Audit Evidence Templates
The Surveyor’s View: During a Cyber Secure (Tier 1 or 2) audit, the inspector won’t just look at the hardware; they will look for the Paper Trail. These templates ensure your evidence meets IACS UR E26 standards.
1. The Evidence Checklist
Evidence for the Identify phase must prove that you have analyzed the vessel’s cyber-topology. Ensure the following documents are ready for review:
A formal list of Computer Based Systems including owner, location, and criticality category (I, II, or III).
Requirement: UR E26 §5.1.1Logical diagrams showing Zones, Conduits, and air-gaps. Must be signed and dated by the CCSO.
Requirement: UR E26 §4.22. Critical Data Requirements
Compliance Documentation Previews
Standardized templates and technical logs. View watermarked previews below; premium SOPs and fillable forms require the Pro Bundle.
Next Section
Risk Assessment Guide
Risk Assessment & System Criticality Guide A standardized framework for IACS UR E26 Section 3.3 Compliance. 1. Understan...
