Posts

Showing posts with the label Classification

[CRSI] Insight - Efficient Way to Classify System Types in IACS UR E26/E27

Image
🛡️ Cybersecurity IACS UR E26 Newbuilding CRSI Navigating IACS UR E26 in Practice: A CRSI's Field Insights on System Classification Document Requirements, CBS Classification Challenges, and the Phased Risk Assessment Approach Yeon (지연오) Maritime / Cybersecurity Consultant · Engineer Maritime Cybersecurity · Cloud Security · Zero Trust · Kubernetes · DevSecOps · CWPE LinkedIn  ·  GitHub  ·  Collaborator: Ethan, Lew, Julius, Jin, Morgan 6 April 2026 As a Cyber Resilience System Integrator (CRSI), I work in close collaboration with shipowners and shipyards to ensure that newly built vessels comply with both IACS UR E26 requirements and the shipowners' cy...

[IACS UR E26/27] Redefining System Suppliers’ IACS UR E26/27 Interpretation Trends in Alignment with Cyber Resilience Principles

Image
IACS UR E26 / E27 Cyber Resilience Maritime OT Security Redefining System Suppliers' IACS UR E26/E27 Interpretation Trends in Alignment with Cyber Resilience Principles ⚓ Captain Ethan Maritime 4.0 · AI, Data & Cyber Security 📅 February 10, 2026 Recently, during the application of IACS UR E26 and E27 , ongoing cases are being observed in which certain system suppliers are refusing to submit required information , despite their systems clearly falling under CBS (Computer-Based Systems) and the existence of explicit classification society guidelines. The information in question includes key inputs such as asset inventory , system configuration diagrams , communication interface information , as well as the foundational cybersecurity domains of Identify and Detect . A Transitional Phenom...

Key Requirements and Checklist for Ship Cybersecurity Certification

Image
Strengthened Cybersecurity Requirements of IMO and IACS: Key Checklist for Classification Society Cybersecurity Certification As IMO and IACS reinforce cybersecurity requirements, specific criteria must be met to obtain cybersecurity certification from classification societies. In this post, we will summarize the key checklist for acquiring classification society cybersecurity certification. ✅ Key Requirements and Checklist for Classification Society Cybersecurity Certification Category Checklist Items Description Applicable to 1. Cybersecurity Policy & Management Cybersecurity and Resilience Program Establishing a protection and response framework for ship IT/OT systems Owner Management of Change (MoC) Security assessment and approval procedures when modifying ship IT/OT systems Owner Cyber Risk Assessment Conducting risk assessments in compliance with IACS UR E26/E27 Shipyard 2. Network Security Design Zones and Conduit Diagram Defining network segmentation and data flow Shipyard...

🚢 Maritime Alarm Systems and Cybersecurity – Lessons from Real Incidents

Image
 🔍 Introduction: Security Threats at Sea Modern ships operate with thousands of sensors and automated systems. These systems rely on alarms to alert crew members about potential hazards. But how secure are these alarm systems? The "Alarm Management in the Maritime Industry – Volume 1" report ( Alarm Management in the Maritime Industry ) by Lloyd’s Register highlights significant alarm management challenges in the maritime sector . These challenges are not just operational but also pose serious cybersecurity risks . In this article, we will explore alarm system vulnerabilities from a cybersecurity perspective and discuss how attackers could exploit these weaknesses to disrupt ship operations. 🚨 1. Alarm System Weaknesses – Cybersecurity Risks Hidden in Plain Sight 1️⃣ Alarm Flooding – A DDoS Attack on Ship Operations 🔹 Case: Stena Scandica (2022) Fire & Blackout Incident After a fire in the engine room, the emergency power system failed to operate correctly...

Provided by ShipJobs (w/ AI )