IMPROVE WP 1

advertisement
Security Vulnerability
Assessment Tool
Prepared by the IMPROVE consortium – August 2010
Improve knowledge of effective critical
infrastructure protection
With the support of the Prevention, Preparedness and Consequence Management of
Terrorism and other Security-related Risks Programme
European Commission – Directorate-General Home Affairs
This project has been funded with the support from the European Commission. This
publication reflects the views only of the authors, and the Commission cannot be held
responsible for any use which may be made of the information contained therein.
This document contains sensitive information and is intended solely for the use and
information of the organisation having obtained authorisation.
No part of this publication may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means (electronic, mechanical, photocopying,
recording or otherwise) without the prior written permission of the authors.
116102555
Page 2
Improve knowledge of effective critical
infrastructure protection
MAIN AUTHORS OF THE DOCUMENT:
Cefic – European Chemical Industry Council
Filip Jonckheere
EU.select
Jim Castle, Pierre-Michael Gröning and Mike Zeegers
NAVI – Dutch National Advisory Centre for the Critical Infrastructure
Arno Bilderbeek and Marcel Spit
INERIS – French National Institute for Industrial and Environmental Risk
Samantha Lim
WITH CONTRIBUTION FROM:
JRC – Joint Research Centre
FOI – Swedish Defence Research Agency
Regional Government of Styria
Technical University of Ostrava
IMPROVE consortium – August 2010
All documents including the set of accompanying spreadsheets are available as electronic
versions after registration at Cefic. For more information on the accessibility and the
content please contact Filip Jonckheere (FJO@cefic.be).
116102555
Page 3
Improve knowledge of effective critical
infrastructure protection
TABLE OF CONTENT
0 Introduction and Overview....................................................................................................... 7
0.1
Scope of the Security Vulnerability Assessment (SVA) ............................................................. 7
0. 2
Cost Benefit Analysis of the SVA............................................................................................... 9
0.3
How and where to obtain the necessary expertise to complete the SVA .............................. 10
0.4
A brief management overview of the SVA process ................................................................. 11
0.5 The strategic and business benefits of completing the SVA and implementing regular review
of SVA’s ............................................................................................................................................. 12
0.6
1
2
3
Justification of the selection of the CCPS methodology (versus RAMCAP and EURAM) ........ 13
Step 1 Project Plan for the SVA.......................................................................................... 22
1.1
Clarify the Objectives of a Security Vulnerability Assessment .............................................. 22
1.2
Define the scope of the SVA .................................................................................................. 23
1.3
Define the context of the SVA and familiarise with appropriate regulations ....................... 23
1.4
Selection of the SVA team ..................................................................................................... 23
Step 2 Facility Characterisation ......................................................................................... 26
2.1
Facility Description ................................................................................................................ 26
2.2
General security policy of the site ......................................................................................... 28
2.3
Existing countermeasures ..................................................................................................... 29
2.4
Determination of the site attractiveness .............................................................................. 30
Step 3 Assets Analysis ....................................................................................................... 34
3.1
Identification of the principal assets ..................................................................................... 34
3.2
Classification of attractiveness .............................................................................................. 37
3.3
Determination of the Asset Impact ....................................................................................... 40
3.4
Risk Profile of the Principal Assets ........................................................................................ 43
116102555
Page 4
Improve knowledge of effective critical
infrastructure protection
4
5
6
Step 4 Threat Analysis ....................................................................................................... 45
4.1
Identification of Adversaries and Their Methods of Attack .................................................. 45
4.2
Ranking the Threats............................................................................................................... 47
Step 5 Security Vulnerability Assessment (SVA) ................................................................. 50
5.1
Creation of the Threat Scenarios........................................................................................... 50
5.2
Risk Matrix: Severity & Likelihood of a Threat Scenario ....................................................... 54
5.3
Vulnerability Analysis ............................................................................................................ 55
Step 6 Identification of Additional Security Countermeasures ............................................ 59
6.1
Analysis of additional permanent countermeasures ............................................................ 60
6.2
Prioritisation of the Proposed Additional Security Countermeasures .................................. 64
6.3
Enhanced countermeasures .................................................................................................. 65
7
Overview of the SVA methodology ..................................................................................... 66
8
Appendix 1 Links between the SEVESO DIRECTIVE requirements and the SVA .................... 69
9
Appendix 2 Protection Strategies for Site Security Management ........................................ 73
10
Appendix 3 Threat Catalogue ............................................................................................ 77
11
Appendix 4 Glossary, References and Bibliography ......................................................... 83
12
Appendix 5 Worked Example ............................................................................................ 85
12.1
Introduction ........................................................................................................................... 85
12.2
Step 1 and 2 ........................................................................................................................... 85
12.3
Step 3 Assets Analysis............................................................................................................ 86
12.4
Step 4 Threat Analysis ........................................................................................................... 93
12.5
Step 5 Security Vulnerability Assessment (SVA).................................................................... 95
116102555
Page 5
Improve knowledge of effective critical
infrastructure protection
13
Appendix 6 The Operator Security Plan ............................................................................100
13.1
Introduction ......................................................................................................................... 100
13.1.1
Objectives of this Annex .............................................................................................. 100
13.1.2
Operator Security Plan ................................................................................................ 100
13.1.3
Why a Security Plan? ................................................................................................... 100
13.1.4
Effectiveness ................................................................................................................ 100
13.2
Best Practices ...................................................................................................................... 101
13.2.1
Process......................................................................................................................... 101
13.2.2
Selection of security measures .................................................................................... 102
13.2.3
Implementation and maintenance .............................................................................. 102
13.3
OSP Contents and structure ................................................................................................ 103
13.3.1
Introduction ................................................................................................................. 104
13.3.2
Security Program ......................................................................................................... 104
13.3.3
Operational Policies and Procedures .......................................................................... 104
13.3.4
Physical Security Measures ......................................................................................... 105
13.3.5
Personnel Security Measures ...................................................................................... 105
116102555
Page 6
Improve knowledge of effective critical
infrastructure protection
0 Introduction and Overview
0.1
Scope of the Security Vulnerability Assessment (SVA)
Risk can be defined as the combination of the probability of an event and its consequences (ISO/IEC
Guide 73). Risk management protects and adds value to the organisation and its stakeholders
through supporting the organisation’s objectives by:
 providing a framework for an organisation that enables future activity to take place in a
consistent and controlled manner
 improving decision making, planning and prioritisation by comprehensive and structured
understanding of business activity, volatility and project opportunity/threat
 contributing to more efficient use/allocation of capital and resource within the organisation
 reducing volatility in the non essential areas of the business
 protecting and enhancing assets and company image
 developing and supporting people and the organisation’s knowledge base
 optimising operational efficiency
The methodology described in this toolkit is adapted to the European context based on the good
practice identified in the ‘Secure Site’ project in order to be used broadly by SEVESO sites it also
draws on the good practice identified by CCPS and we wish to acknowledge the American Institute of
Chemical Engineers. Section 0.6 provides a justification for the selection of the CCPS methodology,
reviewing in particular the RAMCAP and EURAM methodologies.
The Security Vulnerability Assessment Toolkit (SVA) of Industrial Sites seeks to identify those risks
which may result in catastrophic effect, it offers a methodology to both modify the risk and
suggestions for controls which may mitigate or reduce the risks. The final part of the SVA Toolkit
develops a risk log which will record information on which risks the company chooses to mitigate and
which to accept. Ultimately the only mitigation of the risk available may be through financial means
by accessing enhanced specialist insurance premiums and even these may still leave some residual
risk with the company, however the SVA Toolkit will ensure that the full extent of these residual risks
will have been identified.
Undertaking this SVA may require additional expertise and this should be borne in mind when
preparing the budget, these additional capital costs will, however significant, be considerably smaller
than those required should a catastrophic event occur.
The use of the SVA tool should form as useful part of the overall risk management of a company and
therefore contribute to the more efficient use and allocation of capital within the organisation.
Additionally, if an industrial company has several establishments with potential critical assets, they
will need to prioritise sites in order to select the most critical infrastructures.
A risk assessment or analysis (RA) is an examination including risk assessment, risk evaluation, and
risk management alternatives, performed to understand the nature of unwanted, negative
116102555
Page 7
Improve knowledge of effective critical
infrastructure protection
consequences to human life, health, property, or the environment; an analytical process to provide
information regarding undesirable events; the process of quantification of the probabilities and
expected consequences for identified risks.
A security vulnerability assessment (SVA) is an analysis to identify security hazards, threats, and
vulnerabilities facing a facility, and to evaluate the countermeasures to ensure the protection of the
public, workers, national interests, the environment, and the company.
A RA may have a greater emphasis on prioritising risks by likelihood and consequences, handling of
the highest risks and accepting lower risks whereas the emphasis of a SVA may be more on finding
additional countermeasures to address the vulnerabilities of a facility.
Concerned industries
The security study should be performed by any industrial site designated as a critical infrastructure at
the regional, national or European level by competent authorities. To be designated as a critical
infrastructure, a preliminary screening shall have been performed by the authorities or by a
corporate1 (depending on the national regulations and practices).
The CI Directive2 defined a list of ECI-sectors in its Annex I, which are those assets, systems or parts
thereof located in EU member states which are essential for the maintenance of vital societal
functions, health, safety, security, economic or social well-being of people (currently only the energyand transport sector), and the disruption or destruction of which would have a significant impact on
at least two EU member states3.
Thus, concerned critical infrastructures can be industrial sites subject to the SEVESO II Directive,
which covers all those facilities where dangerous substances (toxic, flammable, explosive or
pollutant) are present in quantities equal to or in excess of certain thresholds (see Art.2 and Annex I
to the SEVESO II Directive). The SEVESO II directive requirements and particularly the Safety Report
for SEVESO upper-tier sites could help in the SVA study.
Annex 1 describes links between the SEVESO II Directive and the SVA requirements for the European
Critical Infrastructures (ECI).
1
If a corporate has to identify its critical infrastructures, the “Enterprise Level Screening Process” (ELSP)
described in the CCPS SVA Guidelines can be performed.
2
Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical
infrastructures and the assessment of the need to improve their protection, in OJ L Nr. 345/75 of 23.12.2009
3
Cf. Art 2 (b) ECI-Directive
116102555
Page 8
Improve knowledge of effective critical
infrastructure protection
Intentional acts under consideration for a security study
Intentional acts should include the internal as well as the external threats, from malevolent to
terrorist attacks.
The Operator, i.e. the company that owns or operates the site, should define the limits of the threat
events under consideration in a security study.
Nevertheless, this report will focus on the threats which would have severe or catastrophic impacts
on population, environment or economy. For this reason, the type of acts under consideration will
be:
 loss of containment of hazardous substances on the site,
 contamination or spoilage of plant products to cause worker or public harm on or offsite,
 degradation of assets or infrastructures or value of the infrastructure through destructive
acts.
The threat of chemical theft or chemical misuse with the intent to use it or transform it in order to
cause harm offsite will not be taken into account in this report, except if they result in catastrophic
events on site. Therefore ‘supply chain security’ issues are outside the scope of this methodology.
Indeed, this method intends to discuss on highly critical security events with severe direct effects on
the site and the public while robbery or misuse would generally generate indirect effects on the
public.
As there is an increased financial burden in carrying out the SVA section 0.2 provides some hints and
guidance as to how to develop the Cost Benefit Analysis to justify carrying out the SVA and section
0.3 provides guidance on where to obtain the necessary additional expertise to complete the SVA.
Section 0.4 gives a management overview of the SVA and section 0.5 outlines the strategic and
business benefits attained from the completion and regular review of the SVA.
0. 2
Cost Benefit Analysis of the SVA
Security Vulnerability Assessments are now seen as crucial to effective Security Risk Management by
most industry associations and stakeholders. This coupled with the increasing focus by government
and other bodies on the perceived terrorist threat to Critical Infrastructure (CI) and a drive to
enhance the protection of key industries means that now threat and vulnerability assessments (TVA
or SVA) are both expected as part of good practice risk management. Although they are not yet a
matter of regulation they are accepted as Best Practice and therefore, make eminently good business
sense.
116102555
Page 9
Improve knowledge of effective critical
infrastructure protection
The use and practice of SVAs are not new, but are now used more as there is an increasing focus on
formalised and auditable process although there is as yet no prescriptive process and a number of
methodologies exist and are in use – many have a common approach.
Indeed the absence of a formal Security Management System which includes a formal risk
assessment (TVA/SVA) may be viewed as indicative of a lack of due diligence and effective risk
management.
Alongside the benefits to be gained from completing and maintaining and SVA we must consider the
cost. Supplementary spending will mainly arise from costs due to additional staffing for the duration
of the assessment and additional specialist security support that will be required. This additional
specialist support may be available from within the company, depending on the size of the company,
or possibly from relevant government agencies if however this is not available from these sources
then the company should seek external support.
0.3
How and where to obtain the necessary expertise to complete the SVA
The SVA team, who will conduct this study, should be multidisciplinary and gather several skills from
outside the organisation, such as:
 Knowledge and expertise on man made threats such as terrorism, cyber crime and organised
crime,
 Qualified security expertise (on security vulnerability and security risk analysis, security
management systems, knowledge on terrorist groups and their methods of attack, etc.),
 Experience with procedures of first responders and government agencies,
 Knowledge of safety and security related legislation/regulations, etc. applicable to the site.
In-depth security knowledge and experience may be required to facilitate the SVA process. Specific
expertise may be required. For instance, the team may need a weapons effects expert (such as blast
and ballistics) to answer specific questions regarding the vulnerability of a specific asset or
component.
By qualified, it is understood this to mean:
- will hold recognised and relevant qualifications
- references
- 10-years of experience in this field
- SVA-experienced (at least 7 SVA-studies)
- preferably sector-experienced
In some EU member states there is the possibility that the SVA team may be supported and
complemented by officials of police departments, security services or other government bodies.
Another option is to seek qualified security professionals from the security industry to assist in the
SVA process.
116102555
Page 10
Improve knowledge of effective critical
infrastructure protection
0.4
A brief management overview of the SVA process
Figure 1 Process flowchart of the SVA toolkit across the 6 Steps
116102555
Page 11
Improve knowledge of effective critical
infrastructure protection
0.5 The strategic and business benefits of completing the SVA and
implementing regular review of SVA’s
By completing the SVA and then implementing regular reviews the organisation will be best prepared
for any incidents that may happen and will have had time to both implement appropriate
countermeasures and put in place incident management plans. Specific benefits arising from these
include:
 Understanding the vulnerabilities and their potential impact on the wider objectives of the
business
 Meeting best practice guidelines
 Understanding the vulnerabilities in order to assist in the selection of treatment options
 Comparing the vulnerabilities and the risk in alternate systems or technologies
 Assist with establishing priorities
The overall business benefit of implementing regular reviews is that the organisation has clear and
up to date information on its vulnerabilities and the subsequent risk that it chooses to carry/ mitigate
or insure against.
Protection of Data
There may be a requirement to treat the contents of the SVA as Security Sensitive Information
which requires it to be protected in line with Government and/or company security policies.
116102555
Page 12
Improve knowledge of effective critical
infrastructure protection
0.6
Justification for the selection of the CCPS Methodology
An in-depth review of available Security Risk Assessment methodologies was conducted in 2007 as
part of the SECURE-SITE research project. The task of selecting an appropriate security assessment
methodology for the European Chemical Sector was specifically addressed in SECURE-SITE Work
Package 3 (WP3) entitled ‘Selection of a Security Risk Assessment Methodology’ and further applied
in SECURE-SITE Work Packages 4 and 5.
SECURE-SITE WP3 recommended the selection of the American Institute of Chemical Engineers
(AIChE) Center for Chemical Process Safety (CCPS): Guidelines for Analyzing and Managing the
Security Vulnerabilities of Fixed Chemical Sites4 which lays down a detailed ‘Security Vulnerability
Assessment – SVA’ methodology., It also recommended that this methodology should be amended to
take the European ‘landscape’ into account and specifically consider the benefits of the SEVESO II
regulations and substantial associated safety documentation and information which would be
available to an EU based security risk assessment, which would substantially influence the inputs and
mechanism of the SVA. Work Package 6 (WP6) reiterated these findings by recommending the use of
the CCPS SVA methodology stating that the CCPS methodology was already in use in the chemical
sector and that the outcome of using this methodology was clear, understandable and defendable
but again would require being adapted for use in European Seveso type (chemical) industries.
Although fully recommending the use of the CCPS methodology, in its recommendations for the
IMPROVE project SECURE-SITE WP6 5 states that;
‘Moreover, the security assessment methodology needs to be refined by improving and adapting
CCPS SVA or RAMCAP 6 to current European considerations and developments (e.g. EURAM)’ 7.The
single mention of RAMCAP in the WP 6 recommendations creates a requirement to re-consider the
use of the RAMCAP SVA methodology, whereas, due to the timings of the outcome of the EURAM
project, the latter requires to be evaluated for utility in the IMPROVE project.
The purpose of this section therefore is to:

review the use of the RAMCAP SVA methodology and:

evaluate the EURAM project risk assessment methodology,
in order to assess their utility as an SVA methodology for European SEVESO type (chemical) sites.
4
CCPS 2003
5
SECURE-SITE WP6 Final Report, November 2007 (p 28).
6
RAMCAP - Risk Analysis and Management for Critical Asset Protection.
7
EURAM - The European Risk Assessment Methodology. A research programme which was running concurrently to
SECURE-SITE and published at around the same period.
116102555
Page 13
Improve knowledge of effective critical
infrastructure protection
A. Review of RAMCAP Methodology
RAMCAP (Risk Analysis and Management for Critical Asset Protection) was introduced in 2005 and
launched in 2006 in the US to provide a framework for analyzing and managing the risks associated
with terrorist attacks against critical infrastructure assets. The work was commissioned by the US
Department of Homeland Security (DHS) and conducted by the American Society of Mechanical
Engineers – Innovative Technologies Institute (ASME - ITE) LLC8. The 80 page methodology is publicly
available from the ASME-ITE website.9
The stated aims of the RAMCAP were as follows:

To define a common framework that could be used by owners and operators of critical
infrastructure to assess the consequences and vulnerabilities relating to terrorist attacks on
their assets and systems.

To provide guidance on methods that could be used to assess and evaluate risk through the
use of the RAMCAP common framework.

