[CRSI] IACS UR E26 Requirements - Cybersecurity Roles for Shipowners, Shipyards and Suppliers

💡 Insight IACS UR E26 / E27 Cybersecurity Newbuilding

IACS UR E26/E27 Cybersecurity Deliverables: Roles and Responsibilities of Owners, Shipyards, and Suppliers

A Practical Breakdown of 23 Required Deliverables Across the Maritime Stakeholder Value Chain


Captain Ethan
Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security
- LinkedIn : https://www.linkedin.com/in/shipjobs/
Collaborator : Lew, Julius, Jin, Morgan, Yeon

Since the enforcement of IACS UR E26 and UR E27, the maritime industry has faced significant challenges in interpreting and implementing cybersecurity requirements across the shipbuilding value chain. This article provides a structured breakdown of 23 required cybersecurity deliverables — clarifying what shipowners, shipyards, and suppliers are each responsible for, and how these responsibilities interconnect under the IACS framework.

Ⅰ. Why Uncertainty Persists After IACS UR E26/E27

The maritime industry is currently experiencing significant uncertainty due to the implementation of IACS UR E26 and E27. In response, various classification societies have introduced their own guidelines to address these new cybersecurity requirements. However, despite these guidelines outlining the deliverables expected from owners, shipyards, and suppliers, the industry continues to face challenges in interpreting and implementing these requirements in real-world shipbuilding.

The key issues contributing to this confusion include:

  • 1️⃣ Lack of clarity on the practical application of cybersecurity deliverables beyond regulatory frameworks
  • 2️⃣ Varying interpretations across classification societies, leading to inconsistent requirements
  • 3️⃣ Uncertainty regarding the essential deliverables that must be prepared by different stakeholders in the shipbuilding process

To address these concerns, we analyzed the IACS UR framework, referencing NIST-based cybersecurity principles, and conducted interviews with classification societies, shipyards, and suppliers. This research identified and compared the key deliverables required for each entity and their interdependencies.


Ⅱ. 23 Required Cybersecurity Deliverables by Stakeholder

Based on the IACS UR E26/E27 framework and cross-stakeholder interviews, the following table maps each of the 23 cybersecurity deliverables to the responsible party — Owner, Shipyard, or Supplier. A cell entry indicates that the party must produce or provide that deliverable.

No Requirement Owner Shipyard Supplier
1 Owner Policy
Cybersecurity policy and operational guidelines
2 Ship Cybersecurity and Resilience Program
Establishment of cybersecurity and resilience program
3 Management of Change (MoC)
Operational change management plan
Change mgmt plan for equipment
4 Management of Software Updates
Policy for managing software updates in operation
Software update procedures for equipment
5 Management of Firewalls
Network firewall policy and operational guidelines
Security configuration guidelines
6 Management of Malware Protection
Malware detection and response plan in operation
Malware protection function for equipment
7 Management of Access Control
Access control management for shipboard systems
Access control features for equipment
8 Management of Remote Access
Remote access policy and control
Security assessment of remote access for equipment
9 Management of Mobile and Portable Devices
Security policy for portable and removable storage
Secure data transmission for equipment
10 Detection of Security Anomalies
Implementation of security anomaly detection system
Security anomaly detection for equipment
11 Verification of Security Functions
Continuous evaluation and improvement of security functions
Security test results for equipment
12 Incident Response Plans
Incident response plan and procedures
Incident response support information for equipment
13 Recovery Plans
Cyber attack recovery plan
Recovery and reinstallation procedures for equipment
14 Cybersecurity Specification
Specification of cybersecurity requirements
15 Ship Asset Inventory
IT/OT asset inventory for the ship
Asset inventory for CBS
16 Zones and Conduit Diagram
Zoning and data flow diagram of ship network
Network topology diagram for equipment
17 Cybersecurity Design Description (CSDD)
Description of cybersecurity design and policies for the ship
Security capabilities description for equipment
18 Risk Assessment for Exclusion of CBS
Risk assessment for IT/OT system cybersecurity exclusion
Security risk assessment for equipment
19 Description of Compensating Countermeasures
Explanation of compensating cybersecurity measures
Alternative security countermeasures for equipment
20 Ship Cyber Resilience Test Procedure
Cyber resilience test procedure for the ship
Security function test procedures for equipment
21 Plans for Maintenance and Verification
Long-term security maintenance and verification planning
Maintenance and security verification plans for equipment
22 Test Reports
Formal security test documentation
Security test reports for equipment
23 TA (Type Approval) Certification
ClassNK, DNV, ABS, LR type approval documents
TA certification documents for equipment
Legend: ✓ = Primary responsibility  |  Cell text = Specific deliverable form required from that party  |  — = Not applicable

Ⅲ. Summary of Responsibilities for Each Stakeholder

Based on the traditional value chain of the shipbuilding and maritime industry, the following outlines the specific roles of shipowners, shipyards, and suppliers in maritime cybersecurity compliance.

