Example: tourism industry

Protecting Wastewater Infrastructure Assets… …

asset BASED VULNERABILITYCHECKLISTFORWASTEWATERUTILI TIESAN AMSA CHECKLISTP rotecting Wastewater Infrastructure : PHYSICAL PLANT .. 1 Perimeter .. 3 Perimeter physical barriers, such as a fence or wall Locking of perimeter gates Patrolling perimeter by guards or electronic monitoringEntry / Access Control.. 4 Limiting access to employees or people havingvalid business at the facility Controlling access by a posted guard or throughelectronic means Locking of doors and windows Strength of doors, windows and locks Entr y codes and locksets Control of visitors, photo identification, sign in and out, and facility escorts Facility tours Security of fill and vent pipes of chemical and fuel storage tanksSurveillance .. 5 Alarming of buildings and critical structures todetect intrusion Alarming of emergency exit doors Monitoring interior of buildings by closed circuit television (CCTV) Site monitoring by CCTV Continuous monitoring of alarms and CCTV with a reporting protocol Connecting alarms and monitoring systems to an uninterruptible power supply Night lighting throughout the facility for sur veillance Emergency lighting for evacuation of premises Public address or other warning system to notifypeople within a facility of an incident Overgrowt

ASSET BASED VULNERABILITY CHECKLIST FOR WASTEWATER UTILITIES AN AMSA CHECKLIST Protecting Wastewater Infrastructure Assets…

Tags:

  Infrastructures, Wastewater, Checklist, Vulnerability, Asset, Protecting, Utilities, Protecting wastewater infrastructure assets, Vulnerability checklist for wastewater utilities

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Protecting Wastewater Infrastructure Assets… …

1 asset BASED VULNERABILITYCHECKLISTFORWASTEWATERUTILI TIESAN AMSA CHECKLISTP rotecting Wastewater Infrastructure : PHYSICAL PLANT .. 1 Perimeter .. 3 Perimeter physical barriers, such as a fence or wall Locking of perimeter gates Patrolling perimeter by guards or electronic monitoringEntry / Access Control.. 4 Limiting access to employees or people havingvalid business at the facility Controlling access by a posted guard or throughelectronic means Locking of doors and windows Strength of doors, windows and locks Entr y codes and locksets Control of visitors, photo identification, sign in and out, and facility escorts Facility tours Security of fill and vent pipes of chemical and fuel storage tanksSurveillance .. 5 Alarming of buildings and critical structures todetect intrusion Alarming of emergency exit doors Monitoring interior of buildings by closed circuit television (CCTV) Site monitoring by CCTV Continuous monitoring of alarms and CCTV with a reporting protocol Connecting alarms and monitoring systems to an uninterruptible power supply Night lighting throughout the facility for sur veillance Emergency lighting for evacuation of premises Public address or other warning system to notifypeople within a facility of an incident Overgrowth of trees and shrubs that may blockviews of doors and windowsVehicle and Materials Delivery Management.

2 6 Parking of private vehicles near buildings and other structures Locking and storage of utility s vehicles Policies for the use and operation of utility s vehicles Monitoring of utility s vehicles via a real-time tracking system Inspection of deliver y vehicles Designation of distinct deliver y areas for receivingand screening packages prior to their distributionwithin a facilityCollection System .. 7 Access to sewers in the vicinity of governmentbuildings, financial districts, hospitalsand other critical commercial/industrial areas ( chemicalmanufacturing, defense plants, etc) Secured combined sewer outfalls to prevent entr y Security of tributar y collection systems operated by other entities Training of pretreatment inspectors and otheremployees to identify vulnerable points in the sewerage systemHazardous Material Control.

3 8 Identification of hazards from process chemicalsand other acutely hazardous materials Identification of acutely hazardous materials(AHMs)from adjacent establishments and facilities Tracking mechanism to account for all processchemicals and other acutely hazardous materialsreceived and used at utility facilities Gas detection equipment Information available to employees or othersresponding to hazardous chemicals or toxins that may be introduced into the sewer system or treatment plantProtecting Wastewater Infrastructure Based vulnerability checklist for Wastewater utilities asset : PEOPLE .. 9 Human Resource Policy .. 11 Policies on background checks for potentialemployees before hiring Policies on periodic criminal checks for existingemployees Procedures for employees who may be called toactive duty in the militar y Legal rights afforded to employees who arereser vists and members of the National Guard that are called for active militar y duty Policy to address compensation and benefits foremployees who are called to active duty Policy to address compensation and benefits foremployees who remain on the job for additionalperiods during an incident Plan for management to react effectively whensome employees may refuse to come to work during an incident Plan to transport personnel to and from work ifroads and streets are closed due to police order orphysically blocked as a result of an incident Plan to mitigate the concern employees may

4 Havefor their families wellbeing during a disaster Management discussion of security issues, emergency response plan, and disaster plan with union representativesPersonnel Identification and Personal Welfare .. 13 Employee photo-identification badges Employee communications equipment to rapidlyreport incidents Employee monitors for radiation, chemical or biological detection Periodic changes in employee keys and pass-codes Biometric devices to control access to sensitive areas Contractors, vendors and visitors Personal protection devices and first-aid materialsat worksites Provisions for food, water and rest for employeesthat remain on the job for extended periods of time Up-to-date list of all employees, their phone numbersand emergency contact information An employee assistance program to counselemployees and their families on life-crisis management Weapons at utility facilitiesPlanning and Training.

