IACS UR E26/E27 Cybersecurity Training Program
Welcome, Cyber Surveyor, to the Tachyon Heavy Industries training program for IACS UR E26/E27 compliance. This comprehensive training will prepare you to implement and verify cybersecurity measures for asteroid mining vessels in accordance with Intergalactic Association of Classification Societies (IACS) requirements.
In this dangerous era of corporate espionage and Void Pirate attacks, ensuring the cyber resilience of our mining fleet is not just a regulatory requirement—it's a necessity for survival in the harsh environment of deep space.
Training Phases
Your training is divided into 13 phases, each representing a critical aspect of the E26/E27 implementation process. Complete each phase to build your expertise and advance through your certification journey.
Phase 1: Project Governance
Establish the foundation for cybersecurity implementation through effective project governance, stakeholder management, and regulatory alignment.
Begin Phase 1Phase 2: Risk Identification & Scoping
Identify and assess cybersecurity risks to vessel systems, establishing the scope for security controls and countermeasures.
Begin Phase 2Phase 3: Asset Inventory & Classification
Catalog and classify all computer-based systems (CBS) on the vessel to determine security requirements and protection levels.
Begin Phase 3Phase 4: Network Security Architecture
Design and implement a secure network architecture that protects critical systems while enabling necessary operational functionality.
Begin Phase 4Phase 5: Cybersecurity Requirements & Design Description
Develop detailed cybersecurity requirements and design specifications that will guide implementation across all vessel systems.
Begin Phase 5Phase 6: Supplier Enablement & UR E27 Conformance Verification
Work with equipment suppliers to ensure their systems meet cybersecurity requirements and verify conformance with UR E27 standards.
Begin Phase 6Phase 7: Change & Configuration Management
Establish processes to manage changes to vessel systems while maintaining security and ensuring proper configuration control.
Begin Phase 7Phase 8: System Integrator Construction Phase Requirements
Implement security measures during the vessel construction phase, working with system integrators to ensure secure implementation.
Begin Phase 8Phase 9: Cyber Resilience Test Program
Develop comprehensive test plans to verify the effectiveness of cybersecurity controls and the vessel's resilience against attacks.
Begin Phase 9Phase 10: Testing Execution
Execute the test program to validate security controls, identify vulnerabilities, and verify that the vessel meets cybersecurity requirements.
Begin Phase 10Phase 11: Documentation Control & Class Liaison
Organize and manage cybersecurity documentation, working with classification society surveyors to demonstrate compliance.
Begin Phase 11Phase 12: Crew & Yard Team Awareness & Handover
Develop and deliver cybersecurity training for vessel crew and yard personnel, ensuring a smooth transition of security responsibilities.
Begin Phase 12Phase 13: Post-Delivery Support
Establish processes for maintaining vessel cybersecurity throughout its operational life, including updates, vulnerability management, and incident response.
Begin Phase 13