IACS UR E26/E27 Cybersecurity Training Program

Welcome, Cyber Surveyor, to the Tachyon Heavy Industries training program for IACS UR E26/E27 compliance. This comprehensive training will prepare you to implement and verify cybersecurity measures for asteroid mining vessels in accordance with Intergalactic Association of Classification Societies (IACS) requirements.

In this dangerous era of corporate espionage and Void Pirate attacks, ensuring the cyber resilience of our mining fleet is not just a regulatory requirement—it's a necessity for survival in the harsh environment of deep space.

Training Phases

Your training is divided into 13 phases, each representing a critical aspect of the E26/E27 implementation process. Complete each phase to build your expertise and advance through your certification journey.

Phase 1: Project Governance

Establish the foundation for cybersecurity implementation through effective project governance, stakeholder management, and regulatory alignment.

Begin Phase 1

Phase 2: Risk Identification & Scoping

Identify and assess cybersecurity risks to vessel systems, establishing the scope for security controls and countermeasures.

Begin Phase 2

Phase 3: Asset Inventory & Classification

Catalog and classify all computer-based systems (CBS) on the vessel to determine security requirements and protection levels.

Begin Phase 3

Phase 4: Network Security Architecture

Design and implement a secure network architecture that protects critical systems while enabling necessary operational functionality.

Begin Phase 4

Phase 5: Cybersecurity Requirements & Design Description

Develop detailed cybersecurity requirements and design specifications that will guide implementation across all vessel systems.

Begin Phase 5

Phase 6: Supplier Enablement & UR E27 Conformance Verification

Work with equipment suppliers to ensure their systems meet cybersecurity requirements and verify conformance with UR E27 standards.

Begin Phase 6

Phase 7: Change & Configuration Management

Establish processes to manage changes to vessel systems while maintaining security and ensuring proper configuration control.

Begin Phase 7

Phase 8: System Integrator Construction Phase Requirements

Implement security measures during the vessel construction phase, working with system integrators to ensure secure implementation.

Begin Phase 8

Phase 9: Cyber Resilience Test Program

Develop comprehensive test plans to verify the effectiveness of cybersecurity controls and the vessel's resilience against attacks.

Begin Phase 9

Phase 10: Testing Execution

Execute the test program to validate security controls, identify vulnerabilities, and verify that the vessel meets cybersecurity requirements.

Begin Phase 10

Phase 11: Documentation Control & Class Liaison

Organize and manage cybersecurity documentation, working with classification society surveyors to demonstrate compliance.

Begin Phase 11

Phase 12: Crew & Yard Team Awareness & Handover

Develop and deliver cybersecurity training for vessel crew and yard personnel, ensuring a smooth transition of security responsibilities.

Begin Phase 12

Phase 13: Post-Delivery Support

Establish processes for maintaining vessel cybersecurity throughout its operational life, including updates, vulnerability management, and incident response.

Begin Phase 13