost of securing
vulnerability scanning software. We
estimate the undiscounted annual cost
for facility owners and operators to
subscribe to and use vulnerability
scanning software to be approximately
$5,790,120 (1,708 facility owners and
operators × $3,390). We estimate the
undiscounted annual cost for vessel
owners and operators to subscribe to
and use vulnerability scanning software
to be approximately $5,430,780 (1,602
vessel owners and operators × $3,390).
Combined, we estimate the total
discounted cost for owners and
operators of facilities, OCS facilities,
and U.S.-flagged vessels to use
vulnerability scanning software to be
approximately $78,810,907 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$11,220,900, using a 7-percent discount
rate. See table 30.
Table 30: Estimated Vulnerability Scanning Software Costs of the Proposed Rule
for Facilities, OCS Facilities, and U.S.-flagged Vessels (2022 Dollars, 10-year
Discounted Costs, 7- and 3-percent Discount Rates)
Year
Facility and OCS
Facilitv Costs
U.S.-flagged
Vessel Costs
Total Cost
7%
3%
1
$5 790 120
$5.430 780
$11220 900
$10 486 822
$10 894 078
2
$5,790,120
$5,430,780
$11,220,900
$9,800,769
$10,576,774
3
$5,790,120
$5,430,780
$11,220,900
$9,159,597
$10,268,713
4
$5 790 120
$5.430 780
$11220 900
$8,560,371
$9 969 624
5
$5 790 120
$5.430 780
$11220 900
$8,000,347
$9 679 247
6
$5,790,120
$5,430,780
$11,220,900
$7,476,959
$9,397,327
7
$5 790 120
$5.430 780
$11220 900
$6,987,813
$9 123 619
8
$5 790 120
$5.430 780
$11220 900
$6,530,666
$8 857 882
9
$5,790,120
$5,430,780
$11,220,900
$6,103,426
$8,599,886
10
$5,790,120
$5,430,780
$11,220,900
$5,704,137
$8,349,403
$112,209 000
$78,810,907
$95,716,553
$11,220,900
Note: Totals may not sum due to independent rounding.
$11,220,900
$11,220,900
Annualized
Total Costs of the Proposed Rule to
Industry
lotter on DSK11XQN23PROD with PROPOSALS2
We estimate the total discounted cost
of this proposed rule to the affected
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
population of facilities and OCS
facilities to be approximately
$221,437,074 over a 10-year period of
analysis, using a 7-percent discount
PO 00000
Frm 00044
Fmt 4701
Sfmt 4702
rate. We estimate the annualized cost to
be approximately $31,527,658, using a
7-percent discount rate. See table 31.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.029
Total
lotter on DSK11XQN23PROD with PROPOSALS2
Jkt 262001
Frm 00045
Fmt 4701
Sfmt 4702
22FEP2
Cyber
Incident
Reporting
Costs
Year
Cybersecurity
Plan Costs
1
$14,350,077
$1,437,111
$5,956,801
$5,935,437
$0
$5,790,120
$227
$33,469,773 $31,280,162 $32,494,925
2
$15,784,664
$1,437,111
$3,346,801
$5,935,437
$4,758,900
$5,790,120
$227
$37,053,260 $32,363,752 $34,926,251
3
$14 350 077
$1437111
$3,346 801
$5 935 437
$0
$5 790 120
$227
$30 859,773 $25 190 767 $28 241 064
4
$14,350,077
$1,437,111
$3,346,801
$5,935,437
$0
$5,790,120
$227
$30,859,773 $23,542,773 $27,418,509
5
$14,350,077
$1,437,111
$3,346,801
$5,935,437
$0
$5,790,120
$227
$30,859,773 $22,002,592 $26,619,911
6
$14,350,077
$1,437,111
$3,346,801
$5,935,437
$0
$5,790,120
$227
$30,859,773 $20,563,170 $25,844,574
7
$4,520,211
$1,437,111
$3,346,801
$5,935,437
$4,758,900
$5,790,120
$227
$25,788,807 $16,059,973 $20,968,660
8
$14,350,077
$1,437,111
$3,346,801
$5,935,437
$0
$5,790,120
$227
$30,859,773 $17,960,669 $24,360,990
9
$14,350,077
$1,437,111
$3,346,801
$5,935,437
$0
$5,790,120
$227
$30,859,773 $16,785,672 $23,651,446
10
$14,350,077
$1,437,111
$3,346,801
$5,935,437
$0
$5,790,120
$227
$30,859,773 $15,687,544 $22,962,569
Total
$135.105 491
$14.371110
$36.078.010
$59,354.370
$9.517 800
$57.901.200
$2,270
$312.330.251 $221.437 074 $267,488.899
Annualized
Percent of
Total
VuJnerability
Training Penetration Management
Costs
Costs
Testine Costs
Total Costs
7%
3%
$31,233,025 $31,527,658 $31,357,859
43.26%
4.60%
11.55%
Note: Totals may not sum due to independent rounding
19.00%
3.05%
18.54%
0.00%
100.00%
-
-
13447
resubmission, maintenance, and audits)
at 43.26 percent of the total costs to
E:\FR\FM\22FEP2.SGM
and OCS facilities are Cybersecurity
Plan-related costs (development,
PO 00000
Account Security
and Multifactor
Authentication
Costs
Drills and
Exercises
Costs
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
As seen in table 31, the primary cost
drivers for the population of facilities
VerDate Sep<11>2014
EP22FE24.030
Table 31: Summary of Total Discounted Costs of the Proposed Rule for Facilities and OCS Facilities (2022 Dollars, 10-year
Discounted Costs, 7- and 3-percent Discount Rates)
13448
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
industry. Cybersecurity training and
vulnerability management costs come in
second and third at 19 percent and
18.54 percent of the total costs,
respectively. We believe some of this is
due to the analysis of Cybersecurity
Plan costs and vulnerability
management costs, which assumes no
baseline activity within the affected
population because of a lack of
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
information. Costs that appear as a
higher percentage of the total costs in
the population of U.S.-flagged vessels
(account security and multifactor
authentication, for example) have been
adjusted based on current baseline
activity within the population of
facilities based on survey results, and
thus, appear as smaller impacts to the
population in general.
PO 00000
Frm 00046
Fmt 4701
Sfmt 4702
We estimate the total discounted cost
of this proposed rule to the affected
population of U.S.-flagged vessels to be
approximately $313,656,415 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$44,657,617, using a 7-percent discount
rate. See table 32.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
Jkt 262001
Frm 00047
Fmt 4701
Sfmt 4702
22FEP2
EP22FE24.031
1
$5,973,940
$1,493,485
$34,278,339
$6,436,494
$0
2
$6 573.017
$1493 485
$19.860 339
$6.436 494
$14 322 700
3
$7,168,728
$1,493,485
$19,860,339
$6,436,494
$0
4
$7,168,728
$1,493,485
$19,860,339
$6,436,494
$0
5
$7,168,728
$1,493,485
$19,860,339
$6,436,494
$0
6
$7,168,728
$1,493,485
$19,860,339
$6,436,494
$0
7
$1,882,044
$1,493,485
$19,860,339
$6,436,494
$14,322,700
8
$7,168,728
$1,493,485
$19,860,339
$6,436,494
$0
9
$7 168.728
$1493 485
$19.860 339
$6.436 494
$0
10
$7,168,728
$1,493,485
$19,860,339
$6,436,494
$0
$14,934,850
$213,021,390
$64,364,940
$28,645,400
3.40%
48.43%
14.63%
6.51%
Total $64,610,097
Annualize
d
Percent of
Total
14.69%
Note: Totals may not sum due to independent rounding.
Cyber
Incident
Vulnerability
Reporting
Manal!ement Costs
Costs
Total Costs 7 Percent
$50,105,66
$5,430,780
$25
$53,613,063
6
$47,267,74
$5 430.780
$25
$54.116 840
4
$32,970,15
$5,430,780
$25
$40,389,851
0
$30,813,22
$5,430,780
$25
$40,389,851
4
$28,797,40
$5,430,780
$25
$40,389,851
6
$26,913,46
$5,430,780
$25
$40,389,851
3
$30,779,94
$5,430,780
$25
$49,425,867
6
$23,507,26
$5,430,780
$25
$40,389,851
1
$21,969,40
$25
$40.389 851
3
$5 430.780
$20,532,15
$5,430,780
$25
$40,389,851
2
$439,884,72 $313,656,4
$54,307,800
$250
7
15
$44,657,61
$43,988,473
7
12.35%
0.00%
100.00%
-
3 Percent
$52,051,51
7
$51,010,31
2
$36,962,43
5
$35,885,85
9
$34,840,64
0
$33,825,86
4
$40,187,75
3
$31,884,12
1
$30,955,45
8
$30,053,84
2
$377,657,8
01
$44,273,01
5
-
13449
authentication at 48.43 percent of the
total costs to industry. Costs related to
E:\FR\FM\22FEP2.SGM
flagged vessels are costs related to
account security and multifactor
PO 00000
Year
Account
Security and
Cybersecur
Multifactor
ity Plan
Drills and
Authenticatio
Penetration
Costs
Exercises Costs
nCosts
Traininl! Costs Testinl! Costs
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
As in table 32, the primary cost
drivers for the population of U.S.-
VerDate Sep<11>2014
Table 32: Summary of Total Costs of the Proposed Rule for U.S.-flagged Vessels (2022 Dollars, 10-year Discounted Costs, 7percent Discount Rate)
13450
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
the Cybersecurity Plan and
cybersecurity training come in second
and third at 14.69 percent and 14.63
percent of the total costs, respectively.
We estimate that account security and
multifactor authentication costs
represent such a high portion of the
overall costs related to cybersecurity
because the Coast Guard was unable to
estimate current baseline activity for
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
these provisions and used conservative
(upper-bound) estimates related to the
costs of implementing and managing
multifactor authentication. As a result,
the Coast Guard requests public
comment on who in the affected
population of U.S.-flagged vessels has
already implemented multifactor
authentication and what the associated
costs were.
PO 00000
Frm 00048
Fmt 4701
Sfmt 4702
We estimate the total discounted cost
of this proposed rule to industry to be
approximately $535,093,488 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$76,185,275, using a 7-percent discount
rate. See table 33.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
VerDate Sep<11>2014
Jkt 262001
PO 00000
Year
Acc01mt
Security and
Multifactor
Drills and
Authentication
Cybersecurity
Plan Costs
Exercises Costs
Costs
Trainine Costs
Penetration
Testine Costs
Vulnerability
Manaeement Costs
Cyber
Incident
Reporting
Costs
Total Costs
7 Percent
3 Percent
Frm 00049
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
I
$20,324,017
$2,930,596
$40,235,140
$12,371,931
$0
$11,220,900
$252
$87,082,836
$81,385,828 $84,546,443
2
$22,357,681
$2,930,596
$23,207,140
$12,371,931
$19,081,600
$11,220,900
$252
$91,170,100
$79,631,496 $85,936,563
3
$21,518,805
$2,930,596
$23,207,140
$12,371,931
$0
$11,220,900
$252
$71,249,624
$58,160,917 $65,203,499
4
$21518805
$2 930.596
$23 207140
$12.371 931
$0
$11.220 900
$252
$71249624
$54 355 997 $63.304 368
5
$21518805
$2 930.596
$23 207140
$12.371 931
$0
$11.220 900
$252
$71249624
$50 799 997 $61.460 552
6
$21,518,805
$2,930,596
$23,207,140
$12,371,931
$0
$11,220,900
$252
$71,249,624
$47,476,633 $59,670,438
7
$6,402,255
$2,930,596
$23,207,140
$12,371,931
$19,081,600
$11,220,900
$252
$75,214,674
$46,839,919 $61,156,413
8
$21,518,805
$2,930,596
$23,207,140
$12,371,931
$0
$11,220,900
$252
$71,249,624
$41,467,930 $56,245,111
9
$21,518,805
$2,930,596
$23,207,140
$12,371,931
$0
$11,220,900
$252
$71,249,624
$38,755,075 $54,606,904
10
$21,518,805
$2,930,596
$23,207,140
$12,371,931
$0
$11,220,900
$252
$71,249,624
Total
22FEP2
Annualized
Percent of
Total
$36,219,696 $53,016,412
$645,146,70
$752,214,978 $535,093,488
3
$75,221,498
26.55%
3.90%
33.12%
Note: Totals may not sum due to independent rounding.
16.45%
5.07%
14.92%
0.00%
100.00%
$76,185,275 $75,630,875
-
-
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Table 33: Summary of Total Costs of the Proposed Rule to Industry (2022 Dollars, 10-year Discounted Costs, 7- and 3-percent
Discount Rate)
13451
EP22FE24.032
13452
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Total Costs of the Proposed Rule per
Affected Owner or Operator
lotter on DSK11XQN23PROD with PROPOSALS2
We estimate the average annual cost
per owner or operator of a facility or
OCS facility to be approximately
$27,589, under the assumption that an
owner or operator would need to
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
implement each of the provisions
required by this proposed rule. Each
additional facility owned or operated
would increase the estimated annual
costs by an average of $4,396 per
facility, since each facility or OCS
facility will require an individual
Cybersecurity Plan. Year 2 of the
PO 00000
Frm 00050
Fmt 4701
Sfmt 4702
analysis period represents the year with
the highest costs incurred per owner,
with estimated costs of $37,667 for an
owner or operator with one facility or
OCS facility. See table 34 for a
breakdown of the costs per entity for an
owner or operator owning one facility or
OCS facility.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
Jkt 262001
Frm 00051
Fmt 4701
Sfmt 4702
22FEP2
Cyber
Incident
Reporting
Total
Year
1
1
$4.207
$841
$576
$20.100
$4.633
$0
$3 390
$13
$33 760
2
1
$8,414
$841
$576
$11,100
$4,633
$8,700
$3,390
$13
$37,667
3
1
$4.207
$841
$576
$11.100
$4.633
$0
$3 390
$13
$24 760
4
1
$4,207
$841
$576
$11,100
$4,633
$0
$3,390
$13
$24,760
5
1
$4,207
$841
$576
$11,100
$4,633
$0
$3,390
$13
$24,760
6
1
$4,207
$841
$576
$11,100
$4,633
$0
$3,390
$13
$24,760
7
1
$1,893
$841
$576
$11,100
$4,633
$8,700
$3,390
$13
$31,146
8
1
$4,207
$841
$576
$11,100
$4,633
$0
$3 390
$13
$24 760
9
1
$4,207
$841
$576
$11,100
$4,633
$0
$3,390
$13
$24,760
10
1
$4.207
$841
$576
$11.100
$4.633
$0
$3 390
$13
$24 760
Drills and
Cybersecurity Plan Exercises
Total
$275,893
Averae:e
$27,589
Note: Totals may not sum due to independent rounding.
13453
Cybersecurity Plan, we use estimates
provided earlier in the analysis. The
E:\FR\FM\22FEP2.SGM
develop, resubmit, conduct annual
maintenance, and audit the
PO 00000
Account
Security
Multifactor Cybersecurity Penetration Vulnerability
Measures Authentication
Trainin~
Testin~
Mana~ement
Facility
Count
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
To estimate the cost for an owner or
operator of a facility or OCS facility to
VerDate Sep<11>2014
EP22FE24.033
Table 34: Summary of Total Costs of the Proposed Rule per Owner or Operator of a Facility or OCS Facility (2022 Dollars,
10-year Undiscounted Costs)86
13454
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
hour-burden estimates are 100 hours for
developing the Cybersecurity Plan
(average hour burden), 10 hours for
annual maintenance of the
Cybersecurity Plan (which would
include amendments), 15 hours to
renew Cybersecurity Plans every 5
years, and 40 hours to conduct annual
audits of Cybersecurity Plans.
Based on estimates from Coast Guard
FSP and OCS FSP reviewers at local
inspections offices, approximately 10
percent of Cybersecurity Plans would
need to be resubmitted in the second
year due to revisions that would be
needed to the Plans, which is consistent
with the current resubmission rate for
FSPs and OCS FSPs. For renewals of
Plans after 5 years (occurring in the
seventh year of the analysis period),
Plans would need to be further revised
and resubmitted in approximately 10
percent of cases as well. However, in
this portion of the analysis, we estimate
costs as though the owner or operator
will need to revise and resubmit their
Plans in all cases, resulting in an upperbound (high) estimate of per-entity
costs. We estimate the time for revision
and resubmission to be about half the
time to develop the Plan itself, or 50
hours in the second year of submission,
and 7.5 hours after 5 years (in the
seventh year of the analysis period).
Because we include the annual
Cybersecurity Assessment in costs to
develop Plans, and we do not assume
that owners and operators will wait
until the second year of analysis to
begin developing the Cybersecurity Plan
or implementing relevant cybersecurity
measures, we divide the estimated 100
hours to develop Plans equally across
the first and second years of analysis.
Using the CySO loaded hourly CySO
wage of $84.14, we estimate the
Cybersecurity Plan-related costs by
adding the total number of hours to
develop, resubmit, maintain, and audit
each year and multiplying by the CySO
wage. For example, we estimate owners
would incur $8,414 in costs in year 2 of
the analysis period [1 facility × $84.14
CySO wage × (50 hours to develop the
Plan + 50 hours to revise and resubmit
the Plan) = $8,414]. Table 35 displays
the per-entity cost estimates for an
owner or operator of 1 facility or OCS
facility over a 10-year period of analysis.
For an owner or operator of multiple
facilities or OCS facilities, we estimate
the total costs by multiplying the total
costs in table 35 by the number of
owned facilities.
Table 35: Cybersecurity Plan-Related Costs per Owner or Operator of a Facility or
OCS Facility (2022 Dollars, 10-year Undiscounted Costs)
Hours to
CySOWage Develop Plan
Hours to
Resubmit
Plan
Annual
Maintenance
Hours
Audit
Hours
Total
Year
Facility
Count
1
1
$84.14
50
0
0
0
$4,207
2
1
$84.14
50
50
0
0
$8,414
3
1
$84.14
0
0
10
40
$4 207
4
1
$84.14
0
0
10
40
$4,207
5
1
$84.14
0
0
10
40
$4,207
6
1
$84.14
0
0
10
40
$4 207
7
1
$84.14
15
7.5
0
0
$1 893
8
1
$84.14
0
0
10
40
$4,207
9
1
$84.14
0
0
10
40
$4,207
10
1
$84.14
0
0
10
40
$4 207
Total
$43,963
$4,396
Similarly, we use earlier estimates for
the calculation of per-entity costs for
drills and exercises, account security
measures, multifactor authentication,
cybersecurity training, penetration
testing, vulnerability management and
resilience.
For drills and exercises, we assume
that a CySO on behalf of each owner
and operator will develop cybersecurity
components to add to existing physical
security drills and exercises. This
development is expected to take 0.5
hours for each of the 4 annual drills and
8 hours for an annual exercise. Using
the loaded hourly wage for a CySO of
$84.14, we estimate annual costs of
approximately $841 per facility owner
or operator [$84.14 CySO wage × ((0.5
hours × 4 drills) + (8 hours × 1 exercise))
= $841], as seen in table 34.
For account security measures, we
assume that a database administrator on
behalf of each owner or operator will
spend 8 hours each year implementing
and managing account security. Using
the loaded hourly wage for a database
administrator of $71.96, we estimate
annual costs of approximately $576
86 The cost totals in table 34 represent cost
estimates for owners and operators of 1 facility or
OCS facility under the assumption that they will
need to implement all cost-creating provisions of
the proposed rule. Therefore, when multiplied over
the full number of affected entities, the calculated
totals will exceed those estimated for the
population of facilities and OCS facilities elsewhere
in the analysis. In addition, the cost estimates for
items related to the Cybersecurity Plan are
dependent upon the number of facilities owned and
must be multiplied accordingly by the number of
facilities owned. This is discussed in further detail
later in the analysis of costs per owner or operator.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00052
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.034
lotter on DSK11XQN23PROD with PROPOSALS2
Average
Note: Totals may not sum due to independent rounding.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
($71.96 database administrator wage × 8
hours = $576), as seen in table 34.
For multifactor authentication, we
assume that an owner or operator of a
facility or OCS facility will spend
$9,000 in the initial year on average to
implement a multifactor authentication
system and spend approximately $150
per employee annually for system
maintenance and support. Therefore, we
estimate first year costs of
approximately $20,100 [$9,000
implementation cost + ($150 support
and maintenance costs × 74 average
facility company employees)], and
subsequent year costs of $11,100 ($150
support and maintenance costs × 74
average facility company employees), as
seen in table 34.
For cybersecurity training, we assume
that a CySO will take 2 hours each year
to develop and manage employee
cybersecurity training, and employees at
a facility or OCS facility will take 1 hour
to complete the training each year.
Using the estimated CySO wage of
$84.14 and the estimated facility
employee wage of $60.34, we estimate
annual training costs of approximately
$4,633 [($84.14 × 2 hours) + ($60.34 ×
74 facility company employees × 1
hour)].
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
For penetration testing, we estimate
costs only in the second and seventh
years of analysis since tests are required
to be performed in conjunction with
submitting and renewing the
Cybersecurity Plan. We assume that
facility owners and operators will spend
approximately $5,000 per penetration
test and an additional $50 per IP
address at the organization in order to
capture network complexity. We use the
total number of company employees as
a proxy for the number of IP addresses,
since the Coast Guard does not have
data on IP addresses or the network
complexity at a given company. As a
result, we estimate second- and seventhyear costs of approximately $8,700
[$5,000 testing cost + ($50 × 74
employees)], as seen in table 34.
For vulnerability management, we
assume that each facility or OCS facility
will need to secure a vulnerability
scanning program or software. Because
vulnerability scans can occur in the
background, we do not assume an
additional hour burden associated with
the implementation or use of a
vulnerability scanner each year. Using
the annual subscription cost of an
industry leading vulnerability scanning
software, we estimate annual costs of
PO 00000
Frm 00053
Fmt 4701
Sfmt 4702
13455
approximately $3,390, as seen in table
34.
Finally, for resilience, we assume that
each facility or OCS facility owner or
operator will need to make at least one
cybersecurity incident report per year.
While this is incongruent with historical
data that shows the entire affected
population of facilities and OCS
facilities reports only 18 cybersecurity
incidents per year, we are attempting to
capture a complete estimate of what the
costs of this proposed rule could be for
an affected entity. As such, we estimate
that a CySO will need to take 0.15 hours
to report a cybersecurity incident to the
NRC, leading to annual per entity costs
of approximately $13 ($84.14 CySO
wage × 0.15 hours), as seen in table 34.
We perform the same calculations to
estimate the per-entity costs for owners
and operators of U.S.-flagged vessels.
However, the estimates for the
population of U.S.-flagged vessels have
more dependency upon the type and
number of vessels owned by the
company being analyzed. This is largely
due to the varying numbers of
employees per vessel, by vessel type.
We estimate fixed, average per-entity
costs of approximately $10,877 per U.S.flagged vessel owner or operator, as seen
in table 36.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13456
Jkt 262001
Frm 00054
Fmt 4701
Sfmt 4702
22FEP2
cybersecurity training costs, a unique
weighted hourly wage based on the
E:\FR\FM\22FEP2.SGM
type of vessel, we use the number of
employees per vessel, and in the case of
PO 00000
Year
Cybersecur Drills and
itv Plan
Exercises
Account
Security
Measures
Multifactor Cybersecurity Penetration Vulnerability
Authentication
Trainin2
Mana2ement
Testin2
Cyber
Incident
Reporting
Total
1
$3,366
$841
$576
$9,000
$168
$0
$3,390
$13
$17,354
2
,.,
.)
$6,731
$841
$576
$0
$168
$5,000
$3,390
$13
$16,719
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
4
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
5
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
6
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
7
$1,515
$841
$576
$0
$168
$5,000
$3,390
$13
$11,503
8
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
9
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
10
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
Total
Average
Note: Totals may not sum due to independent rounding.
$108,765
$10,877
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
To estimate the per-entity costs that
are dependent upon the number and
VerDate Sep<11>2014
EP22FE24.035
Table 36: Summary of Fixed Costs of the Proposed Rule per Owner or Operator of U.S.-flagged Vessels (2022 Dollars, 10-year
Undiscounted Costs)87
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
personnel employed on each vessel type
as calculated in Appendix A: Wages
Across Vessel Types. Table 37 displays
the average number of employees for
each vessel type, including shoreside
employees, and their unique weighted
13457
mean hourly wages. Table 38 displays
the per-vessel costs associated with each
type of vessel.
Vessel Type
Number of
Employees per
Vessel (Includes
Shoreside)
Weighted Mean
Hourly Wae:e
MODU
372
$39.60
Subchapter I Vessels
82
$46.36
OSVs
16
$54.92
Subchapter H Passene:er Vessels
85
$41.85
Subchapter KPassene:er Vessels
35
$45.52
Subchaoter M Towine: Vessels
Subchapter D and Combination
Subchapters O&D Tank Vessels
13
$51.28
40
$55.94
0
$0.00
27
$44.59
lotter on DSK11XQN23PROD with PROPOSALS2
Subchapter D, 0, or I Bare:es
Subchapters K and T International
Passene:er Vessels
87 The cost estimates in table 36 represent the
costs incurred at a company level for each U.S.flagged vessel owner and operator, and thus must
be added to the costs calculated in table 38, which
are dependent on the type and number of vessels
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
owned, to create a full picture of the estimated costs
per owner or operator. When these totals are
multiplied over the full number of affected entities,
the calculated totals will exceed those estimated for
the population of U.S.-flagged vessels elsewhere in
PO 00000
Frm 00055
Fmt 4701
Sfmt 4725
the analysis because we assume that each owner or
operator will need to implement all cost-creating
provisions of the proposed rule. This is discussed
in further detail in the analysis of costs per owner
or operator.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.036
Table 37: Summary of Employees and Wages by Vessel Type
13458
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 38: Summary of Annual Costs of the Proposed Rule per U.S.-flagged Vessels
Based on Type of Vessel (2022 Dollars, U ndiscounted Costs)
Multifactor
Authentication
Cybersecurity
Trainin2
Penetration Testing
(Years 2 and 7)fl8
Total
MODU
Subchapter I
Vessels
1
$55,800
$14,731
$18,600
$89,131
1
$12 300
$3.802
$4100
$20 202
OSVs
Subchapter
HPassenger
Vessels
Subchapter
KPassenger
Vessels
Subchapter
MTowing
Vessels
Subchapter
Dand
Combination
Subchapters
O&DTank
Vessels
Subchapter
D, 0, orl
Barges
Subchapters
KandT
International
Passenger
Vessels
1
$2,400
$879
$800
$4,079
1
$12,750
$3,557
$4,250
$20,557
1
$5,250
$1,593
$1,750
$8,593
1
$1,950
$667
$650
$3,267
1
$6000
$2.238
$2000
$10 238
1
$0
$0
$0
$0
1
$4,050
$1,204
$1,350
$6,604
In order to calculate the total cost perentity in the population of U.S.-flagged
vessels, we add the annual per-vessel
costs from table 38 based on the number
and types of vessels owned to the fixed
costs estimated in table 36.
To estimate the cost for an owner or
operator of a U.S.-flagged vessel to
develop, resubmit, conduct annual
maintenance, and audit the
Cybersecurity Plan, we use estimates
provided earlier in the analysis. The
hour-burden estimates are 80 hours for
developing the Cybersecurity Plan
(average hour burden), 8 hours for
annual maintenance of the
Cybersecurity Plan (which would
include amendments), 12 hours to
renew Cybersecurity Plans every 5
years, and 40 hours to conduct annual
audits of Cybersecurity Plans. Based on
estimates from Coast Guard VSP
reviewers at MSC, approximately 10
percent of Plans would need to be
resubmitted in the second year due to
revisions that would be needed to the
Plans, which is consistent with the
current resubmission rate for VSPs. For
renewals of Plans after 5 years
(occurring in the seventh year of the
analysis period), Cybersecurity Plans
would need to be further revised and
resubmitted in approximately 10
percent of cases as well. However, in
this portion of the analysis, we estimate
costs as though the owner or operator
will need to revise and resubmit their
Plans in all cases resulting in an upperbound (high) estimate of per-entity
costs. We estimate the time for revision
and resubmission to be about half the
time to develop the Cybersecurity Plan
itself, or 40 hours in the second year of
submission, and 6 hours after 5 years (in
the seventh year of the analysis period).
Because we include the annual
Cybersecurity Assessment in the cost to
develop Plans, and we do not assume
that owners and operators will wait
until the second year of analysis to
begin developing the Cybersecurity Plan
or implementing related cybersecurity
measures, we divide the estimated 80
hours to develop Plans equally across
the first and second years of analysis.
Using the CySO loaded hourly CySO
wage of $84.14, we estimate the
Cybersecurity Plan-related costs by
adding the total number of hours to
develop, resubmit, maintain, and audit
each year and multiplying by the CySO
wage. For example, we estimate owners
and operators would incur
approximately $6,731 in costs in year 2
of the analysis period [$84.14 CySO
wage × (40 hours to develop the Plan +
40 hours to revise and resubmit the
Plan) = $6,731]. See table 39.
88 When adding these costs to the fixed costs for
owners and operators, only add these estimated
penetration testing costs in years 2 and 7.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00056
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.037
lotter on DSK11XQN23PROD with PROPOSALS2
Vessel Type Vessel Count
13459
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 39: Cybersecurity Plan-Related Costs per Owner or Operator of a U.S.flagged Vessel (2022 Dollars, 10-year Undiscounted Costs)
Hours to
Hours to
Develop Plan Resubmit Plan
Annual
Maintenance
Hours
Audit Hours
Total
Year
CySOWae:e
1
$84.14
40
0
0
0
$3,366
2
$84.14
40
40
0
0
$6,731
3
$84.14
0
0
8
40
$4 039
4
$84.14
0
0
8
40
$4 039
5
$84.14
0
0
8
40
$4,039
6
$84.14
0
0
8
40
$4 039
7
$84.14
12
6
0
0
$1 515
8
$84.14
0
0
8
40
$4,039
9
$84.14
0
0
8
40
$4,039
10
$84.14
0
0
8
40
$4 039
Total
$39,885
Averae:e
$3,989
Similarly, we use earlier estimates for
the calculation of per-entity costs for
drills and exercises, account security
measures, multifactor authentication,
cybersecurity training, penetration
testing, vulnerability management, and
resilience.
For drills and exercises, we assume
that a CySO on behalf of each owner
and operator will develop cybersecurity
components to add to existing physical
security drills and exercises. This
development is expected to take 0.5
hours for each of the 4 annual drills and
8 hours for an annual exercise. Using
the loaded hourly wage for a CySO of
$84.14, we estimate annual costs of
approximately $841 per vessel owner or
operator [$84.14 CySO wage × ((0.5
hours × 4 drills) + (8 hours × 1 exercise))
= $841], as seen in table 36.
For account security measures, we
assume that a database administrator on
behalf of each owner or operator will
spend 8 hours each year implementing
and managing account security. Using
the loaded hourly wage for a database
administrator of $71.96, we estimate
annual costs of approximately $576
($71.96 database administrator wage × 8
hours = $576), as seen in table 36.
For multifactor authentication, we
assume that a vessel owner or operator
will spend $9,000 in the initial year on
average to implement a multifactor
authentication system and spend
approximately $150 per employee
annually for system maintenance and
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
support. Therefore, we estimate first
year fixed costs of approximately $9,000
for all owners and operators, with
annual costs in years 2 through 10
dependent on the number of employees
for each type of vessel. For example, we
estimate the first-year costs to an owner
or operator of one OSV to be
approximately $11,400 [$9,000
implementation cost + ($150 support
and maintenance costs × 16 average
employees per OSV)], and subsequent
year costs of $2,400 ($150 support and
maintenance costs × 16 average
employees per OSV). Fixed per-entity
implementation costs of $9,000 can be
found in table 36, and variable pervessel costs can be found in table 38.
For cybersecurity training, we assume
that a CySO for each vessel owner or
operator will take 2 hours each year to
develop and manage employee
cybersecurity training, and vessel
employees will take 1 hour to complete
the training each year. The per
employee costs associated with training
vary depending on the types and
number of vessels and would be based
on the average number of employees per
vessel and the associated weighted
hourly wage. For example, using the
estimated CySO wage of $84.14 and the
estimated OSV employee wage of
$54.91, we estimate annual training
costs of approximately $1,047 [($84.14 ×
2 hours) + ($54.91 × 16 average
employees per OSV × 1 hour)]. Fixed
per-entity costs of $168 can be found in
PO 00000
Frm 00057
Fmt 4701
Sfmt 4702
table 36 and variable per-vessel costs
can be found in table 38.
For penetration testing, we estimate
costs only in the second and seventh
years of analysis since tests are required
to be performed in conjunction with
submitting and renewing the
Cybersecurity Plan. We assume that
owners and operators of vessels will
spend approximately $5,000 per
penetration test and an additional $50
per IP address at the organization in
order to capture network complexity.
We use the average number of
employees per vessel as a proxy for the
number of IP addresses, since the Coast
Guard does not have data on IP
addresses or the network complexity at
a given company. As a result, we
estimate second- and seventh-year costs
as follows: [$5,000 testing cost + ($50 ×
average number of employees per
vessel)]. For example, we estimate
second- and seventh-year cost of
approximately $5,800 for an owner or
operator of an OSV [$5,000 testing cost
+ ($50 × 16 average number of
employees per OSV)]. Fixed per-entity
costs of $5,000 can be found in table 36,
and variable per-vessel costs can be
found in table 38.
For vulnerability management, we
assume that each U.S.-flagged vessel
owner or operator will need to secure a
vulnerability scanning program or
software. Because vulnerability scans
can occur in the background, we do not
assume an additional hour burden
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.038
lotter on DSK11XQN23PROD with PROPOSALS2
Note: Totals may not sum due to independent rounding.
13460
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
associated with the implementation or
use of a vulnerability scanner each year.
Using the annual subscription cost of an
industry leading vulnerability scanning
software, we estimate annual costs of
approximately $3,390, as seen in table
36.
Finally, for resilience, we assume that
each U.S.-flagged vessel owner or
operator will need to make at least one
cybersecurity incident report per year.
While this is incongruent with historical
data that shows the entire affected
population of vessels only reports two
cybersecurity incidents per year on
average, we are attempting to capture a
complete estimate of what the costs of
the proposed rule could be for an
affected entity. As such, we estimate
that a CySO will need to take 0.15 hours
to report a cybersecurity incident to the
NRC, leading to annual per-entity costs
of approximately $13 ($84.14 CySO
wage × 0.15 hours), as seen in table 34.
Unquantifiable Cost Provisions or NoCost Provisions of This Proposed Rule
Communications
lotter on DSK11XQN23PROD with PROPOSALS2
Under proposed § 101.645, this NPRM
would require CySOs to have a method
to effectively notify owners and
operators of facilities, OCS facilities,
and U.S.-flagged vessels, as well as
personnel of changes in cybersecurity
conditions. The proposed requirements
would allow effective and continuous
communication between security
personnel on board U.S.-flagged vessels
and at facilities and OCS facilities; U.S.flagged vessels interfacing with a facility
or an OCS facility, the cognizant COTP,
and national and local authorities with
security responsibilities. Based on
communication requirements
established in 33 CFR 105.235 for
facilities, 106.240 for OCS facilities, and
104.245 for vessels, the Coast Guard
assumes that owners and operators of
vessels, facilities, and OCS facilities
already have communication channels
established for physical security
notifications which could easily be used
for cybersecurity notifications. As a
result, we do not estimate regulatory
costs for communications. The Coast
Guard requests public comment on this
assumption and whether this
communications provision would add
an additional time burden.
Device Security Measures
Under proposed § 101.650(b)(1), this
NPRM would require owners and
operators of U.S. facilities, OCS
facilities, and U.S.-flagged vessels to
develop and maintain a list of companyapproved hardware, firmware, and
software that may be installed on IT or
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
OT systems. This approved list would
be documented in the Cybersecurity
Plan. Because this requirement would
be included in the development of the
Cybersecurity Plan, we estimated these
costs earlier in that section of the cost
analysis.
Under proposed § 101.650(b)(2), this
NPRM would require owners and
operators of facilities, OCS facilities,
and U.S.-flagged vessels to ensure
applications running executable code
are disabled by default on critical IT and
OT systems. Based on information from
CGCYBER, the time it would take to
disable such applications is likely
minimal; however, we currently lack
data on how prevalent these
applications are within the affected
population. Therefore, we are unable to
estimate the regulatory costs of this
proposed provision. The Coast Guard
requests public comments on the device
security measures under this regulatory
provision.
Under proposed § 101.650(b)(3) and
(4), this NPRM would require owners
and operators of facilities, OCS
facilities, and U.S.-flagged vessels to
develop and maintain an accurate
inventory of network-connected
systems, the network map, and OT
device configuration. Because these
items would be developed and
documented as a part of the
Cybersecurity Plan, we previously
estimated these costs in that section of
the cost analysis.
Data Security Measures
Under proposed § 101.650(c), this
NPRM would require owners and
operators of facilities, OCS facilities,
and U.S.-flagged vessels to securely
capture, store, and protect data logs, as
well as encrypt all data in transit and at
rest. The Jones Walker survey (see
footnote 69) reveals that 64 percent of
U.S. facilities and OCS facilities are
currently performing active data logging
and retention, and 45 percent are always
encrypting data for the purpose of
communication.
Because data logging can be achieved
with default virus-scanning tools, such
as Windows Defender on Microsoft
systems, the cost of storage and
protection of data logs is primarily a
function of the data space required to
store them. Based on information from
CGCYBER, cloud storage can cost from
$21 to $41 per month for 1 terabyte of
data, $54 to $320 per month for 10
terabytes, and up to $402 to $3,200 per
month for 100 terabytes of data.
However, the Coast Guard does not have
information on the amount of data space
the affected population would need to
comply with this proposed rule, or if
PO 00000
Frm 00058
Fmt 4701
Sfmt 4702
data purchases would be necessary in
all cases. Therefore, we are unable to
estimate regulatory costs for this
proposed provision. The Coast Guard
requests public comment on these
estimates and any additional
information on this proposed regulatory
provision.
Similarly, encryption is often
available in default systems, or in
publicly available algorithms.89 The
Coast Guard would accept these
encryption standards that came with the
software or on default systems.
However, there are potentially some IT
and OT systems in use that do not have
native encryption capabilities. In these
instances, encryption would likely
represent an additional cost. However,
the Coast Guard does not have
information on the number of systems
lacking encryption capabilities. As a
result, we are unable to estimate the
regulatory costs for encryption above
and beyond what is included in default
systems, and we request public
comment on the potential costs
associated with this provision.
Supply Chain Management
Under proposed § 101.650(f)(1) and
(2), this NPRM would include
provisions to specify measures for
managing supply chain risk. This would
not create any additional hour burden,
as owners and operators would only
need to consider cybersecurity
capabilities when selecting third-party
vendors for IT and OT systems or
services. In addition, based on
information from CGCYBER, most thirdparty providers have existing
cybersecurity capabilities and already
have systems in place to notify the
owners and operators of facilities, OCS
facilities, and U.S.-flagged vessels of any
cybersecurity vulnerabilities, incidents,
or breaches that take place. Therefore,
the Coast Guard does not estimate a cost
for this proposed provision.
Additionally, under proposed
§ 101.650(f)(3), this NPRM would
require owners and operators of U.S.
facilities, OCS facilities, and U.S.flagged vessel to monitor third-party
remote connections and document how
and where a third party connects to
their networks. Based on information
from CGCYBER, many IT and OT
vendors provide systems with the
ability to remotely access the system to
89 For example, see the following web pages for
descriptions of default encryption policies on
Google and Microsoft programs and cloud-based
storage systems: https://cloud.google.com/docs/
security/encryption/default-encryption and https://
learn.microsoft.com/en-us/microsoft-365/
compliance/encryption?view=o365-worldwide,
accessed July 19, 2023.
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
perform maintenance or trouble-shoot
problems as part of a warranty or service
contract. Because remote access is
typically identified in warranties and
service contracts, the Coast Guard
assumes that industry is already aware
of these types of connections and would
only need to document them when
developing the Cybersecurity Plan. We
estimated these costs previously in the
development of the Cybersecurity Plan
section of this cost analysis. The Coast
Guard requests public comment on the
validity of this assumption and any
additional information on this proposed
regulatory provision.
Network Segmentation
lotter on DSK11XQN23PROD with PROPOSALS2
Under proposed § 101.650(h)(1) and
(2), this NPRM would require owners
and operators of facilities, OCS
facilities, and U.S.-flagged vessels to
segment their IT and OT networks and
log and monitor all connections
between them. Based on information
from CGCYBER, CG–CVC, and NMSAC,
network segmentation can be
particularly difficult in the MTS, largely
due to the age of infrastructure in the
affected population of facilities, OCS
facilities and U.S.-flagged vessels. The
older the infrastructure, the more
challenging network segmentation may
be. Given the amount of diversity and
our uncertainty regarding the state of
infrastructure across the various groups
in our affected population, we are not
able to estimate the regulatory costs
associated with this proposed provision.
The Coast Guard requests public
comment on the anticipated costs of
network segmentation within the
affected population, especially from
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
those who have previously segmented
networks at their organizations.
Physical Security
Under proposed § 101.650(i)(1) and
(2), this NPRM would require owners
and operators of facilities, OCS
facilities, and U.S.-flagged vessels to
limit physical access to IT and OT
equipment; secure, monitor, and log all
personnel access; and establish
procedures for granting access on a byexception basis. The Coast Guard
assumes that owners and operators have
already implemented physical access
limitations and systems, by which
access can be granted on a by-exception
basis, based on requirements established
in §§ 104.265 and 104.270 for vessels,
§§ 105.255 and 105.260 for facilities,
and §§ 106.260 and 106.265 for OCS
facilities. Therefore, we do not believe
that this proposed rule would impose
new regulatory costs on owners and
operators of facilities, OCS facilities,
and U.S.-flagged vessels for this
provision. However, we understand that
§ 101.650(i)(2), which requires potential
blocking, disabling, or removing of
unused physical access ports on IT and
OT infrastructure, may represent taking
steps above and beyond what has been
expected under established
requirements. The Coast Guard
currently lacks information on the
prevalence of these physical access
ports on systems in use in the affected
population, and therefore cannot
currently calculate an associated cost.
We request public comment on the
anticipated costs associated with
physical security provisions in this
proposed rule above and beyond what
PO 00000
Frm 00059
Fmt 4701
Sfmt 4702
13461
has already been incurred under
existing regulation.
Lastly, it is likely that this proposed
rule would have unquantifiable costs
associated with the incompatibility
between the installation of the proposed
newer software and the use of older or
legacy software systems on board U.S.flagged vessels, facilities, and OCS
facilities. We request comments from
the public on the anticipated costs
associated with this difference in
software for the affected population of
this proposed rule.
Sources of Uncertainty Related to
Quantified Costs in the Proposed Rule
Given the large scope of this proposed
rule, our analysis contains several areas
of uncertainty that could lead us to
overestimate or underestimate the
quantified costs associated with certain
provisions. In table 39, we outline the
various sources of uncertainty, the
expected impact on cost estimates due
to the uncertainty, potential cost ranges,
and a ranking of the source of
uncertainty based on how much we
believe it is impacting the accuracy of
our estimates. A rank of 1 indicates that
we believe the source of uncertainty has
the potential to cause larger
overestimates or underestimates than a
source of uncertainty ranked 2, and so
on. The Coast Guard requests public
comment from members of the affected
populations of facilities, OCS facilities,
and U.S.-flagged vessels who could
provide insight into the areas of
uncertainty specified in table 40,
especially those relating to potential
cost estimates, hour burdens, or current
baseline activities.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13462
VerDate Sep<11>2014
Jkt 262001
PO 00000
Frm 00060
Fmt 4701
Sfmt 4725
Source of
Uncertainty or
Relevant
Provision
Baseline
cybersecurity
activities in the
U.S.-flagged
~essel population
Reason for Uncertainty
Impact on Cost Estimates
E:\FR\FM\22FEP2.SGM
22FEP2
The Coast Guard was able to estimate
Overestimate
current cybersecurity activity related to
some of the proposed provisions in the
population of facilities and OCS facilities
based on the results of the "Ports and
Terminals Cybersecurity Survey"
conducted by Jones Walker. However, we
lack similar information on current
cybersecurity activity in the population of
U.S.-flagged vessels, and instead assumed
that affected vessel entities have no level
of baseline activity. This has led to
overestimated costs for the affected
population ofU.S.-flagged vessels.
Potential Cost Range Rank
NIA
1
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
EP22FE24.039
Table 40: Sources of Uncertainty in the Proposed Rule
lotter on DSK11XQN23PROD with PROPOSALS2
VerDate Sep<11>2014
Jkt 262001
PO 00000
Frm 00061
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
Not able to estimate.
2
Not able to estimate.
3
13463
EP22FE24.040
Future
cybersecurity
technology
upgrades
The proposed rule includes various types Underestimate
of provisions dealing with cybersecurity
testing, assessment, and monitoring that
are designed to help owners and operators
identify vulnerabilities and other security
issues that may be impacting an
organization's IT and OT systems. While
the provisions for cybersecurity measures
of this proposed rule are designed to
address many vulnerabilities that may be
discovered, the Coast Guard has no way
of calculating the costs associated with
any fixes or mitigations that may be
necessary above and beyond what is
outlined in the proposed rule. The costs
associated with mitigations and
vulnerability corrections would be highly
dependent on what is discovered and
would vary from affected entity to
affected entity, making cost estimates
unreliable.
Many of the provisions for cybersecurity Underestimate
measures under proposed§ 101.650
involve the implementation of hardware
and software solutions to improve
cybersecurity or monitor vulnerabilities
within an organization's IT and OT
systems. Because cybersecurity
technology is rapidly evolving, we expect
that upgrades to implemented solutions
may be necessary in later years. However,
the Coast Guard lacks information on how
often or how costly these upgrades may
be.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Correction of
vulnerabilities,
performing fixes,
and alleviating
issues discovered
in assessments,
testing, or
scanning
lotter on DSK11XQN23PROD with PROPOSALS2
Not able to estimate.
4
13464
VerDate Sep<11>2014
Jkt 262001
PO 00000
Frm 00062
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
EP22FE24.041
§ 101.650(h)(l)
Network segmentation can be particularly Underestimate
and (2)-Network difficult in the MTS, largely due to the age
segmentation
of infrastructure in the affected population
of facilities, OCS facilities and U.S.flagged vessels. The older the
infrastructure, the more challenging
network segmentation may be. Given the
amount of diversity and our uncertainty
regarding the state of infrastructure across
~he various groups in our affected
population, we are not able to estimate the
regulatory costs associated with this
proposed provision.
lotter on DSK11XQN23PROD with PROPOSALS2
VerDate Sep<11>2014
Jkt 262001
PO 00000
Frm 00063
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
The costs would scale 5
!with the amount of data
space purchased. Based
on current market
prices, cloud-based
storage can cost from
$21 to $41 per month
for 1 terabyte of data,
$54 to $320 per month
for 10 terabytes, and up
~o $402 to $3200 per
month for 100 terabytes
of data.
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Data logging can be achieved in the
Underestimate
Store data logs
background using programs native to
and encrypt data common computer operating systems, and
therefore has a negligible cost. The
primary cost would be the data space
necessary to store the data logs. The Coast
Guard does not currently know who in the
affected population would need to
purchase additional data space to store
logs, if any. Similarly, the Coast Guard
does not know who in the affected
population would need to purchase data
encryption capabilities given a lack of
information on systems in use that lack
encryption capabilities.
§ 101.650(c) -
13465
EP22FE24.042
lotter on DSK11XQN23PROD with PROPOSALS2
Jkt 262001
PO 00000
Frm 00064
Costs could range from 6
installing security or
antitamper tape over
unused USB or other
access ports, installing
access port locks, or
~aking the time to
manually disable or
remove ports from
system hardware. Costs
for antitamper tape
ltYpically range from
approximately $10 to
$20 per 55-yard roll.
Costs for access port
locks range from
approximately $10 to
Fmt 4701
§ 101.650(i)(2) - While the Coast Guard believes that
Underestimate
Removable media limiting of physical access to critical IT
and hardware
and OT systems is likely already being
done under existing regulation, requiring
blocking, disabling, or removing of
unused physical access ports on IT and
OT infrastructure may represent efforts
above and beyond requirements already in
regulation. However, the Coast Guard
currently lacks information on the
prevalence of these physical access ports
on systems in use in the affected
population, and therefore cannot currently
estimate an associated cost.
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.043
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
The costs would scale 5
~th the amount of data
space purchased. Based
on current market
prices, cloud-based
storage can cost from
$21 to $41 per month
for 1 terabyte of data,
$54 to $320 per month
for 10 terabytes, and up
~o $402 to $3200 per
month for 100 terabytes
of data.
13466
VerDate Sep<11>2014
§ 101.650(g)(4) - Backing up data can be achieved in the
Underestimate
Perform and
background using programs native to
secure data
common computer operating systems, and
backups
therefore has a negligible cost. The
primary cost would be the data space
necessary to store the data logs. The Coast
Guard does not currently know who in the
affected population would need to
purchase additional data space to store
logs, if any. Similarly, the Coast Guard
does not know who in the affected
population would need to purchase data
encryption capabilities or other security
measures for data backups given a lack of
information on systems in use that lack
these capabilities.
lotter on DSK11XQN23PROD with PROPOSALS2
Jkt 262001
Frm 00065
Fmt 4701
Sfmt 4702
22FEP2
13467
alternative scenarios to demonstrate
how alternative assumptions may affect
E:\FR\FM\22FEP2.SGM
estimating many costs challenging. The
Coast Guard has considered several
PO 00000
The Coast Guard has limited data on what Underestimate
applications are prevalent in the affected
population that may need to have
executable code disabled.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
The uncertainty surrounding these
aspects of this analysis makes
VerDate Sep<11>2014
EP22FE24.044
§ 101.650(b )(2) Disable
applications
running
executable code
by default on
critical IT and
OT systems
$20 for a pack of 10
locks. Costs for
manually disabling
ports on system
hardware would be
dependent on the time
~aken to disable, either
~hrough a software
program or physically
Mrith a medium like
caulk or epoxy resin. In
either case, we estimate
~his would take
approximately 1 to 5
minutes per access port.
Potential costs are
7
likely negligible. The
~ime required to disable
~hese applications is
likely small and only
required to be
performed once. Many
operating systems
include this policy by
default, and it could be
considered a no-cost
provision of the
proposed rule.
13468
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
the cost estimates presented in this
analysis.
First, we consider an alternative
assumption regarding the baseline
cybersecurity activities in the
population of U.S.-flagged vessels,
which we determined may have the
biggest impact on our cost estimates for
this proposed rule. Because the Coast
Guard lacks data on current
cybersecurity activities in the
population of U.S.-flagged vessels, we
assume that all owners and operators of
U.S.-flagged vessels have no baseline
cybersecurity activity to avoid
potentially underestimating costs in the
preceding cost analysis. However, we
were able to use existing survey data to
estimate baseline cybersecurity activity
in the population of facilities and OCS
are conducting cybersecurity training,
and 68 percent are conducting
penetration tests.90 Using these
assumptions would result in estimated
annual population costs of
approximately $119,891 for account
security ($922,239 primary estimated
cost × 0.13), $5,670,537 for multifactor
authentication implementation and
maintenance ($33,356,100 primary
estimated cost × 0.17), $4,827,371 for
cybersecurity training ($6,436,494
primary estimate cost × 0.75), and
$4,583,264 for penetration testing
($14,322,700 primary estimated cost ×
0.32). This would result in reduced
undiscounted annual cost estimates of
approximately $47,882,654 for the
population of U.S.-flagged vessels. See
table 41.
facilities, which allowed us to more
accurately estimate the cost impacts of
many of the proposed provisions.
If we use the same rates of baseline
activity we assume for facilities and
OCS facilities for the U.S.-flagged
vessels as well, we would see a
reduction in undiscounted cost
estimates related to account security
measures, multifactor authentication
implementation and management,
cybersecurity training, and penetration
testing. Like the rates of baseline
activity cited for the population of
facilities and OCS facilities, this
alternative would assume that 87
percent of the U.S.-flagged vessel
population are managing account
security, 83 percent have implemented
multifactor authentication, 25 percent
Table 41: Comparison of Primary and Alternative Cost Estimates for U.S.flagged Vessel Population (2022 Dollars, Undiscounted Costs)
Source of Cost
Primarv Cost Estimates
Alternative Estimates
Account Securitv Costs
Multifactor
Authentication Costs
Cybersecurity Training
Costs
Penetration Testing
Costs
$922 239
$119,891
$33356,100
$4 336.293
$6 436 494
$836,744
$14,322,700
$1,861,951
Total
$55,037,533
$7,154,879
90 See
systems will not need to be taken offline
and no burden hours. However, this
makes the associated cost a function of
the data space required to store and
backup data. While we do not have
information on how much data space a
given company would need, we can
estimate industry costs based on SME
estimates for a range of potential data
space amounts. As described in table 40,
current market prices indicate that
cloud-based storage can cost from $21 to
$41 per month for 1 terabyte of data, $54
to $320 per month for 10 terabytes, and
up to $402 to $3200 per month for 100
terabytes of data. To estimate the annual
cost of 1 additional terabyte of data, we
take the average estimated monthly cost
of $31 [($41 + $21) ÷ 2] and multiply it
by 12 to find the average annual cost of
$372 per terabyte. If each facility and
OCS facility company required an
additional terabyte of data space as a
result of this proposed rule, we would
estimate approximately $635,376 ($372
× 1,708 facility owners and operators) in
additional undiscounted annual costs to
industry. Similarly, if we assumed each
U.S.-flagged vessel company required an
additional terabyte of data space
because of this proposed rule, we would
estimate approximately $660,300 ($372
× 1,775 vessel owners and operators) in
additional undiscounted annual costs to
industry. See table 42.
footnote 69.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00066
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.045
lotter on DSK11XQN23PROD with PROPOSALS2
The Coast Guard requests comment
on whether these assumptions of
baseline activity are more reasonable
than what is currently used in this RIA,
or if there are additional alternative
assumptions about baseline activities in
these areas or other areas not discussed
that would lead to more accurate
estimates.
In addition, we considered adding
cost estimates for those areas of
uncertainty where we were able to
estimate a range of potential costs. For
proposed provisions in § 101.650(c) and
(g) related to storing data logs and
performing data backups, we anticipate
that this data storage will be set up to
occur in the background, meaning
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
13469
Table 42. Comparison of Alternative Data Space Cost Estimates for the Affected
Population and Impact on Undiscounted Cost Totals (2022 Dollars, Undiscounted
Costs)
Total
Total Data Space Cost
Estimates Over 10
Years
Primary Population
Cost Totals Over 10
Years
Alternative
Population Cost
Totals Over 10
Years
$635,376
$6,353,760
$312,330,251
$318,684,0ll
$660,300
$6,603,000
$439,884,727
$446,487,727
$1,295,676
$12,956,760
$752,214,978
$765,171,738
Government Costs
There are three primary drivers of
Government costs associated with this
proposed rule. The first would be under
proposed § 101.630(e), where owners
and operators of the affected population
of U.S.-flagged vessels, facilities, and
OCS facilities would be required to
submit a copy of their Cybersecurity
Plan for review and approval to either
the cognizant COTP or the OCMI for
facilities or OCS facilities, or to the MSC
for U.S.-flagged vessels. In addition,
proposed § 101.630(f) would require
owners and operators to submit
Cybersecurity Plan amendments to the
Coast Guard, under certain conditions,
for review and approval. The second
cost driver is related to the marginal
increase in inspection time as a result of
added Cybersecurity Plan components
that will be reviewed as a part of an onsite inspection of facilities, OCS
facilities, and U.S.-flagged vessels. The
final cost driver would be under
proposed § 101.650(g)(1), where owners
and operators of the affected population
of U.S.-flagged vessels, facilities, and
OCS facilities would be required to
report cyber incidents to the NRC. The
NRC would then need to process the
report and generate notifications for
each incident report they receive. The
Coast Guard examines these costs under
the assumption that we will use the
existing frameworks in place to review
security plans and amendments, process
incident reports, and conduct
inspections. Given uncertainty
surrounding Coast Guard staffing needs
related to this proposed rule, we have
not estimated costs associated with new
hires or the establishment of a
centralized office.
First, we analyze the costs to the
Government associated with reviewing
and approving Cybersecurity Plans and
amendments. Based on Coast Guard
local facility inspector estimates, it
would take plan reviewers about 40
hours to review an initial Cybersecurity
Plan for a facility or OCS facility, 8
hours to review a resubmission of a Plan
in the initial year, and 4 hours to review
an amendment in years 3 through 6 and
8 through 10 of the analysis period. It
would also take about 8 hours of review
for the renewal of plans in year 7 of the
analysis period, and another 8 hours for
any necessary resubmissions of Plan
renewals. The hour-burden and
frequency estimates for resubmissions
and amendments are consistent with
estimates for resubmissions of FSPs and
OCS FSPs, as we expect the
Cybersecurity Plans and amendments to
be of a similar size and scope. As
discussed earlier in the analysis, we
estimate that resubmissions of initial
Cybersecurity Plans and Plan renewals
occur at a rate of 10 percent in years 2
and 7 of the analysis period. We use the
91 Readers can view Commandant Instruction
7310.1W for military personnel at
media.defense.gov/2022/Aug/24/2003063079/-1/-1/
0/CI_7310_1W.PDF, accessed January 2024.
lotter on DSK11XQN23PROD with PROPOSALS2
These costs could change if we were
to add additional assumptions about
current baseline activities or adjusted
the expected need for data space.
Therefore, we request public comment
on the accuracy and inclusion of these
estimates.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00067
Fmt 4701
Sfmt 4702
number of facilities and OCS facilities
that would submit Plans, which would
be about 3,411.
We determine the wage of a local
facility inspector using publicly
available data found in Commandant
Instruction 7310.1W.91 We use an
annual mean hourly wage rate of $89 for
an inspector at the O–3 (Lieutenant)
level, based on the occupational labor
category used in ICR 1625–0077.
We estimate the undiscounted
second-year (initial year of Plan review)
cost for the Coast Guard to review
Cybersecurity Plans for U.S. facilities
and OCS facilities to be approximately
$12,385,952 [(3,411 facility Plan initial
submissions × $89.00 × 40 hours) + (341
facility Plan resubmissions × $89.00 × 8
hours)]. Except in year 7, when renewal
of all Plans would occur, we estimate
the undiscounted annual cost to the
Coast Guard for the review of
amendments to be approximately
$1,214,316 (3,411 amendments × $89.00
× 4 hours). In year 7, we estimate the
undiscounted cost to be approximately
$2,671,424 [(3,411 Plans for 5-year
renewal × $89.00 × 8 hours) + (341
facility Plan resubmissions × $89.00 × 8
hours)]. We estimate the discounted cost
for the Coast Guard to review facility
and OCS facility Cybersecurity Plans to
be approximately $18,059,127 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$2,571,213, using a 7-percent discount
rate. See table 43.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.046
Affected
Population
Facilities and
OCS Facilities
U.S.-flagged
Vessels
Annual Data
Space Cost
Estimates
lotter on DSK11XQN23PROD with PROPOSALS2
13470
Jkt 262001
Frm 00068
Fmt 4701
Sfmt 4702
22FEP2
resubmission of the Cybersecurity Plan
in the initial year, and 4 hours to review
E:\FR\FM\22FEP2.SGM
an initial U.S.-flagged vessel
Cybersecurity Plan, 8 hours to review a
PO 00000
Year
Reviewer
Wa11e
Facility
Cybersecurity
Plan
Submissions
Facility
Cybersecurity
Resubmissions
Cybersecurity
Plan Review
Hours
Resubmission
Review Hours
Amendment
Review Hours
Total Cost
7%
3%
1
$89.00
0
0
0
0
0
$0
$0
$0
2
$89.00
3411
341
40
8
0
$12,385,952
$10,818,370
$11,674,948
3
$89.00
3411
0
0
0
4
$1,214,316
$991,244
$1,111,271
4
$89.00
3411
0
0
0
4
$1,214,316
$926,396
$1,078,904
5
$89.00
3411
0
0
0
4
$1,214,316
$865,791
$1,047,480
6
$89.00
3411
0
0
0
4
$1,214,316
$809,150
$1,016,971
7
$89.00
3411
341
8
8
0
$2,671,424
$1,663,629
$2,172,112
8
$89.00
3411
0
0
0
4
$1214316
$706 743
$958.592
9
$89.00
3411
0
0
0
4
$1,214,316
$660,507
$930,672
10
$89.00
3411
0
0
0
4
$1,214,316
$617,297
$903,565
Total
$23,557,588
$18,059,127
$20,894,515
Annualized
$2,355,759
$2,571,213
$2,449,475
Note: Totals may not sum due to independent rounding.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Based on Coast Guard MSC estimates,
it would take about 28 hours to review
VerDate Sep<11>2014
EP22FE24.047
Table 43: Estimated Government Costs of Proposed Rule for Facility and OCS Facility Cybersecurity Plan and Amendment
Review (2022 Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rate)
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
an amendment in years 3 through 6 and
8 through 10 of the analysis period. It
would also take about 8 hours of review
for the renewal of Plans, and another 8
hours to review resubmitted Plan
renewals in year 7 of the analysis
period. The hour-burden and frequency
estimates for resubmissions and
amendments are consistent with
estimates for resubmissions of VSPs, as
we expect the Cybersecurity Plans and
amendments to be of a similar size and
scope. We use the number of U.S.flagged vessel owners and operators
who would submit Plans, about 1,775.
According to ICR 1625–0077, the
collection of information related to
VSPs, FSPs, and OCS FSPs, the MSC
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
uses contract labor to conduct Plan and
amendment reviews. The MSC provided
us with its independent Government
cost estimate for their existing contract
for VSP reviews. The average loaded
annual mean hourly wage rate for the
various contracted reviewers from the
independent Government cost estimate
is $81.83.
We estimate the undiscounted
second-year cost for the Coast Guard to
review Cybersecurity Plans for U.S.flagged vessels to be approximately
$4,183,477 [(1,775 initial vessel Plan
submissions × $81.83 × 28 hours) + (178
vessel Plan resubmissions × $81.83 × 8
hours)]. Except in year 7, when
resubmission of all Plans would occur,
PO 00000
Frm 00069
Fmt 4701
Sfmt 4702
13471
we estimate the undiscounted annual
cost to the Coast Guard for reviewing
amendments to be approximately
$580,993 (1,775 amendments × $81.83 ×
4 hours). In year 7, we estimate the
undiscounted cost to be approximately
$1,278,512 [(1,775 Plans for 5-year
renewal × $81.83 × 8 hours) + (178
facility Plan resubmissions × $81.83 × 8
hours)]. We estimate the discounted cost
for the Coast Guard to review U.S.flagged vessel Cybersecurity Plans to be
approximately $7,118,596 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
$1,013,528, using a 7-percent discount
rate. See table 44.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13472
Jkt 262001
Frm 00070
Fmt 4701
Sfmt 4702
22FEP2
to include the Cybersecurity Plans and
provisions proposed by this NPRM. The
E:\FR\FM\22FEP2.SGM
onsite inspection time due to the
expansion of FSPs, OCS FSPs, and VSPs
PO 00000
Vessel
Cybersecurity
Vessel Cybersecurity
Plan
Plan Submissions
Resubmissions
Cybersecurity
Plan Review
Hours
Resubmission Review
Hours
Amendment
Review
Hours
Total Cost
7%
3%
Year
Re,iewer
Waee
1
$81.83
0
0
0
0
0
$0
$0
$0
2
$81.83
1775
178
28
8
0
$4,183,477
$3,654,011
$3,943,328
3
$81.83
1775
0
0
0
4
$580,993
$474,263
$531,691
4
$81.83
1775
0
0
0
4
$580,993
$443,237
$516,205
5
$81.83
1775
0
0
0
4
$580,993
$414,240
$501,170
6
$81.83
1775
0
0
0
4
$580,993
$387,140
$486,572
7
$81.83
1775
178
8
8
0
$1,278,512
$796,193
$1,039,547
8
$81.83
1775
0
0
0
4
$580,993
$338,143
$458,641
9
$81.83
1775
0
0
0
4
$580,993
$316,022
$445,283
10
$81.83
1775
0
0
0
4
$580,993
$295,347
$432,313
Total
$9,528,940
$7,118,5%
$8,354,750
Annualized
$952,894
$1,013,528
$979,432
Note: Totals may not sum due to independent rounding.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
The second source of Government
costs would be the marginal increase in
VerDate Sep<11>2014
EP22FE24.048
Table 44: Estimated Government Costs ofU.S.-Flagged Vessel Cybersecurity Plan and Amendment Review (2022 Dollars, 10year Discounted Costs, 7- and 3-percent Discount Rate)
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
proposed cybersecurity provisions
would add to the expected onsite
inspection times for the populations of
facilities, OCS facilities, and U.S.flagged vessels. Coast Guard SMEs
within CG–FAC conferred with local
inspection offices to estimate the
expected marginal increase in facility
and OCS facility inspection time. Local
facility inspectors estimate that the
additional cybersecurity provisions
from this proposed rule would add an
average of 1 hour to an onsite
inspection, and that the inspection
would typically be performed by an
inspector at a rank of O–2 (Lieutenant
Junior Grade). According to
Commandant Instruction 7310.1W
Reimbursable Standard Rates, an
inspector with an O–2 rank has a fully
loaded wage rate of $72.92 Therefore, we
estimate the annual undiscounted
Government cost associated with the
expected marginal increase in onsite
13473
inspections of facilities and OCS
facilities is $245,592 (3411 facilities and
OCS facilities × 1 hour inspection time
× $72 facility inspector wage). We
estimate the total discounted cost of
increased inspection time to be
approximately $1,724,936 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
$245,592, using a 7-percent discount
rate. See table 45.
Table 45: Estimated On-site Inspection of Facilities and OCS Facilities Costs for
Government of the Proposed Rule (2022 Dollars, 10-year Discounted Costs, 7- and
3-percent Discount Rates)
Number of
Facility
Facility Inspector
Facilities Inspection Hours
Wa2e
7 Percent
3 Percent
1
3411
1
$72
$245,592
$229,525
$238,439
2
3411
1
$72
$245,592
$214,510
$231,494
3
3411
1
$72
$245 592
$200,476
$224 751
4
3411
1
$72
$245 592
$187 361
$218,205
5
3411
1
$72
$245,592
$175,104
$211,850
6
3411
1
$72
$245,592
$163,648
$205,679
7
3411
1
$72
$245,592
$152,942
$199,689
8
3411
1
$72
$245,592
$142,937
$193,873
9
3411
1
$72
$245,592
$133,586
$188,226
10
3411
1
$72
$245,592
$124,847
$182 744
$2.455.920
$1.724.936
$2.094.950
$245.592
$245.592
$245.592
Total
Annual
ized
Note: Totals may not sum due to independent rounding.
lotter on DSK11XQN23PROD with PROPOSALS2
Total Cost
Similarly, Coast Guard SMEs within
CG–ENG estimate that the additional
cybersecurity provisions from the
proposed rule would add an average of
0.167 hours (10 minutes) to an on-site
inspection of a U.S.-flagged vessel and
that the inspection would typically be
performed by an inspector at a rank of
E–5 (Petty Officer Second Class).
According to Commandant Instruction
7310.1W Reimbursable Standard Rates,
an inspector with an E–5 rank has a
fully loaded wage rate of $58. Therefore,
we estimate the annual undiscounted
Government cost associated with the
expected marginal increase in onsite
inspections of U.S.-flagged vessels is
$99,630 (10,286 vessels × 0.167 hours
92 Readers can view Commandant Instruction
7310.1W for military personnel at
media.defense.gov/2022/Aug/24/2003063079/-1/-1/
0/CI_7310_1W.PDF, accessed December 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00071
Fmt 4701
Sfmt 4702
inspection time × $58 facility inspector
wage). We estimate the total discounted
cost of increased inspection time to be
approximately $699,761 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
$99,630, using a 7-percent discount rate.
See table 46.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.049
Year
13474
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Year
Number of Vessel Inspection
Vessels
Hours
Vessel
Inspector
Wae:e
Total Cost
7 Percent
3Percent
1
10286
0.167
$58
$99,630
$93,112
$96,728
2
10286
0.167
$58
$99,630
$87,021
$93,911
3
10286
0.167
$58
$99,630
$81 328
$91176
4
10286
0.167
$58
$99,630
$76 007
$88 520
5
10286
0.167
$58
$99,630
$71,035
$85,942
6
10286
0.167
$58
$99,630
$66,388
$83,439
7
10286
0.167
$58
$99,630
$62 045
$81008
8
10286
0.167
$58
$99,630
$57,986
$78,649
9
10286
0.167
$58
$99,630
$54,192
$76,358
10
10286
0.167
$58
$99,630
$50,647
$74,134
$996,300
$699,761
$849,865
$99,630
$99,630
$99,630
lotter on DSK11XQN23PROD with PROPOSALS2
Total
Annualize
d
Note: Totals may not sum due to independent rounding.
The final source of Government costs
from this proposed rule would be the
time to process and generate
notifications for each cyber incident
reported to the NRC. As discussed
earlier in our analysis of costs
associated with cyber incident
reporting, from 2018 to 2022, the NRC
fielded and processed an average of 18
cyber incident reports from facilities
and OCS facilities, and an average of 2
cyber incident reports from U.S.-flagged
vessels, for a total of 20 cyber incident
reports per year. In addition, the NRC
generated an average of 31 notifications
for appropriate Federal, State, local and
tribal agencies per processed cyber
incident over that same time period,
meaning an average of 620 notifications
per year (20 cyber incident reports × 31
notifications).