5 14 Employee training to properly handle a threat that is received in person, by phone, by e-mail, by mail or by other deliver y ser vice Employees know the procedures to follow should an incident occur Management knows whom to contact to report a threat or emergency Procedures for determining when and how to evacuate a building Employee training in security measures Employee training in emergency preparedness inaccordance with the utility s adopted plan Employee training to detect symptoms of a chemical or biological attack First aid training for employeesASSET: KNOWLEDGE BASE .. 17 Planning .. 18 Emergency response and disaster recover y plansupdated and distributed Plan testing for workability Management contact with law enforcement agencies,fire departments, Hazardous Materials (HazMat)teams, and the local office of the Federal Bureau of Investigation (FBI).

6 Coordination of emergencyresponse and disaster recover y plans with theseagencies Critical Business Documents .. 19 As-built drawings up-to-date and easily accessiblefor use during an incident A comprehensive contact list for employees thatincludes names and phone numbers of local lawenforcement and fire protection agencies, para-medics, emergency response teams, the local FBIoffice, and the Center for Disease Control Protection from public disclosure of documents andelectronic information that reveal vulnerabilities Designated secure location for management tomeet and strategize a response to incidents Availability of paper and electronic copies of emergency response information Procurement recordsAssociation of Metropolitan Sewerage Agencies1816 Jefferson Place, NW Washington, DC 20036-2505 202/833-AMSA : INFORMATION TECHNOLOGY.

7 21 Policies and Planning .. 22 Policies to govern and monitor Internet access and use asset Classification and Control Procedures Access Controls and Procedures relating to bothInternal and External Users Emergency response plans guidance on communi-cations options during a total loss of telephone,radio, or Internet communicationsProtection .. 23 Screening of network traffic for viruses andattacks; virus protection for computers The utility s network has a security architectureimplemented for external communications Access via modem to the utility s wide area network (WAN) vulnerability /penetration evaluations or tests on utility networks Modems attached to end-user desktop systems on the secure local area network (LAN) Local/backup power supply in the event of loss ofelectric utility supplySCADA .. 24 Single points of failure in the super visor y controland data acquisition (SCADA) system Periodic identification and backup of operational-critical applications, databases, and to an off-site facility vulnerability /penetration tests on SCADA systems The SCADA system connection to the LAN/WAN Secure locations for the SCADA system components(RTUs, central monitoring) asset : CUSTOMERS.

8 25 Communications .. 26 Utility customers have information about the plan-ning the utility has done, and procedures it has inplace, to mitigate the effect of ser vice interruptions Customers have information to cope with ser viceinterruptions Discussions of emergency planning efforts and possible consequences that may result with theappropriate regulator y agencies Boilerplate draft press releases and public noticesfor use during an incident A trained spokesperson as point-of-contact for the media Management meetings with representatives of thejurisdiction s HazMat team, fire/rescue departmentand law enforcement agency to assure that the utility will be made aware of any hazardous materials that might enter the sewer system during an incident Advising industrial, educational and governmentcustomers to examine their internal collection systems for vulnerabilities and share the information with the utility Customers are aware of what activities they should report (and who to call) if they witnesssomething unusual with a utility vehicle, employee,or system assetFinance.

9 27 Access to funds and investment records Coordination with billing agency (in many cases,such as the local water supplier, tax collector, orother local entity) to assure continued collection of Wastewater charges and fees during an incidentand recover y Maintenance of sufficient reser ves to fund opera-tions over a pre-planned period when cash flow maybe hampered due to interruption in mail or electronicfunds transfer ser vice, delay in revenue submittalfrom the water supplier, or other adverse event Availability of a contingency line item or reser ves to pay for overtime, tanker trucks and other incident-response actions to maintain basic customer ser vicesASSET BASED VULNERABILITYCHECKLISTFORWASTEWATERUTILI TIESP rotecting Wastewater Infrastructure of Metropolitan Sewerage Agencies1816 Jefferson Place, NW Washington, DC 20036-2505 202/833-AMSA Wastewater Infrastructure Based vulnerability ChecklistcFOREWORD.

10 IACKNOWLEDGEMENTS .. iiiEXECUTIVE SUMMARY .. v What the checklist Is and Isn t .. v The Framework .. viI. asset : PHYSICAL PLANT.. 1 Perimeter .. 3 Entry/Access Control .. 4 Surveillance .. 5 Vehicle and Materials Delivery Management .. 6 Collection System .. 7 Hazardous Material Control .. 8II. asset : PEOPLE .. 9 Human Resource Policy .. 11 Personnel Identification and Personal Welfare .. 13 Planning and Training .. 14 III. asset : KNOWLEDGE BASE .. 17 Planning .. 18 Critical Business Documents.. 19IV. asset : INFORMATION TECHNOLOGY .. 21 Policies and Planning .. 22 Protection.. 23 SCADA.. 24V. asset : CUSTOMERS .. 25 Communications .. 26 Finance.. 27 AMSA Wastewater Infrastructure SECURITY TASK FORCE .. 29 AMSA OFFICERS AND BOARD OF DIRECTORS .. 30 AMSA MEMBER AGENCIES .. 32 Table of ContentsProtecting Wastewater Infrastructure Based vulnerability checklist for Wastewater utilities Protecting Wastewater Infrastructure Based vulnerability ChecklistdPROTECTING Wastewater Infrastructure Based vulnerability ChecklistdAsset Based vulnerability checklist for Wastewater utilities Association of Metropolitan Sewerage Agencies (2002)This work is protected by copyright and may not be reproduced, stored in a retrieval system, or transmitted in anyform or by any means electronic, mechanical, photocopying or otherwise without the written permission of theAssociation of Metropolitan Sewerage Agencies (AMSA), which is the owner of the work contains information on the planning and preparation for crisis and extreme events, and the protectionof Wastewater utility assets.


Related search queries