To provide an efficient and consistent mechanism which could be applied to diverse
elements across both private and governmental sectors to report essential risk information
to the US DHS. This input was at the time deemed essential to the execution of DHS
responsibilities.
One of the principle aims of RAMCAP was to provide a pan-sector assessment of vulnerabilities and
possible impacts in order to both populate the DHS National Asset Database (NADB) and allow for
resource allocation and prioritisation of effort at the strategic level. It was also intended that the
generic RAMCAP methodology would be reinforced by sector specific guidance documents in due
course.
A.1 Subsequent US Developments
It is important to note that since the inception of RAMCAP, the U.S. Department of Homeland
Security has since invoked the US Chemical Facilities Anti Terrorism Standards (CFATS) - legislation
which imposes comprehensive federal security regulations for high-risk chemical facilities. As part of
the Homeland Security Appropriations Act of 2007, Congress directed DHS to identify and regulate
“high risk” chemical facilities. Following this the DHS promulgated new regulations in the form of the
Chemical Facilities Anti-Terrorism Standards (CFATS), Interim Final Rule on 8 June 2007.
8
A not-for profit company which acts as a research arm of ASME. http://www.asme-iti.org/
9
http://www.asme-iti.org/RAMCAP/RAMCAP_Framework_2.cfm
116102555
Page 14
Improve knowledge of effective critical
infrastructure protection
CFATS requires any facility that handles hazardous chemicals above a certain threshold, to conduct
an initial ‘Top Screening’ risk assessment exercise to enable DHS to apply one of four tiers.
Thereafter, these facilities will be required to:

Conduct and submit a Security Vulnerability Assessment (SVA), to be submitted on-line and
thereafter;

Produce and have DHS ratify their Facility Site Security Plan (SSP).
The CFATS legislation establishes ‘Risk-Based Performance Standards’ for the security of chemical
facilities. These were ratified in late 2008 and now form the core of US chemical facility protection
efforts. Facilities are now required to apply these Risk Based Performance Standards (RBPS) with
layered security measures and demonstrate how they intend to meet these requirements within
their Site Security Plan (SSP). There are 19 categories of security performance standards which are
increasingly demanding as one moves from the lowest, Tier 4 to the highest, Tier 1. Congress has
also specifically mandated however, that the DHS cannot specify particular security measures, such
as fence types and heights and therefore should aim to adopt a collaborative approach.
It is therefore assumed, from a DHS perspective that RAMCAP has been superseded by CFATS as the
sector specific vehicle for institutionalising security within the US Chemical sector, as has to an extent
the American Institute of Chemical Engineers (AIChE) CCPS methodology. However, CFATS allows
lower priority (Tier 4 on a scale of 4) categories of chemical facilities, in specified circumstances, to
submit Alternate Security Programs in lieu of a Security Vulnerability Assessment, Site Security Plan,
or both. The CCPS methodology qualifies as an approved alternative whereas it appears RAMCAP
does not.
A.2 RAMCAP Methodology
RAMCAP uses a 7 step approach and requires input from both owner/operators and government
agencies. The seven steps are shown in Figure 1. This process is broadly consistent with other
appropriate security risk assessment methodologies.
The stages, such as asset characterisation, consequence and vulnerability analysis and risk
assessment and management use broadly similar criteria to the CCPS methodology and the American
Petroleum Institute’s (API) publication ‘Security Vulnerability Assessment Methodology for the
Petroleum and Petrochemical Industries’.10 It quotes both the CCPS and API methodologies in its list
of references and appears to have drawn on the CCPS and API approach. It therefore does not
appear to provide any additional approach or criteria which could be utilised in the IMPROVE project.
The methodology is relatively straightforward to follow. However, it was designed primarily to
conduct a ‘screening’ exercise in order to rank facilities both within a sector, and across sectors and
10
http://www.api.org/policy/otherissues/upload/SVA_E2.pdf
116102555
Page 15
Improve knowledge of effective critical
infrastructure protection
clearly states that it requires further detailed sector specific guidelines, in order to achieve the level
of detail required. To quote the introduction to the RAMCAP Framework document:
‘the RAMCAP methodology is not a step-by-step guideline for conducting vulnerability
assessments in specific industry sectors. Rather RAMCAP is a high-level methodology that
can be tailored to various sectors, thereby providing a mechanism for comparing risk within a
sector and between different sectors... is not intended to be the most comprehensive and
detailed risk assessment methodology in the public or private sectors... and actually avoids ....
detail, precision and cost in order to quickly and efficiently fill the National Asset Database... ‘
Much of this detail would have to be drawn from elsewhere, which has mostly already been
reviewed and it is therefore assessed that the RAMCAP methodology and content would be of
limited value to the project.
In addition, the RAMCAP methodology specifically requires the detailed involvement of the
authorities in the process, which although very desirable, has not been mandated for the IMPROVE
guidelines. It is again reiterated that the principle recipients of the RAMCAP results are evidently the
authorities (to conduct cross-sector assessments on priorities for action) and not the site owners/
operators.
116102555
Page 16
Improve knowledge of effective critical
infrastructure protection
CONSIDERATIONS
PROCESS STEP
Asset Characterisation and
Screening
Threat Characterisation
Consequence Analysis
Vulnerability Analysis



Asset Identification.
Assessment of potential severity of consequences.
Consequence based screening.




Target determination.
Adversary characterization: Capabilities; Tactics; Weapons.
Threat characterization provided separately by authorities.
Owner/Operator may choose lesser threats for own purposes.


Potential damage assessment for each threat.
Worst reasonable case consequences


Identify vulnerabilities leading to worst reasonable consequences
Assessment of likelihood of adversary success in achieving worst
reasonable consequences.
Evaluate existing countermeasures & mitigation capability.

Threat Assessment
Risk Assessment
Risk Management



Asset attractiveness and deterrence (asset owner).
Adversary capability and intent determination (authorities).
Threat (relative Likelihood of attack) as a function of attractiveness and
adversary capability and intent (authorities).




Consequence from Step 3.
Vulnerability from Step 4.
Threat from Step 5.
Risk = C * V * T



Consider risk goals and determine need for recommendations.
Determine recommendations.
Evaluate options and decide on enhancements.
Figure 1: RAMCAP Process
A.3 Recommendation on the use of RAMCAP
It is therefore recommended that the use of the RAMCAP methodology, for the purposes of Project
IMPROVE be discounted.
B. Review of EURAM Methodology
B.1 General presentation of the risk assessment methodology
The European Risk Assessment Methodology (EURAM) project’s aim is to develop a risk assessment
methodology for assessing security that could be used by all European Critical Infrastructures sectors,
whatever their activity and a higher level above the single infrastructure itself. Indeed, it will allow a
comparative risk assessment across an entire sector of activity, of a region or at a national level. The
development of the methodology is based on an inventory of good practices found in various risk
assessment models. The methodology is described in the deliverable of the project EURAM named
116102555
Page 17
Improve knowledge of effective critical
infrastructure protection
“Development of an EU-common risk assessment methodology”. It aims at using the same
methodology to assess risks in different aspects of security (organization, human security, physical
security, information and communication security) in the same way and consists of seven steps.
To help the operator determine the threats, the EURAM methodology suggests a list of critical
infrastructure sectors and specifies for each of them the products or the sub-sectors that can be the
preferential targets. This list includes energy, nuclear industry, information and communication
technologies, water, food, health, financial sector, transport, chemical industry, special sector and
research facilities. Using this list of critical sectors, the EURAM methodology suggests deriving a list
of threats based on the taxonomy developed by the EU IST Vital Infrastructures Threats and
Assurance (VITA) project rather than identifying threats specific for each sector. The VITA threat
taxonomy is based on building trees, the root of the trees consists of distinguishing natural causes
and direct and indirect human activities. The different branches are dedicated to seven types of
relevant threats which are: earth and soil, air, all types of water, space, natural radiation and electromagnetic threats, naturally occurring fires and biological threats. Each branch is then broken down to
explore all the aspects, in particular, environmental threats, economic and political threats, technical
threats and threats due to human failure.
The EURAM methodology objective is designed to be applied not only at the scale of single facilities,
but also at a higher level: a sector, such as a region taking into account all the industrial sectors of the
region or of a country, etc. It will harmonise critical infrastructure results at a national level or for an
entire sector to compare risks. As such, it requires the development of adapted probability and
severity scales and to have a systemic approach to the risk assessment. As the destruction or
disruption of some key services or infrastructures may lead to the loss of other critical functions
(supply chain, health, safety, economic and social aspects), the EURAM methodology recommends
completing the classical steps of the risks analysis by a transversal approach to interdependencies
analysis. This interdependencies analysis avoids problems of inter-operability and of cost-inefficiency
between critical infrastructures (CI), especially at a European level.
116102555
Page 18
Improve knowledge of effective critical
infrastructure protection
PROCESS STEP
CONSIDERATIONS



Skills in technical knowledge, in information and communication
management, in organisational and human aspects in the company.
Definition of a leader
An external control is recommended
Definition of the scope of the
risk assessment


Identification of processes and of utilities
Determination of organisational and human limits
Definition of the scales for risk
evaluation





Risk = probability P x severity S
Ranking scales on a 1 to 5 ranges
Probability and severity scales uniformly applied across all the sectors
Use of the feedback and the likelihood of an accident
Probability P: Qualitative definition of each rank based on the feasibility of the
attack, the attractiveness of the target, the protection level of the target and the
skills/resources/motivation of the attacker.
Severity S: Scale based on the evaluation of impact on: process, citizen security,
image, citizen confidence, financial impact or other aspects.
Constitution of the risk
assessment team

Understand the assets in the
scope
Understand the threats


Identification of the critical infrastructures of a site as possible assets of an
attack
Identification of their weaknesses by analysing how they work (process), what
they produce (products, services, what is critical?), operating organisation
Definition of threats by using:

common threats,

Specific key issues of a given threat in each domain (organisation, human,
technical aspects, etc.) of the infrastructure.

a list of threats specific to critical infrastructure sectors specified by the EURAM
methodology
Review security and identify
vulnerabilities


Review of existing countermeasures
Identification of vulnerabilities of the infrastructure (physical, organisational,
human or information and communication technologies), taking into account
existing countermeasures, threats and infrastructures assets
Evaluation of risks



Definition of scenarios using the analysis of vulnerabilities
Evaluation of probability and severity for each scenario
“A scenario of incident associated to vulnerability is a threat exploiting this
vulnerability to harm assets and more largely the infrastructure”
Figure 2: EURAM Risk assessment methodology process
116102555
Page 19
Improve knowledge of effective critical
infrastructure protection
B.2 EURAM methodology: the interdependency analysis
Interdependency is when two infrastructures are directly or indirectly (via another infrastructure)
mutually dependent on each other, because the state of one infrastructure is influenced by or
correlated by the state of the other. According to literature, four types of dependency have been
identified: physical dependency (electricity versus telecommunication equipment), cyber
dependency (flight versus information about weather), geographical dependency (same duct for
power & telecommunications cables and for pipelines), and logical dependency (petrol price and
transportation traffic).
The EURAM method suggests an interdependencies analysis in three steps.
PROCESS STEP
CONSIDERATIONS
Determination of the scope
Gathering of information
Processing of the gathered
information



Levels of details for the assets (between 10 and 20 assets)
Boundaries: assets to analyse (that we want to protect) and not the
asset (external infrastructures) as “outside influences”
Result: classification of the infrastructures (assets) for the study



Collect correct and relevant information from independent sources
Structuring the gathered info
Result : Overview of dependencies and implemented measures

Gathered dependency information
suitable for the
management process
Result: Analysis of the risks generated by interdependency

risk
Figure 3: EURAM interdependency analysis process
The expected outcome from the information gathering step is an overview on:
- Item 1: dependencies between all the assets in scope and associated type (cyber, physical, ..)
- Item 2: external dependencies for each asset
- Item 3: measures taken for all the identified (inter)dependencies
- Item 4: quality/level of service that the measures provide
- Item 5: how long ‘measures’ can function without external resources
- Item 6: internal and external dependencies of measures after interruption of external
resources
- Item 7: residual threats to external infrastructures, Items 1 to 3 are the common items,
items 4 to 6 often omitted (effectiveness of measures) and item 7 almost never addressed
(as information sources are external).
The processing step provides an overview on the:
- Total (cascading) effect of failure of a component on the functioning of the infrastructure
under consideration(analysis of items 1 to 3)
- Risk to external dependencies for functionality (analysis of items 1 to 3)
- Time scale for degradation and restoration (analysis of item 4 to 6)
- Risk of simultaneous failure through common vulnerabilities (based on item 7)
116102555
Page 20
Improve knowledge of effective critical
infrastructure protection
The assets identified in the risk assessment can be used as input for the dependency analysis, while
the results from the dependency analysis can be used as input for risk management.
A dependency analysis is difficult as it supposes the exchange of information which is sensitive and
the ability to perform the risk assessment on a common basis. Beyond the sharing of the same
jargon, language and of the use of uniform sources, it supposes a willingness to divulge information
and an ability to share information which may be a conflict of interest. A complete transversal
approach requires different areas of expertise to have an overview of the analysis and common
methods for (inter)dependency between CI of same sectors and CI of different sectors or different
countries that can be used by the CI stakeholders aimed at defining the European CIP priority areas
and of CI sensitiveness to (inter)dependency to be shared.
B.3 Feedback and advantages of the EURAM methodology
The EURAM methodology allows the users to have a complete view of risks and to assess them in the
same way whatever the type of risks, taking into account the interdependencies with the
surroundings or with influence factors. This allows an easy and efficient comparison, in particular
with the use of common probability and severity scales.
However, the EURAM methodology takes into account threats that are very different (security,
safety, workers safety). It needs a consensus to define severity and probability scales and these
scales should allow segregation of events which should be spread over the different levels of the
scale. This consensus will be difficult to establish. Moreover, the scales, and specifically the severity
scale, are not accurate enough and as a consequence severity levels are not highlighted. Finally, the
holistic point of view adopted in the EURAM project requires that technical and human barriers in a
safety risk assessment will be considered as threats and not only as countermeasures, the failure of
which will lead to an accident.
B.4 Recommendations
The scope of the EURAM project is significantly larger than that of the IMPROVE project which is
limited to security risks.
Moreover, the threats that will be studied in the IMPROVE project are intentional acts, which include
internal as well as external acts, from malevolent to terrorist attacks, and that harm the security of
the infrastructure. It will not study natural risks or a failure due to process failures (except if it is
intentional).
Besides, the steps of the EURAM risk assessment are similar to the CCPS SVA’s methodology and do
not bring complementary added value to the risk assessment approach.
However, the recommendations for the underlying principles of the dependency analysis remain
valid for a risk assessment methodology and they will be taken into account during the in the
IMPROVE project.
It is therefore recommended that the use of the EURAM methodology should be discounted as a
framework for the IMPROVE project.
116102555
Page 21
Improve knowledge of effective critical
infrastructure protection
1 Step 1 Project Plan for the SVA
Input step 1
Knowledge and information of the project team about:
 the objectives of a security vulnerability assessment,
 the scope of the security study in terms of concerned industries and in terms of
concerned intentional acts (internal and external, malevolent and terrorist
attacks)
The project plan will be developed by the SVA team prior to arriving on site
Expertise required (see section 0.3):
 Security
 Project Planning
The purpose of step 1 is to develop a project plan that may be used throughout the SVA process in
order that it is completed in an organised way. It is vital that the objectives, scope and criteria of the
SVA should be established at the beginning of the study in order to limit and focus activities and to
ensure that the SVA outcomes are effectively realised.
The project planning should focus on four key issues:
 Clarify the objectives of a security vulnerability assessment
 Define the scope of the study
 Define the context of the SVA and familiarise themselves with appropriate regulations
 Define the team composition
1.1 Clarify the Objectives of a Security Vulnerability Assessment
The objective of a security vulnerability assessment is to identify the critical assets of a CI-site and
SEVESO site and the plausible threats (malevolence and terrorism) that could impact these assets.
Following this identification of critical assets the SVA will then assess the countermeasures
implemented onsite in order to protect the public, the environment, the company or the national
interests.
To achieve consistency across the SVA when using this tool the following definitions need to be
considered.
Critical assets of a CI-site may be defined as the site elements (material, equipment, personnel,
information, etc.) which have value to the Operator as well as the assets that enable the activities of
the site, such as the utilities or the SCADA system as well as hazardous substances which may also be
labelled as critical assets.
116102555
Page 22
Improve knowledge of effective critical
infrastructure protection
Countermeasures can be defined as the technical or organisational measures taken to reduce or limit
the vulnerability of an asset when considering threats or to mitigate the effects of such an attack.
Threat can be defined as an adversary and his method of attack.
A threat scenario can be defined as the combination of a specific attack by an adversary on an asset
which would result in severe impacts on population, environment or economy.
Vulnerability can be defined as a technical or organisational weakness that can be exploited by an
adversary.
1.2 Define the scope of the SVA
As a minimum the SVA should cover the analysis of intentional acts against critical assets of an
industrial site that may cause any harm to the public, the environment, the company or the national
interest. The specific scope for each SVA process should be identified and agreed by the SVA team.
1.3 Define the context of the SVA and familiarise with appropriate
regulations
It may be useful in the introductory part of the SVA to refer to the applicable national and
international regulations to which the Industrial Site Operator is subjected to.
As the security analysis proposed in this document is a general framework, these regulations may be
helpful to define in another way the scope and objectives of the report and to tailor the SVA to the
specific requirements of the applicable national and international regulations.
1.4 Selection of the SVA team
The working team, who will conduct this study, should be multidisciplinary and gather several skills,
such as:
 Security expertise (security risk analysis methodology, security management system of the
site, knowledge on terrorist groups and methods, etc.), see also section 0.3;
 Knowledge of the installations (potential assets, process and equipment);
 Knowledge of the safety management system of the site;
 Emergency response procedures;
 Knowledge of safety and security related legislation/regulations, etc. applicable to the site.
The working team should generally consist of three to eight persons, to be effective and will vary
according to the size and complexity of the site. External expertise can supplement this team,
especially if in-depth security knowledge is missing within the team. In any event, security expertise
116102555
Page 23
Improve knowledge of effective critical
infrastructure protection
(internal or external personnel) will be required to facilitate the SVA process. For further information
of this aspect of the SVA refer to the ‘Business Case justification for the SVA’ Section A of this
document for guidance on the specific nature and duration of required expertise or how to locate
expertise.
The team initially selected may not be the same throughout the whole process of the SVA due to the
selection of the assets onsite (step 2) and also the threat analysis (step 3) these two steps may
require additional skilled people to be co-opted into the team. For instance, the team may need a
weapons effects expert (such as blast and ballistics) to answer specific questions regarding the
vulnerability of a specific asset or component.
Once the team is assembled the SVA methodology should be presented to the team. It is reminded
that the external experts required for the SVA should be qualified experts in the fields quoted
previously.
In order to complete this step the project plan should as a minimum have the sections and headings
as shown in Worksheet 1.
The spreadsheets in this document can be filled in. To open them double click the inside any of the
boxes; to leave them click on the page outside the spreadsheet.
Filling in the different Worksheets in this document may be somewhat cumbersome. Therefore this
document is accompanied by an Excel file containing all (blank) Worksheets, which can be filled in
independently.
A worked example of the forms and spreadsheet has been included in Appendix 5.
116102555
Page 24
Improve knowledge of effective critical
infrastructure protection
Scope of the Study
intentional terrorist acts
intentional criminal acts*
Context
Regulatory framework
bloempetat
Team Skill Profile
List of skills required
Identified Gaps
Appoint Audit Leader
Assign Responsibilities
Responsibilities and named lead
Housekeeping
Time and duration of SVA and timings of key meetings
Working language of SVA
Reporting
Report format
Benchmarking required
Follow up plans
Output step 1




