[CRSI] IACS UR E26 Cybersecurity Requirements: Roles of Shipowners, Shipyards and Suppliers

💡 InsightIACS UR E26 / E27CybersecurityNewbuilding

IACS UR E26/E27 Cybersecurity Deliverables: Roles and Responsibilities of Owners, Shipyards, and Suppliers

A Practical Breakdown of 23 Required Deliverables Across the Maritime Stakeholder Value Chain


Captain Ethan
Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security
- LinkedIn : https://www.linkedin.com/in/shipjobs/
Collaborator : Lew, Julius, Jin, Morgan, Yeon

Since the enforcement of IACS UR E26 and UR E27, the maritime industry has faced significant challenges in interpreting and implementing cybersecurity requirements across the shipbuilding value chain. This article provides a structured breakdown of 23 required cybersecurity deliverables — clarifying what shipowners, shipyards, and suppliers are each responsible for, and how these responsibilities interconnect under the IACS framework.

IACS UR E26 E27 maritime cybersecurity stakeholder roles

Ⅰ. Why Uncertainty Persists After IACS UR E26/E27

The maritime industry is currently experiencing significant uncertainty due to the implementation of IACS UR E26 and E27. In response, various classification societies have introduced their own guidelines to address these new cybersecurity requirements. However, despite these guidelines outlining the deliverables expected from owners, shipyards, and suppliers, the industry continues to face challenges in interpreting and implementing these requirements in real-world shipbuilding.

The key issues contributing to this confusion include:

  • 1️⃣Lack of clarity on the practical application of cybersecurity deliverables beyond regulatory frameworks
  • 2️⃣Varying interpretations across classification societies, leading to inconsistent requirements
  • 3️⃣Uncertainty regarding the essential deliverables that must be prepared by different stakeholders in the shipbuilding process

To address these concerns, we analyzed the IACS UR framework, referencing NIST-based cybersecurity principles, and conducted interviews with classification societies, shipyards, and suppliers. This research identified and compared the key deliverables required for each entity and their interdependencies.


Ⅱ. 23 Required Cybersecurity Deliverables by Stakeholder

Based on the IACS UR E26/E27 framework and cross-stakeholder interviews, the following table maps each of the 23 cybersecurity deliverables to the responsible party — Owner, Shipyard, or Supplier. A cell entry indicates that the party must produce or provide that deliverable.

NoRequirementOwnerShipyardSupplier
1Owner Policy
Cybersecurity policy and operational guidelines
2Ship Cybersecurity and Resilience Program
Establishment of cybersecurity and resilience program
3Management of Change (MoC)
Operational change management plan
Change mgmt plan for equipment
4Management of Software Updates
Policy for managing software updates in operation
Software update procedures for equipment
5Management of Firewalls
Network firewall policy and operational guidelines
Security configuration guidelines
6Management of Malware Protection
Malware detection and response plan in operation
Malware protection function for equipment
7Management of Access Control
Access control management for shipboard systems
Access control features for equipment
8Management of Remote Access
Remote access policy and control
Security assessment of remote access for equipment
9Management of Mobile and Portable Devices
Security policy for portable and removable storage
Secure data transmission for equipment
10Detection of Security Anomalies
Implementation of security anomaly detection system
Security anomaly detection for equipment
11Verification of Security Functions
Continuous evaluation and improvement of security functions
Security test results for equipment
12Incident Response Plans
Incident response plan and procedures
Incident response support information for equipment
13Recovery Plans
Cyber attack recovery plan
Recovery and reinstallation procedures for equipment
14Cybersecurity Specification
Specification of cybersecurity requirements
15Ship Asset Inventory
IT/OT asset inventory for the ship
Asset inventory for CBS
16Zones and Conduit Diagram
Zoning and data flow diagram of ship network
Network topology diagram for equipment
17Cybersecurity Design Description (CSDD)
Description of cybersecurity design and policies for the ship
Security capabilities description for equipment
18Risk Assessment for Exclusion of CBS
Risk assessment for IT/OT system cybersecurity exclusion
Security risk assessment for equipment
19Description of Compensating Countermeasures
Explanation of compensating cybersecurity measures
Alternative security countermeasures for equipment
20Ship Cyber Resilience Test Procedure
Cyber resilience test procedure for the ship
Security function test procedures for equipment
21Plans for Maintenance and Verification
Long-term security maintenance and verification planning
Maintenance and security verification plans for equipment
22Test Reports
Formal security test documentation
Security test reports for equipment
23TA (Type Approval) Certification
ClassNK, DNV, ABS, LR type approval documents
TA certification documents for equipment
Legend: ✓ = Primary responsibility  |  Cell text = Specific deliverable form required from that party  |  — = Not applicable

Ⅲ. Summary of Responsibilities for Each Stakeholder

Based on the traditional value chain of the shipbuilding and maritime industry, the following outlines the specific roles of shipowners, shipyards, and suppliers in maritime cybersecurity compliance.

