Chemical Facility Anti-Terrorism Standards

Similar documents
2008 National Ag Safety School. Richard Gupton Vice President, Legislative Policy & Counsel Agricultural Retailers Association

Canadian Chemical Engineering Conference Edmonton, Alberta October 30, 2007

How AlienVault ICS SIEM Supports Compliance with CFATS

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

Chemical Facility Anti- Terrorism Standards

The Office of Infrastructure Protection

The Office of Infrastructure Protection

The Office of Infrastructure Protection

The Office of Infrastructure Protection

Securing the Chemical Sector:

Statement for the Record. Rand Beers Under Secretary National Protection and Programs Directorate Department of Homeland Security

The Office of Infrastructure Protection

Understanding CFATS: What It Means to Your Business Chemical Facility Anti-Terrorism Standards John C. Fannin III, CPP, LEED AP

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Why you should adopt the NIST Cybersecurity Framework

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Implementation of Chemical Facility Anti-Terrorism Standards (CFATS): Issues for Congress

The Office of Infrastructure Protection

National Policy and Guiding Principles

Implementation of Chemical Facility Anti-Terrorism Standards (CFATS): Issues for Congress

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Continuous protection to reduce risk and maintain production availability

Member of the County or municipal emergency management organization

Implementation of Chemical Facility Anti-Terrorism Standards (CFATS): Issues for Congress

An Update on Security and Emergency Preparedness Standards for Utilities

The Office of Infrastructure Protection

The J100 RAMCAP Method

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Effective Leadership, Role of Workers & Labor Organizations

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

The Office of Infrastructure Protection

RECENT DEVELOPMENT. Scott Goodman

EXECUTIVE ORDER Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

how to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical.

Best Practices in ICS Security for System Operators

Security Standards for Electric Market Participants

Control Systems Cyber Security Awareness

Chapter 1. Chapter 2. Chapter 3

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

SOC 3 for Security and Availability

DHS Cybersecurity: Services for State and Local Officials. February 2017

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Emergency Management Response and Recovery. Mark Merritt, President September 2011

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Office of Infrastructure Protection Overview

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Implementing Executive Order and Presidential Policy Directive 21

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

June 5, 2018 Independence, Ohio

Digital Wind Cyber Security from GE Renewable Energy

All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011

Cyber Security Program

Compliance with ISPS and The Maritime Transportation Security Act of 2002

DFARS Cyber Rule Considerations For Contractors In 2018

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust

S&T Stakeholders Conference

Port Facility Cyber Security

Cybersecurity & Privacy Enhancements

Port Facility Cyber Security

ISAO SO Product Outline

PIPELINE SECURITY An Overview of TSA Programs

Cyber Security Requirements for Supply Chain. June 17, 2015

Navigation and Vessel Inspection Circular (NVIC) 05-17; Guidelines for Addressing

The Value of Bipartisanship

POSITION DESCRIPTION

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The Honest Advantage

Department of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise

Chapter X Security Performance Metrics

General Framework for Secure IoT Systems

G7 Bar Associations and Councils

Hazard Management Cayman Islands

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Keys to a more secure data environment

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Information Security Controls Policy

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

TEL2813/IS2820 Security Management

Physical security advisory services Securing your organisation s future

The NIS Directive and Cybersecurity in

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Critical Infrastructure Resilience

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

Overview of the Cybersecurity Framework

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

Transcription:

www.riskwatch.com Chemical Facility Anti-Terrorism Standards

Understanding CFATS and Its Impacts upon My Business This white paper discusses the importance of understanding the for better implementation of process to achieve chemical security in facilities that handle, store or distribute high risk chemicals. It suggests specific strategies as to how collaboration with government agencies and technological support can help in mitigating chemical security risks, and thereby attain compliance with homeland security regulations. The white paper establishes that an integrated approach helps streamline CFATS compliance, manage security risks and reduce overall operating costs.