Based on ICR 1625–0096, Report of
Oil or Hazardous Substance Discharge;
and Report of Suspicious Maritime
Activity, it takes the NRC approximately
0.15 hours (8.5 minutes) to receive an
incident report, and 0.2 hours (12
minutes) to disseminate a verbal
notification to the Federal on-scene
coordinator or appropriate Federal
agency. Given that cyber incidents and
the reports of suspicious activity
detailed in the ICR are processed in a
similar fashion, we use the same hour
estimates here. According to ICR 1625–
0096, a contractor, equivalent to a GS–
9, processes incident reports and
generates relevant notifications. We use
the GS–9-Step 5 hourly basic rate from
the Office of Personnel Management
(OPM) 2022 pay table, or $29.72.93 To
account for the value of benefits to
government employees, we first
calculate the share of total
compensation of Federal employees
accounted for by wages. The
Congressional Budget Office (2017)
reports total compensation to Federal
employees with a bachelor’s degree
(consistent with a GS level of GS–7 to
GS–10) as $67.00 per hour and
associated wages as $39.50.94 This
implies that total compensation is
approximately 1.70 times the average
wage ($67.00 ÷ $39.50). Therefore, we
can calculate $50.52 ($29.72 × 1.70 load
factor) as the fully loaded wage rate for
the NRC contractor equivalent to a GS–
9, Step 5.
We estimate undiscounted annual
Government costs of cyber incident
report processing and notification to be
$6,416 [(20 cyber incident reports × 0.15
hours to process × $50.52 contractor
wage) + (620 notifications × 0.2 hours ×
$50.52 contractor wage)]. We estimate
the total discounted cost to be
approximately $45,064 over a 10-year
period of analysis, using a 7-percent
discount rate. We estimate the
annualized cost to be approximately
$6,416, using a 7-percent discount rate.
See table 47.
93 Please see: https://www.opm.gov/policy-dataoversight/pay-leave/salaries-wages/salary-tables/
pdf/2022/RUS_h.pdf. We use the Rest of U.S. (RUS)
rate here to maintain consistency with the rates
used in ICR 1612–0096; accessed July 12, 2023.
94 Congressional Budget Office (2017),
‘‘Comparing the Compensation of Federal and
Private-Sector Employees, 2011 to 2015,’’ https://
www.cbo.gov/system/files/115th-congress-20172018/reports/52637-federalprivatepay.pdf, accessed
July 19, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00072
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.050
Table 46: Estimated On-site Inspection of U.S.-flagged Vessels Costs for
Government of the Proposed Rule (2022 Dollars, 10-year Discounted Costs, 7- and
3-percent Discount Rates)
13475
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 47: Estimated Government Costs of Cyber Incident Report Processing (2022
Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
Year
Number of
Incidents Hours to
Processed Process
Number of
Notifications
Generated
Hours to
Generate
Notification
NRC
Wae:e
Total Cost
7%
3%
1
20
0.15
620
0.2
$50.52
$6 416
$5,996
$6.229
2
20
0.15
620
0.2
$50.52
$6 416
$5,604
$6,048
3
20
0.15
620
0.2
$50.52
$6,416
$5,237
$5,872
4
20
0.15
620
0.2
$50.52
$6,416
$4,895
$5,701
5
20
0.15
620
0.2
$50.52
$6 416
$4,575
$5,534
6
20
0.15
620
0.2
$50.52
$6,416
$4,275
$5,373
7
20
0.15
620
0.2
$50.52
$6,416
$3,996
$5,217
8
20
0.15
620
0.2
$50.52
$6 416
$3,734
$5,065
9
20
0.15
620
0.2
$50.52
$6 416
$3,490
$4,917
10
20
0.15
620
0.2
$50.52
$6,416
$3,262
$4,774
Total
$64,160
$45,064
$54,730
Annualized
$6,416
$6,416
$6,416
Note: Totals may not sum due to independent rounding.
We estimate the total discounted
Government costs of the proposed rule
for the review of Cybersecurity Plans,
increase in on-site inspection time, and
processing cyber incident reports to be
approximately $27,647,481 over a 10year period of analysis, using a 7percent discount rate. We estimate the
annualized cost to be approximately
$3,936,379, using a 7-percent discount
rate. See table 48.
Facility
Inspection
Costs
Vessel
Inspection
Costs
Incident Report
Processing and
Notification
Costs
Total Cost
7 Percent
3 Percent
1
$0
$0
$245,592
$99,630
$6,416
$351,638
$328,634
$341,396
2
$12,385,952
$4,183,477
$245,592
$99,630
$6,416
$16,921,067
$14,779,515
$15,949,729
3
$1214316
$580 993
$245 592
$99 630
$6 416
$2,146 947
$1752548
$1964761
4
$1,214,316
$580,993
$245,592
$99,630
$6,416
$2,146,947
$1,637,896
$1,907,535
5
$1,214,316
$580,993
$245,592
$99,630
$6,416
$2,146,947
$1,530,744
$1,851,975
6
$1,214,316
$580,993
$245,592
$99,630
$6,416
$2,146,947
$1,430,601
$1,798,034
7
$2,671,424
$1,278,512
$245,592
$99,630
$6,416
$4,301,574
$2,678,804
$3,497,573
8
$1,214,316
$580,993
$245,592
$99,630
$6,416
$2,146,947
$1,249,543
$1,694,820
9
$1,214,316
$580,993
$245,592
$99,630
$6,416
$2,146,947
$1,167,797
$1,645,456
10
$1,214,316
$580,993
$245,592
$99,630
$6,416
$2,146,947
$1,091,399
$1,597,530
Total
$36,602,908
$27,647,481
$32,248,809
Annualized
$3,660,291
$3,936,379
$3,780,544
Note: Totals may not sum due to independent rounding.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00073
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.051
lotter on DSK11XQN23PROD with PROPOSALS2
Year
Facility Cyber Vessel Cyber
Plan Review
Plan Review
Costs
Costs
EP22FE24.052
Table 48: Total Estimated Government Costs of the Proposed Rule (2022 Dollars,
10-year Discounted Costs, 7- and 3-percent Discount Rates)
13476
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Total Costs of the Proposed Rule
We estimate the total discounted costs
of the proposed rule to industry and
government to be approximately
$562,740,969 over a 10-year period of
analysis, using a 7-percent discount
rate. We estimate the annualized cost to
be approximately $80,121,654, using a
7-percent discount rate. See table 49.
Table 49: Total Estimated Costs of the Proposed Rule to Industry and Government
(2022 Dollars, 10-year Discounted Costs, 7- and 3-percent Discount Rates)
Total Costs
7 Percent
3 Percent
1
$33,469,773
$53,613,063
$351,638
$87,434,474
$81,714,462
$84,887,839
2
$37,053,260
$54,116,840
$16,921,067
$108,091,167
$94,411,011
$101,886,292
3
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$59,913,465
$67,168,260
4
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$55,993,893
$65,211,903
5
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$52,330,741
$63,312,527
6
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$48,907,234
$61,468,473
7
$25,788,807
$49,425,867
$4,301,574
$79,516,248
$49,518,723
$64,653,986
8
$30,859,773
$40,389,851
$2,146,947
$73,396,571
$42,717,473
$57,939,931
9
$30.859.773
$40.389.851
$2.146.947
$73.396.571
$39.922.872
$56.252.360
10
$30 859.773
$40.389.851
$2.146.947
$73.396.571
$37.311.095
$54.613.942
Total
$312,330,251
$439,884,727
$36,602,908
$788,817,886
$78,881,789
$562,740,969 $677,395,513
$80,121,654 $79,411,419
Annualized
Note: Totals may not sum due to independent rounding.
Benefits
lotter on DSK11XQN23PROD with PROPOSALS2
Malicious cyber actors, including
individuals, groups, and nation states,
have rapidly increased in sophistication
over the years and use techniques that
make them more and more difficult to
detect. Recent years have seen the rise
of cybercrime as a service, where
malicious cyber actors are hired to
conduct cyber-attacks.95 Some national
governments have also used
ransomware to advance their strategic
interests, including evading sanctions.96
The increased growth of cybercrime is a
factor that has intensified in the last 20
years. Per the Federal Bureau of
Investigation’s cybercrime reporting
unit, financial losses from reported
incidents of cybercrime exceeded $10.3
billion in 2022, and $35.9 billion since
95 See https://cybernews.com/security/crimewareas-a-service-model-is-sweeping-over-thecybercrime-world/ for a description of cybercrime as
a service and https://cybersecurityventures.com/
cybercrime-damage-costs-10-trillion-by-2025/ for a
description of its growth in recent years. Accessed
December 6, 2023.
96 Institute for Security and Technology, ‘‘RTF
Report: Combating Ransomware: A Comprehensive
Framework for Action: Key Recommendations from
the Ransomware Task Force,’’ https://securityand
technology.org/ransomwaretaskforce/report/,
accessed July 19, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
2001.97 While there are significant
private economic incentives for MTS
participants to implement their own
cybersecurity measures, and survey
results indicate that MTS participants
are more confident in their
cybersecurity capabilities than in years
past, the same survey indicates that
there are important gaps in capabilities
that leave the MTS and downstream
economic participants exposed to risk.98
In the 2018 report, the CEA stated,
’’[b]ecause no single entity faces the full
costs of the adverse cyber events, the
Government can step in to achieve the
optimal level of cybersecurity, either
through direct involvement in
97 See the Federal Bureau of Investigation’s ‘‘2022
Internet Crime Report,’’ Internet Crime Complaint
Center (IC3), March 14, 2023. This report can be
found at https://www.ic3.gov/Media/PDF/
AnnualReport/2022_IC3Report.pdf, accessed
December 4, 2023. For a summary of financial
losses from reported incidents of cybercrime since
2001, see https://www.statista.com/statistics/
267132/total-damage-caused-by-by-cybercrime-inthe-us/, accessed December 4, 2023.
98 Readers can access the survey in the docket or
at https://www.joneswalker.com/en/insights/2022Jones-Walker-LLP-Ports-and-TerminalsCybersecurity-Survey-Report.html; accessed July 19,
2023. See page 16 of the survey for data on industry
confidence and pages 34–41 for data on
cybersecurity practices.
PO 00000
Frm 00074
Fmt 4701
Sfmt 4702
cybersecurity or by incentivizing private
firms to increase cyber protection.’’ 99
The overall benefit of this proposed
rule would be the reduced risk of a
cyber incident and, if an incident
occurs, improved mitigation of its
impact. This would benefit owners and
operators and help protect the maritime
industry and the United States. We
expect this proposed rule would have
significant but currently unquantifiable
benefits for the owners and operators of
facilities, OCS facilities, and U.S.flagged vessels, as well as downstream
economic participants 100 and the public
at large. This proposed rule would
benefit the owners and operators of
facilities, OCS facilities, and U.S.flagged vessels by having a means,
through the Cybersecurity Plan, to
ensure that all cybersecurity measures
are in place and tested periodically,
which would improve the resiliency of
owners and operators to respond to a
cyber incident and to maintain a current
cybersecurity posture, reducing the risk
99 Economic Report of the President supra note 1
at 369.
100 Downstream economic participants are
entities or individuals involved in the later stages
of the supply chain or production process, such as
distributors, wholesalers, service providers, and
retailers that supply and sell products directly to
consumers.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.053
Year
Facility and
OCS Facility U .S.-flagged Government
Vessel Costs
Costs
Costs
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
of economic losses for owners and
operators as well as downstream
economic participants. For example,
this proposed rule would require
training, drills, and exercises, which
would benefit owners and operators by
having a workforce that is
knowledgeable and trained in most
aspects of cybersecurity, which reduces
the risk of a cyber incident and
mitigates the impact if an incident
occurs. Conducting training, drills, and
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
exercises would also enable the owners
and operators of facilities, OCS
facilities, and U.S.-flagged vessels to
prevent, detect, and respond to a cyber
incident with improved capabilities.
In addition, cybersecurity measures in
this proposed rule would require
owners and operators of facilities, OCS
facilities, and U.S.-flagged vessels to
identify weaknesses or vulnerabilities in
their IT and OT systems and to develop
strategies or safeguards to identify and
PO 00000
Frm 00075
Fmt 4701
Sfmt 4702
13477
detect security breaches when they
occur. The software and physical
requirements of this proposed rule
would ensure that there is the minimal
level of protection for critical IT and OT
systems and allow for the proper
monitoring of these systems. In table 50,
we list the expected benefits associated
with each major regulatory provision of
the proposed rule.
E:\FR\FM\22FEP2.SGM
22FEP2
13478
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 50. Expected Actions of the Proposed Rule that Accrue Benefits
§ 101.635 Drills and
Exercises
lotter on DSK11XQN23PROD with PROPOSALS2
§ 101.645
Communications
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
Frm 00076
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.054
1. Improved incident response: A well-designed
Cybersecurity Plan includes procedures for incident
response and enables vessels and port facilities to
address cybersecurity incidents quickly and
effectively to minimize their impact and duration.
2. Employee awareness and training: A Cybersecurity
Plan includes employee training and awareness
programs, which ensures that staff members (1)
understand their role in protecting both the vessel
and port facility's digital assets to prevent cyber
incidents, and (2) know how to respond to potential
threats to minimize their impact and duration.
1. Increased awareness and understanding:
Cybersecurity drills and exercises promote a better
understanding of the risks and challenges associated
with cyber threats among all stakeholders, including
crew members, port facility personnel, and other
relevant parties, allowing them to better prevent
cyber incidents.
2. Improved preparedness: Regular drills and exercises
help organizations to identify vulnerabilities in their
cybersecurity posture, allowing them to develop and
implement effective countermeasures to address
potential threats and prevent cyber incidents.
3. Enhanced response capabilities: Drills and exercises
allow staff to practice their roles and responsibilities
during a potential cybersecurity incident, ensuring
they can respond quickly and effectively to minimize
the impact of any potential cyber-attacks.
4. Identification of gaps and weaknesses: By simulating
real-world cyber-attacks, organizations can identify
gaps in their security policies, procedures, and
technologies, and take appropriate steps to address
gaps in those areas to prevent cyber incidents.
5. Continuous improvement: Regularly conducting
drills and exercises allows organizations to learn
from their experiences and refine and update their
Cybersecurity Plans and strategies to ensure ongoing
effectiveness in preventing cvber incidents.
1. Improved situational awareness: Clear
communication enables stakeholders to stay
informed about potential cyber threats and
vulnerabilities, allowing them to respond promptly
and effectively.
§ 101.630
Cybersecurity Plan
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
§ 101.650
Cybersecurity
Measures. (b) Device
security measures.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
2. Enhanced collaboration: Effective communication
fosters collaboration between different departments,
stakeholders, and external partners, such as shipping
companies, port authorities, and cybersecurity
experts. This collaboration is crucial for identifying
and mitigating cybersecurity risks.
3. Streamlined incident response: In the event of a
cyber-attack or security breach, effective
communication helps ensure that all relevant parties
are aware of the situation and can coordinate their
response efforts, minimizing the impact of the
incident.
1. Preventing unauthorized use: A secured account
prevents malicious actors from using it as a platform
to spread malware, spam, or launch other attacks,
ensuring systems remain operational and free from
disruption.
2. Preserving digital identity: Prevents cyber criminals
from using compromised accounts to impersonate
the account holder, reducing identity theft or other
fraudulent activities. This promotes trust in clients
and partners and maintains the positive reputation of
the organization in the marketplace.
3. Personal data protection: Accounts often contain or
provide access to personal and sensitive information.
Securing them ensures this data remains confidential
and prevents it from being stolen, altered, or deleted.
Further, the organizations can promote greater
consumer confidence by protecting client data from
malicious actors.
4. Maintaining privacy: Securing accounts helps in
safeguarding private communications, photos,
videos, and other personal content from
unauthorized access and prevents it from being
stolen, altered, or deleted, retaining the trust of
clients and partners.
1. Limiting spread: Secured devices can prevent
malware or malicious activities from spreading to
other connected devices or networks, mitigating the
effects of a cyber incident.
2. Data protection: Prevent unauthorized access, theft,
or damage to personally identifiable information
(PII) and other sensitive data. This includes financial
information, health records, intellectual property,
and other confidential data. By protecting the digital
assets of the organization and its clients,
organizations can help prevent their customers from
becoming unwitting victims of cybercrime and
lessen the impacts of cyber incidents on other
Frm 00077
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.055
§ 101.650
Cybersecurity
Measures. (a) Account
security measures.
13479
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
·-
3.
4.
§ 101.650
Cybersecurity
Measures. (c) Data
security measures.
1.
2.
lotter on DSK11XQN23PROD with PROPOSALS2
3.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
.-
economic participants, increasing consumer trust and
commerce in the U.S. economy.
Reduced vulnerability: Regularly updated and
secured devices are less vulnerable to the newest
exploits or zero-day attacks, reducing the chance of
cyber-attacks and mitigating the effects of a cyber
incident.
Limiting spread: Secured devices can prevent
malware or malicious activities from spreading to
other connected devices or networks, mitigating the
effects of a cvber incident.
Protecting sensitive information: Both vessels and
port facilities handle sensitive data, such as personal
information from crew and passengers, cargo details,
financial transactions, and operational data. Data
security measures help protect this information from
unauthorized access, ensuring privacy and
compliance with regulations for data protection. This
measure helps prevent sensitive data from being
stolen, altered, or deleted. Thus, the organization
retains the trust of clients and partners and helps
protect downstream economic participants from the
effects of a cyber incident.
Building trust and reputation: Ensuring sensitive
information remains secure and maintaining reliable
operations contribute to a positive reputation for
shipping companies and port facilities. This can lead
to increased business opportunities, better
relationships with stakeholders, and improved trust
of clients and partners.
Promoting collaboration and information sharing
subject to any applicable antitrust limitations: Secure
data sharing between vessels, port facilities, and
other stakeholders in the maritime industry is
essential for effective collaboration and
coordination, which helps facilitate early warnings
about cyber threats and incidents to improve
response times and mitigate impacts to other actors.
Also, collective data and lessons learned can be used
to develop better security practices and policies,
helps determine the "appropriate levels of defense
investments," and facilitate the "effective
functioning of the cyber insurance market." 101 Data
security measures help create an environment where
parties can confidently share information without
compromising its confidentiality, integrity, or
availability. In its 2018 report, the CEA stated,
"Government-monitored information-sharing
platforms for anonymous disclosures of adverse
Frm 00078
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.056
13480
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
1.
2.
3.
4.
5.
6.
lotter on DSK11XQN23PROD with PROPOSALS2
§ 101.650
Cyb ersecuri ty
Measures. (e) Risk
management.
1.
2.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
cyber events are designed to increase the real-time
awareness of cyber vulnerabilities and facilitate
timely and publicly shared security solutions." The
CEA also states that "the Government can be a
valuable contributor to sharing threat
information." 102
Enhanced security awareness: Cybersecurity training
increases awareness of potential threats,
vulnerabilities, and best practices, empowering
personnel to take a proactive approach to addressing
potential cyber risks and preventing cyber incidents.
Risk reduction: Training helps reduce the risk of
successful cyber-attacks by teaching personnel how
to identify, mitigate, and respond to threats; thus,
reducing the potential for costly disruptions to
maritime operations.
Improved incident response: Training equips
personnel with the skills necessary to effectively
respond to and recover from cyber incidents, which
minimizes damage and downtime.
Strengthened collaboration and communication:
Cybersecurity training fosters a culture of shared
responsibility among all stakeholders, encouraging
collaboration and communication between onboard
and port facility personnel, as well as with other
entities in the maritime industry, which helps prevent
cyber incidents.
Continuous improvement: Regular cybersecurity
training helps to keep personnel updated on the latest
threats, technologies, and best practices, ensuring
that maritime cybersecurity measures remain
effective at preventing cyber incidents over time.
Reduction in human error: Cybersecurity training
helps reduce the likelihood of human errors, such as
falling victim to phishing attacks or accidentally
exposing sensitive information, which are some of
the most common causes of security incidents. This
prevents an accidental cyber incident or falling
victim to cyber-attacks such as a phishing attack.
Protection of critical assets: By managing
cybersecurity risks, ship and port facilities can better
protect essential assets such as navigation systems,
communication systems, cargo handling equipment,
and access control systems from cyber threats,
preventing disruptions to the system and maintaining
business continuity.
Strengthened resilience: Developing a
comprehensive CRM plan enables vessels and port
facilities to respond to and recover from cvber
Frm 00079
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.057
§ 101.650
Cybersecurity
Measures. (d)
Cybersecurity training
for personnel.
13481
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
§ 101.650
Cybersecurity
Measures. (f) Supply
chain.
1.
2.
3.
lotter on DSK11XQN23PROD with PROPOSALS2
§ 101.650
Cybersecurity
Measures. (g)
Resilience.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
1.
PO 00000
incidents more quickly, mitigating the impact of an
attack and recovering quickly from cyber-attacks.
Reduced risk of cyber-attacks: By ensuring that
hardware and software components are genuine,
untampered, and up to date, a secure supply chain
helps to minimize vulnerabilities that can be
exploited by cyber-attackers. Organizations with a
secure supply chain can assure partners and
customers of the reliability and safety of their goods
and services. The benefit of avoiding supply chain
disruptions may be the reduction in the "spillover
effects to economically linked firms" and possibly a
reduction in risk to "corporate partners, employees,
customers, and firms with a similar business
model." 103 Multiple authentication methods "may
help prevent cyber breaches across the supply
chain," 104 thereby reducing the cost of incidents
when they occur.
Enhanced trust: A secure supply chain promotes
trust among stakeholders, such as customers,
partners, and regulatory agencies, by demonstrating
a commitment to maintaining high cybersecurity
standards. Organizations with a secure supply chain
are better equipped to deal with disruptions, ensuring
smooth operations and uninterrupted supply chain
processes for their business partners, which
maintains their Organization's share of the
commerce.
Better risk management: A comprehensive
understanding of supply chain security risks allows
organizations to develop effective risk management
strategies, reducing the likelihood of cyber-attacks
and their potential impact.
Protection of sensitive data: Cyber resilience helps
protect sensitive information, such as customer data,
intellectual property, and trade secrets, from being
stolen or compromised by hackers. Cyber resilience
is about minimizing the financial losses associated
with data breaches, ransomware, and other cyber
threats. In its 2018 report, the CEA stated from a
case study that a data breach of PII "will likely
negatively affect the firm's ability to raise new
capital and make new investments" and generally
may adversely affect a firm's stock price. 105
Therefore, protecting sensitive information may be
beneficial in protecting a firm's market value.
Frm 00080
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.058
13482
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
§ 101.650
Cybersecurity
Measures. (i) Physical
security.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
PO 00000
2. Business continuity: A cyber-resilient organization
can maintain or quickly resume operations in the
event of a cyber-attack, minimizing downtime and
ensuring that essential services remain available to
customers and stakeholders.
3. Reputation and trust: A strong cyber resilience
posture can enhance an organization's reputation and
foster trust with customers, partners, and
stakeholders, as it demonstrates a commitment to
protecting their data and interests.
1. Enhanced security: By segregating the network into
separate segments, each with its own access controls,
network segmentation helps to minimize the risk of
unauthorized access to critical systems and sensitive
data. This reduces the potential for cyber-attacks,
data breaches, and other security incidents. It also
reduces disruptions to operations and the impact of
the cyber incident, and, thereby, economic losses to
firms.
2. Easier monitoring and management: Segmented
networks can be more easily monitored and
managed. Administrators can more effectively track
network traffic and troubleshoot issues, as well as
apply and enforce security policies on a per-segment
basis, preventing cyber incidents.
3. Isolating issues: If a security breach or a technical
problem occurs within one network segment, it can
be more easily contained, preventing the issue from
spreading throughout the entire network. This can
minimize the impact on operations and reduce the
time and resources required to address the issue.
1. Prevention of unauthorized access: Physical security
measures can prevent unauthorized individuals from
accessing sensitive areas or equipment, such as data
centers, server rooms, or computer systems, where
critical information is stored. Direct access to critical
assets like servers, computers, and storage devices
can cause immediate and significant damage. For
example, destruction of physical assets can be a
greater financial burden and more difficult to recover
from after an attack, and the loss or destruction of
PII, loss of financial data, and online services being
down during the attack may result in lost revenues.
2. Protection of hardware: Implementing physical
security measures can protect valuable hardware and
equipment from theft, tampering, or damage. This
includes devices like servers, workstations, routers,
switches, and storage devices. Physical security
represents a first line of defense against an internal
attack. Direct access would enable the attackers to
bypass digital security measures like firewalls or
Frm 00081
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.059
§ 101.650
Cybersecurity
Measures. (h) Network
segmentation.
13483
13484
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Cyber Incidents and Risks Addressed by
the Proposed Rule
In May 2021, the Colonial Pipeline
Company suffered a cyber-attack that
disrupted the supply of fuel to the east
coast of the United States. Colonial
Pipeline Company was forced to shut
down operations for 6 days, which
created gasoline and fuel shortages. In
addition to the direct financial losses
incurred by Colonial Pipeline Company,
the shutdown and subsequent shortages
negatively impacted consumers,
creating a 4 cents-per-gallon increase in
average gasoline prices in the impacted
areas, with price increases lingering
even after the pipeline returned to
operation.106 Further, fuel shortages
caused some fuel stations to temporarily
close due to shortened supply, and
some airlines in the impacted area were
forced to scramble for additional fuel
lotter on DSK11XQN23PROD with PROPOSALS2
101 Economic
Report of the President supra note
1 at 370.
102 Economic Report of the President supra note
1 at 370 and 327.
103 Economic Report of the President supra note
1 at 362.
104 Economic Report of the President supra note
1 at 382–383.
105 Economic Report of the President supra note
1 at 342.
106 Tsvetanov, T., & Slaria, S. (2021). The effect
of the colonial pipeline shutdown on gasoline
prices. Economics Letters, 209. https://doi.org/
10.1016/j.econlet.2021.110122. Accessed December
14, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
sources and added additional stops
along select long-haul flights.107 This
was a ransomware cyber-attack that,
based on public reports, was a result of
the attackers using a legacy Virtual
Private Network and Colonial Pipeline
not having a two-factor authentication
method, more commonly known as
multifactor authentication, in place on
its computer systems.108 Therefore, it
was possible for computer hackers to
access Colonial Pipeline’s computer
systems with only a password. This
proposed rule would likely prevent an
attack similar to the Colonial Pipeline
attack from occurring by requiring
owners and operators of vessels,
facilities, and OCS facilities to
implement account security measures
and multifactor authentication on their
computer systems. An example of
107 Josephs, L. (2021). Pipeline outage forces
American Airlines to add stops to some long-haul
flights, southwest flies in Fuel. CNBC. https://
www.cnbc.com/2021/05/10/colonial-pipelineshutdown-forces-airlines-to-consider-other-ways-toget-fuel.html, accessed January 18, 2024.
108 U.S. Senate, Joseph Blount, Jr. Committee on
Homeland Security & Governmental Affairs.
‘‘Hearing Before the United States Senate
Committee on Homeland Security and
Governmental Affairs—Threats to Critical
Infrastructure: Examining the Colonial Pipeline
Cyber Attack.’’ June 8, 2021. Washington, DC and
via video conference. Text can be downloaded at
https://www.hsgac.senate.gov/hearings/threats-tocritical-infrastructure-examining-the-colonialpipeline-cyber-attack/, accessed June 28, 2023.
PO 00000
Frm 00082
Fmt 4701
Sfmt 4702
multifactor authentication would be
requiring a five- or six-digit passcode
after a password has been entered by
company personnel. Multifactor
authentication is part of account
security measures in the proposed
§ 101.650.
The encryption of data in the
proposed § 101.650 under data security
measures may have relegated stolen data
to being useless in the event of a cyberattack. Furthermore, Colonial Pipeline
would likely have benefitted from a
penetration test, which they had not
conducted, to ensure the safety and
security of its critical systems. The
proposed requirement of a penetration
test would simulate real-world cyberattacks that would help companies
identify the risks to their computer
systems and prepare the necessary
measures to lessen the severity of a
cyber-attack.
Additionally, under proposed
§ 101.650 for device security measures,
documenting and identifying the
network map and OT device
configuration information, Colonial
Pipeline may have been able to detect
exactly where the connections to the
affected systems were and may have
been able to isolate the problem without
having to shut down all pipeline
operations, as it did temporarily, which
greatly affected its fuel supply
operations.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.060
encryption, directly impacting core systems and data.
Protecting hardware may help prevent against the
loss or destruction of PII, loss of financial data, lost
revenue, and so on.
3. Deterrent to attackers: Visible physical security
measures can deter potential attackers and make it
more difficult for them to execute a cyber-attack.
This can include security cameras, access control
systems, or security personnel. Physical damage to
infrastructure can take longer to recover from, be
more costly, and is potentially irreversible.
4. Minimize the risk of insider threats: Physical
security measures can help detect and prevent insider
threats, such as employees or contractors attempting
to access sensitive information or systems without
authorization. Unlike digital breaches that often
leave digital traces, physical breaches that are carried
out by employees or contractors may go unnoticed
until significant damage has occurred. Insider attacks
can lead to loss of trust among customers, business
partners, and stakeholders which could reduce the
flow of commerce.
lotter on DSK11XQN23PROD with PROPOSALS2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Lastly, Colonial Pipeline did not have
a Cybersecurity Plan in place but did
have an emergency response plan. With
proposed §§ 101.630, Cybersecurity
Plan, and 101.635, Drills and Exercises,
a Cybersecurity Plan could have
benefitted Colonial Pipeline because it
includes periodic training and exercises
that increase the awareness of potential
cyber threats and vulnerabilities
throughout the organization. A
Cybersecurity Plan also creates best
practices so company personnel have
the knowledge and skills to identify,
mitigate, and respond to cyber threats
when they occur. Creating the
Cybersecurity Plan would allow the
CySO to ensure all aspects of the Plan
have been implemented at a CySO’s
respective company. Improved
awareness of potential cybersecurity
vulnerabilities and the steps taken to
correct them could have helped
Colonial Pipeline identify its password
weakness issue before it was exploited.
In another cyber-attack that occurred
in 2017 against the global shipping
company Maersk, computer hackers,
based on public reports, exploited
Maersk’s computer systems because of
vulnerabilities in Microsoft’s Windows
operating system. The malware was
disguised as ransomware, which created
more damage to Maersk’s computer
systems. In 2016, one year prior to the
attack, IT professionals at Maersk
highlighted imperfect patching policies,
the use of outdated operating systems,
and a lack of network segmentation as
the largest holes in the company’s
cybersecurity. While there were plans to
implement measures to address these
concerns, they were not undertaken,
leaving Maersk exposed and
underprepared for the attack it faced in
2017. The effects of this attack were farreaching. Beyond the direct financial
losses incurred by Maersk (estimated at
nearly $300 million), shipping delays
and supply chain disruptions caused
additional downstream economic losses
that are much more difficult to quantify
as shipments went unfulfilled for
businesses and consumers, and trucks
were forced to sit and wait at ports.109
Under proposed § 101.650,
cybersecurity measures such as patching
would likely prevent a similar attack
from occurring and help prevent such
losses. Patching vessel, facility, and
OCS facility computer systems would
ensure they are not vulnerable to a
cyber-attack because the latest software
109 Andy Greenberg, ‘‘The Untold Story of
NotPetya, the Most Devastating Cyberattack in
History’’; WIRED; August 22, 2018; https://
www.wired.com/story/notpetya-cyberattackukraine-russia-code-crashed-the-world/, accessed
June 28, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
13485
updates would be installed on these
systems with periodic software patches.
Additionally, penetration testing may
have identified the vulnerabilities in
Maersk’s computer systems. Regular
cybersecurity drills and exercises may
have enabled Maersk’s employees to
quickly identify the cyber threat and
may have reduced the impact and
longevity of the cyber-attack. Further,
network segmentation as proposed in
§ 101.650(h) could have helped stop the
spread of malware to all its computer
systems, which ultimately crippled its
operations. By separating networks,
Maersk could have better isolated the
attack and kept larger portions of its
business open, meaning fewer financial
losses and downstream economic
impacts to other companies and
consumers.
Resilience played a significant role in
Maersk’s ability to recover from the
cyber-attack quickly. Company
personnel worked constantly to recover
the affected data and eventually restored
the data after 2 weeks.110 Proposed
§ 101.650 contains provisions for
resilience, which owners and operators
such as Maersk must possess to recover
from a cyber-attack. However, with
proper backups of critical IT and OT
systems, Maersk may have been able to
recover more quickly from the attack.
The Coast Guard emphasizes that this
proposed rule might also have
quantifiable benefits from reducing or
preventing lost productivity from a
cyber incident and possibly lost
revenues from the time that critical IT
and OT systems are inoperable as a
result of a cyber incident, if one occurs.
Such benefits would accrue to owners
and operators of vessels and facilities, as
well as to downstream participants in
related commerce, and to the public at
large. For instance, short-term
disruptions to the MTS could result in
increases to commodity prices, while
prolonged disruptions could lead to
widespread supply chain shortages.
Short- and long-term disruptions and
delays may affect other domestic critical
infrastructure and industries, such as
our national defense system, that
depend on materials transported via the
MTS.
The societal impacts from a cyber
security incident such as the attack that
occurred against Maersk are difficult to
quantify. They may include the effects
of delays in cargo being delivered,
which could result in the loss of some
or all of the cargo, especially if the cargo
is comprised of perishable items such as
food or raw goods, such as certain types
of oil that would be later used in the
supply chain to manufacture final goods
such as food items. Delays themselves
may result in the unfulfillment of
shipping orders to customers as vessels
wait offshore to enter a port, which
would have the downstream effect of
customers not receiving goods because
delivery trucks would sit idle at ports
until OT and IT systems either at the
port or onboard vessels once again
become operational after the attack.
Other societal impacts could include,
but are not limited to, delays in
shipments of medical supplies that may
be carried onboard vessels that would
not be delivered on time to individuals
and medical institutions who rely on
these supplies for their healthcare needs
and service, respectively. Therefore, it
should be noted that a cyber-attack may
have considerable economic impacts on
multiple industries in the United States
such as, but not limited to, healthcare,
food, transportation, utilities, defense,
and retail. It should also be noted that
the Coast Guard is not able to estimate,
quantify, or predict the societal harm of
shipping delays from a cyber-attack on
the MTS or the economic impact it
could cause because it would be
dependent on many variables such as:
the type of attack, the severity of the
attack, the length of the attack, the
response by the affected parties to the
attack, and other variables.
The benefits of this NPRM could be
particularly salient in the case of a
coordinated attack by a malicious actor
seeking to disrupt critical infrastructure
for broader purposes. For instance, in a
circumstance where the rule’s
provisions prevented a terrorist or
nation-state actor 111 from using a cyber-
110 News reports suggest this recovery time was
luck and not due to existing cybersecurity practices.
‘‘Maersk staffers finally found one pristine backup
in their Ghana office. By a stroke of luck, a blackout
had knocked the server offline prior to the NotPetya
attack, disconnecting it from the network. It
contained a single clean copy of the company’s
domain controller data, and its discovery was a
source of great relief to the recovery team.’’ See
Daniel E. Capano, ‘‘Throwback Attack: How
NotPetya accidentally took down global shipping
giant Maersk,’’ September 30, 2021, https://
www.industrialcybersecuritypulse.com/threatsvulnerabilities/throwback-attack-how-notpetyaaccidentally-took-down-global-shipping-giantmaersk/, accessed July 25, 2023.
111 For instance, the Office of the Director of
National Intelligence recently reported on the cyber
espionage and attack threats from multiple nationstates with respect to U.S. critical infrastructure.
See Office of the Director of National Intelligence,
Annual Threat Assessment of the U.S. Intelligence
Community at 10, 15, 19 (Feb. 6, 2023), available
at https://www.dni.gov/files/ODNI/documents/
assessments/ATA-2023-Unclassified-Report.pdf
(last visited July 31, 2023) (describing cyber threats
associated with China, Russia, and Iran). A recent
multi-national cybersecurity advisory noted that
‘‘Russian state-sponsored cyber actors have
demonstrated capabilities to compromise IT
networks; develop mechanisms to maintain long-
PO 00000
Frm 00083
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
Continued
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13486
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
attack in connection with a broader
scheme that threatened human life, a
strategic waterway, or a major port, the
avoided economic and social costs may
be substantial.
With respect to the latter, as noted by
Cass R. Sunstein in Laws of Fear:
Beyond the Precautionary Principle
(The Seeley Lectures, Series Number 6),
‘‘fear is a real social cost, and it is likely
to lead to other social costs.’’ 112 In
addition, Ackerman and Heinzerling
state ‘‘terrorism ‘works’ through the fear
and demoralization caused by
uncontrollable uncertainty.’’ As
devastating as the direct impacts of a
successful cyber-attack can be on the
U.S. marine transportation system and
supply chain, avoiding the impacts of
the more difficult to measure indirect
effects of fear and demoralization in
connection with a coordinated attack
would also entail substantial benefits.
However, the Coast Guard is not able to
quantify these potential benefits because
they would depend on the incident, the
duration of the incident, and how
various private and public actors would
respond to the incident.
Through the provisions of this
proposed rule, benefits from
implementing and enhancing a
cybersecurity program may likely
increase over time. By requiring that a
range of cybersecurity measures be
implemented, such as account security
measures, vulnerability scanning, and
automated backups, an organization can
drastically reduce the downtime it takes
to remedy a breach. Education and
training can also help guide employees
to identify potential email phishing
scams, suspect links, and other criminal
efforts, which will likely increase
protection against external and internal
threats before they occur. Further,
because so many of the proposed
provisions include periodic updates and
modifications following tests or
assessments, we believe that
cybersecurity programs will continue to
improve each time they are tested and
reexamined by the implementing entity.
This NPRM proposes to address the
challenges facing businesses today by
requiring the implementation of
safeguards to cybersecurity on the MTS.
In adopting these measures, owners and
operators of U.S.-flagged vessels,
facilities, and OCS facilities can take
preemptive action before malicious
actors and the threats they pose take
advantage of vulnerabilities in their
critical IT and OT systems.
term, persistent access to IT networks; exfiltrate
sensitive data from IT and [OT] networks; and
disrupt critical [ICS/OT] functions by deploying
destructive malware.’’ See Joint Cybersecurity
Advisory, Russian State Sponsored and Criminal
Cyber Threat to Critical Infrastructure, Alert AA22–
110A (April 20, 2022), available at: https://
www.cisa.gov/uscert/ncas/alerts/aa22-110a
(accessed December 14, 2023).
112 Cass R. Sunstein, Laws of Fear, at 127;
Cambridge University Press (2005).
113 For example, analysis of the NotPetya attack
revealed overall estimates of impacts on customers
four times greater than those on the firms directly
impacted by the attack. For more details, please see:
Matteo Crosignani et al, ‘‘Pirates without Borders:
The Propagation of Cyberattacks through Firms’
Supply Chains,’’ Federal Reserve Bank of New York
Staff Reports, No. 937 (July 2020, revised July
2021), https://www.newyorkfed.org/medialibrary/
media/research/staff_reports/sr937.pdf, accessed
July 7, 2023.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Breakeven Analysis
While the Coast Guard is able to
describe the qualitative benefits that this
proposed rule may have for owners and
operators of U.S.-flagged vessels,
facilities, and OCS facilities, and others
who would be affected by a cyberattack, the Coast Guard is not able to
quantify and monetize benefits. One
reason is that it is challenging to project
the number of cyber-attacks that would
occur over a relevant period without
this proposed rule; another reason is
that it is challenging to quantify the
magnitude of the harm from such
attacks. It is further challenging to
quantify the marginal impact of this
rulemaking, both because the Coast
Guard cannot quantify the effectiveness
of the provisions included in the
proposals (how many attacks would be
prevented or how much damage would
be mitigated) and because the Coast
Guard has uncertainty around the
appropriate baseline to consider
regarding what cybersecurity actions are
being taken for reasons beyond this
rulemaking. Without such projections
and quantification, it is not possible to
monetize the benefits of the proposed
rule in terms of harms averted. As an
alternative, we present a breakeven
analysis for this proposed rule.
Thus, this breakeven analysis only
considers the $80 million in costs (at a
7 percent discount rate) that Coast
Guard was able to quantify. The Coast
Guard notes that, based on available
data, there are likely additional costs the
Coast Guard is not able to monetize.
Furthermore, the downstream costs and
impacts resulting from a cyber-attack on
an individual firm are challenging to
quantify given the overlapping and
intersecting nature of the supply chain.
However, research examining the
overall impacts of the NotPetya cyberattack (one of the largest cyber-attacks in
history), estimates societal impacts and
downstream costs nearly four times
greater than the direct impact on the
firm suffering the initial attack.113 The
Coast Guard requests comment on this
PO 00000
Frm 00084
Fmt 4701
Sfmt 4702
finding and its relevance to the impact
of cyber-attacks in the maritime
transportation system specifically. To
the extent that the costs of this proposed
rule are higher than the Coast Guard’s
monetized estimate, the amount of costs
this proposed rule must prevent would
also need to increase to justify this
proposed rule. The proposed rule would
set the minimum requirements for
companies to address their
cybersecurity posture and provides the
flexibility for these companies to take
the necessary action to protect
themselves from a cyber-attack.
OMB’s Circular A–4 (September 17,
2003) states that, in the case of ‘‘nonquantified factors,’’ agencies may
consider the use of a threshold
(‘‘breakeven’’) analysis.114 A breakeven
analysis provides calculations to show
how small or large the value of the nonquantified benefits could be before the
proposed rule would yield zero net
benefits. For this proposed rule, we
calculate breakeven results from one
example, using the estimated cost of a
real-world cyber-attack on a regulated
entity. Global shipper Maersk reported
that it suffered an estimated $300
million in business costs and income
losses due to a cyber-attack.115 The
actual losses were likely much larger
than the $300 million in business
impacts to Maersk due to impacts on
Maersk’s customers.
Over the past decade, there have been
numerous cyber-attacks—not just on the
international and domestic maritime
sector, but on other sectors of the U.S.
and global economies.116 In a paper
published by Akpan, Bendiab, Shiaelis,
Karamperidis, and Michaloliakos
(2022), the authors state that the
maritime sector has shown a 900percent increase in cybersecurity
breaches as it enters the digital era.117
The paper adds that many automated
systems on vessels, by their nature, are
vulnerable to a cyber-attack, and
114 Readers can access OMB Circular A–4 dated
September 17, 2003, at https://
www.whitehouse.gov/wp-content/uploads/legacy_
drupal_files/omb/circulars/A4/a-4.pdf, accessed
July 20, 2023.
115 Greenberg, supra note 109.
116 NIST provides a definition for the term
‘‘cyber-attack.’’ Readers can access this definition at
https://csrc.nist.gov/glossary/term/cyber_attack;
accessed July 20, 2023.
117 Frank Akpan, Gueltoum Bendiab, Stavros
Shiaeles, Stavros Karamperidis, and Michalis
Michaloliakos; ‘‘Cybersecurity Challenges in the
Maritime Sector’’; Network; March 7, 2022; page
123; https://www.mdpi.com/2673-8732/2/1/9/
pdf?version=1646653034; accessed May 2023. MDPI
has open access to journals and published papers.
Additionally, NIST provides a definition of the term
breach, although not specifically related to
cybersecurity at, https://csrc.nist.gov/glossary/term/
breach, accessed July 2023.
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
include navigation systems such as
Electronic Chart Display and
Information Systems, Global Positioning
Systems, and Global Navigation Satellite
Systems. Other affected systems include
radar systems; Automatic Identification
Systems; communication systems; and
systems that control the main engine,
generators, among others (Akpan et al.,
2022).118 Furthermore, the paper
presents the vulnerabilities and
consequences of cyber-attacks to ships’
systems ranging from hijacking ships,
destroying and stealing data, damaging
equipment, disrupting vessel
operations, uploading malware to
computer systems, losing lives and
cargo, and more (Akpan et al., 2022).119
In a paper by Jones (2016), the author
noted that outdated systems are
vulnerable to cyber-attacks.120 The
paper refers to a study that states 37
percent of servers running Microsoft
failed to download the correct patch and
left systems vulnerable to a cyber-attack.
Additionally, Jones states that ‘‘many
ships were built before cyber security
was a major concern’’ and goes on to
state that many newer software systems
are not compatible with older software
systems.
Akpan, et al. (2022) also list a few
cyber-attacks that have occurred in the
maritime transportation sector in the
past few years. Allianz Global Corporate
and Specialty (AGCS) reports that there
was a record 623 million ransomware
attacks in 2021.121 In a paper published
by Meland, Bernsmed, Wille, Rodseth,
and Nesheim (2021), the authors state
that 46 successful 122 cyber-attacks with
a significant impact on the maritime
industry have occurred worldwide
between 2010 and 2020, or an average
of 4.2 attacks a year.123 Of the 46
118 Akpan
et al., supra note 117, at 129–30.
lotter on DSK11XQN23PROD with PROPOSALS2
119 Id.
120 Kevin Jones, ‘‘Threats and Impacts in
Maritime Cyber Security,’’ April 15, 2016, pages 7
and 8, https://pearl.plymouth.ac.uk/handle/
10026.1/4387?show=full; accessed May 22, 2023.
121 AGCS is a global insurance company. Readers
can access this report at https://
www.agcs.allianz.com/news-and-insights/news/
cyber-risk-trends-2022-press.html. The Coast Guard
accessed this report in May 2023. AGCS’s website
is, https://www.agcs.allianz.com.
122 The analysis did not include mere attempts to
attack, unsuccessful attacks, or attacks categorized
as ‘‘white hat’’ attacks, which are attempts to
infiltrate cybersecurity systems to identify
vulnerabilities in software, hardware, or networks.
Definition of ‘‘white hat hacking’’ at https://
www.fortinet.com/resources/cyberglossary/
whitehat-security, accessed July 20, 2023.
123 The title of this paper is ‘‘A Retrospective
Analysis of Maritime Cyber Security Incidents.’’
Readers can access this paper at https://
www.semanticscholar.org/paper/A-RetrospectiveAnalysis-of-Maritime-Cyber-Security-MelandBernsmed/6caba4635f991dd1d99ed98cf640812f8
cae16ba (pages 519 and 523). The Coast Guard
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
attacks, the most notable cyber-attack
stated by the authors of this paper, and
earlier in the Benefits discussion of this
preamble, occurred in 2017 against the
shipping company Maersk. Maersk
estimated their economic loss to be
nearly $300 million in the form of costs
and reduced income to a specific firm
as the result of the incident (Meland et
al., 2021). Based on other reports, the
economic damage that resulted from
this incident may have been
considerably more because of the
downstream impacts that this incident
may have had on customers and other
companies who rely on the shipping
industry for their businesses.124
Monetizing the impact of the cyberattack on Maersk allows the Coast Guard
to create a breakeven point as it relates
to a specific company (risk reduction
percentage and the number of years the
proposed rule would have to prevent
one incident annually) for this proposed
rule using the estimated costs of a cyberattack that occurred against a shipping
company. The breakeven point would
be higher if effects on third parties were
considered.
Although this cyber-attack did not
occur against a U.S. company, and
represents one attack against a single
company, it impacted a large shipping
company and affected almost one-fifth
of global shipping operations, according
accessed this pdf link in May 2023. Readers may
need to create an account to view this paper, other
papers, and research literature. The paper is also
available at, https://www.transnav.eu. The authors
of the study noted that shipping is a very diverse
sector and that their source materials tend to focus
on larger ships and operations. The authors stated
that it is highly unlikely that this study has
captured all the different cyber incidents over the
sector. Additionally, the authors did not define
what a ‘‘significant impact’’ entails; nevertheless, in
some cyber-attacks they cited, they provided the
effect of an attack in their description of the
incident.
124 This figure does not include indirect effects on
third parties, such as logistics firms and others who
may have experienced losses because of this
incident. See, for example, Matteo Crosignani et al,
‘‘Pirates without Borders: The Propagation of
Cyberattacks through Firms’ Supply Chains,’’
Federal Reserve Bank of New York Staff Reports,
No. 937 (July 2020, revised July 2021), https://
www.newyorkfed.org/medialibrary/media/research/
staff_reports/sr937.pdf, accessed July 7, 2023
(analyzing a sample of customers indirectly affected
by the NotPetya attack, and concluding that ‘‘the
customers of these directly hit firms [of the
NotPetya attack] recorded significantly lower profits
relative to similar but unaffected firms,’’ with one
measure of effects on customers being four times
higher, in the aggregate, than effects on firms
directly affected by the attack); Andy Greenberg,
Wired Magazine, ‘‘The Untold Story of NotPetya,
the Most Devastating Cyberattack in History’’
(August 22, 2018), https://www.wired.com/story/
notpetya-cyberattack-ukraine-russia-code-crashedthe-world/, accessed July 7, 2023 (describing
indirect costs to logistics firms and other costs
associated with a large-scale disruption to the
global supply chain).
PO 00000
Frm 00085
Fmt 4701
Sfmt 4702
13487
to Meland, et al. (2021). The Coast
Guard is using this incident as an
example while understanding that the
economic impact of a cyber-attack can
vary greatly, depending upon the
severity of a cyber-attack and the
surrounding conditions. We
acknowledge that the Maersk incident
we use in this breakeven analysis may
not be representative of other cyberattacks that occur in the future in the
maritime sector. Meland, et al. (2021),
also state that a majority of cyber-attacks
in the maritime industry were not
reported.
Using this example of a cyber-attack
with our explanation in the benefits
section of the RIA of how we believe
this proposed rule may prevent such an
attack, we can estimate a breakeven
point. We take the estimated
annualized 125 cost of this proposed rule
using a 7-percent discount rate ($80.1
million)—which may be an
underestimation of the actual costs that
this proposed rule may impose on
industry—and divide by the avoided
loss from the Maersk attack ($300
million)—a loss that this proposed rule
may prevent noting that the reported
business loss of the Maersk attack may
be an underestimate of the actual impact
of the attack on social welfare.126 From
there, we obtain an annual riskreduction value to the affected firm of
approximately 0.267, or about 27
percent ($80.1 million ÷ $300 million),
which is the minimum annual riskreduction percentage that would need to
occur to justify this proposed rule to the
affected firm. If we state this another
way, this proposed rule would need to
reduce the risk or the likelihood of one
or more successful cyber-attacks, similar
to this attack, by approximately 27
percent annually for the benefits to
justify the estimated costs to the affected
firm. To be clear, the Coast Guard does
not have an estimate for how much this
proposed rule would actually reduce the
risk of successful cyber-attacks on the
MTS.
The Coast Guard estimates the
number of years the proposed rule
would have to prevent a cyber-attack to
break even, though the Coast Guard
cautions that it does not know the
degree to which the proposed rule
would prevent cyber-attacks. For an
125 We use annualized costs because we assume
this proposed rule would result in constant reduced
probability in every year following this proposed
rule’s implementation. Stated differently, we
assume the risk reduction to be constant each year.
126 The loss estimate used for the Maersk attack
also represents a potential underestimation as it
does not include indirect effects on third parties,
such as logistics firms and others who may have
experienced losses because of this incident. See
footnote 113.
E:\FR\FM\22FEP2.SGM
22FEP2
13488
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
million) to break even. Additionally, the
losses from similar cyber-attacks may be
lower given that this proposed rule may
have the intended effect of mitigating
the size of losses from these types of
attacks. Readers should also note that
incident similar to the Maersk cyberattack, we estimate this proposed rule
would have to prevent at least one
attack of this type (with the same
avoided losses) approximately every
3.75 years ($300 million ÷ $80.1
the losses estimated from this incident
were reported by Maersk and not from
an independent source. Table 51
summarizes the breakeven results of this
NPRM.
Calculations
Annualized Cost of
Proposed Rule
(7% discount rate)
a
Maersk Attack
$80.1 million
Breakeven Example
lotter on DSK11XQN23PROD with PROPOSALS2
Analysis of Alternatives
Cybersecurity has become a critical
issue across all sectors. The maritime
industry, a pivotal component of the
global supply chain, is no exception.
With an increasing amount of sensitive
data being stored and processed online,
regulations are needed to protect this
data from unauthorized access and
breaches. As cyber threats grow more
sophisticated and pervasive, it has
become increasingly apparent that clear
and actionable cybersecurity regulations
are needed for the maritime industry.
Furthermore, cybersecurity is not just a
matter of individual or business
concerns, it is also a national security
issue. Robust regulations help protect
critical infrastructure and government
services from cyber-attacks that could
threaten national stability. For instance,
unauthorized access to a ship’s
navigation system could lead to
disastrous consequences, including
collisions or groundings, which can put
people at risk and lead to economic
losses for the affected entities and the
U.S. economy. To prevent incidents like
this, the Coast Guard has included
several proposed regulatory provisions
that identify potential network and
system vulnerabilities. Of these
provisions, penetration testing is one of
the more intensive and costly, but
would provide important benefits,
including demonstrating where and
how malicious actors could exploit
system weaknesses, so that
organizations can better prioritize
cybersecurity upgrades and
improvements based on risk.
Given the relatively high costs
associated with penetration testing, and
the significant vulnerability risks
associated with not performing these
tests, the Coast Guard contemplated four
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Avoided Losses
b
$300 million
(single-event
loss)
Required Risk
Reduction
c = a-;-b
Required Frequency of
Averted Cvber-attacks
d=b-;-a
0.267
One every 3.75 years
alternatives: (1) maintain the status quo;
(2) require annual penetration testing
and submission of results to the Coast
Guard; (3) allow penetration testing at
the discretion of the owner or operator;
or (4) require penetration testing every
5 years in conjunction with the
submission and approval of
Cybersecurity Plans (the preferred
alternative).
systems, the affected population puts
itself at greater risk of cyber incidents,
which can endanger employees,
consumers, and the supply chain. As a
result, the Coast Guard rejected the
status quo alternative and has proposed
requiring penetration tests every 5 years,
aligned with the renewal of a
Cybersecurity Plan, as discussed in
alternative (4), below.
(1) Status Quo
Currently. the Coast Guard does not
require owners and operators of
facilities, OCS facilities, and U.S.flagged vessels to conduct penetration
tests as a part of their security plans.
Despite this, survey data indicates that
some MTS entities are already
conducting penetration tests for their
organizations as they face an evolving
cyber threat landscape. While we expect
the adoption of penetration testing
policies to grow over time, 32 percent of
facility and OCS facility owners and
operators (see footnote number 69) and
an unknown number of U.S.-flagged
vessel owners and operators have yet to
add this test to their suite of
cybersecurity measures.
Maintaining the status quo by not
requiring any penetration testing would
reduce the costs for affected owners and
operators of the proposed rule by
$28,549,669, with an annualized cost
reduction of $4,064,831 over a 10-year
period of analysis, discounted at 7
percent, when compared to the
preferred alternative. However, not
requiring penetration testing would
leave a significant gap in the
vulnerability detection capability of a
large portion of the MTS, exposing MTS
stakeholders and the wider U.S.
economy to greater risk. Without
periodic penetration tests to determine
weaknesses in critical IT and OT
(2) Annual Penetration Testing
Penetration testing represents a
crucial element of a comprehensive
cybersecurity strategy. It involves
proactively testing computer systems,
networks, and software applications to
identify vulnerabilities that might be
exploited by attackers. Because
penetration testing provides a much
more in-depth review of the
vulnerabilities and weaknesses of IT
and OT systems, the Coast Guard
considered an alternative that would
require it on an annual basis. Through
annual penetration testing, an
organization would be better equipped
to identify weaknesses within their
systems and prepare for real cyber
threats. However, the costs and
resources needed for penetration testing
can be significant. As such, annual
testing might impose an undue burden
on the affected organizations.
Based on Coast Guard estimates,
penetration testing would cost
approximately $5,000 per test, plus an
additional $50 per IP address at the
organization to capture network
complexity. By increasing the frequency
of these tests, the costs to facilities, OCS
facilities, and U.S. flagged vessels
would increase significantly. Under the
preferred alternative, which requires
penetration testing every 5 years in
conjunction with the submission and
renewal of a Cybersecurity Plan, the
PO 00000
Frm 00086
Fmt 4701
Sfmt 4702
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.061
Table 51. Summary of Breakeven Results of Proposed Rule
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Coast Guard estimates total costs of
penetration testing to industry of
$28,549,669 and annualized costs of
$4,064,831 over a 10-year period of
analysis, discounted at 7 percent (see
the Penetration Testing section of the
RIA for more details on the calculations
underlying this estimate). Requiring
annual penetration testing would
increase industry costs for penetration
testing by over 300 percent, to
approximately $134,021,173 total and
$19,081,600 annualized over a 10-year
period of analysis, discounted at 7
percent. This alternative would result in
an 18.7 percent increase in the total cost
of the rule, bringing the total cost to
industry and the government to
approximately $668,212,472 total and
$95,138,423, annualized, over a 10-year
period of analysis, discounted at 7
percent. The Coast Guard believes these
increased costs are prohibitive and
ultimately decided to reject this
alternative. See table 52 for the costs
13489
associated with annual penetration
testing over a 10-year period of analysis.
Using the estimated annualized cost
of this alternative of approximately
$95.1 million, and using the Maersk
cyber-attack, we estimate the number of
years this alternative would have to
break even and to prevent at least one
or more attacks of this type annually
(with the same avoided losses) to be
approximately 3.15 years ($300 million
÷ $95.1 million), compared with 3.75
years with the chosen alternative.
Year
Facilities and OCS
Facilities Cost
U.S.-Flagged
Vessel Cost
Total Cost
7 Percent
3 Percent
1
$4,758,900
$14,322,700
$19,081,600
$17,833,271
$18,525,825
2
$4,758,900
$14,322,700
$19,081,600
$16,666,608
$17,986,238
3
$4 758 900
$14 322 700
$19 081.600
$15 576 270
$17462367
4
$4,758,900
$14,322,700
$19,081,600
$14,557,261
$16,953,754
5
$4,758,900
$14,322,700
$19,081,600
$13,604,917
$16,459,956
6
$4 758 900
$14 322 700
$19 081,600
$12 714 876
$15 980 540
7
$4 758 900
$14 322 700
$19 081,600
$11 883 061
$15 515 087
8
$4,758,900
$14,322,700
$19,081,600
$11,105,665
$15,063,191
9
$4,758,900
$14,322,700
$19,081,600
$10,379,126
$14,624,458
10
$4 758 900
$14 322 700
$19 081.600
$9 700.118
$14 198 502
Total
$47,589,000
$143,227,000
$190,816,000
$134,021,173
$162,769,918
$19,081,600
$19,081,600
lotter on DSK11XQN23PROD with PROPOSALS2
Annualized
Note: Totals may not sum due to independent rounding.
(3) Penetration Testing at the Discretion
of an Owner or Operator
Given the cost of penetration testing,
particularly for small businesses with
limited resources, the Coast Guard
considered an alternative that would
make penetration an optional provision.
This would allow those in the affected
population to choose to prioritize
different cybersecurity measures. The
decision to undertake penetration
testing could be made as a result of
thorough risk assessments for each
organization, considering its operational
environments, risk profile, and
pertinent threats.
Under this alternative, an owner or
operator, or a CySO on their behalf,
could determine when a penetration test
is warranted, if at all. Because the
testing would be optional, we assume
that fewer owners and operators would
conduct penetration testing in a given
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
year, however, we have no way of
knowing how many this would be. If
none of the affected owners or operators
elected to conduct penetration testing,
this could hypothetically reduce costs
for owners and operators for penetration
testing down to zero, meaning a cost
reduction of $28,549,669 and an
annualized cost reduction of $4,064,831
over a 10-year period of analysis,
discounted at 7 percent when compared
to the preferred alternative.
However, the value of penetration
testing for most organizations cannot be
overstated. When integrated into a
comprehensive cybersecurity strategy,
penetration testing can be very effective
in identifying vulnerabilities. By
fostering a proactive rather than reactive
approach in cybersecurity, penetration
testing enables organizations to stay
ahead of potential threats and better
understand how malicious actors could
PO 00000
Frm 00087
Fmt 4701
Sfmt 4702
exploit weaknesses in IT and OT
systems. This is particularly crucial
given the quickly evolving landscape of
cyber threats. In addition, because the
costs of a potential cyber incident could
be high, with potential downstream
economic impacts, the Coast Guard
must prioritize some level of oversight
on provisions that could lessen the risk
of a cyber incident. Therefore, we
rejected this alternative, despite the
potential cost savings. It should be
noted, however, that according to
proposed § 101.665, owners and
operators of facilities, OCS facilities,
and U.S.-flagged vessels can seek a
waiver or an equivalence determination
if they are unable to meet the proposed
requirements, penetration testing
included.
With this alternative, the estimated
annualized cost decreases to
approximately $76.1 million compared
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.062
Table 52: Estimated Penetration Testing Costs of the Proposed Alternative for
Facilities, OCS Facilities, and U.S.-Flagged Vessels (2022 Dollars, 10-year
Discounted Costs, 7- and 3-percent Discount Rates)
13490
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
with the chosen alternative. Using the
Maersk cyber-attack, we estimate the
number of years for this alternative to
breakeven and to prevent at least one or
more attacks of this type annually (with
the same avoided losses) to be
approximately 3.9 years ($300 million ÷
$76.1 million), compared with 3.75
years with the chosen alternative.
(4) Penetration Testing in Conjunction
With Cybersecurity Plan Submission
(Preferred Alternative)
In an effort to best balance the cost of
annual penetration testing with the risk
of leaving the MTS vulnerable to cyber
incidents with even more costly
impacts, the Coast Guard considered
requiring penetration tests every 5 years,
aligned with the renewal of a
Cybersecurity Plan. This is the preferred
alternative because penetration testing
would supplement other cybersecurity
measures in the proposed regulations
such as vulnerability scanning, annual
Cybersecurity Assessments and audits,
quarterly drills, and annual exercises,
which may limit the necessity of annual
penetration testing. However, making
penetration testing an optional
requirement for organizations could
inadvertently leave them more exposed
to cyber-attacks and limit the Coast
Guard’s understanding of the MTS’
cybersecurity readiness. Under the
preferred alternative, owners and
operators are still free to conduct more
frequent tests at their discretion if they
would like to increase their awareness
of vulnerabilities. Alternatively, they
could apply for waivers or exemptions
if they feel like they cannot meet the
proposed requirements related to
penetration testing. Please see the
‘‘Breakeven Analysis’’ section of this
RIA for the breakeven estimates of this
chosen alternative.
lotter on DSK11XQN23PROD with PROPOSALS2
B. Small Entities
Under the Regulatory Flexibility Act
(RFA), 5 U.S.C. 601–612, the Coast
Guard has prepared this Initial
Regulatory Flexibility Analysis (IRFA)
that examines the impacts of this
proposed rule on small entities.
Per the RFA, a small entity may be a
small independent business, defined as
one independently owned and operated,
organized for profit, and not dominant
in its field under the Small Business Act
(5 U.S.C. 632); a small not-for-profit
organization, defined as any not-forprofit enterprise which is independently
owned and operated and is not
dominant in its field; or a small
governmental jurisdiction, defined as a
locality with fewer than 50,000 people.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Section 603(b) of the RFA prescribes
the content of the IRFA, which
addresses the following:
(1) A description of the reasons why
action by the agency is being
considered;
(2) A succinct statement of the
objectives of, and legal basis for, the
proposed rule;
(3) A description of and, where
feasible, an estimate of the number of
small entities to which this proposed
rule will apply;
(4) A description of the projected
reporting, recordkeeping, and other
compliance requirements to comply
with the proposed rule, including an
estimate of the classes of small entities
which will be subject to the requirement
and the type of professional skills
necessary for preparation of the report
or record;
(5) An identification, to the extent
practicable, of all relevant Federal rules
which may duplicate, overlap, or
conflict with this proposed rule; and
(6) A description of any significant
alternatives to the proposed rule which
accomplish the stated objectives of
applicable statutes and which minimize
any significant economic impact of the
proposed rule on small entities.
1. Description of the reasons why
action by the agency is being
considered.
This proposed rule helps address
current and emerging cybersecurity
threats to maritime security in the MTS.
Cybersecurity risks result from
vulnerabilities in the operation of vital
systems, which increase the likelihood
of cyber-attacks on facilities, OCS
facilities, and vessels. Cyber-related
risks to the maritime domain are threats
to the critical infrastructure that citizens
and companies depend on to fulfill their
daily needs.
Cyber-attacks on public infrastructure
have raised awareness of the need to
protect systems and equipment that
facilitate operations within the MTS
because cyber-attacks have the potential
to disable the IT and OT of vessels,
facilities, and OCS facilities.
Autonomous vessel technology,
automated OT, and remotely accessible
machines provide additional
opportunities for cyber-attackers. These
systems and equipment are prime
targets for cyber-attacks that could
potentially disrupt vessel movements
and shut down port operations, such as
loading and unloading cargoes. Section
III.A., The Problem We Seek to Address,
and Section IV.A, The Current State of
Cybersecurity in the MTS in this NPRM
provide more details.
PO 00000
Frm 00088
Fmt 4701
Sfmt 4702
2. A succinct statement of the
objective of, and legal basis for, the
proposed rule.
The objective of this proposed rule is
to establish minimum performancebased cybersecurity requirements for
U.S.-flagged vessels, facilities, and OCS
facilities subject to MTSA. The
proposed requirements include account
security measures, device security
measures, data security measures,
governance and training, risk
management, supply chain
management, resilience, network
segmentation, reporting, and physical
security.
The Coast Guard has statutory
authority to promulgate regulations
under 43 U.S.C. 1333(d); 46 U.S.C. 3306,
3703, 70102 through 70104, 70124; and
DHS Delegation No. 00170, Revision No.
01.3. Section 4 of the Outer Continental
Shelf Lands Act of 1953, codified as
amended at 43 U.S.C. 1333(d),
authorizes the Secretary to promulgate
regulations with respect to safety
equipment and other matters relating to
the promotion of safety of life and
property on the artificial islands,
installations, and other devices on the
OCS. This authority was delegated to
the Coast Guard by DHS Delegation No.
00170(II)(90), Revision No. 01.3.
Sections 70102 through 70104 in Title
46 of the U.S.C. authorize the Secretary
to evaluate for compliance vessel and
facility vulnerability assessments,
security plans, and response plans.
Section 70124 authorizes the Secretary
to promulgate regulations to implement
Chapter 701, including sections 70102
through 70104, dealing with
vulnerability assessments for the
security of vessels, facilities, and OCS
facilities; VSPs, FSPs, and OCS FSPs;
and response plans for vessels, facilities,
and OCS facilities. These authorities
were delegated to the Coast Guard by
DHS Delegation No. 00170(II)(97)(a)
through (c), Revision No. 01.3.
Section III.C. of this preamble, Legal
Authority to Address This Problem,
provides more details on the Coast
Guard’s legal basis for these actions.
3. A description of and, where
feasible, an estimate of the number of
small entities to which the proposed
rule will apply.
This section considers the number of
small entities likely to be affected by
this NPRM. First, we determine which
owners of facilities, OCS facilities, and
vessels in the affected population
qualify as small businesses, small notfor-profit organizations, or small
governments. Then, we compare
reported annual revenues among the
identified small entities with annual
E:\FR\FM\22FEP2.SGM
22FEP2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
compliance costs estimated by the Coast
Guard.
lotter on DSK11XQN23PROD with PROPOSALS2
Number of Small Entities Affected
To identify the portion of the affected
facility, OCS facility, and vessel owners
that are likely to be small businesses
and small not-for-profit organizations,
we match business-and organizationspecific information with size standards
for small businesses published in the
Small Business Administration’s (SBA)
Table of Small Business Size
Standards.127 128 The SBA defines small
businesses in terms of firm revenues or
number of employees. Size thresholds of
small businesses differ depending on
the industry sector, defined in terms of
NAICS codes; therefore, the analysis
also requires us to identify the relevant
NAICS codes for the affected facility
and vessel owners. To accomplish this,
we take the following steps:
(1) Identify the names and addresses
of owners of facilities, OCS facilities,
and U.S.-flagged vessels using
information contained in the Coast
Guard’s MISLE database; 129
(2) Upload the names and location
information to D&B Hoovers’ website
and rely on D&B Hoovers’ proprietary
algorithm to match entities with the
information stored in its database; 130
(3) Collect the primary NAICS code,
ownership type,131 number of
127 SBA. ‘‘Table of size standards.’’ Available at:
https://www.sba.gov/document/support-table-sizestandards. Effective March 17, 2023, accessed July
21, 2023.
128 To determine whether not-for-profit
organizations are small entities, we rely on the selfidentified NAICS code reported by each
organization to D&B Hoovers and the SBA’s small
business size standard for that NAICS code. Any
organization qualifying as a small business
pursuant to SBA’s threshold is considered to be
‘‘not dominant in its field’’ (15 U.S.C. 632) and is
categorized as a small organization. If no NAICS
code is available, we assume the organization is
small.
129 The Coast Guard provided MISLE data to
Industrial Economics, Incorporated (IEc) on June 2,
2023, and June 9, 2023.
130 This process relies on D&B Hoovers’
automated search functions to identify the business
profiles associated with a list of businesses, not
manual business-by-business searching. This search
functionality is described in more detail in D&B
Hoovers (2019, page 25). You can find this resource
at https://app.dnbhoovers.com/product/wpcontent/uploads/2020/10/DB-Hoovers-User-Guide920.pdf. The matched data were downloaded from
D&B Hoovers on June 20, 2023, accessed via:
app.dnbhoovers.com/login, July 21, 2023.
131 D&B Hoovers provides ownership type for the
matched entities. This analysis considers all entities
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
employees,132 and annual revenue
information from entities that matched
the information in D&B Hoovers’
database; and
(4) Determine which owners are small
businesses or small not-for-profit
organizations based on the SBA’s
definitions of small businesses matched
to each NAICS code.133
The RIA considers facilities, OCS
facilities, and vessels owned by
governments or quasi-government
organizations separately.134 Small
governmental jurisdictions are defined
as governments of cities, counties,
towns, townships, villages, school
districts, or special districts, with a
population of less than 50,000 (5 U.S.C.
601). After using D&B Hoovers to
identify a sample of Government
owners, the 2020 U.S. Census informed
our classification of Government
jurisdictions.135
Facility and OCS Facility Owners
MISLE identifies 3,411 regulated
facilities and OCS facilities. Of the
facilities, 2,663 are associated with
1,334 unique owners, and 748 lack
owner information.136 Like the cost
marked as ‘‘private,’’ ‘‘public,’’ or ‘‘partnership’’ as
businesses. ‘‘Nonprofit’’ ownership status is used to
identify not-for-profit organizations.
132 D&B Hoovers contains data fields for both
‘‘employees at single site’’ and ‘‘employees at all
sites.’’ When both numbers are provided, we default
to using the ‘‘employees at all sites’’ entry to
capture the size of the larger parent company. When
only the ‘‘employees at single site’’ information is
available, we use that entry instead.
