* [Blog](https://www2.paloaltonetworks.com/blog) * [Network Security](https://www2.paloaltonetworks.com/blog/network-security/) * [IoT Security](https://www2.paloaltonetworks.com/blog/network-security/category/iot-security/) * From Ports to Protocols: ... # From Ports to Protocols: Securing Maritime with Palo Alto Networks [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fnetsec-maritime-ot-security%2F) [](https://twitter.com/share?text=From+Ports+to+Protocols%3A+Securing+Maritime+with+Palo+Alto+Networks&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fnetsec-maritime-ot-security%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fnetsec-maritime-ot-security%2F&title=From+Ports+to+Protocols%3A+Securing+Maritime+with+Palo+Alto+Networks&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/network-security/netsec-maritime-ot-security/&ts=markdown) \[\](mailto:?subject=From Ports to Protocols: Securing Maritime with Palo Alto Networks) Link copied By [Navneet Singh](https://www.paloaltonetworks.com/blog/author/navneet-singh/?ts=markdown "Posts by Navneet Singh") Feb 29, 2024 6 minutes [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [Maritime security](https://www.paloaltonetworks.com/blog/tag/maritime-security/?ts=markdown) [OT security](https://www.paloaltonetworks.com/blog/tag/ot-security/?ts=markdown) The Marine Transportation System (MTS) is a pillar of U.S. trade and the broader economy. Its system of ports, terminals, vessels, waterways and land-side connections underpin $5.4 trillion of economic activity in the United States annually. In response to increasing cyber threats targeting MTS, the Biden-Harris administration announced [an initiative](https://www.whitehouse.gov/briefing-room/statements-releases/2024/02/21/fact-sheet-biden-harris-administration-announces-initiative-to-bolster-cybersecurity-of-u-s-ports/)to bolster the cybersecurity of U.S. Ports, including a $20 billion investment. Stakeholders ranging from port operators to shipping companies are on the front lines of these changes. This blog examines the elements of the new initiative, what it means for MTS professionals and steps they can take to secure their infrastructure. **Understanding the MTS Threat Landscape**The digital world's interconnectedness has brought unparalleled efficiency to the maritime shipping industry and American supply chains. However, this connectivity also opens the door to significant digital exploitation in ports, with potential risks ranging from cyber espionage to cyber attacks on liquid gas facilities and others in ports to disruptive ransomware attacks. The Port of Nagoya ransomware attack in Japan illustrates cybersecurity risks at ports and the potential consequences of a cyber attack. According to its website, the port is the largest in Japan for cargo throughput and the main port for automobile exports. In July 2023, the cybersecurity attack halted container loading and unloading at the port for two days. Such cyber-attacks threaten the security of sensitive information, as well as jeopardize the safety and continuity of economic activities and critical port operations. The Administration's initiative recognizes the essential role of cybersecurity in safeguarding MTS and defending U.S. ports and vessels from these evolving threats. ![A brightly colored green and blue tugboat advancing on water with a city skyline in the background under a cloudy sky.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/02/Strata-executive-order-marketo-lp-banner-thumbnail-300x400-photo-only.png) **The Implications for MTS Cybersecurity**The stated goals of the newly issued executive order and broader initiative are to protect critical infrastructure, supply chains and the economic engine they support. The U.S. Coast Guard, under the Department of Homeland Security (DHS), is tasked with overseeing additional protective measures. Key actions focus on: * Ship-to-shore cranes, particularly those originating from the People's Republic of China. * The establishment of mandatory cyber incident reporting requirements for any incidents or threats that could endanger any vessel, harbor, port or waterfront facility. * The U.S. Coast Guard's proposed rulemaking regarding cybersecurity standards within the maritime domain. As part of the President's "Investing in America agenda," the Administration will also make a $20 billion investment into U.S. port infrastructure over the next five years. A key part of this program is directed at returning crane manufacturing to the U.S. for the first time in 30 years. One immediate example of action is PACECO Corp's plan to onshore U.S. manufacturing of cranes and partner with trusted companies, underscoring the Administration's intention to drive results from their initiative. **Improving the Cybersecurity of Ship-to-Shore Cranes** Specific attention in the initiative is given to the cybersecurity risks associated with ship-to-shore cranes, especially noting concerns with those manufactured by the People's Republic of China. Released at the same time, a parallel [Maritime Security Directive](https://www.maritime.dot.gov/msci/2024-002-worldwide-foreign-adversarial-technological-physical-and-cyber-influence) from the U.S. Coast Guard focuses on owners and operators of these cranes as well as vessel owners/operators, shippers and port operators exposed to risks. This directive requires stakeholder acknowledgment, identifies opportunities to enhance the management of control systems and network operations and provides guidance to strengthen security measures, such as: * Applying best practices for access control (identity and access management). * Utilizing mitigation measures to reduce the risks associated with automated port cranes. * Validating