1. Shipowners

As the entity responsible for ship operations, the shipowner must establish cybersecurity policies to ensure compliance with IACS UR E26. Additionally, they must collaborate with shipyards and suppliers to clearly define security requirements and verify cybersecurity measures from an operational perspective after ship delivery.

Key Role Details
Establish Cybersecurity Policies Develop a "Ship Owner Policy" to define cybersecurity standards for the vessel
Approve Requirements Review and approve shipyard-provided designs and functional test procedures
Collaborate with Classification Societies Ensure compliance with IACS UR E26/E27 in coordination with classification societies
Conclusion: To ensure compliance with IACS UR E26, shipowners must take a proactive role in cybersecurity management throughout a vessel's lifecycle — establishing clear policies, engaging with shipyards and suppliers, and verifying implemented measures post-delivery.

2. Shipyards (Ship Builders)

As the system integrator, the shipyard is responsible for managing the documentation and testing of IACS UR E26 (System Functional Tests) throughout the shipbuilding process.

Key Role Details
Define Requirements Establish cybersecurity and power system functional test requirements based on UR E26
Coordinate with Suppliers Ensure that suppliers provide TA (Type Approval) certified equipment
System Integration Verify that all subsystems are securely integrated and comply with UR E26 requirements
Testing & Verification Conduct system functional tests and cybersecurity assessments, resolving identified issues
Final Approval Ensure compliance with classification society inspections and facilitate ship delivery
Conclusion: As the primary entity responsible for applying UR E26 requirements, the shipyard must integrate systems, conduct testing, and fulfill classification society and shipowner requirements to deliver a compliant vessel.

3. Suppliers

Suppliers manufacture ship systems and equipment and must provide IACS UR E27-compliant components while obtaining the necessary certifications. Suppliers play a critical role in developing equipment that meets shipyard and classification society requirements, integrating cybersecurity functions, and obtaining certification through performance and functional testing.

Key Role Details
Obtain TA Certification Ensure equipment complies with IACS UR E27 by obtaining Type Approval (TA) from classification societies
Perform FAT Conduct Factory Acceptance Tests (FAT) to validate performance and functionality of supplied equipment
Integrate Cybersecurity Features Implement firewalls, malware protection, access control, and remote access security into equipment
Provide Security Documentation Deliver security test procedures and functional test reports per shipyard and classification society requirements
Enable Anomaly Detection Equip systems with network anomaly detection capabilities and security event logging
Collaborate with Shipyards & Owners Ensure supplied equipment meets security requirements; provide ongoing technical support and maintenance plans
Conclusion: Suppliers develop and certify cybersecurity-compliant equipment, integrate security features, and provide documentation and technical support to ensure ship systems meet IACS UR E26/E27 requirements.

Ⅳ. Stakeholder Role Matrix: Our Recommendations

In the emerging maritime cybersecurity market, ensuring that each stakeholder fulfills well-defined cybersecurity responsibilities is critical. The following matrix summarizes recommended actions for each party:

Category Owners Shipyards Suppliers
Primary Role Define cybersecurity requirements System design, integration, and functional testing Manufacture equipment and implement cybersecurity features
Key Documents Develop "Owner Policy" and define security requirements Create "Cybersecurity Specification" and perform system integration Obtain "TA Certification" and submit security test reports
Testing & Validation Participate in sea trials and final inspections Conduct FAT/SAT and coordinate with classification societies Perform FAT and provide functional test documentation
Classification Society Collaboration Define security requirements for certification Conduct functional and security validation for classification inspections Provide TA-certified equipment for classification approval
Final Goal Verify and approve IACS UR E26/E27 compliance Ensure system integration and certification Supply secure and tested equipment that meets industry standards
Core Message

We recommend clear role definitions for shipowners, shipyards, and suppliers to ensure compliance with IACS UR E26 cybersecurity requirements and smooth integration of security measures into ship systems.


Key Takeaways

🏴 Owners

13 operational-phase deliverables centered on policy, incident response, and lifecycle management

🏗 Shipyards

8 design-phase documents covering asset inventory, zones & conduits, CSDD, and test procedures

🔧 Suppliers

CBS-level deliverables: TA certification, FAT test reports, CSDD contributions, and maintenance plans

⚠️ Watch Out

Classification society interpretations vary — the same system may receive different classifications under ClassNK, DNV, or ABS

#IACSE26 #IACSE27 #MaritimeCybersecurity #Newbuilding #CyberResilience #TypeApproval #ClassNK #DNV #ABS #Maritime40 #OTsecurity #IMO
Captain Ethan
Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security

Maritime professional focused on the intersection of vessel operations, classification society regulations, and OT/IT cybersecurity. Writing for engineers, consultants, and operators navigating Maritime 4.0 together.

🌐 More Articles ↗

Comments