Part of the IDENTIFY Playbook ← Return to Hub

Roles & Change Management

UR E26 Compliance Summary: The “Identify” element mandates a detailed asset inventory (names/versions per §4.1.1) and a mapping of system interdependencies and data flows. To maintain the vessel’s resilience profile, owners must define key cybersecurity roles and implement a Management of Change (MoC) process (per §5.3.1) to ensure the inventory and CSDD remain accurate throughout the ship’s operational life.

1. Cybersecurity Roles

Compliance requires that specific individuals are tasked with maintaining the “Identify” database. Use this matrix to assign duties within your Ship Cyber Security and Resilience Program (SCSRP).

Role Core Responsibility (Identify Phase)
Company Cyber Security Officer (CCSO) Fleet-wide policy oversight; approval of MoC requests.
Shipboard Cyber Lead (Master/ETO) Verifying physical inventory; logging local software changes.
Technical Superintendent Ensuring OEMs/Vendors provide CSDD updates after repairs.

2. Management of Change (MoC) Procedure

When a system is repaired, replaced, or updated, the following workflow must be followed to maintain Class compliance:

1

Change Request: Document why the change is needed (e.g., hardware failure, mandatory firmware update).

2

Risk Assessment: Evaluate if the change introduces new protocols or network connections.

3

Inventory Update: Log new MAC addresses, Serial numbers, and Software versions in the Asset Inventory.

4

CSDD Revision: Update the Cyber System Definition Document to reflect the current “As-Built” state.

Next Security Phase

CSDD & Exclusion Assessment

CSDD & Exclusion Assessment UR E26 5.1.1 & 6: The Cyber System Definition Document (CSDD) is the mandatory technical file submitted for Class approval. Section 6 provides the framework for a Risk-Based Exclusion, allowing systems to be removed from t...

Continue to CSDD & Exclusion Assessment →

Scroll to Top