ISPS Code in 2026: Why Compliance Alone Won't Protect Your Port
The ISPS Code (International Ship and Port Facility Security Code) is the global framework for maritime security, mandated by the IMO under SOLAS Chapter XI-2 following the September 11, 2001 attacks. It requires port facilities and ships to conduct security assessments, develop security plans, designate security officers, and implement measures across three security levels. In 2026, ISPS compliance is the baseline for port security worldwide — but the threat environment has evolved so far beyond what the Code was designed to address that compliance alone provides a dangerously false sense of security.
The ISPS Code was written in 2002 and entered into force in 2004. It was designed to address the post-9/11 threat of terrorism against maritime assets. It did not envision drone swarm attacks, maritime cyber warfare, AIS spoofing at scale, or the kind of sustained military-grade threats that ports in the Red Sea, Black Sea, and Gulf regions face today.
What Does the ISPS Code Require?
The ISPS Code establishes requirements in several areas:
Port Facility Security Assessment (PFSA). Each port facility must conduct a security assessment identifying assets, threats, vulnerabilities, and countermeasures. The assessment must be reviewed and updated regularly.
Port Facility Security Plan (PFSP). Based on the assessment, each facility develops a security plan detailing measures for each of the three security levels, access control procedures, monitoring and surveillance systems, security training, and incident response procedures.
Port Facility Security Officer (PFSO). Each facility designates a security officer responsible for implementing the security plan, conducting drills, and coordinating with ship security officers and government authorities.
Three Security Levels. Security Level 1 (normal), Level 2 (heightened), and Level 3 (exceptional/probable imminent threat) define escalating security measures. Most ports operate at Level 1 most of the time.
Ship-Port Interface. The Code governs the security coordination between ships and ports during port calls, including the Declaration of Security (DoS) process.
Why Is ISPS Compliance Insufficient in 2026?
Several fundamental gaps exist between what the ISPS Code requires and what modern threats demand:
The Code Is Technology-Agnostic
The ISPS Code does not prescribe specific technologies. It requires "monitoring and surveillance" but does not specify what that means in an era of dark vessels, drone threats, and cyber attacks. A port can be ISPS-compliant with basic CCTV and manual access logs — measures that are inadequate against any sophisticated threat.
Drone and UAS Threats Are Not Addressed
The Code was written before the weaponization of commercial and military drones. There is no requirement for counter-UAS detection or response capability. A facility can be fully ISPS-compliant while having zero ability to detect or respond to an incoming drone attack.
Cybersecurity Is Peripheral
While the IMO has subsequently issued guidelines on maritime cyber risk management (MSC-FAL.1/Circ.3), these are not integrated into the ISPS Code framework. Cybersecurity assessments and plans are recommended but not mandated under ISPS. A port can be ISPS-compliant while having critical operational technology vulnerable to state-sponsored cyber attack.
The Threat Model Has Changed
The ISPS Code's threat model centers on physical unauthorized access — terrorists boarding a vessel or entering a port facility. The 2026 threat environment includes standoff attacks (missiles, drones), remote cyber attacks, waterside asymmetric threats, and supply chain manipulation that the Code's access-control-centric approach does not address.
Security Levels Are Reactive
The three-level system is inherently reactive — security measures increase after a threat is identified or an incident occurs. Modern security requires proactive, intelligence-driven approaches that detect and characterize threats before they manifest. AI-driven monitoring, behavioral analysis, and predictive risk scoring operate continuously regardless of the designated security level.
What Should Port Operators Do Beyond ISPS?
Compliance with the ISPS Code should be treated as the floor, not the ceiling, of port security. Operators should invest in:
AI-driven surveillance and monitoring. Systems that integrate multiple sensor types (radar, cameras, AIS, satellite data) and use machine learning to detect anomalies, classify threats, and provide early warning. These systems operate continuously and independently of the declared security level.
Counter-drone capability. Detection, tracking, and — where rules of engagement permit — neutralization of unmanned aerial and surface threats. This requires dedicated sensors and potentially electronic warfare capabilities that go well beyond ISPS requirements.
Cybersecurity operations. Dedicated monitoring of both IT and operational technology networks, with incident response plans that specifically address terminal operating system and equipment control compromises.
Intelligence integration. Access to maritime threat intelligence from sources including UKMTO, NATO Shipping Centre, national maritime security agencies, and commercial intelligence providers. This enables proactive security adjustments based on the evolving threat picture rather than reactive responses to incidents.
Enhanced vessel screening. Going beyond the ISPS Declaration of Security to include comprehensive pre-arrival risk assessment incorporating vessel history, beneficial ownership, sanctions status, AIS behavioral analysis, and crew documentation verification.
Regular red-team assessments. Testing security measures against realistic attack scenarios — including drone approaches, waterside intrusions, cyber attacks, and insider threats — to identify and remediate vulnerabilities before adversaries exploit them.
Key Takeaways
- The ISPS Code, written in 2002, provides a necessary but insufficient security baseline for the 2026 threat environment.
- Critical gaps include drone and UAS threats, cybersecurity, waterside asymmetric threats, and intelligence-driven proactive security.
- ISPS compliance with basic CCTV and manual access control provides a false sense of security against modern threats.
- Port operators should invest in AI-driven surveillance, counter-drone capability, cybersecurity operations, intelligence integration, and enhanced vessel screening beyond ISPS requirements.
- The most effective ports treat ISPS as the compliance floor and build security capabilities driven by actual threat assessment rather than regulatory minimums.