133 In some cases, SBA provides a size standard
for the NAICS code as well as an ‘‘exception’’ for
a sub-set of businesses with specific activity types.
This analysis does not consider the ‘‘exceptions’’
when classifying businesses and not-for-profit
organizations as small.
134 Government owners are identified using the
‘‘public sector’’ ownership status in D&B Hoovers.
In most cases, the entities that fall into the ‘‘public
sector’’ ownership type also have 92 NAICS codes.
135 2020 U.S. Census data accessed from: https://
www.census.gov/quickfacts/, accessed July 21,
2023.
136 Owners of facilities and OCS facilities are
determined using various data files in MISLE.
Owner information is not reported in a standard
format for facilities and OCS facilities; therefore,
considerable data cleaning was necessary to
identify unique owner names and location
information. This analysis assumes the sample of
facilities with owner information identified is
broadly representative of all regulated facilities.
Additionally, D&B Hoovers further consolidated the
list of affected owners of facilities and OCS
facilities by identifying unifying parent companies
for some owners thought to be independent
businesses or organizations based on MISLE data.
PO 00000
Frm 00089
Fmt 4701
Sfmt 4702
13491
analysis, this analysis assumes the 748
facilities lacking owner information in
MISLE are associated with an additional
374 unique owners, under the
assumption that the average facility
owner is associated with 2 regulated
facilities. In total, this analysis assumes
a total of 1,708 affected owners and
operators of facilities and OCS facilities.
The names and location information
of all 1,334 identifiable affected owners
were uploaded to D&B Hoovers, and the
search function returned information for
786 entities (59 percent) with at least
one identified NAICS code. The 548
unmatched entities either do not have
business profiles in D&B Hoovers or the
owner’s name and location information
stored in MISLE does not match the
business records on the website.
Included among the owners that
matched with records in D&B Hoovers
were 770 businesses (98 percent of the
matched owners), 11 not-for-profit
organizations (1 percent), and 5
Governments (1 percent). The 770
businesses categorize into 186 NAICS
codes.
Table 53 reports the number of
businesses in the top 10 most frequently
occurring NAICS codes, as well as the
portion that meet the definition of small
business. An additional row
summarizes the businesses across the
remaining 176 NAICS codes. As
presented, 615 of 770 businesses (80
percent) qualify as small based on their
revenue or number of employees.
Additionally, the 11 not-for-profit
organizations include 10 small
organizations (91 percent). The 5
Government jurisdictions include no
small Governments (0 percent). Under
the assumptions that (1) the 374 owners
of facilities and OCS facilities without
owner information in MISLE are small
entities and (2) all 548 of facilities and
OCS facilities for which D&B Hoovers
profiles are not available are small
entities, we estimate 1,533 total small
entities are affected by the requirements
for facilities and OCS facilities in this
proposed rule (90 percent of affected
facility owners) (374 owners without
identifying information in MISLE + 548
unmatched facility owners + 601
matched small businesses + 10 matched
small organizations + 0 matched small
Governments= 1,533 total small
entities). See table 53.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13492
VerDate Sep<11>2014
NAICS Code
Type of Industry
Jkt 262001
Size Standard
Type
PO 00000
Marine Cargo Handling
Revenue
424720
Petroleum and Petroleum Products Merchant
Wholesalers (except Bulk Stations and Terminals)
221118
324110
Other Electric Power Generation
Petroleum Refineries
Total Affected
Owners
Percent
Small
57
39
68%
Employees
200
37
33
89%
Employees
Employees
650
1,500
22
22
21
21
95%
95%
$36.5 million
22
9
41%
225
19
19
100%
100%
Other Warehousing and Storage
Revenue
Petroleum Bulk Stations and Terminals
Employees
483212
Inland Water Passenger TranSPortation
Employees
550
18
18
336611
Ship Building and Repairing
Employees
1,300
17
15
88%
488510
Freight Transportation Arrangement
Revenue
$20 million
17
11
65%
493110
General Warehousing and Storage
Revenue
$34 million
17
9
53%
176 Additional
NAICS Codes
Various
Various
Various
522
420
80%
Matched Businesses
Various
Various
Various
770
615
80%
Various
Various
11
10
91%
50000
5
548
374
1,708
0
548
374
1,547
0%
100%
100%
91%
E:\FR\FM\22FEP2.SGM
493190
424710
Sfmt 4725
$47 million
Fmt 4701
Frm 00090
488320
Size Standard
Used
Number of
Affected
Owners
Classified as
Small
Matched Not-forProfit Oraanizations
Various
Matched
Governments
Public Sector
Unmatched Facility Owners
22FEP2
Owners Without Identifvine: Information in MISLE
Total Affected Owners of Facilities and OCS Facilities
Notes:
•
•
•
•
•
EP22FE24.063
Population
The first 10 rows include the most frequently occurring NAICS codes among businesses in the sample of owners that matched in D&B Hoovers .
NAICS codes and type of industry reflect the 2022 NAICS classification.
Small businesses and small not-for-profit organizations were identified using the SBA's Table ofSmall Business Size Standards (March 17, 2023, version) .
The owners considered in this analysis were established from the Coast Guard's MISLE database and classified as small entities based on information obtained from
D&B Hoovers and the 2020 U.S. Census.
See the main text for further analytic details and assumptions .
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Table 53: Number of Small Entities Affected by the Proposed Rule's Cybersecurity Requirements for Facilities and OCS
Facilities
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Vessel Owners
Across the eight categories of vessels
regulated by the Coast Guard and
considered for this proposed rule,
MISLE identifies over 10,000 vessels
owned by 1,775 unique entities.137 The
names and location information of all
1,775 owners stored in MISLE were
uploaded to D&B Hoovers, and the
search function returned information for
1,006 entities (57 percent) with at least
1 NAICS code identified. Included
lotter on DSK11XQN23PROD with PROPOSALS2
137 Like facilities and OCS facilities, unique
businesses are determined using both organization
name and address as stored in the Coast Guard’s
MISLE database. The information for owners is
more complete for vessels than for facilities and
OCS facilities in MISLE; all vessels include owner
information. D&B Hoovers was able to identify
unifying parent companies for some owners thought
to be independent businesses or organizations
based on MISLE data.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
among the entities that matched with
records in D&B Hoovers were 989
businesses (98 percent of the matched
owners), 11 not-for-profit organizations
(1 percent), and 6 Government
jurisdictions (1 percent). The 989
businesses categorize into 170 NAICS
codes.
Table 53 reports the number of
businesses in the top 10 most frequently
occurring NAICS codes, as well as the
portion that meet the definition of small
business. An additional row
summarizes the businesses across the
remaining 160 NAICS codes.138 As
138 Included in this group is NAICS code 99990
‘‘unclassified.’’ Because SBA does not propose a
size standard for this code, we assume all entities
with NAICS code 99990 are small. For the matched
vessel owners, 46 entities are classified with this
code in D&B Hoovers.
PO 00000
Frm 00091
Fmt 4701
Sfmt 4702
13493
presented, 900 of 989 businesses (91
percent) qualify as small businesses
based on their revenue or number of
employees. Additionally, the 11 not-forprofit organizations include 9 small
organizations (82 percent), and the 6
Government jurisdictions include 1
small Government (17 percent). Under
the assumption that all 769 vessel
owners for which D&B Hoovers profiles
are not available are small entities, we
estimate 1,633 total small entities are
affected by the vessel requirements in
this proposed rule (92 percent of
affected vessel owners) (769 unmatched
vessel owners + 854 matched small
businesses + 9 matched small
organizations + 1 matched small
Government = 1,633 total small
entities). See table 54.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
b
rs
II Entities Affected bv_, the P
NAICS Code
Type of Industry
dCvb
Size Standard
Type
i!Y_R,
cec 1mrements for V,
·.,
Size Standard
Used
I
Number of
Affected Owners
Classified as Small
Total Affected
Owners
Percent Small
Jkt 262001
Revenue
$47million
118
l08
92%
Revenue
$45 million
87
72
83%
1,050
44
40
91%
$14 million
33
28
85%
PO 00000
Frm 00092
Fmt 4701
Sfmt 4725
E:\FR\FM\22FEP2.SGM
22FEP2
487210
Other Heavy and Civil
Engineeriru!. Construction
Inland Water Freight
Transportation
Scenic and Sightseeing
Transportation, Water
Revenue
336611
Shio Building and Reoairing
Emolovees
1,300
29
27
93%
483212
Inland Water Passenger
Transportation
Employees
550
29
29
l00%
488410
Motor Vehicle Towing
Revenue
$9 million
28
26
93%
441222
Boat Dealers
Revenue
$40 million
26
26
100%
488320
Revenue
$47million
24
23
96%
532490
Marine Cargo Handling
Other Commercial and Industrial
Machinery and Equipment Rental
and Leasing
Revenue
$40 million
20
19
95%
160 Additional NAICS
Codes
Various
Various
Various
551
456
83%
Matched Businesses
Various
Various
Various
989
854
86%
Various
Various
Various
11
9
82%
Public Sector
Population
50,000
6
1
17%
769
769
100%
1,775
1,633
92%
237990
483211
Matched Not-for-Profit
Organizations
Matched Governments
(all 92 NAICS codes)
Unmatched Vessel
Owners
Total Affected Vessel
Owners
Employees
Notes:
•
•
•
•
•
EP22FE24.064
The first 10 rows include the most frequently occurring NAICS codes among businesses in the sample of owners that matched in D&B Hoovers .
NAICS codes and type of industry reflect the 2022 NAICS classification.
Small businesses and small not-for-profit organizations were identified using the SBA's Table ofSmall Business Size Standards (March 17, 2023, version) .
The owners considered in this analysis were established from the Coast Guard's MISLE database and classified as ~mall entities based on information obtained from
D&B Hoovers and the 2020 U.S. Census.
See the main text for further analytic details and assumotions .
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Navigational Services to Shiooing
488330
..
13494
VerDate Sep<11>2014
Table 54: N
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Summary
Across the combined 3,483 affected
owners of facilities, OCS facilities, or
vessels, we estimate that 3,180 small
entities (91 percent) may be affected,
including small businesses, small notfor-profit organizations, and small
Governments. Because this analysis
assumes all owners for which NAICS
codes, employment, or revenue
information is unmatched in D&B
Hoovers are small entities, the projected
number of affected small entities may be
overestimated.
Costs Relative to Revenues
This discussion compares the cost of
the proposed changes per facility and
vessel owner with annual revenues of
affected small entities. Revenue
information is obtained from D&B
Hoovers for small businesses and small
not-for-profit organizations. For small
Governments, we use the 2021 State
and Local Government Finance
Historical Datasets and Tables available
through the U.S. Census.139 We assume
lotter on DSK11XQN23PROD with PROPOSALS2
139 Data downloaded on July 14, 2023, from
https://www.census.gov/data/datasets/2021/econ/
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
that the findings of this analysis are
indicative of the impacts on entities for
which revenue information is not
readily available.
The RFA does not define a
‘‘significant effect’’ in quantitative
terms. In its guidance to agencies on
how to comply with the RFA, the SBA
states, ‘‘[i]n the absence of statutory
specificity, what is ‘significant’ will
vary depending on the economics of the
industry or sector to be regulated. The
agency is in the best position to gauge
the small entity impacts of its
regulation.’’ 140 One of the measures
SBA uses to illustrate whether an
impact could be significant, is to
determine whether the cost per entity
exceeds 1 percent of the gross
revenues.141 Therefore, this analysis
local/public-use-datasets.html, accessed July 21,
2023.
140 U.S. Small Business Administration (SBA).
2017. A Guide for Government Agencies: How to
Comply with the Regulatory Flexibility Act.
Available at https://advocacy.sba.gov/2017/08/31/
a-guide-for-government-agencies-how-to-complywith-the-regulatory-flexibility-act/, page 18,
accessed July 21, 2023.
141 Id. Page 19.
PO 00000
Frm 00093
Fmt 4701
Sfmt 4702
13495
considers the 1 percent threshold when
analyzing these potential impacts.
Facility and OCS Facility Owners
Assuming that an owner or operator
would need to implement each of the
provisions required by this proposed
rule, Coast Guard estimates that the
highest single-year costs would be
incurred in year 2 of the analysis period.
We estimate the year 2 cost is $37,667
for an owner or operator with one
facility or OCS facility. Each additional
facility or OCS facility owned or
operated would increase the estimated
annual costs by the cost of an additional
Cybersecurity Plan, since each facility
or OCS facility will require an
individual Cybersecurity Plan. For
example, consider an entity that owns 4
facilities. The estimated cost to that
entity in year 2 is calculated as follows:
$37,667 + (3 × $8,414) = $62,909. Table
55 provides a breakdown of the costs
per owner or operator of one facility or
OCS facility. The text that follows
provides more detail on these cost
calculations.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13496
Jkt 262001
Frm 00094
Fmt 4701
Sfmt 4702
22FEP2
Cybersecurity Plan (which would
include amendments), 15 hours to
renew Cybersecurity Plans every 5
years, and 40 hours to conduct annual
audits of Cybersecurity Plans. Based on
E:\FR\FM\22FEP2.SGM
provided earlier in the analysis. The
hour-burden estimates are 100 hours to
develop the Cybersecurity Plan (average
hour burden), 10 hours to conduct
annual maintenance of the
PO 00000
Drills Account
Cyber
Facility K:ybersecurit) and
Security Multifactor K:ybersecurit) Penetration Vulnerability Incident
Count
Plan
Exercises Measures k\.uthentication Trainin2
Testin2 Mana2ement Reoortin2
1
$4207
$841
$576
$20 100
$4 633
$0
$3 390
$13
$8,700
1
$8 414
$841
$576
$11100
$4 633
$3 390
$13
1
$4207
$841
$576
$11100
$4 633
$0
$3 390
$13
1
$4207
$841
$576
$11100
$4 633
$0
$3 390
$13
1
$4207
$841
$576
$11100
$4 633
$0
$3 390
$13
1
$4207
$841
$576
$11100
$4 633
$0
$3 390
$13
$8,700
$841
$576
$11100
$4 633
$3 390
$13
1
$1893
$4207
$841
$576
$11100
$4 633
$0
$3 390
$13
1
$4207
$841
$576
$11100
$4 633
$0
$3 390
$13
1
1
$4,207
$841
$576
$11,100
$4,633
$0
$3,390
$13
Year
1
2
3
4
5
6
7
8
9
10
Total
Annualized
Note: Totals may not sum due to independent rounding.
Total
$33,760
$37,667
$24,760
$24,760
$24,760
$24,760
$31,146
$24,760
$24,760
$24,760
~275,893
$27,589
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
To estimate the cost for an individual
owner or operator of a facility or OCS
facility to develop, resubmit, conduct
annual maintenance, and audit the
Cybersecurity Plan, we use estimates
VerDate Sep<11>2014
EP22FE24.065
Table 55: Summary of Total Costs of the Proposed Rule per Owner or Operator of One Facility and OCS Facility (2022
Dollars, 10-year U ndiscounted Costs)
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
estimates from the Coast Guard’s FSP
and OCS FSP reviewers at local
inspections offices, approximately 10
percent of Plans would need to be
revised and resubmitted in the second
year, which is consistent with the
current resubmission rate for FSPs and
OCS FSPs.
For renewals of Plans after 5 years
(occurring in the seventh year of the
analysis period), Plans would need to be
further revised and resubmitted in
approximately 10 percent of cases as
well. However, in this portion of the
analysis, we estimate costs as though
the owner or operator will need to
revise and resubmit their Plans in all
cases resulting in a conservative (upperbound) estimate of per-entity costs. We
estimate the time for revision and
resubmission to be about half the time
to develop the Plan itself, or 50 hours
in the second year of submission, and
7.5 hours after 5 years (in the seventh
year of the analysis period). Because we
include the annual Cybersecurity
Assessment in the cost to develop
Cybersecurity Plans, and we do not
assume that owners and operators will
wait until the second year of analysis to
begin developing the Cybersecurity Plan
or implementing related cybersecurity
measures, we divide the estimated 100
hours to develop Plans equally across
the first and second years of analysis.
Using the CySO loaded hourly CySO
wage of $84.14, we estimate the
13497
Cybersecurity Plan related costs by
adding the total number of hours to
develop, resubmit, maintain, and audit
each year and multiplying by the CySO
wage. For example, we estimate owners
would incur $8,414 in costs in year 2 of
the analysis period [1 facility × $84.14
CySO wage × (50 hours to develop the
Plan + 50 hours to revise and resubmit
the Plan) = $8,414]. Table 56 displays
the per-entity cost estimates for an
owner or operator of one facility over a
10-year period of analysis. For an owner
or operator with multiple facilities or
OCS facilities, we estimate the total
costs by multiplying the estimates in
table 56 by the number of owned
facilities.
Table 56: Cybersecurity Plan Related Costs per Owner or Operator of a Facility
and OCS Facility (2022 Dollars, 10-year Undiscounted Costs)
Hours to
CvSOWae:e Develoo Plan
Hours to
Resubmit
Plan
Annual
Maintenance
Hours
Audit
Hours
Total
Year
Facility
Count
1
1
$84.14
50
0
0
0
$4,207
2
1
$84.14
50
50
0
0
$8 414
3
1
$84.14
0
0
10
40
$4,207
4
1
$84.14
0
0
10
40
$4,207
5
1
$84.14
0
0
10
40
$4207
6
1
$84.14
0
0
10
40
$4,207
7
1
$84.14
15
7.5
0
0
$1 893
8
1
$84.14
0
0
10
40
$4207
9
1
$84.14
0
0
10
40
$4,207
10
1
$84.14
0
0
10
40
$4207
Total
$43,963
Similarly, we use earlier estimates for
the calculation of per-entity costs for
drills and exercises, implementing
account security measures,
implementing multifactor
authentication, cybersecurity training,
penetration testing, vulnerability
management, and resilience.
For drills and exercises, we assume
that a CySO on behalf of each owner
and operator of a facility or OCS facility
will develop cybersecurity components
to add to existing physical security
drills and exercises. This development
is expected to take 0.5 hours for each of
the 4 annual drills and 8 hours for an
annual exercise. Using the loaded
hourly wage for a CySO of $84.14, we
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
$4,396
estimate annual costs of approximately
$841 per owner or operator of a facility
or OCS facility [$84.14 CySO wage ×
((0.5 hours × 4 drills) + (8 hours × 1
exercise)) = $841], as seen in table 55.
For account security measures, we
assume that a database administrator on
behalf of each owner or operator will
spend 8 hours each year implementing
and managing account security. Using
the loaded hourly wage for a database
administrator of $71.96, we estimate
annual costs of approximately $576
($71.96 database administrator wage × 8
hours = $576), as seen in table 55.
For multifactor authentication, we
assume that an owner or operator of a
facility or OCS facility will spend
PO 00000
Frm 00095
Fmt 4701
Sfmt 4702
$9,000 in the initial year on average to
implement a multifactor authentication
system and spend approximately $150
per employee annually for system
maintenance and support. Therefore, we
estimate first year costs of
approximately $20,100 [$9,000
implementation cost + ($150 support
and maintenance costs × 74 average
facility company employees)], and
subsequent year costs of $11,100 ($150
support and maintenance costs × 74
average facility company employees), as
seen in table 55.
For cybersecurity training, we assume
that a CySO at a facility or OCS facility
will take 2 hours each year to develop
and manage cybersecurity training for
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.066
lotter on DSK11XQN23PROD with PROPOSALS2
Annualized
Note: Totals may not sum due to independent rounding.
13498
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
employees, and employees at a facility
or OCS facility will take 1 hour to
complete the training each year. Using
the estimated CySO wage of $84.14 and
the estimated employee wages at a
facility or OCS facility of $60.34, we
estimate annual training costs of
approximately $4,633 [($84.14 × 2
hours) + ($60.34 × 74 facility company
employees × 1 hour)], as seen in table
55.
For penetration testing, we estimate
costs only in the second and seventh
years of analysis since tests are required
to be performed in conjunction with
submitting and renewing the
Cybersecurity Plan. We assume that
owners and operators of facilities or
OCS facilities will spend approximately
$5,000 per penetration test and an
additional $50 per IP address at the
organization to capture network
complexity. We use the total number of
company employees as a proxy for the
number of IP addresses, since the Coast
Guard does not have data on IP
addresses or the network complexity at
a given company. As a result, we
estimate second- and seventh-year costs
of approximately $8,700 [$5,000 testing
cost + ($50 × 74 employees)], as seen in
table 55.
For vulnerability management, we
assume that each facility or OCS facility
will need to secure a vulnerability
scanning program or software. Because
vulnerability scans can occur in the
background, we do not assume an
additional hour burden associated with
implementing or using a vulnerability
scanner each year. Using the annual
subscription cost of an industry leading
vulnerability scanning software, we
estimate annual costs of approximately
$3,390, as seen in table 55.
Finally, for resilience, we assume that
each owner or operator of a facility or
OCS facility will need to make at least
one cybersecurity incident report per
year. While this is incongruent with
historical data that shows the entire
affected population of facilities and OCS
facilities reports only 18 cybersecurity
incidents per year, we are attempting to
capture a complete estimate of what the
costs of this proposed rule could be for
an affected entity. As such, we estimate
that a CySO will need to take 0.15 hours
to report a cybersecurity incident to the
NRC, leading to annual per entity costs
of approximately $13 ($84.14 CySO
wage × 0.15 hours), as seen in table 55.
As demonstrated in table 55, affected
entities are expected to incur the highest
costs in year 2 of this proposed rule.
This analysis estimates the cost of this
proposed rule in year 2 per affected
small entity, using the information
presented in table 55 and adjusting for
the number of facilities and OCS
facilities owned by the entity as
recorded in MISLE. Among all 1,547
presumed small entities (see table 53),
833 owners (54 percent) are associated
with one facility ($37,667 cost in year
2), and the average small entity owns
approximately 2 facilities ($45,609 cost
in year 2). The small entity with the
highest projected cost owns 37 facilities
($340,571 cost in year 2).
Table 57 compares the estimated year
2 costs specific to each entity with the
annual revenues of 416 small entities in
our sample of affected facilities for
which revenue information is provided
in D&B Hoovers.142 As shown,
approximately 55 percent of small
entities may incur costs that meet or
exceed 1 percent of annual revenue in
the second year of the rule [(61 + 168)
÷ 416 = 55 percent]. The small entity
with the highest ratio cost-to-revenue
ratio is projected to incur costs of 158
percent of its reported annual revenue.
Table 57: Revenue Impact of the Proposed Rule on Identified Small Entities
Owning Facilities and OCS Facilities
Greatest Annual Cost (Year 2)
% Revenue Impact
Portion of Small Facilities with
Known Revenue
Small Facility Owners with
Known Revenue
<1%
187
45%
1-3%
61
15%
>3%
168
40%
100%
Total
416
Source: IEc calculations using data from the Coast Guard and D&B Hoovers. See text for details.
Notes:
• The 416 small entities included in this calculation represent the subset of small entities identified in table
52 for which sales data is provided in D&B Hoovers.
• This table includes only small businesses and small not-for-profit organizations because we did not
identify any affected small governments in the matched sample. It is possible that some small
governments are affected if they are included among the entities that did not match with an entity in the
D&B Hoovers database.
• The compliance costs used in this analysis are calculated specific to the number of facilities owned by
each affected small entity. The second year of implementing the provisions in this proposed rule is
projected to have the highest costs and is therefore used in this analysis. See text for details.
• Totals mav not sum due to rounding
142 Sales information is not available for 209 of
the identified small businesses and small not-forprofit organizations with matched profiles in D&B
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
Hoovers (33 percent of the 625 total matched small
businesses and small not-for-profit organizations).
This analysis does not identify small Governments
PO 00000
Frm 00096
Fmt 4701
Sfmt 4725
among the set of owners with matched profiles in
D&B Hoovers.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.067
lotter on DSK11XQN23PROD with PROPOSALS2
I
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
Vessel Owners
The costs to owners and operators of
U.S.-flagged vessels differ from the costs
to owners and operators of facilities and
OCS facilities and are more heavily
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
influenced by the number of vessels
owned. Table 58 presents the estimated
fixed costs per entity regardless of the
number of vessels owned and vessel
type, equivalent to $10,877 per year on
PO 00000
Frm 00097
Fmt 4701
Sfmt 4702
13499
average across the first 10 years of
implementing the provisions in this
proposed rule. The data and
assumptions underlying these estimates
are provided later in this section.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13500
Jkt 262001
Frm 00098
Fmt 4701
Sfmt 4702
22FEP2
number of employees by vessel type as
well as a unique weighted hourly wage
E:\FR\FM\22FEP2.SGM
vessels owned by each entity. These
costs are calibrated to the average
PO 00000
Year
1
2
Drills Account
Cyber
Security Multifactor tybersecurit) !Penetration Vulnerability Incident
Cybersecurit) and
Testin2 Mana2ement 1Renortin2 Total
Plan
00:xercises Measures Authentication Trainin2
$841
$168
$3,366
$576
$9,000
$0
$3,390
$13
$17,354
$3,390
$16,719
$841
$168
$6731
$576
$0
$5 000
$13
3
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
4
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
5
$4.039
$841
$576
$0
$168
$0
$3.390
$13
$9.027
6
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
7
$1,515
$841
$576
$0
$168
$5,000
$3,390
$13
$11,503
8
$4.039
$576
$0
$3.390
$13
$9.027
$4,039
$576
$0
$168
$168
$0
9
$841
$841
$0
$3,390
$13
$9,027
10
$4,039
$841
$576
$0
$168
$0
$3,390
$13
$9,027
Total
Annualized
Note: Totals may not sum due to independent rounding.
$108.765
$10,877
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
17:33 Feb 21, 2024
Several other categories of costs are
dependent on the type and number of
VerDate Sep<11>2014
EP22FE24.068
Table 58: Summary of Fixed Costs of the Proposed Rule per Owner or Operator of U.S.-flagged Vessels (2022 Dollars, 10-year
Undiscounted Costs)
13501
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
based on the personnel employed on the
vessels.143 Table 59 displays the average
number of employees for each vessel
type, including shoreside employees,
and their unique weighted mean hourly
wages. Table 60, which follows,
displays the variable per-vessel costs
associated with each type of vessel. To
calculate the total estimated cost per
entity in the population of U.S.-flagged
vessels, we add the annual estimated
costs per vessel and per vessel type from
table 60 based on the number and types
of vessels owned observed in MISLE to
the fixed costs presented in table 58. For
example, consider an entity that owns
two passenger vessels subject to
subchapter H. The estimated cost to that
entity in year 2 is calculated as follows:
(2 × $20,557) + $16,719 = $57,833.
Table 59: Summary of Employees and Wages by Vessel Type
Vessel Tvoe
Number of Employees per
Vessel Oncludes Shoreside)
Weighted Mean
Hourlv Wae:e
MODU
372
$39.60
Subchaoter I Vessels
82
$46.36
OSVs
Subchaoter H Passene:er Vessels
16
$54.92
85
$41.85
35
$45.52
13
$51.28
40
$55.94
0
$0.00
27
$44.59
Subchaoter K Passene:er Vessels
Subchapter M Towine: Vessels
Subchapter D and Combination
Subchapters O&D Tank Vessels
Subchapter D. O. or I Bare:es
Subchapters K and T International
Passene:er Vessels
Vessel Type
Vessel
Count
Multifactor
Authentication
MODU
1
$55,800
$14,731
$18,600
$89,131
Subchapter I Vessels
1
$12,300
$3,802
$4,100
$20,202
OSVs
Subchapter H Passenger
Vessels
Subchapter K Passenger
Vessels
Subchapter M Towing
Vessels
Subchapter D and
Combination Subchapters
O&D Tank Vessels
Subchapter D, 0, or I
Barges
Subchapters K and T
International Passenger
Vessels
1
$2,400
$879
$800
$4 079
1
$12 750
$3 557
$4 250
$20 557
1
$5,250
$1 593
$1 750
$8 593
1
$1,950
$667
$650
$3 267
1
$6,000
$2 238
$2 000
$10 238
1
$0
$0
$0
$0
1
$4,050
$1204
$1 350
$6 604
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
modifier to account for non-mariner employees.
The calculation of wage rates across vessel types are
described in ‘‘Appendix A: Wages Across Vessel
Types.’’
PO 00000
Frm 00099
Fmt 4701
Sfmt 4725
Total
144 When adding these costs to the fixed costs for
owners and operators, only add the estimated
penetration testing costs in years 2 and 7.
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.070
143 The average per-vessel employee counts were
taken from manning requirements in the certificates
of inspection in MISLE. We averaged the mariner
counts listed for each vessel within a subpopulation
of vessels, then applied a 1.33 shoreside employee
Cybersecurity Penetration Testing
(Years 2 and 7) 144
Trainine:
EP22FE24.069
lotter on DSK11XQN23PROD with PROPOSALS2
Table 60: Summary of Annual Costs of the Proposed Rule per U.S.-flagged
Vessels Based on Type of Vessel (2022 Dollars, Undiscounted Costs)
13502
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
To estimate the cost for an owner or
operator of a U.S.-flagged vessel to
develop, resubmit, conduct annual
maintenance, and audit the
Cybersecurity Plan, we use estimates
provided earlier in the analysis. The
hour-burden estimates are 80 hours for
developing the Cybersecurity Plan
(average hour burden), 8 hours for
conducting annual maintenance of the
Cybersecurity Plan (which would
include amendments), 12 hours to
renew Cybersecurity Plans every 5
years, and 40 hours to conduct annual
audits of Cybersecurity Plans. Based on
estimates from Coast Guard VSP
reviewers at MSC, approximately 10
percent of Plans would need to be
resubmitted in the second year due to
necessary revisions, which is consistent
with the current resubmission rate for
VSPs.
For renewing Cybersecurity Plans
after 5 years (occurring in the seventh
year of the analysis period), Plans
would need to be further revised and
resubmitted in approximately 10
percent of cases as well. However, in
this portion of the analysis, we estimate
costs as though the owner or operator
will need to revise and resubmit their
Plans in all cases resulting in a
conservative (upper-bound) estimate of
per-entity costs. We estimate the time
for revision and resubmission to be
about half the time to develop the Plan
itself, or 40 hours in the second year of
submission, and 6 hours after 5 years (in
the seventh year of the analysis period).
Because we include the annual
Cybersecurity Assessment in the cost to
develop Cybersecurity Plans, and we do
not assume that owners and operators
will wait until the second year of
analysis to begin developing the
Cybersecurity Plan or implementing
related cybersecurity measures, we
divide the estimated 80 hours to
develop plans equally across the first
and second years of analysis. Using the
loaded hourly CySO wage of $84.14, we
estimate the Cybersecurity Plan-related
costs by adding the total number of
hours to develop, resubmit, maintain,
and audit the Plan each year and
multiplying that figure by the CySO
wage. For example, we estimate owners
and operators would incur
approximately $6,731 in costs in year 2
of the analysis period [$84.14 CySO
wage × (40 hours to develop the plan +
40 hours to revise and resubmit the
Plan) = $6,731]. See table 61.
Table 61: Cybersecurity Plan Related Costs per Owner or Operator of a U.S.flagged Vessel (2022 Dollars, 10-year Undiscounted Costs)
Hours to
Hours to
Develop Plan Resubmit Plan
Annual
Maintenance
Hours
Audit Hours
Total
Year
CySOWae:e
1
$84.14
40
0
0
0
$3,366
2
$84.14
40
40
0
0
$6,731
3
$84.14
0
0
8
40
$4,039
4
$84.14
0
0
8
40
$4.039
5
$84.14
0
0
8
40
$4,039
6
$84.14
0
0
8
40
$4,039
7
$84.14
12
6
0
0
$1,515
8
$84.14
0
0
8
40
$4,039
9
$84.14
0
0
8
40
$4,039
10
$84.14
0
0
8
40
$4,039
Total
$39,885
For drills and exercises, we assume
that a CySO on behalf of each owner
and operator of a vessel will develop
cybersecurity components to add to
existing physical security drills and
exercises. This development is expected
to take 0.5 hours for each of the 4
annual drills and 8 hours for an annual
exercise. Using the loaded hourly wage
for a CySO of $84.14, we estimate
annual costs of approximately $841 per
vessel owner or operator [$84.14 CySO
wage × ((0.5 hours × 4 drills) + (8 hours
× 1 exercise)) = $841], as seen in table
58.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
$3,989
For account security measures, we
assume that a database administrator on
behalf of each owner or operator of a
vessel will spend 8 hours each year
implementing and managing account
security. Using the loaded hourly wage
for a database administrator of $71.96,
we estimate annual costs of
approximately $576 ($71.96 database
administrator wage × 8 hours = $576), as
seen in table 58.
For multifactor authentication, we
assume that a vessel owner or operator
will spend $9,000 in the initial year on
average to implement a multifactor
PO 00000
Frm 00100
Fmt 4701
Sfmt 4702
authentication system and spend
approximately $150 per employee
annually for system maintenance and
support. Therefore, we estimate firstyear fixed costs of approximately $9,000
for all owners and operators, with
annual costs in years 2 through 10
dependent on the number of employees
for each type of vessel. For example, we
estimate the first-year costs to an owner
or operator of one OSV to be
approximately $11,400 [$9,000
implementation cost + ($150 support
and maintenance costs × 16 average
employees per OSV)], and subsequent
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.071
lotter on DSK11XQN23PROD with PROPOSALS2
Annualized
Note: Totals may not sum due to independent rounding.
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
year costs of $2,400 ($150 support and
maintenance costs × 16 average
employees per OSV). Fixed per-entity
implementation costs of $9,000 can be
found in table 58 and variable per-vessel
costs can be found in table 60.
For cybersecurity training, we assume
that a CySO for each owner or operator
of a vessel will take 2 hours each year
to develop and manage employee
cybersecurity training, and vessel
employees will take 1 hour to complete
the training each year. The per
employee costs associated with training
vary depending on the types and
number of vessels and would be based
on the average number of employees per
vessel and the associated weighted
hourly wage. For example, using the
estimated CySO wage of $84.14 and the
estimated OSV employee wage of
$54.91, we estimate annual training
costs of approximately $1,047 [($84.14 ×
2 hours) + ($54.91 × 16 average
employees per OSV × 1 hour)]. Fixed
per-entity costs of $168 can be found in
table 58 and variable per-vessel costs
can be found in table 60.
For penetration testing, we estimate
costs only in the second and seventh
years of analysis since tests are required
to be performed in conjunction with
submitting and renewing the
Cybersecurity Plan. We assume that
owners and operators of vessels will
spend approximately $5,000 per
penetration test and an additional $50
per IP address at the organization to
capture network complexity. We use the
average number of employees per vessel
as a proxy for the number of IP
addresses, since the Coast Guard does
not have data on IP addresses or the
network complexity at a given company.
As a result, we estimate second- and
seventh-year costs as follows: [$5,000
testing cost + ($50 × average number of
employees per vessel)]. For example, we
estimate second- and seventh-year cost
of approximately $5,800 for an owner or
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
operator of an OSV [$5,000 testing cost
+ ($50 × 16 average number of
employees per OSV)]. Fixed per-entity
costs of $5,000 can be found in table 58
and variable per-vessel costs can be
found in table 60.
For vulnerability management, we
assume that each owner or operator of
a U.S.-flagged vessel will need to secure
a vulnerability scanning program or
software. Because vulnerability scans
can occur in the background, we do not
assume an additional hour burden
associated with the implementation or
use of a vulnerability scanner each year.
Using the annual subscription cost of an
industry leading vulnerability scanning
software, we estimate annual costs of
approximately $3,390, as seen in table
58.
Finally, for resilience, we assume that
each owner or operator of a U.S.-flagged
vessel will need to make at least one
cybersecurity incident report per year.
While this is incongruent with historical
data that shows the entire affected
population of vessels only reports two
cybersecurity incidents per year on
average, we are attempting to capture a
complete estimate of what the costs of
this proposed rule could be for an
affected entity. As such, we estimate
that a CySO will need to take 0.15 hours
a year to report a cybersecurity incident
to the NRC, leading to annual per-entity
costs of approximately $13 ($84.14
CySO wage × 0.15 hours), as seen in
table 58.
This analysis calculates vessel ownerspecific annual compliance costs based
on the type and number of vessels
associated with each small entity as
identified in MISLE. For the small
entities that own only barges, there are
no variable costs per vessel, and we
assume that they will only incur percompany costs related to the
Cybersecurity Plan and developing
drills and exercises, meaning the
greatest per-owner costs would occur in
PO 00000
Frm 00101
Fmt 4701
Sfmt 4702
13503
year 2. Our analysis identifies 161 small
entities that fall into this category and
presumes this proposed rule will cost
these entities $7,572 each in year 2
($6,731 Cybersecurity Plan-related costs
+ $841 drills and exercises costs). For
all other small entities that own vessels,
the costs include a per-owner
component as well as per-vessel costs
that vary by vessel type, and the highest
total annual costs per owner would also
occur in year 2. Among the 1,472 small
entities in this category, 770 owners (52
percent) are associated with 1 vessel
(with an average cost of $23,271 in year
2). The average small entity owns 5
vessels (with an average cost of $32,850
in year 2), while the small entity with
the highest projected costs owns 359
vessels (with a cost of $148,588 in year
2).145
Table 62 compares the entity-specific
costs in year 2 with the greatest costs
with the annual revenues of 793 small
entities in our sample of affected
facilities for which revenue information
is provided in D&B Hoovers (for small
businesses and small not-for-profit
organizations) or the 2021 State and
Local Government Finance Historical
Datasets and Tables available through
the U.S. Census (for small
Governments).146 As shown, 59 percent
of small entities may incur costs that
meet or exceed 1 percent of annual
revenue in the second year of the rule
[(167 + 298) ÷ 793 = 59 percent]. The
small entity with the highest cost-torevenue ratio is projected to incur costs
of 146 percent of its reported annual
revenue.
145 Values may not directly align with the
incremental cost analysis due to rounding.
146 Sales information is not available for 71 of the
identified small businesses and small not-for-profit
organizations with matched profiles in D&B
Hoovers (8 percent of the 864 total matched small
entities).
E:\FR\FM\22FEP2.SGM
22FEP2
13504
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Table 62: Revenue Impact of the Proposed Rule on Identified Small Entities
Owning Vessels
% Revenue Impact
Greatest Annual Cost (Year 2)
Small Vessel Owners with Known
Revenue
Portion of Small Vessel Owners
with Known Revenue
<1%
328
41%
1-3%
167
21%
>3%
298
38%
Summary
This IRFA characterizes the revenue
impacts on small entities by projecting
costs for each affected owner specific to
the number and type of U.S.-flagged
vessels as well as the number of
facilities or OCS facilities owned
according to data from the Coast Guard.
There are two reasons the estimated
compliance costs, and, therefore, the
impacts on small entities, are likely to
be overestimated. First, the approach we
took to estimate costs assumes that all
owners will incur costs associated with
all provisions required in this proposed
rule. However, it is highly likely that
many affected owners already have
invested in some of the cybersecurity
measures before the publication of this
proposed rule. Data available to the
Coast Guard demonstrate this is the case
for many facility and OCS facility
owners, although whether those facility
owners are small entities is
uncertain.147 Second, some affected
owners are unlikely to have IT or OT
systems to which this proposed rule
will apply. Those owners will incur
only the costs associated with
requesting a waiver or equivalence,
which are likely to be far less than the
costs described in this section.
4. A description of the projected
reporting, recordkeeping, and other
compliance requirements of the
proposed rule, including an estimate of
the classes of small entities which will
be subject to the requirement and the
type of professional skills necessary for
preparation of the report or record.
147 See
footnote 69.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
This proposed rule would call for a
new collection of information under the
Paperwork Reduction Act of 1995, 44
U.S.C. 3501–3520. As defined in 5 CFR
1320.3(c), ‘‘collection of information’’
comprises reporting, recordkeeping,
monitoring, posting, labeling, and other
similar actions. Section VI.D., Collection
of Information, describes the title and
description of the information
collection, a description of those who
must collect the information, and an
estimate of the total annual burden. For
a description of all other compliance
requirements and their associated
estimated costs, please see the
preceding analysis of the per-entity
costs of this proposed rule.
5. An identification, to the extent
practicable, of all relevant Federal rules
which may duplicate, overlap or conflict
with the proposed rule.
The Coast Guard has identified two
primary areas of overlap with this
proposed rule. First, under proposed
§ 101.645, the Coast Guard would
require the CySO to maintain an
effective means of communication to
convey changes in cybersecurity
conditions to the personnel of the U.S.flagged vessel, facility, or OCS facility.
The communication systems and
procedures would need to allow for
effective and continuous
communications between security
personnel at a vessel, facility, or OCS
facility, vessels interfacing with a
facility or an OCS facility, the cognizant
COTP, and national and local
authorities with security
responsibilities. While these
requirements would require the CySO to
PO 00000
Frm 00102
Fmt 4701
Sfmt 4702
maintain means to specifically maintain
communications regarding
cybersecurity conditions, the Coast
Guard believes there may be significant
overlap with communication
requirements for physical security
established in 33 CFR 105.235 for
facilities, 106.240 for OCS facilities, and
104.245 for vessels. Accordingly, we do
not estimate additional costs related to
these communications systems, but we
request public comment on this
assumption and if this new
cybersecurity-specific requirement
would create additional burden.
Second, under proposed § 101.650(i),
the Coast Guard would require affected
owners or operators to limit physical
access to OT and related IT equipment
to only authorized personnel and
confirm that all HMIs and other
hardware are secured, monitored, and
logged for personnel access, with access
granted on a by-exception basis. While
these requirements are specific to the
physical security of IT and OT systems,
there is some overlap with physical
security requirements established in
§§ 104.265 and 104.270 for vessels,
§§ 105.255 and 105.260 for facilities,
and §§ 106.260 and 106.265 for OCS
facilities under which areas containing
IT and OT systems should be designated
restricted areas. Accordingly, we do not
estimate additional costs related to these
requirements but request public
comment on this assumption and if
these new cybersecurity-specific
requirements would create additional
burdens.
6. A description of any significant
alternatives to the proposed rule which
E:\FR\FM\22FEP2.SGM
22FEP2
EP22FE24.072
lotter on DSK11XQN23PROD with PROPOSALS2
100%
Total
793
Source: IEc calculations using data from the Coast Guard, D&B Hoovers, and 2021 State and Local Government
Finance Historical Datasets and Tables available through the U.S. Census. See text for details.
Notes:
• The 793 small entities included in this calculation represent the subset of small entities identified in Table
21 for which sales data is provided in D&B Hoovers or the 2021 State and Local Government Finance
Historical Datasets and Tables.
• The compliance costs used in this analysis are calculated specific to the number and type of vessels owned
by each affected small entity. See text for details.
• Totals mav not sum due to rounding
lotter on DSK11XQN23PROD with PROPOSALS2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
accomplish the stated objectives of
applicable statutes and which minimize
any significant economic impact of the
rule on small entities.
The purpose of this proposed rule is
to safeguard the MTS against current
and emerging threats associated with
cybersecurity by adding minimum
cybersecurity requirements to 33 CFR
part 101. However, rather than making
these requirements prescriptive, the
Coast Guard is choosing to propose
minimum performance-based
cybersecurity requirements for the MTS.
Like the existing requirements in 33
CFR parts 104, 105 and 106, the Coast
Guard would allow owners and
operators the flexibility to determine the
best way to implement and comply with
these new requirements. This means
that, while the Coast Guard may require
the implementation of a multifactor
authentication system, for example, it is
up to the discretion of the impacted
owner or operator to determine what
shape or form that system may take, and
how many resources should be
expended to implement it. As a result,
many of the cost estimates in this RIA
and small entities analysis represent
conservative (upper-bound) estimates as
we attempt to capture costs for a wide
range of affected owners and operators.
Further, the Coast Guard proposes to
make waivers and equivalencies
available to affected owners and
operators who feel they are unable to
meet the requirements of this proposed
rule, offering additional flexibility to
small entities that are not able to meet
the full requirements.
The Coast Guard also considered an
alternative that would make the
penetration testing requirements of this
proposed rule optional for small
entities. Given the nature of penetration
testing, it can often come with a high
cost, particularly for small entities with
limited resources. Leaving the
penetration testing requirements up to
owner discretion could allow small
entities in the affected population to
prioritize different cybersecurity
measures that may make more sense for
their organization. The decision to
undertake penetration testing could be
made as a result of thorough risk
assessments for each organization,
considering its operational
environments, risk profile, and
pertinent threats. Under this alternative,
an owner or operator, or a CySO on their
behalf, could determine when a
penetration test is warranted, if at all.
Because penetration testing would be
optional, this could hypothetically
reduce costs for owners and operators
for penetration testing down to zero,
meaning an estimated cost reduction of
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
$8,700 in the second and seventh years
of analysis for an owner or operator of
facilities and OCS facilities. It would
also lead to estimated cost reductions in
the second and seventh years of $23,600
($5,000 + $18,600) for owners and
operators of MODUs, $9,100 ($5,000 +
$4,100) for owners and operators of
vessels under subchapter I, $5,800
($5,000 + $800) for owners and
operators of OSVs, $9,250 ($5,000 +
$4,250) for owners and operators of
passenger vessels under subchapter H,
$6,750 ($5,000 + $1,750) for owners and
operators of passenger vessels under
subchapter K, $5,650 ($5,000 + $650) for
owners and operators of towing vessels
under subchapter M, $7,000 ($5,000 +
$2,000) for owners and operators of tank
vessels under subchapter D and a
combination of subchapters O&D, and
$6,350 ($5,000 + $1,350) for owners and
operators of international passenger
vessels under subchapters K and T. The
estimated cost reductions could be
higher if ownership of multiple vessels
is considered.
Despite the potential for minimizing
economic impacts, however, the value
of penetration testing for most
organizations, including small entities,
cannot be overstated. When integrated
into a comprehensive cybersecurity
strategy, penetration testing can be very
effective in identifying vulnerabilities.
By fostering a proactive rather than
reactive approach in cybersecurity,
penetration testing enables
organizations to stay ahead of potential
threats and better understand how
malicious actors could exploit
weaknesses in IT and OT systems. This
is particularly crucial given the quickly
evolving landscape of cyber threats. In
addition, because the costs of a potential
cyber incident are so high, the Coast
Guard must prioritize some level of
oversight on provisions that could
lessen the risk of a cyber incident.
Therefore, we rejected this alternative
despite the potential cost reductions.
It should be noted, however, that
according to proposed § 101.665,
owners and operators of facilities, OCS
facilities, and U.S.-flagged vessels can
seek a waiver or an equivalence
determination if they are unable to meet
any proposed requirements, penetration
testing included. The Coast Guard
requests public comment on the
alternative presented here, as well as
any other alternatives or options related
to the proposed provisions that would
alleviate impacts on affected small
entities.
Conclusion
The Coast Guard is interested in the
potential impacts from this proposed
PO 00000
Frm 00103
Fmt 4701
Sfmt 4702
13505
rule on small entities (businesses and
Governments), and we request public
comment on these potential impacts. If
you think that this proposed rule will
have a significant economic impact on
you, your business, or your
organization, please submit a comment
to the docket at the address under
ADDRESSES in this proposed rule. In
your comment, explain why, how, and
to what degree you think this proposed
rule would have an economic impact on
you.
C. Assistance for Small Entities
Under section 213(a) of the Small
Business Regulatory Enforcement
Fairness Act of 1996, Public Law 104–
121, we want to assist small entities in
understanding this proposed rule so that
they can better evaluate its effects on
them and participate in the rulemaking.
If the proposed rule would affect your
small business, organization, or
governmental jurisdiction and you have
questions concerning its provisions or
options for compliance, please call or
email the person in the FOR FURTHER
INFORMATION CONTACT section of this
proposed rule. The Coast Guard will not
retaliate against small entities that
question or complain about this
proposed rule or any policy or action of
the Coast Guard.
Small businesses may send comments
on the actions of Federal employees
who enforce, or otherwise determine
compliance with, Federal regulations to
the Small Business and Agriculture
Regulatory Enforcement Ombudsman
and the Regional Small Business
Regulatory Fairness Boards. The
Ombudsman evaluates these actions
annually and rates each agency’s
responsiveness to small business. If you
wish to comment on actions by
employees of the Coast Guard, call 1–
888–REG–FAIR (1–888–734–3247).
D. Collection of Information
This proposed rule would call for a
new collection of information under the
Paperwork Reduction Act of 1995, 44
U.S.C. 3501–3520. As defined in 5 CFR
1320.3(c), ‘‘collection of information’’
comprises reporting, recordkeeping,
monitoring, posting, labeling, and other
similar actions. The title and
description of the information
collection, a description of those who
must collect the information, and an
estimate of the total annual burden
follow. The estimate covers the time for
reviewing instructions, searching
existing sources of data, gathering, and
maintaining the data needed, and
completing and reviewing the
collection.
Title: Cybersecurity Plans.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
13506
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
OMB Control Number: 1625–new.
Summary of Collection of
Information: This collection of
information would be new. The Coast
Guard would collect information from
the owners and operators of vessels,
facilities, and OCS facilities under 33
CFR part 101, subpart F. The
information collection would be for the
submission of Cybersecurity Plans,
amendments to Cybersecurity Plans,
and cyber incident reports proposed in
33 CFR 101.650.
Need for Information: The Coast
Guard would be creating new
cybersecurity requirements for vessel
and facility owners and operators to
mitigate or prevent a cyber incident
from occurring. The information we
would request from industry would be
from (1) the development of
Cybersecurity Plans, which would
include details on implemented drills
and exercise, training, and various
cybersecurity measures in § 101.650 that
might safeguard critical IT and OT
systems from cyber incidents; (2)
amendments to Cybersecurity Plans;
and (3) reporting cyber incidents to the
NRC.
Proposed Use of Information: The
Coast Guard would use this information
to determine if vessel and facility
owners and operators have
cybersecurity measures in place and to
ensure that owners and operators are
conducting periodic reviews of plans
and testing their IT and OT systems for
adequacy. Additionally, the Coast Guard
would ensure vessel and facility owners
and operators are reporting cyber
incidents to the Coast Guard.
Description of the Respondents: The
respondents are owners and operators of
U.S.-flagged vessels, U.S. facilities, and
OCS facilities.
Number of Respondents: The number
of respondents would be about 1,775
U.S.-flagged vessel owners and
operators and about 1,708 facility and
OCS facility owners and operators. We
assume that a CySO would be
responsible for the reporting and
recordkeeping requirements of the
proposed rule on behalf of each owner
and operator.
Frequency of Response: The number
of responses to this proposed rule
would vary annually.
Burden of Response: The burden of
response would vary for each regulatory
requirement.
Estimate of Total Annual Burden: The
estimate of annual burden varies based
on the year of analysis. For the initial
year of analysis, the hour burden for
Cybersecurity Plan activities and cyber
incident reporting would be about
241,553 hours across the affected
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
population. This is derived from the
development of 3,411 facility and OCS
facility Cybersecurity Plans for 50 hours
each, 1,775 vessel Cybersecurity Plans
for 40 hours each, and 20 cyber
incidents being reported for 0.15 hours
each [(3,411 × 50) + (1,775 × 40) + (20
× 0.15)].
For the second year of analysis, the
hour burden for Cybersecurity Plan
activities and cyber incident reporting
would be about 265,723 hours across
the affected population. The second
year of analysis represents the highest
estimated hour burden for all years of
analysis. This is derived from the
development of 3,411 facility and OCS
facility Cybersecurity Plans for 50 hours
each, 341 facility and OCS facility
Cybersecurity Plans being revised and
resubmitted for an additional 50 hours,
1,775 vessel Cybersecurity Plans for 40
hours each, 178 vessel Cybersecurity
Plans being revised and resubmitted for
an additional 40 hours, and 20 cyber
incidents being reported for 0.15 hours
each [(3,411 × 50) + (341 × 50) + (1,775
× 40) + (178 × 40) + (20 × 0.15)].
For the third through the sixth years
of analysis, and the eighth through the
tenth years of analysis, when
Cybersecurity Plans are being
maintained and amendments are being
developed, the hour burden for
Cybersecurity Plan activities and cyber
incident reporting would be about
48,313 hours across the affected
population. This is derived from the
maintenance and amendment of 3,411
facility and OCS facility Cybersecurity
Plans for 10 hours each, the
maintenance and amendment of 1,775
vessel Cybersecurity Plans for 8 hours
each, and 20 cyber incidents being
reported for 0.15 hours each [(3,411 ×
10) + (1,775 × 8) + (20 × 0.15)].
For the seventh year of analysis, when
Cybersecurity Plans are renewed, the
hour burden for Cybersecurity Plan
activities and cyber incident reporting
would be about 76,094 hours across the
affected population. This is derived
from the renewal of 3,411 facility and
OCS facility Cybersecurity Plans for 15
hours each, 341 facility and OCS facility
Cybersecurity Plans being revised and
resubmitted for an additional 7.5 hours,
1,775 vessel Cybersecurity Plans being
renewed for 12 hours each, 178 vessel
Cybersecurity Plans being revised and
resubmitted for an additional 6 hours,
and 20 cyber incidents being reported
for 0.15 hours each [(3,411 × 15) + (341
× 7.5) + (1,775 × 12) + (178 × 6) + (20
× 0.15)].
This leads to an annualized hour
burden total of 92,156 hours over the
10-year period of analysis.
PO 00000
Frm 00104
Fmt 4701
Sfmt 4702
As required by 44 U.S.C. 3507(d), we
will submit a copy of this proposed rule
to OMB for its review of the collection
of information.
We ask for public comment on the
proposed collection of information to
help us determine, among other
things—
• How useful the information is;
• Whether the information can help
us perform our functions better;
• How we can improve the quality,
usefulness, and clarity of the
information;
• Whether the information is readily
available elsewhere;
• How accurate our estimate is of the
burden of collection;
• How valid our methods are for
determining the burden of collection;
and
• How we can minimize the burden
of collection.
If you submit comments on the
collection of information, submit them
to both the OMB and to the docket
indicated under ADDRESSES.
You need not respond to a collection
of information unless it displays a
currently valid control number from
OMB. Before the Coast Guard could
enforce the collection of information
requirements in this proposed rule,
OMB would need to approve the Coast
Guard’s request to collect this
information.
E. Federalism
A rule has implications for federalism
under Executive Order 13132
(Federalism) if it has a substantial direct
effect on States, on the relationship
between the National Government and
the States, or on the distribution of
power and responsibilities among the
various levels of Government. We have
analyzed this proposed rule under
Executive Order 13132 and have
determined that it is consistent with the
fundamental federalism principles and
preemption requirements described in
Executive Order 13132. Our analysis
follows.
It is well settled that States may not
regulate in categories reserved for
regulation by the Coast Guard and that
all categories covered in 46 U.S.C. 3306,
3703, 7101, and 8101 (design,
construction, alteration, repair,
maintenance, operation, equipping,
personnel qualification, and manning of
vessels), as well as the reporting of
casualties and any other category in
which Congress intended the Coast
Guard to be the sole source of a vessel’s
obligations, are within the field
foreclosed from regulation by the States.
See United States v. Locke, 529 U.S. 89
(2000). This proposed rule would
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
expand maritime security requirements
under MTSA to expressly address
current and emerging cybersecurity
risks and safeguard the MTS. In
enacting MTSA, Congress articulated a
need to address port security threats
around the United States while
preserving the free flow of interstate and
foreign commerce. MTSA’s mandatory,
comprehensive maritime security
regime, founded on this stated interest
of facilitating interstate and
international maritime commerce,
indicates that States and local
governments are generally foreclosed
from regulating in this field. Particularly
with respect to vessels subject to this
new subpart F, the Coast Guard’s above
noted comprehensive law and
regulations would preclude State and
local laws. OCS facilities, which do not
generally fall under any State or local
jurisdiction, are principally subject to
federal law and regulation.
Notwithstanding MTSA’s general
preemptive effect, States and local
governments have traditionally shared
certain regulatory jurisdiction with the
Federal Government over waterfront
facilities. Accordingly, current MTSA
regulations make clear that the maritime
facility security requirements of 33 CFR
part 105 only preempt State or local
regulation when the two conflict.148
Similarly, the cybersecurity
requirements of this proposed rule as
they apply to a facility under 33 CFR
part 105 would only have preemptive
effect over a State or local law or
regulation insofar as the two actually
conflict (meaning compliance with both
requirements is impossible or the State
or local requirement frustrates an
overriding Federal need for uniformity).
In the unlikely event that state or local
government would claim jurisdiction
over an OCS facility, the aforenoted
conflict preemption principles would
apply.
In light of the foregoing analysis, this
proposed rule is consistent with the
fundamental federalism principles and
preemption requirements described in
Executive Order 13132.
While it is well settled that States may
not regulate in categories in which
Congress intended the Coast Guard to be
the sole source of a vessel’s obligations,
the Coast Guard recognizes the key role
that State and local governments may
have in making regulatory
determinations. Additionally, for rules
with federalism implications and
preemptive effect, Executive Order
13132 specifically directs agencies to
consult with State and local
governments during the rulemaking
148 33
CFR 101.112(b).
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
process. If you believe this proposed
rule would have implications for
federalism under Executive Order
13132, please call or email the person
listed in the FOR FURTHER INFORMATION
CONTACT section of this preamble.
F. Unfunded Mandates
The Unfunded Mandates Reform Act
of 1995, 2 U.S.C. 1531–1538, requires
Federal agencies to assess the effects of
their discretionary regulatory actions.
The Act addresses actions that may
result in the expenditure by a State,
local, or tribal government, in the
aggregate, or by the private sector of
$100 million (adjusted for inflation) or
more in any one year.
Upon adjusting for inflation, this
proposed action would need to result in
the expenditure of $177 million or more
in any one year, in 2022 dollars. To
obtain this inflated value, we use the
2022 and 1995 annual gross domestic
product implicit price deflator values of
127.224 and 71.823, respectively. We
divide these values to obtain a factor of
approximately 1.77, rounded (127.224 ÷
71.823 = 1.77).149 Multiplying this
factor by the expenditure amount
identified in the Unfunded Mandates
Reform Act of 1995 gives us our
expenditure amount adjusted for
inflation (1.77 × 100,000,000 =
177,000,000). Because this proposed
rule would result in the expenditure by
the private sector of approximately
$91,170,100 in undiscounted 2022
dollars in the most cost-heavy year, this
proposed action would not require an
assessment.
Although this proposed rule would
not result in such an expenditure, we do
discuss the potential effects of this
proposed rule elsewhere in this
preamble. Additionally, many of the
provisions proposed in this NPRM are
intentionally designed to take owner or
operator discretion into account, which
could help reduce anticipated
expenditures. While this proposed rule
may require action related to a security
measure (implementing multifactor
authentication, for example), the
method or policy used to achieve
compliance with the provision is at the
discretion of the impacted owner or
operator. This NPRM also includes the
149 We use the implicit price deflator for gross
domestic product values from the Bureau of
Economic Analysis National Income and Product
Accounts interactive data tables. See https://
apps.bea.gov/iTable/?reqid=19&step=3&
isuri=1&1921=survey&1903=11#eyJhc
HBpZCI6MTksInN0ZXBzIjpbMSwyLDMsM10s
ImRhdGEiOltbIk5JUEFfVGFibGVfTGlzdCIsIjEz
Il0sWyJDYXRlZ29yaWVzIiwiU3VydmV5Il0sWyJG
aXJzdF9ZZWFyIiwiMTk5NSJdLFsiTGFzdF9ZZW
FyIiwiMjAyMyJdLFsiU2NhbGUiLCIwIl0sWyJ
TZXJpZXMiLCJBIl1dfQ==, accessed July 13, 2023.
PO 00000
Frm 00105
Fmt 4701
Sfmt 4702
13507
option for waivers and equivalents, in
§ 101.665, for any affected party unable
to meet the requirements of this
proposed rule. These intentional
flexibilities can help reduce expected
costs for those in the affected
population and allow for more tailored
cybersecurity solutions.
G. Taking of Private Property
This proposed rule would not cause a
taking of private property or otherwise
have taking implications under
Executive Order 12630 (Governmental
Actions and Interference with
Constitutionally Protected Property
Rights).
H. Civil Justice Reform
This proposed rule meets applicable
standards in sections 3(a) and 3(b)(2) of
Executive Order 12988, (Civil Justice
Reform), to minimize litigation,
eliminate ambiguity, and reduce
burden.
I. Protection of Children
We have analyzed this proposed rule
under Executive Order 13045
(Protection of Children from
Environmental Health Risks and Safety
Risks). This proposed rule is not an
economically significant rule and would
not create an environmental risk to
health or risk to safety that might
disproportionately affect children.
J. Indian Tribal Governments
This proposed rule does not have
tribal implications under Executive
Order 13175 (Consultation and
Coordination with Indian Tribal
Governments), because it would not
have a substantial direct effect on one or
more Indian tribes, on the relationship
between the Federal Government and
Indian tribes, or on the distribution of
power and responsibilities between the
Federal Government and Indian tribes.
K. Energy Effects
We have analyzed this proposed rule
under Executive Order 13211 (Actions
Concerning Regulations That
Significantly Affect Energy Supply,
Distribution, or Use). We have
determined that it is not a ‘‘significant
energy action’’ under that order because
although it is a ‘‘significant regulatory
action’’ under Executive Order 12866, it
is not likely to have a significant
adverse effect on the supply,
distribution, or use of energy.
L. Technical Standards
The National Technology Transfer
and Advancement Act, codified as a
note to 15 U.S.C. 272, directs agencies
to use voluntary consensus standards in
E:\FR\FM\22FEP2.SGM
22FEP2
13508
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS2
their regulatory activities unless the
agency provides Congress, through
OMB, with an explanation of why using
these standards would be inconsistent
with applicable law or otherwise
impractical. Voluntary consensus
standards are technical standards (for
example, specifications of materials,
performance, design, or operation; test
methods; sampling procedures; and
related management systems practices)
that are developed or adopted by
voluntary consensus standards bodies.
This proposed rule does not use
technical standards. Therefore, we did
not consider the use of voluntary
consensus standards.
M. Environment
We have analyzed this proposed rule
under Department of Homeland
Security Management Directive 023–01,
Rev. 1, associated implementing
instructions, and Environmental
Planning COMDTINST 5090.1 (series),
which guide the Coast Guard in
complying with the National
Environmental Policy Act of 1969 (42
U.S.C. 4321–4370f), and have made a
preliminary determination that this
action is one of a category of actions that
do not individually or cumulatively
have a significant effect on the human
environment. A preliminary Record of
Environmental Consideration
supporting this determination is
available in the docket. For instructions
on locating the docket, see the
ADDRESSES section of this preamble.
This proposed rule would be
categorically excluded under paragraphs
A3 and L54 of Appendix A, Table 1 of
DHS Instruction Manual 023–01–001–
01, Rev. 1. Paragraph A3 pertains to
promulgation of rules, issuance of
rulings or interpretations, and the
development and publication of
policies, orders, directives, notices,
procedures, manuals, advisory circulars,
and other guidance documents, notably
those of a strictly administrative or
procedural nature; and those that
interpret or amend an existing
regulation without changing its
environmental effect. Paragraph L54
pertains to regulations that are editorial
or procedural. This proposed rule
involves establishing minimum
cybersecurity requirements in Coast
Guard regulations such as account
security measures, device security
measures, governance and training, risk
management, supply chain
management, resilience, network
segmentation, reporting, and physical
security. This proposed rule would
promote the Coast Guard’s maritime
security mission by establishing
measures to safeguard the MTS against
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
emerging threats associated with
cybersecurity. This proposed rule also
would promote the Coast Guard’s
marine environmental protection
mission by preventing or mitigating
marine environmental damage that
could ensue due to a cybersecurity
incident. We seek any comments or
information that may lead to the
discovery of a significant environmental
impact from this proposed rule.
List of Subjects in 33 CFR Part 101
Harbors, Maritime security, Reporting
and recordkeeping requirements,
Security measures, Vessels, Waterways.
For the reasons discussed in the
preamble, the Coast Guard is proposing
to amend 33 CFR part 101 as follows:
PART 101—MARITIME SECURITY:
GENERAL
1. The authority citation for part 101
is revised to read as follows:
■
Authority: 46 U.S.C. 70101–70104 and
70124; 43 U.S.C. 1333(d); Executive Order
12656, 3 CFR 1988 Comp., p. 585; 33 CFR
1.05–1, 6.04–11, 6.14, 6.16, and 6.19; DHS
Delegation No. 00170.1, Revision No. 01.3.
2. Amend part 101 by adding subpart
F, consisting of §§ 101.600 through
101.670, to read as follows:
■
Subpart F—Cybersecurity
Sec.
101.600 Purpose.
101.605 Applicability.
101.610 Federalism.
101.615 Definitions.
101.620 Owner or Operator.
101.625 Cybersecurity Officer.
101.630 Cybersecurity Plan.
101.635 Drills and Exercises.
101.640 Records and Documentation.
101.645 Communications.
101.650 Cybersecurity Measures.
101.655 Cybersecurity Compliance Dates.
101.660 Cybersecurity Compliance
Documentation.
101.665 Noncompliance, Waivers, and
Equivalents.
101.670 Severability.
§ 101.600
Purpose.
The purpose of this subpart is to set
minimum cybersecurity requirements
for vessels and facilities to safeguard
and ensure the security and resilience of
the Marine Transportation System
(MTS).
§ 101.605
Applicability.
(a) This subpart applies to the owners
and operators of U.S.-flagged vessels
subject to 33 CFR part 104, U.S.
facilities subject to 33 CFR part 105, and
Outer Continental Shelf (OCS) facilities
subject to 33 CFR part 106.
PO 00000
Frm 00106
Fmt 4701
Sfmt 4702
(b) This subpart does not apply to any
foreign-flagged vessels subject to 33 CFR
part 104.
§ 101.610
Federalism.
Consistent with § 101.112(b), with
respect to a facility regulated under 33
CFR part 105 to which this subpart
applies, the regulations in this subpart
have preemptive effect over a State or
local law or regulation insofar as the
State or local law or regulation
applicable to the facility conflicts with
these regulations, either by actually
conflicting or by frustrating an
overriding Federal need for uniformity.
§ 101.615
Definitions.
Unless otherwise specified, as used in
this subpart:
Approved list means an owner or
operator’s authoritative catalog for
products that meet cybersecurity
requirements.
Backup means a copy of physical or
virtual files or databases in a secondary
location for preservation. It may also
refer to the process of creating a copy.
Credentials means a set of data
attributes that uniquely identifies a
system entity such as a person, an
organization, a service, or a device, and
attests to one’s right to access to a
particular system.
Critical Information Technology (IT)
or Operational Technology (OT) systems
means any Information Technology or
Operational Technology system used by
the vessel, facility, or OCS facility that,
if compromised or exploited, could
result in a transportation security
incident, as determined by the
Cybersecurity Officer (CySO) in the
Cybersecurity Plan. Critical IT or OT
systems include those business support
services that, if compromised or
exploited, could result in a
transportation security incident. This
term includes systems whose
ownership, operation, maintenance, or
control is delegated wholly or in part to
any other party.
Cyber incident means an occurrence
that actually jeopardizes, without lawful
authority, the integrity, confidentiality,
or availability of information or an
Information System, or actually
jeopardizes, without lawful authority,
an Information System.
Cyber Incident Response Plan means
a set of predetermined and documented
procedures to respond to a cyber
incident. It is a document that gives the
owner or operator or a designated
Cybersecurity Officer (CySO)
instructions on how to respond to a
cyber incident and pre-identifies key
roles, responsibilities, and decisionmakers. Cyber threat means an action,
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
not protected by the First Amendment
to the Constitution of the United States,
on or through an information system
that may result in an unauthorized effort
to adversely impact the security,
availability, confidentiality, or integrity
of an information system or information
that is stored on, processed by, or
transiting an information system. The
term ‘‘cyber threat’’ does not include
any action that solely involves a
violation of a consumer term of service
or a consumer licensing agreement.
Cybersecurity Assessment means the
appraisal of the risks facing an entity,
asset, system, or network, organizational
operations, individuals, geographic area,
other organizations, or society, and
includes identification of relevant
vulnerabilities and threats and
determining the extent to which adverse
circumstances or events could result in
operational disruption and other
harmful consequences.
Cybersecurity Officer, or CySO, means
the person(s) designated as responsible
for the development, implementation,
and maintenance of the cybersecurity
portions of the Vessel Security Plan
(VSP), Facility Security Plan (FSP), or
Outer Continental Shelf (OCS) FSP, and
for liaison with the Captain of the Port
(COTP) and Company, Vessel, and
Facility Security Officers.
Cybersecurity Plan means a plan
developed to ensure application and
implementation of cybersecurity
measures designed to protect the
owners’ or operators’ systems and
equipment, as required by this part. A
Cybersecurity Plan is either included in
a VSP, FSP, or OCS FSP, or is an annex
to a VSP, FSP, or OCS FSP.
Cybersecurity risk means threats to
and vulnerabilities of information or
information systems and any related
consequences caused by or resulting
from unauthorized access, use,
disclosure, degradation, disruption,
modification, or destruction of such
information or information systems,
including such related consequences
caused by an act of terrorism. It does not
include any action that solely involves
a violation of a consumer term of service
or a consumer licensing agreement.
Cybersecurity vulnerability means any
attribute of hardware, software, process,
or procedure that could enable or
facilitate the defeat of a security control.
Encryption means any procedure used
in cryptography to convert plain text
into cipher text to prevent anyone but
the intended recipient from reading that
data.
Executable code means any object
code, machine code, or other code
readable by a computer when loaded
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
into its memory and used directly by
such computer to execute instructions.
Exploitable channel means any
information channel (such as a portable
media device and other hardware) that
allows for the violation of the security
policy governing the information system
and is usable or detectable by subjects
external to the trusted user.
Firmware means computer programs
(which are stored in and executed by
computer hardware) and associated data
(which is also stored in the hardware)
that may be dynamically written or
modified during execution.
Hardware means, collectively, the
equipment that makes up physical parts
of a computer, including its electronic
circuitry, together with keyboards,
readers, scanners, and printers.
Human-Machine Interface, or HMI,
means the hardware or software through
which an operator interacts with a
controller for industrial systems. An
HMI can range from a physical control
panel with buttons and indicator lights
to an industrial personal computer with
a color graphics display running
dedicated HMI software.
