Your vessel already has
a cyber security obligation.
You don’t need to be building a new ship to need maritime OT security. Every vessel operating under the ISM Code has been legally required to address cyber risk since January 2021 — most fleets haven’t fully acted on it yet.
became mandatory for all ISM ships
to your vessel right now
security lifecycle at sea
The IMO formally requires all companies with vessels under the ISM Code to incorporate cyber risk management into their Safety Management System (SMS) by the first annual DOC verification after 1 January 2021. This is not voluntary guidance — it is a Port State Control (PSC) enforceable requirement under SOLAS. If your SMS does not address cyber risk, your vessel is non-compliant today. Read the full MSC-FAL.1/Circ.3 implementation guide →
Three frameworks that apply to every vessel
IACS UR E26 gets the headlines, but it only applies to vessels with keellaid on or after 1 January 2024. The following three frameworks apply to your existing fleet right now — regardless of age, flag, or class society.
IMO MSC-FAL.1/Circ.3
Requires cyber risk management integrated into every ISM-compliant vessel’s SMS. Applies to all SOLAS vessels. PSC enforceable since January 2021.
All ISM vesselsBIMCO Cyber Security Guidelines v4
The de facto industry standard for fleet cyber security. Referenced by P&I clubs, vetting systems, and charterers. Aligns directly with TAGSIA’s NIST-phase approach.
All vessel typesTMSA 3 / SIRE 2 / CDI
Tanker and bulk carrier operators face cyber security questions in TMSA 3 KPI 13, SIRE 2 inspections, and CDI assessments. Poor scores affect chartering.
Tanker & bulkWhy existing fleet owners delay — and why they shouldn’t
| ❌ The myth | ✓ The reality |
|---|---|
| “We don’t need E26 — our ship is old.” | E26 is for newbuilds only. But IMO MSC-FAL.1/Circ.3 has applied to your vessel since January 2021, regardless of build year. |
| “Cyber security is an IT problem.” | Maritime cyber incidents most commonly target OT systems — ECDIS, PMS, AMS. IT departments don’t understand NMEA 0183 or engine room PLCs. |
| “We’ve never had an incident.” | The Maersk NotPetya incident cost $300M. Most maritime cyber incidents go unreported. Absence of evidence is not evidence of absence. |
| “Our vendor handles our security.” | OEM service access is one of the highest-risk vectors in maritime OT. Supply chain security is your responsibility under E27 §4.5 and BIMCO. |
| “Compliance is too expensive to implement.” | A single ransomware incident on a vessel costs far more than a structured security programme. Most TAGSIA playbooks require process changes, not hardware purchases. |
Where to start — a practical sequence for existing vessels
You don’t need a Class survey to start. The five NIST phases map directly onto the IMO and BIMCO requirements. Work through them in order and you will satisfy your SMS obligation and be ready for PSC inspection.
How TAGSIA maps to your compliance requirements
Every TAGSIA playbook displays the regulatory frameworks it satisfies. For existing vessels, look for the IMO, BIMCO, and ISM Code badges on each page — these are your primary obligations.
Frequently asked questions
Ready to secure your existing fleet?
Start with the free playbooks. Every page is tagged with the frameworks it satisfies — so you always know exactly what obligation you are addressing.
