{"id":6527,"date":"2018-12-06T08:00:30","date_gmt":"2018-12-06T08:00:30","guid":{"rendered":"http:\/\/aqualisoffshore.com\/?p=6527"},"modified":"2022-01-24T08:31:44","modified_gmt":"2022-01-24T08:31:44","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/","title":{"rendered":"How to Survive a Rig Inspection: Part 7"},"content":{"rendered":"\n<p>In this series, our head of&nbsp;<a href=\"http:\/\/aqualisbraemar.com\/services\/rig-inspection-services\/\">Rig Inspection Services<\/a>&nbsp;Steven Lee shares tips on how operators and owners can get through rig inspections with flying colours \u2013 and which pitfalls to avoid! Mr Lee has more than a hundred rig inspections under his belt, from all parts of the world. This chapter looks at cybersecurity issues.<\/p>\n\n\n\n<h2 class=\"news-footer wp-block-heading\">Part 7: Cybersecurity<\/h2>\n\n\n\n<p>When considering cybersecurity on drilling units, there are a few key areas that any good inspector will focus on to gain an understanding of the robustness of the systems on board. This can include the actual IT and OT systems, or even management systems such as Policies &amp; Procedures and how they are followed. Ultimately, the personnel on board a unit are the first line of defence for cybersecurity threats and their awareness of cybersecurity can make a big impact on the underlying strength of the cyber defences.<\/p>\n\n\n\n<p>It is common for drilling control chairs to have ports to connect peripherals for troubleshooting purposes. On a newly delivered jack-up rig, which had numerous teething issues with its drilling control system, further investigations discovered that music files had been copied onto one of the drilling control system client computers. It was suspected that this was due to someone charging their phone on one of the USB sockets fitted to the drilling control chair. <br><\/p>\n\n\n\n<p>In that instance, it was harmless enough, although it could have introduced some lag to the system. However, what if the phone had been infected with malware or, worse still, been deliberately programmed to infiltrate the system? In order to comply with IADC guidelines that a policy should be developed and enforced to restrict the use of removable media, best practices have included physical blocking or disconnection of such ports to prevent unauthorised access.<\/p>\n\n\n\n<p>Another threat area is the management of remote diagnostic systems. A well-known example in the industry is that of an OEM technician who was connected to a BOP MUX control system on a rig in order to perform troubleshooting, which activated a function on the system. Unfortunately, the technician was connected to the wrong rig and therefore activated a function on the wrong rig. The consequences of this could have been catastrophic if it was a riser connector unlock function or a shear ram close command whilst the BOP was on the wellhead. This highlights the need to follow best practice and control remote access to systems effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When considering cybersecurity on drilling units, there are a few key areas that any good inspector will focus on to gain an understanding of the robustness of the systems on board. <\/p>\n","protected":false},"author":2,"featured_media":6528,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[6,846],"tags":[90,79,35],"sector":[],"service":[],"company":[],"class_list":["post-6527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-rig-inspection","tag-cybersecurity","tag-how-to-survive-a-rig-inspection","tag-rig-inspection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity \u2013 How to Survive a Rig Inspection: Part 7<\/title>\n<meta name=\"description\" content=\"Considering cybersecurity on drilling units there are key areas that a good inspector will focus on to gain understanding of the onboard systems&#039; robustness\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Survive a Rig Inspection: Part 7\" \/>\n<meta property=\"og:description\" content=\"Considering cybersecurity on drilling units there are key areas that a good inspector will focus on to gain understanding of the onboard systems&#039; robustness\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ABL\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-06T08:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-24T08:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2018\/12\/AdobeStock_175860657.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"George Lenox\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"George Lenox\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/\"},\"author\":{\"name\":\"George Lenox\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#\\\/schema\\\/person\\\/1a54a8404066452ce3b217824eadc7f5\"},\"headline\":\"How to Survive a Rig Inspection: Part 7\",\"datePublished\":\"2018-12-06T08:00:30+00:00\",\"dateModified\":\"2022-01-24T08:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/\"},\"wordCount\":410,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/AdobeStock_175860657.jpg\",\"keywords\":[\"cybersecurity\",\"How to survive a rig inspection\",\"rig inspection\"],\"articleSection\":[\"Blog\",\"Rig Inspection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity \u2013 How to Survive a Rig Inspection: Part 7\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/AdobeStock_175860657.jpg\",\"datePublished\":\"2018-12-06T08:00:30+00:00\",\"dateModified\":\"2022-01-24T08:31:44+00:00\",\"description\":\"Considering cybersecurity on drilling units there are key areas that a good inspector will focus on to gain understanding of the onboard systems' robustness\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/AdobeStock_175860657.jpg\",\"contentUrl\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/AdobeStock_175860657.