Part of the IDENTIFY Playbook ← Return to Hub

Audit Evidence Templates

The Surveyor’s View: During a Cyber Secure (Tier 1 or 2) audit, the inspector won’t just look at the hardware; they will look for the Paper Trail. These templates ensure your evidence meets IACS UR E26 standards.

1. The Evidence Checklist

Evidence for the Identify phase must prove that you have analyzed the vessel’s cyber-topology. Ensure the following documents are ready for review:

CBS Register

A formal list of Computer Based Systems including owner, location, and criticality category (I, II, or III).

Requirement: UR E26 §5.1.1
Network Diagram

Logical diagrams showing Zones, Conduits, and air-gaps. Must be signed and dated by the CCSO.

Requirement: UR E26 §4.2

2. Critical Data Requirements

Artifact Name Key Requirement Compliance Ref
Software Version List Include PLC firmware, HMI OS, and specific Patch levels. IEC 62443-2-4
Data Flow Matrix Define Source, Destination, Port, and Protocol (e.g., Modbus 502). UR E26 §3.2
Change Log Chronological history of all technical interventions since last audit. UR E26 §5.3.1

Compliance Documentation Previews

Standardized templates and technical logs. View watermarked previews below; premium SOPs and fillable forms require the Pro Bundle.

TAG-MOC-2026-E22
Change Request (MoC)
View Form
TAG-EXCL-GEN
Exclusion Assessment
View Form

Unlock Full Compliance & Intelligence

Upgrade to the TAGSIA Pro Bundle to get all 40+ fillable documents, editable SOPs, and unlimited access to our real-time Threat Intel feed, CVE Library, and Vendor Advisories.

Upgrade to Pro Bundle
Includes Unlimited Intel Search
Instant access to IACS E26/E27 Templates

Next Section

Risk Assessment Guide

Risk Assessment & System Criticality Guide A standardized framework for IACS UR E26 Section 3.3 Compliance. 1. Understan...

Scroll to Top