Part of the IDENTIFY Playbook ← Return to Hub

Audit Evidence Templates

The Surveyor’s View: During a Cyber Secure (Tier 1 or 2) audit, the inspector won’t just look at the equipment; they will look for the Paper Trail. These templates ensure your evidence meets IACS standards.

1. The Evidence Checklist

Evidence for the Identify phase must prove that you have analyzed the vessel’s cyber-topology. You should have the following documents ready for review:

CBS Register

A formal list of Computer Based Systems including owner, location, and criticality category (I, II, or III).

Traffic Analysis Log

A summary of your 72-hour baseline, signed off by the Chief Engineer or ETO.

2. Critical Data Requirements

Artifact Name Key Requirement Reference
Network DiagramMust show Zone boundaries & conduits.UR E26 §4.2
Software Version ListInclude PLC firmware and HMI OS.IEC 62443-2-4
Data Flow MatrixSource, Destination, Port, Protocol.UR E26 §3.2

Next Security Phase

Identify Phase: Summary & Audit Readiness

Identify Phase: Summary & Audit Readiness Phase Objective The Identify Phase is about Visibility. You cannot protect what you cannot see. By this stage, the vessel must have a verified asset register and a clear map of digital risks. Core Compliance ...

Continue to Identify Phase: Summary & Audit Readiness →
Scroll to Top