[{"term":"Libraries_BA","id":0,"type":"QUICKLINKS"},{"term":"Instructions","id":1,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":2,"type":"QUICKLINKS"},{"term":"Building","id":3,"type":"QUICKLINKS"},{"term":"221","id":4,"type":"QUICKLINKS"}]
{ "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Homepage", "item": "https://www.wago.com/global" }, { "@type": "ListItem", "position": 2, "name": "Industry Solutions", "item": "https://www.wago.com/global/industries" }, { "@type": "ListItem", "position": 3, "name": "Open Automation", "item": "https://www.wago.com/global/open-automation" }, { "@type": "ListItem", "position": 4, "name": "Cybersecurity", "item": "https://www.wago.com/global/open-automation/cybersecurity" }, { "@type": "ListItem", "position": 5, "name": "Customer Application – SCHOTTEL", "item": "https://www.wago.com/global/open-automation/cybersecurity/cyber-resilience-at-sea" } ] } [{"url":"/industries","name":"Industry Solutions","linkClass":null,"categoryCode":null},{"url":"/open-automation","name":"Open Automation","linkClass":null,"categoryCode":null},{"url":"/open-automation/cybersecurity","name":"Cybersecurity","linkClass":null,"categoryCode":null},{"url":"/open-automation/cybersecurity/cyber-resilience-at-sea","name":"Customer Application – SCHOTTEL","linkClass":"active","categoryCode":null}]
Customer application

Full Speed Ahead for Cyber Resilience at Sea

Achieving Ship Classification with WAGO Security Consulting

Challenge: Rising Cyber Threats in Maritime Systems

Modern vessels are highly automated and digitally networked—making them prime targets for cyberattacks. Scenarios such as manipulated navigation data, blocked propulsion controls, or encrypted onboard networks are no longer hypothetical. These threats endanger not only onboard systems but also human lives and global supply chains.

To counter this, the maritime industry is implementing binding standards such as IEC 62443 and IACS guidelines UR E26 and UR E27. These require systematic hardening of all IT and OT systems, from development through commissioning. Meeting these standards demands deep technical expertise, a holistic security strategy, and close collaboration among all stakeholders.

In This Article, You Will Learn:

  • Which standards and guidelines are relevant for safeguarding maritime systems
  • How a bow thruster system was methodically hardened against cyber threats
  • The role of asset management, zoning, and threat analysis in the process
  • How WAGO Security Consulting supports implementation and documentation

Securing a Bow Thruster System: SCHOTTEL and WAGO as Pilot Partners

Cybersecurity doesn’t start on board — it begins during planning and development on land. That’s why WAGO, in collaboration with propulsion specialist SCHOTTEL, launched a pilot project to proactively prepare maritime systems for today’s cybersecurity requirements — with measurable success.

The project focused on the comprehensive protection of a bow thruster system. To meet this challenge, the partners were required to comply with stringent standards, including international standard IEC 62443 and IACS guidelines for maritime applications.

Collaboration for enhanced security: Tim Hommrich and Gerald Püschel, hardware and software developers at SCHOTTEL, and Jens Sparmann, Security Systems Specialist at WAGO (from left to right).

The objective was to evaluate an existing system for potential vulnerabilities using these standards and to implement appropriate technical safeguards. To achieve this, all interfaces and communication paths were disclosed to identify possible attack vectors.

WAGO Security Consulting delivered comprehensive cybersecurity solutions for OT networks — supported by structured assessments, anomaly detection, customized security concepts, and technical implementation.

SCHOTTEL and WAGO laid the foundation for secure maritime operations by implementing IACS guidelines UR E26 and UR E27.