Part of the Audit & Compliance Section ← Return to Hub

Phase Review & Verification

This matrix summarizes the mandatory functional requirements from IACS UR E26 (Rev.1 Nov 2023). For a vessel to be compliant, the ETO must verify that each action below is implemented and testable.

PHASE 1: IDENTIFY
§4.1.1: Vessel asset inventory Functional Action: Create and maintain a full inventory of all Computer Based Systems (CBS), identifying their category (I, II, or III) and physical location.
PHASE 2: PROTECT
§4.2.1: Security zones & segmentationFunctional Action: Define logical and physical boundaries between systems of different categories.
§4.2.2: Network protection safeguardsFunctional Action: Implement firewalls or managed switches to control and filter traffic between zones.
§4.2.3: Data protection, Antivirus, AntiMalware, AntiSpam Functional Action: Ensure data integrity during transit and storage, protecting sensitive system configurations.
§4.2.4: Access controlFunctional Action: Limit physical, logical, digital access to critical CBS hardware and network infrastructure.
§4.2.5: Wireless communicationFunctional Action: Secure all wireless interfaces with encryption and authentication to prevent unauthorized bridge access.
§4.2.6: Remote access controlFunctional Action: Implement strict rules for all vendor VSAT or shore-to-ship connections and untrusted Networks.
§4.2.7: Mobile & Portable DevicesFunctional Action: Control the use of USB drives and laptops to prevent malware introduction into the OT network.
PHASE 3: DETECT
§4.3.1: Network operation monitoringFunctional Action: Implement tools to monitor network traffic for anomalies and generate alerts for suspicious activity.
§4.3.2: Verification & diagnosticsFunctional Action: Regularly test that detection systems are active and logs are being correctly recorded.
PHASE 4: RESPOND
§4.4.1: Incident response planFunctional Action: Establish clear procedures for the crew to follow when a cyber-incident is detected.
§4.4.2: Local & manual operationFunctional Action: Ensure the ship can be safely operated via local controls if the network is compromised.
§4.4.3: Network isolationFunctional Action: Provide the capability to physically or logically isolate network segments during an attack.
§4.4.4: Fallback to minimal riskFunctional Action: Develop procedures to bring the vessel to a “Minimal Risk Condition” safely after a security failure.
PHASE 5: RECOVER
§4.5.1: Recovery planningFunctional Action: Maintain a documented recovery plan to restore essential functions post-incident.
§4.5.2: Backup and restoreFunctional Action: Regularly back up system configurations and verify that they can be successfully restored.
§4.5.3: Controlled shutdown & resetFunctional Action: Demonstrate that systems can be cleanly reset and restarted to a known safe state.

Final Audit Readiness Checklist

Before accessing the Master Compliance Dashboard, ensure the following core evidence is available for a Class Surveyor. These items are the “Critical Path” to a 5/5 Optimized score:

Technical Evidence
  • Signed Ship Cyber Resilience Test Procedure (E26)
  • Verified Offline Backups for Category III CBS
  • Firewall Rule-set & Segmentation Logs
Documentation Evidence
  • Manufacturer UR E27 Type Approval Certificates
  • SMS Cyber Incident Response Procedures
  • Updated Asset Topology & Inventory List

“Verification complete? Proceed to the executive view to confirm vessel status.”

VIEW FULL VESSEL COMPLIANCE DASHBOARD
Scroll to Top