IACS UR E26/E27 is now mandatory for newbuilds. Is your vessel survey-ready?
The Digital Bulkhead for Maritime Cyber Resilience

Drop Anchor on
Compliance Chaos

Sovereign Resilience for global supply chains. Secure your vessel's critical systems—trade in any port, under any flag, meeting any surveyor's requirements.

85%
Faster Compliance
Zero
Failed Surveys
IACS Compliance Clock
000
DAYS
00
HRS
00
MIN
00
SEC

Loading...

⚡ 60-Second Eligibility Check

Is Your Vessel Survey-Ready?

Find out in 3 quick steps. No signup required.

Check Your Vessel's Eligibility

3 quick steps to understand your IACS compliance requirements

Interactive Vessel Map

System-by-System Compliance

Explore E26/E27 requirements for each critical vessel zone. Tap on hotspots to see specific compliance needs.

Tap on hotspots to view requirements

NIST Cybersecurity Framework • IACS UR E26

IACS Simplified

IACS UR E26 aligns with the NIST Cybersecurity Framework's five core functions. Here's how each function maps to specific maritime compliance requirements.

1
ASSET MANAGEMENT

Identify

Know exactly what systems exist onboard. Create and maintain a comprehensive inventory of all OT and IT assets across the vessel.

Key Requirements

  • Complete CBS inventory (E26 4.1.1)
  • System categorization Cat I/II/III (E26 4.1.2)
  • Network topology documentation (E26 4.2.1)
2
ACCESS CONTROL

Protect

Establish defensive boundaries around operational technology. Implement zones, segmentation, and access controls.

Key Requirements

  • Network segmentation (E26 4.2)
  • Access control & authentication (E26 4.3)
  • Secure remote access (E26 4.4)
3
MONITORING

Detect

Continuously monitor for anomalies and potential threats. Implement detection capabilities to identify cyber events in real-time.

Key Requirements

  • Security monitoring (E26 4.5)
  • Anomaly detection systems (E26 5.2)
  • Audit logging & alerting (E26 4.6)
4
INCIDENT HANDLING

Respond

Execute coordinated response when incidents occur. Contain threats, communicate with stakeholders, and mitigate impact.

Key Requirements

  • Incident response procedures (E26 4.6)
  • Communication protocols (E26 4.6.2)
  • Threat containment measures (E26 4.6.3)
5
BUSINESS CONTINUITY

Recover

Restore normal operations after cyber events. Ensure backup systems and recovery procedures are tested and ready.

Key Requirements

  • Backup & recovery plans (E26 4.7)
  • System restoration procedures (E26 4.7.2)
  • Security testing protocols (E26 5.1)

Ready to see how your current systems map to these requirements?

Check Your Eligibility
Built for the Regulatory Bottleneck

Complete Compliance Toolkit

Every tool you need to meet IACS Unified Requirements E26 and E27. From asset inventory to surveyor-ready CSDD — delivered in days, not months.

E26 4.1.1
Asset Inventory Engine

Import and auto-classify vessel systems into Cat II/III categories. Track brand, model, firmware, and interfaces as required by E27.

E26 4.2.1
Guardian Grid Modeler

Visual drag-and-drop network topology builder. Automatically flag zone violations and generate compliant Zones & Conduits diagrams.

E27 3.1
Supplier Portal

Secure invite system for OEMs. Collect E27 security capabilities and hardening guidelines directly from equipment manufacturers.

E26 3.1
One-Click CSDD Export

Generate complete Cyber Security Design Description documents. Auto-compile asset inventories, network diagrams, and recovery plans.

E26 5.1
Surveyor Evidence Vault

Read-only dashboard for class surveyors. Complete audit trails, witnessed test logs, and SCRTP documentation.

E26/E27
AI Compliance Review

LLM-powered final check against all 56 pages of E26 requirements. Automatically identify gaps before survey.

Every Day Delayed is Revenue Lost

Your Competitors Are Shipping On Time

Vessels waiting for E26/E27 certification cannot be delivered. How much longer can you afford manual compliance processes that take 10-16 weeks?