Import and auto-classify vessel systems into Cat II/III categories. Track brand, model, firmware, and interfaces as required by E27.
Sovereign Resilience for global supply chains. Secure your vessel's critical systems—trade in any port, under any flag, meeting any surveyor's requirements.
Loading...
Find out in 3 quick steps. No signup required.
3 quick steps to understand your IACS compliance requirements
Explore E26/E27 requirements for each critical vessel zone. Hover over hotspots to see specific compliance needs. Tap on hotspots to see specific compliance needs.
Tap on hotspots to view requirements
IACS UR E26 aligns with the NIST Cybersecurity Framework's five core functions. Here's how each function maps to specific maritime compliance requirements.
Know exactly what systems exist onboard. Create and maintain a comprehensive inventory of all OT and IT assets across the vessel.
Key Requirements
Establish defensive boundaries around operational technology. Implement zones, segmentation, and access controls.
Key Requirements
Continuously monitor for anomalies and potential threats. Implement detection capabilities to identify cyber events in real-time.
Key Requirements
Execute coordinated response when incidents occur. Contain threats, communicate with stakeholders, and mitigate impact.
Key Requirements
Restore normal operations after cyber events. Ensure backup systems and recovery procedures are tested and ready.
Key Requirements
Ready to see how your current systems map to these requirements?
Check Your EligibilityEvery tool you need to meet IACS Unified Requirements E26 and E27. From asset inventory to surveyor-ready CSDD — delivered in days, not months.
Import and auto-classify vessel systems into Cat II/III categories. Track brand, model, firmware, and interfaces as required by E27.
Visual drag-and-drop network topology builder. Automatically flag zone violations and generate compliant Zones & Conduits diagrams.
Secure invite system for OEMs. Collect E27 security capabilities and hardening guidelines directly from equipment manufacturers.
Generate complete Cyber Security Design Description documents. Auto-compile asset inventories, network diagrams, and recovery plans.
Read-only dashboard for class surveyors. Complete audit trails, witnessed test logs, and SCRTP documentation.
LLM-powered final check against all 56 pages of E26 requirements. Automatically identify gaps before survey.