1. Shipowners

As the entity responsible for ship operations, the shipowner must establish cybersecurity policies to ensure compliance with IACS UR E26. Additionally, they must collaborate with shipyards and suppliers to clearly define security requirements and verify cybersecurity measures from an operational perspective after ship delivery.

Key RoleDetails
Establish Cybersecurity PoliciesDevelop a "Ship Owner Policy" to define cybersecurity standards for the vessel
Approve RequirementsReview and approve shipyard-provided designs and functional test procedures
Collaborate with Classification SocietiesEnsure compliance with IACS UR E26/E27 in coordination with classification societies
Conclusion: To ensure compliance with IACS UR E26, shipowners must take a proactive role in cybersecurity management throughout a vessel's lifecycle — establishing clear policies, engaging with shipyards and suppliers, and verifying implemented measures post-delivery.

2. Shipyards (Ship Builders)

As the system integrator, the shipyard is responsible for managing the documentation and testing of IACS UR E26 (System Functional Tests) throughout the shipbuilding process.

Key RoleDetails
Define RequirementsEstablish cybersecurity and power system functional test requirements based on UR E26
Coordinate with SuppliersEnsure that suppliers provide TA (Type Approval) certified equipment
System IntegrationVerify that all subsystems are securely integrated and comply with UR E26 requirements
Testing & VerificationConduct system functional tests and cybersecurity assessments, resolving identified issues
Final ApprovalEnsure compliance with classification society inspections and facilitate ship delivery
Conclusion: As the primary entity responsible for applying UR E26 requirements, the shipyard must integrate systems, conduct testing, and fulfill classification society and shipowner requirements to deliver a compliant vessel.

3. Suppliers

Suppliers manufacture ship systems and equipment and must provide IACS UR E27-compliant components while obtaining the necessary certifications. Suppliers play a critical role in developing equipment that meets shipyard and classification society requirements, integrating cybersecurity functions, and obtaining certification through performance and functional testing.

Key RoleDetails
Obtain TA CertificationEnsure equipment complies with IACS UR E27 by obtaining Type Approval (TA) from classification societies
Perform FATConduct Factory Acceptance Tests (FAT) to validate performance and functionality of supplied equipment
Integrate Cybersecurity FeaturesImplement firewalls, malware protection, access control, and remote access security into equipment
Provide Security DocumentationDeliver security test procedures and functional test reports per shipyard and classification society requirements
Enable Anomaly DetectionEquip systems with network anomaly detection capabilities and security event logging
Collaborate with Shipyards & OwnersEnsure supplied equipment meets security requirements; provide ongoing technical support and maintenance plans
Conclusion: Suppliers develop and certify cybersecurity-compliant equipment, integrate security features, and provide documentation and technical support to ensure ship systems meet IACS UR E26/E27 requirements.

Ⅳ. Stakeholder Role Matrix: Our Recommendations

In the emerging maritime cybersecurity market, ensuring that each stakeholder fulfills well-defined cybersecurity responsibilities is critical. The following matrix summarizes recommended actions for each party:

CategoryOwnersShipyardsSuppliers
Primary RoleDefine cybersecurity requirementsSystem design, integration, and functional testingManufacture equipment and implement cybersecurity features
Key DocumentsDevelop "Owner Policy" and define security requirementsCreate "Cybersecurity Specification" and perform system integrationObtain "TA Certification" and submit security test reports
Testing & ValidationParticipate in sea trials and final inspectionsConduct FAT/SAT and coordinate with classification societiesPerform FAT and provide functional test documentation
Classification Society CollaborationDefine security requirements for certificationConduct functional and security validation for classification inspectionsProvide TA-certified equipment for classification approval
Final GoalVerify and approve IACS UR E26/E27 complianceEnsure system integration and certificationSupply secure and tested equipment that meets industry standards
Core Message

We recommend clear role definitions for shipowners, shipyards, and suppliers to ensure compliance with IACS UR E26 cybersecurity requirements and smooth integration of security measures into ship systems.


Key Takeaways

🏴 Owners

13 operational-phase deliverables centered on policy, incident response, and lifecycle management

🏗 Shipyards

8 design-phase documents covering asset inventory, zones & conduits, CSDD, and test procedures

🔧 Suppliers

CBS-level deliverables: TA certification, FAT test reports, CSDD contributions, and maintenance plans

⚠️ Watch Out

Classification society interpretations vary — the same system may receive different classifications under ClassNK, DNV, or ABS

#IACSE26#IACSE27#MaritimeCybersecurity#Newbuilding#CyberResilience#TypeApproval#ClassNK#DNV#ABS#Maritime40#OTsecurity#IMO

Captain Ethan
Captain Ethan
Maritime 4.0 · AI, Data & Cyber Security

Maritime professional focused on the intersection of vessel operations, classification society regulations, and OT/IT cybersecurity. Writing for engineers, consultants, and operators navigating Maritime 4.0 together.

🌐 More Articles ↗

Comments