1 SAND No. 2012-1606C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of.

Slides:



Advertisements
Similar presentations
C-TPAT SECURITY AWARENESS TRAINING
Advertisements

Museum Presentation Intermuseum Conservation Association.
Site Safety Plans PFN ME 35B.
Emergency Preparedness and Response
Disaster Planning What Supervisors Need to Know. Session Objectives You will be able to: Recognize the types of workplace disasters you may face Understand.
UNIT PHYSICAL SECURITY PLAN
Responsible CarE® Process Safety Code David Sandidge Director, Responsible Care American Chemistry Council June 2010.
SAND No C Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of.
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
Mike Hightower and Anay Luketa-Hanlin Sandia National Laboratories Albuquerque, New Mexico Sandia is a multiprogram laboratory operated by Sandia Corporation,
Alexander Brandl ERHS 561 Emergency Response Environmental and Radiological Health Sciences.
Transportation/Fleet Safety and Environmental Safety Travel - Hazardous Materials Transportation Security- Sandra J. Perry Consulting Services & Treatment.
Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
LLNL-PRES Lawrence Livermore National Laboratory is operated by Lawrence Livermore National Security, LLC, for the U.S. Department of Energy, National.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
INDUSTRIAL & SYSTEMS ENGINEERING
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Documentation Management Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P Sandia.
Responsible CarE® Employee health and Safety Code David Sandidge Director, Responsible Care American Chemistry Council June 2010.
Laboratory Management - 1
Developing a Chemical Risk Management Program
PERMIT REQUIRED CONFINED SPACES PERMIT REQUIRED CONFINED SPACES.
Session 3 – Information Security Policies
Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Codex Guidelines for the Application of HACCP
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
EGRESS AND FIRE PROTECTION
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
SEC835 Database and Web application security Information Security Architecture.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
INITIAL OSHA & DOT TRAINING MODULE 10 Security. INITIAL OSHA & DOT TRAINING Module 10 – Security Introduction The Transportation Security Administration.
Engineering Risk Assessments and Risk Communication Sarah Arulanandam, Hazard and Risk Group RWDI West Inc. DISCLOSURE OF MATERIAL ENVIRONMENTAL EXPOSURES:
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Risk Management for Technology Projects Geography 463 : GIS Workshop May
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Hazardous Materials Company Anti-Terrorism Tips. Overview This presentation is designed to inform companies of the appropriate steps that should be taken.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation,
1 Appendix B Initial Briefing Template. 2 Site X Vulnerability Assessment (VA) Presenter name Presenter organization Presenter phone Presenter phone/ .
Risk management and disaster preparedness
Sandia National Laboratories
Physical (Environmental) Security
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Hayes/Ninemeier: Foundations of Lodging Management. (C) 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Safety and Security.
Principles of Security
STEALTH AND DECEPTION – SPEED AND VIOLENCE: How the New Threat Affects Physical Protection Systems.
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Process Safety Management Soft Skills Programme Nexus Alliance Ltd.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Unit 1: Protecting the Facility (Virtual Machines)
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
CS457 Introduction to Information Security Systems
Risk management.
Chapter 8 – Administering Security
TWIC Training & Maritime Security Awareness
Flooding Walkdown Guidance
Presentation Objectives
HSE Case: Risk Based Approach.
Objectives Telecommunications and Network Physical and Personnel
Workshop on Accelerator Operations
Rosalyn Leitch Pacific Northwest National Laboratory
Whose Job Is It? Responsibility for Laboratory Safety and Security
Interfaces of Nuclear Safety and Security
Presentation transcript:

1 SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.

 Review the Definition and Objective of Security  First Steps - Security Awareness  Describe four Principles of Security  Impart the importance of Performance-Based Security  Provide a Model for a Systematic Approach to Security

3

Security intends to prevent intentional acts which could result in unacceptable consequences ◦ Death/Severe Injury ◦ Chemical contamination  People  Environment ◦ Political Instability ◦ Economic Loss ◦ Industrial capacity loss ◦ Negative public psychological effect ◦ Adverse media coverage 4

