Part of the IDENTIFY Playbook ← Return to Hub

Asset Inventory & Mapping Guide

Requirement: IACS UR E26 (§4.1.1) and IEC 62443-2-4 require a documented inventory of all Computer Based Systems (CBS). This module provides the technical methodology for discovering and categorizing these assets.

You cannot protect what you cannot see. In the maritime environment, asset management is the process of identifying every PLC, HMI, Sensor, and Gateway that contributes to the safe operation of the vessel.

1. The Maritime Discovery Framework

Traditional IT “active scanning” is often too aggressive for sensitive maritime OT. Our framework utilizes a dual-layered approach to ensure 100% visibility without risking system crashes or network latency.

Passive Monitoring

Listening to network traffic via SPAN ports to identify assets without sending any data. Safe for all maritime OT systems.

Physical Inspection

On-deck verification of serial numbers and firmware from nameplates on non-networked equipment.

Safety Warning: Active Scanning

Never perform active vulnerability scans or “NMAP” scans while the vessel is underway. High-frequency pings can cause PLCs to enter a “Fail-Safe” state.

2. Mandatory Data Points for E27 (§3.1.1)

Under IACS UR E27, every Computer Based System (CBS) must be documented with granular detail. This data forms the foundation of the system’s “Type Approval” and technical security profile.

The “Golden” Inventory Requirements

E27 COMPLIANT EVIDENCE
Category Required Data Points (UR E27)
Hardware Components
Hosts, Embedded, Network Devices
Identity: Name, Brand/Manufacturer, Model/Type
Function: Short description of purpose
Physical: physical interfaces (Network, Serial, USB, etc.)
OS/Firmware: Name/Type, Version, and Patch Level
Connectivity: Supported communication protocols
Software Components
Applications & Utilities
Mapping: The hardware component where it is installed
Identity: Brand/Manufacturer, Model/Type
Function: functionality/purpose
Version: Current software version

Pro-Tip: Cross-referencing Physical Interfaces with Protocols is essential for Zone & Conduit mapping.

3. Enhancing the Inventory for UR E26 Compliance

While E27 looks at the system, UR E26 looks at the ship. To achieve full vessel resilience, your inventory must be enhanced with context that defines how systems interact.

UR E26 (§4.1.1.3) suggests two critical metadata points essential for proving Zone & Conduit architecture.

System Category (I, II, III)

Determines the safety impact. Surveyor Tip: Always include a ‘Justification’ column to explain the safety classification.

Associated Security Zone

Defines network boundary mapping. Allows for instant verification of your Firewall/Conduit rules.

4. Standardizing Mapping & UIDs

The most common cause of audit “Non-Conformities” is a lack of traceability. If your Network Diagram, Asset Inventory, and Cable Tags do not share the same naming convention, the Auditor cannot verify the security perimeter.

Software-to-Hardware Mapping

E27 requires every physical asset to have a Unique Asset Identifier (UID) to ensure software update reliability.

Recommended UID Format: [System]-[Manufacturer]-[Sequence] NAV-FURUNO-001

Example: The Hardware-to-Software Link

Asset UID (Hardwired) Hardware Component Physical Interfaces Installed Software Version/Patch
NAV-FURUNO-001 ECDIS Processor Unit (FMD-3200) RJ45 (x2), RS-422 (x8) (Host Device) FW v3.12
↳ Linked Asset Furuno ECDIS OS v6.02 (Patch 4)
ENG-SIEMENS-042 S7-1500 PLC (Main Engine) Profinet, Modbus RTU (Embedded Device) v2.8.3

E27 Compliance Toolkit

Download our standardized Excel template and Physical Walk-through checklist to ensure your vessel’s CBS inventory meets IACS requirements.

Next Section

System Criticality Mapping

System Criticality Mapping Computer-based systems are categorized in accordance with IACS UR E22 (Cat I–III). UR E26 r...

Scroll to Top