Introduction As a part of the nation s critical infrastructure security, the processing of chemical, its storage, distribution and transportation are issues of significant importance and much misunderstanding. The Congress has mandated specific guidelines and methodologies to assist high risk chemical facilities to assess, plan and implement a designated level of security. Interestingly, the scope of chemical security not only includes traditional chemical facilities such as chemical plants, electrical generating facilities and refineries, but has expanded to cover agricultural retailers, semiconductor manufacturers and liquefied petroleum facilities that produce, handle, or store high risk chemicals at or above a specified quantity. While chemical safety has long been a concern in the United States spurring legislative proposals from time to time, the events of September 11, 2011 triggered a nationwide re-evaluation of the security of industrial facilities that use hazardous chemicals in quantities that could potentially harm in devastating proportions in the event of a terrorist-caused chemical release. Organizations such as the Department of Homeland Security (DHS) help private sector facilities in achieving process improvement for secure use and storage of high risk chemical. The Chemical Facility Anti-Terrorism Standards (CFATS), effective 8 June 2007, under the DHS refers to a set of comprehensive federal security regulations for chemical facilities considered to pose high risk to vulnerable populations in the event of a terrorist attack. The 113rd Congress extended the authority of CFATS to regulate chemical facilities through 15 January 2014. As opposed to the mistaken impression of CFATS as a chemical facility regulation, it is, in fact, a regulation that covers facilities that use chemicals in the U.S. CFATS defines security requirements for facilities that produce, process, store or distribute specific quantities of approximately 322 chemicals that DHS has identified as being extremely dangerous. These chemicals, often referred to as Chemicals of Interest (COIs), include common industrial substances such as chlorine, propane, and anhydrous ammonia, as well as chemicals used in specialized facilities. The DHS considers each chemical in the context of three threats: release; theft or diversion; and sabotage and contamination. Although historically chemical facilities have volunteered to engage in security activities, policymakers have been outspoken in expressing their concerns over the vulnerabilities of the involved facilities. COIs have been listed in Appendix A of the regulation due to the perceived security threat and in recognition of the potential harm that a large, sudden release of chemicals poses to the nation as a whole.

Four-Step Process Currently, compliance with CFATS requires each facility to undergo a four-step process, with provisions for repeating any of the processes when the situation arises to do so. Step One: Top Screen Top Screen is an online preliminary screening assessment via DHS secure web-based system known as the Chemical Security Assessment Tool (CSAT) that determines the presence and amount of potentially harmful chemicals, and other facility details in an effort to develop a ranking on their relative risk. Chemical facilities with greater than specified quantities, called screening threshold quantities (STQ), of any of the 322 chemicals of interest must submit a CFATS Top Screen. DHS analyzes the worst-case consequences resulting from an incident at the facility. The evaluation yields two possible results: either categorized as not High Risk or classified as High Risk. Not High Risk facilities receive letter intimating the same while letters to High Risk facilities inform these in addition to stating the status: Names of COIs that concern DHS; Security issues associated with these COIs; the time by which the facility must complete the next step in CFATS compliance; and the facility s preliminary Tier ranking, varying from 1 to 4 of decreasing risk. Tier 1 is the highest risk; Tier 4 is the lowest of the high-risk rankings. As of October 2013, the DHS has assessed initial information submissions from more than 44,000 chemical facilities. Approximately 4,300 facilities have been identified as high-risk and the other approximately 39,700 facilities are low-risk.

Step Two: Security Vulnerability Assessment (SVA) Based on the results of the Top Screen, DHS categorizes facilities into Tiers 1-4. Those in Tiers 1-3 (High Risk) are required to complete a Security Vulnerability Assessment (SVA) to determine the likelihood that unwanted consequences can be prevented based on the security posture of the respective facility. Completed online at a DHS CSAT tool, SVA requires facilities to provide greater detail on CIOs, facility inventory, security equipment, access control procedures, and inventory shipping and receiving procedures. The submission may lead to either of three possible results: A facility could be removed from the list of high-risk facilities; the preliminary tier ranking could be confirmed; or the preliminary tier ranking could be changed. The SVA serves two purposes: To determine or confirm the placement of a facility in the risk-based tier; and to provide a baseline against which to evaluate the site security plan activities. The table below shows the number of high-risk facilities in each tier: Risk Tier High-Risk Facilities by DHS under CFATS (As of October 21, 2013) Facilities with Final Tier Decision Facilities Awaiting Final Tier Decision 1 110 12 125 2 359 47 406 Total Facilities 3 1039 161 1200 4 1898 684 2562 Total 3406 904 4293

