Part of the PROTECT Playbook ← Return to Hub

Protect Phase: Summary & Audit Readiness

Phase Objective

The Protect Phase is about Hardening. Using the blueprints from Identify, we implement technical barriers, access controls, and physical safeguards to minimize the vessel’s attack surface.

Core Compliance Deliverables

To pass an IACS UR E26/E27 audit, the following technical safeguards and logs must be active. Click the links to access the specific playbooks for each Pillar.

PILLAR A

Network Control

Evidence of physical or logical (VLAN) separation between IT and OT zones.

View Pillar A →
PILLAR B

Access & Identity

Verified use of MFA for remote access and RBAC policies for system interaction.

View Pillar B →
PILLAR C

Endpoint Hardening

Confirmation that unused ports are disabled and OS services are limited.

View Pillar C →
PILLAR D

Data Integrity

Documented patch management and verified offline configuration backups.

View Pillar D →
PILLAR E

Physical & Power

Securing physical access to OT spaces and ensuring UPS power resilience.

View Pillar E →

Auditor “Cheat Sheet”

Expect the Class Surveyor to perform a “Spot Check” on these specific hardening controls during an annual survey.

Question: “Can you demonstrate that the Crew Wi-Fi cannot ping the ECDIS?”

Evidence Needed: Firewall ACL list showing the blocked traffic between zones.

Question: “Are the OT server racks locked, and who has the key?”

Evidence Needed: Physical inspection and a Key Management Log showing controlled access.

Question: “How do you recover if a Ransomware attack encrypts the AMS workstation?”

Evidence Needed: Point to the “Golden Image” SSD kept in the secure offline vault.

Phase 2: PROTECT Complete

Watching the Horizon: Detection

Your defenses are up and your assets are hardened. Now, we must implement the “Eyes and Ears” of the vessel. The next phase covers Intrusion Detection (IDS), Security Logging, and Continuous Monitoring.

Begin Phase 3: DETECT →
Scroll to Top