Comprehensive project plan Worksheet 1
General regulations framework to which the site is submitted in terms of security
Definition of the multidisciplinary project team
Presentation of the SVA methodology to the SVA project team
116102555
Page 25
Improve knowledge of effective critical
infrastructure protection
2 Step 2 Facility Characterisation
Input step 2
Identification and collation of the following information:
 Comprehensive project plan Worksheet 1
 General regulations framework to which the site is submitted in terms of security,
e.g. SEVESO
 Data which describes the site, its activities, assets and environment for use by the
SVA team
 Description of the protective security measures for the site including existing
countermeasures
This step should be completed by:
The SVA team
Additional Expertise will be required in:
To be decided by the SVA project team leader
The purpose of the second step in the SVA is to characterise the industrial facility. In this step the
facility is described in detail as well as the general security policy of the site. This step provides an
overview of the site activities, processes, assets and equipment that could be considered as relevant
to the SVA, and locates technical and other data to support the security analysis.
2.1
Facility Description
An adequate description of the facility will enable the SVA team, the authorities, the reviewers of the
SVA and all those involved in the SVA to have a clear picture of the purpose of the facility, its
location, the main functions, activities, hazards, services and technical equipment. The extent of this
description should be commensurate to the hazards present. The description should also aim at
clarifying the interrelationship between the different installations and systems within the
establishment, with respect to their technical parameters and management aspects.
In general it is recommended to utilise as much as possible the documentation available for other
purposes or legislation, e.g. SEVESO. This documentation can take the form of Operation permits,
building plans, construction plans, the Safety Report for upper-tier SEVESO sites (see Annex 1) for
lower-tier SEVESO sites, the Environmental Impact Assessment, technical procedures, technical
documents resulting from a standards implementation (e.g. ISO 14001, ISO 9001...), etc. It is however
advisable to try to summarise the information, since very often the level of detail of the
documentation produced for different purposes might be higher – or differently focused – than the
one needed for SVA.
Contents
The description of the facility should include the following items:
116102555
Page 26
Improve knowledge of effective critical
infrastructure protection
1. General information: Purpose, main activities, relevant legislation
2. Description of the natural and human surroundings of the site
 Environment
 Human activities around the site: housing zones, public assembly building (schools,
hospital, etc), population around the plant, presence of other industrial sites,
presence of other critical infrastructures, presence of transport access ways
(highway, airports, railways, ways, etc), presence of public network, electric utility,
water supply system equipments
 Maps
3. Description of the site: activity, organisation and resources
 Main activities, main material flows
 Organisation, especially focusing on the safety and security functions
 Human presence: personnel, contractors, visitors
 Emergency response: Fire-fighting system, sprinklers, scrubbers, mitigation systems,
etc.
 Control room
 Information and Communications Technologies (ICT) e.g. cyber systems, SCADA, etc.
 Security policy and system in place
4. Processes and installations
 Lay out of the facility as a whole and of its relevant units clearly presented on
adequately scaled plans: The lay-out should adequately identify installations and
other activities of the facility including:
 main storage facilities
 process installations
 location of relevant substances and their quantities
 relevant equipment (including vessels and pipes)
 spacing of the installations and their main sections
 utilities, services and internal infrastructure equipment
 location of key abatement systems
 location of occupied buildings (with an indication of the numbers of persons
likely to be present)
 other units if relevant for security considerations
 Installations (tanks, important pipes, columns, etc.)
 Brief description of processes, i.e. storage, loading/unloading, production, etc.
 Utilities (power, gas, compressed air, nitrogen, process water, etc.), together with
their interdependencies, backup systems, and reaction/impact times
5. Inventory of starting materials, raw materials, finished goods, intermediate products and
waste
 Chemicals present; quantities; conditions; together with their main classification
(toxic, explosive, flammable)
 Valuable and/or attractive materials or goods (ex.: gold, copper)
116102555
Page 27
Improve knowledge of effective critical
infrastructure protection
The description of the facility should be conducted at an appropriate level of detail in order to have
both an overview of the site and of its environment and sufficient detail to inform the security
analysis at the process and component level.
2.2 General security policy of the site
This includes the identification and documentation of the general philosophy and concept of the
facility’s management for the security of the site. It is important to identify:
 What is the general security policy followed, (Company and/or local policy)?
 Are there security requirements and if yes are they mandatory?
 Is there applicable security legislation?
 What are the principles on which it is based?
 How the security policy guarantees an appropriate level of security?
 What mechanisms are present to ensure that the security policy is properly implemented?
The information necessary to be gathered in this step and to be documented may include:
 The general strategy to address security in the site*
 Leadership and commitment
 Review of layers of protection: their concept and design basis
 Organisational and Physical protection
 Access control policy
 Personnel policy: Selection, training and alert
 Management of information
 IT security (cyber attack, hackers, ...)
 Management of change
 Emergency communication and response
 Business Continuity Plan
 Incident management and investigation policy
 Measures to be taken in cases of increased alert (graduated security measures).
 Information Security Policy
 Recent SVA and/or Risk Assessment Report
 Recent Audit Report
*A number of approaches can be considered for the implementation of the security strategy on a
facility, including the following approaches:
 layers of Protection/Rings of Protection
 the “deter, detect and delay” principle
 implementation of measures to mitigate the effects
These security protection strategies are detailed in the Appendix 2, Protection Strategies for Site
Security Management of this report.
116102555
Page 28
Improve knowledge of effective critical
infrastructure protection
2.3 Existing countermeasures
This part aims at describing the existing countermeasures of the facility which have been
implemented by the operator.
A countermeasure is a technical and or organisational system and or an action that:
 reduces the attractiveness of an asset on the site
 reduces the likelihood of a successful attack
 reduces the consequences of a successful attack
Existing countermeasures may include physical security of the facility, control of access (railway,
roads, water), protection of control rooms and of control systems, policies and procedures,
administrative controls, control of employees and of contractors, information security measures,
emergency response measures.
All of this information should be noted in Worksheet 2, the Key Document Register. To use the
spreadsheet, double click inside any of the boxes, to leave the spreadsheet click on the page outside
the spreadsheet. Alternatively it may be easier to use the separate workbook of SVA spreadsheets
these can be downloaded from the Cefic Website. To review a worked example of the forms and
spreadsheet see Appendix 5.
116102555
Page 29
Improve knowledge of effective critical
infrastructure protection
Worksheet 2 Key Document Register
General Information
Purpose of site
Activities of site
Location and Surrounding of the Site
Natural
Human
Site Description
Layout
Organisation Chart
Hazardous and Attractive Products
Current Security Arrangments
Policy
Principles
Current Countermeasures
Site Safety Procedures
Site Emergency Procedures
Business Coninutity Plan
Site Communication Plan
2.4 Determination of the site attractiveness
The attractiveness depends on the value that an adversary would place on disrupting an asset to fulfil
his motives, such as to create mass media attention through casualties or disruption; the disruptive
impact may be classified by the following criteria:
 press coverage that an attack on the asset would imply. The media attention would depend
on the geographical situation of the site (urban or rural, proximity of an importance city or of
the capital), on the possibility of impacting an iconic or symbolic target, on the proximity to a
national asset or landmark or well-known site.
 disruption of local, regional or national infrastructure (like electricity) and economy
depending on the impact on national, regional or local access routes (roads, railways), on
possible collateral damages to neighbouring installations, infrastructures or targets.
 the symbol represented by the asset and the symbolic aspect of the asset to the threatened
operator, the impact on known terrorist target and on the company reputation and brand
exposure.
116102555
Page 30
Improve knowledge of effective critical
infrastructure protection

ease of access to the asset depending on the localisation of the asset in the site considering
the easiness of finding it onsite, the easiness of accessing to it or the easiness of striking the
site.
This assessment should consider the current countermeasures in place that reduce the accessibility
of the site entrance, the free circulation on the site, the number of people working in the perimeter
of the asset, etc. Often the more accessible an asset is, the easier an attack is and the more attractive
the asset therefore becomes to the adversaries.
It should be noted that the attractiveness of an asset rests not only on the characteristics of the
asset, but also of the site. Site characteristics are also important as the adversary’s intent could be
generally towards the company or the site, without the specific intention to attack a particular asset
on the site.
The following worksheet 3 provides the mechanism to gather the parameters in order to rank the
attractiveness of the site.
Each factor does not have the same weighting in the attractiveness assessment. For example among
the factors related to the site, the “threatened operator” has the largest weighting for the site
attractiveness. If a company is known as a terrorist target or if a country has received threats to its
industry, the company or the industries of the threatened countries should be considered as very
attractive targets.
Attacks in the past years have shown that terrorist actions would aim at causing significant
disturbances to the society. That is why the “economic disruption” factor has a higher weighting than
the “company reputation” or the “proximity to iconic site” factors. The “economic disruption” factor
should take into account the time aspect, of this impact such as the period of disruption and the time
before recovery. This factor should be understood as the potential disruption to the national
economy and not the disruption of the company economy at the national level. The score obtained
for the site will remain the same for the calculation of the combined attractiveness score specific to
an asset.
116102555
Page 31
Improve knowledge of effective critical
infrastructure protection
Worksheet 3 Site Attractiveness
Total = score x weighting factor
Factors
Scores
Weighting
factor
Total for
the site
Proximity of a major city a)
No major or symbolic city // Rural zone // No major or symbolic icon or site or only locally symbolic icon or
or of an iconic
site: the site attack will no media attention or very locally SCORE 1
or well-known site
b)
In an urban zone // Regionally symbolic icon or site: the site attack will gain limited media attention SCORE 2
(media attention level) c)
Next to a capital or in a major city // adjacent to a nationally symbolic icon or site: the site attack will imply a
national media attention SCORE 3
d)
In the capital // in the city centre of a major city // adjacent to an international famous or major recognizable
landmark (e.g., European Commission, Eiffel Tower) world famous icon or site: a site attack will imply a substantial
National or European event. SCORE 4
Societal disruption at
a)
Disruption of local society SCORE 1
the local, regional,
b)
Disruption of regional society // Disruption of a major regional supply SCORE 2
national or international c)
level
Threatened operator
Disruption of national economy society // Disruption of a major national supply SCORE 3
d)
Disruption of European / international economy or critical infrastructure SCORE 4
a)
No known threat against the country or the operator SCORE 1
b)
Operator threatened by employees or by local associations SCORE 2
c)
Country threatened by regional activists (e.g. separatists), sector mentioned as or commonly thought to be a
potential target for terrorist but no threat SCORE 3
1
3
5
d)
Country of origin of the operator threatened by International terrorist organisation (e.g. USA, Israel, UK), site
known as a terrorist target SCORE 4
Company reputation
brand exposure
a)
No controversy or association actions known by the company against itself, company not known or only
locally well-known company (ex. Local major employer) SCORE 1
and recognition
b)
Company which has been subject of a controversy at the local stage (because of its activities type, of its way
of exploiting, of an accident, etc) or is the target of local associations or regionally well-known (ex. Major employer
of the region) SCORE 2
c)
Company which has been subject of a controversy in the national media (because of its activities type, of its
way of exploiting, of an accident, etc) or Nationally well-known company SCORE 3
2
d)
Company which has been subject of a controversy in the international media (because of its type of activities,
of its way of exploiting, of an accident, etc) or Internationally well-known company SCORE 4
Total automatically moves to Worksheet 5 column 8
TOTAL
0
Output step 2
The SVA-team has an adequate understanding of the characteristics and current security
measures of the facility.
The characteristic and current security measures of the facility should be recorded in
Worksheet 2 the Key Document Register and contain as a minimum
 General information: Purpose, main activities of the site,
 Description of the natural and human surroundings of the site,
 Description of the site: layout, organisation chart,
 Potential hazardous or attractive (for criminal acts) products,
116102555
Page 32
Improve knowledge of effective critical
infrastructure protection




Description of the existing general site security policy and principles plus any existing
countermeasures and procedures applied on site
Site safety and emergency procedures
Worksheet 3 Attractiveness of the Site
Communication Plan for the Site
116102555
Page 33
Improve knowledge of effective critical
infrastructure protection
3 Step 3 Assets Analysis
3.1
Identification of the principal assets
Input step 3.1
Definition of an asset
Definition of a principal asset
Worksheet 2 the Key Document Register
Any document used in step 2.1 that enables the identification of high value assets (see
Appendix 1 Links Between the SEVESO DIRECTIVE Requirements and the SVA)
This step should be performed by:
The SVA team
Additional expertise is required in:
To be decided by the SVA project team leader
As reminded in Step 1, this SVA should be performed on any industrial site designated as a critical
infrastructure by the authorities and a preliminary screening should be undertaken. A chemical or
energy-related facility has numerous assets requiring adequate protection. The analysis cannot be
extended to each and every piece of equipment, every vessel, every pipe, every valve as this would
be an impossible task to carry out. For this reason it is necessary to focus on the important assets
stored or used in the facility. The asset analysis aims at identifying the highest critical targets taking
into account the existing situation of the site and of the asset with the existing countermeasures, the
weaknesses of the asset and its value. This identification of the most critical targets requires a
brainstorming by the SVA team. In principle, an asset is any material or non-material item that
enables the facility to operate. In the first instance a list of targets is determined based on the
characteristics of the target that make it valuable in terms of potential hazard or in terms of activities
disruption. A principle asset is an asset deemed to be crucial to the continued operation of the site or
an asset, which the SVA team suspect, if tampered with could have the potential to cause
catastrophic effect.
Factors to be considered are:
 Vessels, piping or processing equipment which contain highly dangerous substances
considering the toxicity, flammability and explosion hazards of the chemicals,
 Particular reactions which can be hazardous (risk of drift in the reaction, thermal
decomposition, explosive reactions, possibility of formation of hazardous chemicals, risk to
drift towards an uncontrollable reaction),
 Personnel,
 Process control systems (including ICT, SCADA, etc.),
 Intellectual property,
116102555
Page 34
Improve knowledge of effective critical
infrastructure protection




Equipment without which the site would not be able to operate or otherwise with significant
difficulties, such as the control rooms, the process control systems (SCADA systems), the
communication network, the utilities, etc,
Components needed for functioning such as the loading/unloading system, the raw material
supply system and the waste disposal system,
Components of the security system such as the fire-fighting system (tanks, piping, foams,
etc.), power supplies to the perimeter fence surveillance or the access control or any system
for which its disruption could cause a failure of the security system,
Company Reputation
The characterisation of the site in step 2.1 should help to make this inventory.
For upper-tier SEVESO sites, data from the safety analysis should be used here, as explained in
Appendix 1.
Last, it is necessary to identify and take into consideration dependencies between the different
assets. This is particularly important for utilities (e.g. power supply, water, compressed air, natural
gas, nitrogen) or assets such as the control room, SCADA, fire-fighting system, etc. Analysis of
dependencies can be performed through the systematic collection and analysis of information;
however, in most cases it is sufficient to answer a few questions addressing the following:
 Identification of assets that are interdependent,
 The cascading effect of a failure in the considered asset to other assets or the functioning of
the plant,
 The time characteristics of degradation and restoration,
 The risk of simultaneous failure of more than one asset through common vulnerabilities
 Off-site dependencies such as power, water, steam, upstream and downstream process
inputs/outputs etc.
116102555
Page 35
Improve knowledge of effective critical
infrastructure protection
Worksheet 4 List of Principal Assets
List of Principal Assets
Justification and Description
This step should be done at the asset level, without going into details or decomposing the asset itself.
For example, a distillation process should be considered as an asset and not one particular distillation
column. The component level will be addressed at the vulnerability analysis step (step 5).
Worksheet 4 may help to carry out this step of asset identification. This selection should refer to
justifications, such as hazards for the people offsite, environmental impacts, operational continuity,
interdependencies, etc. One of the criteria for selection of asset can be the lack of spare components
or excessive time to repair, especially for operational continuity aspects.
116102555
Page 36
Improve knowledge of effective critical
infrastructure protection
Output step 3.1
Worksheet 4 List of principal assets (in an alphabetical order or per process flow, for
example)
3.2 Classification of attractiveness
Input step 3.2
Definition of attractiveness
Definition of Impact
Tools:
Attractiveness levels table
Impact levels table
Worksheet 3 attractiveness of the site
Matrix Attractiveness / Impact
This step should be completed by:
The SVA project team
Additional expertise is required in:
To be decided by the SVA project team leader
Identified principal assets are then assessed according to two criteria: the asset attractiveness and
the asset impact. Here the selection of principal assets may differ from the selection of assets when
considering a business/ operational continuity focus.
The salient question of this assessment is “what types of events will cause the disruption of a critical
infrastructure, the release of a chemical or the destruction of equipment or components in such a
way that the most serious consequences will occur?”
This assessment is done considering the existing situation of the site and of the asset, taking into
account the benefits of existing countermeasures that protect the asset. There are nine factors for
the determination of attractiveness, out of which four are focussed on the site (see worksheet 3)and
five specifically focussed on the individual asset (see worksheet 5). This evaluation is completed by
the SVA project team, using their best judgment to attribute values to all the factors for each
potential target.
As for the scoring of the attractiveness factors specific to the asset, a high weighting factor is
attributed to the “merchandising” factor to take into account the malevolent acts of theft or product
diversion as criminal acts are not acceptable in critical infrastructures. The three factors related to
the easiness to find, access and strike of an asset are linked with the difficulty of attack for an
adversary. The easier an asset is to access the more it will be attractive. .The function of the asset
116102555
Page 37
Improve knowledge of effective critical
infrastructure protection
should also be taken into account when assessing the factor of the asset and the continuity of the
company activity (4th factor specific for an asset). The global attractiveness of a given asset is
obtained by adding the score of the four asset attractiveness factors to the score of the five site
attractiveness factors. The combined total score will define the overall global attractiveness of the
target.
Five final levels of attractiveness of the assets can be defined and classified as shown in table 1. This
step results in the evaluation of all the assets potential attractiveness that can be perceived by
adversaries and enables the identification of the high value assets according to their attractiveness.
116102555
Page 38
Improve knowledge of effective critical
infrastructure protection
WORKSHEET 5 ATTRACTIVENESS OF THE SITE AND THE ASSET
Column 1
Column 2
Column 3
Easiness to find the asset in
the site
Weighting Factor 3
a)
Hidden SCORE 1
b) Only employees can know
where the asset is. Not noticeable
from the exterior even on a map
SCORE 2
Column 4
Easiness to access
Weighting Factor 3
Column 5
Easiness to hit
Importance of the asset to
company continuity
Weighting Factor 3
Weighting Factor 2
Column 6
Column 7
Value and merchandising TOTAL
Weighting Factor 5
a) High security site and the asset is at
the centre of rings of protection (Need to
penetrate numerous robust rings of
protection to reach the asset, with no
possible common failure) SCORE 1
a) No line of sight from exterior a) Not at all or equipment without a
and visible with difficulty from the major importance in exploitation
site itself , also shielded from
SCORE 1
internet
SCORE 1
b) Restricted access to the site and to
the asset: only a restricted number of
employees have access to the asset and
asset in the centre of numerous rings of
protection
SCORE 2
b) Asset protected by many
b) Threats could be made or equipment b Asset with very low value but
other buildings, vegetation, many which can be passed by-passed for a short very difficult to merchandise in
other installations (presence of
period and quickly replaced SCORE 2
parallel markets SCORE 1
major obstacles) SCORE 2
Column 8
SITE
ATTRACTIVENESS
Total for the site
from wrksht 3
Column 9
a) No Value SCORE 0
From Worksheet 4
c) Not noticeable from the exterior c) Restricted access to the site but no
but easy to spot on a map SCORE restricted access to the asset
3
SCORE 3
c) Asset protected by few other
buildings, vegetation, few other
installations (presence of few
obstacles)
SCORE 3
d) Everybody knows where the
asset is or it is at the limit of the
site
SCORE 4
d) Sitting duck: no protection of d) key and irreplaceable process
d Asset with high value and
the asset
SCORE 4
equipment or equipment without which rather easy to merchandise in
the company cannot operate SCORE parallel markets SCORE 3
4
Principal Assets
d) Site opened to the public
SCORE 4
c) Threats have been made or
c Asset with medium value but
warnings are given against the asset difficult to merchandise in parallel
or against similar assets or equipment markets SCORE 2
which can be by-passed during a short
period but take time to replace
SCORE 3
e. Asset with very high value and
easy to merchandise in parallel
markets SCORE 4
Asset attractiveness
level
Score
A1
A2
A3
A4
22 – 38
39 – 54
116102555 55 – 73
74 – 90
A5
91 – 108
Definition
Least attractive asset on the site
Low attractive asset on the site
Medium attractive asset on the site
High attractive asset on the site
Extremely attractive asset on the site
TABLE 1 ASSET ATTRACTIVENESS LEVEL
Page 39
Column 10
Total (site + Attractiveness
asset)
= level (Look up
column
table 1)
7+column 8
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Improve knowledge of effective critical
infrastructure protection
3.3 Determination of the Asset Impact
Next we need to determine an Asset Impact, this is the result should an adversary successfully
compromise an asset. The asset impact level is decided by considering the various categories of
consequence which are described in Table 2, the Asset Impact Table. The level should be taken as
the highest level of consequence feasible from an attack on an asset.
 Human consequences and casualties: the attack will result in fatalities and in injured people.
The magnitude of impact can be based on the impact ranking from the safety studies
requested as the impact of major accidental scenarios is assessed for the environment and
people offsite. Other parameters should also be studied such as the potential casualties in
case of lack of gas, electricity, water and such in severe conditions (e.g. in winter or during
drought). It should be remembered that the consequences from an intentional attack can be
worse than in an accidental scenario as, for example, in a safety assessment the rupture of
one tank is considered, whereas in intentional attack an adversary can simultaneously attack
several tanks.
 Environmental consequences and indirect human consequences:
 direct consequences to the environment (air or river pollution) or
 indirect human consequences such as:
 The contamination of goods produced onsite (food chain, medicine, etc.)
 the long-term health effects due to the dispersion of a toxic substance or
 The impact on the basic needs of the population (heating systems, drinking
water, etc.)
 Economic disruption
 Material damage:
Material consequences onsite are defined by damages costs. Levels depend on costs levels
that are defined by the Operator depending on its priorities,
 Company’s reputation
For each asset, the impact is assessed assuming the successful execution of an attack and of its
consequences, taking into account the existing countermeasures if they can efficiently reduce these
consequences.
In the following table, some thresholds for the impact levels are proposed, knowing that these
figures can be modified according to the security objectives set by the Operator. The impact table
should be adapted to distribute possible events on all the levels in order to allow attention to be
concentrated on the most risky events.
The impact level for each asset corresponds to the highest impact level amongst the five impact
parameters as the security vulnerability analysis focuses on the most critical security events.
For the material consequences, the value of damages determining each level will be determined by
the operator according to its turnover, its reputational value and or its investment capacity. The
following table, Table 2, The Asset Impact Table gives an example of levels that could be used:
116102555
Page 40
Improve knowledge of effective critical
infrastructure protection
Within table 2 each SVA team should discuss and set their own financial criteria for the property
damage in each impact level as this will need to be appropriate for each particular industrial site
where the SVA is carried out. Also clearly any level of casualty is a serious matter, however for the
purpose of this SVA it is critical that the SVA team identifies the number of potential casualties and
fatalities that would arise from each mode of attack. When selecting the impact level the SVA team
should consider all the issues (a-e) in each impact level and base the level on the highest impact risk.
116102555
Page 41
Improve knowledge of effective critical
infrastructure protection
Table 2 The Asset Impact Table
LEVEL
I1
DESCRIPTION
a.
b.
c.
d.
e.
Casualties: no more than one dead person and less than 10 severely injured people
Negligible environmental impacts, even if target has significant symbolic value
(example: destruction of a prominent national monument)
Negligible economic impact
Over XX € property damage (estimated as less than in S2)
Significant impact on the company reputation
I2
a.
b.
c.
d.
e.
Casualties: from 1 to 10 dead people and from 10 to 100 severely injured people
Environmental impacts to immediate site area only
Important economic disruption to the facility economy
Over XX € property damage (estimated as less than in S3)
High impact on the company reputation
I3
a.
Casualties : from 10 to 100 dead people and from 100 to 1’000 severely injured
people
Major environmental, food chain or product impact with no health impact on the
population but widespread and visible effects (example: large environmental
damage)
Severe economic disruption to the regional or industry economy
Over XX € property damage (estimated as less than in S4)
High impact on the company reputation
Casualties : More than 100 dead people and more than 1’000 severely injured people
Major environmental, food chain or product impact with possible widespread lesser
health impact on the population (example: contamination of food that causes
widespread illness but no lasting effects except to sensitive populations)
Severe economic disruption to the national economy
Over XX € property damage (estimated as less than in S5)
Very high impact on the company reputation
Casualties : More than 1’000 dead people and more than 10’000 severely injured
people
Major environmental, food chain or product impact with possible widespread major
health impact on the population (example: large scale toxic contamination or
drinking water or pharmaceuticals)
Severe economic disruption to the European economy
Over XX € property damage
Very high impact on the company reputation
b.
I4
I5
c.
d.
e.
a.
b.
c.
d.
e.
a.
b.
c.
d.
e.
Proposal of impact levels for the vulnerability analysis (based on the CCPS SVA guidelines)
116102555
Page 42
Improve knowledge of effective critical
infrastructure protection
3.4 Risk Profile of the Principal Assets
Once the impact level of the potential consequences of a successful attack on a designated asset and
the attractiveness level of this designated asset have been ranked, the critical level of the asset can
be determined with the help of a matrix which combines the impact and the attractiveness for the
principal assets.
The rankings of each asset in attractiveness and impact are inserted into Worksheet 6, Impact and
Attractiveness Worksheet. The Asset Code column can be used to identify each asset by assigning a
letter ‘A to Z’ this will assist when plotting the asset on a risk map.
Worksheet 6 Impact and Attractiveness Worksheet
Worksheet 6 Impact and Attractiveness Worksheet
Asset
Code
116102555
Principal assets
see Worksheet 5
column 10
Attractiveness
level
see Impact table Impact v
2
Attractiveness
Impact level
Page 43
Improve knowledge of effective critical
infrastructure protection
Worksheet 7 Asset Attractiveness and Asset Impact Matrix
In the above matrix, two extreme critical levels for the asset are defined with two extreme positions:
 A highly critical level for the more attractive (high value) and the more severe impact targets
(red) and
 A low-range critical level for the less attractive and less severe impact targets (green).
The team seeks to identify the more attractive (high value) asset targets which if successfully
attacked would result in more severe impact, these are therefore the most critical. In order to
complete this matrix the SVA team must set the limits applicable to their own organisation or site
facility for the three green amber and red zones
As a result of this analysis, the SVA team have now determined a list with at least the highly critical
assets.
Output step 3.