Chemical Security Awareness Property-Vehicles-Information-Personnel Work Area - Changes Behavior - Suspicious Procedures - Followed Access Controls Have (credential), Know (PIN), Are (biometric*) Manual (guards), Automated (machines) * Can be expensive 5

Work area changes  Hole in fence  Suspicious packages  Inventory discrepancy  Door unlocked Symptoms of others behavior who are attempting to compromise security  Elicitation  Surveillance  Ordering supplies Source: DHS Chemical Security Awareness Training Security awareness is the first step to making your facility safe from malevolent acts 6

 Testing security – walking into, wait for discovery  Mapping, loitering, staging vehicles  Taking pictures of security system  Looking in dumpster  Trying to enter on your credential  Asking for user name over the phone or by  Asking about plant layout – workers names – schedules Source: DHS Chemical Security Awareness Training 7

 Missing badge  Leaving workstation unsecured - fire alarm  Leaving sensitive document  Bypassing security Know what to do - who to call Communicate anything unusual to supervisor Remember - YOU are the first responder Know what to do - who to call Communicate anything unusual to supervisor Remember - YOU are the first responder Source: DHS Chemical Security Awareness Training 8

HAZARD Owner Controlled Area Restricted Area Vital Area Plant locations Administration Control rooms Server rooms Switchgear Process Units Rail / truck yards Stores Access Control Integrated with Areas and People Plant employees Administration /Engineering Operations Computer specialists Control room operator Process interface Shipping and receiving Maintenance Security / Safety Special employees 9

 Integration with boundary ◦ Cannot be bypassed ◦ Block individuals until access authorization verified ◦ Interfaces with the alarm system  Integration with the guards/response force ◦ Protects guard ◦ Area is under surveillance  Personnel integrate with system ◦ Easy to use for entry and exit ◦ Accommodates peak throughput (loads) ◦ Accommodates special cases 10

Personnel Authorization Verification Manual (Protective Force Guards) Have - Credential (Photo) Automated (Machines) Have - Credential (Coded) Know - Memorized Number (PIN) Are - Personal Characteristics (Biometric) Exchange Credential 11

Potential consequence severity will determine which facilities need to be secured ◦ Small-scale research laboratories  Many different chemicals used in small amounts ◦ Large-scale manufacturing plants  Limited types of chemicals used in large amounts

Risk to public health & safety release In-situ release of toxic chemicals In-situ release and ignition of flammable chemicals In-situ release/detonation of explosives chemicals Potential targets for theft or diversion Chemical weapons and precursors Weapons of mass effect (toxic inhalation hazards) IED precursors Reactive and stored in transportation containers Chemicals that react with water to generate toxic gases Source: DHS Chemical Security 13

General Principles followed to help ensure effective, appropriate security 1.Defense in Depth 2.Balanced Security 3.Integrated Security 4.Managed Risk

 Layers ◦ Physical ◦ Administrative and Programmatic Deterrence Program Pre-Event Intelligence Personnel Reliability Physical Security Mitigation of Consequences

 Physical Layers  Adversary Scenarios ◦ Adversary paths (physical) Protected Area Controlled Room Controlled Building Target Enclosure Target Path 1 Path 2

 Each Path is composed on many protection elements ◦ Walls, fences, sensors, cameras, access controls, etc…  Protection elements each possess delay and detection components ◦ For example:  Fence delays adversaries 20 seconds, and provides 50% likelihood that adversary is detected  Wall delays adversary 120 seconds and provides a 10% likelihood of detection  Guard delays adversary 20 seconds and provides a 30% likelihood of detection  Balanced protection objective: ◦ for every possible adversary path ◦ cumulative detection and delay encountered along path will be the similar ◦ regardless of adversary path ◦ NO WEAK PATH

Detection alerts Response Access Delay slows the adversary to provide time for Response Response prevents the consequence

 Contribution to security system of each can be reduced to its contribution to: ◦ Detection of adversary or malevolent event ◦ Delay of adversary ◦ Response to adversary  Integrated security evaluates composite contribution of all components to these three elements ◦ Assures that overall detection is sufficient and precedes delay ◦ Assures that adversary delay time exceeds expected response time ◦ Assures that response capability is greater than expected adversary

