Identify Phase: Summary & Audit Readiness
Phase Objective
The Identify Phase is about Visibility. You cannot protect what you cannot see. By this stage, the vessel must have a verified asset register and a clear map of digital risks.
Core Compliance Deliverables
To pass an IACS UR E26 audit, the following artifacts must be complete. Click the links to review your work:
OT Asset Inventory
Full list of HW/SW, MAC addresses, and firmware versions for all CBS.
View Inventory Guide โCSDD Blueprint
Technical diagrams showing Zones, Conduits, and Data Flows.
Review CSDD Guide โRisk Assessments
Documented proof of system criticality and approved exclusions.
Generate Forms โ๐ต๏ธ Auditor “Cheat Sheet”
Class Surveyors will likely ask the ETO or Master these specific questions. Practice your answers using the evidence we’ve built.
Evidence: Demonstrate the Change Management (MoC) Log and the corresponding update in the Asset Inventory list.
Evidence: Present the CSDD Architecture Map with Category III zones clearly highlighted in red.
Evidence: Reference the Supply Chain Playbook and the signed USB Malware Scanning Log for the device.
Ready to Secure the Perimeter?
You have successfully documented what is on the ship. Now, we must implement technical safeguards. The next phase covers Network Segmentation, Firewall Hardening, and Access Controls.
Begin Phase 2: PROTECT โ