Ranking of the assets according to their level of attractiveness
Ranking of the assets according to their level of impact given a successful attack
Ranking of the assets according to their risk profile (attractiveness vs. impact)
116102555
Page 44
Improve knowledge of effective critical
infrastructure protection
4 Step 4 Threat Analysis
It is recommended to seek additional specialist expertise and advice in order to gain the data to fill
the worksheets in this step. It should also be borne in mind that adversaries can and do change at
short notice and therefore constant update on this data is also required. Details and guidance on
obtaining specialist advice is given in the section 0.3 of this document.
Input step 4.1
Concepts / definitions / necessary data:
Definition of a threat
Threat information from scientific institutions, commercial enterprise, police, intelligence
and security services
Feedback: inventory of past security events
Definition of a threat
Definition of the intent
Definition of the capability
Definition of the likelihood of an attack
Tools:
List of adversaries
List of methods of attacks
Table of Adversaries and their preferential methods of attack
Additional Expertise Required:
Threat expertise
Security expertise
Team Required:
Full SVA team
4.1 Identification of Adversaries and Their Methods of Attack
In the first steps of the critical infrastructure SVA, the facility was characterised, assets, interests,
dependencies, the present policies and measures for security, business continuity, emergency
management, consequence mitigation were identified and possible targets for adversaries were
identified.
In this fourth step of the SVA, the relevant adversaries will be considered in the light of the
characterised facility and the existing security measures.
In this step the SVA team will make an assessment of the man made threats to a Critical
Infrastructure (CI). This CI could be part of a chemical, energy or other establishment.
116102555
Page 45
Improve knowledge of effective critical
infrastructure protection
When assessing these threats, the SVA team has to determine the likelihood of adversaries attacking
their facilities and the probable method of attack they will use.
Adversaries
It is necessary to ascertain the characteristics of the relevant adversaries that can threaten the CI.
The adversaries differ in motivation, goals to achieve, knowledge of the site, attack capabilities, risk
acceptance and endurance.
The following types of adversaries should at least be considered in this threat assessment:
 Terrorists (political, religious)
 Criminals (common, organised, Cyber)
 Hackers
 Violent activists (environmental, animal rights, anti-globalists)
 Vandals and deranged individuals
 Frustrated, disgruntled or addicted employees and contractors
As mentioned before, the SVA-team has to decide which probable methods of attack will be used by
the adversaries. The coupling of an adversary with a method of attack is defined as a threat. In the
SVA an emphasis is put on threats that will or may disrupt the CI or cause mass casualties and serious
societal and political disruptions.
Some methods of attack may be used by more than one adversary. The following methods of attack
should be considered in this threat assessment:
 bombing (by rucksack, car, boat, glider, plane)
 shooting (with handgun, rifle, RPG, mortar)
 arson (Molotov-cocktail, incendiary device, lighting a fire)
 sabotaging (manual, remote)
 manhandling
 cyber attack
 stealing of critical components
Blackmailing, extortion, burglary, sneak-in, theft, hacking, bugging and eavesdropping should be
taken into account if they are essential parts of the above mentioned methods of attack.
The above mentioned threats are illustrative and can be considered as generic to a certain extent.
However, which threats are likely or realistic, will depend on the individual establishment to be
assessed. “General threats” that may be likely in a country or in a region, should be considered in
close cooperation with intelligence and security services.
A more detailed description of adversaries and their methods of attack may be found in Appendix 3
Threat Catalogue.
116102555
Page 46
Improve knowledge of effective critical
infrastructure protection
4.2 Ranking the Threats
The past security incidents of the site (successful or not) should be collected and analysed as lessons
learned from these events may give relevant hints for the threat assessment step.
The analysis of incidents provides data on potential adversaries, and on possible methods of attack.
These incidents also provide information for the vulnerability analysis which takes place in the next
step. The incidents on the site may not be numerous or significant enough under the high threats
standpoint of the SVA however their analysis may help to identify weak points in the site security.
Incidents that have occurred at other sites or in other countries can give complementary information
on actual threats and may be useful input to this threat assessment.
Assessment of Capability and Intent
The likelihood of an adversary (attacker) coming to a facility and committing a specific attack is
difficult to assess. However, some threats can be considered as more relevant than others.
The likelihood of an attack or the likelihood of an adverse event can be defined as the likelihood that
a particular adversary will exploit a vulnerability. This takes into account the intent of the adversary
and its capabilities (human in terms of individuals and organisations and technical in terms of
technical means with the mode of attack).
The likelihood of these threats has to be determined by the SVA team by assessing the intent and the
capability of the adversaries for a specific mode of attack. For this task, the SVA team, if the security
expert skill is not available in the team, will need to collaborate with the national or regional
intelligence service in order to rank realistically the intent and capabilities of the identified
adversaries.
The intent of an adversary can be defined as how an adversary is motivated to attack the site or a
particular asset of the site.
The capabilities of an adversary can be defined as the technical and human means that an adversary
can rely on for his attack, such as a trained individual or group, with particular skills in weapons or in
chemistry, financial means, ability to get weapons. The capabilities integrate also the notion of
knowledge about the site and how to reach the asset, on how the adversary can get or not the useful
information to plan his attack.
Thus, the consideration of critical assets and associated countermeasures is underlying the ranking of
the adversary capabilities. This consideration should not be done, at this stage, on a particular asset
but more generally on the site. The team will assess the intent and the capabilities of the adversary
on a scale of three levels, for each “adversary / mode of attack” that is considered as feasible by the
security expert or the national intelligence information.
116102555
Page 47
Improve knowledge of effective critical
infrastructure protection
The threats described in worksheet 8 shows some preferential methods of attack for different
adversaries. This worksheet is only indicative, but can be helpful for suggesting relevant threats.
Worksheet 8 Ranking of the Most Relevant Threats
I
C
I
C
I
C
I
EMPLOYEES
VANDAL
ACTIVIST
HACKER
CRIMINAL
METHOD OF ATTACK
TERRORIST
ADVERSARIES
C
I
C
I
C
CONCEALED IED
VBIED CRASHED INTO CRITICAL ASSET
VBIED PARKED NEAR CRITICAL ASSET
IED PLACED NEAR CRITICAL ASSET
IED’S BY BOAT, GLIDER OR PLANE
RPG
RIFLE
MOLOTOV-COCKTAILS
INCENDIARY DEVICE
LIGHTING A FIRE
BLOCKADE
MANUAL SABOTAGE
REMOTE SABOTAGE BY CYBER ATTACK
STEALING
PHYSICAL ASSAULT ON STAFF
COUNTERFEIT CRITICAL COMPONENTS
By characterising the threat in terms of intent and capabilities of adversaries, this worksheet enables
the selection of the most relevant, plausible and realistic threats. Specialist knowledge will need to
be harnessed from a range of sources to assess the intent and capabilities of terrorist organisations
across the spectrum of perceived methods of attack.
116102555
Page 48
Improve knowledge of effective critical
infrastructure protection
Table 3
I = INTENT
There is no justification to think the
adversary has the intention to do so
The adversary may have the intention to do
so
The adversary will certainly do so if there is
an opportunity
1
2
3
C = CAPABILITY
The adversary does not have the
capability to do so
The adversary may have the capability to
do so
The adversary certainly has the capability
to do so
0
1
2
The 0 score for capability choice means that the adversary does not have the capability to do so and
therefore reflects the fact that if this is the case then there is no threat resulting from this option.
Worksheet 9 Ranking of the Most Relevant Threats According to Intent and Capability
Multiply intent by capability to obtain score
Adversary
Attack Method
Score
Output step 4
Worksheet 9 Ranking of the most relevant threats (adversary x method of attack y)
according to intent and capability
116102555
Page 49
Improve knowledge of effective critical
infrastructure protection
5 Step 5 Security Vulnerability Assessment (SVA)
5.1 Creation of the Threat Scenarios
Input step 5
Inputs Required
Concepts / definitions / necessary data:
Definition of threat scenario
Definition of vulnerability
Key Document Register (output step 2)
Ranking of the assets according to their level of attractiveness (output step 3)
Ranking of the most relevant threats (worksheet 9, output step 4)
Definition of the likelihood of a threat scenario
Threat information from other parties (commercial, police, security and
intelligence service)
Scenarios provided by other studies
Tools:
Table 10 for Likelihood of a threat scenario
Table 11 for Severity levels of successful scenarios
Risk matrix: Severity / Likelihood of an threat scenario
Vulnerability assessment table
Additional Expertise Required:
Security Expertise
Team Required:
Step 5 should be undertaken by the full SVA Project Team
Definition of threat scenario
A threat scenario is defined as the coupling of a threat (the adversary and his method of attack) and a
specific asset on the CI.
A threat scenario can be identified in just a few words. For example: theft of a laptop by a criminal.
This can be appropriate when there is an overload of scenarios to identify. For a thorough
vulnerability assessment the most relevant threat scenarios must be written out more elaborately.
By creating a storyboard the relevant threat scenarios may be drawn in a comprehensible fashion.
A threat scenario will at a minimum combine the following items:
 adversary (with intent, capability and motivation),
116102555
Page 50
Improve knowledge of effective critical
infrastructure protection




method of attack (with tools, weapons, time frame, attack and escape route),
target of the adversary (asset of the site),
severity of the attack (economical loss, loss of life, loss of critical infrastructure),
collateral damage (damage to buildings, possessions, environment)
In the process of describing the different threat scenarios the relevant countermeasures onsite will
be identified and the potential consequences of a successful attack will be estimated. Eventually the
vulnerabilities for those threat scenarios will help to determine the security risk level of the site.
In Step 4 (Ranking of the threats) the threats (adversary and attack) most likely to affect the site have
emerged. These threats will be the starting point for developing the threat scenarios. The SVA team
will have to choose the all relevant targets for these threats and thus create a data base of relevant
threat scenarios.
In Step 3 (Risk Profile of Principal Assets) the principal assets have been ranked in severity levels. This
information and the Table for Severity levels will be input for describing the (successful) threat
scenarios.
Once the threat scenarios have been described, there is a clearer picture of the severity of a
successful attack (threat scenario).
These threat scenarios have then to be assessed in terms of likelihood and severity.
This is completed in the Ranking of the likelihood of a threat scenario. The likelihood of a threat
scenario depends on three parameters:
 The asset attractiveness
The ranking of the attractiveness of the asset is the same as the combined attractiveness
score evaluated for each asset in step 3.
 The asset vulnerability
This parameter takes into account the number and the robustness of the countermeasures in
place onsite for a threat scenario.
 The feasibility of the threat scenario
This parameter takes into account the sophistication of the technical and organisational
means (modus operandi) used by the adversaries to perpetrate their attack on the asset.
Amongst these three parameters, the asset attractiveness is determining in the assessment of the
likelihood of a threat scenario. Indeed, attractive assets are more appealing to terrorists, even if the
means required need to be more elaborate. Furthermore, because of the almost unlimited amount
of possible targets, the terrorist will not explore the in his opinion ‘unattractive’ targets.
For this reason, the “asset attractiveness” factor has been given a higher weight than the two other
parameters.
116102555
Page 51
Improve knowledge of effective critical
infrastructure protection
The severity in step 5 is assessed according to a specific threat scenario which targets an asset and
which may result in partial or total compromise of the asset. This is an area that requires specialist
expertise in order to ensure that the output provides reliable data.
116102555
Page 52
Improve knowledge of effective critical
infrastructure protection
WORKSHEET 10
LIKELIHOOD OF THREAT SCENARIO
Column 1
Critical Assets
Column 2
Adversary
Column 3
Method of
Attack
Column 4
Column 5
Column 6
Column 7
Column 8
Feasibility of Threat Scenario
TOTAL THREAT
SCENARIO LIKELIHOOD
Target Attractiveness
Target Vulnerabiity (Ease of Access)
Target Robustness of
Construction
Weighting Factor 5
Weighting Factor 1
Weighting Factor 1
Weighting Factor 1
a) Very high robustness
SCORE 0
a)
One or two individuals, little knowledge of site with simple
technical means to achieve the desired effect (e.g. Hand gun)
SCORE 0
a)
Least Attractive asset
on site SCORE 0
a)
b) Low attractive asset on
site SCORE 1
c)
Medium attractive
asset on site SCORE 2
d)
Highly attractive asset
on site SCORE 3
e) Most attractive asset on
site SCORE 4
Very low Vulnerability SCORE 0
b) Low Vulnerability
c)
SCORE 1
b
Medium vulnerability, at least one strong measure and
several other measures to be breached SCORE 2
d) High vulnerability, measures are not strong, several
countermeasures need to be breached but individual
measures are not strong SCORE 3
e) Very high vulnerability, none or few measures and only a
single weak measure that needs to be breached or effective
measures do not exist SCORE 4
High robustness SCORE
1
c
d
Medium Robustness
SCORE 2
b)
Limited group, minimal knowledge of the site, not technically
sophisticated (e.g. Regular weapons, hand gun, greandes, assult
rifle) SCORE 1
c)
Low robustness SCORE
3
Organised group, good knowledge of the site and sophisticated
technical means(hand-man weapons such as IED)
SCORE 2
d)
Organised and trained group, good knowledge of site and
some of its countermeasures, sophisticated technical means (e.g.
Military weapons and hand made such as IED) SCORE 3
e) Very low Robustness
SCORE 4
e)
Highly trained group, very good knowledge of site and its
countermeasures, very sophisticated technical means (e.g. Coordinated attack with war weapons) SCORE 4
Sum
Weighting Factor x SCORE eg 5
x0
0
0
0
.
TABLE 4 THREAT SCENARIO LIKELIHOOD
116102555
Level
Score
Threat Scenario
Likelihood
L1
0
Lowest Ranking
L2
1-8
L3
9 - 16
L4
17- 24
L5
25 - 32
Highest
Ranking
Page 53
Improve knowledge of effective critical
infrastructure protection
Output step 5.1
Worksheet 10 Likelihood of an attack scenario
5.2
Risk Matrix: Severity & Likelihood of a Threat Scenario
Once the levels of the severity and likelihood of a successful threat scenario have been assessed, the
risk level of each scenario can be determined with the help of a risk matrix which defines the level of
acceptability of the security risk when taking into account the countermeasures in place.
In the following proposed risk matrix, three levels of risk are defined with two extreme positions:
 An inacceptable level of risk: further improvement in countermeasures have to be proposed
(in red)
 An acceptable level of risk where it is considered that sufficient countermeasures have been
implemented for the threat scenario, given that the level of confidence (robustness,
availability, efficiency) of the countermeasures are guaranteed (in green)
Worksheet 11 SEVERITY AND LIKELIHOOD OF A THREAT SCENARIO
Asset Code
Asset Name
(from worksheet
10 column 8)
TOTAL
THREAT
SCENARIO
LIKELIHOOD
THREAT
SCENARIO
SEVERITY
RISK (severity
and
likelihood)
(from worksheet
6 column 3)
In worksheet 11 each critical asset and adversary combination should be re assessed for each attack
method.
116102555
Page 54
Improve knowledge of effective critical
infrastructure protection
Worksheet 12 Risk Matrix
Output step 5.2
Worksheet 11: Severity and Likelihood of an attack scenario
Worksheet 12: Risk Matrix of likelihood and severity
5.3
Vulnerability Analysis
As described in the preliminary step about the working team, the vulnerability analysis should not be
done by an individual, but in a team with expertise of the business, safety issues, business continuity,
risk management and security aspects of the site. If needed, the competencies for risk analysis and
security can be externalised. For specific issues like IT-security additional experts can be needed.
The relevant threat scenarios are those with the higher likelihood and higher severity. These are the
higher risks (in the reddish area in the risk matrix). These relevant scenarios will be assessed in this
SVA.
For the vulnerability analysis the following is essential:

review the relevant threat scenarios once more to determine how these will take place. If
there are more options within one scenario choose the most likely ones to explore more
116102555
Page 55
Improve knowledge of effective critical
infrastructure protection


deeply. If these options are more or less equal, make one of these options into a new threat
scenario;
describe the scenarios precisely and in a detailed enough manner to identify the
vulnerabilities of the site;
Identify and keep track of possibilities to reduce the likelihood and severity of the threat
scenarios.
The SVA is an iterative process of the following assessments
 assets and dependencies (with threats in mind);
 adversaries and methods of attack (with assets in mind);
 threats and critical assets (with countermeasures in mind).
Each of these assessments may and will influence the other two. It is up to the team to get the right
iteration between these assessments and to determine the level of detail for the SVA
documentation.
All information from the SVA will need to be documented in a comprehensive fashion.
Structure of SVA-files and a database
An SVA file for each relevant threat scenario, as illustrated in Worksheet 13, Scenario 1, gives
oversight and detailed information to enable a motivated choice in Step 6 for adequate
countermeasures.
These SVA files are a technical support for the vulnerability analysis to be fulfilled by the project team
during work meetings. These allow the project team to apply a systematic approach for the analysis,
particularly for the exploration of threat scenarios and assessing and identifying of the vulnerabilities.
This systematic approach enables the team to be detailed and comprehensive in analysing the
vulnerabilities of the site given the specific threats and the selected critical assets.
By creating a SVA database gathering data for each relevant threat scenario, this information is
available for analysis and later assessments and reports. The SVA database, including the tables and
worksheets given in this document will also help the team to express their thoughts and differences.
116102555
Page 56
Improve knowledge of effective critical
infrastructure protection
Worksheet 13 Example Storyboard
Scenario 1. Terrorists drive VBIED into chlorine tank
1. Threat scenario: Asset
+ Adversary + Attack
Loss of containment of chlorine due to a VBIED attack by Islamic terrorists on the pipeline at
the outlet of the chlorine tank
2. Consequences
Toxic dispersion of chlorine