Information System means an
interconnected set of information
resources under the same direct
management control that shares
common functionality. A system
normally includes hardware, software
data, applications, communications, and
people. It includes the application of
Information Technology, Operational
Technology, or a combination of both.
Information Technology, or IT, means
any equipment or interconnected
system or subsystem of equipment, used
in the acquisition, storage, analysis,
evaluation, manipulation, management,
movement, control, display, switching,
interchange, transmission, or reception
of data or information.
Known Exploited Vulnerability, or
KEV, means a computer vulnerability
that has been exploited in the past.
Multifactor Authentication means a
layered approach to securing data and
applications where a system requires
users to present a combination of two or
more credentials to verify their identity
for login.
Network means information system(s)
implemented with a collection of
interconnected components. A network
is a collection of computers, servers,
mainframes, network devices,
peripherals, or other devices connected
to allow data sharing. A network
consists of two or more computers that
are linked in order to share resources,
exchange files, or allow electronic
communications.
PO 00000
Frm 00107
Fmt 4701
Sfmt 4702
13509
Network map means a visual
representation of internal network
topologies and components.
Network segmentation means a
physical or virtual architectural
approach that divides a network into
multiple segments, each acting as its
own subnetwork, to provide additional
security and control that can help
prevent or minimize the impact of a
cyber incident.
Operational Technology, or OT,
means programmable systems or devices
that interact with the physical
environment (or manage devices that
interact with the physical environment).
These systems or devices detect or cause
a change through the monitoring or
control of devices, processes, and
events.
Patching means updating software
and operating systems to address
cybersecurity vulnerabilities within a
program or product.
Penetration test means a test of the
security of a computer system or
software application by attempting to
compromise its security and the security
of an underlying operating system and
network component configurations.
Principle of least privilege means that
an individual should be given only
those privileges that are needed to
complete a task. Further, the
individual’s function, not identity,
should control the assignment of
privileges.
Privileged user means a user who is
authorized (and, therefore, trusted) to
perform security functions that ordinary
users are not authorized to perform.
Risk means a measure of the extent to
which an entity is threatened by a
potential circumstance or event, and
typically is a function of: (1) the adverse
impact, or magnitude of harm, that
would arise if the circumstance or event
occurs; and (2) the likelihood of
occurrence.
Software means a set of instructions,
data, or programs used to operate a
computer and execute specific tasks.
Supply chain means a system of
organizations, people, activities,
information, and resources for creating
computer products and offering IT
services to their customers.
Threat means any circumstance or
event with the potential to adversely
impact organizational operations
(including mission, functions, image, or
reputation), organizational assets,
individuals, other organizations, or the
Nation through an information system
through unauthorized access,
destruction, disclosure, modification of
information, or denial of service.
Vulnerability means a characteristic
or specific weakness that renders an
E:\FR\FM\22FEP2.SGM
22FEP2
13510
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
organization or asset (such as
information or an information system)
open to exploitation by a given threat or
susceptible to a given hazard.
Vulnerability scan means a technique
used to identify hosts or host attributes
and associated vulnerabilities.
§ 101.620
Owner or Operator.
(a) Each owner or operator of a vessel,
facility, or OCS facility is responsible
for compliance with the requirements of
this subpart.
(b) For each vessel, facility, or OCS
facility, the owner or operator must—
(1) Ensure a Cybersecurity Plan is
developed, approved, and maintained;
(2) Define in Section 1 of the
Cybersecurity Plan the cybersecurity
organizational structure and identify
each person exercising cybersecurity
duties and responsibilities within that
structure, with the support needed to
fulfill those obligations;
(3) Designate, in writing, by name and
by title, a CySO who is accessible to the
Coast Guard 24 hours a day, 7 days a
week, and identify how the CySO can be
contacted at any time;
(4) Ensure that cybersecurity
exercises, audits, and inspections, as
well as the Cybersecurity Assessment,
are conducted as required by this part
and in accordance with the
Cybersecurity Plan (see § 101.625(d)(1),
(3), (6) and (7));
(5) Ensure that the vessel, facility, or
OCS facility operates in compliance
with the approved Cybersecurity Plan;
(6) Ensure the development, approval,
and execution of the Cyber Incident
Response Plan; and
(7) Ensure all cyber incidents are
reported to the National Response
Center (NRC) at the telephone number
listed in § 101.305 of this part.
lotter on DSK11XQN23PROD with PROPOSALS2
§ 101.625
Cybersecurity Officer.
(a) Other duties. The Cybersecurity
Officer (CySO) may perform other duties
within the owner’s or operator’s
organization (vessel or facility),
provided the person is able to perform
the duties and responsibilities required
of the CySO by this part.
(b) Serving as CySO for Multiple
Vessels, Facilities or OCS Facilities. The
same person may serve as the CySO for
more than one vessel, facility, or OCS
facility. If a person serves as the CySO
for more than one vessel, facility, or
OCS facility, the name of each location
for which that person is the CySO must
be listed in the Cybersecurity Plan of
each vessel, facility, or OCS facility for
which that person is the CySO.
(c) Assigning Duties Permitted. The
CySO may assign security duties to
other vessel, facility, or OCS facility
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
personnel; however, the CySO retains
ultimate responsibility for these duties.
(d) Responsibilities. For each vessel,
facility, or OCS facility for which they
are designated, the CySO must—
(1) Ensure that the Cybersecurity
Assessment is conducted as required by
this part;
(2) Ensure the cybersecurity measures
in the Cybersecurity Plan are developed,
implemented, and operating as
intended;
(3) Ensure that an annual audit of the
Cybersecurity Plan and its
implementation is conducted and, if
necessary, ensure that the Cybersecurity
Plan is updated;
(4) Ensure the Cyber Incident
Response Plan is executed and
exercised;
(5) Ensure the Cybersecurity Plan is
exercised in accordance with
§ 101.635(c) of this part;
(6) Arrange for cybersecurity
inspections in conjunction with vessel,
facility and OCS facility inspections;
(7) Ensure the prompt correction of
problems identified by exercises, audits,
or inspections;
(8) Ensure the cybersecurity
awareness and vigilance of personnel
through briefings, drills, exercises, and
training;
(9) Ensure adequate cybersecurity
training of personnel;
(10) Ensure all breaches of security,
suspicious activity that may result in
TSIs, TSIs, and cyber incidents are
recorded and reported to the owner or
operator;
(11) Ensure that records required by
this part are maintained in accordance
with § 101.640 of this part;
(12) Ensure any reports as required by
this part have been prepared and
submitted;
(13) Ensure that the Cybersecurity
Plan, as well as proposed substantive
changes (or major amendments) to
cybersecurity measures included
therein, are submitted for approval to
the cognizant COTP or the Officer in
Charge, Marine Inspections (OCMI) for
facilities or OCS facilities, or to the
Marine Safety Center (MSC) for vessels,
prior to amending the Cybersecurity
Plan, in accordance with § 101.630 of
this part;
(14) Ensure relevant security and
management personnel are briefed
regarding changes in cybersecurity
conditions on board the vessel, facility,
or OCS facility; and
(15) Ensure identification and
mitigation of all KEVs in critical IT or
OT systems, without delay.
(e) Qualifications. The CySO must
have general knowledge, through
training or equivalent job experience, in
the following:
PO 00000
Frm 00108
Fmt 4701
Sfmt 4702
(1) General vessel, facility, or OCS
facility operations and conditions;
(2) General cybersecurity guidance
and best practices;
(3) The vessel, facility, or OCS
facility’s Cyber Incident Response Plan;
(4) The vessel, facility, or OCS
facility’s Cybersecurity Plan;
(5) Cybersecurity equipment and
systems;
(6) Methods of conducting
cybersecurity audits, inspections,
control, and monitoring techniques;
(7) Relevant laws and regulations
pertaining to cybersecurity;
(8) Instruction techniques for
cybersecurity training and education;
(9) Handling of Sensitive Security
Information and security related
communications;
(10) Current cybersecurity threat
patterns and KEVs;
(11) Recognizing characteristics and
behavioral patterns of persons who are
likely to threaten security; and
(12) Conducting and assessing
cybersecurity drills and exercises.
§ 101.630
Cybersecurity Plan.
(a) General. The CySO must develop,
implement, and verify a Cybersecurity
Plan for each vessel, facility, or OCS
facility. The Cybersecurity Plan must
reflect all cybersecurity measures
required in this subpart, as appropriate,
to mitigate risks identified during the
Cybersecurity Assessment. The Plan
must describe in detail how the
requirements of subpart F will be met.
The Cybersecurity Plan may be included
in a VSP or an FSP, or as an annex to
the VSP or FSP.
(b) Protecting Sensitive Security
Information. The Cybersecurity Plan is
Sensitive Security Information and must
be protected in accordance with 49 CFR
part 1520.
(c) Format. The owner or operator
must ensure that the Cybersecurity Plan
consists of the individual sections listed
in this paragraph. If the Cybersecurity
Plan does not follow the order as it
appears on the list, the owner or
operator must ensure that the Plan
contains an index identifying the
location of each of the following
sections:
(1) Cybersecurity organization and
identity of the CySO;
(2) Personnel training;
(3) Drills and exercises;
(4) Records and documentation;
(5) Communications;
(6) Cybersecurity systems and
equipment, with associated
maintenance;
(7) Cybersecurity measures for access
control, including the computer, IT, and
OT access areas;
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
(8) Physical security controls for IT
and OT systems;
(9) Cybersecurity measures for
monitoring;
(10) Audits and amendments to the
Cybersecurity Plan;
(11) Reports of all cybersecurity
audits and inspections, to include
documentation of resolution or
mitigation of all identified
vulnerabilities;
(12) Documentation of all identified,
unresolved vulnerabilities, to include
those that are intentionally unresolved
due to owner or operator risk
acceptance;
(13) Cyber incident reporting
procedures in accordance with part 101
of this subchapter; and
(14) Cybersecurity Assessment.
(d) Submission and approval. Each
owner or operator must submit one copy
of their Cybersecurity Plan for review
and approval to the cognizant COTP or
the OCMI for the facility or OCS facility,
or to the MSC for the vessel. A letter
certifying that the Plan meets the
requirements of this subpart must
accompany the submission.
(1) The COTP, OCMI, or MSC will
evaluate each submission for
compliance with this part, and either—
(i) Approve the Cybersecurity Plan
and return a letter to the owner or
operator indicating approval and any
conditional approval;
(ii) Require additional information or
revisions to the Cybersecurity Plan and
return a copy to the owner or operator
with a brief description of the required
revisions or additional information; or
(iii) Disapprove the Cybersecurity
Plan and return a copy, without delay,
to the owner or operator with a brief
statement of the reasons for disapproval.
(iv) If the cognizant COTP, OCMI, or
MSC requires additional time to review
the plan, they have the authority to
return a written acknowledgement to
the owner or operator stating that the
Coast Guard will review the
Cybersecurity Plan submitted for
approval, and that the U.S.-flagged
vessel, facility, or OCS facility may
continue to operate as long as it remains
in compliance with the submitted
Cybersecurity Plan.
(2) Owners or operators submitting
one Cybersecurity Plan to cover two or
more vessels or facilities of similar
operations must ensure the Plan
addresses the specific cybersecurity
risks for each vessel or facility.
(3) A Plan that is approved by the
COTP, OCMI, or MSC is valid for 5
years from the date of its approval.
(e) Amendments to the Cybersecurity
Plan.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
(1) Amendments to a Coast Guardapproved Cybersecurity Plan must be
initiated by either—
(i) The owner or operator or the CySO;
or
(ii) When the COTP, OCMI, or MSC
finds that the Cybersecurity Plan no
longer meets the requirements in this
part, the Plan will be returned to the
owner or operator with a letter
explaining why the Plan no longer
meets the requirements and requires
amendment. The owner or operator will
have at least 60 days to amend the Plan
and cure deficiencies outlined in the
letter. Until the amendments are
approved, the owner or operator must
ensure temporary cybersecurity
measures are implemented to the
satisfaction of the Coast Guard.
(2) Major amendments, as determined
by the owner or operator based on types
of changes to their security measures
and operational risks, to the
Cybersecurity Plan must be proposed to
the Coast Guard prior to
implementation. Proposed amendments
to the Cybersecurity Plan must be sent
to the Coast Guard at least 30 days
before the proposed amendment’s
effective date. The Coast Guard will
approve or disapprove the proposed
amendment in accordance with this
part. An owner or operator must notify
the Coast Guard by the most rapid
means practicable as to the nature of the
amendments, the circumstances that
prompted these amendments, and the
period these amendments are expected
to be in place.
(3) If the owner or operator has
changed, the CySO must amend the
Cybersecurity Plan, without delay, to
include the name and contact
information of the new owner or
operator and submit the affected portion
of the Plan for review and approval in
accordance with this part.
(4) If the CySO has changed, the Coast
Guard must be notified without delay
and the affected portion of the
Cybersecurity Plan must be amended
and submitted to the Coast Guard for
review and approval in accordance with
this part without delay.
(f) Audits. (1) The CySO must ensure
that an audit of the Cybersecurity Plan
and its implementation is performed
annually, beginning no later than 1 year
from the initial date of approval. The
CySO must attach a report to the Plan
certifying that the Plan meets the
applicable requirements of this subpart.
(2) In addition to the annual audit, the
CySO must audit the Cybersecurity Plan
if there is a change in the owner or
operator of the vessel, facility, or OCS
facility, or if there have been
modifications to the cybersecurity
PO 00000
Frm 00109
Fmt 4701
Sfmt 4702
13511
measures, including, but not limited to,
physical access, incident response
procedures, security measures, or
operations.
(3) Auditing the Cybersecurity Plan as
a result of modifications to the vessel,
facility, or OCS facility, or because of
changes to the cybersecurity measures,
may be limited to those sections of the
Plan affected by the modifications.
(4) Personnel conducting internal
audits of the cybersecurity measures
specified in the Plan or evaluating its
implementation must—
(i) Have knowledge of methods of
conducting audits and inspections, as
well as access control and monitoring
techniques;
(ii) Not have regularly assigned
cybersecurity duties for the vessel,
facility, or OCS facility being audited;
and
(iii) Be independent of any
cybersecurity measures being audited.
(5) If the results of an audit require
amending the Cybersecurity Plan, the
CySO must submit, in accordance with
this part, the amendments to the Coast
Guard for review and approval no later
than 30 days after completion of the
audit with a letter certifying that the
amended Plan meets applicable
requirements of subpart F.
§ 101.635
Drills and Exercises.
(a) General. (1) Drills and exercises
must be used to test the proficiency of
the vessel, facility, and OCS facility
personnel in assigned cybersecurity
duties and the effective implementation
of the VSP, FSP, OCS FSP, and
Cybersecurity Plan. The drills and
exercises must enable the CySO to
identify any related cybersecurity
deficiencies that need to be addressed.
(2) The drill or exercise requirements
specified in this section may be satisfied
with the implementation of
cybersecurity measures required by the
VSP, FSP, OCS FSP, and Cybersecurity
Plan as the result of a cyber incident, as
long as the vessel, facility, or OCS
facility achieves and documents
attainment of drill and exercise goals for
the cognizant COTP.
(b) Drills. (1) The CySO must ensure
that at least one cybersecurity drill is
conducted every 3 months.
Cybersecurity drills may be held in
conjunction with other security or nonsecurity drills, where appropriate.
(2) Drills must test individual
elements of the Cybersecurity Plan,
including responses to cybersecurity
threats and incidents. Cybersecurity
drills must take into account the types
of operations of the vessel, facility, or
OCS facility; changes to the vessel,
facility, or OCS facility personnel; the
E:\FR\FM\22FEP2.SGM
22FEP2
13512
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
type of vessel a facility is serving; and
other relevant circumstances.
(3) If a vessel is moored at a facility
on a date a facility has planned to
conduct any drills, the facility cannot
require the vessel or vessel personnel to
be a part of or participate in the
facility’s scheduled drill.
(c) Exercises. (1) Exercises must be
conducted at least once each calendar
year, with no more than 18 months
between exercises.
(2) Exercises may be—
(i) Full-scale or live;
(ii) Tabletop simulation;
(iii) Combined with other appropriate
exercises; or
(iv) A combination of the elements in
paragraphs (c)(2)(i) through (iii) of this
section.
(3) Exercises may be vessel- or
facility-specific, or part of a cooperative
exercise program to exercise applicable
vessel, facility, and OCS facility
Cybersecurity Plans or comprehensive
port exercises.
(4) Each exercise must test
communication and notification
procedures and elements of
coordination, resource availability, and
response.
(5) Exercises are a full test of the
cybersecurity program and must include
the substantial and active participation
of the CySO(s).
(6) If any corrective action identified
during an exercise is needed, it must be
addressed and documented as soon as
possible.
§ 101.640
Records and Documentation.
All records, reports, and other
documents mentioned in this subpart
must be created and maintained in
accordance with 33 CFR 104.235 for
vessels, 105.225 for facilities, and
106.230 for OCS facilities. At a
minimum, the records must be created
for the following activities: training,
drills, exercises, cybersecurity threats,
incidents, and audits of the
Cybersecurity Plan.
lotter on DSK11XQN23PROD with PROPOSALS2
§ 101.645
Communications.
(a) The CySO must have a means to
effectively notify owners or operators
and personnel of a vessel, facility, or
OCS facility of changes in cybersecurity
conditions at the vessel, facility, and
OCS facility.
(b) Communication systems and
procedures must allow effective and
continuous communications between
vessel, facility, and OCS facility security
personnel, vessels interfacing with a
facility or an OCS facility, the cognizant
COTP, and national and local
authorities with security
responsibilities.
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
§ 101.650
Cybersecurity Measures.
(a) Account security measures. Each
owner or operator of a vessel, facility, or
OCS facility must ensure, at a
minimum, the following account
security measures are in place and
documented in Section 7 of the
Cybersecurity Plan:
(1) Automatic account lockout after
repeated failed login attempts must be
enabled on all password-protected IT
and OT systems.
(2) Default passwords must be
changed before using any IT or OT
systems.
(3) A minimum password strength
must be maintained on all IT and OT
systems that are technically capable of
password protection.
(4) Multifactor authentication must be
implemented on password-protected IT
and remotely accessible OT systems.
(5) The principle of least privilege
must be applied to administrator or
otherwise privileged accounts on both
IT and OT systems;
(6) The owner or operator must ensure
that users maintain separate credentials
on critical IT and OT systems; and
(7) The owner or operator must ensure
that user credentials are removed or
revoked when a user leaves the
organization.
(b) Device security measures. Each
owner or operator or designated CySO
of a vessel, facility, or OCS facility must
ensure the following device security
measures are in place and documented
in Section 6 of the Cybersecurity Plan:
(1) Develop and maintain a list of
approved hardware, firmware, and
software that may be installed on IT or
OT systems. Any hardware, firmware,
and software installed on IT and OT
systems must be on the owner- or
operator-approved list.
(2) Ensure applications running
executable code must be disabled by
default on critical IT and OT systems.
Exemptions must be justified and
documented in the Cybersecurity Plan.
(3) Maintain an accurate inventory of
network-connected systems, including
designation of critical IT and OT
systems; and
(4) Develop and maintain accurate
documentation identifying the network
map and OT device configuration
information.
(c) Data security measures. Each
owner or operator or designated CySO
of a vessel, facility, or OCS facility must
ensure the following data security
measures are in place and documented
in Section 4 of the Cybersecurity Plan:
(1) Data logs must be securely
captured, stored, and protected so that
they are accessible only by privileged
users; and
PO 00000
Frm 00110
Fmt 4701
Sfmt 4702
(2) All data, both in transit and at rest,
must be encrypted using a suitably
strong algorithm.
(d) Cybersecurity training for
personnel. The training program to
address requirements under this
paragraph must be documented in
Sections 2 and 4 of the Cybersecurity
Plan.
(1) All personnel with access to the IT
or OT systems, including contractors,
whether part-time, full-time, temporary,
or permanent, must have cybersecurity
training in the following topics:
(i) Relevant provisions of the
Cybersecurity Plan;
(ii) Recognition and detection of
cybersecurity threats and all types of
cyber incidents;
(iii) Techniques used to circumvent
cybersecurity measures;
(iv) Procedures for reporting a cyber
incident to the CySO; and
(v) OT-specific cybersecurity training
for all personnel whose duties include
using OT.
(2) Key personnel with access to the
IT or remotely accessible OT systems,
including contractors, whether parttime, full-time, temporary, or
permanent, must also have
cybersecurity training in the following
additional topics:
(i) Understanding their roles and
responsibilities during a cyber incident
and response procedure; and
(ii) Maintaining current knowledge of
changing cybersecurity threats and
countermeasures.
(3) All personnel must complete the
training specified in paragraphs
(d)(1)(ii) through (v) of this section by
[DATE 180 DAYS AFTER EFFECTIVE
DATE OF THE FINAL RULE], and
annually thereafter. Key personnel must
complete the training specified in
paragraph (d)(2) of this section by
[DATE 180 DAYS AFTER EFFECTIVE
DATE OF THE FINAL RULE], and
annually thereafter, or more frequently
as needed. Training for new personnel
not in place at the time of the effective
date of this rule must be completed
within 5 days of gaining system access,
but no later than within 30 days of
hiring, and annually thereafter. Training
for personnel on new IT or OT systems
not in place at the time of the effective
date of this rule must be completed
within 5 days of system access, and
annually thereafter. All personnel must
complete the training specified in
paragraph (d)(1)(i) within 60 days of
receiving approval of the Cybersecurity
Plan. The training must be documented
and maintained in the owner’s or
operator’s records in accordance with 33
CFR 104.235 for vessels, 105.225 for
facilities, and 106.230 for OCS facilities.
E:\FR\FM\22FEP2.SGM
22FEP2
lotter on DSK11XQN23PROD with PROPOSALS2
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
(e) Risk management. Each owner or
operator or designated CySO of a vessel,
facility, or OCS facility must ensure the
following measures for risk management
are in place and documented in
Sections 11 and 12 of the Cybersecurity
Plan:
(1) Cybersecurity Assessment. Each
owner or operator or designated CySO
of a U.S.-flagged vessel, facility, or OCS
facility must ensure completion of a
Cybersecurity Assessment that
addresses each covered vessel, facility,
and OCS facility. A Cybersecurity
Assessment must be conducted within 1
year from [EFFECTIVE DATE OF FINAL
RULE] and annually thereafter.
However, the Cybersecurity Assessment
must be conducted sooner than
annually if there is a change in
ownership of a U.S.-flagged vessel,
facility, or OCS facility; or if there are
major amendments to the Cybersecurity
Plan. In conducting the Cybersecurity
Assessment, the owner or operator
must—
(i) Analyze all networks to identify
vulnerabilities to IT and OT systems
and the risk posed by each digital asset;
(ii) Validate the Cybersecurity Plan;
(iii) Document recommendations and
resolutions in the Facility Security
Assessment (FSA)/Vessel Security
Assessment (VSA), in accordance with
33 CFR 104.305, 105.305, and 106.305;
(iv) Document and mitigate any
unresolved vulnerabilities; and
(v) Incorporate recommendations and
resolutions from paragraph (e)(1)(iii) of
this section into the Cybersecurity Plan
through an amendment, in accordance
with § 101.630(e) of this part.
(2) Penetration Testing. In
conjunction with FSP, OCS FSP, or VSP
renewal, the owner or operator or
designated CySO must ensure that a
penetration test has been completed.
Following the penetration test, all
identified vulnerabilities must be
included in the FSA or VSA, in
accordance with 33 CFR 104.305,
105.305, and 106.305.
(3) Routine system maintenance. Each
owner or operator or a designated CySO
of a vessel, facility, or OCS facility must
ensure the following measures for
routine system maintenance are in place
and documented in Section 6 of the
Cybersecurity Plan:
(i) Ensure patching or implementation
of documented compensating controls
for all KEVs in critical IT or OT systems,
without delay;
(ii) Maintain a method to receive and
act on publicly submitted
vulnerabilities;
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
(iii) Maintain a method to share threat
and vulnerability information with
external stakeholders;
(iv) Ensure there are no exploitable
channels directly exposed to internetaccessible systems;
(v) Ensure no OT is connected to the
publicly accessible internet unless
explicitly required for operation, and
verify that, for any remotely accessible
OT system, there is a documented
justification; and
(vi) Conduct vulnerability scans as
specified in the Cybersecurity Plan.
(f) Supply chain. Each owner or
operator or designated CySO of a vessel,
facility, or OCS facility must ensure the
following supply-chain measures are in
place and documented in Section 4 of
the Cybersecurity Plan:
(1) Consider cybersecurity capability
as criteria for evaluation to procure IT
and OT systems or services;
(2) Establish a process through which
all IT and OT vendors or service
providers notify the owner or operator
or designated CySO of any cybersecurity
vulnerabilities, incidents, or breaches,
without delay; and
(3) Monitor and document all thirdparty remote connections to detect cyber
incidents.
(g) Resilience. Each owner or operator
or designated CySO of a vessel, facility,
or OCS facility must ensure the
following measures for resilience are in
place and documented in Sections 3 and
9 of the Cybersecurity Plan:
(1) Report any cyber incidents to the
NRC, without delay, to the telephone
number listed in § 101.305 of this part;
(2) In addition to other plans
mentioned in this subpart, develop,
implement, maintain, and exercise the
Cyber Incident Response Plan;
(3) Periodically validate the
effectiveness of the Cybersecurity Plan
through annual tabletop exercises,
annual reviews of incident response
cases, or post-cyber incident review, as
determined by the owner or operator;
and
(4) Perform backup of critical IT and
OT systems, with those backups being
sufficiently protected and tested
frequently.
(h) Network segmentation. Each
owner or operator or designated CySO
of a vessel, facility, or OCS facility must
ensure the following measures for
network segmentation are in place and
documented in Sections 7 and 8 of the
Cybersecurity Plan:
(1) Implement segmentation between
IT and OT networks; and
(2) Verify that all connections
between IT and OT systems are logged
PO 00000
Frm 00111
Fmt 4701
Sfmt 4702
13513
and monitored for suspicious activity,
breaches of security, TSIs, unauthorized
access, and cyber incidents.
(i) Physical security. Each owner or
operator or designated CySO of a vessel,
facility, or OCS facility must ensure the
following measures for physical security
are in place and documented in
Sections 7 and 8 of the Cybersecurity
Plan:
(1) In addition to any other
requirements in this part, limit physical
access to OT and related IT equipment
to only authorized personnel, and
confirm that all HMIs and other
hardware are secured, monitored, and
logged for personnel access; and
(2) Ensure unauthorized media and
hardware are not connected to IT and
OT infrastructure, including blocking,
disabling, or removing unused physical
access ports, and establishing
procedures for granting access on a byexception basis.
§ 101.655
Dates.
Cybersecurity Compliance
All Cybersecurity Plans mentioned in
this subpart must be submitted to the
Coast Guard for review and approval
during the second annual audit
following [EFFECTIVE DATE OF FINAL
RULE], according to 33 CFR 104.415 for
vessels, 33 CFR 105.415 for facilities, or
106.415 for OCS facilities.
§ 101.660 Cybersecurity Compliance
Documentation.
Each owner or operator must ensure
that the cybersecurity portion of their
Plan and penetration test results are
available to the Coast Guard upon
request. The Alternative Security
Program provisions are addressed in 33
CFR 104.140 for vessels, 105.140 for
facilities, and 106.135 for OCS facilities.
§ 101.665 Noncompliance, Waivers, and
Equivalents.
An owner or operator who is unable
to meet the requirements in subpart F
may seek a waiver or an equivalence
determination using the provisions
applicable to a vessel, facility, or OCS
facility as outlined in 33 CFR 104.130,
104.135, 105.130, 105.135, 106.125, or
106.130. If an owner or operator is
temporarily unable to meet the
requirements in this part, they must
notify the cognizant COTP or MSC, and
may request temporary permission to
continue to operate under the
provisions as outlined in 33 CFR
104.125, 105.125, or 106.120.
E:\FR\FM\22FEP2.SGM
22FEP2
13514
§ 101.670
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 / Proposed Rules
Severability.
lotter on DSK11XQN23PROD with PROPOSALS2
Any provision of this subpart held to
be invalid or unenforceable as applied
to any person or circumstance shall be
construed so as to continue to give the
maximum effect to the provision
permitted by law, including as applied
VerDate Sep<11>2014
17:33 Feb 21, 2024
Jkt 262001
to persons not similarly situated or to
dissimilar circumstances, unless such
holding is that the provision of this
subpart is invalid and unenforceable in
all circumstances, in which event the
provision shall be severable from the
PO 00000
Frm 00112
Fmt 4701
Sfmt 9990
remainder of this subpart and shall not
affect the remainder thereof.
Linda Fagan,
Admiral, U.S. Coast Guard, Commandant.
[FR Doc. 2024–03075 Filed 2–21–24; 8:45 am]
BILLING CODE 9110–04–P
E:\FR\FM\22FEP2.SGM
22FEP2
Agencies
[Federal Register Volume 89, Number 36 (Thursday, February 22, 2024)]
[Proposed Rules]
[Pages 13404-13514]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-03075]
[[Page 13403]]
Vol. 89
Thursday,
No. 36
February 22, 2024
Part II
Department of Homeland Security
-----------------------------------------------------------------------
Coast Guard
-----------------------------------------------------------------------
33 CFR Parts 101 and 160
Cybersecurity in the Marine Transportation System; Proposed Rule
Federal Register / Vol. 89, No. 36 / Thursday, February 22, 2024 /
Proposed Rules
[[Page 13404]]
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
Coast Guard
33 CFR Parts 101 and 160
[Docket No. USCG-2022-0802]
RIN 1625-AC77
Cybersecurity in the Marine Transportation System
AGENCY: Coast Guard, Department of Homeland Security (DHS).
ACTION: Notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: The Coast Guard proposes to update its maritime security
regulations by adding regulations specifically focused on establishing
minimum cybersecurity requirements for U.S.-flagged vessels, Outer
Continental Shelf facilities, and U.S. facilities subject to the
Maritime Transportation Security Act of 2002 regulations. This proposed
rule would help to address current and emerging cybersecurity threats
in the marine transportation system. We seek your comments on this
proposed rule and whether we should: use and define the term reportable
cyber incident to limit cyber incidents that trigger reporting
requirements, use alternative methods of reporting such incidents, and
amend the definition of hazardous condition.
DATES: Comments and related material must be received by the Coast
Guard on or before April 22, 2024.
ADDRESSES: You may submit comments identified by docket number USCG-
2022-0802 using the Federal Decision-Making Portal at
www.regulations.gov. See the ``Public Participation and Request for
Comments'' portion of the SUPPLEMENTARY INFORMATION section for further
instructions on submitting comments. You may also find this notice of
proposed rulemaking, with its 100-word-or-less summary, in this same
docket at www.regulations.gov.
Collection of information. Submit comments on the collection of
information discussed in section VI.D of this preamble both to the
Coast Guard's online docket and to the Office of Information and
Regulatory Affairs (OIRA) in the White House Office of Management and
Budget (OMB) using their website, www.reginfo.gov/public/do/PRAMain.
Comments sent to OIRA on the collection of information must reach OIRA
on or before the comment due date listed on their website.
FOR FURTHER INFORMATION CONTACT: For information about this document,
email [email protected] or call: Commander Brandon Link, Office of
Port and Facility Compliance, 202-372-1107, or Commander Frank Strom,
Office of Design and Engineering Standards, 202-372-1375.
SUPPLEMENTARY INFORMATION:
Table of Contents for Preamble
I. Public Participation and Request for Comments
II. Abbreviations
III. Basis and Purpose
A. The Problem We Seek To Address
B. Recent Legislation and Policy
C. Legal Authority To Address This Problem
IV. Background
A. The Current State of Cybersecurity in the MTS
B. Current Cybersecurity Regulations
V. Discussion of Proposed Rule
VI. Regulatory Analyses
A. Regulatory Planning and Review
B. Small Entities
C. Assistance for Small Entities
D. Collection of Information
E. Federalism
F. Unfunded Mandates
G. Taking of Private Property
H. Civil Justice Reform
I. Protection of Children
J. Indian Tribal Governments
K. Energy Effects
L. Technical Standards
M. Environment
I. Public Participation and Request for Comments
The Coast Guard views public participation as essential to
effective rulemaking and will consider all comments and material
received during the comment period. Your comment can help shape the
outcome of this rulemaking. If you submit a comment, please include the
docket number for this rulemaking, indicate the specific section of
this document to which each comment applies, and provide a reason for
each suggestion or recommendation.
Submitting comments. We encourage you to submit comments through
the Federal Decision-Making Portal at www.regulations.gov. To do so, go
to www.regulations.gov, type USCG-2022-0802 in the search box and click
``Search.'' Next, look for this document in the Search Results column,
and click on it. Then click on the Comment option. If you cannot submit
your material by using www.regulations.gov, call or email the persons
in the FOR FURTHER INFORMATION CONTACT section of this proposed rule
for alternate instructions.
Viewing material in docket. To view documents mentioned in this
proposed rule as being available in the docket, find the docket as
described in the previous paragraph, and then select ``Supporting &
Related Material'' in the Document Type column. Public comments will
also be placed in our online docket and can be viewed by following
instructions on the www.regulations.gov Frequently Asked Questions
(FAQ) web page. That FAQ page also explains how to subscribe for email
alerts that will notify you when comments are posted or if a final rule
is published. We review all comments received, but we will only post
comments that address the topic of the proposed rule. We may choose not
to post off-topic, inappropriate, or duplicate comments that we
receive.
Personal information. We accept anonymous comments. Comments we
post to www.regulations.gov will include any personal information you
have provided. For more about privacy and submissions to the docket in
response to this document, see the Department of Homeland Security's
eRulemaking System of Records notice (85 FR 14226, March 11, 2020).
Public meeting. We do not plan to hold a public meeting, but we
will consider doing so if we determine from public comments that a
meeting would be helpful. We would issue a separate Federal Register
notice to announce the date, time, and location of such a meeting.
II. Abbreviations
AMSC Area Maritime Security Committees
BLS Bureau of Labor Statistics
CEA Council of Economic Advisors
CFR Code of Federal Regulations
CGCSO Coast Guard Cyber Strategic Outlook
CG-CVC Coast Guard Office of Commercial Vessel Compliance
CGCYBER U.S. Coast Guard Cyber Command
CG-ENG Coast Guard Office of Design and Engineering Standards
CG-FAC Coast Guard Office of Port and Facility Compliance
CIRCIA Cyber Incident Reporting for Critical Infrastructure Act of
2022
CISA Cybersecurity and Infrastructure Security Agency
COTP Captain of the Port
CPG Cybersecurity Performance Goal
CRM Cyber risk management
CSF Cybersecurity framework
CSRC Computer Secure Resource Center
CySO Cybersecurity officer
DHS Department of Homeland Security
FR Federal Register
FSA Facility security assessment
FSP Facility security plan
HMI Human-machine interface
ICR Information collection request
IEc Industrial Economics, Incorporated
IMO International Maritime Organization
IP internet protocol
IRFA Initial Regulatory Flexibility analysis
ISM International Safety Management
IT Information technology
KEV Known exploited vulnerability
MCAAG Maritime Cybersecurity Assessment and Annex Guide
[[Page 13405]]
MISLE Marine Information for Safety and Law Enforcement
MODU Mobile offshore drilling unit
MSC Marine Safety Center
MSC-FAL International Maritime Organization's Marine Safety
Committee and Facilitation Committee
MTS Marine transportation system
MTSA Maritime Transportation Security Act of 2002
NAICS North American Industry Classification System
NIST National Institute of Standards and Technology
NMSAC National Maritime Security Advisory Committee
NPRM Notice of proposed rulemaking
NRC National Response Center
NVIC Navigation and Vessel Inspection Circular
OCMI Officer in Charge, Marine Inspection
OCS Outer continental shelf
OEWS Occupational Employment and Wage Statistics
OMB Office of Management and Budget
OSV Offshore supply vessel
OT Operational technology
PII Personally identifiable information
QCEW Quarterly Census of Employment and Wages
RIA Regulatory impact analysis
Sec. Section
SBA Small Business Administration
SME Subject matter expert
SMS Safety management system
TSI Transportation security incident
U.S.C. United States Code
VSA Vessel security assessment
VSP Vessel security plan
III. Basis and Purpose
A. The Problem We Seek To Address
The maritime industry is undergoing a significant transformation
that involves increased use of cyber-connected systems. While these
systems improve commercial vessel and port facility operations, they
also bring a new set of challenges affecting design, operations,
safety, security, training, and the workforce.
Every day, malicious actors (including, but not limited to,
individuals, groups, and adversary nations posing a threat) attempt
unauthorized access to control system devices or networks using various
communication channels. An example of a successful attempt occurred in
May 2021, when the Colonial Pipeline Company suffered a cyber-attack
that disrupted the supply of fuel to the east coast of the United
States. These cybersecurity threats require the maritime community to
effectively manage constantly changing risks to create a safer cyber
environment.
The purpose of this notice of proposed rulemaking (NPRM) is to
safeguard the marine transportation system (MTS) against current and
emerging threats associated with cybersecurity by adding minimum
cybersecurity requirements to part 101 of title 33 of the Code of
Federal Regulations (CFR) to help detect, respond to, and recover from
cybersecurity risks that may cause transportation security incidents
(TSIs). This proposed rule would help address current and emerging
cybersecurity threats to maritime security in the MTS.
Cybersecurity risks result from vulnerabilities in the operation of
vital systems, which increase the likelihood of cyber-attacks on
facilities, Outer Continental Shelf (OCS) facilities, and vessels.
Cyber-related risks to the maritime domain are threats to the critical
infrastructure that citizens and companies depend on to fulfill their
daily needs. Additionally, the proposed rule is necessary because it
would create a regulatory environment for cybersecurity in the maritime
domain to assist facilities, OCS facilities, and vessel firms that may
not have taken cybersecurity measures on their own, for various
reasons. In a 2018 report by the Council of Economic Advisors (CEA),
the CEA stated ``[a] firm with weak cybersecurity imposes negative
externalities on its customers, employees, and other firms, tied to it
through partnerships and supply chain relations. In the presence of
externalities, firms would rationally underinvest in cybersecurity
relative to the socially optimal level. Therefore, it often falls to
regulators to devise a series of penalties and incentives to increase
the level of investment to the desired level.'' \1\
---------------------------------------------------------------------------
\1\ Economic Report of the President Together with the Annual
Report of the Council of Economic Advisers (Feb. 2018), https://www.govinfo.gov/content/pkg/ERP-2018/pdf/ERP-2018.pdf (accessed Dec.
15, 2023). Page 323-324.
---------------------------------------------------------------------------
In the report, the CEA also emphasized that ``[c]ontinued
cooperation between the public and private sectors is the key to
effectively managing cybersecurity risks. . . . The government is
likewise important in incentivizing cyber protection--for example, by
disseminating new cybersecurity standards, sharing best practices,
conducting basic research on cybersecurity, protecting critical
infrastructures, preparing future employees for the cybersecurity
workforce, and enforcing the rule of law in cyberspace.'' \2\
---------------------------------------------------------------------------
\2\ Id. at 324-325.
---------------------------------------------------------------------------
Furthermore, the CEA acknowledged that ``[f]irms and private
individuals are often outmatched by sophisticated cyber adversaries.
Even large firms with substantial resources committed to cybersecurity
may be helpless against attacks by sophisticated nation-states.'' \3\
As an example, the CEA stated, ``firms that own critical infrastructure
assets, such as parts of the nation's power grid, may generate
pervasive negative spillover effects for the wider economy.'' \4\
---------------------------------------------------------------------------
\3\ Id. at 326.
\4\ Id. at 326.
---------------------------------------------------------------------------
Lastly, the CEA stated another problem that exists in the
marketplace is, ``firms' reluctance to share information on cyber
threats and exposures'', which ``impairs effective cybersecurity.'' \5\
The CEA further stated that ``firms remain reluctant to increase their
exposure to legal and public affairs risks. The lack of information on
cyberattacks and data breaches suffered by other firms may cause less
sophisticated small firms to conclude that cybersecurity risk is not a
pressing problem. . . . [T]he lack of data may be stymying the ability
of law enforcement and other actors to respond quickly and effectively
and may be slowing the development of the cyber insurance market.'' \6\
---------------------------------------------------------------------------
\5\ Id. at 326.
\6\ Id. at 326.
---------------------------------------------------------------------------
This proposed rule would apply to the owners and operators of U.S.-
flagged vessels subject to 33 CFR part 104 (Maritime Security:
Vessels), facilities subject to 33 CFR part 105 (Maritime Security:
Facilities), and OCS facilities subject to 33 CFR part 106 (Marine
Security: Outer Continental Shelf (OCS) Facilities). The proposed
requirements include account security measures, device security
measures, data security measures, governance and training, risk
management, supply chain management, resilience, network segmentation,
reporting, and physical security.
This NPRM also seeks public comments specifically on defining a
reportable cyber incident in 33 CFR 101.615 and using that term to
limit reporting requirements; whether certain reports required under
proposed Sec. Sec. 101.620 and 101.650 should be sent to the
Cybersecurity and Infrastructure Security Agency (CISA); and whether to
amend the definition of hazardous condition in 33 CFR part 160. We will
consider comments on these three issues in deciding whether to amend
the regulatory text we have proposed.
The Coast Guard welcomes comments on all aspects of this
rulemaking, including the proposed changes to definitions and the
assumptions and estimates in section VI.A., Regulatory Planning and
Review. Section VI.A. of this preamble addresses, for instance,
developing a Cybersecurity Plan and
[[Page 13406]]
cybersecurity drill components, the affected population, device
security measures, supply chain management, network segmentation,
physical security, implementing and maintaining multifactor
authentication, and owners and operators' existing practices on the
proposed cybersecurity measures.
B. Recent Legislation, Regulations, and Policy
In the Maritime Transportation Security Act of 2002 (MTSA),\7\
Congress provided a framework for the Secretary of Homeland Security
(``Secretary''), acting through the Coast Guard,\8\ and maritime
industry to identify, assess, and prevent TSIs in the MTS. MTSA vested
the Secretary with authorities for broad security assessment, planning,
prevention, and response activities to address TSIs, including the
authority to require and set standards for Facility Security Plans
(FSPs), OCS FSPs, and Vessel Security Plans (VSPs), to review and
approve such plans, and to conduct inspections and take enforcement
actions.\9\ The Coast Guard's implementing regulations address a range
of considerations to deter TSIs to the maximum extent practicable,\10\
and require, among other general and specific measures, security
assessments and measures related to radio and telecommunication
systems, including computer systems and networks.\11\
---------------------------------------------------------------------------
\7\ Public Law 107-295, 116 Stat. 2064, November 25, 2002.
\8\ The Secretary delegated this authority to the Commandant of
the Coast Guard via Department of Homeland Security (DHS) Delegation
00170.1(II)(97)(b), Revision No. 01.3.
\9\ See generally, for example, 46 U.S.C. 70103.
\10\ See 46 U.S.C. 70103(c)(1).
\11\ See, for example, 33 CFR 104.300(d)(11), 104.305(d)(2)(v),
105.300(d)(11), 105.305(c)(1)(v), 106.300(d)(11), 106.305(c)(1)(v),
and 106.305(d)(2)(v).
---------------------------------------------------------------------------
The Coast Guard has also issued additional guidance and policies to
address potential cyber incidents in FSPs, OCS FSPs, and VSPs,\12\
including a cybersecurity risk assessment model that was issued in
January 2023,\13\ and voluntary guidance issued to Area Maritime
Security Committees (AMSC) in July 2023.\14\ Congress has repeatedly
reaffirmed the MTSA framework, including through amendments passed in
2016,\15\ 2018,\16\ and 2021.\17\ In the 2018 amendments, Congress
amended MTSA to specifically require VSPs and FSPs to include
provisions for detecting, responding to, and recovering from
cybersecurity risks that may cause TSIs.\18\ The proposed regulatory
amendments to 33 CFR part 101 reflect the Coast Guard's view on
cybersecurity under MTSA, including, but not limited to, recent
amendments to MTSA (such as Title 46 of the United States Code (U.S.C.)
Section 70103). The proposed amendments provide more detailed mandatory
baseline requirements for U.S.-flagged vessels and U.S. facilities
subject to MTSA.
---------------------------------------------------------------------------
\12\ One of the Coast Guard's guidance documents is the
Navigation and Vessel Inspection Circular (NVIC) 01-20, Guidelines
for Addressing Cyber Risks at Maritime Transportation Security Act
Regulated Facilities (85 FR 16108). This NVIC outlined Coast Guard's
view on requirements for FSPs and facility security, including
cybersecurity. A similar understanding with regard to VSPs was
expressed in the Coast Guard's Office of Commercial Vessel
Compliance's (CG-CVC) Vessel CRM Work Instruction CVC-WI-027(2),
Vessel Cyber Risk Management Work Instruction, October 27, 2020,
https://www.dco.uscg.mil/Portals/9/CVC-WI-27%282%29.pdf, accessed
July 18, 2023.
\13\ See Maritime Cybersecurity Assessment and Annex Guide
(MCAAG) (January 2023), https://dco.uscg.mil/Portals/9/CG-FAC/Documents/Maritime%20Cyber%20Assessment%20%20Annex%20Guide%20(MCAAG)_released%2
023JAN2023.pdf, accessed Aug. 4, 2023. The MCAAG was developed in
coordination with the National Maritime Security Advisory Committee,
AMSCs, and other maritime stakeholders. The guide serves as a
resource for baseline cybersecurity assessments and plan development
and helps stakeholders address vulnerabilities that could lead to
transportation security incidents.
\14\ NVIC 09-02, Change 6.
\15\ Public Law 114-120, 130 Stat. 27, February 8, 2016.
\16\ Public Law 115-254, 132 Stat. 3186, October 5, 2018.
\17\ Public Law 116-283, 134 Stat. 4754, January 1, 2021.
\18\ See Public Law 115-254, sec. 1805(d)(2) (codified at 46
U.S.C. 70103(c)(3)(C)).
---------------------------------------------------------------------------
Through three administrations, presidential policy has advanced
cybersecurity in the maritime domain. Executive Order 13636 of February
12, 2013 (Improving Critical Infrastructure Cybersecurity) recognized
the Federal Government's efforts to secure our nation's critical
infrastructure by working with the owners and operators of U.S.
facilities, OCS facilities, and U.S.-flagged vessels to prepare for,
prevent, mitigate, and respond to cybersecurity threats.\19\
---------------------------------------------------------------------------
\19\ 78 FR 11739, February 19, 2013.
---------------------------------------------------------------------------
To defend against malicious cyber-related activities, Executive
Order 13694 of April 1, 2015 (Blocking the Property of Certain Persons
Engaging in Significant Malicious Cyber-Enabled Activities) recognized
malicious cyber-related activities as an ``extraordinary threat to the
national security, foreign policy, and economy of the United States,''
warranting a national emergency.\20\ The National Emergency with
Respect to Significant Malicious Cyber-Enabled Activities has been
extended as of March 30, 2023.\21\
---------------------------------------------------------------------------
\20\ 80 FR 18077, April 2, 2015. Executive Order 13694 was later
amended by Executive Order 13757 (82 FR 1, January 3, 2017), which
outlined additional measures the Federal Government must take to
address the national emergency identified in Executive Order 13694.
\21\ 88 FR 19209, March 30, 2023.
---------------------------------------------------------------------------
Executive Order 14028 of May 12, 2021 (Improving the Nation's
Cybersecurity) also recognized that ``the private sector must adapt to
the continuously changing threat environment, ensure its products are
built and operate securely, and partner with the Federal Government to
foster a more secure cyberspace.'' \22\
---------------------------------------------------------------------------
\22\ 86 FR 26633.
---------------------------------------------------------------------------
On July 28, 2021, the President issued the ``National Security
Memorandum on Improving Cybersecurity for Critical Infrastructure
Control Systems,'' \23\ which required the Secretary of Homeland
Security to coordinate with the Secretary of Commerce (through the
Director of the National Institute of Standards and Technology (NIST))
and other agencies, as appropriate, to develop baseline Cybersecurity
Performance Goals (CPGs). These baseline CPGs would further a common
understanding of the baseline security practices that critical
infrastructure owners and operators should follow to protect national
and economic security, as well as public health and safety. CISA's
release of the CPGs in October 2022 was ``intended to help establish a
common set of fundamental cybersecurity practices for critical
infrastructure, and especially help small- and medium-sized
organizations kickstart their cybersecurity efforts.'' \24\ The Coast
Guard relied on CISA's CPGs as the benchmark for technical requirements
in this proposed rule.
---------------------------------------------------------------------------
\23\ The White House, National Security Memorandum on Improving
Cybersecurity for Critical Infrastructure Control Systems, July 28,
2021, https://www.whitehouse.gov/briefing-room/statements-releases/2021/07/28/national-security-memorandum-on-improving-cybersecurity-for-critical-infrastructure-control-systems/, last accessed on July
24, 2023.
\24\ CISA, ``Cross-Sector Cybersecurity Performance Goals,''
https://www.cisa.gov/cross-sector-cybersecurity-performance-goals,
accessed July 18, 2023.
---------------------------------------------------------------------------
In 2021, the Coast Guard published its Cyber Strategic Outlook
(CGCSO) to highlight the importance of managing cybersecurity risks in
the MTS.\25\ The CGCSO highlighted three lines of effort, or
priorities, to improve Coast Guard readiness in cyberspace: (1) Defend
and Operate the Coast Guard Enterprise Mission Platform; (2) Protect
the MTS; and (3) Operate in and through Cyberspace.\26\ As outlined in
the
[[Page 13407]]
CGCSO's second line of effort, ``Protect the MTS,'' the Coast Guard
proposes to implement a risk-based regulatory, compliance, and
assessment regime. We propose to establish minimum requirements for
cybersecurity plans that facilitate the use of international and
industry-recognized cybersecurity standards to manage cybersecurity
risks by owners and operators of maritime critical infrastructure.\27\
Specifically, this proposed rule would promulgate the Coast Guard's
baseline cybersecurity regulations for U.S.-flagged vessels and U.S.
facilities (including OCS facilities) subject to MTSA.
---------------------------------------------------------------------------
\25\ U.S. Coast Guard, ``Cyber Strategic Outlook,'' August 2021,
https://www.uscg.mil/Portals/0/Images/cyber/2021-Cyber-Strategic-Outlook.pdf, accessed July 18, 2023.
\26\ These lines of effort evolved from the three ``strategic
priorities'' introduced in the Coast Guard's Cyber Strategy, June
2015. As cyber threats and vulnerabilities evolve, so will the Coast
Guard's posture. https://www.dco.uscg.mil/Portals/10/Cyber/Docs/CG_Cyber_Strategy.pdf?ver=nejX4g9gQdBG29cX1HwFdA%3D%3D, accessed
July 18, 2023.
\27\ The Coast Guard is aware that some entities already follow
industry standards related to cybersecurity. The proposed minimum
requirements seek to establish a common baseline for all the
regulated vessels and facilities that would not be incompatible with
such standards, recognizing that in some instances these proposed
minimums may increase a requirement, but in other circumstances will
already be satisfied. The entity would be able to indicate within
their Cyber Plan that they are following a particular standard and
highlight how their compliance with that standard satisfies the
Coast Guard requirements.
---------------------------------------------------------------------------
As noted, in January 2023, the Coast Guard released the Maritime
Cybersecurity Assessment and Annex Guide (MCAAG). The MCAAG was
developed through coordination with the National Maritime Security
Advisory Committee, Area Maritime Security Committees, and other
maritime stakeholders, consistent with the activities described in
section 2(e) of the National Institute of Standards and Technology Act
(15 U.S.C. 272(e)). The MCAAG provides more detailed recommendations on
implementing existing MTSA regulations as they relate to computer
systems and networks. For example, the Coast Guard recommended a Cyber
Annex Template for stakeholders to address possible cybersecurity
vulnerabilities and risks.
This NPRM is meant to expand and clarify the information required
in security plans to remain consistent with 46 U.S.C. 70103(c)(3),
including section 70103(c)(3)(C)(v), which requires FSPs, OCS FSPs, and
VSPs to include provisions for detecting, responding to, and recovering
from cybersecurity risks that may cause TSIs. Some terms we use in the
MCAAG, such as cybersecurity vulnerability, may have a set proposed
definition in this NPRM.
C. Legal Authority To Address This Problem
The Coast Guard is proposing to promulgate these regulations under
43 U.S.C. 1333(d); 46 U.S.C. 3306, 3703, 70102 through 70104, 70124;
and the Department of Homeland Security (DHS) Delegation No. 00170,
Revision No. 01.3.
Section 4 of the Outer Continental Shelf Lands Act of 1953,
codified as amended at 43 U.S.C. 1333(d), authorizes the Secretary to
promulgate regulations with respect to lights and other warning
devices, safety equipment, and other matters relating to the promotion
of safety of life and property on the artificial islands,
installations, and other devices on the OCS. This authority was
delegated to the Coast Guard by DHS Delegation No. 00170(II)(90),
Revision No. 01.3.
Section 3306 of Title 46 of the United States Code authorizes the
Secretary to prescribe necessary regulations for the design,
construction, alteration, repair, equipping, manning and operation of
vessels and prevention and mitigation of damage to the marine
environment, propulsion machinery, auxiliary machinery, boilers,
unfired pressure vessels, piping, electric installations, and
accommodations for passengers and crew. This authority was delegated to
the Coast Guard by DHS Delegation No. 00170(II)(92)(b), Revision No.
01.3.
Section 3703 of Title 46 of the United States Code authorizes the
Secretary to prescribe similar regulations relating to tank vessels
that carry liquid bulk dangerous cargoes, including the design,
construction, alteration, repair, maintenance, operation, equipping,
personnel qualification, and manning of the vessels. This authority was
delegated to the Coast Guard by DHS Delegation No. 00170(II)(92)(b),
Revision No. 01.3.
Sections 70102 through 70104 of Title 46 of the United States Code
authorize the Secretary to evaluate for compliance vessel and facility
vulnerability assessments, security plans, and response plans. Section
70124 authorizes the Secretary to promulgate regulations to implement
Chapter 701, including sections 70102 through 70104, dealing with
vulnerability assessments for the security of vessels, facilities, and
OCS facilities; VSPs, FSPs, and OCS FSPs; and response plans for
vessels, facilities, and OCS facilities. These authorities were
delegated to the Coast Guard by DHS Delegation No. 00170(II)(97)(a)
through (c), Revision No. 01.3.
IV. Background
A. The Current State of Cybersecurity in the MTS
The maritime industry is relying increasingly on digital solutions
for operational optimization, cost savings, safety improvements, and
more sustainable business. However, these developments, to a large
extent, rely on information technology (IT) systems and operational
technology (OT) systems, which increases potential cyber
vulnerabilities and risks. Cybersecurity risks result from
vulnerabilities in secure and safe operation of vital systems, which
increase the likelihood of cyber-attacks on U.S. facilities, OCS
facilities, and U.S.-flagged vessels.
Cyber-attacks on public infrastructure have raised awareness of the
need to protect systems and equipment that facilitate operations within
the MTS because cyber-attacks have the potential to disable the IT and
OT onboard U.S.-flagged vessels, U.S. facilities, and OCS facilities.
Autonomous vessel technology, automated OT, and remotely operated
machines provide further opportunities for cyber-attackers. These
systems and equipment are prime targets for cyber-attacks stemming from
insider threats, criminal organizations, nation state actors, and
others.
Also, the MTS has become increasingly susceptible to cyber-attacks
due to the growing integration of digital technologies in their
operations. These types of cyber-attacks can range from altering a
vessel's navigational systems to disrupting its communication with
ports, which can lead to delays, accidents, or even potential
groundings that could potentially disrupt vessel movements and shut
down port operations, such as loading and unloading cargo. This
disruption can also negatively affect the MTS by interrupting the
transportation and commerce of goods, raw resources, and passengers, as
well as potential military operations when needed.
An attack that compromises navigational or operational systems can
pose a serious safety risk. It could result in accidents at sea,
potential environmental disasters like oil spills, and loss of life.
The maritime industry is not immune to ransomware attacks where
cybercriminals are targeting critical systems or data. Given the
critical nature of marine transportation to global trade, continued
efforts are being made to improve cybersecurity measures in the sector.
Maritime stakeholders can better detect, respond to, and recover
from cybersecurity risks that may cause TSIs by adopting a range of
cyber risk management (CRM) measures, as described in this proposed
rule. It is important that the Coast Guard work with the maritime
community to address both safety and security risks to better
facilitate operations and to protect
[[Page 13408]]
MTS entities from creating hazardous conditions within ports and
waterways. Updating regulations to include minimum cybersecurity
requirements would strengthen the security posture and increase
resilience against cybersecurity threats in the MTS.
In 2017, the International Maritime Organization (IMO) took steps
to address cybersecurity risks in the shipping industry by publishing
the Marine Safety Committee/Facilitation Committee (MSC-FAL) Circular
3, Guidelines on Maritime Cyber Risk Management,\28\ and MSC Resolution
428(98).\29\ The IMO affirmed that an approved Safety Management System
(SMS) should involve CRM to manage cybersecurity risks in accordance
with the objectives and functional requirements of the International
Safety Management (ISM) Code. An SMS is a structured and documented set
of procedures enabling company and vessel personnel to effectively
implement safety and environmental protection policies that are
specific to that company or vessel.
---------------------------------------------------------------------------
\28\ https://www.cdn.imo.org/localresources/en/OurWork/Facilitation/Facilitation/MSC-FAL.1-Circ.3-Rev.1%20-%20Guidelines%20On%20Maritime%20Cyber%20Risk%20Management%20(Secretar
iat).pdf, accessed July 18, 2023.
\29\ See the IMO resolution on CRM: Resolution MSC.428(98),
Annex 10, ``Maritime Cyber Risk Management in Safety Management
Systems.'' https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/Resolution%20MSC.428(98).pdf, accessed July 18,
2023.
---------------------------------------------------------------------------
For applicable U.S.-flagged vessels, this proposed rule would
establish a baseline level of protection throughout the MTSA-regulated
vessel fleet. As the flag state, the Coast Guard can ensure these
proposed cybersecurity regulations are implemented appropriately by
approving Cybersecurity Plans and conducting routine inspections. This
proposed rule would also apply to U.S. facilities regulated by 33 CFR
part 105 and OCS facilities regulated by 33 CFR part 106.
B. Current Regulations Related to Cybersecurity
The MTSA-implementing regulations in 33 CFR parts 101, 103, 104,
105, and 106 give the Coast Guard the authority to review and approve
security assessments and plans that apply broadly to the various
security threats facing the maritime industry. Through the Navigation
and Vessel Inspection Circular (NVIC) 01-20 \30\ (85 FR 16108, March
20, 2020), the Coast Guard interpreted 33 CFR parts 105 and 106 as
requiring owners and operators of U.S. facilities and OCS facilities to
address cybersecurity in their facility security assessments (FSAs) and
OCS FSAs, as well as in their FSPs and OCS FSPs, and provided non-
binding guidance on how regulated entities could address these issues.
---------------------------------------------------------------------------
\30\ See footnote 12.
---------------------------------------------------------------------------
This proposed rule would expand upon the agency's prior actions by
establishing minimum performance-based cybersecurity requirements for
the MTS within the MTSA regulations. Similar to the existing
requirements in 33 CFR parts 104, 105 and 106, the Coast Guard would
allow owners and operators the flexibility to determine the best way to
implement and comply with these new requirements. The Coast Guard is
proposing an implementation period of 12 to 18 months following the
effective date of a final rule to allow sufficient time for the owners
and operators of applicable U.S.-flagged vessels, U.S. facilities, and
OCS facilities to comply with the requirements of this proposed
rule.\31\
---------------------------------------------------------------------------
\31\ Existing general requirements to address cyber issues in
security plans will continue to apply during this rulemaking.
---------------------------------------------------------------------------
V. Discussion of Proposed Rule
This NPRM proposes to add minimum cybersecurity requirements to 33
CFR part 101. The Coast Guard invites comment on whether any of the
proposed requirements would overlap, conflict, or duplicate existing
regulatory requirements from other Federal agencies. The requirements
would consist of the following sections:
101.600 Purpose
101.605 Applicability
101.610 Federalism
101.615 Definitions
101.620 Owner or Operator
101.625 Cybersecurity Officer
101.630 Cybersecurity Plan
101.635 Drills and Exercises
101.640 Records and Documentation
101.645 Communications
101.650 Cybersecurity Measures
101.655 Cybersecurity Compliance Dates
101.660 Cybersecurity Compliance Documentation
101.665 Noncompliance, Waivers, and Equivalents
In addition, the Coast Guard seeks comments on whether, in this
rulemaking, we should: define the term reportable cyber incident in
proposed 33 CFR 101.615 and use that term in the regulatory text to
limit cyber incidents that trigger reporting requirements; require
certain reports identified in Sec. Sec. 101.620 and 101.650 to be sent
to CISA; and amend the definition of hazardous condition in 33 CFR
160.202.
A section-by-section explanation of the proposed additions and
changes follows:
Section 101.600--Purpose
This proposed section states that the purpose of 33 CFR part 101,
subpart F, is to set minimum cybersecurity requirements for U.S.-
flagged vessels, U.S. facilities, and OCS facilities to safeguard and
ensure the security and resilience of the MTS. The proposed
requirements would help safeguard the MTS from the evolving risks of
cyber threats and align with the DHS goal of protecting critical U.S.
infrastructure.
Section 101.605--Applicability
This section proposes to make subpart F apply to the owners and
operators of the U.S.-flagged vessels listed in 33 CFR 104.105(a), the
facilities listed in 33 CFR 105.105(a), and the OCS facilities listed
in 33 CFR 106.105(a). A list of the vessels that would be subject to
subpart F is as follows:
U.S. Mobile Offshore Drilling Units (MODUs), cargo
vessels, or passenger vessels subject to the International Convention
for Safety of Life at Sea, 1974, (SOLAS), Chapter XI-1 or Chapter XI-2;
Self-propelled U.S. cargo vessels greater than 100 gross
register tons subject to 46 CFR chapter I, subchapter I, except
commercial fishing vessels inspected under 46 CFR part 105;
U.S. vessels subject to 46 CFR chapter I, subchapter L;
U.S. passenger vessels subject to 46 CFR chapter I,
subchapter H;
U.S. passenger vessels certificated to carry more than 150
passengers;
U.S. passenger vessels carrying more than 12 passengers,
including at least 1 passenger-for-hire, that are engaged on an
international voyage;
U.S. barges subject to 46 CFR chapter I, subchapter D or
O;
U.S. barges carrying certain dangerous cargo in bulk or
barges that are subject to 46 CFR chapter I, subchapter I, that are
engaged on an international voyage;
U.S. tankships subject to 46 CFR chapter I, subchapter D
or O; and
U.S. towing vessels greater than 8 meters (26 feet) in
registered length inspected under 46 CFR subchapter M that are engaged
in towing a barge or barges and subject to 33 CFR part 104, except a
towing vessel that--
[cir] Temporarily assists another vessel engaged in towing a barge
or barges subject to 33 CFR part 104;
[cir] Shifts a barge or barges subject to this part at a facility
or within a fleeting facility;
[cir] Assists sections of a tow through a lock; or
[cir] Provides emergency assistance.
This proposed rule would not apply to any foreign-flagged vessels
subject to
[[Page 13409]]
33 CFR part 104. Cyber regulations for foreign-flagged vessels under
domestic law may create unintended consequences with the ongoing and
future diplomatic efforts to address maritime cybersecurity in the
international arena. The IMO addressed cybersecurity measures for
foreign-flagged vessels through MSC-FAL.1/Circ.3 and MSC Resolution
428(98). Therefore, based on IMO guidelines and recommendations, an SMS
approved under the ISM Code should address foreign-flagged vessel
cybersecurity.
In addition, the Coast Guard verifies how CRM is incorporated into
a vessel's SMS via the process described in the October 27, 2020, CVC-
WI-027(2), Vessel Cyber Risk Management Work Instruction.\32\ This
process would continue to be the Coast Guard's primary means of
ensuring cybersecurity readiness on foreign-flagged vessels, which are
exempt from this proposed rule.
---------------------------------------------------------------------------
\32\ See footnote 12.
---------------------------------------------------------------------------
If your facility or vessel would be subject to this proposed rule
and you view a portion of it as redundant with the requirements of
another Federal agency, please let us know. We seek to eliminate any
unnecessary redundancies.
Section 101.610--Federalism
We discuss the purpose and contents of this proposed section in
section VI.E, Federalism, in this preamble.
Section 101.615--Definitions
This section lists new cybersecurity related definitions the Coast
Guard proposes to include in 33 CFR part 101, in addition to the
maritime security definitions in 33 CFR 101.105. These definitions
explain concepts relevant to cybersecurity and would help eliminate
uncertainty in referencing and using these terms in 33 CFR part 101.
The Coast Guard consulted several authoritative sources for these
proposed new definitions. These sources include Executive Order 14028,
6 U.S.C. 148, and the James M. Inhofe National Defense Authorization
Act for Fiscal Year 2023 (the Act).\33\
---------------------------------------------------------------------------
\33\ Public Law 117-263, Sec. 11224(a)(1) (2022).
---------------------------------------------------------------------------
Another source for definitions is the ``Vocabulary'' page on CISA's
National Initiative for Cybersecurity Careers and Studies website,\34\
which is an online Federal resource for cybersecurity training and
education. The Coast Guard also reviewed NIST's Computer Security
Resource Center (CSRC).\35\ NIST maintains CSRC to educate the public
on computer security, cybersecurity, information security, and privacy.
Definitions from CISA and NIST are authoritative sources in areas
related to technology and cybersecurity.
---------------------------------------------------------------------------
\34\ National Initiative for Cybersecurity Careers and Studies,
Explore Terms: A Glossary of Common Cybersecurity Words and Phrases,
https://niccs.cisa.gov/cybersecurity-career-resources/glossary,
accessed September 15, 2023.
\35\ CSRC, https://csrc.nist.gov/glossary, accessed September
15, 2023.
---------------------------------------------------------------------------
In addition, the Coast Guard proposes to define the term
cybersecurity risk consistent with the definition at section 2200 of
the Homeland Security Act of 2002 (Pub. L. 107-296), as amended, see 6
U.S.C. 650(7). The Coast Guard notes, however, that it does not believe
paragraph (b) of subsection 2200(7), which contains an exception for
actions that solely involve a ``violation of a consumer term of service
or a consumer licensing agreement'' is relevant to the facilities and
vessels that are the subject of this rulemaking. Nevertheless, for
consistency with the definition found in the Homeland Security Act and
the sake of completeness, we have elected to include the complete
definition in this proposal. See also 46 U.S.C. 70101(2); Public Law
115-254, sec. 1805(b)(2).
The Coast Guard proposes to include definitions for Cyber incident,
Cyber risk, Cyber threat, and Cybersecurity vulnerability. Cyber
incident would relate to Information Systems and would be inclusive of
both Information Technology and Operational Technology, all of which
the Coast Guard is also proposing to define. The Coast Guard also
proposes new defined terms that are applicable to maritime
cybersecurity, including Critical Information Technology or Operational
Technology systems, Cyber Incident Response Plan, Cybersecurity Officer
or CySO, and Cybersecurity Plan. A CySO, for example, would be the
person(s) responsible for developing, implementing, and maintaining
cybersecurity portions of the VSP, FSP, or OCS FSP. The CySO would also
act as a liaison with the Captain of the Port (COTP) and company,
vessel, and facility security officers.
In addition, the Coast Guard welcomes comments on whether we should
define and use the term Reportable cyber incident. The proposed
definition of a reportable cyber incident would be based on the Cyber
Incident Reporting Council's model definition in DHS's Report to
Congress of September 19, 2023.\36\ If adopted, the term reportable
cyber incident would replace cyber incident in proposed Sec. Sec.
101.620(b)(7) and 101.650(g)(1). Specifically, a reportable cyber
incident would mean an incident that leads to, or, if still under
investigation, could reasonably lead to any of the following:
---------------------------------------------------------------------------
\36\ See DHS Office of Strategy, Policy, and Plans,
Harmonization of Cyber Incident Reporting to the Federal Government
(Sept. 19, 2023), https://www.dhs.gov/publication/harmonization-cyber-incident-reporting-federal-government, accessed Sept. 19,
2023.
---------------------------------------------------------------------------
(1) Substantial loss of confidentiality, integrity, or availability
of a covered information system, network, or OT system;
(2) Disruption or significant adverse impact on the reporting
entity's ability to engage in business operations or deliver goods or
services, including those that have a potential for significant impact
on public health or safety or may cause serious injury or death;
(3) Disclosure or unauthorized access directly or indirectly of
non-public personal information of a significant number of individuals;
(4) Other potential operational disruption to critical
infrastructure systems or assets; or
(5) Incidents that otherwise may lead to a TSI as defined in 33 CFR
101.105.
The Coast Guard's existing regulations in 33 CFR part 101 require
regulated entities to report suspicious activity that may result in a
TSI, breaches of security, and TSIs involving computer systems and
networks. See 33 CFR 101.305. The purpose of defining a reportable
cyber incident in this NPRM is to establish a threshold between the
cyber incidents that must be reported and the ones that do not. We
request public comment on the substance of this definition, its
elements, potential burden on industry, as well as the need and
effectiveness of including it in this regulation. We also invite
comments on whether we should define any terms we use in the proposed
rule that are not defined in proposed Sec. 101.615.
In this NPRM, the Coast Guard is also seeking comments on two
alternative potential regulatory measures for reporting cyber
incidents. In the first alternative, the Coast Guard would require that
reportable cyber incidents would be reported to the National Response
Center (NRC) without delay to the telephone number listed in 33 CFR
101.305(a). Cyber incidents with no physical or pollution effects could
also be reported directly to CISA via [email protected] or 1-888-282-
0870. All such reports would be shared between the NRC and CISA Central
and satisfy the requirement to report to the Coast Guard.
In the second alternative, the Coast Guard seeks comments on
whether it should require that reportable cyber incidents be reported
to CISA. While this alternative would be a change from current
practice, it could allow more
[[Page 13410]]
efficient use of DHS' cybersecurity resources and may advance the
cybersecurity vision laid out by Congress in the Cyber Incident
Reporting for Critical Infrastructure Act of 2022 (CIRCIA), which will
be implemented by regulations that are still under development.