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/all-media\\\/blog\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Survive a Rig Inspection: Part 7\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#website\",\"url\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/\",\"name\":\"ABL\",\"description\":\"The Energy and Marine Consultants\",\"publisher\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#organization\",\"name\":\"ABL-Group\",\"url\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/ABL-v2-logo.png\",\"contentUrl\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/ABL-v2-logo.png\",\"width\":481,\"height\":214,\"caption\":\"ABL-Group\"},\"image\":{\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abl-group.com\\\/abl\\\/#\\\/schema\\\/person\\\/1a54a8404066452ce3b217824eadc7f5\",\"name\":\"George Lenox\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b7446374cbf3f86062dfe48e7ab6fb0ba56096e09d6e5daab9dfedbb99defb0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b7446374cbf3f86062dfe48e7ab6fb0ba56096e09d6e5daab9dfedbb99defb0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b7446374cbf3f86062dfe48e7ab6fb0ba56096e09d6e5daab9dfedbb99defb0?s=96&d=mm&r=g\",\"caption\":\"George Lenox\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity \u2013 How to Survive a Rig Inspection: Part 7","description":"Considering cybersecurity on drilling units there are key areas that a good inspector will focus on to gain understanding of the onboard systems' robustness","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"How to Survive a Rig Inspection: Part 7","og_description":"Considering cybersecurity on drilling units there are key areas that a good inspector will focus on to gain understanding of the onboard systems' robustness","og_url":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/","og_site_name":"ABL","article_published_time":"2018-12-06T08:00:30+00:00","article_modified_time":"2022-01-24T08:31:44+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2018\/12\/AdobeStock_175860657.jpg","type":"image\/jpeg"}],"author":"George Lenox","twitter_card":"summary_large_image","twitter_misc":{"Written by":"George Lenox","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/#article","isPartOf":{"@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/"},"author":{"name":"George Lenox","@id":"https:\/\/abl-group.com\/abl\/#\/schema\/person\/1a54a8404066452ce3b217824eadc7f5"},"headline":"How to Survive a Rig Inspection: Part 7","datePublished":"2018-12-06T08:00:30+00:00","dateModified":"2022-01-24T08:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/"},"wordCount":410,"commentCount":0,"publisher":{"@id":"https:\/\/abl-group.com\/abl\/#organization"},"image":{"@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2018\/12\/AdobeStock_175860657.jpg","keywords":["cybersecurity","How to survive a rig inspection","rig inspection"],"articleSection":["Blog","Rig Inspection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/","url":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/","name":"Cybersecurity \u2013 How to Survive a Rig Inspection: Part 7","isPartOf":{"@id":"https:\/\/abl-group.com\/abl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2018\/12\/AdobeStock_175860657.jpg","datePublished":"2018-12-06T08:00:30+00:00","dateModified":"2022-01-24T08:31:44+00:00","description":"Considering cybersecurity on drilling units there are key areas that a good inspector will focus on to gain understanding of the onboard systems' robustness","breadcrumb":{"@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/#primaryimage","url":"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2018\/12\/AdobeStock_175860657.jpg","contentUrl":"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2018\/12\/AdobeStock_175860657.jpg","width":1000,"height":667,"caption":"Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/abl-group.com\/abl\/all-media\/blog\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/abl-group.com\/abl\/"},{"@type":"ListItem","position":2,"name":"How to Survive a Rig Inspection: Part 7"}]},{"@type":"WebSite","@id":"https:\/\/abl-group.com\/abl\/#website","url":"https:\/\/abl-group.com\/abl\/","name":"ABL","description":"The Energy and Marine Consultants","publisher":{"@id":"https:\/\/abl-group.com\/abl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abl-group.com\/abl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/abl-group.com\/abl\/#organization","name":"ABL-Group","url":"https:\/\/abl-group.com\/abl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/abl-group.com\/abl\/#\/schema\/logo\/image\/","url":"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2023\/06\/ABL-v2-logo.png","contentUrl":"https:\/\/abl-group.com\/abl\/wp-content\/uploads\/2023\/06\/ABL-v2-logo.png","width":481,"height":214,"caption":"ABL-Group"},"image":{"@id":"https:\/\/abl-group.com\/abl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/abl-group.com\/abl\/#\/schema\/person\/1a54a8404066452ce3b217824eadc7f5","name":"George Lenox","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9b7446374cbf3f86062dfe48e7ab6fb0ba56096e09d6e5daab9dfedbb99defb0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9b7446374cbf3f86062dfe48e7ab6fb0ba56096e09d6e5daab9dfedbb99defb0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9b7446374cbf3f86062dfe48e7ab6fb0ba56096e09d6e5daab9dfedbb99defb0?s=96&d=mm&r=g","caption":"George Lenox"}}]}},"_links":{"self":[{"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/posts\/6527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/comments?post=6527"}],"version-history":[{"count":1,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/posts\/6527\/revisions"}],"predecessor-version":[{"id":24613,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/posts\/6527\/revisions\/24613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/media\/6528"}],"wp:attachment":[{"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/media?parent=6527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/categories?post=6527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/tags?post=6527"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/sector?post=6527"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/service?post=6527"},{"taxonomy":"company","embeddable":true,"href":"https:\/\/abl-group.com\/abl\/wp-json\/wp\/v2\/company?post=6527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}