Casualties onsite and offsite

Limited material damage
3. “Story Board”:
Plausible sequence of
events (before, during
after the attack)
1.The terrorists found information about the site and the chlorine tank on internet, and could
observe the site from public grounds
2.The terrorists force their way into the site with the VBIED (destroying the entry barrier or
threatening the guards at the entry)
3. The VBIED will be crashed into the pipeline killing the terrorists and causing a catastrophic
event
4. Crisis-, disaster and BC-management will be activated
4. Likelihood
SCORE = 5 (reason it is easy to find, identify, observe, hit, known target etc.)
5. Impact
SCORE =5 (because more than 1.000 casualties, 10 billions euro’s damage, etc.)
6. Risk
SCORE (5 x 5 = 25) 25 this is the highest risk score (dark red in the table)
7. Vulnerabilities
(ineffective
countermeasures for this
threat scenario)
1. Information security measures did not prevent sensitive information from exposure on the
internet.
2. Critical assets were not shielded from prying eyes. 3. The entry barriers were easily destroyed
and forced by a vehicle.
4. The guardhouse offered the guards too little protection.
5. There was no physical barrier that could stop the VBIED on time / at sufficient stand off.
6. The pipeline and the tank did not withstand the pressure wave and the shrapnel of the
VBIED.
7. The safety systems that might have secured a leaking pipe or tank could not mitigate the
massive release of chlorine caused by the VBIED-attack.
8. Casualties increased because of the inadequate response of emergency services (people were
not directed to a save area downwind). Etc.
8. Suggestions to improve
the security of the site for
this scenario (for the
likelihood and/or the
severity) This will be input
for steps 4 and 5
1.The summary of the safety study, listing the catastrophic accidental scenarios and their
consequences should be informative for the public but elusive for adversaries
2. The entrance barrier can be strengthened or bollards can be added.
3. The guards could be protected by special physical barrier. Etc.
116102555
Page 57
Improve knowledge of effective critical
infrastructure protection
The SVA-file for a single threat scenario is filed as follows:
1. Choose a relevant threat scenario from the risk matrix (starting from the reddish area).
2. Identification of the potential consequences of a successful attack from step 5.2.
3. Describe a plausible sequence of events of this treat scenario. This ‘story’ should be convincing enough
for management who are not directly involved in the SVA. These stories are created throughout the
process of the SVA.
4. The likelihood of the threat scenario is assessed in step 5.2. Put the classification and the highlights or a
summery in this file.
5. The severity from step 5.3 is highlighted here. Also mention the classification.
6. The risk number is the position of the threat scenario in the risk matrix. It may be expressed as the
product of the classifications for likelihood and severity. This risk profile can vary from low (green) up to
high (dark red).
7. The listing of vulnerabilities is the outcome of the SVA. During the whole process of the SVA a record
should be kept so that all relevant vulnerabilities will finally end op in this file. Future improvement and
evaluations will probably be reverenced with this list.
8. Preliminary suggestions or ideas for improvements may be listed here. They may include measures that
will reduce the likelihood or the severity of an event.
Output step 5.3
A risk ranked database with all SVA-files (one file for each relevant threat scenario)
A list of suggestions to reduce the likelihood and severity of the most relevant threat
scenarios (to reduce the highest risks)
116102555
Page 58
Improve knowledge of effective critical
infrastructure protection
6 Step 6 Identification of Additional Security Countermeasures
Input step 6
Knowledge and Information Required:
Security and relevant strategies for the site
Implemented security and other relevant measures on the site
A list of suggestions to reduce the likelihood and severity of the most relevant threat
scenarios for the site
A database with all relevant threat scenarios, ‘story boards’, vulnerabilities and the
motivation of the mentioned suggestions
Additional expertise required:
To be decided by the SVA team
It is acknowledged and accepted that the identification of appropriate additional security
countermeasures, their implementation, installation, commission and acceptance into the site safety
and security framework will represent a considerable commitment of time, effort, resources and
finance on behalf of the site and staff.
Step 6, therefore must not be underestimated and although this guidance is included, the process of
identification of appropriate additional security countermeasures, should be considered as a project
in its own right.
In this step, additional security countermeasures should be proposed for the “unacceptable” and
“critical” threat scenarios in order to lower the likelihood or the severity of these scenarios to
acceptable levels of risk. Additional security countermeasures should complement and strengthen
the ones already in existence.
These additional countermeasures will have to be implemented according to the security strategies
defined in the output of step 2.
Security management principles share many similarities with existing industry safety and associated
practices. Whilst process safety programmes usually do not explicitly address malicious acts, the
process of identifying and managing incidents, such as fires, explosions and product releases means
that there are significant commonalties between safety and security planning. Therefore, rather than
create separate programmes to deal with events resulting from malicious acts and accidents
116102555
Page 59
Improve knowledge of effective critical
infrastructure protection
involving hydrocarbons, it is desirable to integrate the countermeasures for both safety and security
programmes.11
Equally, industry practices for example restricting unauthorised access to sites on health and safety
grounds, mustering, contraband control and supply chain security all significantly contribute to an
effective security programme. Many sites will already have access control measures and perimeter
fencing, to meet Health and Safety requirements, existing company security policies or mandated
security regulations (such as the ISPS code). Whilst complementary, these measures are not
necessarily intended to counter threats to critical infrastructure and require additional specific
security measures.
6.1 Analysis of additional permanent countermeasures
Counter measures may be focused on:
 reducing the attractiveness of targets
 reducing the likelihood of a successful attack
 reducing the severity of the consequences of a successful attack
There are generally three areas that should be considered:
 Inherent Safety Measures (for example segregation of volatile fluids)
 Procedural Safety & Security
 Physical Security Including Operational Requirements (OR’s )
All of these should be included within the Operator Security Plan (OSP). This will provide a balanced,
appropriate, site and asset security position that is specific and commensurate to all risks.
Inherent Safety
Consideration can also be applied to designing out vulnerabilities. This can be achieved by applying a
combination of measures, such as introducing redundancy into the system or adding security related
process safety components. Ensuring an effective rapid repair and recovery capability can also
significantly enhance operational continuity. In basic terms for example, the addition of emergency
shutdown valves can significantly reduce the effects of malicious events and are complementary to
protective security measures.
11
Adapted from CCPS, 2003 (pp 73:74) and Protecting Industry Against Terrorism (p 12).
116102555
Page 60
Improve knowledge of effective critical
infrastructure protection
The feasibility of removing hazards or modifying processes in order to reduce the attractiveness of
the asset or the potential impact of events can also be considered. This concept of ‘Inherent Safety’
may well help reduce the security risks of certain facilities. The four key principles of Inherent Safety
are:
 Minimisation – reducing inventories of hazardous materials
 Substitution – utilising other materials that are not toxic, flammable or reactive
 Moderation – reducing processing conditions (pressures, temperature, flows etc)
 Simplification – reducing the complexity of processes and controls.
These principles are described in more detail in the updated 2009 CCPS Inherent Safety Guidelines12.
These principles have been applied successfully on SEVESO-sites and in some cases have significantly
reduced the hazards present and can represent an extremely attractive and effective security
measures.
Procedural Safety & Security
The establishment of a robust and well conceived range of safety and security procedures designed
to complement the physical security arrangements are required to be written and available to all
personnel.
At Step 2 the Facility Characterisation we discuss the General Security Policy of the site and here
there is a requirement to gather and assess the existing site documentation and procedures that are
already available.
This includes the identification and documentation of the general philosophy and concept of the
facility’s management for the safety and security of the site. In doing so, the process should allow the
SVA Team to identify any gaps in the procedural documentation and make recommendations to close
any gaps and implement all of the required procedures and documents into the Operator Security
Plan (OSP).
In any event, there should be an overall generic Operator Security Plan (OSP) that encompasses the
following policies and procedures within the relevant parts of the plan.
 The general Strategy and Security Policy for the site
 Security Roles & Responsibilities across the Site / Organisation
 Minimum Security Standards for Site / Company
 Current and Historical Security Vulnerability Assessments (SVA’S)
 Hazardous Vulnerable Points (HVP) & Vulnerable Points (VP) Assessments
12
CCPS 2009 ‘Inherently Safer Chemical Processes – A Life Cycle Approach (pp 147:160))
116102555
Page 61
Improve knowledge of effective critical
infrastructure protection









Personnel Policy: Selection, Training and Development
Static and Mobile Guarding Procedures
Access Control Policy
IT Security Policy
Emergency Management Response Policy & Procedures
Incident investigation Policy
Graduated Security Procedures for Increased Threat
Site Evacuation Policy & Procedures
Bomb Search Plan & Procedures
Physical Security
The primary objectives of physical security when protecting an installation is to achieve positive
control on protection of the facility and thereafter applying four key concepts of Deter, Detect, Delay
and Respond to intrusions into the facility or designated zones. This is normally achieved by a
combination of complimentary physical and procedural measures, which should be integrated to
achieve maximum effect. This concept aims at creating sufficient time between detection of an
attack and the point at which the attack becomes successful and should serve as a guideline for
preventing and mitigating terrorist scenarios.
Similarly when following this SVA process it should allow the SVA Team to identify any gaps in the
physical security and make recommendations to close any gaps and implement all of the required
procedures and documents into the Operator Security Plan (OSP).
The following, although not exhaustive, are considered to be the core elements of physical security
measures.
Security fencing; walls; barriers; pedestrian and vehicle access gates; Perimeter Intruder Detection
Systems (PIDS); Automated Access Control Systems (AACS); lighting systems; CCTV systems; alarm
systems; cages, internal security fences; locking systems; safes and safe rooms. A number of standalone security systems are capable of being electronically integrated to create a fully integrated
smart security technological capability. Ideally, a full Operational Requirement (OR) assessment will
have been undertaken for each element.
Additional security countermeasures, their implementation, installation, commission and acceptance
into the site safety and security framework will represent a considerable commitment of time, effort,
resources and finance on behalf of the site and staff.
One of the main challenges when dealing with security countermeasures is the procurement of the
most efficient, effective equipment or systems, their implementation, installation, commission and
acceptance into the site safety and security framework.
116102555
Page 62
Improve knowledge of effective critical
infrastructure protection
Additionally, however it may be dependent upon the geographical location of the site in question,
reference to certain governmentally sponsored or publically available security catalogues is
recommended.
 British Standards Institute Manual of Protective Security
 British Cabinet Office; Security Equipment Assessment Panel (SEAP)
 Loss Prevention Certification Board (LPCB) Red Books
 Security Access Control BSEN 50133
 CCTV for Security Applications BSEN50132
The SVA Team should always consider harnessing and utilising specialist security advice from a range
of all available sources when considering additional security countermeasures.
Operational Requirements
Studies of security technology projects have revealed that on many occasions, the installed systems
have either failed to meet the user expectations, to meet the perceived specification or have proved
to be inappropriate for the task. Often, the root cause has been the lack of a clear definition of
requirements at the outset of the project. Self evidently, the lack of a clear statement of requirement
also makes it difficult to specify commission and test physical security projects against a procurement
contract. A structured methodology was therefore produced by the British Security Service (MI5) to
address these shortfalls13 both the user community and vendors have broadly welcomed this
process.
An Operational Requirement (OR) is simply a statement of need based on a thorough and systematic
assessment of the problem to be solved and the hoped for solutions. It introduces the concept of a
structured methodology for determining the security measures for specific sites. In outline the
higher-level (Level 1) OR aims to articulate:
 The site or building under consideration.
 The assets to be protected.
 The perceived threats against the assets, and the probability of their occurrence.
 The physical areas containing the assets that give concern, and the perceived vulnerability of
those areas to the threat.
 Success criteria
 Possible security solutions.
Once this overarching statement has been produced, which involves all stakeholders; more detailed
statements of requirements (Level 2) are produced for each area of concern, such as access control,
barriers, Intruder Detection Systems (IDS) etc and link together.
13
MI5, 2006, Security Service Guide to Producing Operational Requirements for Security Measures.
116102555
Page 63
Improve knowledge of effective critical
infrastructure protection
6.2 Prioritisation of the Proposed Additional Security Countermeasures
A countermeasures analysis is the process of identifying where a shortcoming exists between the
security measures in place and the desired level of security, or where additional suggestions may be
justified to further limit risk. Each potential target is protected against the highest-level threat
associated with that specific target.
Appropriate measures can for example be selected from an available source guide such as the CCPS
Guidelines or the suggested list of countermeasures in Attachment 17 – CCPS Security Vulnerability
Analysis: Security Countermeasures Checklists. At this point the SVA team should make a
determination using security expertise, as to the level of risk reduction selected countermeasures
provide. These analyses should be documented as they provide the business case for the application
of the countermeasures.
The details of the countermeasures and the consideration of alternative risk reduction
recommendation are left to the follow-up activities of the SVA. These activities include the need for a
risk register and resolution management system to track the design, implementation and
performance measurement of their effectiveness. In any case, the aim should be to document
selected countermeasures and incorporate these into the Operator Security Plan (OSP).
During the vulnerability analysis, the lack of effectiveness of some existing countermeasures and the
absence of some security functions or countermeasures should have been identified.
As a result, improvements by the enhancement of some existing countermeasures or additional
countermeasures and alternative risk reduction recommendations that may impact the likelihood or
the severity of the threat scenario will have been proposed.
These additional countermeasures have to be studied in the light of different aspects such as:
 the number of threat scenarios that a measure mitigates
 the way in which a measure fits within the security strategy;
 the effectiveness to reduce the risk;
 The cost of the measure.
It will be important to balance the likelihood of the threat, the level of security on the site, National
Security and/or other regulatory requirements plus company level security requirements against the
cost effectiveness of measures and the expected outcomes.
By doing so, the countermeasures and alternative risk reduction recommendations can be
prioritised.
116102555
Page 64
Improve knowledge of effective critical
infrastructure protection
Specific in-depth studies may be required to analyse the efficiency and implementation of proposed
countermeasures and the range of possible alternatives.
These countermeasures or ‘controls’ should be set against clear objectives as to ‘why’ they are being
proposed with an associated statement of Operational Requirement’ to enable their effective
implementation.
6.3 Enhanced countermeasures
The aforementioned additional permanent countermeasures can be defined as the countermeasures
to be implemented to reach an acceptable security level in the “normal” situation. Enhanced
countermeasures can be defined as the countermeasures to be implemented when a national or
local threat level increases.
For example, when the current threat level is low, vehicles may be searched at random. But, when
the level of threat increases, the adequate level of security may be the searching of all vehicles an
example of an enhanced security measure for an increased threat is to reduce non-essential activities
and restrict access to the site.
These enhanced countermeasures should be documented within the Graduated Security Procedures
for Increased Threat and all staff should be aware of their existence and content.
Again identifying and implementing enhanced countermeasures may require specific specialist
studies/ projects to be carried out in order to ensure that they are effectively scoped, identified and
implemented.
Output step 6
List of prioritised additional countermeasures
Project Implementation Plan for additional countermeasures
Study of the enhanced measures for the higher levels of threat
116102555
Page 65
Improve knowledge of effective critical
infrastructure protection
7 Overview of the SVA methodology
In the following figures are illustrated:
 The different steps and sub-steps of the SVA methodology as well as the inputs and outputs
required to carry out these steps,
 The flowchart of the SVA methodology showing the use of each worksheet and table to carry
out the SVA methodology at each step of the process.
116102555
Page 66
Improve knowledge of effective critical
infrastructure protection
Steps and sub-steps of the SVA methodology integrating the inputs and outputs of each step
116102555
Page 67
Improve knowledge of effective critical
infrastructure protection
Flowchart of the SVA methodology
116102555
Page 68
Improve knowledge of effective critical
infrastructure protection
8 Appendix 1 Links between the SEVESO DIRECTIVE requirements
and the SVA
The Scope of the SEVESO directive
Concerned industries
The SEVESO II Directive (96/82/EC) on the control of major accident hazards defines a number of
requirements for the operators of industrial sites where dangerous substances (toxic, flammable,
explosive of dangerous to the aquatic environment) are present in quantities equal to or in excess of
certain thresholds (see Art.2 and Annex I of the SEVESO II Directive). This definition covers a wide
range of establishments, including:
 chemical production plants
 petrochemical industries
 refineries
 fuel storage facilities (liquid flammables)
 LPG storage
 LNG terminals (storage and re-gasification facilities)
 Pharmaceutical industries
 Fertilizers and agricultural products
 Pyrotechnics and explosives
Requirements of the SEVESO II Directive
According to the quantity of dangerous substances stored, two categories of SEVESO sites are
defined:
 the lower-tier SEVESO establishments, with quantities exceeding the lower threshold,
 the upper-tier SEVESO establishments, with quantities exceeding the higher threshold.
Requirements of the SEVESO II Directive are adapted to the level of danger and hence to the
category of establishments. Then, operators of lower-tier SEVESO establishment have to provide a
notification, to define a major accident prevention policy (MAPP), to draw up accident reports, to
take into account land-use planning. Operators of upper-tier SEVESO establishments additionally
have to establish a safety report, to implement a safety management system, to define an internal
emergency plan, to provide all necessary information to the competent authorities to enable them to
draw up external emergency plans and to inform the public. These requirements aim at preventing
major accidents and mitigating their consequences, in order to protect human health and the
environment.
116102555
Page 69
Improve knowledge of effective critical
infrastructure protection
Possible links between the SEVESO directive requirements and the SVA study
Some steps of the SVA can use the results of the documents implemented due to SEVESO II Directive.
A schematic description of the relation between the requirements of the SEVESO II Directive and the
SVA, as well as the relevant information flows, is given in Figure 1. These flows are described below
step by step.
SEVESO
ECI
SCREENING/PRIORITISATION
SCREENING/PRIORITISATION
Cross-cut and Sectorial
Criteria
Quantity of hazardous
substances
NOT
LOWER-TIER
UPPER-TIER
ECI INSTALLATION
NOT ECI
COVERED
NOTIFICATION
Description of establishment
SAFETY REPORT
OPERATOR SECURITY PLAN
Description of establishment
Description of establishment
Description of environment
Risk Assessment
-Identification of Hazards
-Identification of scenarios
-Likelihood
SAFETY MANAGEMENT SYSTEM
-Circumstances
EMERGENCY PLANNING
-Consequences
INSPECTION
-Safety measures
INFORMATION TO PUBLIC
-Prevention
LAND-USE PLANNING
Risk Analysis
-Identification of major threat scenarios
-Vulnerability of Assets
-Consequences (potential impact)
Counter-measures and procedures:
-Permanent Security measures
-Prevention (Deter, Detect, Delay)
Direct Input /issue covered
-Response and Mitigation
Input /issue partially covered
-Mitigation
INCIDENT REPORTING
Identification of important Assets (e.g. ELSP)
Needs
to be
adapted
-Access
control
Conflict
-Other Technical Measures
Figure 1: Information flow between SEVESO and ECI requirements
-Organisational measures / awareness/ training
Facility characterisation (step 2 of the SVA)
-Crisis management
The description of the facility is one of the requirements of the Safety Report for upper-tier SEVESO
-Security of informationof
systems
establishments (see Annex II of Directive 96/82/EC and “Guidance on the preparation
a Safety
Report to meet the requirements of Council Directive 96/82/EC as amended
by
Directive
-Availability of information
2003/105/EC, available at http://mahbsrv.jrc.ec.europa.eu). Then, for upper-tier SEVESO
-Graduated Security measures
establishments a significant part of this information is already available through the facility’s Safety
Report, which in such cases will be the main data source of the facility characterisation.
116102555
Page 70
Improve knowledge of effective critical
infrastructure protection
Less extended but still useful information exists in the Notification submitted to the Authorities by
lower-tier SEVESO establishments, according to Articles 6 and 7 of Directive 82/96/EC. It is expected
that information about lower-tier establishments will have to be complemented from different
sources (e.g. the MAPP and its underlying safety documentation).
Finally it should be noted that not all chemical and energy-related facilities are covered by the
SEVESO II Directive.
It is worth noting that as the SEVESO legislation focuses on the safety-related data, the description of
the SEVESO establishment should be completed by data related to purely security functions, e.g.
height of perimeter fences, access control details, etc., that may not be available in the SEVESO
documentation and may have to be collected directly from the management of the site.
Asset Analysis (step 3 of the SVA)
The Safety Report should identify installations and other activities of a SEVESO establishment which
could present a major accident hazard. This identification is done thanks to a screening method, as
stated in the Safety Report Guidelines:
“The installations of an establishment to be submitted to risk analysis have to be possibly selected
through a screening method. The selection may follow the use of index methods or threshold criteria
for hazardous substances or other suitable methods. The SMS should provide the necessary objectives
and approach basics”.
Different screening methods apply in the different Member States to support the selection of the
facility parts that need further analysis: For example, in Belgium a “Vademecum” has been developed
to “guide” this selection; in the Netherlands the “Purple Book” recommends a method for the same
purpose. The latter is based on the calculation of an indication number, taking into account the
hazardous properties of the substances, and a selection number based on the installation and the
surrounding areas. This screening process will give the set of important chemical assets, which
should be further analysed to identify “critical assets”.
Usually this screening takes into account both the severity of possible consequences and their
likelihood, both roughly estimated. While exclusion of assets from further analysis due to estimated
low severity of their destruction is acceptable, cutting them due to low probability of occurrence is
not appropriate in SVA.
The process of identifying a list of assets can be summarized in the following steps:
1. Review the list of chemical assets deriving from the screening process for the purposes of the
Safety Report
2. Consider all those chemical assets whose analysis has not been conducted in the Safety
Report due to estimated low frequency of occurrence
116102555
Page 71
Improve knowledge of effective critical
infrastructure protection
3. Consider non-chemical assets, in particular, utilities, process control, emergency system,
personnel etc.
4. Consider interdependencies between the assets
5. Estimate the severity of attack and the attractiveness of the target (including difficulty of
attack) in order to analyse them according to Step 3 of the SVA methodology
This identification can be the starting point of the assets identification for the SVA and the data from
the safety analysis should be used here, especially for identification of critical chemicals. However, it
should be kept in mind that security events may not release the hazard source term in the same way
that accidental events as the initial events will be the safety event and may be more intense and the
safety measures (barriers) could be damaged.
Security vulnerability assessment (step 5 of the SVA)
This step aims at assessing the level of security for different combination of “threat / asset” (called a
threat scenario) in a vulnerability assessment table. This table can be similar to the one used in
industrial safety, such as those derived from HAZOP method, and is based on a scenario approach.
In the Safety Report, accidental scenarios have been identified and the relevant hazards have been
estimated. This information is important for the description of scenarios in the SVA and can be
directly taken from the Safety Report.
For lower-tier facilities, these scenarios need to be taken from the Safety Management System or
other calculations (e.g. for land-use planning).
For each scenario, the off-site consequence analysis may include estimates of the release rate,
quantity and conditions, of downwind effects, and of the impact on surrounding population and the
environment.
The safety study if concerned (that may be required if the site is under the SEVESO directive), as the
risk analysis can help to have an overview of the possible consequences of the loss of containment of
a hazardous substance. Still, it should be reminded that the set of incident scenarios and the
assessment of their consequences may have to be complemented with “worst-case” scenarios,
whose occurrence following an intentional attack cannot be excluded while it could be reasonably
excluded for safety purposes: For example, suppose that a facility contains 2 tanks full of a dangerous
substance, which are connected with a short pipe to the supply pipe-line. If this short pipe has
undertaken corrosion treatment and is regularly inspected, it is reasonable to exclude the scenario of
simultaneous release from both tanks. However, for security purposes, it cannot be excluded the
scenario that an intelligent activist places a bomb exactly at this short pipe, so that following its
rupture the complete amount of both tanks will be released. As a conclusion, reasonably worst-case
scenarios cannot be excluded from security risk assessment.
116102555
Page 72
Improve knowledge of effective critical
infrastructure protection
9 Appendix 2 Protection Strategies for Site Security Management
Layers of Protection/Rings of Protection
‘Layers of Protection’ is a concept well understood in the Chemical and Energy Sector Process Safety
field. 14 A series of self supporting but interactive measures are applied to a process, in order to
reduce the likelihood of an undesirable event occurring. This is shown graphically at Figure 1.
SITE EMERGENCY PROCEDURES/ RESPONSES
PHYSICAL MITIGATION (BLAST
HARDENING/ BUNDING ETC)
PHYSICAL PROTECTION
(e.g. RELIEF DEVICES
CRITICAL ALARM
LAYER
PROCESS
CONTROL
PROCESS
DESIGN
Figure 1: Layers of protection (adapted from CCPS et al.)
This can be adapted to the security domain whereby layers of countermeasures are (conceptually)
placed in concentric rings around an asset. These measures may include:
 Security Policies and procedures.
 Personnel Security.
 Physical Security.
 Cyber Security (of Information and Communication Technologies – ICT such as SCADA
systems)
 Information Security.
14
CCPS Guidelines, Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites
(2003), CCPS Layers of Protection Analysis: Simplified Process Assessment (2001, CCPS Inherently Safer Chemical
Processes – A Life Cycle Approach (2009) and appropriate standards such as IEC 61511 ‘Functional safety –
Safety Instrumented Systems for the Process Industry Sector".
116102555
Page 73
Improve knowledge of effective critical
infrastructure protection


