Maritime OT Playbooks & Implementation Hub

NIST-Aligned Security Lifecycle: Identify • Protect • Detect • Respond • Recover

The central repository for standardized maritime cyber-security operations. These playbooks translate IACS UR E26/E27 requirements into actionable engineering and bridge-level procedures for total fleet resilience.

Phase: Fleet Management
Verified Standards: 2026
NIST: IDENTIFY

Asset Library & Risk Mapping

Procedures for OT asset discovery, protocol mapping (Modbus, NMEA), and risk scoring for IACS UR E26 compliance.

Open Playbooks →
NIST: PROTECT

Infrastructure & OT Hardening

Hardening guides for RJ45 ports, USB media, and legacy systems. Technical segmentation and access control protocols.

Open Playbooks →
NIST: DETECT

Threat Intelligence & Monitoring

Establish real-time visibility. Procedures for detecting anomalies, GPS spoofing attempts, and OEM vulnerabilities.

Open Playbooks →
NIST: RESPOND

Incident Response & Containment

Actionable checklists for ransomware and unauthorized OT access. Isolation steps to maintain seaworthiness.

Open Playbooks →
NIST: RECOVER

Resilience & Restoration

Procedures for system restoration, data integrity verification, and “Lessons Learned” for Class Society readiness.

Open Playbooks →
Quick Start: Path to IACS Audit Readiness

1. Inventory & Map

Start with the Identify Playbook to define your asset library and zones. You cannot protect what you haven’t mapped.

2. Deploy Safeguards

Apply technical hardening and monitoring from the Protect and Detect sections to secure the digital perimeter.

3. Document & Comply

Use the Recover Playbook templates to record implementation evidence. This documentation is the final requirement for IACS UR E26/E27 Audit Readiness.

Scroll to Top