Posts

>>Featured Posts

[IACS UR E27 - TA/SoC] IACS UR E27 Explained: Maritime Cybersecurity Compliance Guide - A Balanced Analysis of the Structural Rationale for Type Approval over SoC

💡 Insight IACS UR E27 Type Approval Strategy Supplier Certification Is SoC-Centric Approach Sufficient? A Strategic Review of UR E27 Compliance Statement of Compliance vs. Type Approval — Short-Term Fix or Long-Term Positioning? ⚓ Lew Maritime and Cyber Security Consultant / ISP Consultant 📅 March 1, 2026 Since the implementation of IACS UR E27 , many equipment suppliers have chosen to demonstrate compliance through a Statement of Compliance (SoC) — or in the case of various society classes, a Statement of Fact (SoF). While pragmatic, one fundamental question remains: Is an SoC-centered strategy optimal from a long-term perspective? UR E27 is not merely a project-level requirement — it is a framework that affects product repeatability, lifecycle management, and market credibility. ...

Efficient Way to Classify System Types in IACS UR E26/E27

Image
As a Cyber Resilience System Integrator (CRSI), I work in close collaboration with shipowners and shipyards to ensure that newly built vessels comply with both IACS UR E26 requirements and the shipowners’ cybersecurity policies throughout the newbuilding process. In this article, I aim to share the practical challenges I have repeatedly encountered while performing the role of a CRSI during the actual design and construction phases, as well as the hands-on insights I have gained and distilled through that process. I hope that this content can serve as a small but useful reference for professionals who are preparing to address IACS UR E26/E27 requirements. Who Should Read This Are responsible for implementing cybersecurity on ships Are uncertain whether IACS UR E26 or UR E27 applies to their vessels or projects Are directly involved in ensuring compliance with UR E26 and UR E27 Are more familiar with UR E27 but less experienced with UR E26, or the other way around TL;DR 1. ...

[BOOK] Industrial Control System Security(5/8) - Fundamental Understanding from an IACS UR E26 and E27 Certification Perspective

Image
📚 Book Review IACS UR E26 Logging & SIEM OT Detection [BOOK] Industrial Control System Security  (5/8) Host Security — Explaining Visibility Required After Preventive Controls ⚓ Lew Maritime and Cyber Security Consultant / ISP Consultant 📅 April 4, 2026 Book Information Industrial Control System Security Author:  Pascal Ackerman  · Published: 2019 · Korean Edition: Acon Principal Industrial Cybersecurity Consultant @ Rockwell Automation (since 2015) · 15+ years in large-scale industrial systems & network security Chapters 1 through 4 established a strong foundation in preventive controls — segmentation, hardening, authentication, and threat modeling. Chapter 5 completes this framework by addressing what happens after prevention: how do we detect intrusions through Logging, Auditing, ...

Provided by ShipJobs (w/ AI )