OT Traffic Baselining Procedures
Objective: Capture the “Normal” state of communication to create a blueprint for Firewall Rules (Conduits). This satisfies the IACS UR E26 requirement for verifying network traffic flows and justifying the “Cyber Security Design Description.”
1. The 72-Hour Observation Window
A baseline must cover multiple operational states. For a maritime audit, we recommend a 72-hour capture to include:
High-frequency thruster control and DP traffic.
Consistent navigation (GPS/AIS) and engine telemetry.
Pump control and automated valve sequences.
2. Implementation: Passive Capture
To maintain vessel safety, baselining must be passive. Active scanning during voyage can trigger safety-interlocks. Use the following three methods to ingest traffic without introducing latency or risk to the OT network.
Configure the Managed Switch to duplicate traffic from “Member Ports” (PLCs/Sensors) to a “Destination Port” (Laptop/IDS).
- Best for: Core switches with high CPU overhead.
- Risk: Switch may drop mirror packets if CPU exceeds 80% during peak operations.
Install a physical “Test Access Point” between the Bridge and the Core Switch. This ensures 100% visibility of full-duplex traffic.
- Best for: Legacy hubs or unmanaged switches common in older engine rooms.
- Risk: Requires a brief downtime for physical cable insertion.
Analyze the PCAP (Packet Capture) files using Wireshark with maritime-specific filters (e.g., mbtcp or nmea_ip).
- Goal: Identify source/destination pairs and packet frequency.
- Outcome: This data becomes the “Evidence of Flow” for UR E26 audit compliance.
3. Design Verification (E26 4.2.1.4.1)
Per IACS UR E26, the Systems Integrator must prove that physical data flows match the approved Cyber Security Design Description.
- Validate Intra-Zone Protocols
- Verify Physical Port Mapping
- Confirm “Least Functionality”
- Verify Zone Boundary Device
- Match against Firewall ACLs
- Document Purpose of Data Link
- Identify Outbound Serial/IP
- Verify Physical Segmentation
- Block Unauthorized Telemetry
4. Anomaly Resolution Matrix
5. Formal Validation & Sign-off
A baseline is only an audit-valid “Target Profile” if reviewed. The following sign-off is required for the Ship Cyber Security Program:
- Chief Engineer / ETO: Verification that all discovered traffic is operationally necessary.
- Inventory Link: Confirm every talking IP/MAC has a corresponding entry in the Asset Master List.
Next Section
System Interdependency Matrix
System Interdependency Matrix UR E26 §3.2 (1) & §4.1: The 'Identify' functional element requires developing an underst...
