Sector
Maritime operator with cargo and support vessels.
Improving cyber resilience for vessel OT networks, SATCOM links, and shore-side operations.
A maritime operator with a mixed fleet of vessels needed to understand and improve the cyber security of its vessel OT networks, satellite communication systems, and shore-side infrastructure. Regulatory expectations and internal risk assessments highlighted gaps in segmentation, monitoring, and incident preparedness.
Cyber Defence provided an assessment and uplift programme focused on OT/IT segmentation, secure remote access, monitoring, and deception.
Context
Maritime operator with cargo and support vessels.
ECDIS, engine management, vessel networks, SATCOM, crew networks, and shore-side IT.
Reduce risk of OT disruption, improve visibility, and align with maritime cyber guidance.
1. Vessel network assessment and mapping of OT, crew, guest, and management segments.
2. Review of remote access, SATCOM exposure, and management plane controls.
3. Deployment of deception devices into vessel and shore-side segments for early detection of unauthorised activity.
4. Integration of logs and telemetry into SOC365 for 24/7 monitoring.
5. Engineering work to improve segmentation, access controls, and endpoint configurations.
Outcomes
Clear separation between OT, crew, and guest networks, reducing lateral movement opportunities.
SOC365 now monitors key vessel and shore-side events, including attempted access to OT services.
Deception devices on vessels provide early warning of unauthorised scanning and credential misuse.
The operator is better positioned for maritime cyber audits and compliance requirements.
Playbooks were created for vessel cyber incidents, including escalation paths and containment strategies.
Changes to network design and access controls are now part of ongoing fleet operations.