[CRSI] Zones, Boundaries, and Why Zone & Conduit Design Is About Architecture — Not Just Patching

Zones, Boundaries, and Why Zone & Conduit Design Is About Architecture — Not Just Patching

Where is OT security actually applied on a ship? The answer isn't inside a device — it's at every boundary where systems connect.

Author: Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security
Collaborator  : Yeon , Lew, Julius, Jin , Morgan

 

⚙️ OT Security 🛡️ IACS UR E26/E27 🚢 Maritime Cybersecurity

One of the most common misconceptions in shipboard OT security is the belief that security is something applied to a specific piece of equipment or system. In reality, OT security on a ship is not about installing something inside a device — it is far closer to deciding where connections should exist, and where they must be restricted, within the overall structure of a vessel.

To understand OT security properly — and to understand why IACS UR E26 and UR E27 are designed the way they are — we must first answer a fundamental question: Where is OT security actually applied?

Shipboard OT security zone boundary diagram — illustrating how IACS UR E26 and E27 define network segmentation on a vessel

OT security is applied at zone boundaries — not inside individual systems

1. OT Security Is Applied at the "Boundaries," Not Inside the Equipment

Most shipboard OT systems function exactly as intended. Engines run, generators supply power, and control systems operate based on control logic validated over decades. The problem rarely lies within the system itself — it emerges at the points where systems are connected to one another.

This is why OT security is primarily applied at:

The boundaries between different OT zones
The connection points between OT and IT networks
Remote access paths linking ship and shore
External access points used for maintenance and diagnostics

OT security does not aim to change how systems operate inside a zone. It starts by controlling movement between zones — which is why it is often described as "security that operates at the boundary, not inside the system."


2. What Is a Zone?

A zone is not merely a network segmentation label. On a ship, zones are defined by a combination of factors: the function the system performs, its safety impact if it fails, whether external connectivity is required, and whether real-time control is involved.

Based on these criteria, shipboard systems are typically organized into three layers:

⚙️ Control Zone

Engine control, DP, PMS — systems that directly affect ship operation

→ Highest protection level
📊 Monitoring Zone

AMS and integrated monitoring platforms — primarily observational

→ Limited, controlled access
🖥 IT / Info Zone

Crew admin, reporting, office systems — similar to IT environments

→ Must stay separated from OT

The first step in OT security is not mixing these zones, and strictly controlling any connections that are unavoidable.


3. Real Security Risks Arise from Connections

Most OT cybersecurity incidents do not originate inside a zone. They typically occur through:

OT–IT network interconnections
Remote access for maintenance and support
Vendor laptops connected during servicing
Ship–shore data communication links

These connections are often introduced for convenience or operational efficiency. From an OT security perspective, however, each connection becomes a potential entry point for risk. That is why IACS UR E26 and E27 repeatedly ask the same fundamental questions:

Q.Why is this connection necessary?
Q.Does it need to remain open at all times?
Q.Who is authorized to access it?
Q.Are access activities logged and traceable?

OT security becomes real only when these questions can be clearly answered.


4. OT Security Is Not Designed Around Patching

In IT security, the cycle is straightforward: vulnerability → patch → resolution. In shipboard OT environments, this model rarely works.

⚠️ Why Patching Is Difficult
  • Patches require full system re-validation
  • Class approval may be required
  • Operational downtime can occur
  • Manufacturer liability must be considered
✅ What OT Security Does Instead
  • Identifies systems that cannot be patched
  • Defines the zones those systems belong to
  • Restricts and controls external connections

Rather than eliminating vulnerabilities, OT security prevents those vulnerabilities from being exploited through structural controls. This is why operating with unpatched systems is not negligence — it is a reality the entire framework is designed around.


5. UR E26 and UR E27 Define Different Scopes of Application

A critical aspect of OT security implementation under IACS is the separation of roles between UR E26 and UR E27.

UR E26 →
Looks at the ship as a whole. It explains the OT architecture, zone structure, network segregation, and how overall cyber risk is managed at the vessel level.
UR E27 →
Looks at individual equipment. It describes which zone a system belongs to, what interfaces it exposes, and what security capabilities or limitations exist at the equipment level.
⚠️ A Common Project Risk

Many projects accumulate E27 documents without a coherent E26-level explanation. In such cases, OT security may exist "on paper," but the overall architecture remains poorly understood — and poorly defended.


6. OT Security Is About Design, Not Installation

By this point, the nature of OT security becomes clear. It is:

Not about installing a specific solution
Not about a single piece of equipment
Not solely the responsibility of an IT department

OT security must be designed as part of the ship's architecture from the beginning. It starts by answering three fundamental questions:

What should be separated?
What must be connected?
Who can approve those connections?

In Summary

Shipboard OT security is applied:

At the boundaries of shipboard systems
By controlling connections rather than modifying internals
Without assuming frequent patching is possible
Through structural and architectural design
Why E26 and E27 Matter

IACS UR E26 and UR E27 are not merely cybersecurity requirements.
They are regulations that require ship operators and builders to explain and justify the structure of ship operations themselves — where connections exist, why they exist, and who controls them.


Key Takeaways

⚙️ OT Security Focus

Applied at zone boundaries and connection points — not inside individual systems or devices

🗂 E26 vs E27

E26 = ship-level architecture; E27 = individual equipment — both are required, neither replaces the other

🔌 Connection Risk

Most OT incidents originate at connection points — remote access, OT-IT links, vendor access, ship-shore comms

⚠️ Design Principle

OT security must be built into the ship's architecture from the start — retrofitting after delivery is far more costly and complex

#OTSecurity #IACSE26 #IACSE27 #MaritimeCybersecurity #NetworkZoning #ShipboardOT #CyberResilience #MaritimeSafety #Maritime40
Captain Ethan
Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security

Maritime professional focused on the intersection of vessel operations, classification society regulations, and OT/IT cybersecurity. Writing for engineers, consultants, and operators navigating Maritime 4.0 together.

🌐 More Articles ↗

Comments

Provided by ShipJobs (w/ AI )