the integrity and security of on-board crane devices and networks. * Creating comprehensive response and recovery programs for on-board crane systems and devices. * Maintaining strict physical and digital security and access control for all devices and infrastructure used to operate and manage the crane. **New Cybersecurity Standards and Reporting Requirements for MTS** To strengthen the framework for maritime cybersecurity further, the U.S. Coast Guard has initiated a [Notice of Proposed Rulemaking](https://www.federalregister.gov/documents/2024/02/22/2024-03075/cybersecurity-in-the-marine-transportation-system) (NPRM) focused on cybersecurity in MTS. The NPRM is concerned explicitly with daily unauthorized attempts by individuals, groups and adversary nations to access control systems or networks in O.T. infrastructure across the maritime industry's connected systems. Such attempts create transport security incidents (TSIs), which the new standards and reporting requirements focus on mitigating through a combination of attack detection, response and recovery requirements. This proposed rule introduces specific and minimum cybersecurity measures, through required Cybersecurity Plans for IT and OT systems drawing upon international and industry standards. The proposed requirements include: * Account security measures * Device security measures * Data security measures * Governance and training * Risk management * Supply chain management * Resilience * Network segmentation * Reporting * Physical security These measures have the potential to significantly improve the management of control systems and network operations within the MTS, promoting continuous monitoring and the rigorous control of equipment and communication pathways. Palo Alto Networks works with MTS customers and helps organizations enhance their cyber resilience now. For example, [Damen Docks](https://www.paloaltonetworks.com/customers/damen-docks-with-palo-alto-networks-to-add-trusted-confident-cybersecurity), a builder and supporter of ships in The Netherlands, needed a cybersecurity strategy across 35 shipyards to safeguard 7,000 endpoints. Working with ON2IT, a leading cybersecurity service provider, Palo Alto Networks has helped Damen Docks create a simplified Zero Trust architecture. **Palo Alto Networks Can Help MTS Organizations Now**Together, the Executive Order, Maritime Security Directive and NPRM are significant steps that the Administration is taking toward safeguarding America's economic and national security through enhanced maritime cybersecurity. For anyone engaging with a port, as well as stakeholders in ports and shipping companies, understanding and adapting to these changes is crucial. The long-term impacts on MTS security, U.S. Trade infrastructure and the broader economic well-being are significant. Palo Alto Networks is committed to helping MTS owners and operators improve cybersecurity and align with this new initiative. Our[Zero Trust OT Security](https://www.paloaltonetworks.com/network-security/zero-trust-ot-security) helps organizations impacted by the new initiative take proactive steps to enhance cyber resilience, including: * **Asset Inventory:** Develop a comprehensive inventory of all your equipment, documenting its origin and any third-party associations. * **Continuous Monitoring:** Keep a close eye on systems and networks, especially outbound traffic, for any signs of unusual activity. * **Logging Enablement:** Implement logging across various points of your infrastructure to capture essential data for analysis and incident response. * **Inbound Path Analysis:** Scrutinize all inbound paths to your port equipment, ensuring that each inbound communication is individually authorized and monitored. Our experts will work closely with you to assess your current security posture and provide actionable recommendations aligned with the amended federal regulations. [Learn more](https://start.paloaltonetworks.com/get-help-for-maritime-cybersecurity-advisory-warning.html) about how we can help you strengthen your maritime security operations. *** ** * ** *** ## Related Blogs ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Risk-based vulnerability prioritization for IoT, OT and MIoT devices](https://www2.paloaltonetworks.com/blog/network-security/risk-based-vulnerability-prioritization/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Industrial OT Security](https://www.paloaltonetworks.com/blog/network-security/category/industrial-ot-security/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Forrester Names Palo Alto Networks a Leader in OT Security](https://www2.paloaltonetworks.com/blog/2024/06/forrester-names-leader-in-ot-security/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Manufacturers key target for CIRCIA cyber incident reporting rule](https://www2.paloaltonetworks.com/blog/network-security/circia-rule-critical-infrastructure/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Industrial OT Security](https://www.paloaltonetworks.com/blog/network-security/category/industrial-ot-security/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Untangling IT-OT Security Knots with a Zero Trust Platform Approach](https://www2.paloaltonetworks.com/blog/2024/05/untangling-it-ot-security-knots/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### Palo Alto Networks Surveys the State of OT Security](https://www2.paloaltonetworks.com/blog/network-security/state-of-ot-security-2024/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### ICS '23: Building cyber resilience through IT-OT security convergence](https://www2.paloaltonetworks.com/blog/network-security/netsec-ot-security-ics-23/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language