Step Three: Site Security Plan (SSP) The facilities must then develop a CSAT Site Security Plan (SSP) which ensures that covered facilities develop and implement a security plan appropriate for their relative risk. Under the law, each facility must design a SSP to address 18 separate Risk Based Performance Standards (RBPS) in a manner that is appropriate for that particular facility. DHS ascertains whether the security measures indicated in the SSP meet the risk-based performance standards. CFATS Risk-Based Performance Standards 1. Restricted Area Perimeter 2. Secure Site Assets 3. Screen and Control Access 4. Deter, Detect and Delay 5. Shipping, Receipt and Storage 6. Theft and Diversion 7. Sabotage 8. Cyber 10. Monitoring 11. Training 12. Personnel Surety 13. Elevated Threats 14. Specific Threats, Vulnerabilities or Risks 15. Report of Significant Security Incidents 16. Significant Security Incidents 17. Records

Step Four: Authorization and Compliance Upon approval of SSP, a facility receives a time frame within which it must implement the plans. Then DHS begins on-site inspections to verify implementation, which must include practices detailed in the RBPS requirements. As of 21 October 2013, DHS had authorized or conditionally authorized 766 site security plans, and inspected and approved the site security plan at 348 facilities. Noncompliance can result in substantial penalties, including authority for DHS to shut down facilities and fines amounting to $25,000 per day. Facilities that fall into Tiers 1 or 2 must resubmit Top Screens every two years and those in Tier 3 or 4 in every three years. CFATS regulations offer the option for regulated facilities to submit an Alternative Security Plan (ASP) in lieu of the standard SSP to leverage existing security investments, in order to enhance private innovation. The ASP provision allows facilities to prioritize security measures that meet their needs and leverage existing investments. Some companies have already invested substantial money into the improvement of technology through high-tech cameras, new fences, better IDs, and more guards. These initiatives indicate that serious efforts are being made in the private sector to meet chemical facilities security needs. Also the DHS encouragement to apply for certification under the Support Anti-terrorism by Fostering Effective Technologies (SAFETY) Act will help private sector innovation as it lowers the liability risks of creating products for combating terrorism. The development of the CFATS regulatory structure is guided by four principles: 1. Securing high-risk chemical facilities is a comprehensive undertaking that involves a national effort, including all levels of government and the private sector. 2. Risk-based tiering to guide resource allocations. 3. Reasonable, clear, and calibrated performance standards will lead to enhanced security. 4. Recognition of the progress many companies have already made in improving facility security leverages those advancements. Overall, the number of facilities assigned a risk tier by DHS has declined since the CFATS began, enabling the regulator to assert that CFATS program is inducing entities to voluntarily reduce the chemical holdings to levels below the regulated quantity.

CFATS Concerns However, the program has been subject to programmatic and administrative challenges on grounds of implementation of best practices including the lack of transparency of facility tiering and risk assessments. Concerns have also been raised that DHS s risk-analysis capabilities and methods are largely inadequate for informing departmental decisions. The 18 RBPS are intended to promote the development and implementation of best practices without inhibiting business and innovation. However, in reality, they have been quite different, leaving facilities largely uncertain over what is expected of them in meeting the DHS s standards. Conflicting feedback from inspectors in the course of pre-authorization visits and authorization inspections reflected issues in training and hiring capable and experienced inspectors. There have been many calls for further regulation of the chemical sector with calls for the extension of CFATS regulations to exempted facilities, particularly public water and wastewater treatment facilities. There have also been calls for Inherently Safer Technology (IST) mandate which would require companies to consider alternative safer chemicals to replace the potentially dangerous chemicals of interest. However, industry leaders have opposed this mandate, claiming that it would be potentially harmful to both industry and security. They argue that it will increase business costs, placing an increased burden on manufacturers, and that the mixing of chemicals necessary to substitute certain COIs have the potential to be equally dangerous, or even more dangerous than the COIs themselves. Position of the Private Sector Although the CFATS program places the responsibility for solving security concerns on the federal government, private sector facilities, state and local governments must cross-collaborate to enhance U.S. chemical security. While the government must determine facilities risk levels, set performance standards, and assess security plans and compliance, the DHS and the private sector should join hands to develop commonsense, market-conscious policy solutions. Facility owners ought to be detailed on how the information provided by facilities in a security vulnerability assessment is analyzed, how tiering decisions are made, and potential changes that would affect a facility s tier level. It will help facility owners to inform decisions about management practices. The DHS should take a truly risk-based approach to chemical security in order to promote security policies that both keep the nation safe and respect its free-market principles. The authorities should guard against excessive regulation and leave room for creative, cost-effective private-sector solutions. Greater investment through public-private partnerships in technology creation will ensure that critical infrastructure is protected and is equally capable of bouncing back quickly when disaster strikes. Transparent policies and sufficient cooperation with the public sector will help in collaborative development of commonsense, market-conscious policy solutions for U.S. chemical security.