Information submitted to CISA would be shared with the Coast Guard,
ensuring continued efficient responses.
If we were to use either alternative, to the extent that the
reporting obligation imposed by this NPRM constitutes a requirement to
report ``substantially similar information . . . within a substantially
similar timeframe'' when compared to a rule implementing CIRCIA,
covered entities may be excused from any duplicative reporting
obligations under the CIRCIA rulemaking.\37\ In line with that
provision, we invite your comments on whether we should expressly
require reporting of ransom payments in connection with ransomware
attacks. We request comment on whether we should use either of these
two alternatives in a final rule.
---------------------------------------------------------------------------
\37\ See 6 U.S.C. 681b(a)(5)(B) (exception to reporting
requirements for certain substantially similar reporting
requirements ``where the Agency has an agreement in place that
satisfies the requirements of section 681g(a) of this title'').
---------------------------------------------------------------------------
Section 101.620--Owner or Operator
This proposed section would require each owner and operator of a
U.S.-flagged vessel, facility, or OCS facility to assign qualified
personnel to develop a Cybersecurity Plan and ensure the Cybersecurity
Plan incorporates detailed preparation, prevention, and response
activities for cybersecurity threats and vulnerabilities.
Additional responsibilities of owners and operators of U.S.-flagged
vessels, facilities, and OCS facilities would include:
Designating a CySO, in writing, by name and title, and
identifying how the CySO can be contacted at any time. A CySO would
have to be accessible to the Coast Guard 24 hours a day, 7 days a week
(see proposed Sec. 101.620(b)(3));
Ensuring that a Cybersecurity Assessment is conducted
annually or sooner, under the circumstances described in this NPRM (see
proposed Sec. Sec. 101.620(b)(4) and 101.650(e)(1));
Ensuring that a Cybersecurity Plan is developed and
submitted for Coast Guard approval, either as a separate document or as
an addition to an existing FSP, VSP, or OCS FSP (see proposed
Sec. Sec. 101.620(b)(1) and 101.630(a));
Operating the U.S.-flagged vessel, facility, or OCS
facility in accordance with the approved Cybersecurity Plan (see
proposed Sec. 101.620(b)(5)); and
Reporting all cyber incidents, including TSIs, to the NRC
and relevant authorities according to the Cybersecurity Plan (see
proposed Sec. Sec. 101.305 and 101.620(b)(7)).
Section 101.625--Cybersecurity Officer
The CySO may be a full-time, collateral, or contracted position.
The same person may serve as the CySO for more than one vessel,
facility, or OCS facility. The CySO would need to have general
knowledge of a range of issues relating to cybersecurity, such as
cybersecurity administration, relevant laws and regulations, current
threats and trends, risk assessments, inspections, control procedures,
and procedures for conducting exercises and drills. When considering
assignment of the CySO role to the existing security officer, the owner
or operator should consider the depth and scope of these new
responsibilities in addition to existing security duties.
The most important duties a CySO would perform include ensuring
development, implementation, and finalization of a Cybersecurity Plan;
auditing and updating the Plan; ensuring adequate training of
personnel; and ensuring the U.S.-flagged vessel, facility, or OCS
facility is operating in accordance with the Plan and in continuous
compliance with this subpart. The CySO would have the authority to
assign cybersecurity duties to other personnel; however, the CySO would
remain responsible for the performance of these duties.
Section 101.630--Cybersecurity Plan
This proposed section contains minimum requirements for the
Cybersecurity Plan. The Cybersecurity Plan would be maintained
consistent with the recordkeeping requirements in 33 CFR 104.235 for
vessels, 33 CFR 105.225 for facilities, and 33 CFR 106.230 for OCS
facilities. See proposed Sec. 101.640. A Cybersecurity Plan would
incorporate the results of a Cybersecurity Assessment and consider the
recommended measures appropriate for the U.S.-flagged vessel, facility,
or OCS facility. A Cybersecurity Plan could be combined with or
complement an existing FSP, VSP, or OCS FSP. A Cybersecurity Plan could
be kept in an electronic format if it can be protected from being
deleted, destroyed, overwritten, accessed, or disclosed without
authorization.
The format of a Cybersecurity Plan required under this proposed
rule would include the following individual sections:
(1) Cybersecurity organization and identity of the CySO (see
proposed Sec. 101.625 Cybersecurity Officer);
(2) Personnel training (see proposed Sec. 101.625(d)(8), (9)
Cybersecurity Officer);
(3) Drills and exercises (see proposed Sec. 101.635 Drills and
Exercises);
(4) Records and documentation (see proposed Sec. 101.640 Records
and Documentation);
(5) Communications (see proposed Sec. 101.645 Communications);
(6) Cybersecurity systems and equipment with associated
maintenance; (see proposed Sec. 101.650(e)(3) Cybersecurity Measures:
Routine Maintenance);
(7) Cybersecurity measures for access control, including computer,
IT, and OT areas (see proposed Sec. 101.650(a) Cybersecurity Measures:
Account Measures);
(8) Physical security controls for IT and OT systems (see proposed
Sec. 101.650(i) Cybersecurity Measures: Physical Security);
(9) Cybersecurity measures for monitoring (see proposed Sec.
101.650(f) Cybersecurity Measures: Supply Chain; (h) Network
Segmentation; (i) Physical Security);
(10) Audits and amendments to the Cybersecurity Plan (see proposed
Sec. 101.630(f) Cybersecurity Plan: Audits);
(11) Cybersecurity audit and inspection reports to include
documentation of resolution or mitigation of all identified
vulnerabilities (see proposed Sec. 101.650(e) Cybersecurity Measures:
Risk Management);
(12) Documentation of all identified unresolved vulnerabilities to
include those that are intentionally unresolved due to risk acceptance
by the owner or operator (see proposed Sec. 101.650(e) Cybersecurity
Measures: Risk Management);
(13) Cyber incident reporting procedures in accordance with part
101 of this subchapter (see proposed Sec. 101.650(g) Cybersecurity
Measures: Resilience); and
(14) Cybersecurity Assessment (see proposed Sec. 101.650(e)
Cybersecurity Measures: Risk Management).
Depending on operational conditions and cybersecurity risks, the
owner or operator may develop a Cyber Incident Response Plan as a
separate document or as an addition to the Cybersecurity Plan.
Submission and Approval of the Cybersecurity Plan
An owner or operator would submit a Cybersecurity Plan for review
to the cognizant COTP or the Officer in
[[Page 13411]]
Charge, Marine Inspections (OCMI) for U.S. facilities and OCS
facilities, or to the U.S. Coast Guard's Marine Safety Center (MSC) for
U.S.-flagged vessels. See proposed Sec. 101.630(d). A letter
certifying that the Plan meets the requirements of this subpart must
accompany the submission. Once the COTP or MSC finds that the Plan
meets the cybersecurity requirements in Sec. 101.630, they would send
a letter to the owner or operator approving the Cybersecurity Plan or
approving the Plan under certain conditions.
If the cognizant COTP, OCMI, or MSC requires additional time to
review the Plan, they would have the authority to return a written
acknowledgement to the owner or operator stating that the Coast Guard
will review the Cybersecurity Plan submitted for approval, and that the
U.S.-flagged vessel, facility, or OCS facility may continue to operate
as long as it remains in compliance with the submitted Cybersecurity
Plan. See proposed Sec. 101.630(d)(1)(iv).
If the COTP, OCMI, or MSC finds that the Cybersecurity Plan does
not meet the requirements in Sec. 101.630, the Plan would be returned
to the owner or operator with a letter explaining why the Plan did not
meet the requirements. The owner or operator will have at least 60 days
to amend the Plan and cure deficiencies outlined in the letter. Until
the amendments are approved, the owner or operator must ensure
temporary cybersecurity measures are implemented to the satisfaction of
the Coast Guard. See proposed Sec. 101.630(e)(1)(ii).
Deficiencies would have to be corrected, and the Plan would have to
be resubmitted for approval within the time period specified in the
letter. If the owner or operator fails to cure those deficiencies
within 60 days, the Plan would be declared noncompliant with these
proposed regulations and other relevant regulations in title 33 of the
CFR. If the owner or operator disagrees with the deficiency
determination, they would have the right to appeal or submit a petition
for reconsideration or review to the respective COTP, District
Commander, OCMI, or MSC per Sec. 101.420.
Under proposed Sec. 101.650(e)(1), a cybersecurity assessment
would have to be conducted when one or both of the following situations
occurs:
There is a change in ownership of a U.S.-flagged vessel,
facility, or an OCS facility; or
There are major amendments to the Cybersecurity Plan.
Each owner or operator would determine what constitutes a ``major
amendment'' as appropriate for their organization based on types of
changes to their security measures and operational risks. When
submitting proposed amendments to the Coast Guard, either after a
cybersecurity assessment or at other times, you would not be required
to submit the Cybersecurity Plan with the proposed amendment. Under
Sec. 101.630(f)(1), the CySO must ensure that an audit of the
Cybersecurity Plan and its implementation is performed annually,
beginning no later than 1 year from the initial date of approval.
Additional audits would need to be conducted if there is a change in
ownership or modifications of cybersecurity measures, but such audits
may be limited to sections of the Plan affected by the modification.
See proposed Sec. 101.630(f)(2) and (3). Those conducting an internal
audit must have a level of knowledge and independence specified in
Sec. 101.630(f)(4). Under Sec. 101.630(f)(5), if the results of the
audit require the Cybersecurity Plan to be amended, the CySO must
submit the proposed amendments to the Coast Guard for review within 30
days of completing the audit.
Section 101.635--Drills and Exercises
Under this proposed section, cybersecurity drills and exercises
would be required to test the proficiency of U.S.-flagged vessel,
facility, and OCS facility personnel in assigned cybersecurity duties
and in the effective implementation of the VSP, FSP, OCS FSP, and
Cybersecurity Plan. Drills and exercises would also enable the CySO to
identify any related cybersecurity deficiencies that need to be
addressed.
Cybersecurity drills would generally test an operational response
of at least one specific element of the Cybersecurity Plan, as
determined by the CySO, such as access control for a critical IT or OT
system, or network scanning. A drill would be required at least once
every 3 months and may be held in conjunction with other drills, if
appropriate.
Cybersecurity exercises are a full test of an organization's
cybersecurity regime and would include substantial and active
participation of cybersecurity personnel. The participants may include
local, State, and Federal Government personnel. Cybersecurity exercises
would generally test and evaluate the organizational capacity to manage
a combination of elements in the Cybersecurity Plan, such as detecting,
responding to, and mitigating a cyber incident.
The exercises would be required at least once each calendar year,
with no more than 18 months between exercises. Exercises may be
specific to a facility, OCS facility, or a U.S.-flagged vessel, or may
serve as part of a cooperative exercise program or port exercises. The
exercises for the Cybersecurity Plans could be combined with other
required security exercises, if appropriate.
The proposed drill or exercise requirements specified in this
section may be satisfied by implementing cybersecurity measures
required by the VSP, FSP, OCS FSP, and Cybersecurity Plan after a cyber
incident, as long as the vessel, facility, or OCS facility achieves and
documents the drill and exercise goals for the cognizant COTP or MSC.
Any corrective action must be addressed and documented as soon as
possible.
Section 101.640--Records and Documentation
This proposed section would require owners and operators to follow
the recordkeeping requirements in 33 CFR 104.235 for vessels, 33 CFR
105.225 for facilities, and 33 CFR 106.230 for OCS facilities. For
example, records must be kept for at least 2 years and be made
available to the Coast Guard upon request. The records can be kept in
paper or electronic format and must be protected against unauthorized
access, deletion, destruction, amendment, and disclosure. Records that
each vessel, facility, or OCS facility keep would vary because each
organization would maintain records specific to their operations. At a
minimum, the records would have to capture the following activities:
training, drills, exercises, cybersecurity threats, incidents, and
audits of the Cybersecurity Plan as set forth in the cited
recordkeeping requirements above and made applicable to records under
this subpart per Sec. 101.640.
Section 101.645--Communications
This proposed section would require the CySO to maintain an
effective means of communication to convey changes in cybersecurity
conditions to the personnel of the U.S.-flagged vessel, facility, or
OCS facility. In addition, the CySO is required to maintain an
effective and continuous means of communicating with their security
personnel, U.S.-flagged vessels interfacing with the facility or OCS
facility, the cognizant COTP, and national and local authorities with
security responsibilities.
Section 101.650--Cybersecurity Measures
This section proposes specific cybersecurity measures to identify
risks,
[[Page 13412]]
detect threats and vulnerabilities, protect critical systems, and
recover from cyber incidents. Any intentional gaps in cybersecurity
measures would be documented as accepted risks under proposed Sec.
101.630(c)(12). If the owner or operator is unable to comply with the
requirements of this subpart, they may seek a waiver or an equivalence
determination under proposed Sec. 101.665.
A discussion of each component of proposed Sec. 101.650 follows.
Section 101.650 Paragraph (a): Account Security Measures
This paragraph would identify minimum account measures to protect
critical IT and OT systems from unauthorized cyber access and limit the
risk of a cyber incident. Access control is a foundational category and
is highlighted as a ``Protect'' function of NIST's Cybersecurity
Framework (CSF).\38\ Existing regulations in Sec. Sec. 104.265,
105.255 through 105.260, and 106.260 through 106.265 prescribe control
measures to limit access to restricted areas and detect unauthorized
introduction of devices capable of damaging U.S.-flagged vessels, U.S.
facilities, OCS facilities, or ports. This proposed provision is
derived from NIST's standards mentioned earlier for the cyber domain
and establish minimum account security measures to manage credentials
and secure access to critical IT and OT systems. We invite your
comments on the minimal requirements proposed in Sec. 101.650(a).
---------------------------------------------------------------------------
\38\ NIST CSF, www.nist.gov/cyberframework/protect, accessed
July 18, 2023.
---------------------------------------------------------------------------
Account security measures for cybersecurity would include lockouts
on repeated failed login attempts, password requirements, multifactor
authentication, applying the principle of least privilege to
administrator or otherwise privileged accounts, and removing
credentials of personnel no longer associated with the organization.
Numerous consensus standards that are generally accepted employ similar
requirements.\39\ Together, these provisions would mitigate the risks
of brute force attacks, unauthorized access, and privilege escalation.
The owner or operator would be responsible for implementing and
managing these account security measures, including ensuring that user
credentials are removed or revoked when a user leaves the organization.
The CySO would ensure documentation of such measures in Section 7 of
the Cybersecurity Plan.
---------------------------------------------------------------------------
\39\ See, for example, NIST CSF: PR.AC, CIS Controls 1, 12, 15,
16, and COBIT DSS05.04, DSS05.10, DSS06.10, and ISA 62443-2-1.
---------------------------------------------------------------------------
Section 101.650 Paragraph (b): Device Security Measures
This paragraph would provide specific proposed requirements to
mitigate risks and vulnerabilities in critical IT and OT systems and
equipment. With increased connectivity to public internet, networks on
U.S.-flagged vessels, U.S. facilities, and OCS facilities have an
expansive attack surface. These provisions would reduce the risks of
unauthorized access, malware introduction, and service interruption.
This paragraph would apply the ``Identify'' function of the NIST
CSF.\40\ Existing regulations in 33 CFR 104.265, 105.255 through
105.260, and 106.260 through 106.265 are similar. For example, Sec.
105.260 limits access to areas that require a higher degree of
protection.
---------------------------------------------------------------------------
\40\ NIST CSF; Identify, ``NIST Cybersecurity Publication by
Category,'' Asset Management ID.AM, updated May 3, 2021,
www.nist.gov/cyberframework/identify, accessed July 18, 2023. NIST
Special Publication 800-53, Revision 5, ``Security and Privacy
Controls for Information Systems and Organizations,'' September
2020, page 107, https://doi.org/10.6028/NIST.SP.800-53r5, accessed
August 24, 2023.
---------------------------------------------------------------------------
Proposed paragraph (b) would also require owners and operators to
designate critical IT and OT systems.\41\ Developing and maintaining an
accurate inventory and network map would reduce the risk of unknown or
improperly managed assets. The Cybersecurity Plan would also govern
device management. The CySO would maintain the network map and develop
and maintain the list of approved hardware, software, and firmware. In
addition to identifying risks, these provisions would aid in the proper
lifecycle management of assets, including patching and end-of-life
management. These requirements are foundational to many industry
consensus standards and would reinforce Coast Guard regulations to
protect communication networks.
---------------------------------------------------------------------------
\41\ To help CySOs identify which systems are critical, the
Coast Guard's Office of Port and Facility Compliance (CG-FAC) has
published maritime specific CSF profiles on its homepage at
www.dco.uscg.mil/Our-Organization/Assistant-Commandant-for-Prevention-Policy-CG-5P/Inspections-Compliance-CG-5PC-/Office-of-Port-Facility-Compliance/Domestic-Ports-Division/cybersecurity/,
accessed July 18, 2023 and in pages 20 through 24 of Appendix A,
Maritime Bulk Liquid Transfer Profile at https://view.officeapps.live.com/op/view.aspx?src=https%3A%2F%2Fwww.dco.uscg.mil%2FPortals%2F9%2FCG-FAC%2FDocuments%2FCyber%2520Profiles%2520Overview.docx%3Fver%3D2018-01-10-143126-467&wdOrigin=BROWSELINK, accessed July 18, 2023.
---------------------------------------------------------------------------
Section 101.650 Paragraph (c): Data Security Measures
This paragraph would prescribe fundamental data security measures
that stem from the ``Protect'' function of the NIST CSF. Data security
measures protect personnel, financial, and operational data and are
consistent with basic risk management activities of the maritime
industry. The IMO recognizes the importance of risk management related
to data security on U.S.-flagged vessels,\42\ and the Coast Guard
previously highlighted data security measures in its policy for MTSA-
regulated U.S. facilities.\43\
---------------------------------------------------------------------------
\42\ MSC-FAL.1/Circ.3/Rev.1: ``Implement risk control processes
and measures, and contingency planning to protect against a cyber-
event and ensure continuity of shipping operations.''
\43\ NVIC 01-20 at page 2: ``Each facility should also determine
how, and where, its data is stored and, if it is stored offsite,
whether the data has a critical link to the safety and/or security
functions of the facility. If such a critical link exists, the
facility should address any vulnerabilities . . . . ''
---------------------------------------------------------------------------
Data security measures prevent data loss and aid in detection of
malicious activity on critical IT and OT systems. The fundamental
measures proposed here would establish baseline protections upon which
owners and operators could build. This paragraph would require data
logs to be securely captured, stored, and protected so that they are
accessible only by privileged users, and would require encryption for
data in transit and data at rest. CySOs would rely on generally
accepted industry standards and risk management principles to determine
the suitability of specific encryption algorithms for certain purposes,
such as protecting critical IT and OT data with a more robust algorithm
than for routine data.\44\ A CySO would establish more detailed data
security policies in Section 9 of the Cybersecurity Plan. Those
policies would be adapted to the unique operations of the U.S.-flagged
vessel, facility, or OCS facility.
---------------------------------------------------------------------------
\44\ See, for example, ISA 62443-3-3, CIS CSC 13, 14 in the EDM
NIST Cybersecurity Framework Crosswalks, available at www.cisa.gov/sites/default/files/publications/4_NIST_CSF_EDM_Crosswalk_v3_April_2020.pdf, accessed July 18, 2023.
---------------------------------------------------------------------------
Section 101.650 Paragraph (d): Cybersecurity Training for Personnel
This paragraph would specify proposed cybersecurity training
requirements. Security training is a vital aspect of the MTSA. Relevant
provisions in 33 CFR already require all personnel to have knowledge,
through training or equivalent job experience, in the ``Recognition and
detection of dangerous . . . devices.'' \45\ Since 2020, the Coast
Guard has interpreted this requirement to include relevant
cybersecurity training.\46\ While formal
[[Page 13413]]
training may be appropriate, the Coast Guard is not proposing to
mandate a format of training. However, the training would have to, at
minimum, cover relevant provisions of the Cybersecurity Plan to include
recognizing, detecting, and preventing cybersecurity threats; and
reporting cyber incidents to the CySO.
---------------------------------------------------------------------------
\45\ 33 CFR 104.225(c) (Vessels), 105.215(c) (Facilities), and
106.220(c) (OCS Facilities).
\46\ NVIC 01-20 ENCL(1) at page 3: ``Describe how cybersecurity
is included as part of personnel training, policies, and procedures,
and how this material will be kept current and monitored for
effectiveness.''
---------------------------------------------------------------------------
The types of training would also need to be consistent with the
roles and responsibilities of personnel, including access to critical
IT and OT systems and operating network-connected machineries. Key
cybersecurity personnel and management would need to have current
knowledge of threats to deal with potential cyber-attacks and
understand procedures for responding to a cyber incident. The owner,
operator, or CySO would ensure all personnel designated by the CySO
complete the core training within 5 days of gaining system access, but
no later than 30 days after hiring, and annually thereafter, and that
key personnel receive specialized training annually or more frequently
as needed. Existing personnel would be required to receive training on
relevant provisions of the Cybersecurity Plan within 60 days of the
Plan being approved, and for all other required training within 180
days of the effective date of a final rule, and annually thereafter.
(See Sec. 101.650(d)(3)).
Section 101.650 Paragraph (e): Risk Management
This paragraph would establish three levels of Cybersecurity
Assessment and risk management: (1) conducting annual Cybersecurity
Assessments; (2) completing penetration testing upon renewal of a VSP,
FSP, or OCS FSP; and (3) ensuring ongoing routine system maintenance.
The CySO would ensure that these activities, which are listed in
Sections 11 and 12 of the Cybersecurity Plan, are documented and
completed.
Following a Cybersecurity Assessment, the CySO would incorporate
feedback from the assessment into the Cybersecurity Plan through an
amendment to the Plan. A Cybersecurity Assessment would be conducted
within 1 year from the effective date of a final rule and annually
thereafter. The Assessment must be conducted sooner than annually in
the following circumstances:
There is a change in ownership of a U.S.-flagged vessel,
facility, or an OCS facility; or
There are major events requiring amendments to the
Cybersecurity Plan.
While Cybersecurity Assessments provide a valuable picture of
potential security weaknesses, penetration tests can add additional
context by demonstrating whether malicious actors could leverage those
weaknesses. Penetration tests can also help prioritize resources based
on what poses the most risk. Routine system maintenance requires an
ongoing effort to identify vulnerabilities and would include scanning
and reviewing known exploited vulnerabilities (KEVs) by documenting,
tracking, and monitoring them. These proposed provisions would mirror
the security system and equipment maintenance requirements in 33 CFR
104.260 for vessels, 33 CFR 105.250 for facilities, and 33 CFR 106.255
for OCS facilities, and reflect the Coast Guard's longstanding view on
cybersecurity. To improve risk management across the maritime sector,
CySOs would establish, subject to any applicable antitrust law
limitations,\47\ information-sharing procedures for their
organizations, which would include procedures to receive and act on
KEVs, as well as methods for sharing threat and vulnerability
information.
---------------------------------------------------------------------------
\47\ The sharing of competitively sensitive information between
or among competitors raises antitrust concerns. For example,
information sharing is not exempted under the Cybersecurity
Information Sharing Act of 2015 if the information shared results in
price fixing, market allocation, boycotting, monopolistic conduct,
or other collusive conduct.
---------------------------------------------------------------------------
The ``Protect'' function of the NIST CSF emphasizes the importance
of strong processes and procedures for protecting information.\48\ For
example, organizations would have to ensure information and records
(data) are managed consistently with the organization's risk strategy
to protect the confidentiality, integrity, and availability of
information. Risk management is key in protecting IT and OT components
that may include cybersecurity vulnerabilities in their design, code,
or configuration.
---------------------------------------------------------------------------
\48\ NIST CSF Internal Controls, Appendix A, Table A-1, PR.IP-
12, page 261, link.springer.com/content/pdf/bbm:978-1-4842-3060-2/1.pdf, accessed July 18, 2023.
---------------------------------------------------------------------------
Owners and operators may use information-sharing services or
organizations such as an Information Sharing and Analysis Center or an
Information Sharing and Analysis Organization. The Coast Guard would
not endorse specific information-sharing organizations, so owners and
operators would be free to use information-sharing organizations to
suit their needs.\49\ Industry consensus standards provide generally
accepted techniques that sanitize and reduce attribution to information
to ensure information sharing does not compromise proprietary business
information.\50\ In addition, regardless of the services or
organizations used, owners and operators should comply with applicable
antitrust laws and should not share competitively sensitive
information, such as price or cost data, that can result in unlawful
price-fixing, market allocation, or other forms of competitor
collusion. Use of any information-sharing services or organizations
would not meet or replace reporting requirements under 33 CFR 101.305.
---------------------------------------------------------------------------
\49\ The Coast Guard encourages CySOs to explore resources
through CGCYBER Maritime Cyber Readiness Branch, available at
https://www.uscg.mil/MaritimeCyber/; see also CISA's ``Information
Sharing and Awareness,'' available at https://www.cisa.gov/information-sharing-and-awareness, accessed July 18, 2023.
\50\ See, e.g., NIST Special Publication 800-150, ``Guide to
Cyber Threat Information Sharing,'' Johnson et al., October 2016,
nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-150.pdf,
accessed July 18, 2023.
---------------------------------------------------------------------------
The Coast Guard emphasized its commitment to helping maritime
industry stakeholders identify and address vulnerabilities in its 2021
Cyber Trends and Insights in the Marine Environment report.\51\ In that
report, the Coast Guard highlighted additional resources that CySOs
should leverage to manage cybersecurity vulnerabilities.
---------------------------------------------------------------------------
\51\ ``2021 Cyber Trends and Insights in the Marine
Environment,'' August 5, 2022, https://www.dco.uscg.mil/Portals/9/2021CyberTrendsInsightsMarineEnvironmentReport.pdf.
---------------------------------------------------------------------------
Section 101.650 Paragraph (f): Supply Chain
This proposed paragraph would include provisions to specify
measures to manage cybersecurity risks in the supply chain. Legitimate
third-party contractors and vendors may inadvertently provide a means
of attack or vectors that allow malicious actors to exploit
vulnerabilities within the supply chain. Section 1.1 of the NIST CSF
emphasizes managing cybersecurity risks in the supply chain as part of
the ``Identify'' function.\52\
---------------------------------------------------------------------------
\52\ NIST CSF, Version 1.1, ``ID.SC: Supply Chain Risk
Management,'' https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-sc/, accessed July 18, 2023.
---------------------------------------------------------------------------
Under this proposed paragraph, the owner, operator, or CySO would
ensure that measures to manage cybersecurity risks in the supply chain
are in place to mitigate the risks associated with external parties.
These measures would include considering cybersecurity capabilities in
selecting vendors,
[[Page 13414]]
establishing procedures for information sharing and notifying relevant
parties, and monitoring third-party connections.
Through their contractual agreements, vendors would ensure the
integrity and security of software and hardware, such as software
releases and updates, notifications, and mitigations of
vulnerabilities. These provisions would establish a minimum level of
CRM within the supply chain. Industry standards provide additional
measures.\53\ The IMO also recognizes that cybersecurity risks in the
supply chain, and these provisions would align with the guidelines and
recommendations referenced in MSC-FAL Circ. 3/Rev.1.\54\
---------------------------------------------------------------------------
\53\ See, for example, NIST Special Publication 800-161,
``Supply Chain Risk Management Practices for Federal Information
Systems and Organizations,'' May 2022, https://doi.org/10.6028/NIST.SP.800-161r1, accessed July 18, 2023.
\54\ MSC-FAL.1/Circ.3/Rev.1, 2.1.6 and 4.2; see footnote 28.
---------------------------------------------------------------------------
Section 101.650 Paragraph (g): Resilience
This paragraph proposes a few key activities to ensure that U.S.-
flagged vessels, facilities, and OCS facilities can recover from major
cyber incidents with minimal impact to critical operations. Provisions
under response and recovery can help an organization recover from a
cyber-attack and restore capabilities and services.
This proposed rule would require the owner, operator, or CySO to
ensure the following response and recovery activities: report any cyber
incidents to the Coast Guard; develop, implement, maintain, and
exercise the Cyber Incident Response Plan; periodically validate the
effectiveness of the Cybersecurity Plan; and perform backups of
critical IT and OT systems. The Coast Guard would accept review of a
cyber incident as meeting the periodic validation requirement in Sec.
101.650(g).
In addition, the NIST CSF describes numerous provisions within the
``Recover'' function aimed at improving response and recovery.\55\ The
IMO also notes resilience.\56\
---------------------------------------------------------------------------
\55\ NIST CSF, Version 1.1 ``RC: Recover,'' https://csf.tools/reference/nist-cybersecurity-framework/v1-1/rc/, accessed July 19,
2023.
\56\ MSC-FAL Circ. 3/Rev. 1, 3.5.5; see footnote 28.
---------------------------------------------------------------------------
Section 101.650 Paragraph (h): Network Segmentation
This paragraph would require a CySO to ensure the network is
segmented and to document those activities in the Cybersecurity Plan.
Network integrity is a key provision under the ``Protect'' function of
the NIST CSF.\57\ Network architectures vary widely based on the
operations of a vessel or facility. Separating IT and OT networks is
challenging, and it becomes increasingly difficult with an increase in
the various devices connected to the network. Network segmentation
ensures valuable information is not shared with unauthorized users and
decreases damage that can be caused by malicious actors. Nonetheless,
the Coast Guard recognizes that the IT and OT interface represents a
weak link. Industry standards in this area are evolving, and it is an
area that NIST continues to research.\58\
---------------------------------------------------------------------------
\57\ NIST CSF, Version 1.1, ``PR.AC-5: Network integrity is
protected (e.g., network segregation, network segmentation).''
csf.tools/reference/nist-cybersecurity-framework/v1-1/pr/pr-ac/pr-
ac-5/, accessed July 19, 2023.
\58\ See NIST Special Publication 800-82r3,'' Guide to
Operational Technology (OT) Security,'' draft published April 26,
2022; doi.org/10.6028/NIST.SP.800-82r3.ipd, accessed July 19, 2023.
---------------------------------------------------------------------------
Section 101.650 Paragraph (i): Physical Security
This paragraph would specify that, along with the cybersecurity
provisions proposed for inclusion in this part, owners, operators, and
CySOs would manage physical access to IT and OT systems. As described
in the ``Protect'' function of the NIST CSF, physical security protects
critical IT and OT systems by limiting access to the human-machine
interface (HMI).\59\ Physical security measures proposed here would
supplement the existing vessel security assessment (VSA), FSA, and OCS
FSA requirements in 33 CFR 104.270 for vessels, 33 CFR 105.260 for
facilities, and 33 CFR 106.260 for OCS facilities. Similarly, under
this proposed paragraph, the CySO would designate areas restricted to
authorized personnel and secure HMIs and other hardware. Also under
this proposed paragraph, the CySO would establish policies to restrict
the use of unauthorized media and hardware. These proposed provisions
would mirror existing Coast Guard policy outlined in NVIC 01-20.\60\
---------------------------------------------------------------------------
\59\ NIST CSF, Version 1.1, ``PR.AC-2: Physical Access to Assets
is Managed and Protected.'' csf.tools/reference/nist-cybersecurity-
framework/v1-1/pr/pr-ac/pr-ac-2/, accessed July 19, 2023.
\60\ NVIC 01-20, enclosure (1), at page 4: ``Security measures
for access control 33 CFR 105.255 and 106.260 Establish security
measures to control access to the facility. This includes cyber
systems that control physical access devices such as gates and
cameras, as well as cyber systems within secure or restricted areas,
such as cargo or industrial control systems. Describe the security
measures for access control.'' (85 FR 16108).
---------------------------------------------------------------------------
Section 101.655--Cybersecurity Compliance Dates
This proposed section would state that a Cybersecurity Plan as
required by this proposed rule would be made available to the Coast
Guard for review during the second annual audit of the existing,
approved VSP, OCS FSP, or FSP after the effective date of a final rule,
as required by 33 CFR 104.415 for vessels, 33 CFR 105.415 for
facilities, and 33 CFR 106.415 for OCS facilities. The intent of this
proposed implementation period is to allow adequate time for owners and
operators to develop a Cybersecurity Plan.
Section 101.660--Cybersecurity Compliance Documentation
This proposed section would allow the Coast Guard to verify an
approved Cybersecurity Plan for U.S.-flagged vessels, facilities, and
OCS facilities. Each owner or operator would ensure that the
cybersecurity portion of their Plan and penetration test results are
available to the Coast Guard upon request.
Section 101.665--Noncompliance, Waivers, and Equivalents
This proposed section would provide the opportunity for waiver and
equivalence determinations for owners and operators when they are
unable to meet the requirements in subpart F, as outlined in 33 CFR
104.130, 104.135, 105.130, 105.135, and 106.130, to include the
cybersecurity regulations proposed in this NPRM. It would also expand
temporary permission provisions in 33 CFR 104.125, 105.125, and
106.120.
Section 101.670--Severability
This proposed section would reflect the Coast Guard's intent that
the provisions of subpart F be considered severable from each other to
the greatest extent possible. For instance, if a court of competent
jurisdiction were to hold that the rule or a portion thereof may not be
applied to a particular owner or operator or in a particular
circumstance, the Coast Guard would intend for the court to leave the
remainder of the rule in place with respect to all other covered
persons and circumstances. The inclusion of a severability clause in
subpart F would not be intended to imply a position on severability in
other Coast Guard regulations.
Inviting Comments on Regulatory Harmonization
As noted by the Office of the National Cyber Director in an August
2023 Request for Information,\61\ the National Cybersecurity Strategy
\62\ calls for
[[Page 13415]]
establishing cybersecurity regulations to secure critical
infrastructure where existing measures are insufficient, harmonizing
\63\ and streamlining new and existing regulations, and enabling
regulated entities to afford to achieve security.
---------------------------------------------------------------------------
\61\ See 88 FR 55694 (Aug. 16, 2023).
\62\ See The White House, National Cybersecurity Strategy (Mar.
2023), https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf. (accessed Sept. 19, 2023).
\63\ As used in this context, ``harmonization'' refers to a
common set of updated baseline regulatory requirements that would
apply across sectors. Sector regulators such as the Coast Guard may
appropriately go beyond the harmonized baseline to address
cybersecurity risks specific to their sectors. See 88 FR at 55694.
---------------------------------------------------------------------------
The Coast Guard emphasizes its commitment to regulatory
harmonization and streamlining, and notes that this proposed rule,
which is grounded in NIST's Framework for Improving Critical
Infrastructure Cybersecurity, NIST's standards and best practices, and
CISA's CPGs, is consistent with such priorities. The Coast Guard also
acknowledges the ongoing rulemakings of other DHS components, including
ongoing rulemakings on cybersecurity in surface transportation modes
\64\ and implementation of CIRCIA.\65\ The Coast Guard notes potential
differences in terminology and policy as compared to those rulemakings;
although the Coast Guard views such differences as intentional and
based on sector-specific distinctions, we welcome comments on
opportunities to harmonize and streamline regulations where feasible
and appropriate. Note that proposed Sec. 101.665, Noncompliance,
Waivers, and Equivalents, could offer stakeholders an option for
requesting compliance that is harmonized with similar requirements.
---------------------------------------------------------------------------
\64\ See TSA, Fall 2023 Unified Agenda, RIN 1652-AA74: Enhancing
Surface Cyber Risk Management, https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202310&RIN=1652-AA74 (accessed Jan. 19, 2024).
\65\ See CISA, Fall 2023 Unified Agenda, RIN 1670-AA04:
Cybersecurity Incident Reporting for Critical Infrastructure Act
Regulations, https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202310&RIN=1670-AA04 (accessed Jan. 19, 2024).
---------------------------------------------------------------------------
Inviting Comments on Whether To Amend 33 CFR 160.202--Definitions
The Coast Guard invites comments on whether we should amend the
definition of hazardous condition in 33 CFR 160.202 to help address
current and emerging cybersecurity threats to the MTS. The amendment
would likely add ``cyber incident (as defined in Sec. 101.615 of this
chapter),'' to other existing examples of hazardous conditions--such as
collision, allision, fire, explosion, grounding, leaking, damage, and
personnel injury. Although a hazardous condition as currently defined
can already involve a cyber incident, this amendment would clearly link
the definition of a hazardous condition to the concept of a cyber
incident.
Under 33 CFR 160.216, the owner, agent, master, operator, or person
in charge of a vessel must immediately notify the Coast Guard of
certain hazardous conditions. A hazardous condition either on board the
vessel or caused by the vessel or its operation would be reported by
the vessels listed in 33 CFR 160.203. Under the existing regulations,
this reporting requirement already applies to U.S. commercial service
vessels and all foreign vessels that are bound for or departing from
ports or places within the navigable waters of the United States.
If we amend the definition of hazardous condition in Sec. 160.202,
we would consider a cyber incident report under part 160 satisfied by
those subject to 33 CFR part 101, subpart F, who report the incident
consistent with Sec. 101.620(b)(7). Given the variety of hazardous
conditions, for response purposes, it is best that such conditions be
reported to the nearest Coast Guard Sector Office or Group Office. The
Coast Guard would ensure that such officials are advised of relevant
cyber incidents reported by vessels subject to 33 CFR part 101, subpart
F.
VI. Regulatory Analyses
We developed this proposed rule after considering numerous statutes
and Executive orders related to rulemaking. A summary of our analyses
based on these statutes or Executive orders follows.
A. Regulatory Planning and Review
Executive Order 12866 (Regulatory Planning and Review), as amended
by Executive Order 14094 (Modernizing Regulatory Review), and Executive
Order 13563 (Improving Regulation and Regulatory Review), direct
agencies to assess the costs and benefits of available regulatory
alternatives and, if regulation is necessary, to select regulatory
approaches that maximize net benefits (including potential economic,
environmental, public health and safety effects, distributive impacts,
and equity). Executive Order 13563 emphasizes the importance of
quantifying costs and benefits, reducing costs, harmonizing rules, and
promoting flexibility.
This proposed rule is a significant regulatory action under section
3(f) of Executive Order 12866, as amended by Executive Order 14094, but
it is not significant under section 3(f)(1) because its annual effects
on the economy do not exceed $200 million in any year of the analysis.
Accordingly, OMB has reviewed this proposed rule. A regulatory impact
analysis (RIA) follows.
In accordance with OMB Circular A-4 (available at
www.whitehouse.gov/omb/circulars/), we have prepared an accounting
statement showing the classification of impacts associated with this
proposed rule.\66\
---------------------------------------------------------------------------
\66\ The version of Circular A-4 issued November 9, 2023, is not
effective until March 24, 2024. Therefore, this new version does not
apply to this NPRM because this proposed rule was submitted to OIRA
on November 13, 2023.
---------------------------------------------------------------------------
Agency/Program Office: U.S. Coast Guard.
Rule Title: Cybersecurity in the Marine Transportation System.
RIN#: 1625-AC77.
Date: July 2023 (millions, 2022 dollars).
BILLING CODE
[[Page 13416]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.000
The Coast Guard proposes to update its maritime security
regulations by adding minimum cybersecurity requirements to 33 CFR part
101 for U.S.-flagged vessels subject to part 104, facilities subject to
part 105, and OCS
[[Page 13417]]
facilities subject to part 106. Specifically, this proposed rule would
require owners or operators of U.S.-flagged vessels, facilities, and
OCS facilities to develop an effective Cybersecurity Plan, which
includes actions to prepare for, prevent, and respond to threats and
vulnerabilities. One of these actions is to assign qualified personnel
to implement the Cybersecurity Plan and all activities within the Plan.
The Cybersecurity Plan would include: designating a CySO; conducting a
Cybersecurity Assessment; developing and submitting the Plan to the
Coast Guard for approval; operating a U.S.-flagged vessel, facility,
and OCS facility in accordance with the Plan; implementing security
measures based on new cybersecurity vulnerabilities; and reporting
cyber incidents to the NRC, as defined in this preamble.
This proposed rule would further require owners and operators of
U.S.-flagged vessels, U.S. facilities, and OCS facilities to perform
cybersecurity drills and exercises in accordance with their VSP, FSP,
and OCS FSP. Owners and operators of U.S.-flagged vessels, facilities,
and OCS facilities would also be required to maintain records of
cybersecurity related information in paper or electronic format.
Lastly, this proposed rule would require certain cybersecurity
measures to identify risks, detect threats and vulnerabilities, protect
critical systems, and to recover from cyber incidents. These measures
include account security measures, device security measures, data
security measures, cybersecurity training for personnel, risk
management, supply chain risk measures, penetration testing, resilience
measures, network segmentation, and physical security.
Baseline Summary
The Coast Guard is not codifying existing guidance in this NPRM.
The requirements of this proposed rule and the costs and benefits we
estimate in this RIA would be new. The Coast Guard drafted the
requirements of this proposed rule based on NIST's Framework for
Improving Critical Infrastructure Cybersecurity, NIST's standards and
best practices, and CISA's CPGs.
In February 2020, the Coast Guard issued NVIC 01-20, which provided
clarity and guidance for MTSA-regulated facility and OCS facility
owners and operators regarding existing requirements in the MTSA for
computer systems and network vulnerabilities. However, the NVIC does
not contain cybersecurity requirements for facility and OCS facility
owners. Furthermore, the NVIC does not address the topic of
cybersecurity for vessel owners and operators.
The IMO has issued other guidance on Cybersecurity in the past 6
years. In 2017, the IMO adopted resolution MSC.428(98) to the ISM Code
on ``Maritime Cyber Risk Management in Safety Management Systems
(SMS).'' Generally, this resolution states that an SMS should consider
CRM and encourages Administrations to appropriately address cyber risks
in an SMS by a certain date, in accordance with the ISM Code. In 2022,
the IMO provided further guidance on maritime CRM in MSC-FAL.1/Circ.3-
Rev.2, Guidelines on Maritime Cyber Risk Management, in an effort to
raise the awareness about cybersecurity risks.
In addition, survey data indicates that some portions of the
affected population of facility and OCS facility owners and operators
are already implementing cybersecurity measures consistent with select
provisions of the proposed rule, including 87 percent who have
implemented account security measures, 83 percent who have implemented
multifactor authentication, 25 percent who have implemented annual
cybersecurity training, and 68 percent who conduct penetration
tests.\67\ While we lack similar data on cybersecurity activities in
the affected population of U.S.-flagged vessels, we acknowledge that it
is likely that many owners and operators have implemented cybersecurity
measures in response to private incentives and increasing cybersecurity
risks over time. For the purposes of this analysis, however, we assume
that owners and operators have no baseline cybersecurity activity, in
the areas in which we lack data.
---------------------------------------------------------------------------
\67\ In this analysis, the Coast Guard references a survey
conducted by Jones Walker, a limited liability partnership (Jones
Walker LLP). The title of the survey is ``Ports and Terminals
Cybersecurity Survey,'' which they conducted in 2022. This survey
helped the Coast Guard to gain an understanding of the cybersecurity
measures that are currently in place at facilities and OCS
facilities in the United States. We cite relevant data from the
survey when calculating industry costs throughout the regulatory
analysis. Readers can access the survey at https://www.joneswalker.com/en/insights/2022-Jones-Walker-LLP-Ports-and-Terminals-Cybersecurity-Survey-Report.html; accessed July 19, 2023.
---------------------------------------------------------------------------
Estimated Costs of the Proposed Rule
We estimate the total discounted costs of this proposed rule to
industry and the Federal Government to be approximately $562,740,969
over a 10-year period of analysis, using a 7-percent discount rate. We
estimate the annualized cost to be approximately $80,121,654, using a
7-percent discount rate. See table 2.
BILLING CODE
[[Page 13418]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.001
We present a summary of the impacts of this proposed rule in table
3.
[GRAPHIC] [TIFF OMITTED] TP22FE24.002
[[Page 13419]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.003
[[Page 13420]]
Affected Population
This proposed rule would affect owners and operators of U.S.-
flagged vessels subject to 33 CFR part 104 (Maritime Security:
Vessels), facilities subject to 33 CFR part 105 (Maritime Security:
Facilities), and OCS facilities subject to 33 CFR part 106 (Marine
Security: Outer Continental Shelf (OCS) Facilities). The Coast Guard
estimates this proposed rule would affect approximately 10,286 vessels
and 3,411 facilities (including OCS facilities).
The affected U.S.-flagged vessel population includes:
U.S. towing vessels greater than 8 meters (26 feet) in
registered length inspected under 46 CFR, subchapter M that are engaged
in towing a barge or barges inspected under 46 CFR, subchapters D and
O;
U.S. tankships inspected under 46 CFR, subchapters D and
O;
U.S. barges inspected under 46 CFR, subchapters I
(includes combination barges), D, and O, carrying certain dangerous
cargo in bulk or barges and engaged on international voyages;
Small U.S. passenger vessels carrying more than 12
passengers, including at least 1 passenger-for-hire, that are engaged
on international voyages;
Small U.S. passenger vessels inspected under 46 CFR,
subchapter K that are certificated to carry more than 150 passengers;
Large U.S. passenger vessels inspected under 46 CFR,
subchapter H;
Offshore supply vessels (OSVs) inspected under 46 CFR,
subchapter L;
Self-propelled U.S. cargo vessels greater than 100 gross
register tons inspected under 46 CFR, subchapter I, except for
commercial fishing vessels inspected under 46 CFR part 105; and
U.S. MODUs and cargo or passenger vessels subject to SOLAS
(1974), Chapter XI-1 or Chapter XI-2.
The affected facility population includes:
Facilities subject to 33 CFR parts 126 (Handling of
Dangerous Cargo at Waterfront Facilities) and 127 (Waterfront
Facilities Handling Liquefied Natural Gas and Liquefied Hazardous Gas);
Facilities that receive vessels certificated to carry more
than 150 passengers, except vessels not carrying and not embarking or
disembarking passengers at the facility;
Facilities that receive vessels subject to SOLAS (1974),
Chapter XI;
Facilities that receive foreign cargo vessels greater than
100 gross register tons;
Facilities that receive U.S. cargo vessels, greater than
100 gross register tons, inspected under 46 CFR, subchapter I, except
facilities that receive only commercial fishing vessels inspected under
46 CFR part 105; and
Barge fleeting facilities that receive barges carrying, in
bulk, cargoes regulated by 46 CFR subchapter I, inspected under 46 CFR,
subchapters D or O, or certain dangerous cargoes.
Table 4 presents the affected population of U.S.-flagged vessels,
facilities, and OCS facilities of this proposed rule.\68\ For the
vessel population, the Coast Guard assumes the same number of vessels
that leave and enter service. Therefore, we assume the population to be
constant over the 10-year period of analysis. We also make the same
assumption for facilities and OCS facilities. Additionally, we assume
that changes in the ownership of vessels and facilities would be very
rare and any audits that would result from a change in ownership would
be accounted for by the annual audit requirements. We request public
comments on these assumptions, and generally, on the affected
population.
---------------------------------------------------------------------------
\68\ This data was retrieved from the Coast Guard's Marine
Information for Safety and Law Enforcement (MISLE) database in
September 2022.
---------------------------------------------------------------------------
[[Page 13421]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.004
[[Page 13422]]
Cost Analysis of the Proposed Rule
This proposed rule would impose costs on the U.S. maritime industry
for cybersecurity requirements that include:
Developing a Cybersecurity Plan, which includes
designating a CySO, in proposed 33 CFR 101.630;
Performing drills and exercises in proposed 33 CFR
101.635; and
Ensuring and implementing cybersecurity measures in
proposed 33 CFR 101.650, such as account security measures, device
security measures, data security measures, cybersecurity training for
personnel, training for reporting an incident, risk management, supply
chain management, resilience, network segmentation, and physical
security.
We present the costs associated with some of the regulatory
provisions in the following analysis; however, we are not able to
estimate the costs fully for certain provisions because of the lack of
data and the uncertainty associated with these provisions. Also, some
regulatory provisions may be included in developing the Cybersecurity
Plan and maintaining it on an annual basis; therefore, we may not have
estimated a cost for these specific provisions in this analysis. We
clarify this in the analysis where applicable and request public
comment regarding these analyses.
In addition, U.S. barges inspected under 46 CFR, subchapters D, O,
or I (including combination barges), carrying certain dangerous cargo
in bulk or barges engaged on international voyages, represent a special
case in our analysis of cybersecurity-related costs. Unlike other
vessels in the affected population of this NPRM, in most cases, barges
do not have IT or OT systems onboard. Many types of barges rely on the
IT and OT systems onboard their associated towing vessels or the
facilities where they deliver their cargo. This also means that barges
are typically unmanned, making the costs associated with provisions
such as cybersecurity training difficult to estimate. While we
acknowledge that there are some barges with IT or OT systems onboard,
for the purposes of this analysis, we calculate costs only for the
affected population of barges related to developing, resubmitting,
maintaining, and auditing the Cybersecurity Plan, as well as developing
cybersecurity-related drill and exercise components.
We believe that the hour-burden estimates associated with the
components of the Cybersecurity Plan should still be sufficient to
capture the implementation of any cybersecurity measures identified as
necessary by the owner or operator of a barge. In addition, we believe
it should capture any burden associated with requests for waivers or
equivalents for provisions that would not apply to a vessel or vessel
company lacking significant IT or OT systems. The Coast Guard requests
comment on our assumptions and cost estimates related to barges and
their cybersecurity activities.
Cybersecurity Plan Costs
Each owner and operator of a U.S.-flagged vessel, facility, or OCS
facility would be required to develop and submit a Cybersecurity Plan
to the Coast Guard. The CySO would develop, implement, and verify a
Cybersecurity Plan for each U.S.-flagged vessel, facility, or OCS
facility. The owner or operator would submit the Plan for approval to
the cognizant COTP or the OCMI for a facility or OCS facility, or to
the MSC for a U.S.-flagged vessel. The contents of the Cybersecurity
Plan are detailed in proposed Sec. 101.630.
Unless otherwise stated, we used information and obtained estimates
in this RIA from subject matter experts (SMEs) in the Coast Guard's
offices of Design and Engineering Standards (CG-ENG), Commercial Vessel
Compliance (CG-CVC), and Port and Facility Compliance (CG-FAC). We also
obtained information from the U.S. Coast Guard Cyber Command (CGCYBER)
and the National Maritime Security Advisory Committee (NMSAC).
The Coast Guard acknowledges that some owners and operators of
medium-sized and larger facilities, OCS facilities, and U.S.-flagged
vessels may have already adopted a cybersecurity posture and
implemented measures to counter and prevent a cyber incident. We also
acknowledge that owners and operators of smaller facilities, OCS
facilities, and U.S.-flagged vessels may not have any cybersecurity
measures in place. For the purpose of this analysis, we assume that all
owners or operators of facilities, OCS facilities, and U.S.-flagged
vessels would be required to comply with the full extent of the
requirements of this proposed rule. However, we have survey data
indicating that a portion of owners and operators of affected
facilities and OCS facilities already have some cybersecurity measures
in place.\69\ We present this survey data in the applicable sections of
the cost analysis. For other regulatory provisions, we do not estimate
regulatory costs for industry because the Coast Guard does not have
data on the extent of cybersecurity measures currently in the industry
for these provisions. The Coast Guard requests owners and operators of
facilities, OCS facilities, and U.S.-flagged vessels who have some or
most of the required cybersecurity processes and procedures in their
current operations to provide comments on the outlining processes and
procedures they have implemented.
---------------------------------------------------------------------------
\69\ Readers can access the survey at https://www.joneswalker.com/en/insights/2022-Jones-Walker-LLP-Ports-and-Terminals-Cybersecurity-Survey-Report.html; accessed July 19, 2023.
---------------------------------------------------------------------------
We list the regulatory provisions included in developing and
maintaining a Cybersecurity Plan that we did not estimate costs for in
other sections of this RIA:
Device security measures in Sec. 101.650(b)(1) through
(4);
Supply chain management in Sec. 101.650(f)(1) through
(3);
Cybersecurity Assessment in Sec. 101.650(e)(1);
Documentation of penetration testing results and
identified vulnerabilities in Sec. 101.650(e)(2);
Routine system maintenance measures in Sec.
101.650(e)(3)(i) through (v); and
Development and maintenance of a Cyber Incident Response
Plan in Sec. 101.650(g)(2).
Developing a Cybersecurity Plan has five cost components: the
initial development of the Plan; annual maintenance of the Plan
(including amendments); revision and resubmission of the Plan as
needed; renewal of the Plan after 5 years; and the cost for annual
audits. Owners and operators of U.S.-flagged vessels, facilities, and
OCS facilities would be required to submit their Cybersecurity Plan to
the Coast Guard during the second annual audit of the currently
approved VSP, FSP, or OCS FSP following the effective date of this
proposed rule; therefore, submitting a Cybersecurity Plan for approval
would likely not occur until the second year of the 10-year period of
analysis.
The CySO would be responsible for all aspects of developing and
maintaining the Cybersecurity Plan. The Coast Guard does not have data
on whether owners and operators of facilities, OCS facilities, and
vessels would hire a dedicated, salaried employee to serve as a CySO.
Proposed Sec. 101.625 states that a CySO may perform other duties
within an owner or operator's organization, and that a person may serve
as a CySO for more than one U.S.-flagged vessel, facility, or OCS
facility. For facilities and OCS facilities, this person may be the
Facility Security Officer. For vessels, this person may be the Vessel
Security Officer. When considering assigning the CySO role to the
existing security officer, the owner or operator should consider the
[[Page 13423]]
depth and scope of these new responsibilities in addition to existing
security duties. For the purpose of this analysis, we assume that an
existing person in a facility, OCS facility, or U.S.-flagged vessel
company or organization would assume the duties and responsibilities of
a CySO, and that owners and operators would not have to hire an
individual to fill this position. This means that any costs associated
with obtaining security credentials (including a Transportation Worker
Identification Card) would already be incurred prior to the
implementation of this proposed rule. Additionally, in the event that
the designated CySO has security responsibilities that overlap with an
existing Vessel, Facility, or Company Security Officer, we assume that
those individuals will work together to handle those duties.
We use the Bureau of Labor Statistics' (BLS) ``National
Occupational Employment and Wage Estimates'' for the United States for
May 2022. A CySO would be comparable to the occupational category of
``Information Security Analysts'' according to BLS's labor categories
with an occupational code of 15-1212 and an unloaded mean hourly wage
rate of $57.63.\70\ In order to obtain a loaded mean hourly wage rate,
we use BLS's ``Employer Costs for Employee Compensation'' database to
calculate the load factor, which we applied to the unloaded mean hourly
wage rate using fourth quarter data from 2022.\71\ We determine the
load factor for this occupational category to be about 1.46, rounded.
We then multiply this load factor by the unloaded mean hourly wage rate
of $57.63 to obtain a loaded mean hourly wage rate of about $84.14,
rounded ($57.63 x 1.46).
---------------------------------------------------------------------------
\70\ Readers can access BLS's website at https://www.bls.gov/oes/2022/may/oes151212.htm to obtain information about the wage we
used in this analysis; accessed May 5, 2023.
\71\ A loaded mean hourly wage rate is what a company pays per
hour to employ a person, not the hourly wage an employee receives.
The loaded mean hourly wage rate includes the cost of non-wage
benefits (health insurance, vacation, etc.). We calculated the load
factor by accessing BLS's website at https://www.bls.gov/ and
selecting the topic ``Subjects'' from the menu on this web page.
From the categories listed on this page, under the category titled
``Pay and Benefits,'' we then selected the category of ``Employment
Costs.'' The next page is titled ``Employment Cost Trends;'' in the
left margin, we selected the category ``ECT Databases'' at https://www.bls.gov/ncs/ect/data.htm. At this page, we selected the database
titled ``Employer Costs for Employee Compensation'' using the
``Multi-Screen'' feature at https://data.bls.gov/cgi-bin/dsrv?cm. We
then selected the category of ``Private Industry Workers'' at screen
1. At screen 2, we first selected the category ``Total
Compensation,'' then we continued to select ``Transportation and
Materials Moving Occupations'' at screen 3, then ``All Workers'' at
screens 4 and 5, and then for ``Area,'' we selected ``United
States'' at screen 6. At screen 7, we selected the category
``Employer Cost for Employee Compensation.'' At screen 8, we
selected the category ``not seasonally adjusted.'' At screen 9, we
selected the series ID, CMU2010000520000D. We used the ``Cost of
Compensation'' for quarter 4 of 2022, or $33.07. We performed this
process again to obtain the value for ``Wages and Salaries,'' which
we selected on screen 2. On screen 9, we selected the series ID
CMU2020000520000D and obtained a value of $22.64. We divided $33.07
by $22.64 and obtained a load factor of 1.46, rounded; accessed May
3, 2023.
---------------------------------------------------------------------------
Cybersecurity Plan Cost for Facilities and OCS Facilities
This proposed rule would require owners and operators of facilities
and OCS facilities to create a Cybersecurity Plan for each facility
within a company. For the purpose of this analysis, the cost to develop
a Cybersecurity Plan is a function of the number of facilities, not the
number of owners and operators, because an owner or operator may own
more than one facility. Based on data obtained from the Coast Guard's
Marine Information for Safety and Law Enforcement (MISLE) database, we
estimate this NPRM would affect about 3,411 facilities and OCS
facilities (including MTSA-regulated facilities), and about 1,708
owners and operators of these facilities. MISLE data contains
incomplete information on owners and operators for 748 of the 3,411
facilities and OCS facilities included in the affected population. Of
the 2,663 facilities and OCS facilities with complete information for
owners and operators, we found 1,334 unique owners. This means that, on
average, each owner owns approximately 2 facilities (2,663 / 1,334 =
2.0, rounded). We apply this rate of ownership to the remaining
facilities and OCS facilities without complete ownership information to
arrive at our total of 1,708 owners [1,334 + (748 / 2)].
We use hour-burden estimates from Coast Guard SMEs and the
currently approved OMB Information Collection Request (ICR), Control
Number 1625-0077, titled, ``Security Plans for Ports, Vessels,
Facilities, and Outer Continental Shelf Facilities and other Security-
Related Requirements.'' The hour-burden estimates are 100 hours for
developing the Cybersecurity Plan (average hour burden), 10 hours for
annual maintenance of the Cybersecurity Plan (which would include
amendments), 15 hours to resubmit Cybersecurity Plans every 5 years,
and 40 hours to conduct annual audits of Cybersecurity Plans.
While the Cybersecurity Plan can be incorporated into an existing
FSP for a facility or OCS facility, this does not mean that the
Cybersecurity Plan is expected to be less complex to develop or
maintain than an FSP. In general, the provisions outlined in this
proposed rule are meant to reflect the depth and scope of the physical
security provisions established by MTSA. As a result, we feel the hour-
burden estimates for developing and maintaining the FSP represents a
fair proxy for what is expected with respect to a Cybersecurity Plan.
Nevertheless, the Coast Guard requests comment on the accuracy of these
hour-burden estimates as they relate to developing a Cybersecurity
Plan.
Based on estimates from the Coast Guard's FSP reviewers at local
inspections offices, approximately 10 percent of Plans would need to be
revised and resubmitted in the second year, which is consistent with
the current resubmission rate for FSPs. Plans must be renewed after 5
years (occurring in the seventh year of the analysis period), and we
estimate that 10 percent of renewals would also require revision and
resubmission. We estimate the time to revise and resubmit the
Cybersecurity Plan to be about half the time to develop the Plan
itself, or 50 hours in the second year of submission, and 7.5 hours
after 5 years (in the seventh year of the analysis period).
Because we include the annual Cybersecurity Assessment in the cost
to develop Cybersecurity Plans, and we do not assume that owners and
operators will wait until the second year of analysis to begin
developing the Plan or implementing related cybersecurity measures, we
divide the estimated 100 hours to develop Plans equally across the
first and second years of analysis. We estimate the first- and second-
year (the first year of Plan submission) undiscounted cost to develop a
Cybersecurity Plan for owners and operators of U.S. facilities and OCS
facilities to be about $28,700,154 (3,411 Plans x 100 hours x $84.14).
We estimate the second-year undiscounted cost for owners and operators
to resubmit Plans for facilities or OCS facilities (or to send
amendments) for corrections to be about $1,434,587 (341 Plans or
amendments x 50 hours x $84.14). Therefore, we estimate the total
undiscounted first- and second-year cost to facility and OCS facility
owners and operators to develop, submit, and resubmit a Cybersecurity
Plan to be approximately $30,134,741 ($28,700,154 + $1,434,587)).
In years 3 through 6 and years 8 through 10 of the analysis period,
owners and operators of U.S. facilities and OCS facilities would be
required to maintain their Cybersecurity Plans. This may include
recordkeeping and
[[Page 13424]]
documenting cybersecurity items at a facility or OCS facility, as well
as amending the Plan. The CySO would be required to maintain each Plan
for each facility or OCS facility. Maintaining the Plan does not occur
in the second year (initial year of Plan submission) or in the renewal
year, year 7 of the analysis period. We again obtain the hour-burden
estimate for the annual maintenance of Plans from ICR 1625-0077, which
is 10 hours.
In the same years of the analysis period, this proposed rule would
also require owners and operators of facilities and OCS facilities to
conduct annual audits. The audits would be necessary for owners and
operators of facilities and OCS facilities to identify vulnerabilities
(via the Cybersecurity Assessment) and to mitigate them.\72\ Audits
would also be necessary if there is a change in the ownership of a
facility, but because the costs for audits are estimated annually, this
should capture audits as a result of very rare changes in ownership
each year as well. The CySO would be responsible for ensuring the audit
of a Cybersecurity Plan. Based on input provided by Coast Guard SMEs
who review Plans at the Coast Guard, we estimate the time to conduct an
audit to be about 40 hours for each Plan. We estimate the undiscounted
cost for the annual maintenance of Cybersecurity Plans for facility and
OCS facility owners and operators to be approximately $2,870,015 (3,411
facility Plans x 10 hours x $84.14). We estimate the undiscounted cost
for annual audits of Cybersecurity Plans to be approximately
$11,480,062 (3,411 facility Plans x 40 hours x $84.14). We estimate the
total undiscounted annual cost each year in years 3 through 6 and 8
through 10 for Cybersecurity Plans to be approximately $14,350,077
($2,870,015 + $11,480,062).
---------------------------------------------------------------------------
\72\ The Jones Walker survey (see footnote 69) reports about 72
percent of ports and terminals conduct a risk assessment at least
once a year. We did not estimate a separate cost for this item
because the Coast Guard believes that a risk assessment can be a
part of an annual audit. Readers can access the survey at https://www.joneswalker.com/en/insights/2022-Jones-Walker-LLP-Ports-and-Terminals-Cybersecurity-Survey-Report.html; accessed July 19, 2023.
---------------------------------------------------------------------------
Because a Cybersecurity Plan approved by the Coast Guard is valid
for 5 years, in year 7 of the analysis period, owners and operators of
facilities and OCS facilities would be required to renew the approval
of their Plans with the Coast Guard. We use the hour-burden estimate in
ICR 1625-0077for renewing the Plan, which is 15 hours. The hour-burden
estimate for revision and resubmission of renewals is half of the
original hour-burden for renewals, or 7.5 hours. The CySO would be
responsible for resubmitting the Cybersecurity Plan to the Coast Guard
for renewal, including additional resubmissions because of corrections.
We estimate the undiscounted cost for renewing and resubmitting a
Cybersecurity Plan due to corrections to be approximately $4,520,211
[(3,411 facility Plans x 15 hours x $84.14) + (341 resubmitted facility
Plans x 7.5 hours x $84.14)].
We estimate the total discounted cost of this proposed rule for
developing Cybersecurity Plans for facility and OCS facility owners and
operators to be approximately $95,920,412 over a 10-year period of
analysis, using a 7-percent discount rate. We estimate the annualized
cost to be approximately $13,656,909, using a 7-percent discount rate.
See table 5.
[[Page 13425]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.005
[[Page 13426]]
Cybersecurity Plan Cost for U.S.-Flagged Vessels
The methodology for owners and operators of U.S.-flagged vessels to
develop a Cybersecurity Plan is the same as for U.S. facilities and OCS
facilities. We estimate the affected vessel population to be about
10,286. We estimate the number of owners and operators of these vessels
to be about 1,775.
We use estimates provided by Coast Guard SMEs and ICR 1625-0077 for
the hour-burden estimates for vessels as we did for facilities and OCS
facilities. The hour-burden estimates are 80 hours for developing the
Cybersecurity Plan, 8 hours for annual Plan maintenance, 12 hours to
renew the Plan every 5 years, and 40 hours to conduct annual audits of
Plans for vessels. Similar to facilities, 10 percent of all
Cybersecurity Plans for vessels would need to be resubmitted for
corrections in the second year (initial year of Plan submission), and
10 percent of Cybersecurity Plans for vessels would need to be revised
and resubmitted in the seventh year of the analysis period. Based on
information from Coast Guard SMEs, we estimate the time to make
corrections to the Plan in the second year would be about half of the
initial time to develop the Plan, or 40 hours in the second year, and 6
hours in the seventh year. We include the annual Cybersecurity
Assessment in the cost to develop Plans, and we do not assume that
owners and operators will wait until the second year of analysis to
begin developing the Cybersecurity Plan or implementing related
cybersecurity measures. Therefore, we divide the estimated 80 hours to
develop Plans equally across the first and second years of analysis.
The methodology to determine the cost to develop a Cybersecurity
Plan for U.S.-flagged vessels is slightly different than the
methodology for facilities and OCS facilities. The Coast Guard does not
believe that a CySO for U.S.-flagged vessels would expend 80 hours
developing a Plan for each vessel in a company's fleet. For example, if
a vessel owner or operator has 10 vessels, it would take a CySO 800
hours of time to develop Plans for all 10 vessels, which is nearly 40
percent of the total hours of work in a calendar year. It is more
likely that the CySO would create a master Cybersecurity Plan for all
the vessels in the fleet, and then tailor each Plan according to a
specific vessel, as necessary.
Because a large portion of the provisions required under this
proposed rule would impact company-wide policies regarding network,
account, and data security practices, as well as company-wide
cybersecurity training, reporting procedures, and testing, we do not
believe there will be much variation in how these provisions are
implemented between specific vessels owned by the same owner or
operator. Therefore, the cost to develop a Cybersecurity Plan for
vessels becomes a function of the number of vessel owners and operators
and not a function of the number of vessels.
When a vessel owner or operator submits a Plan to the Coast Guard
for approval, the owner or operator would send the master Cybersecurity
Plan, which might include a more tailored or abbreviated Plan for each
vessel. For example, the owner or operator of 10 vessels would send the
master Cybersecurity Plan along with the tailored Plans for each vessel
in one submission to the Coast Guard for approval, instead of 10
separate documents. The Coast Guard requests comments on these
assumptions related to master and tailored vessel Cybersecurity Plans.
We estimate the first- and second-year (initial year of Plan
submission) undiscounted cost for owners and operators of U.S.-flagged
vessels to develop a Cybersecurity Plan to be approximately $11,947,880
(1,775 Plans x 80 hours x $84.14) split over the first two years of
analysis. We estimate the second-year undiscounted cost for owners and
operators to resubmit vessel Plans (or send amendments) for corrections
to be approximately $599,077 (178 Plans or amendments x 40 hours x
$84.14). Therefore, we estimate the total undiscounted first- and
second-year cost to the owners and operators of U.S.-flagged vessels to
develop a Cybersecurity Plan to be approximately $12,546,957
($11,947,880 + $599,077).
As with facilities and OCS facilities, in years 3 through 6 and
years 8 through 10 of the analysis period, CySOs, on behalf of owners
and operators of U.S.-flagged vessels, would be required to maintain
their Cybersecurity Plans. We again obtain the hour-burden estimate for
annual maintenance of Plans from ICR 1625-0077, which is 8 hours. In
the same years of the analysis period, this proposed rule would also
require owners and operators of U.S.-flagged vessels to conduct annual
audits. The audits would be necessary for owners and operators of U.S.-
flagged vessels to identify vulnerabilities through the Cybersecurity
Assessment and to mitigate them. Audits would also be necessary if
there is a change in the ownership of a vessel. The CySO would likely
conduct an audit of the master Cybersecurity Plan, which would include
each vessel, instead of conducting a separate audit for each individual
vessel.
The time estimate for a CySO to conduct an audit for U.S.-flagged
vessels in a fleet is the same as it is for facilities and OCS
facilities, or 40 hours per Plan. We estimate the undiscounted cost for
the annual maintenance of Cybersecurity Plans for the owners and
operators of U.S.-flagged vessels to be about $1,194,788 (1,775 Plans x
8 hours x $84.14). We estimate the undiscounted cost for annual audits
of Cybersecurity Plans to be approximately $5,973,940 (1,775 Plans x 40
hours x $84.14). We estimate the total undiscounted annual cost each
year in years 3 through 6 and 8 through 10 for Cybersecurity Plans to
be approximately $7,168,728 ($1,194,788 + $5,973,940).
Again, as with facilities and OCS facilities, Coast Guard approval
for the Cybersecurity Plan is valid for 5 years. Therefore, in year 7
of the analysis period, owners and operators of U.S.-flagged vessels
would be required to renew their Plans with the Coast Guard. We use the
hour-burden estimate in ICR 1625-0077 for Plan renewal, which is 12
hours. The CySO would be responsible for resubmitting the Cybersecurity
Plan to the Coast Guard for renewal. We estimate the undiscounted cost
for owners and operators of U.S.-flagged vessels to renew the Plan to
be approximately $1,882,044 [(1,775 Plans x 12 hours x $84.14) + (178
resubmitted vessel Plans x 6 hours x $84.14)].
We estimate the total discounted cost of this proposed rule for
owners and operators of U.S.-flagged vessels to develop Cybersecurity
Plans to be approximately $45,420,922 over a 10-year period of
analysis, using a 7-percent discount rate. We estimate the annualized
cost to be approximately $6,466,917, using a 7-percent discount rate.
See table 6.
