Part of the IDENTIFY Playbook โ† Return to Hub

Identify Phase: Summary & Audit Readiness

๐Ÿ”

Phase Objective

The Identify Phase is about Visibility. You cannot protect what you cannot see. By this stage, the vessel must have a verified asset register and a clear map of digital risks.

Core Compliance Deliverables

To pass an IACS UR E26 audit, the following artifacts must be complete. Click the links to review your work:

UR E26 ยง4.1.1

OT Asset Inventory

Full list of HW/SW, MAC addresses, and firmware versions for all CBS.

View Inventory Guide โ†’
UR E26 ยง5.1.2

CSDD Blueprint

Technical diagrams showing Zones, Conduits, and Data Flows.

Review CSDD Guide โ†’
UR E26 ยง3.3

Risk Assessments

Documented proof of system criticality and approved exclusions.

Generate Forms โ†’

๐Ÿ•ต๏ธ Auditor “Cheat Sheet”

Class Surveyors will likely ask the ETO or Master these specific questions. Practice your answers using the evidence we’ve built.

“How do you track new equipment added to the OT network?”

Evidence: Demonstrate the Change Management (MoC) Log and the corresponding update in the Asset Inventory list.

“Which systems are classified as Category III (Critical)?”

Evidence: Present the CSDD Architecture Map with Category III zones clearly highlighted in red.

“What happens when a vendor brings a service laptop onboard?”

Evidence: Reference the Supply Chain Playbook and the signed USB Malware Scanning Log for the device.

Phase 1: IDENTIFY Complete

Ready to Secure the Perimeter?

You have successfully documented what is on the ship. Now, we must implement technical safeguards. The next phase covers Network Segmentation, Firewall Hardening, and Access Controls.

Begin Phase 2: PROTECT โ†’
Scroll to Top