 How much Security is enough ??? Cost of Security Benefit of Security

 Benefits of Security is Reduced Risk  What is Risk?  Risk = Consequence Severity * Probability of Consequence  What is Security Risk?  Probability of Consequence Occurrence   Frequency of attempted event X  Probability of successful attempt  Probability of successful attempt is  1 - Probability of security system effectiveness

 The benefit (risk reduction) increases with increased security investment (cost)  However, there is a point where the increased benefit does not justify the increased cost Cost of Security Risk

 Design Constraints ◦ Understand Operational Conditions  Design Requirements ◦ Consequences to be prevented  Identify Targets to be protected ◦ Define Threats against which targets will be protected 23

What are possible sources of unacceptable consequences? Dispersal Identify areas to protect Theft Identify material to protect Target Identification 24

Characterize Types of Targets Form Storage manner and location Flow of chemicals Vulnerability of Chemicals  Flammable  Explosive  Caustic Criticality / Effect Access / Vulnerability Recoverability / Redundancy Vulnerability 25 Target Identification

Design Basis Threat: A policy document used to establish performance criteria for a physical protection system (PPS). It is based on the results of threat assessments as well as other policy considerations Threat Assessment: An evaluation of the threats- based on available intelligence, law enforcement, and open source information that describes the motivations, intentions, and capabilities of these threats 26

Define the Threats In physical security: –Knowing adversary permits customizing security to maximize effectiveness –As adversary not known, develop hypothetical adversary to customize security –Hypothetical adversary description should be influenced by actual threat data 27

 A Design Basis Threat (DBT) is a formalized approach to develop a threat-based design criteria  DBT consists of the attributes and characteristics of potential adversaries. These attributes and characteristics are used as criteria to develop a customized security system design.  The DBT is typically defined at a national level for a State.  At the facility level, also: ◦ Consider local threats  Local criminals, terrorists, protestors ◦ Consider insider threats  Employees and others with access 28 Design Basis Threat

Model: Design and Evaluation Process Outline (DEPO) Accept Risk Evaluate PPS Response Weaponry Communications Tactics Backup Forces Training Night Fighting Capability Access Delay Vehicle Barriers Stand-Off Protection Fences Target Task Time Intrusion Detection Systems Alarm Assessment Alarm Communication & Display Entry Control Characterize PPS Physical Protection Systems DelayResponseDetection Define PPS Requirements Facility Characterization Threat Definition DBT Target Identification - Vital Areas Evaluate Upgrades Evaluation of PPS Gathering Performance Data Scenario and Path Analysis - LSPTs Overpressure Analysis JCATS Simulations Process of PPS Design and Evaluation ASSESS VA Model Blast Simulations Insider Analysis – Personnel Reliability Risk Evaluation Cost Benefit Analysis Contraband and Explosives Detection 29

 Technology ◦ Intrusion Detection ◦ Entry Control ◦ Contraband Detection ◦ Unauthorized Action Detection  Supporting elements ◦ Alarm Assessment ◦ Alarm Communication ◦ Alarm Annunciation 30

Delay Adversary Delay Definition : The element of a physical protection system designed to slow an adversary after they have been detected by use of Walls, fences Activated delays-foams, smoke, entanglement Responders Delay is effective only after there is first sensing that initiates a response 31

Respond to Adversary Guard and Response Forces Guards: A person who is entrusted with responsibility for patrolling, monitoring, assessing, escorting individuals or transport, controlling access. Can be armed or unarmed. Response forces: Persons, on-site or off-site who are armed and appropriately equipped and trained to counter an attempted theft or an act of sabotage. Guards can sometimes perform as initial responders as well (both guards and response force) 32

Summary of Presentation Security systems should attempt to prevent, but be prepared to defeat an intentional malevolent act that could result in unacceptable consequences at a chemical facility Security awareness is an essential element An effective system depends on an appropriate integration of: Detect Delay Respond 33