Part of the PROTECT Playbook ← Return to Hub

OS Hardening & Service Disabling

Regulatory Context: IACS UR E27 (Section 4.3.1) mandates the hardening of all OT hosts. This involves the removal of unnecessary software and the deactivation of non-essential services to reduce the “Attack Surface” of critical shipboard systems.

Every active service or open port on an HMI (Human Machine Interface) is a potential vulnerability. “Hardening” is the process of stripping away everything that isn’t required for the vessel’s operation. If an AMS workstation never needs to print a document, the “Print Spooler” service should not only be stopped—it should be disabled at the root.

The Principle: Minimalist Computing

Reducing the Attack Surface

By disabling 10 unnecessary services, you remove 10 potential ways for malware to gain “System” level privileges on your bridge computer.

Performance Gains

On older, legacy hardware, OS hardening frees up CPU and RAM, making critical monitoring applications more stable and responsive.

Top Services to Disable in Maritime OT

Unless specifically required for the system’s function, the following services should be set to “Disabled” in the Windows Service Manager (services.msc):

Service Name Risk Category Why Disable?
Print Spooler Remote Code Execution Frequent “PrintNightmare” style exploits allow full system takeover.
Remote Registry Unauthorized Config Allows users (or malware) to modify system settings from across the network.
Windows Error Reporting Information Leakage May attempt to send technical data/crash logs over VSAT to Microsoft.
Bluetooth Support Physical Proximity Prevents unauthorized wireless peripherals from connecting in the ECR.
ETO Hardening Workflow
Remove Non-Essential Software

Uninstall any bloatware, games, or trial software that came with the PC. If it’s not the AMS application, it shouldn’t be there.

Disable Default Shared Folders

Disable administrative shares (C$, ADMIN$) to prevent lateral movement via SMB exploits.

Host-Based Firewall

Enable the local Windows Firewall and set it to “Block All” incoming traffic except for the specific ports used by the PLC/SCADA software.

Advisor Tip: The “Test-then-Lock” Rule. Hardening can sometimes break old OEM software. Always perform hardening on a backup or a clone of the system first. Verify that all alarms and signals still work before applying the changes to the live production asset.

Next Security Phase

Anti-Malware for OT: EDR vs. AV

Anti-Malware for OT: EDR vs. AV Regulatory Context: IACS UR E27 (Section 4.3.2) mandates protection against malicious code. This module explores the selection of security tools that provide robust protection without compromising the real-time availab...

Continue to Anti-Malware for OT: EDR vs. AV →
Scroll to Top