[[Page 13427]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.006
[[Page 13428]]
Drills
In proposed Sec. 101.635(b), this NPRM would require drills that
test the proficiency of U.S.-flagged vessel, facility, and OCS facility
personnel who have assigned cybersecurity duties. The drills would
enable the CySO to identify any cybersecurity deficiencies that need to
be addressed. The CySO would need to conduct the drills every 3 months
or quarterly, (which is consistent with the MTSA regulations for drills
for vessels, facilities, and OCS facilities in 33 CFR parts 104, 105
and 106, respectively), and they may be held in conjunction with other
security or non-security-related drills, as appropriate. The drills
would test individual elements of the Plan, including responses to
cybersecurity threats and incidents.
The Coast Guard does not have data on who is currently conducting
cybersecurity drills in either the population of facilities and OCS
facilities or the population of U.S.-flagged vessels. Therefore, we
assume that the entire population of facilities and U.S.-flagged
vessels would need to develop new cybersecurity related drills to
comply with the proposed requirements. However, because the affected
populations are already required to conduct drills in accordance with
33 CFR parts 104, 105, and 106, and the proposed rule allows for owners
and operators to hold cybersecurity drills in conjunction with other
security and non-security related drills, we assume that owners and
operators will hold these new drills in conjunction with existing
drills and will not require additional time from participants. This
means that the only new cost associated with the proposed cybersecurity
drills is the development of cybersecurity components to add to
existing drills. Coast Guard SMEs who are familiar with MTSA's
requirements and practices for drills and exercises estimate that it
would take a CySO 0.5 hours (30 minutes) to develop new cybersecurity
components to add to existing drills. This time estimate is based on
the expected ease with which a CySO can access widely available
resources and planning materials for developing cybersecurity drills
online. The Coast Guard requests the public to comment on the accuracy
of our estimates related to the development of cybersecurity drill
components.
The CySO would be the person who develops cybersecurity components
to add to existing drills. Each CySO, on behalf of the owner or
operator of a facility or OCS facility, would be required to develop
the drill's components beginning in the first year of the analysis
period and document procedures in the Cybersecurity Plan.
Using the number of facilities owners and operators we presented
earlier--or 1,708--the CySO's loaded mean hourly wage rate, the
estimated time to develop the drill's components or 0.5 hours (30
minutes), and the frequency of the drill, or every 3 months, we
estimate the cost for facilities to develop cybersecurity components
for drills. We estimate the undiscounted annual cost of drills for
facility and OCS facility owners and operators to be approximately
$287,422 (1,708 facility CySOs x 4 drills per year x 0.5 hours per
drill x $84.14. We estimate the total discounted cost of drills for
owners and operators of facilities and OCS facilities to be
approximately $2,018,733 over a 10-year period of analysis, using a 7-
percent discount rate. We estimate the annualized cost to be
approximately $287,422, using a 7-percent discount rate. See table 7.
[GRAPHIC] [TIFF OMITTED] TP22FE24.007
We use the same methodology and estimates for U.S.-flagged vessel
drills. As we presented previously, there are about 1,775 CySOs, on
behalf of owners and operators of U.S.-flagged vessels, who would be
required to develop drills with this proposed rule. We estimate the
undiscounted annual cost of drills for the owners and operators of
U.S.-flagged vessels to be approximately $298,697 (1,775 vessel CySOs x
4 drills per year x 0.5 hours per drill x $84.14). We
[[Page 13429]]
estimate the total discounted cost of drills for U.S.-flagged vessels
to be approximately $2,097,922 over a 10-year period of analysis, using
a 7-percent discount rate. We estimate the annualized cost to be
approximately $298,697, using a 7-percent discount rate. See table 8.
[GRAPHIC] [TIFF OMITTED] TP22FE24.008
We estimate the total discounted cost of this proposed rule for
drills for the owners and operators of facilities, OCS facilities, and
U.S.-flagged vessels to be approximately $4,116,655 over a 10-year
period of analysis, using a 7-percent discount rate. We estimate the
annualized cost to be approximately $586,119, using a 7-percent
discount rate. See table 9.
[[Page 13430]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.009
Exercises
In proposed Sec. 101.635(c), this NPRM would require exercises
that test the communication and notification procedures of U.S.-flagged
vessels, facilities, and OCS facilities. These exercises may be vessel-
or facility-specific, or part of a cooperative exercise program or
comprehensive port exercises. The exercises would be a full test of the
cybersecurity program with active participation by the CySO and may
include Government authorities and vessels visiting a facility. The
exercises would have to be conducted at least once each calendar year,
with no more than 18 months between exercises. As with drills, we
assume that exercises will begin in the first year of the analysis
period as CySOs develop Cybersecurity Plans. We also assume that the
exercises developed to satisfy Sec. 101.635(c) would also satisfy the
exercise requirements outlined in Sec. 101.650 (g)(2) and (3), which
requires the exercise of the Cybersecurity Plan and Cyber Incident
Response Plan.
The Coast Guard does not have data on who is currently conducting
cybersecurity exercises in either the population of facilities and OCS
facilities or the population of U.S.-flagged vessels. Therefore, we
assume that the entire populations would need to develop new
cybersecurity-related exercises to comply with the proposed
requirements. However, because the affected populations are already
required to conduct exercises in accordance with 33 CFR parts 104, 105,
and 106, and because this proposed rule allows for owners and operators
to hold cybersecurity exercises in conjunction with other exercises, we
assume that owners and operators will hold these new exercises in
conjunction with existing exercises. This will not require any
additional time from participants, which means that the only new cost
associated with the proposed cybersecurity exercises is the development
of cybersecurity components to add to existing exercises.
Coast Guard SMEs familiar with MTSA's requirements and practices
for drills and exercises estimate that it would take a CySO 8 hours to
develop new cybersecurity components to add to existing exercises. This
time estimate is based on the expected ease with which a CySO can
access widely available resources and planning materials for developing
cybersecurity exercises online \73\ and the proliferation of
cybersecurity components already being added to AMSC exercises around
the United States.\74\ The Coast Guard requests comment on the accuracy
of our estimates related to the development of cybersecurity exercise
components.
---------------------------------------------------------------------------
\73\ For example, CISA offers free resources on cybersecurity
scenarios and cybersecurity exercises on their website. See https://www.cisa.gov/cybersecurity-training-exercises, accessed July 19,
2023.
\74\ See https://digitaleditions.walsworthprintgroup.com/publication/?i=459304&article_id=2956672&view=articleBrowser for
just one example of AMSC cyber exercises in recent years; accessed
July 19, 2023.
---------------------------------------------------------------------------
We assume each CySO, on behalf of the owner and operator of a
facility or OCS facility, would develop the exercises specified in the
proposed rule. Using the 1,708 facility owners and operators we
presented earlier, the CySO's loaded mean hourly wage rate, the 8-hour
estimate for developing the exercise components, and one annual
exercise, we estimate the cost for facilities to develop cybersecurity
exercise components. We estimate the undiscounted annual cost of
exercises for owners and operators of facilities and OCS facilities to
be approximately $1,149,689 (1,708 facility CySOs x 8 hours per
exercise x $84.14). We estimate the total discounted cost of exercises
for facility owners and operators to be about $8,074,935 over a 10-year
period of analysis, using a 7-percent discount rate. We estimate the
annualized cost to be approximately $1,149,689, using a 7-percent
discount rate. See table 10.
[[Page 13431]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.010
We use the same methodology and estimates for vessel exercises that
we use for facilities. About 1,775 CySOs, on behalf of vessel owners
and operators, would be required to conduct exercises with this
proposed rule. We estimate the undiscounted annual cost of exercises
for the owners and operators of U.S.-flagged vessels to be
approximately $1,194,788 (1,775 vessel CySOs x 8 hours per exercise x
$84.14). We estimate the total discounted cost of exercises for U.S.-
flagged vessels to be approximately $8,391,691 over a 10-year period of
analysis, using a 7-percent discount rate. We estimate the annualized
cost to be approximately $1,194,788, using a 7-percent discount rate.
See table 11.
[GRAPHIC] [TIFF OMITTED] TP22FE24.011
[[Page 13432]]
We estimate the total discounted cost of this proposed rule for the
owners and operators of U.S. facilities, OCS facilities, and U.S.-
flagged vessels for exercises to be approximately $16,466,625 over a
10-year period of analysis, using a 7-percent discount rate. We
estimate the annualized cost to be approximately $2,344,477, using a 7-
percent discount rate. See table 12.
[GRAPHIC] [TIFF OMITTED] TP22FE24.073
We estimate the total discounted cost of this proposed rule for the
owners and operators of facilities, OCS facilities, and U.S.-flagged
vessels, to conduct annual drills and exercises to be approximately
$20,583,281 over a 10-year period of analysis, using a 7-percent
discount rate. We estimate the annualized cost to be approximately
$2,930,596, using a 7-percent discount rate. See table 13.
[GRAPHIC] [TIFF OMITTED] TP22FE24.012
Cybersecurity Measure Costs
The remaining regulatory provisions with associated costs are the
cybersecurity measures in proposed Sec. 101.650. There are five cost
provisions associated with cybersecurity measures: account security
measures; cybersecurity training for personnel; penetration testing;
resilience; and risk management.
The first provision is account security measures in proposed Sec.
101.650(a). The owners and operators of each U.S.-flagged vessel,
facility, and OCS facility would ensure that account security measures
are implemented and documented. This includes general account security
measures in proposed Sec. 101.650(a)(1) through (3) and (5) through
(7) and multifactor authentication for end users in proposed Sec.
101.650(a)(4). Based on the Jones Walker ``Ports and Terminals
Cybersecurity Survey,'' (see footnote 69), 87 percent of facilities
currently have account security measures, and 83 percent of facilities
currently use multifactor authentication software. Using the total
number of 1,708 facility and OCS facility owners and operators, we
multiply this number by 0.13 and 0.17, respectively, to obtain the
number
[[Page 13433]]
of facility owners and operators who would need to implement security
measures and have multifactor authentication software under this
proposed rule, or about 222 and 290, respectively. The Coast Guard
acknowledges that the survey data used here may lead us to
underestimate the costs incurred by the population of facilities and
OCS facilities, given the high rate of respondents who indicated that
they have these measures in place. Accordingly, we request comments on
the accuracy of these rates of implementation in the population of
facilities and OCS facilities.
We obtain the hour estimates and the labor category for these
security measures for implementing and managing account security from
NMSAC members with extensive experience in contracting to implement
similar account security measures for facilities and OCS facilities in
the affected population. A Database Administrator would ensure that
account security measures are implemented. Using wage data from BLS's
Occupational Employment and Wage Statistics (OEWS) program as
previously referenced, the unloaded mean hourly wage rate for this
labor category, occupational code of 15-1242, is $49.29.\75\ Using
Employer Costs for Employee Compensation data from BLS, we apply the
same load factor of 1.46 to the aforementioned wage rate to obtain a
loaded mean hourly wage rate of approximately $71.96.
---------------------------------------------------------------------------
\75\ See https://www.bls.gov/oes/2022/may/oes151242.htm,
accessed July 12, 2023.
---------------------------------------------------------------------------
It would take a Database Administrator about 8 hours to implement
the account security measures and 8 hours for account security
management annually thereafter for 222 U.S. facility and OCS facility
companies. We estimate the undiscounted initial-year cost to implement
account security for 222 facilities and OCS facilities and the annually
recurring cost of account security management to be approximately
$127,801, rounded [(222 facilities x ($71.96 x 8 hours)].
The number of facility and OCS facility companies that would need
multifactor authentication security is about 290. Based on estimates
from CG-FAC SMEs with experience implementing multifactor
authentication at other Government agencies, implementation of
multifactor authentication would cost each facility anywhere from
$3,000 to $15,000 in the initial year for setup and configuration. For
the purposes of this analysis, we use the average of approximately
$9,000 for the costs of initial setup and configuration. It would also
cost each facility approximately $150 per end user for annual
maintenance and support of the implemented multifactor authentication
system. These costs represent the average costs for implementing and
maintaining a multifactor authentication system across different
organization and company sizes based on the SMEs' experience.
We use the total number of estimated employees at an affected
facility company in our analysis of costs because the Coast Guard
currently lacks data on (1) which systems in use at a facility or OCS
facility would need multifactor authentication, and (2) whether only a
subset of the total employees would require access. This is largely
because owners and operators have the discretion to designate both
critical IT and OT systems as well as the number of employees needing
access. Therefore, for the purpose of this analysis, we assume all
employees would need multifactor authentication access. The Coast Guard
requests comment on the accuracy of our cost estimates for implementing
and maintaining multifactor authentication, and if only select systems
or certain employees would require multifactor authentication access in
most cases.
We obtain the average number of facility employees from a Coast
Guard contract that uses D&B Hoovers' database for company employee
data (available in the docket for this rulemaking, see the Public
Participation and Request for Comments section of this preamble.) The
average number of employees at a facility company is 74. We estimate
the undiscounted initial-year cost to implement multifactor
authentication for 290 facility and OCS facility companies to be
approximately $2,610,000 (290 facilities x $9,000). We estimate the
undiscounted initial-year and annual cost for multifactor
authentication support and maintenance at facilities and OCS facilities
to be approximately $3,219,000 (290 facility companies x 74 employees x
$150).
We estimate the total undiscounted initial-year cost to implement
account security measures for facilities and OCS facilities to be
approximately $5,956,801 ($127,801 cost to implement account security
measures + $2,610,000 cost to set up and configure multifactor
authentication + $3,219,000 cost for multifactor authentication
support). We estimate the undiscounted annual cost in years 2 through
10 to be approximately $3,346,801 ($127,801 cost to manage account
security + $3,219,000 cost to maintain and provide multifactor
authentication support).
We estimate the total discounted cost to implement account security
measures for (1) 222 facilities and OCS facilities that would need to
implement general account security measures and (2) 290 facilities and
OCS facilities that would need to implement multifactor authentication
to be approximately $25,945,783 over a 10-year period of analysis,
using a 7-percent discount rate. We estimate the annualized cost to be
approximately $3,694,096, using a 7-percent discount rate. See table
14.
[[Page 13434]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.013
Owners and operators of U.S.-flagged vessels would need to
implement the same account security measures as facilities. The
population of vessels affected, where applicable, would be about 5,473,
rather than 10,286, because we subtract the barge population of 4,813
from 10,286, the total number of affected vessels. Because barges are
unmanned, we assume they do not have computer systems onboard and,
therefore, may not require account security measure implementation.
The number of affected vessel owners and operators would be about
1,602, excluding 173 barge owners and operators that do not own or
operate other affected vessels. Based on the NMSAC estimates detailed
above, it would take a Database Administrator about 8 hours to
implement the account security measures and 8 hours to manage account
security annually thereafter on behalf of each owner and operator of a
vessel. We estimate the undiscounted initial-year cost to implement and
annually recurring cost to manage account security measures for owners
and operators of U.S.-flagged vessels, excluding barge owners and
operators, to be approximately $922,239 [(1,602 vessel owners and
operators x (8 hours x $71.96)].
The number of owners and operators who would require multifactor
authentication security is about 1,602, for approximately 5,473
vessels. Based on Coast Guard information, multifactor authentication
systems would be implemented at the company level because networks and
account security policies would be managed at the company level, and
not for each individual vessel. Any security updates or multifactor
authentication programs implemented at the company level could be
pushed out to devices located on board vessels owned or operated by the
company. We use the same cost estimate from CG-FAC that we use for
facilities. It would cost the owner or operator of a vessel
approximately $9,000 to implement multifactor authentication in the
first year and about $150 annually for multifactor authentication
support and maintenance per end user. To determine the number of
employees for each vessel company, we use data from the certificate of
inspection manning requirements in MISLE for each vessel
subpopulation.\76\ We assume 2 crews and multiply the total number of
seafaring crew by 1.33 to account for shoreside staff in order to
obtain an estimate of total company employees per vessel.\77\ We
estimate the total undiscounted initial-year cost to implement
multifactor authentication for 1,602 vessel owners and operators to be
approximately $14,418,000 (1,602 vessel owners and operators x $9,000).
---------------------------------------------------------------------------
\76\ Manning requirements for U.S.-flagged vessels were
established by regulation in 46 CFR part 15.
\77\ To estimate the average number of mariners and shoreside
employees for each company, Coast Guard conducted an internet search
for publicly available employment data for the owners and operators
of MTSA-regulated vessels. In total, Coast Guard was able to
identify eight MTSA-regulated vessel owners and operators that
publicly provided their shoreside and seafarer employment numbers.
Using this data, we calculated the percentage of total employees
working shoreside for each vessel. We then took an average of these
percentages and applied that average to the population of MTSA
vessel owners and operators. The percentage of shoreside employees
ranged from 8 to 87 percent, with an average of 33 percent, which we
used for each subpopulation of vessels.
---------------------------------------------------------------------------
To calculate the annual cost per end user, we multiply the number
of vessels for a given vessel type by the average number of employees
per vessel and the $150 annual cost of support and maintenance. For
example, there are about 426 OSVs in the affected population, with an
average number of 16 employees for each OSV. Therefore, the
undiscounted annual cost of support and maintenance for OSV owners and
operators would be approximately $1,022,400 (16 employees per each OSV
(including shoreside) x $150 x 426 OSVs). We perform this calculation
for each vessel type in the affected population and add the costs
together to obtain the total initial-year cost and annual cost
thereafter. We estimate the total undiscounted annual cost for
multifactor authentication maintenance
[[Page 13435]]
and support on vessels to be about $18,938,100 (number of employees for
each vessel type x $150 x number of vessels for each vessel type). See
table 15. We add these costs to the previously calculated
implementation costs to obtain the initial-year costs associated with
multifactor authentication of $33,356,100 ($14,418,000 implementation
costs + $18,938,100 annual support and maintenance costs) as seen in
column 3 of table 15.
[GRAPHIC] [TIFF OMITTED] TP22FE24.014
We estimate the total undiscounted initial-year cost to implement
account security measures in proposed Sec. 101.650(a)(1) through (3),
and (5) through (7) and multifactor authentication for end users in
proposed Sec. 101.650(a)(4) for 1,602 U.S.-flagged vessels to be
approximately $34,278,339 ($922,239 cost to implement account security
+ $33,356,100 cost to implement and provide multifactor support costs).
We estimate the total undiscounted annual cost in years 2 through 10 to
be approximately $19,860,339 ($922,239 cost to manage account security
+ $18,938,100 cost to maintain and provide multifactor authentication).
We estimate the total discounted cost to implement all the account
security measures in proposed Sec. 101.650(a)(1) through (3), and (5)
through (7) and multifactor authentication for end users in proposed
Sec. 101.650(a)(4) for 1,602 U.S.-flagged vessels to be approximately
$152,965,477 over a 10-year period of analysis, using a 7-percent
discount rate. We estimate the annualized cost to be approximately
$21,778,843 using a 7-percent discount rate. See table 16.
[[Page 13436]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.015
We estimate the total discounted cost to implement account security
measures for owners and operators of U.S.-flagged vessels, facilities,
and OCS facilities, including multifactor authentication, to be
approximately $178,911,259 over a 10-year period of analysis, using a
7-percent discount rate. We estimate the annualized cost to be
approximately $25,472,938, using a 7-percent discount rate. See table
17.
[GRAPHIC] [TIFF OMITTED] TP22FE24.016
[[Page 13437]]
Cybersecurity Training Cost
The second cost provision under cybersecurity measures, in proposed
Sec. 101.650(d), would be training. All persons with access to IT and
OT would need annual training in topics such as the relevant aspects of
the owner or operator's specific cybersecurity technology and concerns,
recognition of threats and incidents, and incident reporting
procedures. Given the importance of having a workforce trained on
onsite cybersecurity systems as soon as possible to detect and mitigate
cyber incidents, cybersecurity training would be verified during annual
inspections following the implementation of this proposed rule. This
means we assume there will be costs related to training in the first
year of analysis. The Coast Guard requests comment on the ability of
affected owners and operators to develop and provide relevant
cybersecurity training within the first year of implementation.
Based on information from the Jones Walker ``Ports and Terminals
Cybersecurity Survey,'' (see footnote 69), about 25 percent of
facilities are currently conducting cybersecurity training on an annual
basis.\78\ Therefore, we estimate the number of facility and OCS
facility owners and operators needing to implement training to be about
1,281 (1,708 owners and operators x 0.75).
---------------------------------------------------------------------------
\78\ See footnote 69 and page 48 of the survey in the docket.
---------------------------------------------------------------------------
Based on information from CISA's SMEs, we assume that the CySO at a
facility or OCS facility would spend 2 hours per year to develop,
update, and provide cybersecurity training. SMEs at CISA also estimate
that it would take 1 hour per facility employee to complete the
training annually, based on existing industry-leading cyber awareness
training programs. This proposed rule would also require part-time
employees and contractors to complete the training. However, the Coast
Guard has data only on the number of full-time employees at facilities
and OCS facilities, so we use this estimate with the acknowledgement
that costs may be higher for facilities than we estimate in this
analysis if we take other employees into account, such as part-time
employees and contractors. As before, we use the estimate of the
average number of employees at facilities and OCS facilities, or 74.
To obtain the unloaded mean hourly wage rate of employees at
facilities and OCS facilities, we use BLS's Quarterly Census of
Employment and Wages (QCEW) data. We also use the North American
Industry Classification System (NAICS) code for ``Port and Harbor
Operations,'' which is 488310, to obtain the representative hourly wage
for employees at facilities and OCS facilities. The BLS reports the
weekly wage to be $1,653.\79\ Dividing this value by the standard
number of hours in a work week, or 40, we obtain the unloaded hourly
wage rate of approximately $41.33. We once again apply a load factor of
1.46 to this wage to obtain a loaded mean hourly wage rate for facility
employees of approximately $60.34 (($1,653 / 40 hours) x 1.46)).
---------------------------------------------------------------------------
\79\ Readers can access this web page at www.bls.gov/cew/. In
the menu at the top of the page, readers should use the dropdown
menu under ``QCEW Data,'' and select ``Databases.'' Doing this will
bring the reader to https://www.bls.gov/cew/data.htm. On this page,
select the multi-screen tool (https://data.bls.gov/cgi-bin/dsrv?en).
On screen 1, select ``488310 NAICS 488310 Port and harbor
operations.'' On screen 2, select ``US000 U.S. TOTAL.'' Select ``5
Private,'' ``4 Average Weekly Wage,'' and ``0 All establishment
sizes'' on screens 3, 4, and 5, respectively. Screen 6 shows the
relevant Series ID (ENUUS000405488310). Select ``Retrieve Data.''
Please consider that 2022 data from QCEW are preliminary and may
change from the estimate in the text. For the purposes of this
analysis, we used Q1 2022 QCEW data. Accessed on July 13, 2023.
---------------------------------------------------------------------------
We estimate the undiscounted initial-year and annual cost for
facility and OCS facility owners and operators to train employees on
aspects of cybersecurity to be approximately $5,935,437, rounded [1,281
facility owners and operators x ((74 employees at each facility company
x $60.34 x 1 hour) + (1 CySO developing training x $84.14 x 2 hours))].
We estimate the discounted cost for facility and OCS facility
owners and operators to complete annual training to be approximately
$41,688,025 over a 10-year period of analysis, using a 7-percent
discount rate. We estimate the annualized cost to be approximately
$5,935,437, using a 7-percent discount rate. See table 18.
[GRAPHIC] [TIFF OMITTED] TP22FE24.017
[[Page 13438]]
Employees on board U.S.-flagged vessels would also be required to
complete annual cybersecurity training. The hour estimates for the CySO
to develop cybersecurity training and employees to complete the
training are the same as for facility estimates, 2 hours and 1 hour,
respectively. The training costs for U.S.-flagged vessels are based
upon the number of employees for each vessel type, similar to the cost
analysis for account security measures. We chose several representative
labor categories of vessel employees based on the manning requirements
listed in the certificates of inspection for each vessel. From the BLS
OEWS program, we use the labor categories, ``Captains, Mates, and
Pilots of Water Vessels,'' with an occupational code of 53-5021,
``Sailors and Marine Oilers,'' with an occupational code of 53-5011,
and ``Ship Engineers,'' with an occupational code of 53-5031.\80\ The
unloaded mean hourly wage rates from May 2022 for these occupations are
$50.09, $25.65, and $48.55, respectively. We also use an assortment of
labor categories to estimate a mean hourly wage for the industrial
personnel identified in the certificate of inspection for MODUs in the
affected population. According to SMEs with CG-CVC, industrial
personnel aboard MODUs generally include a mixture of hotel and steward
staff; laborers and riggers; specialized technicians; and mechanics,
electricians, and electronic technicians for maintenance. For these
groups, we find a combined unloaded weighted mean hourly wage of
$25.16. For each vessel type, we weight the representative wages based
on the average occupational ratios across vessels in the population.
See Appendix A: Wages Across Vessel Types, for more details on how the
industrial personnel and weighted mean hourly wages for each vessel
type were calculated.\81\ We apply the same load factor we used
previously in this analysis, 1.46, to these wage rates, to obtain the
loaded mean hourly wage rates shown in table 19.\82\
---------------------------------------------------------------------------
\80\ See https://www.bls.gov/oes/2022/may/oes_nat.htm#00-0000
for 2022 wage rates associated with the listed occupations. Accessed
September 9, 2023.
\81\ It should be noted that the wage calculations in Appendix
A: Wages Across Vessel Types are conducted with occupational ratios
based on employee counts without the 1.33 shoreside employee
modifier applied. Applying this multiplier evenly across all the
employee counts would not have an impact on the occupational ratios,
and thus would not impact our estimated weighted mean hourly wages.
Because we do not have a good grasp on what occupations the
shoreside employees would have, we simply apply the weighted mean
hourly wages to all employees in the give population of vessels.
\82\ See footnote 71.
\83\ See Appendix A: Wages Across Vessel Types for more
information on how these wages rates were calculated.
[GRAPHIC] [TIFF OMITTED] TP22FE24.018
We estimate the undiscounted initial-year and annual cost of
cybersecurity training for vessel employees to be approximately
$6,166,909 (number of vessels for each affected vessel category x
number of employees for each vessel type x representative mean hourly
wage for vessel type x 1 hours for training). For example, using OSVs,
there are about 426 OSVs, with 16 employees for each OSV. Therefore, we
estimate the annual training cost for OSVs to be about $374,335 (426
OSVs x 16 employees x $54.92 x 1 hour), rounded. We perform this
calculation for all for the affected vessel types in this proposed rule
and add it to the estimated costs for training development. We estimate
the undiscounted annual cost to develop cybersecurity training to be
approximately $269,585 (1,602 vessel companies x 1 CySO per vessel
company x $84.14 x 2 hours to develop training)]. This means the total
undiscounted annual training cost for the affected population of U.S.-
flagged vessels is $6,436,494 ($6.166,909 employee training costs +
$269,585 training development costs). Table 20 displays the total
employee training costs for each vessel type impacted by the proposed
training requirement.
[[Page 13439]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.019
We estimate the discounted cost for employees aboard U.S.-flagged
vessels to complete annual cybersecurity training to be approximately
$45,207,239 over a 10-year period of analysis, using a 7-percent
discount rate. We estimate the annualized cost to be approximately
$6,436,494, using a 7-percent discount rate. See table 21.
[GRAPHIC] [TIFF OMITTED] TP22FE24.020
We estimate the total discounted cost of cybersecurity training for
facilities and vessels to be approximately $86,895,266 over a 10-year
period of analysis, using a 7-percent discount rate. We estimate the
annualized cost to
[[Page 13440]]
be approximately $12,371,931, using a 7-percent discount rate. See
table 22.
[GRAPHIC] [TIFF OMITTED] TP22FE24.021
Penetration Testing
The third proposed provision under cybersecurity measures that
would impose costs on industry is penetration testing, in proposed
Sec. 101.650(e)(2). The CySO for each U.S.-flagged vessel, facility,
and OCS facility would ensure that a penetration test is completed in
conjunction with renewing the FSP, VSP, or OCS FSP. We assume facility
and vessel owners and operators in the affected population would pay a
third party to conduct a penetration test to maintain safety and
security within the IT and OT systems for all KEVs. The cost for
penetration testing is a function of the number of vessel and facility
owners and operators, because networks are typically managed at a
corporate level. At the conclusion of the test, the CySO would also
need to document all identified vulnerabilities in the FSA, OCS FSP, or
VSA--a cost that is included in our analysis of annual Cybersecurity
Plan maintenance. Further, it is expected that the CySO would also work
to correct or mitigate the identified vulnerabilities. However, the
methods employed and time taken to correct or mitigate these
vulnerabilities represent a source of uncertainty in our analysis, and
we are unable to estimate the associated costs.
Based on the Jones Walker survey (see footnote number 69), 68
percent of facilities and OCS facilities are currently conducting
penetration testing. Using 1,708 affected facility owners and
operators, the number of facility and OCS facility owners and operators
needing to conduct penetration testing is about 547 (1,708 x 0.32).
Using cost estimates for penetration testing from NMSAC members who
have experience conducting and contracting with facilities and OCS
facilities to conduct penetration tests, we estimate it would cost each
facility owner or operator $5,000 for the initial penetration test and
an additional $50 for each employee's internet Protocol (IP)
address,\84\ to capture the additional costs of network complexity. The
number of employees for each facility is 74. Facility and OCS facility
owners and operators would incur penetration testing costs in
conjunction with submitting and renewing the Cybersecurity Plan, or
every 5 years. This means penetration testing costs would be incurred
in the second and seventh year of analysis. We estimate the
undiscounted second- and seventh-year costs to facilities and OCS
facilities for penetration testing to be about $4,758,900 [(547
facility owners and operators x $5,000) + (74 employees x 547 facility
owners and operators x $50)]. We estimate the discounted cost for
owners and operators of facilities and OCS facilities to conduct
penetration testing to be about $7,120,212 over a 10-year period of
analysis, using a 7-percent discount rate. We estimate the annualized
cost to be about $979,477 using a 7-percent discount rate. See table
23.
---------------------------------------------------------------------------
\84\ An IP address is a unique numerical identifier for each
device or network that connects to the internet. Because we do not
have data on the number of devices each organization uses, we use
the number of employees as a proxy because each employee could have
a device using the organizational network.
---------------------------------------------------------------------------
[[Page 13441]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.022
Owners and operators of U.S.-flagged vessels would also need to
conduct penetration testing, similar to facilities. We do not include
barges or barge-specific owners and operators, given the unmanned
nature of barges and their relatively limited onboard IT and OT
systems. All estimates for vessel penetration testing are the same as
for facilities and OCS facilities. We estimate the undiscounted second-
and seventh-year costs for owners and operators of vessels to conduct
penetration testing to be approximately $14,322,700 [(1,602 vessel
owners and operators x $5,000) + (number of vessels for each vessel
type x number of employees for each vessel type x $50)]. See table 24
for a calculation of the costs per IP address for the various vessel
populations, which can be added to the costs per owner or operator
costs, or $8,010,000 (1,602 owners and operators x $5,000) in years 2
and 7.
[[Page 13442]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.023
We estimate the discounted cost for owners and operators of vessels
to conduct penetration testing to be approximately $21,429,459 over a
10-year period of analysis, using a 7-percent discount rate. We
estimate the annualized cost to be approximately $3,051,073 using a 7-
percent discount rate. See table 25.
[GRAPHIC] [TIFF OMITTED] TP22FE24.024
We estimate the total discounted cost to conduct penetration
testing for owners and operators of facilities, OCS facilities, and
U.S.-flagged vessels to be approximately $28,549,669 over a 10-year
period of analysis, using a 7-percent discount rate. We estimate the
annualized cost to be approximately $4,064,831 using a 7-percent
discount rate. See table 26.
[[Page 13443]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.025
Resilience
The fourth cost provision under cybersecurity measures would be
resilience, in proposed Sec. 101.650(g). Each CySO for a facility, OSC
facility, and U.S.-flagged vessel would be required to report any cyber
incident to the NRC, develop a Cyber Incident Response Plan, validate
the effectiveness of Cybersecurity Plans through annual tabletop
exercises or periodic reviews of incident response cases, and perform
backups of critical IT and OT systems. Of these proposed requirements,
the costs associated development of a Cyber Incident Response Plan are
already captured in the overall costs to develop the Cybersecurity
Plan, and any subsequent annual maintenance for the Cyber Incident
Response Plan would be captured in the costs for annual maintenance of
the Cybersecurity Plan. In addition, costs associated with validating
and conducting exercise of Cybersecurity Plans through annual tabletop
exercises or periodic reviews of incident response cases is already
captured in the costs estimated for drills and exercises in proposed
Sec. 101.635.
To estimate the costs associated with cyber incident reporting, the
Coast Guard uses historical cyber incident reporting data from the NRC.
From 2018 to 2022, the NRC fielded and processed an average of 18 cyber
incident reports from facilities and OCS facilities, and an average of
2 cyber incident reports from U.S.-flagged vessels, for a total of 20
cyber incident reports per year. While we anticipate that this number
could increase or decrease following the publication of a rule focused
on cybersecurity standards and procedures, we use the historical
averages to estimate costs for the affected population.\85\ Due to the
uncertainty surrounding how these regulatory changes may impact the
number of incident reports made in the future, the Coast Guard requests
comment on the expected number of incident reports submitted each year.
---------------------------------------------------------------------------
\85\ The Coast Guard believes that cyber incident reports could
increase following publication of this NPRM due to greater
enforcement of reporting procedures and greater awareness
surrounding the need to report. However, the Coast Guard
acknowledges that cyber incident reports could also decrease because
greater prevention measures would be implemented because of this
proposed rule. As a result, we use historical cyber incident
reporting data to analyze costs moving forward.
---------------------------------------------------------------------------
For both the population of facilities and OCS facilities and the
population of U.S.-flagged vessels, we assume that it will take 8.5
minutes (0.15 hours) of a CySO's time to report a cyber incident to the
NRC. We base this estimated hour burden on the time to report
suspicious maritime activity to the NRC in currently approved OMB ICR,
Control Number 1625-0096 titled ``Report of Oil or Hazardous Substance
Discharge and Report of Suspicious Maritime Activity.'' For the
population of facilities and OCS facilities, we estimate annual
undiscounted costs of $227 (18 cyber incident reports x 0.15 hours to
report x $84.14 CySO wage). We estimate the discounted cost for owners
and operators of facilities and OCS facilities to report cyber
incidents to be about $1,592 over a 10-year period of analysis, using a
7-percent discount rate. We estimate the annualized cost to be about
$227 using a 7-percent discount rate. See table 27.
[[Page 13444]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.026
For the population of U.S.-flagged vessels, we estimate annual
undiscounted costs of $25 (2 cyber incident reports x 0.15 hours to
report x $84.14 CySO wage). We estimate the discounted cost for owners
and operators of facilities and OCS facilities to report cyber
incidents to be about $250 over a 10-year period of analysis, using a
7-percent discount rate. We estimate the annualized cost to be about
$25 using a 7-percent discount rate. See table 28.
[GRAPHIC] [TIFF OMITTED] TP22FE24.027
[[Page 13445]]
We estimate the total discounted cost for owners and operators of
facilities, OCS facilities, and U.S.-flagged vessels to be
approximately $1,771 over a 10-year period of analysis, using a 7-
percent discount rate. We estimate the annualized cost to be
approximately $252 using a 7-percent discount rate. See table 29.
[GRAPHIC] [TIFF OMITTED] TP22FE24.028
The Coast Guard does not have data on the IT resources that owners
and operators would need to back up data, either internally or
externally. Coast Guard SMEs indicate that most of the affected
population is likely already performing data backups. The time burden
of backing up data is minimal because they can occur in the background
through automated processes, making any new costs a function of data
storage space. The external storage of data would require cloud storage
(storage on an external server), and the cost would be dependent upon
the capacity needed; for example, 1 terabyte or 100 terabytes of space.
These costs would likely be incurred on a monthly basis, although we do
not know how much additional data space a given owner or operator would
need, if any. Coast Guard SMEs with CG-CYBER indicate that the current
market prices for cloud storage subscriptions range from $21 to $41 per
month for 1 terabyte of data, $54 to $320 per month for 10 terabytes,
and up to $402 to $3,200 per month for 100 terabytes of data. There may
also be costs associated with the encryption of data that we are not
able to estimate in this analysis. The Coast Guard requests public
comment on the costs associated with data backup storage and
protection.
Routine System Maintenance for Risk Management
The final cost provision under cybersecurity measures would be
routine system maintenance for risk management, in proposed Sec.
101.650(e)(3)(i) through (vi). This proposed rule would require the
CySO of a U.S.-flagged vessel, facility, or OCS facility to ensure
patching (software updates) or implementing controls for all KEVs in
critical IT and OT systems in paragraph (e)(3)(i), maintain a method to
receive or act on publicly submitted vulnerabilities in paragraph
(e)(3)(ii), maintain a method to share threat and vulnerability
information with external stakeholders in paragraph (e)(3)(iii), ensure
there are no exploitable channels exposed to internet accessible
systems in paragraph (e)(3)(iv), ensure that no OT is connected to the
publicly accessible internet unless explicitly required for operation
in paragraph (e)(3)(v), and conduct vulnerability scans according to
the Cybersecurity Plan in paragraph (e)(3)(vi).
Based on information from CGCYBER and NMSAC, we estimate costs for
only the vulnerability scans in this analysis, because it is expected
that CySOs will incorporate many of these provisions into the initial
development and annual maintenance of the Cybersecurity Plan.
Provisions that require setting up routine patching, developing methods
for communicating vulnerabilities, and ensuring limited network
connectivity of OT and other exploitable systems are expected to be
less time-intensive efforts that will be completed following an initial
Cybersecurity Assessment and documented in the Cybersecurity Plan. As a
result, we include those costs in that portion of the analysis.
However, if an OT system does need to be taken offline or segmented
from other IT systems, the Coast Guard does not have information on how
long or intensive that process would be because of the great degree of
variability in OT systems within the affected population.
We discuss network segmentation and uncertainty more in later
sections in this NPRM. We request public comment on the expected costs
of network segmentation, particularly from those in the affected
population who have completed these processes in the past.
Based on information from CGCYBER, the cost to acquire third-party
software capable of vulnerability scans would be approximately $3,390
annually (which includes the software subscription cost) for each U.S.-
flagged vessel, facility, and
[[Page 13446]]
OCS facility. We base our analysis on the cost of a prevalent
vulnerability scanner or virus software for business. Vulnerability
scans can occur in the background while systems are operational and
represent a less intensive method of monitoring IT and OT systems for
vulnerabilities, which complements more intensive penetration tests
that would be required every 5 years. For this reason, we do not
estimate an hour burden in addition to the annual subscription cost of
securing vulnerability scanning software. We estimate the undiscounted
annual cost for facility owners and operators to subscribe to and use
vulnerability scanning software to be approximately $5,790,120 (1,708
facility owners and operators x $3,390). We estimate the undiscounted
annual cost for vessel owners and operators to subscribe to and use
vulnerability scanning software to be approximately $5,430,780 (1,602
vessel owners and operators x $3,390). Combined, we estimate the total
discounted cost for owners and operators of facilities, OCS facilities,
and U.S.-flagged vessels to use vulnerability scanning software to be
approximately $78,810,907 over a 10-year period of analysis, using a 7-
percent discount rate. We estimate the annualized cost to be
approximately $11,220,900, using a 7-percent discount rate. See table
30.
[GRAPHIC] [TIFF OMITTED] TP22FE24.029
Total Costs of the Proposed Rule to Industry
We estimate the total discounted cost of this proposed rule to the
affected population of facilities and OCS facilities to be
approximately $221,437,074 over a 10-year period of analysis, using a
7-percent discount rate. We estimate the annualized cost to be
approximately $31,527,658, using a 7-percent discount rate. See table
31.
[[Page 13447]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.030
As seen in table 31, the primary cost drivers for the population of
facilities and OCS facilities are Cybersecurity Plan-related costs
(development, resubmission, maintenance, and audits) at 43.26 percent
of the total costs to
[[Page 13448]]
industry. Cybersecurity training and vulnerability management costs
come in second and third at 19 percent and 18.54 percent of the total
costs, respectively. We believe some of this is due to the analysis of
Cybersecurity Plan costs and vulnerability management costs, which
assumes no baseline activity within the affected population because of
a lack of information. Costs that appear as a higher percentage of the
total costs in the population of U.S.-flagged vessels (account security
and multifactor authentication, for example) have been adjusted based
on current baseline activity within the population of facilities based
on survey results, and thus, appear as smaller impacts to the
population in general.
We estimate the total discounted cost of this proposed rule to the
affected population of U.S.-flagged vessels to be approximately
$313,656,415 over a 10-year period of analysis, using a 7-percent
discount rate. We estimate the annualized cost to be approximately
$44,657,617, using a 7-percent discount rate. See table 32.
[[Page 13449]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.031
As in table 32, the primary cost drivers for the population of
U.S.-flagged vessels are costs related to account security and
multifactor authentication at 48.43 percent of the total costs to
industry. Costs related to
[[Page 13450]]
the Cybersecurity Plan and cybersecurity training come in second and
third at 14.69 percent and 14.63 percent of the total costs,
respectively. We estimate that account security and multifactor
authentication costs represent such a high portion of the overall costs
related to cybersecurity because the Coast Guard was unable to estimate
current baseline activity for these provisions and used conservative
(upper-bound) estimates related to the costs of implementing and
managing multifactor authentication. As a result, the Coast Guard
requests public comment on who in the affected population of U.S.-
flagged vessels has already implemented multifactor authentication and
what the associated costs were.
We estimate the total discounted cost of this proposed rule to
industry to be approximately $535,093,488 over a 10-year period of
analysis, using a 7-percent discount rate. We estimate the annualized
cost to be approximately $76,185,275, using a 7-percent discount rate.
See table 33.
[[Page 13451]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.032
[[Page 13452]]
Total Costs of the Proposed Rule per Affected Owner or Operator
We estimate the average annual cost per owner or operator of a
facility or OCS facility to be approximately $27,589, under the
assumption that an owner or operator would need to implement each of
the provisions required by this proposed rule. Each additional facility
owned or operated would increase the estimated annual costs by an
average of $4,396 per facility, since each facility or OCS facility
will require an individual Cybersecurity Plan. Year 2 of the analysis
period represents the year with the highest costs incurred per owner,
with estimated costs of $37,667 for an owner or operator with one
facility or OCS facility. See table 34 for a breakdown of the costs per
entity for an owner or operator owning one facility or OCS facility.
[[Page 13453]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.033
To estimate the cost for an owner or operator of a facility or OCS
facility to develop, resubmit, conduct annual maintenance, and audit
the Cybersecurity Plan, we use estimates provided earlier in the
analysis. The
[[Page 13454]]
hour-burden estimates are 100 hours for developing the Cybersecurity
Plan (average hour burden), 10 hours for annual maintenance of the
Cybersecurity Plan (which would include amendments), 15 hours to renew
Cybersecurity Plans every 5 years, and 40 hours to conduct annual
audits of Cybersecurity Plans.
---------------------------------------------------------------------------
\86\ The cost totals in table 34 represent cost estimates for
owners and operators of 1 facility or OCS facility under the
assumption that they will need to implement all cost-creating
provisions of the proposed rule. Therefore, when multiplied over the
full number of affected entities, the calculated totals will exceed
those estimated for the population of facilities and OCS facilities
elsewhere in the analysis. In addition, the cost estimates for items
related to the Cybersecurity Plan are dependent upon the number of
facilities owned and must be multiplied accordingly by the number of
facilities owned. This is discussed in further detail later in the
analysis of costs per owner or operator.
---------------------------------------------------------------------------
Based on estimates from Coast Guard FSP and OCS FSP reviewers at
local inspections offices, approximately 10 percent of Cybersecurity
Plans would need to be resubmitted in the second year due to revisions
that would be needed to the Plans, which is consistent with the current
resubmission rate for FSPs and OCS FSPs. For renewals of Plans after 5
years (occurring in the seventh year of the analysis period), Plans
would need to be further revised and resubmitted in approximately 10
percent of cases as well. However, in this portion of the analysis, we
estimate costs as though the owner or operator will need to revise and
resubmit their Plans in all cases, resulting in an upper-bound (high)
estimate of per-entity costs. We estimate the time for revision and
resubmission to be about half the time to develop the Plan itself, or
50 hours in the second year of submission, and 7.5 hours after 5 years
(in the seventh year of the analysis period). Because we include the
annual Cybersecurity Assessment in costs to develop Plans, and we do
not assume that owners and operators will wait until the second year of
analysis to begin developing the Cybersecurity Plan or implementing
relevant cybersecurity measures, we divide the estimated 100 hours to
develop Plans equally across the first and second years of analysis.
Using the CySO loaded hourly CySO wage of $84.14, we estimate the
Cybersecurity Plan-related costs by adding the total number of hours to
develop, resubmit, maintain, and audit each year and multiplying by the
CySO wage. For example, we estimate owners would incur $8,414 in costs
in year 2 of the analysis period [1 facility x $84.14 CySO wage x (50
hours to develop the Plan + 50 hours to revise and resubmit the Plan) =
$8,414]. Table 35 displays the per-entity cost estimates for an owner
or operator of 1 facility or OCS facility over a 10-year period of
analysis. For an owner or operator of multiple facilities or OCS
facilities, we estimate the total costs by multiplying the total costs
in table 35 by the number of owned facilities.
[GRAPHIC] [TIFF OMITTED] TP22FE24.034
Similarly, we use earlier estimates for the calculation of per-
entity costs for drills and exercises, account security measures,
multifactor authentication, cybersecurity training, penetration
testing, vulnerability management and resilience.
For drills and exercises, we assume that a CySO on behalf of each
owner and operator will develop cybersecurity components to add to
existing physical security drills and exercises. This development is
expected to take 0.5 hours for each of the 4 annual drills and 8 hours
for an annual exercise. Using the loaded hourly wage for a CySO of
$84.14, we estimate annual costs of approximately $841 per facility
owner or operator [$84.14 CySO wage x ((0.5 hours x 4 drills) + (8
hours x 1 exercise)) = $841], as seen in table 34.
For account security measures, we assume that a database
administrator on behalf of each owner or operator will spend 8 hours
each year implementing and managing account security. Using the loaded
hourly wage for a database administrator of $71.96, we estimate annual
costs of approximately $576
[[Page 13455]]
($71.96 database administrator wage x 8 hours = $576), as seen in table
34.
For multifactor authentication, we assume that an owner or operator
of a facility or OCS facility will spend $9,000 in the initial year on
average to implement a multifactor authentication system and spend
approximately $150 per employee annually for system maintenance and
support. Therefore, we estimate first year costs of approximately
$20,100 [$9,000 implementation cost + ($150 support and maintenance
costs x 74 average facility company employees)], and subsequent year
costs of $11,100 ($150 support and maintenance costs x 74 average
facility company employees), as seen in table 34.
For cybersecurity training, we assume that a CySO will take 2 hours
each year to develop and manage employee cybersecurity training, and
employees at a facility or OCS facility will take 1 hour to complete
the training each year. Using the estimated CySO wage of $84.14 and the
estimated facility employee wage of $60.34, we estimate annual training
costs of approximately $4,633 [($84.14 x 2 hours) + ($60.34 x 74
facility company employees x 1 hour)].
For penetration testing, we estimate costs only in the second and
seventh years of analysis since tests are required to be performed in
conjunction with submitting and renewing the Cybersecurity Plan. We
assume that facility owners and operators will spend approximately
$5,000 per penetration test and an additional $50 per IP address at the
organization in order to capture network complexity. We use the total
number of company employees as a proxy for the number of IP addresses,
since the Coast Guard does not have data on IP addresses or the network
complexity at a given company. As a result, we estimate second- and
seventh-year costs of approximately $8,700 [$5,000 testing cost + ($50
x 74 employees)], as seen in table 34.
For vulnerability management, we assume that each facility or OCS
facility will need to secure a vulnerability scanning program or
software. Because vulnerability scans can occur in the background, we
do not assume an additional hour burden associated with the
implementation or use of a vulnerability scanner each year. Using the
annual subscription cost of an industry leading vulnerability scanning
software, we estimate annual costs of approximately $3,390, as seen in
table 34.
Finally, for resilience, we assume that each facility or OCS
facility owner or operator will need to make at least one cybersecurity
incident report per year. While this is incongruent with historical
data that shows the entire affected population of facilities and OCS
facilities reports only 18 cybersecurity incidents per year, we are
attempting to capture a complete estimate of what the costs of this
proposed rule could be for an affected entity. As such, we estimate
that a CySO will need to take 0.15 hours to report a cybersecurity
incident to the NRC, leading to annual per entity costs of
approximately $13 ($84.14 CySO wage x 0.15 hours), as seen in table 34.
We perform the same calculations to estimate the per-entity costs
for owners and operators of U.S.-flagged vessels. However, the
estimates for the population of U.S.-flagged vessels have more
dependency upon the type and number of vessels owned by the company
being analyzed. This is largely due to the varying numbers of employees
per vessel, by vessel type. We estimate fixed, average per-entity costs
of approximately $10,877 per U.S.-flagged vessel owner or operator, as
seen in table 36.
[[Page 13456]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.035
To estimate the per-entity costs that are dependent upon the number
and type of vessel, we use the number of employees per vessel, and in
the case of cybersecurity training costs, a unique weighted hourly wage
based on the
[[Page 13457]]
personnel employed on each vessel type as calculated in Appendix A:
Wages Across Vessel Types. Table 37 displays the average number of
employees for each vessel type, including shoreside employees, and
their unique weighted mean hourly wages. Table 38 displays the per-
vessel costs associated with each type of vessel.
---------------------------------------------------------------------------
\87\ The cost estimates in table 36 represent the costs incurred
at a company level for each U.S.-flagged vessel owner and operator,
and thus must be added to the costs calculated in table 38, which
are dependent on the type and number of vessels owned, to create a
full picture of the estimated costs per owner or operator. When
these totals are multiplied over the full number of affected
entities, the calculated totals will exceed those estimated for the
population of U.S.-flagged vessels elsewhere in the analysis because
we assume that each owner or operator will need to implement all
cost-creating provisions of the proposed rule. This is discussed in
further detail in the analysis of costs per owner or operator.
[GRAPHIC] [TIFF OMITTED] TP22FE24.036
[[Page 13458]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.037
In order to calculate the total cost per-entity in the population
of U.S.-flagged vessels, we add the annual per-vessel costs from table
38 based on the number and types of vessels owned to the fixed costs
estimated in table 36.
---------------------------------------------------------------------------
\88\ When adding these costs to the fixed costs for owners and
operators, only add these estimated penetration testing costs in
years 2 and 7.
---------------------------------------------------------------------------
To estimate the cost for an owner or operator of a U.S.-flagged
vessel to develop, resubmit, conduct annual maintenance, and audit the
Cybersecurity Plan, we use estimates provided earlier in the analysis.
The hour-burden estimates are 80 hours for developing the Cybersecurity
Plan (average hour burden), 8 hours for annual maintenance of the
Cybersecurity Plan (which would include amendments), 12 hours to renew
Cybersecurity Plans every 5 years, and 40 hours to conduct annual
audits of Cybersecurity Plans. Based on estimates from Coast Guard VSP
reviewers at MSC, approximately 10 percent of Plans would need to be
resubmitted in the second year due to revisions that would be needed to
the Plans, which is consistent with the current resubmission rate for
VSPs. For renewals of Plans after 5 years (occurring in the seventh
year of the analysis period), Cybersecurity Plans would need to be
further revised and resubmitted in approximately 10 percent of cases as
well. However, in this portion of the analysis, we estimate costs as
though the owner or operator will need to revise and resubmit their
Plans in all cases resulting in an upper-bound (high) estimate of per-
entity costs. We estimate the time for revision and resubmission to be
about half the time to develop the Cybersecurity Plan itself, or 40
hours in the second year of submission, and 6 hours after 5 years (in
the seventh year of the analysis period). Because we include the annual
Cybersecurity Assessment in the cost to develop Plans, and we do not
assume that owners and operators will wait until the second year of
analysis to begin developing the Cybersecurity Plan or implementing
related cybersecurity measures, we divide the estimated 80 hours to
develop Plans equally across the first and second years of analysis.
Using the CySO loaded hourly CySO wage of $84.14, we estimate the
Cybersecurity Plan-related costs by adding the total number of hours to
develop, resubmit, maintain, and audit each year and multiplying by the
CySO wage. For example, we estimate owners and operators would incur
approximately $6,731 in costs in year 2 of the analysis period [$84.14
CySO wage x (40 hours to develop the Plan + 40 hours to revise and
resubmit the Plan) = $6,731]. See table 39.
[[Page 13459]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.038
Similarly, we use earlier estimates for the calculation of per-
entity costs for drills and exercises, account security measures,
multifactor authentication, cybersecurity training, penetration
testing, vulnerability management, and resilience.
For drills and exercises, we assume that a CySO on behalf of each
owner and operator will develop cybersecurity components to add to
existing physical security drills and exercises. This development is
expected to take 0.5 hours for each of the 4 annual drills and 8 hours
for an annual exercise. Using the loaded hourly wage for a CySO of
$84.14, we estimate annual costs of approximately $841 per vessel owner
or operator [$84.14 CySO wage x ((0.5 hours x 4 drills) + (8 hours x 1
exercise)) = $841], as seen in table 36.
For account security measures, we assume that a database
administrator on behalf of each owner or operator will spend 8 hours
each year implementing and managing account security. Using the loaded
hourly wage for a database administrator of $71.96, we estimate annual
costs of approximately $576 ($71.96 database administrator wage x 8
hours = $576), as seen in table 36.
For multifactor authentication, we assume that a vessel owner or
operator will spend $9,000 in the initial year on average to implement
a multifactor authentication system and spend approximately $150 per
employee annually for system maintenance and support. Therefore, we
estimate first year fixed costs of approximately $9,000 for all owners
and operators, with annual costs in years 2 through 10 dependent on the
number of employees for each type of vessel. For example, we estimate
the first-year costs to an owner or operator of one OSV to be
approximately $11,400 [$9,000 implementation cost + ($150 support and
maintenance costs x 16 average employees per OSV)], and subsequent year
costs of $2,400 ($150 support and maintenance costs x 16 average
employees per OSV). Fixed per-entity implementation costs of $9,000 can
be found in table 36, and variable per-vessel costs can be found in
table 38.
For cybersecurity training, we assume that a CySO for each vessel
owner or operator will take 2 hours each year to develop and manage
employee cybersecurity training, and vessel employees will take 1 hour
to complete the training each year. The per employee costs associated
with training vary depending on the types and number of vessels and
would be based on the average number of employees per vessel and the
associated weighted hourly wage. For example, using the estimated CySO
wage of $84.14 and the estimated OSV employee wage of $54.91, we
estimate annual training costs of approximately $1,047 [($84.14 x 2
hours) + ($54.91 x 16 average employees per OSV x 1 hour)]. Fixed per-
entity costs of $168 can be found in table 36 and variable per-vessel
costs can be found in table 38.
For penetration testing, we estimate costs only in the second and
seventh years of analysis since tests are required to be performed in
conjunction with submitting and renewing the Cybersecurity Plan. We
assume that owners and operators of vessels will spend approximately
$5,000 per penetration test and an additional $50 per IP address at the
organization in order to capture network complexity. We use the average
number of employees per vessel as a proxy for the number of IP
addresses, since the Coast Guard does not have data on IP addresses or
the network complexity at a given company. As a result, we estimate
second- and seventh-year costs as follows: [$5,000 testing cost + ($50
x average number of employees per vessel)]. For example, we estimate
second- and seventh-year cost of approximately $5,800 for an owner or
operator of an OSV [$5,000 testing cost + ($50 x 16 average number of
employees per OSV)]. Fixed per-entity costs of $5,000 can be found in
table 36, and variable per-vessel costs can be found in table 38.
For vulnerability management, we assume that each U.S.-flagged
vessel owner or operator will need to secure a vulnerability scanning
program or software. Because vulnerability scans can occur in the
background, we do not assume an additional hour burden
[[Page 13460]]
associated with the implementation or use of a vulnerability scanner
each year. Using the annual subscription cost of an industry leading
vulnerability scanning software, we estimate annual costs of
approximately $3,390, as seen in table 36.
Finally, for resilience, we assume that each U.S.-flagged vessel
owner or operator will need to make at least one cybersecurity incident
report per year. While this is incongruent with historical data that
shows the entire affected population of vessels only reports two
cybersecurity incidents per year on average, we are attempting to
capture a complete estimate of what the costs of the proposed rule
could be for an affected entity. As such, we estimate that a CySO will
need to take 0.15 hours to report a cybersecurity incident to the NRC,
leading to annual per-entity costs of approximately $13 ($84.14 CySO
wage x 0.15 hours), as seen in table 34.
Unquantifiable Cost Provisions or No-Cost Provisions of This Proposed
Rule
Communications
Under proposed Sec. 101.645, this NPRM would require CySOs to have
a method to effectively notify owners and operators of facilities, OCS
facilities, and U.S.-flagged vessels, as well as personnel of changes
in cybersecurity conditions. The proposed requirements would allow
effective and continuous communication between security personnel on
board U.S.-flagged vessels and at facilities and OCS facilities; U.S.-
flagged vessels interfacing with a facility or an OCS facility, the
cognizant COTP, and national and local authorities with security
responsibilities. Based on communication requirements established in 33
CFR 105.235 for facilities, 106.240 for OCS facilities, and 104.245 for
vessels, the Coast Guard assumes that owners and operators of vessels,
facilities, and OCS facilities already have communication channels
established for physical security notifications which could easily be
used for cybersecurity notifications. As a result, we do not estimate
regulatory costs for communications. The Coast Guard requests public
comment on this assumption and whether this communications provision
would add an additional time burden.
Device Security Measures
Under proposed Sec. 101.650(b)(1), this NPRM would require owners
and operators of U.S. facilities, OCS facilities, and U.S.-flagged
vessels to develop and maintain a list of company-approved hardware,
firmware, and software that may be installed on IT or OT systems. This
approved list would be documented in the Cybersecurity Plan. Because
this requirement would be included in the development of the
Cybersecurity Plan, we estimated these costs earlier in that section of
the cost analysis.
Under proposed Sec. 101.650(b)(2), this NPRM would require owners
and operators of facilities, OCS facilities, and U.S.-flagged vessels
to ensure applications running executable code are disabled by default
on critical IT and OT systems. Based on information from CGCYBER, the
time it would take to disable such applications is likely minimal;
however, we currently lack data on how prevalent these applications are
within the affected population. Therefore, we are unable to estimate
the regulatory costs of this proposed provision. The Coast Guard
requests public comments on the device security measures under this
regulatory provision.
Under proposed Sec. 101.650(b)(3) and (4), this NPRM would require
owners and operators of facilities, OCS facilities, and U.S.-flagged
vessels to develop and maintain an accurate inventory of network-
connected systems, the network map, and OT device configuration.
Because these items would be developed and documented as a part of the
Cybersecurity Plan, we previously estimated these costs in that section
of the cost analysis.
Data Security Measures
Under proposed Sec. 101.650(c), this NPRM would require owners and
operators of facilities, OCS facilities, and U.S.-flagged vessels to
securely capture, store, and protect data logs, as well as encrypt all
data in transit and at rest. The Jones Walker survey (see footnote 69)
reveals that 64 percent of U.S. facilities and OCS facilities are
currently performing active data logging and retention, and 45 percent
are always encrypting data for the purpose of communication.
Because data logging can be achieved with default virus-scanning
tools, such as Windows Defender on Microsoft systems, the cost of
storage and protection of data logs is primarily a function of the data
space required to store them. Based on information from CGCYBER, cloud
storage can cost from $21 to $41 per month for 1 terabyte of data, $54
to $320 per month for 10 terabytes, and up to $402 to $3,200 per month
for 100 terabytes of data. However, the Coast Guard does not have
information on the amount of data space the affected population would
need to comply with this proposed rule, or if data purchases would be
necessary in all cases. Therefore, we are unable to estimate regulatory
costs for this proposed provision. The Coast Guard requests public
comment on these estimates and any additional information on this
proposed regulatory provision.
Similarly, encryption is often available in default systems, or in
publicly available algorithms.\89\ The Coast Guard would accept these
encryption standards that came with the software or on default systems.
However, there are potentially some IT and OT systems in use that do
not have native encryption capabilities. In these instances, encryption
would likely represent an additional cost. However, the Coast Guard
does not have information on the number of systems lacking encryption
capabilities. As a result, we are unable to estimate the regulatory
costs for encryption above and beyond what is included in default
systems, and we request public comment on the potential costs
associated with this provision.
---------------------------------------------------------------------------
\89\ For example, see the following web pages for descriptions
of default encryption policies on Google and Microsoft programs and
cloud-based storage systems: https://cloud.google.com/docs/security/encryption/default-encryption and https://learn.microsoft.com/en-us/microsoft-365/compliance/encryption?view=o365-worldwide, accessed
July 19, 2023.
---------------------------------------------------------------------------
Supply Chain Management
Under proposed Sec. 101.650(f)(1) and (2), this NPRM would include
provisions to specify measures for managing supply chain risk. This
would not create any additional hour burden, as owners and operators
would only need to consider cybersecurity capabilities when selecting
third-party vendors for IT and OT systems or services. In addition,
based on information from CGCYBER, most third-party providers have
existing cybersecurity capabilities and already have systems in place
to notify the owners and operators of facilities, OCS facilities, and
U.S.-flagged vessels of any cybersecurity vulnerabilities, incidents,
or breaches that take place. Therefore, the Coast Guard does not
estimate a cost for this proposed provision.
Additionally, under proposed Sec. 101.650(f)(3), this NPRM would
require owners and operators of U.S. facilities, OCS facilities, and
U.S.-flagged vessel to monitor third-party remote connections and
document how and where a third party connects to their networks. Based
on information from CGCYBER, many IT and OT vendors provide systems
with the ability to remotely access the system to
[[Page 13461]]
perform maintenance or trouble-shoot problems as part of a warranty or
service contract. Because remote access is typically identified in
warranties and service contracts, the Coast Guard assumes that industry
is already aware of these types of connections and would only need to
document them when developing the Cybersecurity Plan. We estimated
these costs previously in the development of the Cybersecurity Plan
section of this cost analysis. The Coast Guard requests public comment
on the validity of this assumption and any additional information on
this proposed regulatory provision.
Network Segmentation
Under proposed Sec. 101.650(h)(1) and (2), this NPRM would require
owners and operators of facilities, OCS facilities, and U.S.-flagged
vessels to segment their IT and OT networks and log and monitor all
connections between them. Based on information from CGCYBER, CG-CVC,
and NMSAC, network segmentation can be particularly difficult in the
MTS, largely due to the age of infrastructure in the affected
population of facilities, OCS facilities and U.S.-flagged vessels. The
older the infrastructure, the more challenging network segmentation may
be. Given the amount of diversity and our uncertainty regarding the
state of infrastructure across the various groups in our affected
population, we are not able to estimate the regulatory costs associated
with this proposed provision. The Coast Guard requests public comment
on the anticipated costs of network segmentation within the affected
population, especially from those who have previously segmented
networks at their organizations.
Physical Security
Under proposed Sec. 101.650(i)(1) and (2), this NPRM would require
owners and operators of facilities, OCS facilities, and U.S.-flagged
vessels to limit physical access to IT and OT equipment; secure,
monitor, and log all personnel access; and establish procedures for
granting access on a by-exception basis. The Coast Guard assumes that
owners and operators have already implemented physical access
limitations and systems, by which access can be granted on a by-
exception basis, based on requirements established in Sec. Sec.
104.265 and 104.270 for vessels, Sec. Sec. 105.255 and 105.260 for
facilities, and Sec. Sec. 106.260 and 106.265 for OCS facilities.
Therefore, we do not believe that this proposed rule would impose new
regulatory costs on owners and operators of facilities, OCS facilities,
and U.S.-flagged vessels for this provision. However, we understand
that Sec. 101.650(i)(2), which requires potential blocking, disabling,
or removing of unused physical access ports on IT and OT
infrastructure, may represent taking steps above and beyond what has
been expected under established requirements. The Coast Guard currently
lacks information on the prevalence of these physical access ports on
systems in use in the affected population, and therefore cannot
currently calculate an associated cost. We request public comment on
the anticipated costs associated with physical security provisions in
this proposed rule above and beyond what has already been incurred
under existing regulation.
Lastly, it is likely that this proposed rule would have
unquantifiable costs associated with the incompatibility between the
installation of the proposed newer software and the use of older or
legacy software systems on board U.S.-flagged vessels, facilities, and
OCS facilities. We request comments from the public on the anticipated
costs associated with this difference in software for the affected
population of this proposed rule.
Sources of Uncertainty Related to Quantified Costs in the Proposed Rule
Given the large scope of this proposed rule, our analysis contains
several areas of uncertainty that could lead us to overestimate or
underestimate the quantified costs associated with certain provisions.
In table 39, we outline the various sources of uncertainty, the
expected impact on cost estimates due to the uncertainty, potential
cost ranges, and a ranking of the source of uncertainty based on how
much we believe it is impacting the accuracy of our estimates. A rank
of 1 indicates that we believe the source of uncertainty has the
potential to cause larger overestimates or underestimates than a source
of uncertainty ranked 2, and so on. The Coast Guard requests public
comment from members of the affected populations of facilities, OCS
facilities, and U.S.-flagged vessels who could provide insight into the
areas of uncertainty specified in table 40, especially those relating
to potential cost estimates, hour burdens, or current baseline
activities.
[[Page 13462]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.039
[[Page 13463]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.040
[[Page 13464]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.041
[[Page 13465]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.042
[[Page 13466]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.043
[[Page 13467]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.044
The uncertainty surrounding these aspects of this analysis makes
estimating many costs challenging. The Coast Guard has considered
several alternative scenarios to demonstrate how alternative
assumptions may affect
[[Page 13468]]
the cost estimates presented in this analysis.
First, we consider an alternative assumption regarding the baseline
cybersecurity activities in the population of U.S.-flagged vessels,
which we determined may have the biggest impact on our cost estimates
for this proposed rule. Because the Coast Guard lacks data on current
cybersecurity activities in the population of U.S.-flagged vessels, we
assume that all owners and operators of U.S.-flagged vessels have no
baseline cybersecurity activity to avoid potentially underestimating
costs in the preceding cost analysis. However, we were able to use
existing survey data to estimate baseline cybersecurity activity in the
population of facilities and OCS facilities, which allowed us to more
accurately estimate the cost impacts of many of the proposed
provisions.
If we use the same rates of baseline activity we assume for
facilities and OCS facilities for the U.S.-flagged vessels as well, we
would see a reduction in undiscounted cost estimates related to account
security measures, multifactor authentication implementation and
management, cybersecurity training, and penetration testing. Like the
rates of baseline activity cited for the population of facilities and
OCS facilities, this alternative would assume that 87 percent of the
U.S.-flagged vessel population are managing account security, 83
percent have implemented multifactor authentication, 25 percent are
conducting cybersecurity training, and 68 percent are conducting
penetration tests.\90\ Using these assumptions would result in
estimated annual population costs of approximately $119,891 for account
security ($922,239 primary estimated cost x 0.13), $5,670,537 for
multifactor authentication implementation and maintenance ($33,356,100
primary estimated cost x 0.17), $4,827,371 for cybersecurity training
($6,436,494 primary estimate cost x 0.75), and $4,583,264 for
penetration testing ($14,322,700 primary estimated cost x 0.32). This
would result in reduced undiscounted annual cost estimates of
approximately $47,882,654 for the population of U.S.-flagged vessels.
See table 41.
---------------------------------------------------------------------------
\90\ See footnote 69.
[GRAPHIC] [TIFF OMITTED] TP22FE24.045
The Coast Guard requests comment on whether these assumptions of
baseline activity are more reasonable than what is currently used in
this RIA, or if there are additional alternative assumptions about
baseline activities in these areas or other areas not discussed that
would lead to more accurate estimates.
In addition, we considered adding cost estimates for those areas of
uncertainty where we were able to estimate a range of potential costs.
For proposed provisions in Sec. 101.650(c) and (g) related to storing
data logs and performing data backups, we anticipate that this data
storage will be set up to occur in the background, meaning systems will
not need to be taken offline and no burden hours. However, this makes
the associated cost a function of the data space required to store and
backup data. While we do not have information on how much data space a
given company would need, we can estimate industry costs based on SME
estimates for a range of potential data space amounts. As described in
table 40, current market prices indicate that cloud-based storage can
cost from $21 to $41 per month for 1 terabyte of data, $54 to $320 per
month for 10 terabytes, and up to $402 to $3200 per month for 100
terabytes of data. To estimate the annual cost of 1 additional terabyte
of data, we take the average estimated monthly cost of $31 [($41 + $21)
/ 2] and multiply it by 12 to find the average annual cost of $372 per
terabyte. If each facility and OCS facility company required an
additional terabyte of data space as a result of this proposed rule, we
would estimate approximately $635,376 ($372 x 1,708 facility owners and
operators) in additional undiscounted annual costs to industry.
Similarly, if we assumed each U.S.-flagged vessel company required an
additional terabyte of data space because of this proposed rule, we
would estimate approximately $660,300 ($372 x 1,775 vessel owners and
operators) in additional undiscounted annual costs to industry. See
table 42.
[[Page 13469]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.046
These costs could change if we were to add additional assumptions
about current baseline activities or adjusted the expected need for
data space. Therefore, we request public comment on the accuracy and
inclusion of these estimates.
Government Costs
There are three primary drivers of Government costs associated with
this proposed rule. The first would be under proposed Sec. 101.630(e),
where owners and operators of the affected population of U.S.-flagged
vessels, facilities, and OCS facilities would be required to submit a
copy of their Cybersecurity Plan for review and approval to either the
cognizant COTP or the OCMI for facilities or OCS facilities, or to the
MSC for U.S.-flagged vessels. In addition, proposed Sec. 101.630(f)
would require owners and operators to submit Cybersecurity Plan
amendments to the Coast Guard, under certain conditions, for review and
approval. The second cost driver is related to the marginal increase in
inspection time as a result of added Cybersecurity Plan components that
will be reviewed as a part of an on-site inspection of facilities, OCS
facilities, and U.S.-flagged vessels. The final cost driver would be
under proposed Sec. 101.650(g)(1), where owners and operators of the
affected population of U.S.-flagged vessels, facilities, and OCS
facilities would be required to report cyber incidents to the NRC. The
NRC would then need to process the report and generate notifications
for each incident report they receive. The Coast Guard examines these
costs under the assumption that we will use the existing frameworks in
place to review security plans and amendments, process incident
reports, and conduct inspections. Given uncertainty surrounding Coast
Guard staffing needs related to this proposed rule, we have not
estimated costs associated with new hires or the establishment of a
centralized office.
