Part of the IDENTIFY Playbook ← Return to Hub

Software & Firmware Tracking

UR E26 §4.1.1.1 & §4.1.1.3.2: The vessel asset inventory shall identify the software name and version (including application programs, operating systems, and firmware). Additionally, per §4.1.1.3.2 and §4.1.1.4.4, a ‘Ship cyber security and resilience program’ must be established to manage the lifecycle of these digital assets through a software maintenance and update policy.

1. The Software Master List (SML)

Every Computer Based System (CBS) identified in your hardware inventory must have its software “DNA” documented. This is critical for Vulnerability Management; you cannot protect a system if you do not know which version of code is running its core functions.

Essential Documentation Points:

  • Application Software: Specific program versions (e.g., PMS v4.2).
  • Manufacturer & Type: The original developer of the software component (e.g., Kongsberg, ABB).
  • Functionality Purpose: A short description of what the software actually does (e.g., “Main Engine Governor Logic”).
  • Operating Systems: Windows Builds, Linux Kernels, or RTOS versions.
  • Firmware: Hard-coded software in PLCs, Sensors, and Controllers.
  • Patch Level: The latest security update applied (e.g., KB number).

2. How to Extract Version Data

Via HMI / Local Display

Most Bridge/Engine HMIs have a “System Info” or “About” page. Audit Tip: Take a photo of this screen during physical surveys as evidence for the Class Surveyor.

Via Engineering Tools

For “headless” PLCs, use OEM software (e.g., TIA Portal) to pull the firmware build number and checksum for verification.

3. Maintenance & Patch Tracking

Software Category Critical Tracking Data Update Frequency
Operating Systems Build Number, Patch Level (KB#) Monthly / Quarterly
PLC/Controller FW Major/Minor Version, Build Date Per OEM Bulletin
Security Software AV Engine & Signature Version Daily (If connected)

4. Criticality & Categorization (E22/E26)

Surveyor Tip: Justifying Category I

In your Asset Inventory, you should justify why a system is designated as Category I. If you cannot provide technical evidence (e.g., an architectural diagram proving no safety impact), Class will default the asset to Category II or III, triggering mandatory vulnerability testing and more frequent update cycles.

Example Inventory Justification:

“CAT I – Asset provides non-essential data logging only; no control interface to PMS or Propulsion.”

5. The Update Lifecycle (§5.3.1)

Tracking is only half the battle. UR E26 requires a formal Software Maintenance Policy to ensure updates don’t introduce new risks to vessel stability.

Pre-Installation Testing

Updates for Category II/III systems must be verified by the manufacturer or tested in a non-production environment before deployment to the ship’s OT network.

Rollback Plan

For every major firmware update, a “Restore to Baseline” procedure must be documented. If the update fails, the vessel must be able to return to its previous safe state immediately.

6. Ownership & Responsibility Mapping

Per UR E27, software cannot exist as a standalone entry; it must be mapped to a specific hardware host. Furthermore, UR E26 requires clear ownership of the update lifecycle.

Hardware-Software Link

Your inventory must record the Unique Asset ID of the hardware where the software is installed. This is mandatory for traceability during a hardware swap.

Maintenance Entity

Specify who is authorized to update: Shipowner, OEM, or Third-Party. This prevents unauthorized “freelance” patching by crew or uncertified technicians.

Surveyor Verification & Audit Readiness

During surveys, Class may verify software versions by vulnerability scanning or manually inspecting HMIs to ensure they match the “As-Approved” baseline. Have the following ready:

Required Documentation:
  • SML: E27-compliant inventory.
  • Agreements: OEM update contracts.
  • Change Logs: Last 3 update records.
Physical Proof:
  • HMI Screenshots: “About” page photos.
  • Test Evidence: Pre-deployment records.

Next Section

Marine Protocol Guides

Deep Dive: Protocol Intelligence Looking for detailed risk analysis and hardening guides for NMEA, Modbus, and AIS? VIEW...

Scroll to Top