IACS UR E27 — cyber resilience
of onboard systems & equipment.
E26 governs the vessel. E27 governs what goes inside it. If you manufacture, integrate, or supply Computer Based Systems for vessels contracted after 1 July 2024, UR E27 defines the minimum security capabilities your equipment must demonstrate — and the documentation Class will require from you.
contracted from this date
required by the standard
standard (62443-3-3)
published E27 notations
E26 and E27 — two different standards, two different audiences
E26 and E27 were published together by IACS and work as a pair — but they address different parts of the maritime cyber problem and are written for different audiences. Understanding the distinction is essential before you decide what your organisation needs to do.
IACS UR E26 — the vessel
Governs the cyber resilience of the ship as a whole. Written for shipowners, operators, and shipyards. Requires a Cyber System Definition Document (CSDD), zone and conduit architecture, and Class approval of the vessel’s overall security design.
- Shipowners and operators
- Shipbuilders and yards
- DPAs and technical managers
- ETOs during operation
IACS UR E27 — the equipment
Governs the cyber resilience of individual Computer Based Systems (CBS) installed on the vessel. Written for equipment manufacturers, OEMs, and system integrators. Requires demonstration that each CBS meets defined security capabilities.
- Equipment manufacturers (OEMs)
- System integrators
- Shipyard procurement teams
- Component and software suppliers
Who needs to comply with E27?
E27 applies to any organisation that supplies, integrates, or maintains Computer Based Systems installed on vessels contracted for construction on or after 1 July 2024. If your equipment ends up onboard a vessel subject to E26, your system must demonstrate E27 compliance before it can be approved by Class.
OEM equipment manufacturers
Manufacturers of navigation systems, propulsion control, power management, cargo systems, and any other CBS installed onboard. Your equipment must receive Class approval under E27 before it can be fitted on an E26 vessel.
System integrators
Companies that combine components from multiple manufacturers into a single shipboard system. Even if individual components are approved, the integrated system as a whole must also demonstrate E27 compliance. Third-party components within your system are your responsibility.
Software suppliers
Providers of software running on CBS — including SCADA, HMI software, automation platforms, and monitoring tools. Software suppliers must demonstrate Secure Development Lifecycle (SDL) compliance and provide maintenance and update documentation.
Shipyard procurement teams
When specifying systems for an E26 newbuild, procurement must ensure that every CBS in scope has or will receive E27 Class approval before delivery. E27 compliance is a procurement requirement, not just a supplier problem.
Firewall and network equipment vendors
Firewalls that control communication between CBS zones or with external networks must comply with E27. This includes industrial firewalls, managed switches, and any network device that forms part of a CBS boundary.
Service and maintenance providers
Organisations providing remote access, OEM service connections, or onboard maintenance must demonstrate that their tools and connection methods comply with E27 requirements for access control and session logging.
The 30 + 11 security capabilities
E27 defines two tiers of security capability based on where a CBS sits in the vessel’s network architecture. Every CBS must meet the 30 base capabilities. An additional 11 capabilities are required for CBS that share an interface with untrusted networks — such as systems connected to the satellite communications zone or the IT network.
- Human user identification and authentication
- Software process and device identification
- Account management and lockout
- Unique credentials — no shared accounts
- Role-based access control (RBAC)
- Least privilege enforcement
- Remote session management and termination
- Concurrent session control
- Audit log generation
- Audit log protection and retention
- Audit log synchronisation (NTP)
- System use notifications / banners
- Protection of audit log information
- Configuration management and baseline
- Change control and software update management
- Patch management process
- Malicious code protection
- Security functionality verification
- Network segmentation support
- Zone boundary protection
- Communication integrity
- Resource management and availability
- Control system backup and recovery
- Emergency power and availability
- Physical access control to CBS components
- Output device control
- Removable media protection
- Incident response support information
- Secure development lifecycle documentation
- Maintenance and verification plan
- Use control on untrusted network connections
- Explicit deny-by-default for untrusted zones
- Encrypted communications on untrusted links
- Cryptographic key management
- Public key infrastructure (PKI) support
- Network address validation and filtering
- Session authentication for untrusted connections
- Mobile code restrictions
- Wireless access management
- Use of approved protocols only
- Intrusion detection capability on network boundary
E27 requirements — section by section
E27 is structured across six sections. For each section below, we list what is required and link to the TAGSIA playbooks that implement the corresponding operational controls — useful both for OEMs building compliant systems and for shipowners verifying that installed systems meet requirements.
Documents required for E27 Class approval
To obtain E27 Class approval for a CBS, the supplier must submit specific documentation to the Class society. The table below shows what is required, the E27 section it corresponds to, and whether TAGSIA has a template or playbook that supports its preparation.
| Document required | E27 reference | TAGSIA resource |
|---|---|---|
| CBS scope definition and system description | §3.1.1 / §4.1 | Asset Inventory Guide → |
| Security capability self-assessment against 30+11 | §3.1.2 | Hardening Audit Record → |
| Secure Development Lifecycle (SDL) documentation | §3.1.5 | Supplier-specific — no template |
| Maintenance and verification plan | §3.1.6 | Software & Firmware Tracking → |
| Incident response support information | §3.1.7 | First 15 Minutes → |
| Access control and RBAC configuration evidence | §4.2 | RBAC Matrix Template → |
| Patch management procedure | §4.3 | Patch Management → |
| Backup and recovery procedure | §4.4 | Configuration Backups → |
| Vendor and third-party access control procedure | §4.5 | Service Entry Permit → |
| Audit log specification and retention policy | §4.6 | Log Retention Rules → |
How each Class society implements E27
All IACS member societies apply UR E27 as a minimum baseline, but each has published its own guidance and class notation that layers additional requirements on top. The security profiles and notation names differ — understanding which Class society is certifying your vessel or equipment matters.
Frequently asked questions
Building E27-compliant systems?
Every TAGSIA playbook tagged with the E27 badge maps directly to the section it satisfies. Use them as your implementation reference and evidence base.
