Part of the PROTECT Playbook ← Return to Hub

Anti-Malware for OT: EDR vs. AV

Regulatory Context: IACS UR E27 (Section 4.3.2) mandates protection against malicious code. This module explores the selection of security tools that provide robust protection without compromising the real-time availability of shipboard control systems.

In the machinery space, the “Cure” can be more dangerous than the “Disease.” Standard Antivirus software often consumes high CPU resources or mistakenly quarantines critical OEM drivers, causing a system freeze. To comply with E27, we must implement anti-malware solutions that are “OT-Aware.”

The Conflict: Stability vs. Security

The VSAT Update Trap

Traditional AV requires daily signature updates. On a ship with limited bandwidth, an AV that cannot “call home” becomes useless against new threats within 48 hours.

False Positives in OT

Proprietary OEM software often behaves like “malware” in the eyes of standard AV because it accesses low-level hardware ports. A false positive here can stop the Main Engine.

Technical Comparison: Choosing the Right Tool

While legacy systems still rely on antivirus controls, modern maritime cybersecurity strategies are increasingly adopting EDR to provide proactive threat detection and response.

Feature Legacy Antivirus (AV) Modern EDR
Detection Method Known File Signatures Behavioral AI (Anomalies)
Offline Capability Poor (Needs updates) High (AI logic is local)
Resource Impact High (Disk Scanning) Low (Passive Monitoring)
OT Recommendation Avoid for Core Assets Recommended for E27 Compliance
ETO Anti-Malware Strategy
Application Whitelisting

Instead of looking for “bad” files, configure the system to ONLY allow “known good” OEM applications to run. Everything else is blocked by default.

File Integrity Monitoring (FIM)

For legacy Windows XP/7 systems, use FIM to alert the ETO if any critical system files are modified or added.

Centralized Logging

Ensure that anti-malware alerts are sent to a central Syslog server (Pillar A) so the ETO can see threats across the whole fleet from one screen.

Legacy Tip: On very old HMIs that cannot support modern EDR agents, the best “Anti-Malware” is **Physical Hardening (USB Blocking)** and **Network Segmentation**. If you can’t protect the host, you must protect the environment around it.

Next Security Phase

Software & Firmware Patch Management

Software & Firmware Patch Management Regulatory Context: IACS UR E27 (Section 4.4) requires a documented process for identifying, testing, and deploying security patches. This module defines the "Safety-First" approach to patching critical maritime a...

Continue to Software & Firmware Patch Management →
Scroll to Top