Technology for CFATS Compliance Private sector companies must consider CFATS compliance as a part of the overall security management strategy and emphasize on the development of an integrated and cost effective approach to site security that incorporates the risk posed by terrorism and at the same time adequately covers common security issues. As the compliance requirements for CFATS are specific to anti-terrorism issues, companies need to select appropriate security upgrades designed for the evolved threat of terrorism. It is also crucial to ensure that investment in security systems and equipment, which create the layers of protection, meet the needs of DHS. The security manager needs to comprehend the full range of critical assets, threats, and vulnerabilities involved to address them adequately. Companies should aim at identifying: The range of critical assets, threats, and vulnerabilities not explicitly considered under CFATS. Additional investments to support necessary security upgrades to aid in staying complaint. Optimization of the security suite to meet both DHS and other facility security goals. Specific vulnerabilities as compared to the RBPS. Differences in CFATS assets identified in the SVA as compared to all processes and chemical storage areas that may be critical due to business impact. Collectively, the RBPS standards signal at the requirement for a synergistic approach to chemical security management, specifically the need for monitoring employee identity and access control to restricted areas. For example, RBPS 3 specifies the need to Screen and Control Access which requires facilities to implement a regularly updated... system that checks the identification of facility personnel and other persons seeking access to the facility. While RBPS 7 calls for deterrence of insider sabotage, RBPS 8 is specific to cyber sabotage for terrorist purposes. RBPS 12 requires appropriate background checks and security training of facility personnel, and necessitates procedures aimed at validating insiders identity and for visitors with access to critical areas. An effective chemical security program should complement existing processes, and chemical security assessments should consider all safety related risks including sabotage, theft workplace violence, contamination, etc. Companies usually screen their own employees, however, contractors and non-company workers with equal levels of access go unnoticed. For firms with multiple operations self-assessment and planning processes should be developed to elicit involvement by all facilities, large and small alike. Chemical firms must aim at employing comprehensive emergency planning and response processes through dedicated security managers. Facilities need to perform security and vulnerability assessments, and develop chemical security related policies, plans and procedures and audit methodologies. Staffs training in security awareness, workplace violence prevention supported by emergency plans and periodic review of security departments also help in staying compliant. Proactive security surveys and/or vulnerability assessments offer a perspective on where you stand and help to plan for where you should be while helping mitigate liabilities. Complying with CFATS requires multiple stages of evaluation and compliance, and technological solution can assist a chemical facility s efforts to meet CFATS guiding principles in several ways. A software-based solution renders CFATS compliance an element of day-to-day operations rather than an independently managed project and provides a secure approach to managing physical access. Software can integrate with an existing physical security infrastructure and can automate all processes related to personnel and visitors checks. A software-based system adds value in ensuring compliance and providing security metrics, and prepares organizations to prevent risk-based events before they occur. Private sector facilities must collaborate with a preferred partner who can provide a specific and scalable security solution that cost-effectively addresses each of the relevant Risk-based Performance Standards (RBPS). Although the responsibility for chemical security is shared among federal, state, and local governments, the onus is on private sector facilities to maintain a constant vigil against chemical misappropriation. A chemical facility that adopts an integrated approach will improve its security posture in a defining way by identifying a broader range of risks unique to the facility. The strategy will help in identifying safeguards to protect the facility against the risks that drive CFATS, and eliminating risks that facilities face every day. The CFATS regulation may evolve with further congressional action and facilities opting for broader view now will be better positioned to meet changes in future chemical security regulation.