North American Electric Reliability Corporation

NERC CIP

CIP-007-6 (Systems Security Management) · CIP-010-4 (Configuration & Vulnerability Management)

PARTIAL SUPPORT
What OTWarden covers
  • Identifies new security advisories for your OT vendors — satisfies the CIP-007-6 R2 requirement to identify patches at least every 35 days
  • Timestamped alert log shows exactly when you were notified of each vulnerability
  • Status tracking (New → Investigating → Patched / Not Applicable) documents your assessment of each advisory
  • Remediation deadline tracking shows your intended response timeline
  • Monthly PDF report and CSV export provide the audit trail CIP-007-6 auditors expect
What OTWarden does not cover
  • Categorising assets by NERC CIP impact level (High/Medium)
  • Patch testing documentation before deployment
  • Formal change management process
  • Security event monitoring and logging (CIP-007-6 R4/R5)
  • Access control and physical security requirements
Evidence OTWarden generates

Monthly PDF with every matched advisory (CVE IDs, CVSS score, severity, date, remediation status) · CSV export of full alert history · Per-alert notes documenting your assessment rationale · Remediation deadline log. These records directly support CIP-007-6 R2 documentation requirements.

International Electrotechnical Commission

IEC 62443

Primarily IEC 62443-2-3: Patch Management in the IACS Environment

PARTIAL SUPPORT
What OTWarden covers
  • IEC 62443-2-3 requires a documented process to identify, assess, and respond to patches — OTWarden provides the identification and tracking half of that process
  • Alert log documents when each advisory was received and how it was assessed
  • Status and notes fields support the evaluation documentation requirement
  • Monthly report provides a periodic review record
What OTWarden does not cover
  • Full IEC 62443 security programme (network zones, conduits, security levels)
  • Risk assessment methodology
  • Access control, authentication, and authorisation requirements
  • Incident response procedures
  • IEC 62443 certification — OTWarden is a tool, not a certifying body
Evidence OTWarden generates

Documented advisory identification log with timestamps · Assessment notes per alert · Remediation status and dates · Monthly PDF summary. Supports the patch identification and assessment documentation requirements of IEC 62443-2-3.

European Union Directive 2022/2555

NIS2

Article 21 — Cybersecurity risk management measures, including vulnerability handling

PARTIAL SUPPORT
What OTWarden covers
  • NIS2 Article 21(2)(e) requires "vulnerability handling and disclosure" policies — OTWarden supports the vulnerability identification and tracking part of that requirement
  • Demonstrates a systematic, automated process for monitoring known vulnerabilities
  • Alert history provides evidence of ongoing vulnerability awareness
  • Remediation tracking documents your response to identified vulnerabilities
  • BSI CERT-Bund feed provides EU-sourced advisories relevant to NIS2-regulated entities
What OTWarden does not cover
  • NIS2 incident reporting obligations (Article 23 — significant incident notification to authorities)
  • Governance and risk management framework requirements
  • Supply chain security obligations
  • Business continuity requirements
  • Cryptography and access control policies
Evidence OTWarden generates

Audit-ready records of vulnerability awareness and response activity · Timestamped alert log demonstrating ongoing monitoring · Remediation status tracking. Supports the vulnerability handling documentation element of NIS2 Article 21 compliance.

International Maritime Organization

IMO 2021 — MSC-FAL.1/Circ.3

Cyber risk management integrated into the ISM Safety Management System from January 2021

PARTIAL SUPPORT

MSC-FAL.1/Circ.3 requires cyber risks to be managed across five functional elements: Identify, Protect, Detect, Respond, Recover. OTWarden directly addresses the Identify element — it cannot replace the other four.

Identify
Vulnerability monitoring via advisory feeds
Protect
Network controls, access management — not covered
Detect
On-vessel anomaly detection — not covered
Respond
Incident response procedures — not covered
Recover
Recovery planning — not covered
What OTWarden covers
  • Systematic monitoring of published vulnerabilities affecting your vessel's OT vendors
  • Timestamped evidence that vulnerabilities were identified and assessed
  • Alert history suitable for ISM auditor review
  • Asset inventory to document your onboard OT equipment
What OTWarden does not cover
  • Network segmentation and access controls (Protect)
  • On-vessel anomaly detection or IDS (Detect)
  • Incident response procedures and drills (Respond)
  • Recovery planning and backup procedures (Recover)
  • Full ISM cyber procedure documentation
Evidence OTWarden generates

Automated vulnerability monitoring log demonstrating the Identify function of MSC-FAL.1/Circ.3 · Alert history with CVE IDs, CVSS scores, assessment notes, and remediation status · Asset inventory documenting onboard OT systems. Suitable for ISM auditor review as evidence of an active vulnerability monitoring process.

International Association of Classification Societies

IACS UR E26

Cyber Resilience of Ships — applies to vessels contracted on or after 1 July 2024

PARTIAL SUPPORT

Note on E27: IACS UR E27 (Cyber Resilience of Onboard Systems and Equipment) applies to equipment manufacturers — it requires them to build security into their products and maintain vulnerability disclosure processes. It is not a direct obligation on vessel operators. OTWarden does not address E27.

What OTWarden covers
  • E26.1.2.3 requires owners to "ensure all known vulnerabilities are identified and managed" — OTWarden's advisory monitoring directly addresses this
  • E26 requires maintaining an inventory of onboard OT/IT systems — OTWarden's asset inventory feature supports this
  • Alert history provides the documentation trail required for class audits
  • Remediation status tracking demonstrates active vulnerability management
What OTWarden does not cover
  • Network architecture documentation required for class submission
  • Access control and network segmentation requirements
  • Cybersecurity management plan documentation
  • Incident response and recovery planning
  • Class survey — OTWarden produces evidence, not certification
Evidence OTWarden generates

Active advisory monitoring log demonstrating ongoing vulnerability identification · Asset inventory suitable as a starting point for the E26 equipment register · Timestamped alert and response records for class auditor review.

Features that generate compliance evidence

Timestamped alert log
All plans
NERC CIP · IEC 62443 · NIS2 · IMO 2021 · IACS E26
Alert status tracking (New / Investigating / Patched / Not Applicable)
All plans
NERC CIP · IEC 62443 · NIS2
Per-alert notes
All plans
NERC CIP · IEC 62443
Remediation deadline tracking
All plans
NERC CIP · IEC 62443
CSV export of full alert history
Professional & Team
NERC CIP · IEC 62443 · NIS2
Monthly PDF compliance report
Professional & Team
NERC CIP · IEC 62443 · NIS2 · IMO 2021
Asset / device inventory
Professional & Team
IMO 2021 · IACS E26
Compliance deadline overview on dashboard
All plans
NERC CIP · IMO 2021

Start building your audit trail

14-day free trial. Add your vendors, receive your first alerts, and see the compliance dashboard before you pay anything.

Start Free Trial →
Or view pricing · read about OTWarden