First, we analyze the costs to the Government associated with
reviewing and approving Cybersecurity Plans and amendments. Based on
Coast Guard local facility inspector estimates, it would take plan
reviewers about 40 hours to review an initial Cybersecurity Plan for a
facility or OCS facility, 8 hours to review a resubmission of a Plan in
the initial year, and 4 hours to review an amendment in years 3 through
6 and 8 through 10 of the analysis period. It would also take about 8
hours of review for the renewal of plans in year 7 of the analysis
period, and another 8 hours for any necessary resubmissions of Plan
renewals. The hour-burden and frequency estimates for resubmissions and
amendments are consistent with estimates for resubmissions of FSPs and
OCS FSPs, as we expect the Cybersecurity Plans and amendments to be of
a similar size and scope. As discussed earlier in the analysis, we
estimate that resubmissions of initial Cybersecurity Plans and Plan
renewals occur at a rate of 10 percent in years 2 and 7 of the analysis
period. We use the number of facilities and OCS facilities that would
submit Plans, which would be about 3,411.
We determine the wage of a local facility inspector using publicly
available data found in Commandant Instruction 7310.1W.\91\ We use an
annual mean hourly wage rate of $89 for an inspector at the O-3
(Lieutenant) level, based on the occupational labor category used in
ICR 1625-0077.
---------------------------------------------------------------------------
\91\ Readers can view Commandant Instruction 7310.1W for
military personnel at media.defense.gov/2022/Aug/24/2003063079/-1/-1/0/CI_7310_1W.PDF, accessed January 2024.
---------------------------------------------------------------------------
We estimate the undiscounted second-year (initial year of Plan
review) cost for the Coast Guard to review Cybersecurity Plans for U.S.
facilities and OCS facilities to be approximately $12,385,952 [(3,411
facility Plan initial submissions x $89.00 x 40 hours) + (341 facility
Plan resubmissions x $89.00 x 8 hours)]. Except in year 7, when renewal
of all Plans would occur, we estimate the undiscounted annual cost to
the Coast Guard for the review of amendments to be approximately
$1,214,316 (3,411 amendments x $89.00 x 4 hours). In year 7, we
estimate the undiscounted cost to be approximately $2,671,424 [(3,411
Plans for 5-year renewal x $89.00 x 8 hours) + (341 facility Plan
resubmissions x $89.00 x 8 hours)]. We estimate the discounted cost for
the Coast Guard to review facility and OCS facility Cybersecurity Plans
to be approximately $18,059,127 over a 10-year period of analysis,
using a 7-percent discount rate. We estimate the annualized cost to be
approximately $2,571,213, using a 7-percent discount rate. See table
43.
[[Page 13470]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.047
Based on Coast Guard MSC estimates, it would take about 28 hours to
review an initial U.S.-flagged vessel Cybersecurity Plan, 8 hours to
review a resubmission of the Cybersecurity Plan in the initial year,
and 4 hours to review
[[Page 13471]]
an amendment in years 3 through 6 and 8 through 10 of the analysis
period. It would also take about 8 hours of review for the renewal of
Plans, and another 8 hours to review resubmitted Plan renewals in year
7 of the analysis period. The hour-burden and frequency estimates for
resubmissions and amendments are consistent with estimates for
resubmissions of VSPs, as we expect the Cybersecurity Plans and
amendments to be of a similar size and scope. We use the number of
U.S.-flagged vessel owners and operators who would submit Plans, about
1,775.
According to ICR 1625-0077, the collection of information related
to VSPs, FSPs, and OCS FSPs, the MSC uses contract labor to conduct
Plan and amendment reviews. The MSC provided us with its independent
Government cost estimate for their existing contract for VSP reviews.
The average loaded annual mean hourly wage rate for the various
contracted reviewers from the independent Government cost estimate is
$81.83.
We estimate the undiscounted second-year cost for the Coast Guard
to review Cybersecurity Plans for U.S.-flagged vessels to be
approximately $4,183,477 [(1,775 initial vessel Plan submissions x
$81.83 x 28 hours) + (178 vessel Plan resubmissions x $81.83 x 8
hours)]. Except in year 7, when resubmission of all Plans would occur,
we estimate the undiscounted annual cost to the Coast Guard for
reviewing amendments to be approximately $580,993 (1,775 amendments x
$81.83 x 4 hours). In year 7, we estimate the undiscounted cost to be
approximately $1,278,512 [(1,775 Plans for 5-year renewal x $81.83 x 8
hours) + (178 facility Plan resubmissions x $81.83 x 8 hours)]. We
estimate the discounted cost for the Coast Guard to review U.S.-flagged
vessel Cybersecurity Plans to be approximately $7,118,596 over a 10-
year period of analysis, using a 7-percent discount rate. We estimate
the annualized cost to be approximately $1,013,528, using a 7-percent
discount rate. See table 44.
[[Page 13472]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.048
The second source of Government costs would be the marginal
increase in onsite inspection time due to the expansion of FSPs, OCS
FSPs, and VSPs to include the Cybersecurity Plans and provisions
proposed by this NPRM. The
[[Page 13473]]
proposed cybersecurity provisions would add to the expected onsite
inspection times for the populations of facilities, OCS facilities, and
U.S.-flagged vessels. Coast Guard SMEs within CG-FAC conferred with
local inspection offices to estimate the expected marginal increase in
facility and OCS facility inspection time. Local facility inspectors
estimate that the additional cybersecurity provisions from this
proposed rule would add an average of 1 hour to an onsite inspection,
and that the inspection would typically be performed by an inspector at
a rank of O-2 (Lieutenant Junior Grade). According to Commandant
Instruction 7310.1W Reimbursable Standard Rates, an inspector with an
O-2 rank has a fully loaded wage rate of $72.\92\ Therefore, we
estimate the annual undiscounted Government cost associated with the
expected marginal increase in onsite inspections of facilities and OCS
facilities is $245,592 (3411 facilities and OCS facilities x 1 hour
inspection time x $72 facility inspector wage). We estimate the total
discounted cost of increased inspection time to be approximately
$1,724,936 over a 10-year period of analysis, using a 7-percent
discount rate. We estimate the annualized cost to be approximately
$245,592, using a 7-percent discount rate. See table 45.
---------------------------------------------------------------------------
\92\ Readers can view Commandant Instruction 7310.1W for
military personnel at media.defense.gov/2022/Aug/24/2003063079/-1/-1/0/CI_7310_1W.PDF, accessed December 2023.
[GRAPHIC] [TIFF OMITTED] TP22FE24.049
Similarly, Coast Guard SMEs within CG-ENG estimate that the
additional cybersecurity provisions from the proposed rule would add an
average of 0.167 hours (10 minutes) to an on-site inspection of a U.S.-
flagged vessel and that the inspection would typically be performed by
an inspector at a rank of E-5 (Petty Officer Second Class). According
to Commandant Instruction 7310.1W Reimbursable Standard Rates, an
inspector with an E-5 rank has a fully loaded wage rate of $58.
Therefore, we estimate the annual undiscounted Government cost
associated with the expected marginal increase in onsite inspections of
U.S.-flagged vessels is $99,630 (10,286 vessels x 0.167 hours
inspection time x $58 facility inspector wage). We estimate the total
discounted cost of increased inspection time to be approximately
$699,761 over a 10-year period of analysis, using a 7-percent discount
rate. We estimate the annualized cost to be approximately $99,630,
using a 7-percent discount rate. See table 46.
[[Page 13474]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.050
The final source of Government costs from this proposed rule would
be the time to process and generate notifications for each cyber
incident reported to the NRC. As discussed earlier in our analysis of
costs associated with cyber incident reporting, from 2018 to 2022, the
NRC fielded and processed an average of 18 cyber incident reports from
facilities and OCS facilities, and an average of 2 cyber incident
reports from U.S.-flagged vessels, for a total of 20 cyber incident
reports per year. In addition, the NRC generated an average of 31
notifications for appropriate Federal, State, local and tribal agencies
per processed cyber incident over that same time period, meaning an
average of 620 notifications per year (20 cyber incident reports x 31
notifications).
Based on ICR 1625-0096, Report of Oil or Hazardous Substance
Discharge; and Report of Suspicious Maritime Activity, it takes the NRC
approximately 0.15 hours (8.5 minutes) to receive an incident report,
and 0.2 hours (12 minutes) to disseminate a verbal notification to the
Federal on-scene coordinator or appropriate Federal agency. Given that
cyber incidents and the reports of suspicious activity detailed in the
ICR are processed in a similar fashion, we use the same hour estimates
here. According to ICR 1625-0096, a contractor, equivalent to a GS-9,
processes incident reports and generates relevant notifications. We use
the GS-9-Step 5 hourly basic rate from the Office of Personnel
Management (OPM) 2022 pay table, or $29.72.\93\ To account for the
value of benefits to government employees, we first calculate the share
of total compensation of Federal employees accounted for by wages. The
Congressional Budget Office (2017) reports total compensation to
Federal employees with a bachelor's degree (consistent with a GS level
of GS-7 to GS-10) as $67.00 per hour and associated wages as
$39.50.\94\ This implies that total compensation is approximately 1.70
times the average wage ($67.00 / $39.50). Therefore, we can calculate
$50.52 ($29.72 x 1.70 load factor) as the fully loaded wage rate for
the NRC contractor equivalent to a GS-9, Step 5.
---------------------------------------------------------------------------
\93\ Please see: https://www.opm.gov/policy-data-oversight/pay-leave/salaries-wages/salary-tables/pdf/2022/RUS_h.pdf. We use the
Rest of U.S. (RUS) rate here to maintain consistency with the rates
used in ICR 1612-0096; accessed July 12, 2023.
\94\ Congressional Budget Office (2017), ``Comparing the
Compensation of Federal and Private-Sector Employees, 2011 to
2015,'' https://www.cbo.gov/system/files/115th-congress-2017-2018/reports/52637-federalprivatepay.pdf, accessed July 19, 2023.
---------------------------------------------------------------------------
We estimate undiscounted annual Government costs of cyber incident
report processing and notification to be $6,416 [(20 cyber incident
reports x 0.15 hours to process x $50.52 contractor wage) + (620
notifications x 0.2 hours x $50.52 contractor wage)]. We estimate the
total discounted cost to be approximately $45,064 over a 10-year period
of analysis, using a 7-percent discount rate. We estimate the
annualized cost to be approximately $6,416, using a 7-percent discount
rate. See table 47.
[[Page 13475]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.051
We estimate the total discounted Government costs of the proposed
rule for the review of Cybersecurity Plans, increase in on-site
inspection time, and processing cyber incident reports to be
approximately $27,647,481 over a 10-year period of analysis, using a 7-
percent discount rate. We estimate the annualized cost to be
approximately $3,936,379, using a 7-percent discount rate. See table
48.
[GRAPHIC] [TIFF OMITTED] TP22FE24.052
[[Page 13476]]
Total Costs of the Proposed Rule
We estimate the total discounted costs of the proposed rule to
industry and government to be approximately $562,740,969 over a 10-year
period of analysis, using a 7-percent discount rate. We estimate the
annualized cost to be approximately $80,121,654, using a 7-percent
discount rate. See table 49.
[GRAPHIC] [TIFF OMITTED] TP22FE24.053
Benefits
Malicious cyber actors, including individuals, groups, and nation
states, have rapidly increased in sophistication over the years and use
techniques that make them more and more difficult to detect. Recent
years have seen the rise of cybercrime as a service, where malicious
cyber actors are hired to conduct cyber-attacks.\95\ Some national
governments have also used ransomware to advance their strategic
interests, including evading sanctions.\96\ The increased growth of
cybercrime is a factor that has intensified in the last 20 years. Per
the Federal Bureau of Investigation's cybercrime reporting unit,
financial losses from reported incidents of cybercrime exceeded $10.3
billion in 2022, and $35.9 billion since 2001.\97\ While there are
significant private economic incentives for MTS participants to
implement their own cybersecurity measures, and survey results indicate
that MTS participants are more confident in their cybersecurity
capabilities than in years past, the same survey indicates that there
are important gaps in capabilities that leave the MTS and downstream
economic participants exposed to risk.\98\ In the 2018 report, the CEA
stated, ''[b]ecause no single entity faces the full costs of the
adverse cyber events, the Government can step in to achieve the optimal
level of cybersecurity, either through direct involvement in
cybersecurity or by incentivizing private firms to increase cyber
protection.'' \99\
---------------------------------------------------------------------------
\95\ See https://cybernews.com/security/crimeware-as-a-service-model-is-sweeping-over-the-cybercrime-world/ for a description of
cybercrime as a service and https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/ for a description of
its growth in recent years. Accessed December 6, 2023.
\96\ Institute for Security and Technology, ``RTF Report:
Combating Ransomware: A Comprehensive Framework for Action: Key
Recommendations from the Ransomware Task Force,'' https://securityandtechnology.org/ransomwaretaskforce/report/, accessed July
19, 2023.
\97\ See the Federal Bureau of Investigation's ``2022 Internet
Crime Report,'' Internet Crime Complaint Center (IC3), March 14,
2023. This report can be found at https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf, accessed December 4, 2023. For a
summary of financial losses from reported incidents of cybercrime
since 2001, see https://www.statista.com/statistics/267132/total-damage-caused-by-by-cybercrime-in-the-us/, accessed December 4,
2023.
\98\ Readers can access the survey in the docket or at https://www.joneswalker.com/en/insights/2022-Jones-Walker-LLP-Ports-and-Terminals-Cybersecurity-Survey-Report.html; accessed July 19, 2023.
See page 16 of the survey for data on industry confidence and pages
34-41 for data on cybersecurity practices.
\99\ Economic Report of the President supra note 1 at 369.
---------------------------------------------------------------------------
The overall benefit of this proposed rule would be the reduced risk
of a cyber incident and, if an incident occurs, improved mitigation of
its impact. This would benefit owners and operators and help protect
the maritime industry and the United States. We expect this proposed
rule would have significant but currently unquantifiable benefits for
the owners and operators of facilities, OCS facilities, and U.S.-
flagged vessels, as well as downstream economic participants \100\ and
the public at large. This proposed rule would benefit the owners and
operators of facilities, OCS facilities, and U.S.-flagged vessels by
having a means, through the Cybersecurity Plan, to ensure that all
cybersecurity measures are in place and tested periodically, which
would improve the resiliency of owners and operators to respond to a
cyber incident and to maintain a current cybersecurity posture,
reducing the risk
[[Page 13477]]
of economic losses for owners and operators as well as downstream
economic participants. For example, this proposed rule would require
training, drills, and exercises, which would benefit owners and
operators by having a workforce that is knowledgeable and trained in
most aspects of cybersecurity, which reduces the risk of a cyber
incident and mitigates the impact if an incident occurs. Conducting
training, drills, and exercises would also enable the owners and
operators of facilities, OCS facilities, and U.S.-flagged vessels to
prevent, detect, and respond to a cyber incident with improved
capabilities.
---------------------------------------------------------------------------
\100\ Downstream economic participants are entities or
individuals involved in the later stages of the supply chain or
production process, such as distributors, wholesalers, service
providers, and retailers that supply and sell products directly to
consumers.
---------------------------------------------------------------------------
In addition, cybersecurity measures in this proposed rule would
require owners and operators of facilities, OCS facilities, and U.S.-
flagged vessels to identify weaknesses or vulnerabilities in their IT
and OT systems and to develop strategies or safeguards to identify and
detect security breaches when they occur. The software and physical
requirements of this proposed rule would ensure that there is the
minimal level of protection for critical IT and OT systems and allow
for the proper monitoring of these systems. In table 50, we list the
expected benefits associated with each major regulatory provision of
the proposed rule.
[[Page 13478]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.054
[[Page 13479]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.055
[[Page 13480]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.056
[[Page 13481]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.057
[[Page 13482]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.058
[[Page 13483]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.059
[[Page 13484]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.060
Cyber Incidents and Risks Addressed by the Proposed Rule
---------------------------------------------------------------------------
\101\ Economic Report of the President supra note 1 at 370.
\102\ Economic Report of the President supra note 1 at 370 and
327.
\103\ Economic Report of the President supra note 1 at 362.
\104\ Economic Report of the President supra note 1 at 382-383.
\105\ Economic Report of the President supra note 1 at 342.
---------------------------------------------------------------------------
In May 2021, the Colonial Pipeline Company suffered a cyber-attack
that disrupted the supply of fuel to the east coast of the United
States. Colonial Pipeline Company was forced to shut down operations
for 6 days, which created gasoline and fuel shortages. In addition to
the direct financial losses incurred by Colonial Pipeline Company, the
shutdown and subsequent shortages negatively impacted consumers,
creating a 4 cents-per-gallon increase in average gasoline prices in
the impacted areas, with price increases lingering even after the
pipeline returned to operation.\106\ Further, fuel shortages caused
some fuel stations to temporarily close due to shortened supply, and
some airlines in the impacted area were forced to scramble for
additional fuel sources and added additional stops along select long-
haul flights.\107\ This was a ransomware cyber-attack that, based on
public reports, was a result of the attackers using a legacy Virtual
Private Network and Colonial Pipeline not having a two-factor
authentication method, more commonly known as multifactor
authentication, in place on its computer systems.\108\ Therefore, it
was possible for computer hackers to access Colonial Pipeline's
computer systems with only a password. This proposed rule would likely
prevent an attack similar to the Colonial Pipeline attack from
occurring by requiring owners and operators of vessels, facilities, and
OCS facilities to implement account security measures and multifactor
authentication on their computer systems. An example of multifactor
authentication would be requiring a five- or six-digit passcode after a
password has been entered by company personnel. Multifactor
authentication is part of account security measures in the proposed
Sec. 101.650.
---------------------------------------------------------------------------
\106\ Tsvetanov, T., & Slaria, S. (2021). The effect of the
colonial pipeline shutdown on gasoline prices. Economics Letters,
209. https://doi.org/10.1016/j.econlet.2021.110122. Accessed
December 14, 2023.
\107\ Josephs, L. (2021). Pipeline outage forces American
Airlines to add stops to some long-haul flights, southwest flies in
Fuel. CNBC. https://www.cnbc.com/2021/05/10/colonial-pipeline-shutdown-forces-airlines-to-consider-other-ways-to-get-fuel.html,
accessed January 18, 2024.
\108\ U.S. Senate, Joseph Blount, Jr. Committee on Homeland
Security & Governmental Affairs. ``Hearing Before the United States
Senate Committee on Homeland Security and Governmental Affairs--
Threats to Critical Infrastructure: Examining the Colonial Pipeline
Cyber Attack.'' June 8, 2021. Washington, DC and via video
conference. Text can be downloaded at https://www.hsgac.senate.gov/hearings/threats-to-critical-infrastructure-examining-the-colonial-pipeline-cyber-attack/, accessed June 28, 2023.
---------------------------------------------------------------------------
The encryption of data in the proposed Sec. 101.650 under data
security measures may have relegated stolen data to being useless in
the event of a cyber-attack. Furthermore, Colonial Pipeline would
likely have benefitted from a penetration test, which they had not
conducted, to ensure the safety and security of its critical systems.
The proposed requirement of a penetration test would simulate real-
world cyber-attacks that would help companies identify the risks to
their computer systems and prepare the necessary measures to lessen the
severity of a cyber-attack.
Additionally, under proposed Sec. 101.650 for device security
measures, documenting and identifying the network map and OT device
configuration information, Colonial Pipeline may have been able to
detect exactly where the connections to the affected systems were and
may have been able to isolate the problem without having to shut down
all pipeline operations, as it did temporarily, which greatly affected
its fuel supply operations.
[[Page 13485]]
Lastly, Colonial Pipeline did not have a Cybersecurity Plan in
place but did have an emergency response plan. With proposed Sec. Sec.
101.630, Cybersecurity Plan, and 101.635, Drills and Exercises, a
Cybersecurity Plan could have benefitted Colonial Pipeline because it
includes periodic training and exercises that increase the awareness of
potential cyber threats and vulnerabilities throughout the
organization. A Cybersecurity Plan also creates best practices so
company personnel have the knowledge and skills to identify, mitigate,
and respond to cyber threats when they occur. Creating the
Cybersecurity Plan would allow the CySO to ensure all aspects of the
Plan have been implemented at a CySO's respective company. Improved
awareness of potential cybersecurity vulnerabilities and the steps
taken to correct them could have helped Colonial Pipeline identify its
password weakness issue before it was exploited.
In another cyber-attack that occurred in 2017 against the global
shipping company Maersk, computer hackers, based on public reports,
exploited Maersk's computer systems because of vulnerabilities in
Microsoft's Windows operating system. The malware was disguised as
ransomware, which created more damage to Maersk's computer systems. In
2016, one year prior to the attack, IT professionals at Maersk
highlighted imperfect patching policies, the use of outdated operating
systems, and a lack of network segmentation as the largest holes in the
company's cybersecurity. While there were plans to implement measures
to address these concerns, they were not undertaken, leaving Maersk
exposed and underprepared for the attack it faced in 2017. The effects
of this attack were far-reaching. Beyond the direct financial losses
incurred by Maersk (estimated at nearly $300 million), shipping delays
and supply chain disruptions caused additional downstream economic
losses that are much more difficult to quantify as shipments went
unfulfilled for businesses and consumers, and trucks were forced to sit
and wait at ports.\109\ Under proposed Sec. 101.650, cybersecurity
measures such as patching would likely prevent a similar attack from
occurring and help prevent such losses. Patching vessel, facility, and
OCS facility computer systems would ensure they are not vulnerable to a
cyber-attack because the latest software updates would be installed on
these systems with periodic software patches.
---------------------------------------------------------------------------
\109\ Andy Greenberg, ``The Untold Story of NotPetya, the Most
Devastating Cyberattack in History''; WIRED; August 22, 2018;
https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/, accessed June 28, 2023.
---------------------------------------------------------------------------
Additionally, penetration testing may have identified the
vulnerabilities in Maersk's computer systems. Regular cybersecurity
drills and exercises may have enabled Maersk's employees to quickly
identify the cyber threat and may have reduced the impact and longevity
of the cyber-attack. Further, network segmentation as proposed in Sec.
101.650(h) could have helped stop the spread of malware to all its
computer systems, which ultimately crippled its operations. By
separating networks, Maersk could have better isolated the attack and
kept larger portions of its business open, meaning fewer financial
losses and downstream economic impacts to other companies and
consumers.
Resilience played a significant role in Maersk's ability to recover
from the cyber-attack quickly. Company personnel worked constantly to
recover the affected data and eventually restored the data after 2
weeks.\110\ Proposed Sec. 101.650 contains provisions for resilience,
which owners and operators such as Maersk must possess to recover from
a cyber-attack. However, with proper backups of critical IT and OT
systems, Maersk may have been able to recover more quickly from the
attack.
---------------------------------------------------------------------------
\110\ News reports suggest this recovery time was luck and not
due to existing cybersecurity practices. ``Maersk staffers finally
found one pristine backup in their Ghana office. By a stroke of
luck, a blackout had knocked the server offline prior to the
NotPetya attack, disconnecting it from the network. It contained a
single clean copy of the company's domain controller data, and its
discovery was a source of great relief to the recovery team.'' See
Daniel E. Capano, ``Throwback Attack: How NotPetya accidentally took
down global shipping giant Maersk,'' September 30, 2021, https://www.industrialcybersecuritypulse.com/threats-vulnerabilities/throwback-attack-how-notpetya-accidentally-took-down-global-shipping-giant-maersk/, accessed July 25, 2023.
---------------------------------------------------------------------------
The Coast Guard emphasizes that this proposed rule might also have
quantifiable benefits from reducing or preventing lost productivity
from a cyber incident and possibly lost revenues from the time that
critical IT and OT systems are inoperable as a result of a cyber
incident, if one occurs. Such benefits would accrue to owners and
operators of vessels and facilities, as well as to downstream
participants in related commerce, and to the public at large. For
instance, short-term disruptions to the MTS could result in increases
to commodity prices, while prolonged disruptions could lead to
widespread supply chain shortages. Short- and long-term disruptions and
delays may affect other domestic critical infrastructure and
industries, such as our national defense system, that depend on
materials transported via the MTS.
The societal impacts from a cyber security incident such as the
attack that occurred against Maersk are difficult to quantify. They may
include the effects of delays in cargo being delivered, which could
result in the loss of some or all of the cargo, especially if the cargo
is comprised of perishable items such as food or raw goods, such as
certain types of oil that would be later used in the supply chain to
manufacture final goods such as food items. Delays themselves may
result in the unfulfillment of shipping orders to customers as vessels
wait offshore to enter a port, which would have the downstream effect
of customers not receiving goods because delivery trucks would sit idle
at ports until OT and IT systems either at the port or onboard vessels
once again become operational after the attack. Other societal impacts
could include, but are not limited to, delays in shipments of medical
supplies that may be carried onboard vessels that would not be
delivered on time to individuals and medical institutions who rely on
these supplies for their healthcare needs and service, respectively.
Therefore, it should be noted that a cyber-attack may have considerable
economic impacts on multiple industries in the United States such as,
but not limited to, healthcare, food, transportation, utilities,
defense, and retail. It should also be noted that the Coast Guard is
not able to estimate, quantify, or predict the societal harm of
shipping delays from a cyber-attack on the MTS or the economic impact
it could cause because it would be dependent on many variables such as:
the type of attack, the severity of the attack, the length of the
attack, the response by the affected parties to the attack, and other
variables.
The benefits of this NPRM could be particularly salient in the case
of a coordinated attack by a malicious actor seeking to disrupt
critical infrastructure for broader purposes. For instance, in a
circumstance where the rule's provisions prevented a terrorist or
nation-state actor \111\ from using a cyber-
[[Page 13486]]
attack in connection with a broader scheme that threatened human life,
a strategic waterway, or a major port, the avoided economic and social
costs may be substantial.
---------------------------------------------------------------------------
\111\ For instance, the Office of the Director of National
Intelligence recently reported on the cyber espionage and attack
threats from multiple nation-states with respect to U.S. critical
infrastructure. See Office of the Director of National Intelligence,
Annual Threat Assessment of the U.S. Intelligence Community at 10,
15, 19 (Feb. 6, 2023), available at https://www.dni.gov/files/ODNI/documents/assessments/ATA-2023-Unclassified-Report.pdf (last visited
July 31, 2023) (describing cyber threats associated with China,
Russia, and Iran). A recent multi-national cybersecurity advisory
noted that ``Russian state-sponsored cyber actors have demonstrated
capabilities to compromise IT networks; develop mechanisms to
maintain long-term, persistent access to IT networks; exfiltrate
sensitive data from IT and [OT] networks; and disrupt critical [ICS/
OT] functions by deploying destructive malware.'' See Joint
Cybersecurity Advisory, Russian State Sponsored and Criminal Cyber
Threat to Critical Infrastructure, Alert AA22-110A (April 20, 2022),
available at: https://www.cisa.gov/uscert/ncas/alerts/aa22-110a
(accessed December 14, 2023).
---------------------------------------------------------------------------
With respect to the latter, as noted by Cass R. Sunstein in Laws of
Fear: Beyond the Precautionary Principle (The Seeley Lectures, Series
Number 6), ``fear is a real social cost, and it is likely to lead to
other social costs.'' \112\ In addition, Ackerman and Heinzerling state
``terrorism `works' through the fear and demoralization caused by
uncontrollable uncertainty.'' As devastating as the direct impacts of a
successful cyber-attack can be on the U.S. marine transportation system
and supply chain, avoiding the impacts of the more difficult to measure
indirect effects of fear and demoralization in connection with a
coordinated attack would also entail substantial benefits. However, the
Coast Guard is not able to quantify these potential benefits because
they would depend on the incident, the duration of the incident, and
how various private and public actors would respond to the incident.
---------------------------------------------------------------------------
\112\ Cass R. Sunstein, Laws of Fear, at 127; Cambridge
University Press (2005).
---------------------------------------------------------------------------
Through the provisions of this proposed rule, benefits from
implementing and enhancing a cybersecurity program may likely increase
over time. By requiring that a range of cybersecurity measures be
implemented, such as account security measures, vulnerability scanning,
and automated backups, an organization can drastically reduce the
downtime it takes to remedy a breach. Education and training can also
help guide employees to identify potential email phishing scams,
suspect links, and other criminal efforts, which will likely increase
protection against external and internal threats before they occur.
Further, because so many of the proposed provisions include periodic
updates and modifications following tests or assessments, we believe
that cybersecurity programs will continue to improve each time they are
tested and reexamined by the implementing entity.
This NPRM proposes to address the challenges facing businesses
today by requiring the implementation of safeguards to cybersecurity on
the MTS. In adopting these measures, owners and operators of U.S.-
flagged vessels, facilities, and OCS facilities can take preemptive
action before malicious actors and the threats they pose take advantage
of vulnerabilities in their critical IT and OT systems.
Breakeven Analysis
While the Coast Guard is able to describe the qualitative benefits
that this proposed rule may have for owners and operators of U.S.-
flagged vessels, facilities, and OCS facilities, and others who would
be affected by a cyber-attack, the Coast Guard is not able to quantify
and monetize benefits. One reason is that it is challenging to project
the number of cyber-attacks that would occur over a relevant period
without this proposed rule; another reason is that it is challenging to
quantify the magnitude of the harm from such attacks. It is further
challenging to quantify the marginal impact of this rulemaking, both
because the Coast Guard cannot quantify the effectiveness of the
provisions included in the proposals (how many attacks would be
prevented or how much damage would be mitigated) and because the Coast
Guard has uncertainty around the appropriate baseline to consider
regarding what cybersecurity actions are being taken for reasons beyond
this rulemaking. Without such projections and quantification, it is not
possible to monetize the benefits of the proposed rule in terms of
harms averted. As an alternative, we present a breakeven analysis for
this proposed rule.
Thus, this breakeven analysis only considers the $80 million in
costs (at a 7 percent discount rate) that Coast Guard was able to
quantify. The Coast Guard notes that, based on available data, there
are likely additional costs the Coast Guard is not able to monetize.
Furthermore, the downstream costs and impacts resulting from a cyber-
attack on an individual firm are challenging to quantify given the
overlapping and intersecting nature of the supply chain. However,
research examining the overall impacts of the NotPetya cyber-attack
(one of the largest cyber-attacks in history), estimates societal
impacts and downstream costs nearly four times greater than the direct
impact on the firm suffering the initial attack.\113\ The Coast Guard
requests comment on this finding and its relevance to the impact of
cyber-attacks in the maritime transportation system specifically. To
the extent that the costs of this proposed rule are higher than the
Coast Guard's monetized estimate, the amount of costs this proposed
rule must prevent would also need to increase to justify this proposed
rule. The proposed rule would set the minimum requirements for
companies to address their cybersecurity posture and provides the
flexibility for these companies to take the necessary action to protect
themselves from a cyber-attack.
---------------------------------------------------------------------------
\113\ For example, analysis of the NotPetya attack revealed
overall estimates of impacts on customers four times greater than
those on the firms directly impacted by the attack. For more
details, please see: Matteo Crosignani et al, ``Pirates without
Borders: The Propagation of Cyberattacks through Firms' Supply
Chains,'' Federal Reserve Bank of New York Staff Reports, No. 937
(July 2020, revised July 2021), https://www.newyorkfed.org/medialibrary/media/research/staff_reports/sr937.pdf, accessed July
7, 2023.
---------------------------------------------------------------------------
OMB's Circular A-4 (September 17, 2003) states that, in the case of
``non-quantified factors,'' agencies may consider the use of a
threshold (``breakeven'') analysis.\114\ A breakeven analysis provides
calculations to show how small or large the value of the non-quantified
benefits could be before the proposed rule would yield zero net
benefits. For this proposed rule, we calculate breakeven results from
one example, using the estimated cost of a real-world cyber-attack on a
regulated entity. Global shipper Maersk reported that it suffered an
estimated $300 million in business costs and income losses due to a
cyber-attack.\115\ The actual losses were likely much larger than the
$300 million in business impacts to Maersk due to impacts on Maersk's
customers.
---------------------------------------------------------------------------
\114\ Readers can access OMB Circular A-4 dated September 17,
2003, at https://www.whitehouse.gov/wp-content/uploads/legacy_drupal_files/omb/circulars/A4/a-4.pdf, accessed July 20,
2023.
\115\ Greenberg, supra note 109.
---------------------------------------------------------------------------
Over the past decade, there have been numerous cyber-attacks--not
just on the international and domestic maritime sector, but on other
sectors of the U.S. and global economies.\116\ In a paper published by
Akpan, Bendiab, Shiaelis, Karamperidis, and Michaloliakos (2022), the
authors state that the maritime sector has shown a 900-percent increase
in cybersecurity breaches as it enters the digital era.\117\ The paper
adds that many automated systems on vessels, by their nature, are
vulnerable to a cyber-attack, and
[[Page 13487]]
include navigation systems such as Electronic Chart Display and
Information Systems, Global Positioning Systems, and Global Navigation
Satellite Systems. Other affected systems include radar systems;
Automatic Identification Systems; communication systems; and systems
that control the main engine, generators, among others (Akpan et al.,
2022).\118\ Furthermore, the paper presents the vulnerabilities and
consequences of cyber-attacks to ships' systems ranging from hijacking
ships, destroying and stealing data, damaging equipment, disrupting
vessel operations, uploading malware to computer systems, losing lives
and cargo, and more (Akpan et al., 2022).\119\
---------------------------------------------------------------------------
\116\ NIST provides a definition for the term ``cyber-attack.''
Readers can access this definition at https://csrc.nist.gov/glossary/term/cyber_attack; accessed July 20, 2023.
\117\ Frank Akpan, Gueltoum Bendiab, Stavros Shiaeles, Stavros
Karamperidis, and Michalis Michaloliakos; ``Cybersecurity Challenges
in the Maritime Sector''; Network; March 7, 2022; page 123; https://www.mdpi.com/2673-8732/2/1/9/pdf?version=1646653034; accessed May
2023. MDPI has open access to journals and published papers.
Additionally, NIST provides a definition of the term breach,
although not specifically related to cybersecurity at, https://csrc.nist.gov/glossary/term/breach, accessed July 2023.
\118\ Akpan et al., supra note 117, at 129-30.
\119\ Id.
---------------------------------------------------------------------------
In a paper by Jones (2016), the author noted that outdated systems
are vulnerable to cyber-attacks.\120\ The paper refers to a study that
states 37 percent of servers running Microsoft failed to download the
correct patch and left systems vulnerable to a cyber-attack.
Additionally, Jones states that ``many ships were built before cyber
security was a major concern'' and goes on to state that many newer
software systems are not compatible with older software systems.
---------------------------------------------------------------------------
\120\ Kevin Jones, ``Threats and Impacts in Maritime Cyber
Security,'' April 15, 2016, pages 7 and 8, https://pearl.plymouth.ac.uk/handle/10026.1/4387?show=full; accessed May 22,
2023.
---------------------------------------------------------------------------
Akpan, et al. (2022) also list a few cyber-attacks that have
occurred in the maritime transportation sector in the past few years.
Allianz Global Corporate and Specialty (AGCS) reports that there was a
record 623 million ransomware attacks in 2021.\121\ In a paper
published by Meland, Bernsmed, Wille, Rodseth, and Nesheim (2021), the
authors state that 46 successful \122\ cyber-attacks with a significant
impact on the maritime industry have occurred worldwide between 2010
and 2020, or an average of 4.2 attacks a year.\123\ Of the 46 attacks,
the most notable cyber-attack stated by the authors of this paper, and
earlier in the Benefits discussion of this preamble, occurred in 2017
against the shipping company Maersk. Maersk estimated their economic
loss to be nearly $300 million in the form of costs and reduced income
to a specific firm as the result of the incident (Meland et al., 2021).
Based on other reports, the economic damage that resulted from this
incident may have been considerably more because of the downstream
impacts that this incident may have had on customers and other
companies who rely on the shipping industry for their businesses.\124\
---------------------------------------------------------------------------
\121\ AGCS is a global insurance company. Readers can access
this report at https://www.agcs.allianz.com/news-and-insights/news/cyber-risk-trends-2022-press.html. The Coast Guard accessed this
report in May 2023. AGCS's website is, https://www.agcs.allianz.com.
\122\ The analysis did not include mere attempts to attack,
unsuccessful attacks, or attacks categorized as ``white hat''
attacks, which are attempts to infiltrate cybersecurity systems to
identify vulnerabilities in software, hardware, or networks.
Definition of ``white hat hacking'' at https://www.fortinet.com/resources/cyberglossary/whitehat-security, accessed July 20, 2023.
\123\ The title of this paper is ``A Retrospective Analysis of
Maritime Cyber Security Incidents.'' Readers can access this paper
at https://www.semanticscholar.org/paper/A-Retrospective-Analysis-of-Maritime-Cyber-Security-Meland-Bernsmed/6caba4635f991dd1d99ed98cf640812f8cae16ba (pages 519 and 523). The
Coast Guard accessed this pdf link in May 2023. Readers may need to
create an account to view this paper, other papers, and research
literature. The paper is also available at, https://www.transnav.eu.
The authors of the study noted that shipping is a very diverse
sector and that their source materials tend to focus on larger ships
and operations. The authors stated that it is highly unlikely that
this study has captured all the different cyber incidents over the
sector. Additionally, the authors did not define what a
``significant impact'' entails; nevertheless, in some cyber-attacks
they cited, they provided the effect of an attack in their
description of the incident.
\124\ This figure does not include indirect effects on third
parties, such as logistics firms and others who may have experienced
losses because of this incident. See, for example, Matteo Crosignani
et al, ``Pirates without Borders: The Propagation of Cyberattacks
through Firms' Supply Chains,'' Federal Reserve Bank of New York
Staff Reports, No. 937 (July 2020, revised July 2021), https://www.newyorkfed.org/medialibrary/media/research/staff_reports/sr937.pdf, accessed July 7, 2023 (analyzing a sample of customers
indirectly affected by the NotPetya attack, and concluding that
``the customers of these directly hit firms [of the NotPetya attack]
recorded significantly lower profits relative to similar but
unaffected firms,'' with one measure of effects on customers being
four times higher, in the aggregate, than effects on firms directly
affected by the attack); Andy Greenberg, Wired Magazine, ``The
Untold Story of NotPetya, the Most Devastating Cyberattack in
History'' (August 22, 2018), https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/, accessed July 7,
2023 (describing indirect costs to logistics firms and other costs
associated with a large-scale disruption to the global supply
chain).
---------------------------------------------------------------------------
Monetizing the impact of the cyber-attack on Maersk allows the
Coast Guard to create a breakeven point as it relates to a specific
company (risk reduction percentage and the number of years the proposed
rule would have to prevent one incident annually) for this proposed
rule using the estimated costs of a cyber-attack that occurred against
a shipping company. The breakeven point would be higher if effects on
third parties were considered.
Although this cyber-attack did not occur against a U.S. company,
and represents one attack against a single company, it impacted a large
shipping company and affected almost one-fifth of global shipping
operations, according to Meland, et al. (2021). The Coast Guard is
using this incident as an example while understanding that the economic
impact of a cyber-attack can vary greatly, depending upon the severity
of a cyber-attack and the surrounding conditions. We acknowledge that
the Maersk incident we use in this breakeven analysis may not be
representative of other cyber-attacks that occur in the future in the
maritime sector. Meland, et al. (2021), also state that a majority of
cyber-attacks in the maritime industry were not reported.
Using this example of a cyber-attack with our explanation in the
benefits section of the RIA of how we believe this proposed rule may
prevent such an attack, we can estimate a breakeven point. We take the
estimated annualized \125\ cost of this proposed rule using a 7-percent
discount rate ($80.1 million)--which may be an underestimation of the
actual costs that this proposed rule may impose on industry--and divide
by the avoided loss from the Maersk attack ($300 million)--a loss that
this proposed rule may prevent noting that the reported business loss
of the Maersk attack may be an underestimate of the actual impact of
the attack on social welfare.\126\ From there, we obtain an annual
risk-reduction value to the affected firm of approximately 0.267, or
about 27 percent ($80.1 million / $300 million), which is the minimum
annual risk-reduction percentage that would need to occur to justify
this proposed rule to the affected firm. If we state this another way,
this proposed rule would need to reduce the risk or the likelihood of
one or more successful cyber-attacks, similar to this attack, by
approximately 27 percent annually for the benefits to justify the
estimated costs to the affected firm. To be clear, the Coast Guard does
not have an estimate for how much this proposed rule would actually
reduce the risk of successful cyber-attacks on the MTS.
---------------------------------------------------------------------------
\125\ We use annualized costs because we assume this proposed
rule would result in constant reduced probability in every year
following this proposed rule's implementation. Stated differently,
we assume the risk reduction to be constant each year.
\126\ The loss estimate used for the Maersk attack also
represents a potential underestimation as it does not include
indirect effects on third parties, such as logistics firms and
others who may have experienced losses because of this incident. See
footnote 113.
---------------------------------------------------------------------------
The Coast Guard estimates the number of years the proposed rule
would have to prevent a cyber-attack to break even, though the Coast
Guard cautions that it does not know the degree to which the proposed
rule would prevent cyber-attacks. For an
[[Page 13488]]
incident similar to the Maersk cyber-attack, we estimate this proposed
rule would have to prevent at least one attack of this type (with the
same avoided losses) approximately every 3.75 years ($300 million /
$80.1 million) to break even. Additionally, the losses from similar
cyber-attacks may be lower given that this proposed rule may have the
intended effect of mitigating the size of losses from these types of
attacks. Readers should also note that the losses estimated from this
incident were reported by Maersk and not from an independent source.
Table 51 summarizes the breakeven results of this NPRM.
[GRAPHIC] [TIFF OMITTED] TP22FE24.061
Analysis of Alternatives
Cybersecurity has become a critical issue across all sectors. The
maritime industry, a pivotal component of the global supply chain, is
no exception. With an increasing amount of sensitive data being stored
and processed online, regulations are needed to protect this data from
unauthorized access and breaches. As cyber threats grow more
sophisticated and pervasive, it has become increasingly apparent that
clear and actionable cybersecurity regulations are needed for the
maritime industry. Furthermore, cybersecurity is not just a matter of
individual or business concerns, it is also a national security issue.
Robust regulations help protect critical infrastructure and government
services from cyber-attacks that could threaten national stability. For
instance, unauthorized access to a ship's navigation system could lead
to disastrous consequences, including collisions or groundings, which
can put people at risk and lead to economic losses for the affected
entities and the U.S. economy. To prevent incidents like this, the
Coast Guard has included several proposed regulatory provisions that
identify potential network and system vulnerabilities. Of these
provisions, penetration testing is one of the more intensive and
costly, but would provide important benefits, including demonstrating
where and how malicious actors could exploit system weaknesses, so that
organizations can better prioritize cybersecurity upgrades and
improvements based on risk.
Given the relatively high costs associated with penetration
testing, and the significant vulnerability risks associated with not
performing these tests, the Coast Guard contemplated four alternatives:
(1) maintain the status quo; (2) require annual penetration testing and
submission of results to the Coast Guard; (3) allow penetration testing
at the discretion of the owner or operator; or (4) require penetration
testing every 5 years in conjunction with the submission and approval
of Cybersecurity Plans (the preferred alternative).
(1) Status Quo
Currently. the Coast Guard does not require owners and operators of
facilities, OCS facilities, and U.S.-flagged vessels to conduct
penetration tests as a part of their security plans. Despite this,
survey data indicates that some MTS entities are already conducting
penetration tests for their organizations as they face an evolving
cyber threat landscape. While we expect the adoption of penetration
testing policies to grow over time, 32 percent of facility and OCS
facility owners and operators (see footnote number 69) and an unknown
number of U.S.-flagged vessel owners and operators have yet to add this
test to their suite of cybersecurity measures.
Maintaining the status quo by not requiring any penetration testing
would reduce the costs for affected owners and operators of the
proposed rule by $28,549,669, with an annualized cost reduction of
$4,064,831 over a 10-year period of analysis, discounted at 7 percent,
when compared to the preferred alternative. However, not requiring
penetration testing would leave a significant gap in the vulnerability
detection capability of a large portion of the MTS, exposing MTS
stakeholders and the wider U.S. economy to greater risk. Without
periodic penetration tests to determine weaknesses in critical IT and
OT systems, the affected population puts itself at greater risk of
cyber incidents, which can endanger employees, consumers, and the
supply chain. As a result, the Coast Guard rejected the status quo
alternative and has proposed requiring penetration tests every 5 years,
aligned with the renewal of a Cybersecurity Plan, as discussed in
alternative (4), below.
(2) Annual Penetration Testing
Penetration testing represents a crucial element of a comprehensive
cybersecurity strategy. It involves proactively testing computer
systems, networks, and software applications to identify
vulnerabilities that might be exploited by attackers. Because
penetration testing provides a much more in-depth review of the
vulnerabilities and weaknesses of IT and OT systems, the Coast Guard
considered an alternative that would require it on an annual basis.
Through annual penetration testing, an organization would be better
equipped to identify weaknesses within their systems and prepare for
real cyber threats. However, the costs and resources needed for
penetration testing can be significant. As such, annual testing might
impose an undue burden on the affected organizations.
Based on Coast Guard estimates, penetration testing would cost
approximately $5,000 per test, plus an additional $50 per IP address at
the organization to capture network complexity. By increasing the
frequency of these tests, the costs to facilities, OCS facilities, and
U.S. flagged vessels would increase significantly. Under the preferred
alternative, which requires penetration testing every 5 years in
conjunction with the submission and renewal of a Cybersecurity Plan,
the
[[Page 13489]]
Coast Guard estimates total costs of penetration testing to industry of
$28,549,669 and annualized costs of $4,064,831 over a 10-year period of
analysis, discounted at 7 percent (see the Penetration Testing section
of the RIA for more details on the calculations underlying this
estimate). Requiring annual penetration testing would increase industry
costs for penetration testing by over 300 percent, to approximately
$134,021,173 total and $19,081,600 annualized over a 10-year period of
analysis, discounted at 7 percent. This alternative would result in an
18.7 percent increase in the total cost of the rule, bringing the total
cost to industry and the government to approximately $668,212,472 total
and $95,138,423, annualized, over a 10-year period of analysis,
discounted at 7 percent. The Coast Guard believes these increased costs
are prohibitive and ultimately decided to reject this alternative. See
table 52 for the costs associated with annual penetration testing over
a 10-year period of analysis.
Using the estimated annualized cost of this alternative of
approximately $95.1 million, and using the Maersk cyber-attack, we
estimate the number of years this alternative would have to break even
and to prevent at least one or more attacks of this type annually (with
the same avoided losses) to be approximately 3.15 years ($300 million /
$95.1 million), compared with 3.75 years with the chosen alternative.
[GRAPHIC] [TIFF OMITTED] TP22FE24.062
(3) Penetration Testing at the Discretion of an Owner or Operator
Given the cost of penetration testing, particularly for small
businesses with limited resources, the Coast Guard considered an
alternative that would make penetration an optional provision. This
would allow those in the affected population to choose to prioritize
different cybersecurity measures. The decision to undertake penetration
testing could be made as a result of thorough risk assessments for each
organization, considering its operational environments, risk profile,
and pertinent threats.
Under this alternative, an owner or operator, or a CySO on their
behalf, could determine when a penetration test is warranted, if at
all. Because the testing would be optional, we assume that fewer owners
and operators would conduct penetration testing in a given year,
however, we have no way of knowing how many this would be. If none of
the affected owners or operators elected to conduct penetration
testing, this could hypothetically reduce costs for owners and
operators for penetration testing down to zero, meaning a cost
reduction of $28,549,669 and an annualized cost reduction of $4,064,831
over a 10-year period of analysis, discounted at 7 percent when
compared to the preferred alternative.
However, the value of penetration testing for most organizations
cannot be overstated. When integrated into a comprehensive
cybersecurity strategy, penetration testing can be very effective in
identifying vulnerabilities. By fostering a proactive rather than
reactive approach in cybersecurity, penetration testing enables
organizations to stay ahead of potential threats and better understand
how malicious actors could exploit weaknesses in IT and OT systems.
This is particularly crucial given the quickly evolving landscape of
cyber threats. In addition, because the costs of a potential cyber
incident could be high, with potential downstream economic impacts, the
Coast Guard must prioritize some level of oversight on provisions that
could lessen the risk of a cyber incident. Therefore, we rejected this
alternative, despite the potential cost savings. It should be noted,
however, that according to proposed Sec. 101.665, owners and operators
of facilities, OCS facilities, and U.S.-flagged vessels can seek a
waiver or an equivalence determination if they are unable to meet the
proposed requirements, penetration testing included.
With this alternative, the estimated annualized cost decreases to
approximately $76.1 million compared
[[Page 13490]]
with the chosen alternative. Using the Maersk cyber-attack, we estimate
the number of years for this alternative to breakeven and to prevent at
least one or more attacks of this type annually (with the same avoided
losses) to be approximately 3.9 years ($300 million / $76.1 million),
compared with 3.75 years with the chosen alternative.
(4) Penetration Testing in Conjunction With Cybersecurity Plan
Submission (Preferred Alternative)
In an effort to best balance the cost of annual penetration testing
with the risk of leaving the MTS vulnerable to cyber incidents with
even more costly impacts, the Coast Guard considered requiring
penetration tests every 5 years, aligned with the renewal of a
Cybersecurity Plan. This is the preferred alternative because
penetration testing would supplement other cybersecurity measures in
the proposed regulations such as vulnerability scanning, annual
Cybersecurity Assessments and audits, quarterly drills, and annual
exercises, which may limit the necessity of annual penetration testing.
However, making penetration testing an optional requirement for
organizations could inadvertently leave them more exposed to cyber-
attacks and limit the Coast Guard's understanding of the MTS'
cybersecurity readiness. Under the preferred alternative, owners and
operators are still free to conduct more frequent tests at their
discretion if they would like to increase their awareness of
vulnerabilities. Alternatively, they could apply for waivers or
exemptions if they feel like they cannot meet the proposed requirements
related to penetration testing. Please see the ``Breakeven Analysis''
section of this RIA for the breakeven estimates of this chosen
alternative.
B. Small Entities
Under the Regulatory Flexibility Act (RFA), 5 U.S.C. 601-612, the
Coast Guard has prepared this Initial Regulatory Flexibility Analysis
(IRFA) that examines the impacts of this proposed rule on small
entities.
Per the RFA, a small entity may be a small independent business,
defined as one independently owned and operated, organized for profit,
and not dominant in its field under the Small Business Act (5 U.S.C.
632); a small not-for-profit organization, defined as any not-for-
profit enterprise which is independently owned and operated and is not
dominant in its field; or a small governmental jurisdiction, defined as
a locality with fewer than 50,000 people.
Section 603(b) of the RFA prescribes the content of the IRFA, which
addresses the following:
(1) A description of the reasons why action by the agency is being
considered;
(2) A succinct statement of the objectives of, and legal basis for,
the proposed rule;
(3) A description of and, where feasible, an estimate of the number
of small entities to which this proposed rule will apply;
(4) A description of the projected reporting, recordkeeping, and
other compliance requirements to comply with the proposed rule,
including an estimate of the classes of small entities which will be
subject to the requirement and the type of professional skills
necessary for preparation of the report or record;
(5) An identification, to the extent practicable, of all relevant
Federal rules which may duplicate, overlap, or conflict with this
proposed rule; and
(6) A description of any significant alternatives to the proposed
rule which accomplish the stated objectives of applicable statutes and
which minimize any significant economic impact of the proposed rule on
small entities.
1. Description of the reasons why action by the agency is being
considered.
This proposed rule helps address current and emerging cybersecurity
threats to maritime security in the MTS. Cybersecurity risks result
from vulnerabilities in the operation of vital systems, which increase
the likelihood of cyber-attacks on facilities, OCS facilities, and
vessels. Cyber-related risks to the maritime domain are threats to the
critical infrastructure that citizens and companies depend on to
fulfill their daily needs.
Cyber-attacks on public infrastructure have raised awareness of the
need to protect systems and equipment that facilitate operations within
the MTS because cyber-attacks have the potential to disable the IT and
OT of vessels, facilities, and OCS facilities. Autonomous vessel
technology, automated OT, and remotely accessible machines provide
additional opportunities for cyber-attackers. These systems and
equipment are prime targets for cyber-attacks that could potentially
disrupt vessel movements and shut down port operations, such as loading
and unloading cargoes. Section III.A., The Problem We Seek to Address,
and Section IV.A, The Current State of Cybersecurity in the MTS in this
NPRM provide more details.
2. A succinct statement of the objective of, and legal basis for,
the proposed rule.
The objective of this proposed rule is to establish minimum
performance-based cybersecurity requirements for U.S.-flagged vessels,
facilities, and OCS facilities subject to MTSA. The proposed
requirements include account security measures, device security
measures, data security measures, governance and training, risk
management, supply chain management, resilience, network segmentation,
reporting, and physical security.
The Coast Guard has statutory authority to promulgate regulations
under 43 U.S.C. 1333(d); 46 U.S.C. 3306, 3703, 70102 through 70104,
70124; and DHS Delegation No. 00170, Revision No. 01.3. Section 4 of
the Outer Continental Shelf Lands Act of 1953, codified as amended at
43 U.S.C. 1333(d), authorizes the Secretary to promulgate regulations
with respect to safety equipment and other matters relating to the
promotion of safety of life and property on the artificial islands,
installations, and other devices on the OCS. This authority was
delegated to the Coast Guard by DHS Delegation No. 00170(II)(90),
Revision No. 01.3.
Sections 70102 through 70104 in Title 46 of the U.S.C. authorize
the Secretary to evaluate for compliance vessel and facility
vulnerability assessments, security plans, and response plans. Section
70124 authorizes the Secretary to promulgate regulations to implement
Chapter 701, including sections 70102 through 70104, dealing with
vulnerability assessments for the security of vessels, facilities, and
OCS facilities; VSPs, FSPs, and OCS FSPs; and response plans for
vessels, facilities, and OCS facilities. These authorities were
delegated to the Coast Guard by DHS Delegation No. 00170(II)(97)(a)
through (c), Revision No. 01.3.
Section III.C. of this preamble, Legal Authority to Address This
Problem, provides more details on the Coast Guard's legal basis for
these actions.
3. A description of and, where feasible, an estimate of the number
of small entities to which the proposed rule will apply.
This section considers the number of small entities likely to be
affected by this NPRM. First, we determine which owners of facilities,
OCS facilities, and vessels in the affected population qualify as small
businesses, small not-for-profit organizations, or small governments.
Then, we compare reported annual revenues among the identified small
entities with annual
[[Page 13491]]
compliance costs estimated by the Coast Guard.
Number of Small Entities Affected
To identify the portion of the affected facility, OCS facility, and
vessel owners that are likely to be small businesses and small not-for-
profit organizations, we match business-and organization-specific
information with size standards for small businesses published in the
Small Business Administration's (SBA) Table of Small Business Size
Standards.127 128 The SBA defines small businesses in terms
of firm revenues or number of employees. Size thresholds of small
businesses differ depending on the industry sector, defined in terms of
NAICS codes; therefore, the analysis also requires us to identify the
relevant NAICS codes for the affected facility and vessel owners. To
accomplish this, we take the following steps:
---------------------------------------------------------------------------
\127\ SBA. ``Table of size standards.'' Available at: https://www.sba.gov/document/support-table-size-standards. Effective March
17, 2023, accessed July 21, 2023.
\128\ To determine whether not-for-profit organizations are
small entities, we rely on the self-identified NAICS code reported
by each organization to D&B Hoovers and the SBA's small business
size standard for that NAICS code. Any organization qualifying as a
small business pursuant to SBA's threshold is considered to be ``not
dominant in its field'' (15 U.S.C. 632) and is categorized as a
small organization. If no NAICS code is available, we assume the
organization is small.
---------------------------------------------------------------------------
(1) Identify the names and addresses of owners of facilities, OCS
facilities, and U.S.-flagged vessels using information contained in the
Coast Guard's MISLE database; \129\
---------------------------------------------------------------------------
\129\ The Coast Guard provided MISLE data to Industrial
Economics, Incorporated (IEc) on June 2, 2023, and June 9, 2023.
---------------------------------------------------------------------------
(2) Upload the names and location information to D&B Hoovers'
website and rely on D&B Hoovers' proprietary algorithm to match
entities with the information stored in its database; \130\
---------------------------------------------------------------------------
\130\ This process relies on D&B Hoovers' automated search
functions to identify the business profiles associated with a list
of businesses, not manual business-by-business searching. This
search functionality is described in more detail in D&B Hoovers
(2019, page 25). You can find this resource at https://app.dnbhoovers.com/product/wp-content/uploads/2020/10/DB-Hoovers-User-Guide-920.pdf. The matched data were downloaded from D&B
Hoovers on June 20, 2023, accessed via: app.dnbhoovers.com/login,
July 21, 2023.
---------------------------------------------------------------------------
(3) Collect the primary NAICS code, ownership type,\131\ number of
employees,\132\ and annual revenue information from entities that
matched the information in D&B Hoovers' database; and
---------------------------------------------------------------------------
\131\ D&B Hoovers provides ownership type for the matched
entities. This analysis considers all entities marked as
``private,'' ``public,'' or ``partnership'' as businesses.
``Nonprofit'' ownership status is used to identify not-for-profit
organizations.
\132\ D&B Hoovers contains data fields for both ``employees at
single site'' and ``employees at all sites.'' When both numbers are
provided, we default to using the ``employees at all sites'' entry
to capture the size of the larger parent company. When only the
``employees at single site'' information is available, we use that
entry instead.
---------------------------------------------------------------------------
(4) Determine which owners are small businesses or small not-for-
profit organizations based on the SBA's definitions of small businesses
matched to each NAICS code.\133\
---------------------------------------------------------------------------
\133\ In some cases, SBA provides a size standard for the NAICS
code as well as an ``exception'' for a sub-set of businesses with
specific activity types. This analysis does not consider the
``exceptions'' when classifying businesses and not-for-profit
organizations as small.
---------------------------------------------------------------------------
The RIA considers facilities, OCS facilities, and vessels owned by
governments or quasi-government organizations separately.\134\ Small
governmental jurisdictions are defined as governments of cities,
counties, towns, townships, villages, school districts, or special
districts, with a population of less than 50,000 (5 U.S.C. 601). After
using D&B Hoovers to identify a sample of Government owners, the 2020
U.S. Census informed our classification of Government
jurisdictions.\135\
---------------------------------------------------------------------------
\134\ Government owners are identified using the ``public
sector'' ownership status in D&B Hoovers. In most cases, the
entities that fall into the ``public sector'' ownership type also
have 92 NAICS codes.
\135\ 2020 U.S. Census data accessed from: https://www.census.gov/quickfacts/, accessed July 21, 2023.
---------------------------------------------------------------------------
Facility and OCS Facility Owners
MISLE identifies 3,411 regulated facilities and OCS facilities. Of
the facilities, 2,663 are associated with 1,334 unique owners, and 748
lack owner information.\136\ Like the cost analysis, this analysis
assumes the 748 facilities lacking owner information in MISLE are
associated with an additional 374 unique owners, under the assumption
that the average facility owner is associated with 2 regulated
facilities. In total, this analysis assumes a total of 1,708 affected
owners and operators of facilities and OCS facilities.
---------------------------------------------------------------------------
\136\ Owners of facilities and OCS facilities are determined
using various data files in MISLE. Owner information is not reported
in a standard format for facilities and OCS facilities; therefore,
considerable data cleaning was necessary to identify unique owner
names and location information. This analysis assumes the sample of
facilities with owner information identified is broadly
representative of all regulated facilities. Additionally, D&B
Hoovers further consolidated the list of affected owners of
facilities and OCS facilities by identifying unifying parent
companies for some owners thought to be independent businesses or
organizations based on MISLE data.
---------------------------------------------------------------------------
The names and location information of all 1,334 identifiable
affected owners were uploaded to D&B Hoovers, and the search function
returned information for 786 entities (59 percent) with at least one
identified NAICS code. The 548 unmatched entities either do not have
business profiles in D&B Hoovers or the owner's name and location
information stored in MISLE does not match the business records on the
website. Included among the owners that matched with records in D&B
Hoovers were 770 businesses (98 percent of the matched owners), 11 not-
for-profit organizations (1 percent), and 5 Governments (1 percent).
The 770 businesses categorize into 186 NAICS codes.
Table 53 reports the number of businesses in the top 10 most
frequently occurring NAICS codes, as well as the portion that meet the
definition of small business. An additional row summarizes the
businesses across the remaining 176 NAICS codes. As presented, 615 of
770 businesses (80 percent) qualify as small based on their revenue or
number of employees. Additionally, the 11 not-for-profit organizations
include 10 small organizations (91 percent). The 5 Government
jurisdictions include no small Governments (0 percent). Under the
assumptions that (1) the 374 owners of facilities and OCS facilities
without owner information in MISLE are small entities and (2) all 548
of facilities and OCS facilities for which D&B Hoovers profiles are not
available are small entities, we estimate 1,533 total small entities
are affected by the requirements for facilities and OCS facilities in
this proposed rule (90 percent of affected facility owners) (374 owners
without identifying information in MISLE + 548 unmatched facility
owners + 601 matched small businesses + 10 matched small organizations
+ 0 matched small Governments= 1,533 total small entities). See table
53.
[[Page 13492]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.063
[[Page 13493]]
Vessel Owners
Across the eight categories of vessels regulated by the Coast Guard
and considered for this proposed rule, MISLE identifies over 10,000
vessels owned by 1,775 unique entities.\137\ The names and location
information of all 1,775 owners stored in MISLE were uploaded to D&B
Hoovers, and the search function returned information for 1,006
entities (57 percent) with at least 1 NAICS code identified. Included
among the entities that matched with records in D&B Hoovers were 989
businesses (98 percent of the matched owners), 11 not-for-profit
organizations (1 percent), and 6 Government jurisdictions (1 percent).
The 989 businesses categorize into 170 NAICS codes.
---------------------------------------------------------------------------
\137\ Like facilities and OCS facilities, unique businesses are
determined using both organization name and address as stored in the
Coast Guard's MISLE database. The information for owners is more
complete for vessels than for facilities and OCS facilities in
MISLE; all vessels include owner information. D&B Hoovers was able
to identify unifying parent companies for some owners thought to be
independent businesses or organizations based on MISLE data.
---------------------------------------------------------------------------
Table 53 reports the number of businesses in the top 10 most
frequently occurring NAICS codes, as well as the portion that meet the
definition of small business. An additional row summarizes the
businesses across the remaining 160 NAICS codes.\138\ As presented, 900
of 989 businesses (91 percent) qualify as small businesses based on
their revenue or number of employees. Additionally, the 11 not-for-
profit organizations include 9 small organizations (82 percent), and
the 6 Government jurisdictions include 1 small Government (17 percent).
Under the assumption that all 769 vessel owners for which D&B Hoovers
profiles are not available are small entities, we estimate 1,633 total
small entities are affected by the vessel requirements in this proposed
rule (92 percent of affected vessel owners) (769 unmatched vessel
owners + 854 matched small businesses + 9 matched small organizations +
1 matched small Government = 1,633 total small entities). See table 54.
---------------------------------------------------------------------------
\138\ Included in this group is NAICS code 99990
``unclassified.'' Because SBA does not propose a size standard for
this code, we assume all entities with NAICS code 99990 are small.
For the matched vessel owners, 46 entities are classified with this
code in D&B Hoovers.
---------------------------------------------------------------------------
[[Page 13494]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.064
[[Page 13495]]
Summary
Across the combined 3,483 affected owners of facilities, OCS
facilities, or vessels, we estimate that 3,180 small entities (91
percent) may be affected, including small businesses, small not-for-
profit organizations, and small Governments. Because this analysis
assumes all owners for which NAICS codes, employment, or revenue
information is unmatched in D&B Hoovers are small entities, the
projected number of affected small entities may be overestimated.
Costs Relative to Revenues
This discussion compares the cost of the proposed changes per
facility and vessel owner with annual revenues of affected small
entities. Revenue information is obtained from D&B Hoovers for small
businesses and small not-for-profit organizations. For small
Governments, we use the 2021 State and Local Government Finance
Historical Datasets and Tables available through the U.S. Census.\139\
We assume that the findings of this analysis are indicative of the
impacts on entities for which revenue information is not readily
available.
---------------------------------------------------------------------------
\139\ Data downloaded on July 14, 2023, from https://www.census.gov/data/datasets/2021/econ/local/public-use-datasets.html, accessed July 21, 2023.
---------------------------------------------------------------------------
The RFA does not define a ``significant effect'' in quantitative
terms. In its guidance to agencies on how to comply with the RFA, the
SBA states, ``[i]n the absence of statutory specificity, what is
`significant' will vary depending on the economics of the industry or
sector to be regulated. The agency is in the best position to gauge the
small entity impacts of its regulation.'' \140\ One of the measures SBA
uses to illustrate whether an impact could be significant, is to
determine whether the cost per entity exceeds 1 percent of the gross
revenues.\141\ Therefore, this analysis considers the 1 percent
threshold when analyzing these potential impacts.
---------------------------------------------------------------------------
\140\ U.S. Small Business Administration (SBA). 2017. A Guide
for Government Agencies: How to Comply with the Regulatory
Flexibility Act. Available at https://advocacy.sba.gov/2017/08/31/a-guide-for-government-agencies-how-to-comply-with-the-regulatory-flexibility-act/, page 18, accessed July 21, 2023.
\141\ Id. Page 19.
---------------------------------------------------------------------------
Facility and OCS Facility Owners
Assuming that an owner or operator would need to implement each of
the provisions required by this proposed rule, Coast Guard estimates
that the highest single-year costs would be incurred in year 2 of the
analysis period. We estimate the year 2 cost is $37,667 for an owner or
operator with one facility or OCS facility. Each additional facility or
OCS facility owned or operated would increase the estimated annual
costs by the cost of an additional Cybersecurity Plan, since each
facility or OCS facility will require an individual Cybersecurity Plan.
For example, consider an entity that owns 4 facilities. The estimated
cost to that entity in year 2 is calculated as follows: $37,667 + (3 x
$8,414) = $62,909. Table 55 provides a breakdown of the costs per owner
or operator of one facility or OCS facility. The text that follows
provides more detail on these cost calculations.
[[Page 13496]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.065
To estimate the cost for an individual owner or operator of a
facility or OCS facility to develop, resubmit, conduct annual
maintenance, and audit the Cybersecurity Plan, we use estimates
provided earlier in the analysis. The hour-burden estimates are 100
hours to develop the Cybersecurity Plan (average hour burden), 10 hours
to conduct annual maintenance of the Cybersecurity Plan (which would
include amendments), 15 hours to renew Cybersecurity Plans every 5
years, and 40 hours to conduct annual audits of Cybersecurity Plans.
Based on
[[Page 13497]]
estimates from the Coast Guard's FSP and OCS FSP reviewers at local
inspections offices, approximately 10 percent of Plans would need to be
revised and resubmitted in the second year, which is consistent with
the current resubmission rate for FSPs and OCS FSPs.
For renewals of Plans after 5 years (occurring in the seventh year
of the analysis period), Plans would need to be further revised and
resubmitted in approximately 10 percent of cases as well. However, in
this portion of the analysis, we estimate costs as though the owner or
operator will need to revise and resubmit their Plans in all cases
resulting in a conservative (upper-bound) estimate of per-entity costs.
We estimate the time for revision and resubmission to be about half the
time to develop the Plan itself, or 50 hours in the second year of
submission, and 7.5 hours after 5 years (in the seventh year of the
analysis period). Because we include the annual Cybersecurity
Assessment in the cost to develop Cybersecurity Plans, and we do not
assume that owners and operators will wait until the second year of
analysis to begin developing the Cybersecurity Plan or implementing
related cybersecurity measures, we divide the estimated 100 hours to
develop Plans equally across the first and second years of analysis.
Using the CySO loaded hourly CySO wage of $84.14, we estimate the
Cybersecurity Plan related costs by adding the total number of hours to
develop, resubmit, maintain, and audit each year and multiplying by the
CySO wage. For example, we estimate owners would incur $8,414 in costs
in year 2 of the analysis period [1 facility x $84.14 CySO wage x (50
hours to develop the Plan + 50 hours to revise and resubmit the Plan) =
$8,414]. Table 56 displays the per-entity cost estimates for an owner
or operator of one facility over a 10-year period of analysis. For an
owner or operator with multiple facilities or OCS facilities, we
estimate the total costs by multiplying the estimates in table 56 by
the number of owned facilities.
[GRAPHIC] [TIFF OMITTED] TP22FE24.066
Similarly, we use earlier estimates for the calculation of per-
entity costs for drills and exercises, implementing account security
measures, implementing multifactor authentication, cybersecurity
training, penetration testing, vulnerability management, and
resilience.
For drills and exercises, we assume that a CySO on behalf of each
owner and operator of a facility or OCS facility will develop
cybersecurity components to add to existing physical security drills
and exercises. This development is expected to take 0.5 hours for each
of the 4 annual drills and 8 hours for an annual exercise. Using the
loaded hourly wage for a CySO of $84.14, we estimate annual costs of
approximately $841 per owner or operator of a facility or OCS facility
[$84.14 CySO wage x ((0.5 hours x 4 drills) + (8 hours x 1 exercise)) =
$841], as seen in table 55.
For account security measures, we assume that a database
administrator on behalf of each owner or operator will spend 8 hours
each year implementing and managing account security. Using the loaded
hourly wage for a database administrator of $71.96, we estimate annual
costs of approximately $576 ($71.96 database administrator wage x 8
hours = $576), as seen in table 55.
For multifactor authentication, we assume that an owner or operator
of a facility or OCS facility will spend $9,000 in the initial year on
average to implement a multifactor authentication system and spend
approximately $150 per employee annually for system maintenance and
support. Therefore, we estimate first year costs of approximately
$20,100 [$9,000 implementation cost + ($150 support and maintenance
costs x 74 average facility company employees)], and subsequent year
costs of $11,100 ($150 support and maintenance costs x 74 average
facility company employees), as seen in table 55.
