Posts

>>Featured Posts

[IACS UR E27 - TA/SoC] Supplier Certification Strategy - A Balanced Analysis of the Structural Rationale for Type Approval over SoC

💡 Insight IACS UR E27 Type Approval Strategy Supplier Certification Is SoC-Centric Approach Sufficient? A Strategic Review of UR E27 Compliance Statement of Compliance vs. Type Approval — Short-Term Fix or Long-Term Positioning? ⚓ Lew Maritime and Cyber Security Consultant / ISP Consultant 📅 March 1, 2026 Since the implementation of IACS UR E27 , many equipment suppliers have chosen to demonstrate compliance through a Statement of Compliance (SoC) — or in the case of various society classes, a Statement of Fact (SoF). While pragmatic, one fundamental question remains: Is an SoC-centered strategy optimal from a long-term perspective? UR E27 is not merely a project-level requirement — it is a framework that affects product repeatability, lifecycle management, and market credibility. ...

[BOOK] Industrial Control System Security(4/8) - Fundamental Understanding from an IACS UR E26 and E27 Certification Perspective

Image
📚 Book Review IACS UR E26 / E27 Threat Modeling Maritime OT [BOOK] Industrial Control System Security (3/3) Chapter 4: Threat Modeling Fundamentals — Attack Chain Structure & EWS Pivot Analysis ⚓ Lew Maritime and Cyber Security Consultant / ISP Consultant 📅 March 20, 2026 Book Information Industrial Control System Security Author: Pascal Ackerman · Published: 2019 · Korean Edition: Acon Principal Industrial Cybersecurity Consultant @ Rockwell Automation (since 2015) · 15+ years in large-scale industrial systems & network security The first three chapters built the defensive structure — OT characteristics, network architecture, and host security. Chapter 4 asks the next essential question: "How does an attacker actually pene...

[BOOK] Industrial Control System Security(3/8) - Fundamental Understanding from an IACS UR E26 and E27 Certification Perspective

Image
📚 Book Review IACS UR E26 / E27 ICS / OT Security Maritime OT [BOOK] Industrial Control System Security (3/8) Chapter 3 Deep Dive: Host Security Fundamentals from an IACS UR E26 / E27 Perspective ⚓ Lew Maritime and Cyber Security Consultant / ISP Consultant 📅 March 15, 2026 Book Information Industrial Control System Security Author: Pascal Ackerman · Published: 2019 · Korean Edition: Acon Principal Industrial Cybersecurity Consultant @ Rockwell Automation (since 2015) · 15+ years in large-scale industrial systems & network security Once the boundaries are defined (Chapter 2 — Network Architecture), the question becomes: "How do we protect the assets inside those boundaries?" Even with perfect network segmentation, internal compromise ...

Provided by ShipJobs (w/ AI )