Incident Management and Operational Continuity Management.15
Process Safety and other measures to mitigate the effects a security event (see comment on
‘Inherent Safety – IS’ which follows)
This is similar to commonly understood security concepts16 such as ‘rings of protection’ or ‘defence in
depth’ which are often applied to a facility or individual assets. These can consist of a series of
procedural or organisational measures (e.g. categorising and controlling visitors/ contractors,
applying information security controls to sensitive information) and: physical security measures such
as access control, perimeter barriers, lighting and detection in concentric layers. These principles are
also commonly applied to cyber systems where a mixture of procedural, cyber and physical security
measures are applied to Information and Communications Technologies (ICT) systems in order to
construct a layered ‘in-depth’ security system. A well designed system should aim to ensure that
defeating one particular security control should not breach the whole security system. It should also
be designed so that measures are both independent but complimentary of each other.
1. The “Deter, detect, delay” principle
The primary objectives of physical security when protecting an installation from an unauthorised
intruder are to achieve positive control on access to the facility and thereafter applying four key
concepts of Deter, Detect, Delay and Respond to intrusions into the facility or designated zones. This
is normally achieved by a combination of complimentary physical and procedural measures, which
should be integrated to achieve maximum effect. This concept aims at creating sufficient time
between detection of an attack and the point at which the attack becomes successful and should
serve as a guideline for preventing and mitigating terrorist scenarios. These are discussed in more
detail below.
Deter: prevent breaching of security by instilling fear or doubt.
If security measures serve to deter an intruder then they will have served their aim. Security
measures should not be seen in isolation, but rather the combination of observable security
countermeasures and other less tangible measures, such as target location, ease of
reconnaissance etc. and security operations designed to disrupt the attackers’ activities. The
deterrent factor of security measures will also depend on the determination and capabilities
of the intruder. The overall operating environment plus motivation, morale, training and
fitness of the intruder are all intangible factors and the deterrence value cannot therefore be
objectively quantified. The concept of ‘displacement’ of the attacker from a well-protected
15
For example see ISO ISO/PAS 22399:2007, societal security – Guideline for Incident Preparedness and
Operational Continuity Management.
16
Again as described by CCPS (2003).
116102555
Page 74
Improve knowledge of effective critical
infrastructure protection
site to another should also be borne in mind, especially where there are a number of sites
from which to choose. Measures Deter attacks by the means of visible, professional,
maintained security systems and measures, including well trained security staff, detection
systems, fences and barricades, and hardened or reduced value targets
Detect: identification of an antagonist before and/or during the attempt to execute a
malevolent act.
Detection should be designed to identify an intruder, preferably at the earliest point of the
intrusion. This can be achieved by a variety of technological or human means, including the
use of guard dogs or a combination thereof. Each has advantages and disadvantages with
none being completely reliable, although some of the more sophisticated technologies and
dogs, where installed or deployed effectively come close. All technologies require some level
of human supervision, as all will have a false or spurious alarm rate. Technology solutions
therefore require human intervention of alarm events but can offer significant efficiencies
and increased effectiveness, especially over mobile patrolling. The whole system cost must
however be considered from the outset, especially where physical verification of an alarm is
required and entails deployment of a guard to the area of alarm.
Security technologies are required to operate 24 hours per day, 365 days per year, to the
required operational specification. Local conditions, such as weather, routine but extreme
light changes, sun direction and angle, topography, site operations, wild life, traffic and
interference from other systems can all adversely affect performance. In some cases, on very
exposed sites extreme weather can seriously degrade alarm and surveillance systems. It is
therefore imperative that proposed systems are specified and tested for the specific site and
local conditions. Where a system, despite limitations, represents the best option, it is
necessary to be aware of why and when degradation will occur and if necessary, have
contingency measures to negate them.
Delay: Delay an attack for a sufficient long period of time to enable appropriate response.
Imposing Delay on an intruder can be achieved in a number of ways. Fences, walls, gates and
pedestrian and vehicle gates/ barriers are obvious choices, but also enhancement of natural
features and the site environment can be utilised. These issues will be covered in more detail
below. On large sites it is may be more appropriate to accept a lower specification on the
perimeter but add inner barriers around particularly critical points thereby using the space
and time to traverse the site as a delaying factor. As all barriers can be surmounted given
time and technique, it is important that barriers are under some form of surveillance, offer
enough time for the evaluation of alarms and ideally impose enough delay in order to allow
for an effective response.
Respond: An effective response as appropriate to the nature of the alarm event is
fundamental to any physical security regime. Whatever the nature of the response, be it to
evaluate or verify alarms, or to observe, interdict or apprehend these require to be
considered and clearly laid down. Given the nature of oil and gas installations, it is important
116102555
Page 75
Improve knowledge of effective critical
infrastructure protection
that external responders are adequately familiarised, trained and equipped for the task.
Issues such as coordination between security and emergency responses, intrinsically safe
communications, firearms and associated tactics and dynamic hazard assessment during an
incident require to be addressed. Experience has shown that this aspect can require
considerable local liaison and planning.
It is important to work out what is required to be achieved in ‘functional’ terms and formalise this as
an ‘Operational Requirement’ – OR and not to be swayed by the apparent attractiveness of a
particular technology solution.
Figure 2: Graphical description of Deter – Detect – Delay – Respond
2. Options for Mitigating Effects
Furthermore and in addition to the concept of “Layers of Protection”, measures to mitigate the
effects of an undesired event should be considered.
Measures to harden facilities such as adding blast protection to key assets or components, extending
the perimeter or moving assets to achieve ‘stand-off ‘ from explosive attack can be considered. In the
case of hand placed charges, achieving a small stand-off from a key component can significantly
reduce the effects of an explosive charge. In the case of large explosive devices, imposing even a few
tens of metres stand-off from an asset can considerably reduce blast effects. It is important to seek
expert security advice in this respect.
Consideration should also be given to process safety related incident management and operational
continuity measures. Process safe - shutdown and other measures to deal with hazards arising from
possible security events should be considered and pre-planned. For example, the possibility of a
suspect package being found within an installation requires to be considered and appropriate
process related procedures established, documented and practiced.
116102555
Page 76
Improve knowledge of effective critical
infrastructure protection
10 Appendix 3 Threat Catalogue
Adversaries
It is necessary to ascertain the characteristics of the relevant adversaries that can threaten the site.
The adversaries differ in motivation, goals to achieve, knowledge of the site, attack capabilities, risk
acceptance and endurance.
The following types of adversaries should at least be considered in this threat assessment:
 Terrorists (political, religious)
 Criminals (common, organized, Cyber)
 Hackers
 Violent activists (environmental, animal rights, anti-globalists)
 Vandals and deranged individuals
 Frustrated, disgruntled or addicted employees and contractors
Collusion
Some of these adversaries may collude with each other. Some criminals will for example collude with
hackers to obtain sensitive information such as credit card numbers and passwords.
Internal vs. External
All of these adversaries may be categorized as insiders or as outsiders. Insiders have routine,
unescorted site access where outsiders do not. Their characteristics and capabilities are different. For
example the criminal insider (employee) may embezzle company property whereas the criminal
outsider (burglar) may force his way into the facility.
Sometimes outsiders collude with insiders again changing the characteristics and capabilities of the
adversaries. This collusion may be motivated by monetary gain, ideological sympathy, blackmail or
coercion.
Copy-cats
Successful acts of adversaries that have gained mass media attention are likely to inspire Copy-cats of
all sorts sooner or later. This has to be taken into account each and every time a relevant intentional
act hits the media. Guidance on some general characteristics and capabilities of the mentioned
adversaries are described below.
Terrorists (political, religious)
Terrorists are the most difficult adversaries to contend with, given that they may be highly trained,
well equipped and prepared to die to achieve their objectives.
A primary characteristic of terrorism is the willingness to inflict as much damage to the society as
possible and kill civilians. Terrorists use violence or the threat of violence to achieve political,
116102555
Page 77
Improve knowledge of effective critical
infrastructure protection
religious or other ideological objectives. Many terrorists are willing to die for their cause. Some are
willing to inflict maximum damage, many casualties, and psychological terror on the population,
create political chaos or instability, social disruption and major economic damage to achieve their
goals.
Terrorists may seek targets with symbolic value. National treasures and landmarks, prominent public
structures or a symbol of an ideology are examples of such iconic targets. Putting critical
infrastructure out of business may well be one of their objectives.
Some terrorist groups prefer to commit multiple attacks more or less simultaneously in order to
increase the impact of their actions.
If terrorists decide to commit an attack on a CI, their mode of operation may involve several
conceivable strategies, ranging from threatening attacks to actually shooting at or blowing up critical
assets such as production facilities, storage tanks, power generators and pipelines.
Although terrorists might collude with other adversaries, they tend to keep things within trusted
circles to avoid detection by government agencies. Collusion between terrorists and Insiders is a rare
phenomenon, but they may seek to place someone in the organisation or coerce staff and should be
taken into account by the SVA-team.
Criminals
If security concerns such as theft of goods, materials or information are a high management priority,
then adversary motivation and capability analysis should be conducted for criminals.
In general criminals will be looking for maximal financial gain obtained with minimal efforts.
Criminals can steal easily marketable goods such as computers, valuable materials, ready-made
products or semi-manufactures, components and measuring instruments. Criminal attempts to steal
these goods usually involve trespassing and burglary. Some criminals will want to know beforehand
where valuable products are stored and how they are protected. In order to obtain such knowledge
they can try to get help from insiders, hack IT-systems or observe and explore the premises.
Although these actions are not aimed at disrupting industrial processes or inflicting damage, this can
surely be the case.
High-jacking, kidnapping and extortion are also criminal offences, but these are not relevant for the
SVA.
Hackers
Hackers try to break into third party computer systems. It is often just the intellectual challenge,
which drives them.
116102555
Page 78
Improve knowledge of effective critical
infrastructure protection
It cannot be excluded that a hacker may manage to break into and manipulate systems controlling
industrial processes of a CI. Hackers may also seek critical information about the security systems of
the site that could facilitate an attack.
So far hackers have rarely intentionally inflicted damage to CI.
However, a real threat emanates from adversaries like criminals or terrorists who get hackers to
work for them. Links between computers all over the world can be established via the Internet.
Still, most industrial controls and SCADA systems are not linked to the internet but the risk is
increasing due to the use of common operating systems and growing interconnectivity.
Violent activists (environmental, animal rights, anti-globalists)
Non-violent activists try to draw attention to their cause by means of public demonstrations or smallscale, relatively peaceful, actions such as climbing on objects or buildings. These activists are not the
greatest concern in the SVA.
However, the Violent Activists are willing to break the law and use violence to empower their
actions. Trespassing, stealing and destroying property, setting fire, short circuiting and cutting power
cables, clogging wastage pipes, breaking in, defacing websites and denial of service attacks are some
examples of their capabilities. Violent activists are usually outsiders.
Vandals and deranged individuals
Vandals destroy or damage public property on a small scale, inspired by youthful bravado, alcohol, a
need to impress people or just for fun. Deranged individuals cause similar damage for no apparent
reason. In general vandals and deranged individuals are kept at bay by basic and down to earth
security measures. Therefore usually the SVA does not need to address these adversaries.
Frustrated, disgruntled or addicted employees and contractors
Employees or contractors may be frustrated about job-related matters such as the absence of a
promotion, problems with colleagues or financial problems. Others may have psychological problems
in connection with stress or overwork, or marital or family problems. Another possibility is that
employees are taking medication like psychiatric drugs or they are addicted to drugs or alcohol.
All these factors may upset employees and contractors to such an extent that they go off the rails,
which manifests itself in, for example, rowdy, careless or negligent behaviour, and unauthorised
computer use, introduction of a computer virus, theft, and collusion with criminals, arson or
sabotage on a small scale.
As guidance thirteen general characteristics of the mentioned threats (an adversary and method of
attack) are described below.
116102555
Page 79
Improve knowledge of effective critical
infrastructure protection
Bombings
Bombings are the prerogatives of armies and terrorists and in some cases criminal groups. Some
terrorists use devices made for the military, others make them themselves (home-made). These
devices are called IED’s (Improvised Explosive Device). IED’s can be made in all forms, shapes and
sizes.
The following IED’s are distinctive:
Concealed IED
IED’s concealed on the body or in rucksacks have been used by suicide bombers quite frequently
against soft targets. It is not unthinkable that concealed IED’s might one day be used against
industrial sites.
Vehicle Borne Improvised Explosive Device
Vehicle Borne Improvised Explosive Devices (VBIED) can be used by terrorists to attack installations.
In suicide attacks, the terrorist will crash the vehicle bomb through the gate into the desired target.
The VBIED could be a car, a van or a truck.
VBIED parked near critical assets
It is relatively easy to hide explosives in a vehicle. Terrorists have frequently deployed vehicle bombs
against civilian targets, but seldom against industrial compounds so far. Parking a car bomb on the
grounds of a chemical plant near a crucial target requires some knowledge of the local situation
(where is the right spot and how is it protected). Preparatory activities may well be necessary.
But it is difficult for a terrorist to assess the effect of this attack. Furthermore a terrorist who intends
to commit a car bomb attack has a choice of many other attractive targets which are often much
easier (less risky) to target.
IED placed near, on or against critical assets
It is relatively easy to make a portable improvised explosive device. IED’s have been used against the
chemical industry before, such as in the UK by the Provisional IRA and in the Netherlands by Black
September.
Putting a portable IED against a crucial target at a chemical plant requires some knowledge of the
local situation (where is the right spot and how is it protected). Preparatory activities may be
identified by employees of the plant or by security officers. It is difficult for a terrorist to assess the
effect of his attack. It can be argued that a terrorist who intends to commit an attack with an IED has
a choice of many other attractive targets which are easier (less risky) to be attacked.
IED’s delivered by boat, glider or plane
IED’s delivered by boat, glider or plane are variations of the VBIED’s mentioned above. The likelihood
and possible impacts of these attacks may vary greatly.
116102555
Page 80
Improve knowledge of effective critical
infrastructure protection
Shootings
Several adversaries might take a shot at an industrial site. In this SVA the terrorist shooting at critical
assets on the site should be taken into account. Criminals would probably shoot at personnel instead
of at critical assets.
RPG
Terrorists might shoot at critical assets on an industrial site with rocket propelled grenades (RPG’s).
RPG launchers are rather easy to obtain within criminal circles. So far terrorists have not carried out
any attacks on industrial sites in Europe with rocket launchers. However, it cannot be ruled out that
terrorists in the Western world will carry out such an attack in the future. But it seems likely that
such an attack will cause only limited damage and a few casualties at the most.
Rifle
Terrorists, criminals or others might shoot at critical assets on an industrial site with a rifle. But it
seems likely that such an attack will cause only limited damage and a few casualties at the most.
Terrorists might shoot their way onto a facility to bomb, arson or sabotage critical installations.
Arson
Several adversaries might set fire to critical assets on a CI.
Molotov-cocktails
Molotov-cocktails might be thrown by violent activists, vandals and deranged individuals. These
adversaries would throw the cocktail from public grounds on flammable assets.
Incendiary device
Violent activists and terrorists might deploy an incendiary device. The attack with an incendiary
device might be combined with an IED. The IED is meant to create a flammable atmosphere (by
blowing up a container); the incendiary device will set this on fire.
Lighting a fire
Violent activists, vandals, deranged individuals and frustrated, disgruntled or addicted employees
and contractors could light a (camp) fire near or under critical assets of a CI. This fire might cause the
critical asset to malfunction or to ignite.
Sabotage, Stealing and Manhandling
Manual sabotage
Violent activists, vandals, deranged individuals and frustrated, disgruntled or addicted employees
and contractors might manipulate with or intervene in critical assets or operations on a CI.
Remote sabotage by cyber-attack
116102555
Page 81
Improve knowledge of effective critical
infrastructure protection
Hackers, violent activists, vandals, deranged individuals and frustrated, disgruntled or addicted
employees and contractors could try to manipulate with or intervene in critical operations using the
IT-infrastructure of the facility.
Stealing
Several of the mentioned adversaries may consider steeling assets, products, tools etc. In this SVA
only those thefts should be taken into account that may lead to serious consequents.
Manhandling
Violent activists, vandals, deranged individuals and frustrated, disgruntled or addicted employees
and contractors could break or destroy critical assets or parts thereof.
116102555
Page 82
Improve knowledge of effective critical
infrastructure protection
11 Appendix 4 Glossary, References and Bibliography
Glossary
CCPS
CI
DG JLS
ECI
EPCIP
EURAM
ICT
IED
HAZOP
OSP
RAMCAP
RPG
SCADA
SVA
VBIED
WP
Centre for Chemical Process Safety
Critical Infrastructure
Direction Générale Justice, Libertés et Sécurité
European Critical Infrastructure
European Programme for Critical Infrastructure Protection
European Risk Assessment Methodology
Information and Communications Technologies
Improvised Explosive Device
Hazard and Operability study
Operator Security Plan
Risk Analysis and Management for Critical Asset Protection
Rocket-Propelled Grenade
Supervisory Control and Data Acquisition, an IT system which carries out process
control
Security Vulnerability Analysis
Vehicle Borne Improvised Explosive Devices
Work Package
References
CCPS, “Guidelines for Hazard Evaluation Procedures”, American Institute of Chemical Engineers, New
York, 2008 3rd edition, www.wiley.com/go/ccps
CCPS, “Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites”,
American Institute of Chemical Engineers, New York, 2003, www.wiley.com/go/ccps
CCPS ‘Inherently Safer Chemical Processes – A Life Cycle Approach, American Institute of Chemical
Engineers, New York, 2009, www.wiley.com/go/ccps
Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of
European critical infrastructures and the assessment of the need to improve their protection, in OJ L
Nr. 345/75 of 23.12.2009
MI5, “Protecting Industry Against Terrorism”, 2005, 2nd edition Further information may be found
on www.mi5.gov.uk or CPNI.gov.uk
116102555
Page 83
Improve knowledge of effective critical
infrastructure protection
MI5, “ Security Service Guide to Producing Operational Requirements for Security Measures.” 2006,
Further information may be found on www.mi5.gov.uk or CPNI.gov.uk
CCPS “Layers of Protection Analysis: Simplified Process Assessment “ American Institute of Chemical
Engineers, New York, 2001, www.wiley.com/go/ccps
IEC 61511 ‘Functional safety – Safety Instrumented Systems for the Process Industry Sector".
Bibliography
Dr Larry Ness, “Securing Utility and Energy Infrastructures”, Wiley Interscience, New Jersey, 2006,
www.wiley.com
Mary Lynn Garcia, Sandia Corporation, (US Department of Energy)“ Vulnerability Assessment of
Physical Protection Systems”, Massachusetts , 2006, www.books.elsevier.com
ISO ISO/PAS 22399:2007, societal security – Guideline for Incident Preparedness and Operational
Continuity Management
116102555
Page 84
Improve knowledge of effective critical
infrastructure protection
12 Appendix 5 Worked Example
12.1 Introduction
The worked example describes how the SVA tool was used for an assessment of a chlorine
production plant, the plant studied was located next to a major town and river and there were
extensive transport links running near to the plant. The site has multi-modal road and rail plus water
(barge and Shipping) links and infrastructure. The site had a basic level of security already in place.
A typical chlorine production plant consists of brine production/treatment, cell operations, chlorine
cooling & drying, chlorine compression & liquefaction, liquid chlorine storage & loading, caustic
handling, evaporation, storage & loading and hydrogen handling. Other key assets were pipe work,
control systems (SCADA) and utilities (the process uses significant quantities of energy (electricity)
and processed water -de-ionised.
The Process flow used in the worked example was as follows:
Sodium Chloride (Brine) -> Brine Saturation/ Treatment system -> Chlorine Production Unit (cell
room) -> Chlorine cooling and drying -> Chlorine Compression and liquefaction -> Chlorine Storage
and Loading
12.2 Step 1 and 2
Firstly we completed a Project Plan for the SVA (worksheet 1) and completed the Key Document
Register (worksheet 2).
Next we determined the site attractiveness using worksheet 3 which is shown below to use this table
look at each Site description category, for example the first one is ‘proximity to a major city and
media attention level’ and choose a description that best meets the site in question. Look at the
score that best represents the site you are completing the SVA on and then multiply this score by the
weighting factor. So in the first category ‘proximity to a major city and media attention level’ we
chose description’ c)’ ‘Next to a capital or in a major city // adjacent to a nationally symbolic icon or
site: the site attack will imply a national media attention SCORE 3’ and we then multiplied in by the
weighting factor, which is 1 in this category, to give an overall score of 3. We then repeated the
