GMK - 3/4/05 Pg. 1 Dow Security Vulnerability Assessment Overview April, 2005 This document and any technical information contained herein was prepared.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0006r0 Submission March 2005 Steve Shellhammer, Intel CorporationSlide 1 What is a CA document? Notice: This document has been prepared.
Advertisements

Quality Improvement in the ONS Cynthia Z F Clark Frank Nolan Office for National Statistics United Kingdom.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
A Joint Code of Practice Objectives and Summary Presentation
Minnesota Port and Waterway Security Working Group Meeting April 12, 2012.
Department of Homeland Security Site Assistance Visit (SAV)
NERC Critical Infrastructure Protection Advisory Group (CIP AG) Electric Industry Initiatives Reducing Vulnerability To Terrorism.
IBM Corporate Environmental Affairs and Product Safety
EMS Checklist (ISO model)
Course Material Overview of Process Safety Compliance with Standards
Responsible CarE® Codes of Management Practices Overview
Khammar Mrabit Director Office of Nuclear Security
Major Accident Prevention Policy (MAPP) and Safety Management System (SMS) in the Context of the Seveso II Directive.
Environmental Management Systems Refresher
Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo –“View”
Internal Control–Integrated Framework
Visual 3.1 Delegation of Authority & Management by Objectives Unit 3: Delegation of Authority & Management by Objectives.
EPA Regions 9 & 10 and The Federal Network for Sustainability 2005
Chapter 14 Fraud Risk Assessment.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Pakistan Nuclear Regulatory Authority
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Securing the Chemical Sector: An Outline of the Chemical Facility Anti-Terrorism Standards (CFATS) Program May 2008.
Presented at the 2007 CUPA Conference by SRM Associates, Inc. PO Box Temecula, CA (951) Chemical Site Security and Chemical.
Producer Risk Assessment in Plant Biosecurity Management.
DHS, National Cyber Security Division Overview
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
IS Audit Function Knowledge
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Purpose of the Standards
Session 3 – Information Security Policies
Actionable Process Steps and Focused Mitigation Strategies
Business Acquisition Process Implementation & transition Closing Negotiation of the transaction Due Diligence Engagement TargetIdentification.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Internal Auditing and Outsourcing
CLICK TO EDIT MASTER TITLE STYLE TRIPR FLAMMABLE LIQUID UNIT TRAINS 1.0 PRE-INCIDENT PLANNING AND PREPAREDNESS.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Process Safety Management
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Hazards Identification and Risk Assessment
IAEA International Atomic Energy Agency. IAEA Outline Learning Objectives Introduction IRRS review of regulations and guides Relevant safety standards.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
RESPONSIBLE CARE ® SECURITY CODE Daniel Roczniak Senior Director, Responsible Care American Chemistry Council June 2010.
International Life Cycle Partnership To bring science-based life cycle approaches into practice worldwide UNEP/SETAC Life-Cycle Initiative Life Cycle Management.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
National Public Health Performance Standards Local Assessment Instrument Essential Service:6 Enforce Laws and Regulations that Protect Health and Ensure.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
OHSAS Occupational health and safety management system.
INMM Nuclear Security and Physical Protection Technical Division.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Business Continuity Planning 101
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lowell Randel Global Cold Chain Alliance/ International Institute of Ammonia Refrigeration.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.

Dow Security Vulnerability Assessment Overview
Business Impact Analysis
Securing Critical Chemical Assets: The Responsible Care® Security Code
Unit 14 Emergency Planning IS 235
Presentation transcript:

GMK - 3/4/05 Pg. 1 Dow Security Vulnerability Assessment Overview April, 2005 This document and any technical information contained herein was prepared for use by Dow employees at Dow facilities. Dow has provided for the compilation of the information in this document as a part of an effort by its employees and contractors to collect and share their experience and expertise in the areas of security. The contributors to this document believe the information provided is accurate, and they have provided this information in good faith. However, no warranty, express or implied, is given by Dow. When used by other than Dow employees, or other than in Dow facilities, those who use this document should use their independent judgment in evaluating information contained herein, and assume the risk for using the information provided in this document. Dow assumes no responsibility for damages resulting from the use of the information herein including the accuracy or reasonableness of the factual or statistical assumptions, studies or conclusions, ownership or copyright or other intellectual property rights, or personal rights of others. The user is solely responsible for compliance with applicable governmental requirements. References to "Dow" mean The Dow Chemical Company and its consolidated subsidiaries unless otherwise expressly noted.

SVA Overview WBP- 4/25/05 Pg. 2 Outline Dow Background of the SVA process Overview of Dow SVA process steps Review the type of recommendations that are generated by Dow SVAs. Expectations about Dow site vulnerability Key issues identified during Implementation General General items, Public and Private Responsibilities of companies

SVA Overview WBP- 4/25/05 Pg. 3 SVA Background After the 9/11/2001 attack on the WTC: –Focus of US authorities on Process Industry –Draft legislation (elimination of highly toxic materials, additional layers of protection) –ACC proposal: Assessment first –Mandatory in US –Additional requirements will depend upon outcome

SVA Overview WBP- 4/25/05 Pg. 4 Dow decided to use the Sandia SVA methodology Sandia National Labs under contract by the Department of Justice developed a Vulnerability Assessment Methodology for Chemical Facilities (VAM-CF) Purpose to identify vulnerabilities to attacks and recommend upgrades to reduce risk (Scenario Based) Other assessment tools - CCPS, others Dow supplements the Sandia methodology with our Emergency Services & Security audit. (Site Based) Combination of scenario and site based assessments provides Dow with a comprehensive SVA process. SVA Background (continued)

SVA Overview WBP- 4/25/05 Pg. 5 SVA Process Steps Screening of all manufacturing sites into 4 tiers –based upon perceived consequences of an attack –Used to prioritize the assessment work Established standard scope for SVAs –undesired release of a hazardous (flammable or toxic) chemical with significant off-site consequences –caused by either a potential outside (Terrorist or extremist) or an inside (disgruntled employee) adversary. Planning –Gather data from site process plants, local law enforcement and site leadership –Preliminary scenario consequence severity & threat level used to identify high priority attack scenarios

SVA Overview WBP- 4/25/05 Pg. 6 SVA Process Steps Perform Site Visit –ES&S audit – evaluates existing perimeter security and meets Security portion of EH&S Audits –SVA using Sandia Methodology confirms high priority scenarios (~ 2 hours per process plant) –Interviews of site employees from process plants & ES&S –Provide implementation support to site personnel Analysis of Findings & Recommendations –Consensus development of recommendations by SVA team –Includes consideration for removal or reduction of the hazardous material as well as mitigation to deter, detect or delay an adversary. –Impact of the recommendations is documented

SVA Overview WBP- 4/25/05 Pg. 7 SVA Process Steps Final Report & Communications –SVA report written and agreed upon by site & business –Legal review of the SVA report document –General communication to site employees that SVA was conducted –Security awareness training for site personnel –A plan is immediately developed to implement action items from the report –Third party verification of action items being completed in the US.

SVA Overview WBP- 4/25/05 Pg. 8 SVA Process Steps Sensitivity & Confidentiality of the SVA documentation –Information in the SVA is security sensitive because it provides details on the scenarios and potential consequences. (Roadmap for a terrorist) –Internal SVA related document are Dow confidential and not shared externally except as necessary to advance security or as required by law. –Documents required by US federal, state or local law are protected by law from public disclosure and safeguarded as sensitive information. –Dow internal SVA related documents are only shared within Dow on an as needed basis. Secure server used for storage

SVA Overview WBP- 4/25/05 Pg. 9 SVA and ES&S Audits – Typical Recommendations Personnel Training –security awareness training Perimeter security: –additional patrols –upgrade pipeline & utilities main junctions –reduce gates Priority Areas: –plant perimeter security fencing upgrades access control –Control room & key area security access control to control rooms & computer rooms (ID cards, video, alarms) target hardening (barricades, etc.) Process Modifications: –Inventory Reductions: Fewer, Smaller storage vessels Fewer filled railcars on site –Protection of easily accessible nozzles & valves –When practical, Inherently Safer Materials (e.g., replacement of Cl2 refrigerant) –Acceleration of implementation of Safety Instrumented System installations which will also address Security Vulnerabilities. Automation of protective functions Installation of SIS with protected code to prevent insider overrides. Frequently Less Frequently Typical Recommendations

SVA Overview WBP- 4/25/05 Pg. 10 The SVA Recommended Action items alone WILL NOT: –assure that we will or can stop a group of determined armed terrorists by these actions alone. To reduce the vulnerability and improve our site security and ability to stop or respond to an adversary before they accomplish a successful attack will require a combination of implementing the SVA action items with: –advanced intelligence combined with escalation of site security (as per our site security contingency plan) and/or –an armed response team provided by local law enforcement Working with local law enforcement and government security agencies is an essential element of our strategy SVA and ES&S Audits SVA Expectations

SVA Overview WBP- 4/25/05 Pg. 11 Dow Goals for Security Vulnerability reduction –Provide increase level of perimeter security –Implement action items to reduce all Category 1 & Category 2 (highest risk) scenarios to Category 3. –Unmitigated Category 1 or 2 scenarios must be reviewed & approved by EH&S Management Board. Responding to government regulations may require sites to review SVAs and Action Items with government agencies. –Control of sensitive information is critical –Some SVAs may be required to be redone using agency methodology SVA and ES&S Audits - OTHER KEY ISSUES L S Risk L AS Likelihood & Severity Likelihood of Adversary Success

SVA Overview WBP- 4/25/05 Pg. 12 General items, public and private From UNICE * position paper on Security Cooperation between Public authorities (authority and information) and Business (owners of the risk) cooperation is essential. Integrated EU strategy against terrorism and reduction of impact. Priority to reinforcing existing structures. Cooperation with the US. Mutual recognition of each others implementing measures. (*) Union of Industrial and Employers Confederations of Europe

SVA Overview WBP- 4/25/05 Pg. 13 General items, public and private (continued) Initiatives to fight terrorism should be followed by relevant information to the companies. They need to be able to reduce vulnerability. Joint work should lead to effective and cost- efficient security initiatives. Common implementation in the EU member states. The list of accepted standards and methodologies across the EU should include the US methodologies that are already implemented.

SVA Overview WBP- 4/25/05 Pg. 14 Responsibilities of Companies Risk Management System –Identification –Evaluation –Measures Emergency Preparedness (within the existing framework of cooperation with the Authorities) Measures need to be proportional to the (semi) quantified risks Training and Emergency Drills for Terrorist and Sabotage scenarios

SVA Overview WBP- 4/25/05 Pg. 15 General items, public and private (continued)

SVA Overview WBP- 4/25/05 Pg. 16 QUESTIONS?