For cybersecurity training, we assume that a CySO at a facility or
OCS facility will take 2 hours each year to develop and manage
cybersecurity training for
[[Page 13498]]
employees, and employees at a facility or OCS facility will take 1 hour
to complete the training each year. Using the estimated CySO wage of
$84.14 and the estimated employee wages at a facility or OCS facility
of $60.34, we estimate annual training costs of approximately $4,633
[($84.14 x 2 hours) + ($60.34 x 74 facility company employees x 1
hour)], as seen in table 55.
For penetration testing, we estimate costs only in the second and
seventh years of analysis since tests are required to be performed in
conjunction with submitting and renewing the Cybersecurity Plan. We
assume that owners and operators of facilities or OCS facilities will
spend approximately $5,000 per penetration test and an additional $50
per IP address at the organization to capture network complexity. We
use the total number of company employees as a proxy for the number of
IP addresses, since the Coast Guard does not have data on IP addresses
or the network complexity at a given company. As a result, we estimate
second- and seventh-year costs of approximately $8,700 [$5,000 testing
cost + ($50 x 74 employees)], as seen in table 55.
For vulnerability management, we assume that each facility or OCS
facility will need to secure a vulnerability scanning program or
software. Because vulnerability scans can occur in the background, we
do not assume an additional hour burden associated with implementing or
using a vulnerability scanner each year. Using the annual subscription
cost of an industry leading vulnerability scanning software, we
estimate annual costs of approximately $3,390, as seen in table 55.
Finally, for resilience, we assume that each owner or operator of a
facility or OCS facility will need to make at least one cybersecurity
incident report per year. While this is incongruent with historical
data that shows the entire affected population of facilities and OCS
facilities reports only 18 cybersecurity incidents per year, we are
attempting to capture a complete estimate of what the costs of this
proposed rule could be for an affected entity. As such, we estimate
that a CySO will need to take 0.15 hours to report a cybersecurity
incident to the NRC, leading to annual per entity costs of
approximately $13 ($84.14 CySO wage x 0.15 hours), as seen in table 55.
As demonstrated in table 55, affected entities are expected to
incur the highest costs in year 2 of this proposed rule. This analysis
estimates the cost of this proposed rule in year 2 per affected small
entity, using the information presented in table 55 and adjusting for
the number of facilities and OCS facilities owned by the entity as
recorded in MISLE. Among all 1,547 presumed small entities (see table
53), 833 owners (54 percent) are associated with one facility ($37,667
cost in year 2), and the average small entity owns approximately 2
facilities ($45,609 cost in year 2). The small entity with the highest
projected cost owns 37 facilities ($340,571 cost in year 2).
Table 57 compares the estimated year 2 costs specific to each
entity with the annual revenues of 416 small entities in our sample of
affected facilities for which revenue information is provided in D&B
Hoovers.\142\ As shown, approximately 55 percent of small entities may
incur costs that meet or exceed 1 percent of annual revenue in the
second year of the rule [(61 + 168) / 416 = 55 percent]. The small
entity with the highest ratio cost-to-revenue ratio is projected to
incur costs of 158 percent of its reported annual revenue.
---------------------------------------------------------------------------
\142\ Sales information is not available for 209 of the
identified small businesses and small not-for-profit organizations
with matched profiles in D&B Hoovers (33 percent of the 625 total
matched small businesses and small not-for-profit organizations).
This analysis does not identify small Governments among the set of
owners with matched profiles in D&B Hoovers.
[GRAPHIC] [TIFF OMITTED] TP22FE24.067
[[Page 13499]]
Vessel Owners
The costs to owners and operators of U.S.-flagged vessels differ
from the costs to owners and operators of facilities and OCS facilities
and are more heavily influenced by the number of vessels owned. Table
58 presents the estimated fixed costs per entity regardless of the
number of vessels owned and vessel type, equivalent to $10,877 per year
on average across the first 10 years of implementing the provisions in
this proposed rule. The data and assumptions underlying these estimates
are provided later in this section.
[[Page 13500]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.068
Several other categories of costs are dependent on the type and
number of vessels owned by each entity. These costs are calibrated to
the average number of employees by vessel type as well as a unique
weighted hourly wage
[[Page 13501]]
based on the personnel employed on the vessels.\143\ Table 59 displays
the average number of employees for each vessel type, including
shoreside employees, and their unique weighted mean hourly wages. Table
60, which follows, displays the variable per-vessel costs associated
with each type of vessel. To calculate the total estimated cost per
entity in the population of U.S.-flagged vessels, we add the annual
estimated costs per vessel and per vessel type from table 60 based on
the number and types of vessels owned observed in MISLE to the fixed
costs presented in table 58. For example, consider an entity that owns
two passenger vessels subject to subchapter H. The estimated cost to
that entity in year 2 is calculated as follows: (2 x $20,557) + $16,719
= $57,833.
---------------------------------------------------------------------------
\143\ The average per-vessel employee counts were taken from
manning requirements in the certificates of inspection in MISLE. We
averaged the mariner counts listed for each vessel within a
subpopulation of vessels, then applied a 1.33 shoreside employee
modifier to account for non-mariner employees. The calculation of
wage rates across vessel types are described in ``Appendix A: Wages
Across Vessel Types.''
\144\ When adding these costs to the fixed costs for owners and
operators, only add the estimated penetration testing costs in years
2 and 7.
[GRAPHIC] [TIFF OMITTED] TP22FE24.069
[GRAPHIC] [TIFF OMITTED] TP22FE24.070
[[Page 13502]]
To estimate the cost for an owner or operator of a U.S.-flagged
vessel to develop, resubmit, conduct annual maintenance, and audit the
Cybersecurity Plan, we use estimates provided earlier in the analysis.
The hour-burden estimates are 80 hours for developing the Cybersecurity
Plan (average hour burden), 8 hours for conducting annual maintenance
of the Cybersecurity Plan (which would include amendments), 12 hours to
renew Cybersecurity Plans every 5 years, and 40 hours to conduct annual
audits of Cybersecurity Plans. Based on estimates from Coast Guard VSP
reviewers at MSC, approximately 10 percent of Plans would need to be
resubmitted in the second year due to necessary revisions, which is
consistent with the current resubmission rate for VSPs.
For renewing Cybersecurity Plans after 5 years (occurring in the
seventh year of the analysis period), Plans would need to be further
revised and resubmitted in approximately 10 percent of cases as well.
However, in this portion of the analysis, we estimate costs as though
the owner or operator will need to revise and resubmit their Plans in
all cases resulting in a conservative (upper-bound) estimate of per-
entity costs. We estimate the time for revision and resubmission to be
about half the time to develop the Plan itself, or 40 hours in the
second year of submission, and 6 hours after 5 years (in the seventh
year of the analysis period).
Because we include the annual Cybersecurity Assessment in the cost
to develop Cybersecurity Plans, and we do not assume that owners and
operators will wait until the second year of analysis to begin
developing the Cybersecurity Plan or implementing related cybersecurity
measures, we divide the estimated 80 hours to develop plans equally
across the first and second years of analysis. Using the loaded hourly
CySO wage of $84.14, we estimate the Cybersecurity Plan-related costs
by adding the total number of hours to develop, resubmit, maintain, and
audit the Plan each year and multiplying that figure by the CySO wage.
For example, we estimate owners and operators would incur approximately
$6,731 in costs in year 2 of the analysis period [$84.14 CySO wage x
(40 hours to develop the plan + 40 hours to revise and resubmit the
Plan) = $6,731]. See table 61.
[GRAPHIC] [TIFF OMITTED] TP22FE24.071
For drills and exercises, we assume that a CySO on behalf of each
owner and operator of a vessel will develop cybersecurity components to
add to existing physical security drills and exercises. This
development is expected to take 0.5 hours for each of the 4 annual
drills and 8 hours for an annual exercise. Using the loaded hourly wage
for a CySO of $84.14, we estimate annual costs of approximately $841
per vessel owner or operator [$84.14 CySO wage x ((0.5 hours x 4
drills) + (8 hours x 1 exercise)) = $841], as seen in table 58.
For account security measures, we assume that a database
administrator on behalf of each owner or operator of a vessel will
spend 8 hours each year implementing and managing account security.
Using the loaded hourly wage for a database administrator of $71.96, we
estimate annual costs of approximately $576 ($71.96 database
administrator wage x 8 hours = $576), as seen in table 58.
For multifactor authentication, we assume that a vessel owner or
operator will spend $9,000 in the initial year on average to implement
a multifactor authentication system and spend approximately $150 per
employee annually for system maintenance and support. Therefore, we
estimate first-year fixed costs of approximately $9,000 for all owners
and operators, with annual costs in years 2 through 10 dependent on the
number of employees for each type of vessel. For example, we estimate
the first-year costs to an owner or operator of one OSV to be
approximately $11,400 [$9,000 implementation cost + ($150 support and
maintenance costs x 16 average employees per OSV)], and subsequent
[[Page 13503]]
year costs of $2,400 ($150 support and maintenance costs x 16 average
employees per OSV). Fixed per-entity implementation costs of $9,000 can
be found in table 58 and variable per-vessel costs can be found in
table 60.
For cybersecurity training, we assume that a CySO for each owner or
operator of a vessel will take 2 hours each year to develop and manage
employee cybersecurity training, and vessel employees will take 1 hour
to complete the training each year. The per employee costs associated
with training vary depending on the types and number of vessels and
would be based on the average number of employees per vessel and the
associated weighted hourly wage. For example, using the estimated CySO
wage of $84.14 and the estimated OSV employee wage of $54.91, we
estimate annual training costs of approximately $1,047 [($84.14 x 2
hours) + ($54.91 x 16 average employees per OSV x 1 hour)]. Fixed per-
entity costs of $168 can be found in table 58 and variable per-vessel
costs can be found in table 60.
For penetration testing, we estimate costs only in the second and
seventh years of analysis since tests are required to be performed in
conjunction with submitting and renewing the Cybersecurity Plan. We
assume that owners and operators of vessels will spend approximately
$5,000 per penetration test and an additional $50 per IP address at the
organization to capture network complexity. We use the average number
of employees per vessel as a proxy for the number of IP addresses,
since the Coast Guard does not have data on IP addresses or the network
complexity at a given company. As a result, we estimate second- and
seventh-year costs as follows: [$5,000 testing cost + ($50 x average
number of employees per vessel)]. For example, we estimate second- and
seventh-year cost of approximately $5,800 for an owner or operator of
an OSV [$5,000 testing cost + ($50 x 16 average number of employees per
OSV)]. Fixed per-entity costs of $5,000 can be found in table 58 and
variable per-vessel costs can be found in table 60.
For vulnerability management, we assume that each owner or operator
of a U.S.-flagged vessel will need to secure a vulnerability scanning
program or software. Because vulnerability scans can occur in the
background, we do not assume an additional hour burden associated with
the implementation or use of a vulnerability scanner each year. Using
the annual subscription cost of an industry leading vulnerability
scanning software, we estimate annual costs of approximately $3,390, as
seen in table 58.
Finally, for resilience, we assume that each owner or operator of a
U.S.-flagged vessel will need to make at least one cybersecurity
incident report per year. While this is incongruent with historical
data that shows the entire affected population of vessels only reports
two cybersecurity incidents per year on average, we are attempting to
capture a complete estimate of what the costs of this proposed rule
could be for an affected entity. As such, we estimate that a CySO will
need to take 0.15 hours a year to report a cybersecurity incident to
the NRC, leading to annual per-entity costs of approximately $13
($84.14 CySO wage x 0.15 hours), as seen in table 58.
This analysis calculates vessel owner-specific annual compliance
costs based on the type and number of vessels associated with each
small entity as identified in MISLE. For the small entities that own
only barges, there are no variable costs per vessel, and we assume that
they will only incur per-company costs related to the Cybersecurity
Plan and developing drills and exercises, meaning the greatest per-
owner costs would occur in year 2. Our analysis identifies 161 small
entities that fall into this category and presumes this proposed rule
will cost these entities $7,572 each in year 2 ($6,731 Cybersecurity
Plan-related costs + $841 drills and exercises costs). For all other
small entities that own vessels, the costs include a per-owner
component as well as per-vessel costs that vary by vessel type, and the
highest total annual costs per owner would also occur in year 2. Among
the 1,472 small entities in this category, 770 owners (52 percent) are
associated with 1 vessel (with an average cost of $23,271 in year 2).
The average small entity owns 5 vessels (with an average cost of
$32,850 in year 2), while the small entity with the highest projected
costs owns 359 vessels (with a cost of $148,588 in year 2).\145\
---------------------------------------------------------------------------
\145\ Values may not directly align with the incremental cost
analysis due to rounding.
---------------------------------------------------------------------------
Table 62 compares the entity-specific costs in year 2 with the
greatest costs with the annual revenues of 793 small entities in our
sample of affected facilities for which revenue information is provided
in D&B Hoovers (for small businesses and small not-for-profit
organizations) or the 2021 State and Local Government Finance
Historical Datasets and Tables available through the U.S. Census (for
small Governments).\146\ As shown, 59 percent of small entities may
incur costs that meet or exceed 1 percent of annual revenue in the
second year of the rule [(167 + 298) / 793 = 59 percent]. The small
entity with the highest cost-to-revenue ratio is projected to incur
costs of 146 percent of its reported annual revenue.
---------------------------------------------------------------------------
\146\ Sales information is not available for 71 of the
identified small businesses and small not-for-profit organizations
with matched profiles in D&B Hoovers (8 percent of the 864 total
matched small entities).
---------------------------------------------------------------------------
[[Page 13504]]
[GRAPHIC] [TIFF OMITTED] TP22FE24.072
Summary
This IRFA characterizes the revenue impacts on small entities by
projecting costs for each affected owner specific to the number and
type of U.S.-flagged vessels as well as the number of facilities or OCS
facilities owned according to data from the Coast Guard. There are two
reasons the estimated compliance costs, and, therefore, the impacts on
small entities, are likely to be overestimated. First, the approach we
took to estimate costs assumes that all owners will incur costs
associated with all provisions required in this proposed rule. However,
it is highly likely that many affected owners already have invested in
some of the cybersecurity measures before the publication of this
proposed rule. Data available to the Coast Guard demonstrate this is
the case for many facility and OCS facility owners, although whether
those facility owners are small entities is uncertain.\147\ Second,
some affected owners are unlikely to have IT or OT systems to which
this proposed rule will apply. Those owners will incur only the costs
associated with requesting a waiver or equivalence, which are likely to
be far less than the costs described in this section.
---------------------------------------------------------------------------
\147\ See footnote 69.
---------------------------------------------------------------------------
4. A description of the projected reporting, recordkeeping, and
other compliance requirements of the proposed rule, including an
estimate of the classes of small entities which will be subject to the
requirement and the type of professional skills necessary for
preparation of the report or record.
This proposed rule would call for a new collection of information
under the Paperwork Reduction Act of 1995, 44 U.S.C. 3501-3520. As
defined in 5 CFR 1320.3(c), ``collection of information'' comprises
reporting, recordkeeping, monitoring, posting, labeling, and other
similar actions. Section VI.D., Collection of Information, describes
the title and description of the information collection, a description
of those who must collect the information, and an estimate of the total
annual burden. For a description of all other compliance requirements
and their associated estimated costs, please see the preceding analysis
of the per-entity costs of this proposed rule.
5. An identification, to the extent practicable, of all relevant
Federal rules which may duplicate, overlap or conflict with the
proposed rule.
The Coast Guard has identified two primary areas of overlap with
this proposed rule. First, under proposed Sec. 101.645, the Coast
Guard would require the CySO to maintain an effective means of
communication to convey changes in cybersecurity conditions to the
personnel of the U.S.-flagged vessel, facility, or OCS facility. The
communication systems and procedures would need to allow for effective
and continuous communications between security personnel at a vessel,
facility, or OCS facility, vessels interfacing with a facility or an
OCS facility, the cognizant COTP, and national and local authorities
with security responsibilities. While these requirements would require
the CySO to maintain means to specifically maintain communications
regarding cybersecurity conditions, the Coast Guard believes there may
be significant overlap with communication requirements for physical
security established in 33 CFR 105.235 for facilities, 106.240 for OCS
facilities, and 104.245 for vessels. Accordingly, we do not estimate
additional costs related to these communications systems, but we
request public comment on this assumption and if this new
cybersecurity-specific requirement would create additional burden.
Second, under proposed Sec. 101.650(i), the Coast Guard would
require affected owners or operators to limit physical access to OT and
related IT equipment to only authorized personnel and confirm that all
HMIs and other hardware are secured, monitored, and logged for
personnel access, with access granted on a by-exception basis. While
these requirements are specific to the physical security of IT and OT
systems, there is some overlap with physical security requirements
established in Sec. Sec. 104.265 and 104.270 for vessels, Sec. Sec.
105.255 and 105.260 for facilities, and Sec. Sec. 106.260 and 106.265
for OCS facilities under which areas containing IT and OT systems
should be designated restricted areas. Accordingly, we do not estimate
additional costs related to these requirements but request public
comment on this assumption and if these new cybersecurity-specific
requirements would create additional burdens.
6. A description of any significant alternatives to the proposed
rule which
[[Page 13505]]
accomplish the stated objectives of applicable statutes and which
minimize any significant economic impact of the rule on small entities.
The purpose of this proposed rule is to safeguard the MTS against
current and emerging threats associated with cybersecurity by adding
minimum cybersecurity requirements to 33 CFR part 101. However, rather
than making these requirements prescriptive, the Coast Guard is
choosing to propose minimum performance-based cybersecurity
requirements for the MTS. Like the existing requirements in 33 CFR
parts 104, 105 and 106, the Coast Guard would allow owners and
operators the flexibility to determine the best way to implement and
comply with these new requirements. This means that, while the Coast
Guard may require the implementation of a multifactor authentication
system, for example, it is up to the discretion of the impacted owner
or operator to determine what shape or form that system may take, and
how many resources should be expended to implement it. As a result,
many of the cost estimates in this RIA and small entities analysis
represent conservative (upper-bound) estimates as we attempt to capture
costs for a wide range of affected owners and operators. Further, the
Coast Guard proposes to make waivers and equivalencies available to
affected owners and operators who feel they are unable to meet the
requirements of this proposed rule, offering additional flexibility to
small entities that are not able to meet the full requirements.
The Coast Guard also considered an alternative that would make the
penetration testing requirements of this proposed rule optional for
small entities. Given the nature of penetration testing, it can often
come with a high cost, particularly for small entities with limited
resources. Leaving the penetration testing requirements up to owner
discretion could allow small entities in the affected population to
prioritize different cybersecurity measures that may make more sense
for their organization. The decision to undertake penetration testing
could be made as a result of thorough risk assessments for each
organization, considering its operational environments, risk profile,
and pertinent threats. Under this alternative, an owner or operator, or
a CySO on their behalf, could determine when a penetration test is
warranted, if at all.
Because penetration testing would be optional, this could
hypothetically reduce costs for owners and operators for penetration
testing down to zero, meaning an estimated cost reduction of $8,700 in
the second and seventh years of analysis for an owner or operator of
facilities and OCS facilities. It would also lead to estimated cost
reductions in the second and seventh years of $23,600 ($5,000 +
$18,600) for owners and operators of MODUs, $9,100 ($5,000 + $4,100)
for owners and operators of vessels under subchapter I, $5,800 ($5,000
+ $800) for owners and operators of OSVs, $9,250 ($5,000 + $4,250) for
owners and operators of passenger vessels under subchapter H, $6,750
($5,000 + $1,750) for owners and operators of passenger vessels under
subchapter K, $5,650 ($5,000 + $650) for owners and operators of towing
vessels under subchapter M, $7,000 ($5,000 + $2,000) for owners and
operators of tank vessels under subchapter D and a combination of
subchapters O&D, and $6,350 ($5,000 + $1,350) for owners and operators
of international passenger vessels under subchapters K and T. The
estimated cost reductions could be higher if ownership of multiple
vessels is considered.
Despite the potential for minimizing economic impacts, however, the
value of penetration testing for most organizations, including small
entities, cannot be overstated. When integrated into a comprehensive
cybersecurity strategy, penetration testing can be very effective in
identifying vulnerabilities. By fostering a proactive rather than
reactive approach in cybersecurity, penetration testing enables
organizations to stay ahead of potential threats and better understand
how malicious actors could exploit weaknesses in IT and OT systems.
This is particularly crucial given the quickly evolving landscape of
cyber threats. In addition, because the costs of a potential cyber
incident are so high, the Coast Guard must prioritize some level of
oversight on provisions that could lessen the risk of a cyber incident.
Therefore, we rejected this alternative despite the potential cost
reductions.
It should be noted, however, that according to proposed Sec.
101.665, owners and operators of facilities, OCS facilities, and U.S.-
flagged vessels can seek a waiver or an equivalence determination if
they are unable to meet any proposed requirements, penetration testing
included. The Coast Guard requests public comment on the alternative
presented here, as well as any other alternatives or options related to
the proposed provisions that would alleviate impacts on affected small
entities.
Conclusion
The Coast Guard is interested in the potential impacts from this
proposed rule on small entities (businesses and Governments), and we
request public comment on these potential impacts. If you think that
this proposed rule will have a significant economic impact on you, your
business, or your organization, please submit a comment to the docket
at the address under ADDRESSES in this proposed rule. In your comment,
explain why, how, and to what degree you think this proposed rule would
have an economic impact on you.
C. Assistance for Small Entities
Under section 213(a) of the Small Business Regulatory Enforcement
Fairness Act of 1996, Public Law 104-121, we want to assist small
entities in understanding this proposed rule so that they can better
evaluate its effects on them and participate in the rulemaking. If the
proposed rule would affect your small business, organization, or
governmental jurisdiction and you have questions concerning its
provisions or options for compliance, please call or email the person
in the FOR FURTHER INFORMATION CONTACT section of this proposed rule.
The Coast Guard will not retaliate against small entities that question
or complain about this proposed rule or any policy or action of the
Coast Guard.
Small businesses may send comments on the actions of Federal
employees who enforce, or otherwise determine compliance with, Federal
regulations to the Small Business and Agriculture Regulatory
Enforcement Ombudsman and the Regional Small Business Regulatory
Fairness Boards. The Ombudsman evaluates these actions annually and
rates each agency's responsiveness to small business. If you wish to
comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR
(1-888-734-3247).
D. Collection of Information
This proposed rule would call for a new collection of information
under the Paperwork Reduction Act of 1995, 44 U.S.C. 3501-3520. As
defined in 5 CFR 1320.3(c), ``collection of information'' comprises
reporting, recordkeeping, monitoring, posting, labeling, and other
similar actions. The title and description of the information
collection, a description of those who must collect the information,
and an estimate of the total annual burden follow. The estimate covers
the time for reviewing instructions, searching existing sources of
data, gathering, and maintaining the data needed, and completing and
reviewing the collection.
Title: Cybersecurity Plans.
[[Page 13506]]
OMB Control Number: 1625-new.
Summary of Collection of Information: This collection of
information would be new. The Coast Guard would collect information
from the owners and operators of vessels, facilities, and OCS
facilities under 33 CFR part 101, subpart F. The information collection
would be for the submission of Cybersecurity Plans, amendments to
Cybersecurity Plans, and cyber incident reports proposed in 33 CFR
101.650.
Need for Information: The Coast Guard would be creating new
cybersecurity requirements for vessel and facility owners and operators
to mitigate or prevent a cyber incident from occurring. The information
we would request from industry would be from (1) the development of
Cybersecurity Plans, which would include details on implemented drills
and exercise, training, and various cybersecurity measures in Sec.
101.650 that might safeguard critical IT and OT systems from cyber
incidents; (2) amendments to Cybersecurity Plans; and (3) reporting
cyber incidents to the NRC.
Proposed Use of Information: The Coast Guard would use this
information to determine if vessel and facility owners and operators
have cybersecurity measures in place and to ensure that owners and
operators are conducting periodic reviews of plans and testing their IT
and OT systems for adequacy. Additionally, the Coast Guard would ensure
vessel and facility owners and operators are reporting cyber incidents
to the Coast Guard.
Description of the Respondents: The respondents are owners and
operators of U.S.-flagged vessels, U.S. facilities, and OCS facilities.
Number of Respondents: The number of respondents would be about
1,775 U.S.-flagged vessel owners and operators and about 1,708 facility
and OCS facility owners and operators. We assume that a CySO would be
responsible for the reporting and recordkeeping requirements of the
proposed rule on behalf of each owner and operator.
Frequency of Response: The number of responses to this proposed
rule would vary annually.
Burden of Response: The burden of response would vary for each
regulatory requirement.
Estimate of Total Annual Burden: The estimate of annual burden
varies based on the year of analysis. For the initial year of analysis,
the hour burden for Cybersecurity Plan activities and cyber incident
reporting would be about 241,553 hours across the affected population.
This is derived from the development of 3,411 facility and OCS facility
Cybersecurity Plans for 50 hours each, 1,775 vessel Cybersecurity Plans
for 40 hours each, and 20 cyber incidents being reported for 0.15 hours
each [(3,411 x 50) + (1,775 x 40) + (20 x 0.15)].
For the second year of analysis, the hour burden for Cybersecurity
Plan activities and cyber incident reporting would be about 265,723
hours across the affected population. The second year of analysis
represents the highest estimated hour burden for all years of analysis.
This is derived from the development of 3,411 facility and OCS facility
Cybersecurity Plans for 50 hours each, 341 facility and OCS facility
Cybersecurity Plans being revised and resubmitted for an additional 50
hours, 1,775 vessel Cybersecurity Plans for 40 hours each, 178 vessel
Cybersecurity Plans being revised and resubmitted for an additional 40
hours, and 20 cyber incidents being reported for 0.15 hours each
[(3,411 x 50) + (341 x 50) + (1,775 x 40) + (178 x 40) + (20 x 0.15)].
For the third through the sixth years of analysis, and the eighth
through the tenth years of analysis, when Cybersecurity Plans are being
maintained and amendments are being developed, the hour burden for
Cybersecurity Plan activities and cyber incident reporting would be
about 48,313 hours across the affected population. This is derived from
the maintenance and amendment of 3,411 facility and OCS facility
Cybersecurity Plans for 10 hours each, the maintenance and amendment of
1,775 vessel Cybersecurity Plans for 8 hours each, and 20 cyber
incidents being reported for 0.15 hours each [(3,411 x 10) + (1,775 x
8) + (20 x 0.15)].
For the seventh year of analysis, when Cybersecurity Plans are
renewed, the hour burden for Cybersecurity Plan activities and cyber
incident reporting would be about 76,094 hours across the affected
population. This is derived from the renewal of 3,411 facility and OCS
facility Cybersecurity Plans for 15 hours each, 341 facility and OCS
facility Cybersecurity Plans being revised and resubmitted for an
additional 7.5 hours, 1,775 vessel Cybersecurity Plans being renewed
for 12 hours each, 178 vessel Cybersecurity Plans being revised and
resubmitted for an additional 6 hours, and 20 cyber incidents being
reported for 0.15 hours each [(3,411 x 15) + (341 x 7.5) + (1,775 x 12)
+ (178 x 6) + (20 x 0.15)].
This leads to an annualized hour burden total of 92,156 hours over
the 10-year period of analysis.
As required by 44 U.S.C. 3507(d), we will submit a copy of this
proposed rule to OMB for its review of the collection of information.
We ask for public comment on the proposed collection of information
to help us determine, among other things--
How useful the information is;
Whether the information can help us perform our functions
better;
How we can improve the quality, usefulness, and clarity of
the information;
Whether the information is readily available elsewhere;
How accurate our estimate is of the burden of collection;
How valid our methods are for determining the burden of
collection; and
How we can minimize the burden of collection.
If you submit comments on the collection of information, submit
them to both the OMB and to the docket indicated under ADDRESSES.
You need not respond to a collection of information unless it
displays a currently valid control number from OMB. Before the Coast
Guard could enforce the collection of information requirements in this
proposed rule, OMB would need to approve the Coast Guard's request to
collect this information.
E. Federalism
A rule has implications for federalism under Executive Order 13132
(Federalism) if it has a substantial direct effect on States, on the
relationship between the National Government and the States, or on the
distribution of power and responsibilities among the various levels of
Government. We have analyzed this proposed rule under Executive Order
13132 and have determined that it is consistent with the fundamental
federalism principles and preemption requirements described in
Executive Order 13132. Our analysis follows.
It is well settled that States may not regulate in categories
reserved for regulation by the Coast Guard and that all categories
covered in 46 U.S.C. 3306, 3703, 7101, and 8101 (design, construction,
alteration, repair, maintenance, operation, equipping, personnel
qualification, and manning of vessels), as well as the reporting of
casualties and any other category in which Congress intended the Coast
Guard to be the sole source of a vessel's obligations, are within the
field foreclosed from regulation by the States. See United States v.
Locke, 529 U.S. 89 (2000). This proposed rule would
[[Page 13507]]
expand maritime security requirements under MTSA to expressly address
current and emerging cybersecurity risks and safeguard the MTS. In
enacting MTSA, Congress articulated a need to address port security
threats around the United States while preserving the free flow of
interstate and foreign commerce. MTSA's mandatory, comprehensive
maritime security regime, founded on this stated interest of
facilitating interstate and international maritime commerce, indicates
that States and local governments are generally foreclosed from
regulating in this field. Particularly with respect to vessels subject
to this new subpart F, the Coast Guard's above noted comprehensive law
and regulations would preclude State and local laws. OCS facilities,
which do not generally fall under any State or local jurisdiction, are
principally subject to federal law and regulation.
Notwithstanding MTSA's general preemptive effect, States and local
governments have traditionally shared certain regulatory jurisdiction
with the Federal Government over waterfront facilities. Accordingly,
current MTSA regulations make clear that the maritime facility security
requirements of 33 CFR part 105 only preempt State or local regulation
when the two conflict.\148\ Similarly, the cybersecurity requirements
of this proposed rule as they apply to a facility under 33 CFR part 105
would only have preemptive effect over a State or local law or
regulation insofar as the two actually conflict (meaning compliance
with both requirements is impossible or the State or local requirement
frustrates an overriding Federal need for uniformity). In the unlikely
event that state or local government would claim jurisdiction over an
OCS facility, the aforenoted conflict preemption principles would
apply.
---------------------------------------------------------------------------
\148\ 33 CFR 101.112(b).
---------------------------------------------------------------------------
In light of the foregoing analysis, this proposed rule is
consistent with the fundamental federalism principles and preemption
requirements described in Executive Order 13132.
While it is well settled that States may not regulate in categories
in which Congress intended the Coast Guard to be the sole source of a
vessel's obligations, the Coast Guard recognizes the key role that
State and local governments may have in making regulatory
determinations. Additionally, for rules with federalism implications
and preemptive effect, Executive Order 13132 specifically directs
agencies to consult with State and local governments during the
rulemaking process. If you believe this proposed rule would have
implications for federalism under Executive Order 13132, please call or
email the person listed in the FOR FURTHER INFORMATION CONTACT section
of this preamble.
F. Unfunded Mandates
The Unfunded Mandates Reform Act of 1995, 2 U.S.C. 1531-1538,
requires Federal agencies to assess the effects of their discretionary
regulatory actions. The Act addresses actions that may result in the
expenditure by a State, local, or tribal government, in the aggregate,
or by the private sector of $100 million (adjusted for inflation) or
more in any one year.
Upon adjusting for inflation, this proposed action would need to
result in the expenditure of $177 million or more in any one year, in
2022 dollars. To obtain this inflated value, we use the 2022 and 1995
annual gross domestic product implicit price deflator values of 127.224
and 71.823, respectively. We divide these values to obtain a factor of
approximately 1.77, rounded (127.224 / 71.823 = 1.77).\149\ Multiplying
this factor by the expenditure amount identified in the Unfunded
Mandates Reform Act of 1995 gives us our expenditure amount adjusted
for inflation (1.77 x 100,000,000 = 177,000,000). Because this proposed
rule would result in the expenditure by the private sector of
approximately $91,170,100 in undiscounted 2022 dollars in the most
cost-heavy year, this proposed action would not require an assessment.
---------------------------------------------------------------------------
\149\ We use the implicit price deflator for gross domestic
product values from the Bureau of Economic Analysis National Income
and Product Accounts interactive data tables. See https://apps.bea.gov/iTable/?reqid=19&step=3&isuri=1&1921=survey&1903=11#eyJhcHBpZCI6MTksInN0ZXBzIjpbMSwyLDMsM10sImRhdGEiOltbIk5JUEFfVGFibGVfTGlzdCIsIjEzIl0sWyJDYXRlZ29yaWVzIiwiU3VydmV5Il0sWyJGaXJzdF9ZZWFyIiwiMTk5NSJdLFsiTGFzdF9ZZWFyIiwiMjAyMyJdLFsiU2NhbGUiLCIwIl0sWyJTZXJpZXMiLCJBIl1dfQ==, accessed
July 13, 2023.
---------------------------------------------------------------------------
Although this proposed rule would not result in such an
expenditure, we do discuss the potential effects of this proposed rule
elsewhere in this preamble. Additionally, many of the provisions
proposed in this NPRM are intentionally designed to take owner or
operator discretion into account, which could help reduce anticipated
expenditures. While this proposed rule may require action related to a
security measure (implementing multifactor authentication, for
example), the method or policy used to achieve compliance with the
provision is at the discretion of the impacted owner or operator. This
NPRM also includes the option for waivers and equivalents, in Sec.
101.665, for any affected party unable to meet the requirements of this
proposed rule. These intentional flexibilities can help reduce expected
costs for those in the affected population and allow for more tailored
cybersecurity solutions.
G. Taking of Private Property
This proposed rule would not cause a taking of private property or
otherwise have taking implications under Executive Order 12630
(Governmental Actions and Interference with Constitutionally Protected
Property Rights).
H. Civil Justice Reform
This proposed rule meets applicable standards in sections 3(a) and
3(b)(2) of Executive Order 12988, (Civil Justice Reform), to minimize
litigation, eliminate ambiguity, and reduce burden.
I. Protection of Children
We have analyzed this proposed rule under Executive Order 13045
(Protection of Children from Environmental Health Risks and Safety
Risks). This proposed rule is not an economically significant rule and
would not create an environmental risk to health or risk to safety that
might disproportionately affect children.
J. Indian Tribal Governments
This proposed rule does not have tribal implications under
Executive Order 13175 (Consultation and Coordination with Indian Tribal
Governments), because it would not have a substantial direct effect on
one or more Indian tribes, on the relationship between the Federal
Government and Indian tribes, or on the distribution of power and
responsibilities between the Federal Government and Indian tribes.
K. Energy Effects
We have analyzed this proposed rule under Executive Order 13211
(Actions Concerning Regulations That Significantly Affect Energy
Supply, Distribution, or Use). We have determined that it is not a
``significant energy action'' under that order because although it is a
``significant regulatory action'' under Executive Order 12866, it is
not likely to have a significant adverse effect on the supply,
distribution, or use of energy.
L. Technical Standards
The National Technology Transfer and Advancement Act, codified as a
note to 15 U.S.C. 272, directs agencies to use voluntary consensus
standards in
[[Page 13508]]
their regulatory activities unless the agency provides Congress,
through OMB, with an explanation of why using these standards would be
inconsistent with applicable law or otherwise impractical. Voluntary
consensus standards are technical standards (for example,
specifications of materials, performance, design, or operation; test
methods; sampling procedures; and related management systems practices)
that are developed or adopted by voluntary consensus standards bodies.
This proposed rule does not use technical standards. Therefore, we
did not consider the use of voluntary consensus standards.
M. Environment
We have analyzed this proposed rule under Department of Homeland
Security Management Directive 023-01, Rev. 1, associated implementing
instructions, and Environmental Planning COMDTINST 5090.1 (series),
which guide the Coast Guard in complying with the National
Environmental Policy Act of 1969 (42 U.S.C. 4321-4370f), and have made
a preliminary determination that this action is one of a category of
actions that do not individually or cumulatively have a significant
effect on the human environment. A preliminary Record of Environmental
Consideration supporting this determination is available in the docket.
For instructions on locating the docket, see the ADDRESSES section of
this preamble.
This proposed rule would be categorically excluded under paragraphs
A3 and L54 of Appendix A, Table 1 of DHS Instruction Manual 023-01-001-
01, Rev. 1. Paragraph A3 pertains to promulgation of rules, issuance of
rulings or interpretations, and the development and publication of
policies, orders, directives, notices, procedures, manuals, advisory
circulars, and other guidance documents, notably those of a strictly
administrative or procedural nature; and those that interpret or amend
an existing regulation without changing its environmental effect.
Paragraph L54 pertains to regulations that are editorial or procedural.
This proposed rule involves establishing minimum cybersecurity
requirements in Coast Guard regulations such as account security
measures, device security measures, governance and training, risk
management, supply chain management, resilience, network segmentation,
reporting, and physical security. This proposed rule would promote the
Coast Guard's maritime security mission by establishing measures to
safeguard the MTS against emerging threats associated with
cybersecurity. This proposed rule also would promote the Coast Guard's
marine environmental protection mission by preventing or mitigating
marine environmental damage that could ensue due to a cybersecurity
incident. We seek any comments or information that may lead to the
discovery of a significant environmental impact from this proposed
rule.
List of Subjects in 33 CFR Part 101
Harbors, Maritime security, Reporting and recordkeeping
requirements, Security measures, Vessels, Waterways.
For the reasons discussed in the preamble, the Coast Guard is
proposing to amend 33 CFR part 101 as follows:
PART 101--MARITIME SECURITY: GENERAL
0
1. The authority citation for part 101 is revised to read as follows:
Authority: 46 U.S.C. 70101-70104 and 70124; 43 U.S.C. 1333(d);
Executive Order 12656, 3 CFR 1988 Comp., p. 585; 33 CFR 1.05-1,
6.04-11, 6.14, 6.16, and 6.19; DHS Delegation No. 00170.1, Revision
No. 01.3.
0
2. Amend part 101 by adding subpart F, consisting of Sec. Sec. 101.600
through 101.670, to read as follows:
Subpart F--Cybersecurity
Sec.
101.600 Purpose.
101.605 Applicability.
101.610 Federalism.
101.615 Definitions.
101.620 Owner or Operator.
101.625 Cybersecurity Officer.
101.630 Cybersecurity Plan.
101.635 Drills and Exercises.
101.640 Records and Documentation.
101.645 Communications.
101.650 Cybersecurity Measures.
101.655 Cybersecurity Compliance Dates.
101.660 Cybersecurity Compliance Documentation.
101.665 Noncompliance, Waivers, and Equivalents.
101.670 Severability.
Sec. 101.600 Purpose.
The purpose of this subpart is to set minimum cybersecurity
requirements for vessels and facilities to safeguard and ensure the
security and resilience of the Marine Transportation System (MTS).
Sec. 101.605 Applicability.
(a) This subpart applies to the owners and operators of U.S.-
flagged vessels subject to 33 CFR part 104, U.S. facilities subject to
33 CFR part 105, and Outer Continental Shelf (OCS) facilities subject
to 33 CFR part 106.
(b) This subpart does not apply to any foreign-flagged vessels
subject to 33 CFR part 104.
Sec. 101.610 Federalism.
Consistent with Sec. 101.112(b), with respect to a facility
regulated under 33 CFR part 105 to which this subpart applies, the
regulations in this subpart have preemptive effect over a State or
local law or regulation insofar as the State or local law or regulation
applicable to the facility conflicts with these regulations, either by
actually conflicting or by frustrating an overriding Federal need for
uniformity.
Sec. 101.615 Definitions.
Unless otherwise specified, as used in this subpart:
Approved list means an owner or operator's authoritative catalog
for products that meet cybersecurity requirements.
Backup means a copy of physical or virtual files or databases in a
secondary location for preservation. It may also refer to the process
of creating a copy.
Credentials means a set of data attributes that uniquely identifies
a system entity such as a person, an organization, a service, or a
device, and attests to one's right to access to a particular system.
Critical Information Technology (IT) or Operational Technology (OT)
systems means any Information Technology or Operational Technology
system used by the vessel, facility, or OCS facility that, if
compromised or exploited, could result in a transportation security
incident, as determined by the Cybersecurity Officer (CySO) in the
Cybersecurity Plan. Critical IT or OT systems include those business
support services that, if compromised or exploited, could result in a
transportation security incident. This term includes systems whose
ownership, operation, maintenance, or control is delegated wholly or in
part to any other party.
Cyber incident means an occurrence that actually jeopardizes,
without lawful authority, the integrity, confidentiality, or
availability of information or an Information System, or actually
jeopardizes, without lawful authority, an Information System.
Cyber Incident Response Plan means a set of predetermined and
documented procedures to respond to a cyber incident. It is a document
that gives the owner or operator or a designated Cybersecurity Officer
(CySO) instructions on how to respond to a cyber incident and pre-
identifies key roles, responsibilities, and decision-makers. Cyber
threat means an action,
[[Page 13509]]
not protected by the First Amendment to the Constitution of the United
States, on or through an information system that may result in an
unauthorized effort to adversely impact the security, availability,
confidentiality, or integrity of an information system or information
that is stored on, processed by, or transiting an information system.
The term ``cyber threat'' does not include any action that solely
involves a violation of a consumer term of service or a consumer
licensing agreement.
Cybersecurity Assessment means the appraisal of the risks facing an
entity, asset, system, or network, organizational operations,
individuals, geographic area, other organizations, or society, and
includes identification of relevant vulnerabilities and threats and
determining the extent to which adverse circumstances or events could
result in operational disruption and other harmful consequences.
Cybersecurity Officer, or CySO, means the person(s) designated as
responsible for the development, implementation, and maintenance of the
cybersecurity portions of the Vessel Security Plan (VSP), Facility
Security Plan (FSP), or Outer Continental Shelf (OCS) FSP, and for
liaison with the Captain of the Port (COTP) and Company, Vessel, and
Facility Security Officers.
Cybersecurity Plan means a plan developed to ensure application and
implementation of cybersecurity measures designed to protect the
owners' or operators' systems and equipment, as required by this part.
A Cybersecurity Plan is either included in a VSP, FSP, or OCS FSP, or
is an annex to a VSP, FSP, or OCS FSP.
Cybersecurity risk means threats to and vulnerabilities of
information or information systems and any related consequences caused
by or resulting from unauthorized access, use, disclosure, degradation,
disruption, modification, or destruction of such information or
information systems, including such related consequences caused by an
act of terrorism. It does not include any action that solely involves a
violation of a consumer term of service or a consumer licensing
agreement.
Cybersecurity vulnerability means any attribute of hardware,
software, process, or procedure that could enable or facilitate the
defeat of a security control.
Encryption means any procedure used in cryptography to convert
plain text into cipher text to prevent anyone but the intended
recipient from reading that data.
Executable code means any object code, machine code, or other code
readable by a computer when loaded into its memory and used directly by
such computer to execute instructions.
Exploitable channel means any information channel (such as a
portable media device and other hardware) that allows for the violation
of the security policy governing the information system and is usable
or detectable by subjects external to the trusted user.
Firmware means computer programs (which are stored in and executed
by computer hardware) and associated data (which is also stored in the
hardware) that may be dynamically written or modified during execution.
Hardware means, collectively, the equipment that makes up physical
parts of a computer, including its electronic circuitry, together with
keyboards, readers, scanners, and printers.
Human-Machine Interface, or HMI, means the hardware or software
through which an operator interacts with a controller for industrial
systems. An HMI can range from a physical control panel with buttons
and indicator lights to an industrial personal computer with a color
graphics display running dedicated HMI software.
Information System means an interconnected set of information
resources under the same direct management control that shares common
functionality. A system normally includes hardware, software data,
applications, communications, and people. It includes the application
of Information Technology, Operational Technology, or a combination of
both.
Information Technology, or IT, means any equipment or
interconnected system or subsystem of equipment, used in the
acquisition, storage, analysis, evaluation, manipulation, management,
movement, control, display, switching, interchange, transmission, or
reception of data or information.
Known Exploited Vulnerability, or KEV, means a computer
vulnerability that has been exploited in the past.
Multifactor Authentication means a layered approach to securing
data and applications where a system requires users to present a
combination of two or more credentials to verify their identity for
login.
Network means information system(s) implemented with a collection
of interconnected components. A network is a collection of computers,
servers, mainframes, network devices, peripherals, or other devices
connected to allow data sharing. A network consists of two or more
computers that are linked in order to share resources, exchange files,
or allow electronic communications.
Network map means a visual representation of internal network
topologies and components.
Network segmentation means a physical or virtual architectural
approach that divides a network into multiple segments, each acting as
its own subnetwork, to provide additional security and control that can
help prevent or minimize the impact of a cyber incident.
Operational Technology, or OT, means programmable systems or
devices that interact with the physical environment (or manage devices
that interact with the physical environment). These systems or devices
detect or cause a change through the monitoring or control of devices,
processes, and events.
Patching means updating software and operating systems to address
cybersecurity vulnerabilities within a program or product.
Penetration test means a test of the security of a computer system
or software application by attempting to compromise its security and
the security of an underlying operating system and network component
configurations.
Principle of least privilege means that an individual should be
given only those privileges that are needed to complete a task.
Further, the individual's function, not identity, should control the
assignment of privileges.
Privileged user means a user who is authorized (and, therefore,
trusted) to perform security functions that ordinary users are not
authorized to perform.
Risk means a measure of the extent to which an entity is threatened
by a potential circumstance or event, and typically is a function of:
(1) the adverse impact, or magnitude of harm, that would arise if the
circumstance or event occurs; and (2) the likelihood of occurrence.
Software means a set of instructions, data, or programs used to
operate a computer and execute specific tasks.
Supply chain means a system of organizations, people, activities,
information, and resources for creating computer products and offering
IT services to their customers.
Threat means any circumstance or event with the potential to
adversely impact organizational operations (including mission,
functions, image, or reputation), organizational assets, individuals,
other organizations, or the Nation through an information system
through unauthorized access, destruction, disclosure, modification of
information, or denial of service.
Vulnerability means a characteristic or specific weakness that
renders an
[[Page 13510]]
organization or asset (such as information or an information system)
open to exploitation by a given threat or susceptible to a given
hazard.
Vulnerability scan means a technique used to identify hosts or host
attributes and associated vulnerabilities.
Sec. 101.620 Owner or Operator.
(a) Each owner or operator of a vessel, facility, or OCS facility
is responsible for compliance with the requirements of this subpart.
(b) For each vessel, facility, or OCS facility, the owner or
operator must--
(1) Ensure a Cybersecurity Plan is developed, approved, and
maintained;
(2) Define in Section 1 of the Cybersecurity Plan the cybersecurity
organizational structure and identify each person exercising
cybersecurity duties and responsibilities within that structure, with
the support needed to fulfill those obligations;
(3) Designate, in writing, by name and by title, a CySO who is
accessible to the Coast Guard 24 hours a day, 7 days a week, and
identify how the CySO can be contacted at any time;
(4) Ensure that cybersecurity exercises, audits, and inspections,
as well as the Cybersecurity Assessment, are conducted as required by
this part and in accordance with the Cybersecurity Plan (see Sec.
101.625(d)(1), (3), (6) and (7));
(5) Ensure that the vessel, facility, or OCS facility operates in
compliance with the approved Cybersecurity Plan;
(6) Ensure the development, approval, and execution of the Cyber
Incident Response Plan; and
(7) Ensure all cyber incidents are reported to the National
Response Center (NRC) at the telephone number listed in Sec. 101.305
of this part.
Sec. 101.625 Cybersecurity Officer.
(a) Other duties. The Cybersecurity Officer (CySO) may perform
other duties within the owner's or operator's organization (vessel or
facility), provided the person is able to perform the duties and
responsibilities required of the CySO by this part.
(b) Serving as CySO for Multiple Vessels, Facilities or OCS
Facilities. The same person may serve as the CySO for more than one
vessel, facility, or OCS facility. If a person serves as the CySO for
more than one vessel, facility, or OCS facility, the name of each
location for which that person is the CySO must be listed in the
Cybersecurity Plan of each vessel, facility, or OCS facility for which
that person is the CySO.
(c) Assigning Duties Permitted. The CySO may assign security duties
to other vessel, facility, or OCS facility personnel; however, the CySO
retains ultimate responsibility for these duties.
(d) Responsibilities. For each vessel, facility, or OCS facility
for which they are designated, the CySO must--
(1) Ensure that the Cybersecurity Assessment is conducted as
required by this part;
(2) Ensure the cybersecurity measures in the Cybersecurity Plan are
developed, implemented, and operating as intended;
(3) Ensure that an annual audit of the Cybersecurity Plan and its
implementation is conducted and, if necessary, ensure that the
Cybersecurity Plan is updated;
(4) Ensure the Cyber Incident Response Plan is executed and
exercised;
(5) Ensure the Cybersecurity Plan is exercised in accordance with
Sec. 101.635(c) of this part;
(6) Arrange for cybersecurity inspections in conjunction with
vessel, facility and OCS facility inspections;
(7) Ensure the prompt correction of problems identified by
exercises, audits, or inspections;
(8) Ensure the cybersecurity awareness and vigilance of personnel
through briefings, drills, exercises, and training;
(9) Ensure adequate cybersecurity training of personnel;
(10) Ensure all breaches of security, suspicious activity that may
result in TSIs, TSIs, and cyber incidents are recorded and reported to
the owner or operator;
(11) Ensure that records required by this part are maintained in
accordance with Sec. 101.640 of this part;
(12) Ensure any reports as required by this part have been prepared
and submitted;
(13) Ensure that the Cybersecurity Plan, as well as proposed
substantive changes (or major amendments) to cybersecurity measures
included therein, are submitted for approval to the cognizant COTP or
the Officer in Charge, Marine Inspections (OCMI) for facilities or OCS
facilities, or to the Marine Safety Center (MSC) for vessels, prior to
amending the Cybersecurity Plan, in accordance with Sec. 101.630 of
this part;
(14) Ensure relevant security and management personnel are briefed
regarding changes in cybersecurity conditions on board the vessel,
facility, or OCS facility; and
(15) Ensure identification and mitigation of all KEVs in critical
IT or OT systems, without delay.
(e) Qualifications. The CySO must have general knowledge, through
training or equivalent job experience, in the following:
(1) General vessel, facility, or OCS facility operations and
conditions;
(2) General cybersecurity guidance and best practices;
(3) The vessel, facility, or OCS facility's Cyber Incident Response
Plan;
(4) The vessel, facility, or OCS facility's Cybersecurity Plan;
(5) Cybersecurity equipment and systems;
(6) Methods of conducting cybersecurity audits, inspections,
control, and monitoring techniques;
(7) Relevant laws and regulations pertaining to cybersecurity;
(8) Instruction techniques for cybersecurity training and
education;
(9) Handling of Sensitive Security Information and security related
communications;
(10) Current cybersecurity threat patterns and KEVs;
(11) Recognizing characteristics and behavioral patterns of persons
who are likely to threaten security; and
(12) Conducting and assessing cybersecurity drills and exercises.
Sec. 101.630 Cybersecurity Plan.
(a) General. The CySO must develop, implement, and verify a
Cybersecurity Plan for each vessel, facility, or OCS facility. The
Cybersecurity Plan must reflect all cybersecurity measures required in
this subpart, as appropriate, to mitigate risks identified during the
Cybersecurity Assessment. The Plan must describe in detail how the
requirements of subpart F will be met. The Cybersecurity Plan may be
included in a VSP or an FSP, or as an annex to the VSP or FSP.
(b) Protecting Sensitive Security Information. The Cybersecurity
Plan is Sensitive Security Information and must be protected in
accordance with 49 CFR part 1520.
(c) Format. The owner or operator must ensure that the
Cybersecurity Plan consists of the individual sections listed in this
paragraph. If the Cybersecurity Plan does not follow the order as it
appears on the list, the owner or operator must ensure that the Plan
contains an index identifying the location of each of the following
sections:
(1) Cybersecurity organization and identity of the CySO;
(2) Personnel training;
(3) Drills and exercises;
(4) Records and documentation;
(5) Communications;
(6) Cybersecurity systems and equipment, with associated
maintenance;
(7) Cybersecurity measures for access control, including the
computer, IT, and OT access areas;
[[Page 13511]]
(8) Physical security controls for IT and OT systems;
(9) Cybersecurity measures for monitoring;
(10) Audits and amendments to the Cybersecurity Plan;
(11) Reports of all cybersecurity audits and inspections, to
include documentation of resolution or mitigation of all identified
vulnerabilities;
(12) Documentation of all identified, unresolved vulnerabilities,
to include those that are intentionally unresolved due to owner or
operator risk acceptance;
(13) Cyber incident reporting procedures in accordance with part
101 of this subchapter; and
(14) Cybersecurity Assessment.
(d) Submission and approval. Each owner or operator must submit one
copy of their Cybersecurity Plan for review and approval to the
cognizant COTP or the OCMI for the facility or OCS facility, or to the
MSC for the vessel. A letter certifying that the Plan meets the
requirements of this subpart must accompany the submission.
(1) The COTP, OCMI, or MSC will evaluate each submission for
compliance with this part, and either--
(i) Approve the Cybersecurity Plan and return a letter to the owner
or operator indicating approval and any conditional approval;
(ii) Require additional information or revisions to the
Cybersecurity Plan and return a copy to the owner or operator with a
brief description of the required revisions or additional information;
or
(iii) Disapprove the Cybersecurity Plan and return a copy, without
delay, to the owner or operator with a brief statement of the reasons
for disapproval.
(iv) If the cognizant COTP, OCMI, or MSC requires additional time
to review the plan, they have the authority to return a written
acknowledgement to the owner or operator stating that the Coast Guard
will review the Cybersecurity Plan submitted for approval, and that the
U.S.-flagged vessel, facility, or OCS facility may continue to operate
as long as it remains in compliance with the submitted Cybersecurity
Plan.
(2) Owners or operators submitting one Cybersecurity Plan to cover
two or more vessels or facilities of similar operations must ensure the
Plan addresses the specific cybersecurity risks for each vessel or
facility.
(3) A Plan that is approved by the COTP, OCMI, or MSC is valid for
5 years from the date of its approval.
(e) Amendments to the Cybersecurity Plan.
(1) Amendments to a Coast Guard-approved Cybersecurity Plan must be
initiated by either--
(i) The owner or operator or the CySO; or
(ii) When the COTP, OCMI, or MSC finds that the Cybersecurity Plan
no longer meets the requirements in this part, the Plan will be
returned to the owner or operator with a letter explaining why the Plan
no longer meets the requirements and requires amendment. The owner or
operator will have at least 60 days to amend the Plan and cure
deficiencies outlined in the letter. Until the amendments are approved,
the owner or operator must ensure temporary cybersecurity measures are
implemented to the satisfaction of the Coast Guard.
(2) Major amendments, as determined by the owner or operator based
on types of changes to their security measures and operational risks,
to the Cybersecurity Plan must be proposed to the Coast Guard prior to
implementation. Proposed amendments to the Cybersecurity Plan must be
sent to the Coast Guard at least 30 days before the proposed
amendment's effective date. The Coast Guard will approve or disapprove
the proposed amendment in accordance with this part. An owner or
operator must notify the Coast Guard by the most rapid means
practicable as to the nature of the amendments, the circumstances that
prompted these amendments, and the period these amendments are expected
to be in place.
(3) If the owner or operator has changed, the CySO must amend the
Cybersecurity Plan, without delay, to include the name and contact
information of the new owner or operator and submit the affected
portion of the Plan for review and approval in accordance with this
part.
(4) If the CySO has changed, the Coast Guard must be notified
without delay and the affected portion of the Cybersecurity Plan must
be amended and submitted to the Coast Guard for review and approval in
accordance with this part without delay.
(f) Audits. (1) The CySO must ensure that an audit of the
Cybersecurity Plan and its implementation is performed annually,
beginning no later than 1 year from the initial date of approval. The
CySO must attach a report to the Plan certifying that the Plan meets
the applicable requirements of this subpart.
(2) In addition to the annual audit, the CySO must audit the
Cybersecurity Plan if there is a change in the owner or operator of the
vessel, facility, or OCS facility, or if there have been modifications
to the cybersecurity measures, including, but not limited to, physical
access, incident response procedures, security measures, or operations.
(3) Auditing the Cybersecurity Plan as a result of modifications to
the vessel, facility, or OCS facility, or because of changes to the
cybersecurity measures, may be limited to those sections of the Plan
affected by the modifications.
(4) Personnel conducting internal audits of the cybersecurity
measures specified in the Plan or evaluating its implementation must--
(i) Have knowledge of methods of conducting audits and inspections,
as well as access control and monitoring techniques;
(ii) Not have regularly assigned cybersecurity duties for the
vessel, facility, or OCS facility being audited; and
(iii) Be independent of any cybersecurity measures being audited.
(5) If the results of an audit require amending the Cybersecurity
Plan, the CySO must submit, in accordance with this part, the
amendments to the Coast Guard for review and approval no later than 30
days after completion of the audit with a letter certifying that the
amended Plan meets applicable requirements of subpart F.
Sec. 101.635 Drills and Exercises.
(a) General. (1) Drills and exercises must be used to test the
proficiency of the vessel, facility, and OCS facility personnel in
assigned cybersecurity duties and the effective implementation of the
VSP, FSP, OCS FSP, and Cybersecurity Plan. The drills and exercises
must enable the CySO to identify any related cybersecurity deficiencies
that need to be addressed.
(2) The drill or exercise requirements specified in this section
may be satisfied with the implementation of cybersecurity measures
required by the VSP, FSP, OCS FSP, and Cybersecurity Plan as the result
of a cyber incident, as long as the vessel, facility, or OCS facility
achieves and documents attainment of drill and exercise goals for the
cognizant COTP.
(b) Drills. (1) The CySO must ensure that at least one
cybersecurity drill is conducted every 3 months. Cybersecurity drills
may be held in conjunction with other security or non-security drills,
where appropriate.
(2) Drills must test individual elements of the Cybersecurity Plan,
including responses to cybersecurity threats and incidents.
Cybersecurity drills must take into account the types of operations of
the vessel, facility, or OCS facility; changes to the vessel, facility,
or OCS facility personnel; the
[[Page 13512]]
type of vessel a facility is serving; and other relevant circumstances.
(3) If a vessel is moored at a facility on a date a facility has
planned to conduct any drills, the facility cannot require the vessel
or vessel personnel to be a part of or participate in the facility's
scheduled drill.
(c) Exercises. (1) Exercises must be conducted at least once each
calendar year, with no more than 18 months between exercises.
(2) Exercises may be--
(i) Full-scale or live;
(ii) Tabletop simulation;
(iii) Combined with other appropriate exercises; or
(iv) A combination of the elements in paragraphs (c)(2)(i) through
(iii) of this section.
(3) Exercises may be vessel- or facility-specific, or part of a
cooperative exercise program to exercise applicable vessel, facility,
and OCS facility Cybersecurity Plans or comprehensive port exercises.
(4) Each exercise must test communication and notification
procedures and elements of coordination, resource availability, and
response.
(5) Exercises are a full test of the cybersecurity program and must
include the substantial and active participation of the CySO(s).
(6) If any corrective action identified during an exercise is
needed, it must be addressed and documented as soon as possible.
Sec. 101.640 Records and Documentation.
All records, reports, and other documents mentioned in this subpart
must be created and maintained in accordance with 33 CFR 104.235 for
vessels, 105.225 for facilities, and 106.230 for OCS facilities. At a
minimum, the records must be created for the following activities:
training, drills, exercises, cybersecurity threats, incidents, and
audits of the Cybersecurity Plan.
Sec. 101.645 Communications.
(a) The CySO must have a means to effectively notify owners or
operators and personnel of a vessel, facility, or OCS facility of
changes in cybersecurity conditions at the vessel, facility, and OCS
facility.
(b) Communication systems and procedures must allow effective and
continuous communications between vessel, facility, and OCS facility
security personnel, vessels interfacing with a facility or an OCS
facility, the cognizant COTP, and national and local authorities with
security responsibilities.
Sec. 101.650 Cybersecurity Measures.
(a) Account security measures. Each owner or operator of a vessel,
facility, or OCS facility must ensure, at a minimum, the following
account security measures are in place and documented in Section 7 of
the Cybersecurity Plan:
(1) Automatic account lockout after repeated failed login attempts
must be enabled on all password-protected IT and OT systems.
(2) Default passwords must be changed before using any IT or OT
systems.
(3) A minimum password strength must be maintained on all IT and OT
systems that are technically capable of password protection.
(4) Multifactor authentication must be implemented on password-
protected IT and remotely accessible OT systems.
(5) The principle of least privilege must be applied to
administrator or otherwise privileged accounts on both IT and OT
systems;
(6) The owner or operator must ensure that users maintain separate
credentials on critical IT and OT systems; and
(7) The owner or operator must ensure that user credentials are
removed or revoked when a user leaves the organization.
(b) Device security measures. Each owner or operator or designated
CySO of a vessel, facility, or OCS facility must ensure the following
device security measures are in place and documented in Section 6 of
the Cybersecurity Plan:
(1) Develop and maintain a list of approved hardware, firmware, and
software that may be installed on IT or OT systems. Any hardware,
firmware, and software installed on IT and OT systems must be on the
owner- or operator-approved list.
(2) Ensure applications running executable code must be disabled by
default on critical IT and OT systems. Exemptions must be justified and
documented in the Cybersecurity Plan.
(3) Maintain an accurate inventory of network-connected systems,
including designation of critical IT and OT systems; and
(4) Develop and maintain accurate documentation identifying the
network map and OT device configuration information.
(c) Data security measures. Each owner or operator or designated
CySO of a vessel, facility, or OCS facility must ensure the following
data security measures are in place and documented in Section 4 of the
Cybersecurity Plan:
(1) Data logs must be securely captured, stored, and protected so
that they are accessible only by privileged users; and
(2) All data, both in transit and at rest, must be encrypted using
a suitably strong algorithm.
(d) Cybersecurity training for personnel. The training program to
address requirements under this paragraph must be documented in
Sections 2 and 4 of the Cybersecurity Plan.
(1) All personnel with access to the IT or OT systems, including
contractors, whether part-time, full-time, temporary, or permanent,
must have cybersecurity training in the following topics:
(i) Relevant provisions of the Cybersecurity Plan;
(ii) Recognition and detection of cybersecurity threats and all
types of cyber incidents;
(iii) Techniques used to circumvent cybersecurity measures;
(iv) Procedures for reporting a cyber incident to the CySO; and
(v) OT-specific cybersecurity training for all personnel whose
duties include using OT.
(2) Key personnel with access to the IT or remotely accessible OT
systems, including contractors, whether part-time, full-time,
temporary, or permanent, must also have cybersecurity training in the
following additional topics:
(i) Understanding their roles and responsibilities during a cyber
incident and response procedure; and
(ii) Maintaining current knowledge of changing cybersecurity
threats and countermeasures.
(3) All personnel must complete the training specified in
paragraphs (d)(1)(ii) through (v) of this section by [DATE 180 DAYS
AFTER EFFECTIVE DATE OF THE FINAL RULE], and annually thereafter. Key
personnel must complete the training specified in paragraph (d)(2) of
this section by [DATE 180 DAYS AFTER EFFECTIVE DATE OF THE FINAL RULE],
and annually thereafter, or more frequently as needed. Training for new
personnel not in place at the time of the effective date of this rule
must be completed within 5 days of gaining system access, but no later
than within 30 days of hiring, and annually thereafter. Training for
personnel on new IT or OT systems not in place at the time of the
effective date of this rule must be completed within 5 days of system
access, and annually thereafter. All personnel must complete the
training specified in paragraph (d)(1)(i) within 60 days of receiving
approval of the Cybersecurity Plan. The training must be documented and
maintained in the owner's or operator's records in accordance with 33
CFR 104.235 for vessels, 105.225 for facilities, and 106.230 for OCS
facilities.
[[Page 13513]]
(e) Risk management. Each owner or operator or designated CySO of a
vessel, facility, or OCS facility must ensure the following measures
for risk management are in place and documented in Sections 11 and 12
of the Cybersecurity Plan:
(1) Cybersecurity Assessment. Each owner or operator or designated
CySO of a U.S.-flagged vessel, facility, or OCS facility must ensure
completion of a Cybersecurity Assessment that addresses each covered
vessel, facility, and OCS facility. A Cybersecurity Assessment must be
conducted within 1 year from [EFFECTIVE DATE OF FINAL RULE] and
annually thereafter. However, the Cybersecurity Assessment must be
conducted sooner than annually if there is a change in ownership of a
U.S.-flagged vessel, facility, or OCS facility; or if there are major
amendments to the Cybersecurity Plan. In conducting the Cybersecurity
Assessment, the owner or operator must--
(i) Analyze all networks to identify vulnerabilities to IT and OT
systems and the risk posed by each digital asset;
(ii) Validate the Cybersecurity Plan;
(iii) Document recommendations and resolutions in the Facility
Security Assessment (FSA)/Vessel Security Assessment (VSA), in
accordance with 33 CFR 104.305, 105.305, and 106.305;
(iv) Document and mitigate any unresolved vulnerabilities; and
(v) Incorporate recommendations and resolutions from paragraph
(e)(1)(iii) of this section into the Cybersecurity Plan through an
amendment, in accordance with Sec. 101.630(e) of this part.
(2) Penetration Testing. In conjunction with FSP, OCS FSP, or VSP
renewal, the owner or operator or designated CySO must ensure that a
penetration test has been completed. Following the penetration test,
all identified vulnerabilities must be included in the FSA or VSA, in
accordance with 33 CFR 104.305, 105.305, and 106.305.
(3) Routine system maintenance. Each owner or operator or a
designated CySO of a vessel, facility, or OCS facility must ensure the
following measures for routine system maintenance are in place and
documented in Section 6 of the Cybersecurity Plan:
(i) Ensure patching or implementation of documented compensating
controls for all KEVs in critical IT or OT systems, without delay;
(ii) Maintain a method to receive and act on publicly submitted
vulnerabilities;
(iii) Maintain a method to share threat and vulnerability
information with external stakeholders;
(iv) Ensure there are no exploitable channels directly exposed to
internet-accessible systems;
(v) Ensure no OT is connected to the publicly accessible internet
unless explicitly required for operation, and verify that, for any
remotely accessible OT system, there is a documented justification; and
(vi) Conduct vulnerability scans as specified in the Cybersecurity
Plan.
(f) Supply chain. Each owner or operator or designated CySO of a
vessel, facility, or OCS facility must ensure the following supply-
chain measures are in place and documented in Section 4 of the
Cybersecurity Plan:
(1) Consider cybersecurity capability as criteria for evaluation to
procure IT and OT systems or services;
(2) Establish a process through which all IT and OT vendors or
service providers notify the owner or operator or designated CySO of
any cybersecurity vulnerabilities, incidents, or breaches, without
delay; and
(3) Monitor and document all third-party remote connections to
detect cyber incidents.
(g) Resilience. Each owner or operator or designated CySO of a
vessel, facility, or OCS facility must ensure the following measures
for resilience are in place and documented in Sections 3 and 9 of the
Cybersecurity Plan:
(1) Report any cyber incidents to the NRC, without delay, to the
telephone number listed in Sec. 101.305 of this part;
(2) In addition to other plans mentioned in this subpart, develop,
implement, maintain, and exercise the Cyber Incident Response Plan;
(3) Periodically validate the effectiveness of the Cybersecurity
Plan through annual tabletop exercises, annual reviews of incident
response cases, or post-cyber incident review, as determined by the
owner or operator; and
(4) Perform backup of critical IT and OT systems, with those
backups being sufficiently protected and tested frequently.
(h) Network segmentation. Each owner or operator or designated CySO
of a vessel, facility, or OCS facility must ensure the following
measures for network segmentation are in place and documented in
Sections 7 and 8 of the Cybersecurity Plan:
(1) Implement segmentation between IT and OT networks; and
(2) Verify that all connections between IT and OT systems are
logged and monitored for suspicious activity, breaches of security,
TSIs, unauthorized access, and cyber incidents.
(i) Physical security. Each owner or operator or designated CySO of
a vessel, facility, or OCS facility must ensure the following measures
for physical security are in place and documented in Sections 7 and 8
of the Cybersecurity Plan:
(1) In addition to any other requirements in this part, limit
physical access to OT and related IT equipment to only authorized
personnel, and confirm that all HMIs and other hardware are secured,
monitored, and logged for personnel access; and
(2) Ensure unauthorized media and hardware are not connected to IT
and OT infrastructure, including blocking, disabling, or removing
unused physical access ports, and establishing procedures for granting
access on a by-exception basis.
Sec. 101.655 Cybersecurity Compliance Dates.
All Cybersecurity Plans mentioned in this subpart must be submitted
to the Coast Guard for review and approval during the second annual
audit following [EFFECTIVE DATE OF FINAL RULE], according to 33 CFR
104.415 for vessels, 33 CFR 105.415 for facilities, or 106.415 for OCS
facilities.
Sec. 101.660 Cybersecurity Compliance Documentation.
Each owner or operator must ensure that the cybersecurity portion
of their Plan and penetration test results are available to the Coast
Guard upon request. The Alternative Security Program provisions are
addressed in 33 CFR 104.140 for vessels, 105.140 for facilities, and
106.135 for OCS facilities.
Sec. 101.665 Noncompliance, Waivers, and Equivalents.
An owner or operator who is unable to meet the requirements in
subpart F may seek a waiver or an equivalence determination using the
provisions applicable to a vessel, facility, or OCS facility as
outlined in 33 CFR 104.130, 104.135, 105.130, 105.135, 106.125, or
106.130. If an owner or operator is temporarily unable to meet the
requirements in this part, they must notify the cognizant COTP or MSC,
and may request temporary permission to continue to operate under the
provisions as outlined in 33 CFR 104.125, 105.125, or 106.120.
[[Page 13514]]
Sec. 101.670 Severability.
Any provision of this subpart held to be invalid or unenforceable
as applied to any person or circumstance shall be construed so as to
continue to give the maximum effect to the provision permitted by law,
including as applied to persons not similarly situated or to dissimilar
circumstances, unless such holding is that the provision of this
subpart is invalid and unenforceable in all circumstances, in which
event the provision shall be severable from the remainder of this
subpart and shall not affect the remainder thereof.
Linda Fagan,
Admiral, U.S. Coast Guard, Commandant.
[FR Doc. 2024-03075 Filed 2-21-24; 8:45 am]
BILLING CODE 9110-04-P