[{"term":"Libraries_BA","id":0,"type":"QUICKLINKS"},{"term":"Instructions","id":1,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":2,"type":"QUICKLINKS"},{"term":"Building","id":3,"type":"QUICKLINKS"},{"term":"221","id":4,"type":"QUICKLINKS"}]
{ "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Homepage", "item": "https://www.wago.com/gb" }, { "@type": "ListItem", "position": 2, "name": "Solutions", "item": "https://www.wago.com/gb/industries" }, { "@type": "ListItem", "position": 3, "name": "Open Automation", "item": "https://www.wago.com/gb/open-automation" }, { "@type": "ListItem", "position": 4, "name": "Cybersecurity", "item": "https://www.wago.com/gb/open-automation/cybersecurity" }, { "@type": "ListItem", "position": 5, "name": "Customer Application – SCHOTTEL", "item": "https://www.wago.com/gb/open-automation/cybersecurity/cyber-resilience-at-sea" } ] } [{"url":"/industries","name":"Solutions","linkClass":null,"categoryCode":null},{"url":"/open-automation","name":"Open Automation","linkClass":null,"categoryCode":null},{"url":"/open-automation/cybersecurity","name":"Cybersecurity","linkClass":null,"categoryCode":null},{"url":"/open-automation/cybersecurity/cyber-resilience-at-sea","name":"Customer Application – SCHOTTEL","linkClass":"active","categoryCode":null}]
Customer application 16 June 2025

Full Speed Ahead for Cyber Resilience at Sea

Achieving Ship Classification with WAGO Security Consulting

Challenge: Rising Cyber Threats in Maritime Systems

Modern vessels are highly automated and digitally networked—making them prime targets for cyberattacks. Scenarios such as manipulated navigation data, blocked propulsion controls, or encrypted onboard networks are no longer hypothetical. These threats endanger not only onboard systems but also human lives and global supply chains.

To counter this, the maritime industry is implementing binding standards such as IEC 62443 and IACS guidelines UR E26 and UR E27. These require systematic hardening of all IT and OT systems, from development through commissioning. Meeting these standards demands deep technical expertise, a holistic security strategy, and close collaboration among all stakeholders.

In This Article, You Will Learn:

  • Which standards and guidelines are relevant for safeguarding maritime systems
  • How a bow thruster system was methodically hardened against cyber threats
  • The role of asset management, zoning, and threat analysis in the process
  • How WAGO Security Consulting supports implementation and documentation

Securing a Bow Thruster System: SCHOTTEL and WAGO as Pilot Partners

Cybersecurity doesn’t start on board — it begins during planning and development on land. That’s why WAGO, in collaboration with propulsion specialist SCHOTTEL, launched a pilot project to proactively prepare maritime systems for today’s cybersecurity requirements — with measurable success.

The project focused on the comprehensive protection of a bow thruster system. To meet this challenge, the partners were required to comply with stringent standards, including international standard IEC 62443 and IACS guidelines for maritime applications.

Collaboration for enhanced security: Tim Hommrich and Gerald Püschel, hardware and software developers at SCHOTTEL, and Jens Sparmann, Security Systems Specialist at WAGO (from left to right).

The objective was to evaluate an existing system for potential vulnerabilities using these standards and to implement appropriate technical safeguards. To achieve this, all interfaces and communication paths were disclosed to identify possible attack vectors.

WAGO Security Consulting delivered comprehensive cybersecurity solutions for OT networks — supported by structured assessments, anomaly detection, customized security concepts, and technical implementation.

SCHOTTEL and WAGO laid the foundation for secure maritime operations by implementing IACS guidelines UR E26 and UR E27.

{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","lastExportedVersion":1,"type":"Quote Component","dynamicVisibility":true,"cloneable":true,"uuid":"eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBNVkRWIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","ignoreOnTransfer":false,"uid":"comp_de_0000MVDV","quote":"WAGO Security Consulting supports and coordinates close collaboration and communication between SCHOTTEL and other stakeholders to ensure compliance with IACS guidelines and achieve high cyber resilience system-wide.","modifiedtime":"2025-12-05T02:22:34+0000","children":[],"onlyOneRestrictionMustApply":true,"lastLoad":1764901354128,"visible":true,"wagoColumnComponent":[],"imagePosition":"LEFT","availableLanguages":"AVAILABLE","passepartout":true,"restrictions":[],"searchable":true,"lead":"<p>Jens Sparmann, Security Systems Specialist at WAGO</p>","typeCode":"WagoQuoteTeaserComponent","slots":["eyJpdGVtSWQiOiJjc19kZV8wMDAwTDZFMCIsImNhdGFsb2dJZCI6ImdiLXdhZ29Db250ZW50Q2F0YWxvZyIsImNhdGFsb2dWZXJzaW9uIjoiT25saW5lIn0="],"itemtype":"WagoQuoteTeaserComponent","restricted":false,"name":"quote_sparmann","synchronizationBlocked":true,"containers":[],"creationtime":"2025-07-23T10:09:13+0000","actions":[],"contentVersion":1,"parents":[]}

Four Steps to Safe Marine Technology

The analysis and implementation process followed a structured framework that can be applied to other applications:

  1. Risk Assessment – Initial evaluation of potential threats and vulnerabilities at the system level
  2. Asset Management – Identification of all relevant components, including communication paths
  3. Zoning – Segmentation of the system into security zones with tiered protection requirements
  4. Development and Testing of Measures – Definition of technical safeguards and validation through targeted testing procedures

WAGO Security Consulting for Integrated Protection: Cyber-resilient Automation Solutions for Marine Applications in Four Steps

The process began with a risk analysis, followed by asset management to identify all critical components. The system was then segmented into security zones, and potential threats were assessed. Finally, the project partners defined specific protective measures and validated their effectiveness through targeted testing.

WAGO Security Consulting supported the process with technical expertise, structured assessments, and tailored measures to secure the OT infrastructure. The joint project yielded a clearly structured, proven process that can be applied to other systems in the future — a strong signal for enhanced digital security at sea.

SCHOTTEL relies on WAGO’s PFC200 controller to meet the diverse requirements of maritime standard IACS UR E27.

Want to Learn More?

Download the full customer application report and discover our tailored solutions to help you navigate digital threats with confidence.

Additional service offerings: