OS Hardening & Service Disabling
Regulatory Context: IACS UR E27 (Section 4.3.1) mandates the hardening of all OT hosts. This involves the removal of unnecessary software and the deactivation of non-essential services to reduce the “Attack Surface” of critical shipboard systems.
Every active service or open port on an HMI (Human Machine Interface) is a potential vulnerability. “Hardening” is the process of stripping away everything that isn’t required for the vessel’s operation. If an AMS workstation never needs to print a document, the “Print Spooler” service should not only be stopped—it should be disabled at the root.
The Principle: Minimalist Computing
Modern operating systems are built for general-purpose convenience, shipping with hundreds of background processes designed for office environments or home use. In a maritime OT environment, these services represent “technical debt” that increases the risk of exploitation. Hardening transforms a standard Windows or Linux installation into a Single-Purpose Asset. By ensuring the OS only does what is strictly necessary to run the Scada or Navigation software, we create a predictable environment where any unexpected process becomes immediately obvious during a security audit.
Reducing the Attack Surface
By disabling 10 unnecessary services, you remove 10 potential entry points for malware to gain “System” level privileges on your bridge computer. Fewer services mean fewer patches to manage.
Performance & Stability
On older, legacy hardware found in Engine Control Rooms, OS hardening frees up critical CPU and RAM, making monitoring applications more responsive and reducing the risk of “blue screen” crashes.
Top Services to Disable in Maritime OT
Unless specifically required for the system’s function, the following services should be set to “Disabled” in the Windows Service Manager (services.msc):
Next Section
Anti-Malware for OT: EDR vs. AV
Anti-Malware for OT: EDR vs. AV Regulatory Context: IACS UR E27 (Section 4.3.2) mandates protection against malicious co...