process for each category and put the score in the right hand column, finally we summed the scores
to give an overall score for the attractiveness of the site which in the case of the worked example
gave a total of 21.
116102555
Page 85
Improve knowledge of effective critical
infrastructure protection
Total = Score x Weighting factor
Site Description
Description and Scores
Weighting Total for
factor the site
Proximity of a major city a)
No major or symbolic city // Rural zone // No major or symbolic icon or site or only locally symbolic
or of an iconic
icon or site: the site attack will no media attention or very locally SCORE 1
or well-known site
b)
In an urban zone // Regionally symbolic icon or site: the site attack will gain limited media
attention SCORE 2
and the media attention c)
Next to a capital or in a major city // adjacent to a nationally symbolic icon or site: the site attack
level
will imply a national media attention SCORE 3
d)
In the capital // in the city centre of a major city // adjacent to an international famous or major
recognizable landmark (e.g., European Commission, Eiffel Tower) world famous icon or site: a site attack
will imply a substantial National or European event. SCORE 4
Societal disruption at
a)
the local, regional,
b)
national or international c)
level
Threatened operator
1
3
3
9
5
5
2
4
Disruption of local society SCORE 1
Disruption of regional society // Disruption of a major regional supply SCORE 2
Disruption of national economy society // Disruption of a major national supply SCORE 3
d)
Disruption of European / international economy or critical infrastructure SCORE 4
a)
No known threat against the country or the operator SCORE 1
b)
Operator threatened by employees or by local associations SCORE 2
c)
Country threatened by regional activists (e.g. separatists), sector mentioned as or commonly
thought to be a potential target for terrorist but no threat SCORE 3
d)
Country of origin of the operator threatened by International terrorist organisation (e.g. USA,
Israel, UK), site known as a terrorist target SCORE 4
Company reputation
brand exposure
a)
No controversy or association actions known by the company against itself, company not known or
only locally well-known company (ex. Local major employer) SCORE 1
and recognition
b)
Company which has been subject of a controversy at the local stage (because of its activities type,
of its way of exploiting, of an accident, etc) or is the target of local associations or regionally well-known
(ex. Major employer of the region) SCORE 2
c)
Company which has been subject of a controversy in the national media (because of its activities
type, of its way of exploiting, of an accident, etc) or Nationally well-known company SCORE 3
d)
Company which has been subject of a controversy in the international media (because of its type
of activities, of its way of exploiting, of an accident, etc) or Internationally well-known company SCORE 4
Total automatically moves to Worksheet 5 column 8
TOTAL
21
12.3 Step 3 Assets Analysis
The next step is the Identification of the Principal Assets in this step the assets should be listed at
the system level only; assets at the component level are dealt with later in the SVA. Principle assets
should be listed in Worksheet 4 as shown on the following page. Alongside the principle assets the
rationale for selecting the assets as principle ones should also be listed as shown below. In the case
of our worked example 6 principal assets are listed all of whom form a key part in the operation of
the chorine production plant.
116102555
Page 86
Improve knowledge of effective critical
infrastructure protection
Worksheet 4 List of Principal Assets
List of Principal Assets
Chorine production unit 'x'
Justification and Description
The site cannot continue operation without this asset
Chlorine tank
The volume of chlorine in the tank would cause a major
impact offsite
Site is dependent on these routes for continued
operation
Damage to this asset would cause a fire, attract media
attention and close nearby roads and river
This is a single point of failure and the site cannot
continue operation without this asset
Entrance and Exit routes
Hydrogen pipe and storage tank
Manifold 'y'
Identified principal assets are then assessed according to two criteria: the asset attractiveness and
the asset severity. Here the selection of principal assets may differ from the selection of assets when
considering a business/ operational continuity focus.
The salient question of this assessment is “what types of events will cause the disruption of a critical
infrastructure, the release of a chemical or the destruction of equipment or components in such a
way that the most serious consequences will occur?”
This assessment is done considering the existing situation of the site and of the asset, taking into
account the benefits of existing countermeasures that protect the asset. There are nine factors for
the determination of attractiveness, out of which four are focussed on the site (see worksheet 3)and
five specifically focussed on the individual asset (see worksheet 5).
To do this copy the list of assets to Worksheet 5 and copy the overall site attractiveness score from
Worksheet 3. The individual assets are each then scored and weighted according to their individual
attractiveness and the total for each principal asset is then added to the site attractiveness which
was developed in worksheet 3. The total then is used to look up the attractiveness level in table 1.
In the case of our example the chlorine production unit ‘x’ gets a total score of 47 and an
attractiveness level of A2 and the hydrogen pipe gets a score of 57 and an attractiveness level of A3.
Five further categories of attractiveness of the assets can be defined and classified as shown in table
1. This step results in the evaluation of all the assets potential attractiveness that can be perceived by
adversaries and enables the identification of the high value assets according to their attractiveness.
116102555
Page 87
Improve knowledge of effective critical
infrastructure protection
WORKSHEET 5 ATTRACTIVENESS OF THE SITE AND THE ASSET
Column 1
Column 2
Column 3
Easiness to find the asset in
the site
Weighting Factor 3
a)
Column 4
Easiness to access
Easiness to hit
Weighting Factor 3
Weighting Factor 3
Column 5
Importance of the asset to
company continuity
Weighting Factor 2
Column 6
Value and merchandising TOTAL
Weighting Factor 5
a) High security site and the asset is at
the centre of rings of protection (Need to
penetrate numerous robust rings of
protection to reach the asset, with no
possible common failure) SCORE 1
a) No line of sight from
exterior and visible with
difficulty from the site itself ,
also shielded from internet
SCORE 1
a) Not at all or equipment without a
major importance in exploitation
SCORE 1
b) Restricted access to the site and to
the asset: only a restricted number of
employees have access to the asset and
asset in the centre of numerous rings of
protection
SCORE 2
b) Asset protected by many
other buildings, vegetation,
many other installations
(presence of major obstacles)
SCORE 2
b) Threats could be made or equipment b Asset with very low value but
which can be passed by-passed for a short very difficult to merchandise in
period and quickly replaced SCORE 2
parallel markets SCORE 1
c) Not noticeable from the exterior c) Restricted access to the site but no
but easy to spot on a map SCORE restricted access to the asset
3
SCORE 3
c) Asset protected by few
other buildings, vegetation, few
other installations (presence of
few obstacles)
SCORE 3
c) Threats have been made or
c Asset with medium value but
warnings are given against the asset difficult to merchandise in parallel
or against similar assets or equipment markets SCORE 2
which can be by-passed during a short
period but take time to replace
SCORE 3
d) Everybody knows where the
asset is or it is at the limit of the
site
SCORE 4
d) Sitting duck: no protection d) key and irreplaceable process
d Asset with high value and
of the asset
SCORE 4
equipment or equipment without which rather easy to merchandise in
the company cannot operate SCORE parallel markets SCORE 3
4
Hidden SCORE 1
b) Only employees can know
where the asset is. Not noticeable
from the exterior even on a map
SCORE 2
From Worksheet 4
Critical Assets
d) Site opened to the public
SCORE 4
Column 7
Column 8
SITE
ATTRACTIVENESS
Total for the site
from wrksht 3
Column 9
Column 10
Total (site + Attractiveness
asset)
= level (Look up
column
table 1)
7+column 8
a) No Value SCORE 0
e. Asset with very high value and
easy to merchandise in parallel
markets SCORE 4
chorine production
unit 'x'
6
6
6
8
0
26
21
47
A2
chlorine tank
Facility Entrance
and Exit routes
12
9
12
4
0
37
21
58
A3
12
12
12
4
0
40
21
61
A3
hydrogen pipe
12
9
9
6
0
36
21
57
A3
hydrogen storage
tank
12
9
12
6
0
39
21
60
A3
manifold
'y'
SCADA
process
control system,
component 'z'
6
6
6
6
0
24
21
45
A2
3
6
3
6
0
18
21
39
A1
Asset attractiveness
level
Score
Definition
A1
A2
A3
A4
22 – 38
39 – 54
55 – 73
74 – 90
Least attractive asset on the site
Low attractive asset on the site
Medium attractive asset on the site
High attractive asset on the site
91 – 108
Extremely attractive asset on the site
A5
116102555
TABLE 1 ASSET ATTRACTIVENESS LEVEL
Page 88
Improve knowledge of effective critical
infrastructure protection
Next we need to determine in Asset Impact, this is the result should an adversary successfully
compromise an asset. The asset impact level is decided by considering the various categories of
consequence which are described in Table 2, the Asset Impact Table. The level should be taken as
the highest level of consequence feasible from an attack on an asset.
For the material consequences, the value of damages determining each level will be determined by
the operator according to its turnover, its reputational value and or its investment capacity. The
following table, Table 2, The Asset Impact Table gives an example of levels that could be used.
Within table 2 each SVA team should discuss and set its own financial criteria for the property
damage in each impact level as this will need to be appropriate for each particular industrial site
where the SVA is carried out. Also clearly any level of casualty is a serious matter, however for the
purpose of this SVA it is critical that the SVA team identifies the number of potential casualties and
fatalities that would arise from each mode of attack. When selecting the impact level the SVA team
should consider all the issues (a-e) in each impact level and base the level on the highest impact risk.
Once the impact level for each principal asset has been decided this should be entered into
Worksheet 6 alongside the relevant asset.
116102555
Page 89
Improve knowledge of effective critical
infrastructure protection
Table 2 The Asset Impact Table
LEVEL
I1
DESCRIPTION
a.
b.
c.
d.
e.
I2
a.
b.
c.
d.
e.
I3
a.
b.
I4
I5
c.
d.
e.
a.
b.
c.
d.
e.
a.
b.
c.
d.
e.
Casualties: no more than one dead person and less than 10 severely injured people
Negligible environmental impacts, even if target has significant symbolic value (example: destruction of a
prominent national monument)
Negligible economic impact
Over XX € property damage (estimated as less than in S2)
Significant impact on the company reputation
Casualties: from 1 to 10 dead people and from 10 to 100 severely injured people
Environmental impacts to immediate site area only
Important economic disruption to the facility economy
Over XX € property damage (estimated as less than in S3)
High impact on the company reputation
Casualties : from 10 to 100 dead people and from 100 to 1’000 severely injured people
Major environmental, food chain or product impact with no health impact on the population but
widespread and visible effects (example: large environmental damage)
Severe economic disruption to the regional or industry economy
Over XX € property damage (estimated as less than in S4)
High impact on the company reputation
Casualties : More than 100 dead people and more than 1’000 severely injured people
Major environmental, food chain or product impact with possible widespread lesser health impact on the
population (example: contamination of food that causes widespread illness but no lasting effects except
to sensitive populations)
Severe economic disruption to the national economy
Over XX € property damage (estimated as less than in S5)
Very high impact on the company reputation
Casualties : More than 1’000 dead people and more than 10’000 severely injured people
Major environmental, food chain or product impact with possible widespread major health impact on the
population (example: large scale toxic contamination or drinking water or pharmaceuticals)
Severe economic disruption to the European economy
Over XX € property damage
Very high impact on the company reputation
Proposal of impact levels for the vulnerability analysis (based on the CCPS SVA guidelines)
Once the impact level of the potential consequences of a successful attack on a designated asset and
the attractiveness level of this designated asset have been ranked, the critical level of the asset can
be determined with the help of a matrix which combines the impact and the attractiveness for the
principal assets. The attractiveness level is taken from Worksheet 5.
The rankings of each asset in attractiveness and impact are inserted into Worksheet 6, Impact and
Attractiveness Worksheet. The Asset Code column can be used to identify each asset by assigning a
letter ‘A to Z’ this will assist when plotting the asset on a risk map.
116102555
Page 90
Improve knowledge of effective critical
infrastructure protection
Worksheet 6 Impact and Attractiveness Worksheet
Asset Code
A
B
C
D
E
F
Principal assets
see Worksheet see Impact
5 column 10
table 2
Attractiveness
level
Impact level
Chorine production unit
'x'
A2
Impact v
Attractiveness
Risk Map coordinates
I2
A2 I2
A3
I5
A3 I5
A3
I2
A3 I2
A3
I1
A3 I1
A2
I1
A2 I1
SCADA process control
system, component 'z' A1
I1
A1 I1
Chlorine tank
Site Entrance and Exit
Hydrogen pipe and
storage tank
Manifold 'y'
Plot the Risk Map co-ordinates from Worksheet 6 onto Worksheet 7, Attractiveness versus Impact
Risk Map.
As a result of this analysis, the SVA team have now determined a list of some of the highly critical
assets.
116102555
Page 91
Improve knowledge of effective critical
infrastructure protection
Risk Map
VH
4.5
Attractiveness
H
3.5
M
2.5
L
1.5
VL
0
VL
1.5
L
2.5
M
Impact
3.5
H
4.5
VH
In the above matrix, two extreme critical levels for the asset are defined with two extreme positions:
 A highly critical level for the more attractive (high value) and the more severe impact
targets (red) and
 A low-range critical level for the less attractive and less severe impact targets (green).
In this risk map the team seeks to identify the more attractive (high value) asset targets which if
successfully attacked would result in more severe impact, these are therefore the most critical. In
order to complete this matrix the SVA team must set the limits applicable to their own organisation
or site facility for the three green amber and red zones.
As a result of this analysis, the SVA team have now determined a list with at least the highly critical
assets.
As one can see in this example the Chlorine Tank at A3I5 would be within the red zone and is seen as
the most attractive asset to an adversary and The SCADA process control system component ‘z’ is
seen as the least attractive asset to an adversary.
116102555
Page 92
Improve knowledge of effective critical
infrastructure protection
12.4 Step 4 Threat Analysis
It is recommended to seek additional specialist expertise and advice in order to gain the data to fill
the worksheets in this step. It should also be borne in mind that adversaries can and do change at
short notice and therefore constant update on this data is also required. Details and guidance on
obtaining specialist advice is given in the section 0.3 of this document.
The threats described in worksheet 8 shows some preferential methods of attack for different
adversaries. This worksheet is only indicative, but can be helpful for suggesting relevant threats. In
the case of our example we choose a variety of IED related threats as being plausible a cyber attack
and two criminal activities, then using table 3 these were scored according to capability and intent.
Worksheet 8 Ranking of the Most Relevant Threats
CONCEALED IED
VBIED CRASHED INTO CRITICAL ASSET
VBIED PARKED NEAR CRITICAL ASSET
IED PLACED NEAR CRITICAL ASSET
IED’S BY BOAT, GLIDER OR PLANE
RPG
RIFLE
MOLOTOV-COCKTAILS
INCENDIARY DEVICE
LIGHTING A FIRE
BLOCKADE
MANUAL SABOTAGE
REMOTE SABOTAGE BY CYBER ATTACK
STEALING
PHYSICAL ASSAULT ON STAFF
COUNTERFEIT CRITICAL COMPONENTS
I
1
1
1
1
1
1
1
C
2
2
2
2
0
2
I
C
1
I
1
3
2
3
2
C
EMPLOYEES
VANDAL
ACTIVIST
HACKER
CRIMINAL
METHOD OF ATTACK
TERRORIST
ADVERSARIES
I
C
2
2
I
C
I
C
1
By characterising the threat in terms of intent and capabilities of adversaries, this worksheet enables
the selection of the most relevant, plausible and realistic threats.
116102555
Page 93
Improve knowledge of effective critical
infrastructure protection
Table 3
I = INTENT
There is no justification to think the adversary
has the intention to do so
The adversary may have the intention to do so
The adversary will certainly do so if there is an
opportunity
1
2
3
C = CAPABILITY
The adversary does not have the capability to
do so
The adversary may have the capability to do
so
The adversary certainly has the capability to
do so
0
1
2
The 0 score for capability choice means that the adversary does not have the capability to do so and
therefore reflects the fact that if this is the case then there is no threat resulting from this option.
Once the threats were scored according to intent and capability they were then ranked by
multiplying intent by capability to obtain the most relevant threats which in this case were stealing
and an activist blockade.
Worksheet 9 Ranking of the Most Relevant Threats According to Intent and Capability
Multiply intent by capability to obtain score
Adversary
Attack Method
Terrorist
Concealed IED
Terrorist
VBIED CRASHED INTO CRITICAL
Score
2
2
ASSET
Terrorist
VBIED PARKED NEAR CRITICAL
2
ASSET
Terrorist
IED placed near critical asset
Terrorist
RPG
Activist
BLOCKADE
Criminal
Stealing
2
2
4
6
The severity in step 5 is assessed according to a specific threat scenario which targets an asset and
which may result in partial or total compromise of the asset. This is an area that requires specialist
expertise in order to ensure that the output provides reliable data.
Only three examples of critical assets are used in Worksheet 10 of the example below.
116102555
Page 94
Improve knowledge of effective critical
infrastructure protection
12.5 Step 5 Security Vulnerability Assessment (SVA)
Step 5 involves developing the threat scenarios; a threat scenario is defined as the coupling of a
threat (the adversary and his method of attack) and a specific asset in the critical infrastructure.
Once the threat scenarios have been described, there is a clearer picture of the severity of a
successful attack (threat scenario).
These threat scenarios have then to be assessed in terms of likelihood and severity.
This is completed in the Ranking of the likelihood of a threat scenario. The likelihood of a threat
scenario depends on three parameters:
 The asset attractiveness
 The ranking of the attractiveness of the asset is the same as the combined attractiveness
score evaluated for each asset in step 3.
 The asset vulnerability
 This parameter takes into account the number and the robustness of the countermeasures in
place onsite for a threat scenario.
 The feasibility of the threat scenario.
This parameter takes into account the sophistication of the technical and organisational means
(modus operandi) used by the adversaries to perpetrate their attack on the asset.
The severity in step 5 is assessed according to a specific threat scenario which targets an asset and
which may result in partial or total compromise of the asset. This is an area that requires specialist
expertise in order to ensure that the output provides reliable data.
Worksheet 10 takes each threat scenario and assesses it for overall likelihood by looking at the target
attractiveness, vulnerability etc. Worksheet 10 calculates a score for the likelihood and then table 4
gives the likelihood level that corresponds to each score. In the case of our worked example a
blockade of the site entrances by activists is given the highest likelihood score.
116102555
Page 95
Improve knowledge of effective critical
infrastructure protection
WORKSHEET 10 LIKELIHOOD OF THREAT SCENARIO
Column 1
Column 2
Critical Assets
Column 3
Adversary
Column 4
Column 5
Target Attractiveness
Method of Attack
Column 6
Target Vulnerabiity (Ease of Access)
Weighting Factor 5
a)
Weighting Factor 1
Least Attractive asset on site
SCORE 0
a)
b) Low attractive asset on site SCORE 1
c)
d)
Medium attractive asset on site
SCORE 2
Highly attractive asset on site
SCORE 3
Target Robustness of
Construction
Very low Vulnerability SCORE 0
b) Low Vulnerability SCORE 1
c)
d) High vulnerability, measures are not strong, several
countermeasures need to be breached but individual
measures are not strong SCORE 3
e) Most attractive asset on site SCORE 4 e) Very high vulnerability, none or few measures and only a
single weak measure that needs to be breached or effective
measures do not exist SCORE 4
Weighting Factor 1
Weighting Factor 1
a) One or two individuals, little knowledge of site with simple
technical means to achieve the desired effect (e.g. Hand gun) SCORE
0
High robustness SCORE
b) Limited group, minimal knowledge of the site, not technically
1
sophisticated (e.g. Regular weapons, hand gun, greandes, assult rifle)
SCORE 1
c
d
Column 8
TOTAL THREAT
SCENARIO LIKELIHOOD
a) Very high robustness
SCORE 0
b
Medium vulnerability, at least one strong measure and
several other measures to be breached SCORE 2
Column 7
Feasibility of Threat Scenario
Medium Robustness
SCORE 2
c)
Organised group, good knowledge of the site and sophisticated
technical means(hand-man weapons such as IED)
SCORE 2
Low robustness SCORE 3 d) Organised and trained group, good knowledge of site and some
of its countermeasures, sophisticated technical means (e.g. Military
weapons and hand made such as IED) SCORE 3
e) Very low Robustness
SCORE 4
e) Highly trained group, very good knowledge of site and its
countermeasures, very sophisticated technical means (e.g. Coordinated attack with war weapons) SCORE 4
Sum
Weighting Factor x SCORE eg 5 x 0
chorine production unit 'y'
chlorine tank
Terrorist
VBIED
20
3
3
2
28
Activist
Blockade
20
4
3
2
29
Terrorist
VBIED
10
3
3
2
18
Entrances
hydrogen pipe and storage tank
manifold 'x'
.
SCADA process control system, component 'z'
.
TABLE 4 THREAT SCENARIO LIKELIHOOD
Level
116102555
Score
Threat Scenario
Likelihood
L1
0
Lowest Ranking
L2
1-8
L3
9 - 16
L4
17 - 24
L5
25 - 32
Highest Ranking
Page 96
Improve knowledge of effective critical
infrastructure protection
Once the likelihood level is established for the critical asset then the impact level of an attack on the
asset is found from worksheet 6. As the impact is now related to an individual threat scenario this
now becomes defined as the severity of an event. These to levels are then used to plot the
likelihood and severity risk for each threat scenario on to Worksheet 12. In worksheet 11 each critical
asset and adversary combination should be re assessed for each attack method, however for the
example we have assessed only 3 possible threat scenarios.
Worksheet 11 SEVERITY AND LIKELIHOOD OF A THREAT SCENARIO
Asset
Code
Asset Name
TOTAL
THREAT
SCENARIO
LIKELIHOOD
THREAT
SCENARIO
SEVERITY
RISK (severity
and
likelihood)
(from
worksheet 6
column 3)
A
chlorine tank
L6
S5
L6S5
B
Entrances
L6
S2
L6S2
C
hydrogen pipe and
storage tank
L3
S1
L3S2
D
E
F
Once worksheet 11 is completed the threat scenario can be plotted on worksheet 12, from our
examples you will see that the vehicle borne IED threat against the chlorine tank carries the highest
risk and is in the red zone and the VBIED against the hydrogen pipe and storage tank carries the
lowest likelihood and severity risk.
116102555
Page 97
Improve knowledge of effective critical
infrastructure protection
Worksheet 12
We then use those scenarios with the highest likelihood and severity risk to form the basis for
storyboards. These storyboards can then form the basis of an SVA file for each relevant threat
scenario, as illustrated in Worksheet 13, Scenario 1, this gives oversight and detailed information to
enable a motivated choice in Step 6 for adequate countermeasures.
These SVA files are a technical support for the vulnerability analysis to be fulfilled by the project team
during work meetings. These allow the project team to apply a systematic approach for the analysis,
particularly for the exploration of threat scenarios and assessing and identifying of the vulnerabilities.
This systematic approach enables the team to be detailed and comprehensive in analysing the
vulnerabilities of the site given the specific threats and the selected critical assets.
By creating a SVA database gathering data for each relevant threat scenario, this information is
available for analysis and later assessments and reports.
116102555
Page 98
Improve knowledge of effective critical
infrastructure protection
Worksheet 13 Example Storyboard
Scenario 1. Terrorists drive VBIED into chlorine tank
1. Threat scenario:
Asset + Adversary +
Attack
Loss of containment of chlorine due to a VBIED attack by Islamic terrorists on the pipeline at the outlet of the
chlorine tank
2. Consequences
Toxic dispersion of chlorine

