Part of the PROTECT Playbook ← Return to Hub

USB Protection & Removable Media Control

Regulatory Context: This module aligns with IACS UR E26 (Section 5.3) and E27 regarding the control of physical access points and the prevention of unauthorized software installation via removable media.

In the maritime environment, USB ports are the “digital gangway” of the vessel. While essential for software updates, log extraction, and chart loading, they represent the most significant physical threat to OT integrity—especially on legacy systems where OS-level protection is outdated or non-existent.

The Challenge: Why “Just Disable It” Isn’t Enough

The Maintenance Dependency

OEM technicians frequently require USB access for PLC logic backups and firmware patches. Total port deactivation can lead to maintenance delays.

Legacy Human-Machine Interfaces (HMI)

Older HMIs (e.g., Windows XP/7 based) often lack the ability to run modern Endpoint Detection (EDR), leaving them defenseless against “Auto-run” malware.

The Solution: A Three-Tiered Defense Strategy

To comply with E26/E27, we move beyond policy and implement technical barriers that prevent accidental or malicious “USB Drops.”

Control Level Method Target Assets
L1: Physical USB Port Blockers (Physical Keys) Public area workstations, Bridge HMIs
L2: Administrative “Cyber Kiosk” Scanning Station All incoming OEM/Crew media
L3: Technical GPO / Registry Port Disabling Server Racks, AMS Main Cabinets
Playbook Checklist: USB Hardening
Implement a “Dirty-to-Clean” Workflow

Mandate that no USB drive enters the engine room without being scanned on a standalone “Sheep Dip” station first.

Disable Auto-Run/Auto-Play

Ensure GPOs or registry settings are configured to prevent Windows from automatically executing files upon drive insertion.

Advisor Tip: On legacy ships where software cannot block ports, use physical tamper-evident seals. If a seal is broken, the ETO knows that an unauthorized connection may have occurred and can trigger a “Detect” playbook scan.

Next Security Phase

RJ45 Port Security & Cabinet Hardening

Network Port Security & RJ45 Hardening Requirement: This module addresses IACS UR E26 (Section 5), mandate for protecting network infrastructure from unauthorized physical access and the "tamper-evident" requirements for OT cabinets. While digita...

Continue to RJ45 Port Security & Cabinet Hardening →
Scroll to Top