Casualties onsite and offsite

Limited material damage
3. “Story Board”:
1.The terrorists found information about the site and the chlorine tank on internet, and could observe the site from
public grounds
2.The terrorists force their way into the site with the VBIED (destroying the entry barrier or threatening the guards
at the entry)
3. The VBIED will be crashed into the pipeline killing the terrorists and causing a catastrophic event
4. Crisis-, disaster and BC-management will be activated
Plausible sequence of
events (before, during
after the attack)
4. Likelihood
SCORE = 5 (reason it is easy to find, identify, observe, hit, known target etc.)
5. Severity
SCORE =5 (because more than 1.000 casualties, 10 billions euro’s damage, etc.)
6. Risk
SCORE (5 x 5 = 25) 25 this is the highest risk score (dark red in the table)
7. Vulnerabilities
(ineffective
countermeasures for
this threat scenario)
1. Information security measures did not prevent sensitive information from exposure on the internet.
2. Critical assets were not shielded from prying eyes. 3. The entry barriers were easily destroyed and forced by a
vehicle.
4. The guardhouse offered the guards too little protection.
5. There was no physical barrier that could stop the VBIED on time / at sufficient stand off.
6. The pipeline and the tank did not withstand the pressure wave and the shrapnel of the VBIED.
7. The safety systems that might have secured a leaking pipe or tank could not mitigate the massive release of
chlorine caused by the VBIED-attack.
8. Casualties increased because of the inadequate response of emergency services (people were not directed to a
save area downwind). Etc.
8. Suggestions to
improve the security
of the site for this
scenario (for the
likelihood and/or the
severity) This will be
input for steps 4 and 5
1.The summary of the safety study, listing the catastrophic accidental scenarios and their consequences should be
informative for the public but elusive for adversaries
2. The entrance barrier can be strengthened or bollards can be added.
3. The guards could be protected by special physical barrier. Etc.
A more detailed discussion on countermeasures is given in Step 6.
116102555
Page 99
Improve knowledge of effective critical
infrastructure protection
13 Appendix 6 The Operator Security Plan
13.1 Introduction
13.1.1 Objectives of this Annex
The IMPROVE project focused on the development of a Security Vulnerability Assessment (SVA) tool
with the intention of improving the security of Critical Infrastructure facilities. This Annex is aimed at
assisting in the drafting of effective Operator Security Plans for these facilities once the strategies
and objectives for security have been defined. The objectives for security measures should be
derived from the mentioned SVA, but may also be found in legislation or company policies.
13.1.2 Operator Security Plan
An Operator Security Plan (OSP) describes the security measures that an organization has
implemented to reduce or control its security risks. The word “operator” refers to the owner or the
person in charge of managing and operating the security of a critical infrastructure. A Security
Management System (SMS) should be in place to properly address this issue. The OSP addresses the
highlights and recommendations resulting from a security vulnerability assessment as described
above.
13.1.3 Why a Security Plan?
Security measures should be integrated into and become part of normal business procedures. All
members of staff contribute to, and benefit from the security of the facility. There are several
reasons for implementing security measures such as:
 risk management and control;
 loss prevention;
 international, national or local legislation and regulations;
 safety requirements, for example entrance control to prevent untrained or unprotected
personnel from getting into hazardous situations;
 pressure from the public, unions or stakeholders.
Security measures are often costly to implement, operate and maintain. Therefore it is important
that the objectives of the different security measures are well determined. Measures will often only
be effective if they are well understood, implemented and maintained. This may be achieved through
a well developed OSP as part of an adequate SMS.
13.1.4 Effectiveness
An effective OSP has the following characteristics:
 complies with legal security requirements and company security policies;
 is based on sound vulnerability and risk assessments;
116102555
Page 100
Improve knowledge of effective critical
infrastructure protection




leads to effective protection of assets and interests of the facility;
helps to properly detect threats and deal with security incidents;
contributes to achieving security goals in an effective way;
ensures proper implementation, maintenance and evaluation of security measures.
13.2 Best Practices
The following best practices provide useful guidance when drafting or evaluating an Operator
Security Plan. The selection of appropriate security measures depends of course on the specific
operations and surroundings of each site and therefore the following suggestions should be regarded
as guidance only.
13.2.1 Process
Draft and design the security measures in an orderly way
First define the security objectives and corresponding measures, making sure that their
implementation results into achieving these security goals. Measures that hardly contribute may be
put aside.
Principal questions are:
 What has to be secured?
 What are the threats that must be addressed?
 Why are the selected security measures appropriate?
Build security awareness and commitment
It is essential that throughout the organisation, including subcontractors, visitors and other possible
parties involved, there is a clear understanding of the necessity of the implemented security
measures. It should be ensured that there are no conflicts between security and operational
requirements on the facility. Both should complement and strengthen each other and any obstacles
should be addressed properly.
Principal questions are:
 Is the workforce aware of potential threats to the site and the vulnerabilities?
 Is everyone informed on the security policies and objectives?
 Doe they understand their responsibilities and tasks in managing the security risks?
Identify and develop the necessary expertise
Security covers many very specific aspects, each requiring different levels of expertise: risk and
vulnerability assessments, IT-security, physical security, legal requirements, identification of
adversaries and their methods of operation. It is essential that qualified experts join the team and if
necessary, experts from outside the organisation are engaged.
116102555
Page 101
Improve knowledge of effective critical
infrastructure protection
Principal questions here should be:
 Which expertise is needed in the team?
 Which help is available within the organisation?
 Which help is not available and must be obtained from outside?
13.2.2 Selection of security measures
The following recommendations may help in selecting appropriate security measures whereby the
first four will normally have been addressed during the SVA process.
1. Classify and rank the assets or areas of the facility in terms of criticality.
2. Obtain a clear understanding of the relevant threats.
3. Define the security objectives for specific assets or areas.
4. Define the security levels, zones and compartments.
5. Make a justification for each set of security measures and describe the secured situation in order
to avoid misunderstanding for persons who need to act upon this information.
6. Ensure that entrance control is efficient for security purposes and for daily operations.
7. Identify technical systems, personnel and procedures for the timely detection of adversaries.
8. Create a central point of contact for reporting and follow-up of security incidents.
9. Establish contacts with public emergency response services and engage into mutual support
agreements with neighbouring facilities.
10. Anticipate higher than normal threat levels and develop enhanced security measures which can
be activated when required.
11. Do not underestimate the value of security awareness.
12. Assess the cost of implementation and maintenance of security measures based on a cost-benefit
analysis.
13. When selecting the required measures consider standardisation.
13.2.3 Implementation and maintenance
Security project management
Security countermeasures should be specified, tendered, procured, installed, commissioned and
accepted as a formal project in line with industry standards.
Use qualified contractors
Once the security measures have been selected, these should be implemented by certified security
engineers and technicians. It is up to them to actually engineer and build the required security
systems. Quality control on this essential phase of the security cycle (plan-do-check-act) should
preferably be supported by security experts.
Operational maintenance and control
116102555
Page 102
Improve knowledge of effective critical
infrastructure protection
It is important to take into account during the design phase the interaction between the day-to-day
operations of the facility and the security functions. The operational management of these security
functions should be well described and the necessary equipment and arrangements should be
foreseen.
Manage the internal and external relations
The security operations manager should coordinate and communicate with:
 senior management;
 reception, dispatch centre, HRM (Human Resources Management), ICT, business operations,
public relations, communications etc.;
 staff;
 security providers, police and first responders;
 neighbours (companies and the public) and the municipality.
Accountability for security operations
The accountability for the management of security risks and the operation of security functions
should be clearly described and should be in line with legal requirements and company policy. This
includes the responsibility for timely revising and keeping up to date security procedures as well as
the distribution of relevant documents amongst staff in the organisation and in the facility.
OSP documentation and dissemination
The documentation of the OSP should be transparent and complete. Ownership and responsibilities
for updating and distribution of documents should be clearly determined. Information of the OSP
may be sensitive or classified. This should be clearly defined and monitored. Securing this
information may be required but in general the content of the OSP must be available to all staff on a
‘need to know’ basis.
Maintenance and review of the security plan
The Operator Security Plan should be reviewed in a predetermined time or period set by
management and this period can vary depending on changes to the threat, changes to the
operations, responsibilities or methods of working.
13.3 OSP Contents and structure
It is recommended that the Operator Security Plan should contain the following information:
116102555
Page 103
Improve knowledge of effective critical
infrastructure protection
13.3.1 Introduction
The Introduction outlines the importance of the Security Plan and its relationship with the mission,
general policies, security policies and culture of the organization. It should outline the areas of the
organisation that the Security Plan applies to – for example is it a plan for the whole organization or
only for a specific facility, portfolio or work unit.
It should also provide clear and concise statements about what the Security Plan is designed to
achieve and outline the relationship between security policies and processes and the corporate plans
and business objectives.
There should be a summary and analysis of the Security Vulnerability Assessment (SVA) highlighting
the current threats and vulnerabilities along with an assessment of the current security environment
and measures in place. If loss prevention is an objective of the organization it should be outlined as
well.
The management summary of the SVA may supply most relevant information for this chapter.
13.3.2 Security Program
The Security Program outlines how security in the organization is managed, evaluated and updated in
a Security Management System (SMS).
The security staffing, supervision and training of staff should also be addressed.
Security awareness training for all staff and communication of security incidents and countermeasures should be organized as an ongoing process.
In this chapter reference may be made to other programs and plans such as for: emergencies, crisis
response and business continuity.
13.3.3 Operational Policies and Procedures
The operational security policies and procedures describe how the security goals and objectives of
the organization are achieved.
The roles, responsibilities and authorisations of staff will be addressed in this chapter.
A clear and published access control policy is an essential security function that will be highlighted in
this chapter.
Access procedures to secured areas of the site should be drafted for authorised staff, invitees,
vendors and maybe contractors, whereby means of identification, registration and badging will be
addressed.
116102555
Page 104
Improve knowledge of effective critical
infrastructure protection
Key and access cards will have to be disseminated in a secure and transparent fashion. Procedures
may be in place to prevent theft or loss of valuable goods, inventory or data.
If security incidents do take place the process of incident reporting may be the basis for mitigation
and corrective action.
Of course the response to a security incident by staff, security workers and management needs
adequate attention.
13.3.4 Physical Security Measures
Physical security measures are needed to support the operational policies and procedures. Access
control is supported by external barriers like fences, gates and Access Control and Alarm Monitoring
Systems (ACAMS).
Theft prevention is supported by barriers, a perimeter intrusion detection system, security lighting,
locking hardware, vaults and ACAMS.
Incident response may be coordinated from the security control centre.
13.3.5 Personnel Security Measures
Personnel security measures are implemented to recruit, contract and employ reliable, trustworthy
and security aware personnel and subcontractors. Pre-employment screening may be conducted for
critical functions, security clauses may be in contracts of employees, subcontractors and suppliers.
Aftercare of staff once employed is as important as initial screening.
An exit procedure on termination of employment or contracts should be considered in order to
cancel authorisations, protect intellectual property and collect company properties. Debriefing the
leavers may provide useful security feedback for the company.
116102555
Page 105
Improve knowledge of effective critical
infrastructure protection
Template structure
The following template could be used for drafting a structured Operator Security Plan. This is only a
suggested template however and should not be considered as the only alternative.
1. Introduction
1. Company mission, goals and objectives
2. Security Policy and scope of the OSP
3. Brief description of process and implementation
4. Security Vulnerability Assessment
5. Loss prevention
2. Security Program
1. The Security Management System (SMS)
2. Documentation and administration of the OSP and SMS
3. Security staffing, supervision and training
4. Security awareness program
5. Other security related programs and plans
6. Communication plan
3. Operational Policies and Procedures
1. Access control
2. Key and access card control
3. Theft and loss prevention
4. Incident reporting and recording
5. Incident response and investigation
4. Physical Security Measures
1. External and internal barriers
2. Perimeter intrusion detection, CCTV and security lighting
3. Locking hardware for buildings, compartments and vaults
4. Access control and alarm monitoring system
5. Security control centre
5. Personnel Security Measures
1. Pre-employment screening and aftercare
2. Security clauses for contracts
3. Security awareness
4. Exit procedure
116102555
Page 106
Download