Vulnerability Assessment. U.S. Food Defense Team



Similar documents
FDA s Vulnerability Assessment Software tool

How to Effectively Use the CARVER+Shock Method of Assessing Risks and Vulnerabilities

CARVER+Shock. Jeffrey J. Danneels Department Manager Sandia National Laboratories Albuquerque, NM

Vulnerability Assessments of Food Systems

Food Safety vs. Food Defense: Differences and Similarities

A Free Software for Food Industries to Ensure Food Safety: CARVER + Shock Vedpal Yadav and Alka Sharma

CARVER+Shock Vulnerability Assessment Tool

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

The National Antimicrobial Resistance Monitoring System (NARMS)

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

Addendum to the Epi-Aid Trip Report: Elk River Chemical Spill, West Virginia, January 16 31, 2014 (Epi-Aid )

Homeland Security Presidential Directive/HSPD-9 Subject: Defense of United States Agriculture and Food January 30, 2004

Systems Based Vulnerability & Risk Assessment

Nova Scotia EMO. Hazard Risk Vulnerability Assessment (HRVA) Model. Guidelines for Use. October, 2010

Security Risk Assessment and Mitigation Prioritization

From Farm to Fork - How to Improve Surveillance of the Food Supply Chain. Prof. Dr. Dr. Andreas Hensel

Business Continuity & Disaster Recovery

Preparedness in the Southwest

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Avoiding the Top 5 Vulnerability Management Mistakes

RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay

BUILDING DESIGN FOR HOMELAND SECURITY. Unit IV Vulnerability Assessment

HPAI Response HPAI Response Goals November 18, 2015

BUSINESS CONTINUITY POLICY

BUSINESS CONTINUITY PLANNING

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

The INEE Minimum Standards Linkages to the Sphere Minimum Standards

Metrics: (1) Poorly (2) Adequately (3) Well (4) Very Well (5) With Distinction

Vulnerability Assessments. Background, Elliott, PAS 96 and TACCP

Solutions and IT services for Oil-Gas & Energy markets

MODULE III PLANNING &TRIAGE

Rehabilitation and Remediation of POPs

Interagency Statement on Pandemic Planning

Department of Behavioral Sciences and Health Education

Hazardous Materials Transportation Security Planning

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Ohio Homeland Security Strategic Plan

UIIPA - Security Risk Management. June 2015

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Information Technology Risk Management

FAO/WHO Regional Conference on Food Safety for the Americas and the Caribbean San José, Costa Rica, 6-9 December 2005

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

HEALTH INFORMATION MANAGEMENT

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

Methodology Primer for the Foodborne Illness Risk Ranking Model

Cornell University PREVENTION AND MITIGATION PLAN

Emergency Preparedness Guidelines

MPH Final Concentration Research Project Proposal

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Canadian Public Health Laboratory Network. Core Functions of Canadian Public Health Laboratories

Analyzing the Security Significance of System Requirements

Airport preparedness guidelines for outbreaks of communicable disease

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

10 easy steps to secure your retail network

Crosswalk of Model Standards and Key Points within the Three NPHPSP Instruments

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

DISTANCE LEARNING PROGRAMME COURSE SYLLABUS UNIVERSITY DIPLOMA IN RURAL DEVELOPMENT BY DISTANCE LEARNING

Assessment Profile: Establishing Curricular Categories for Homeland Security Education

Calhoun County EMA. Job Description EMERGENCY MANAGEMENT OFFICER-I

CGI Cyber Risk Advisory and Management Services for Insurers

Key things to Know About Environment as a. Cross Cutting Issue In Early Recovery

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

Threat Management: Incident Handling. Incident Response Plan

Pike County General Health District. Emergency Response Plan

Who Are The Enemies? What Can They Do?

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC

SECURITY RISK MANAGEMENT

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

ABU DHABI FOOD CONTROL AUTHORITY. Food Poisoning

Learning from Defects

Threat and Hazard Identification and Risk Assessment

ICTN Enterprise Database Security Issues and Solutions

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Homeland Security Graduate Programs

MSOH Degree Requirements

The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation

Description Purpose Health Education. Health Assessment. Outcomes of the program Partners Contact Information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

CIS 523/423 Disaster Recovery Business Continuity

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Program Overview. BOSC Homeland Security Subcommittee Meeting August 25, 2015

ESKISP Conduct security testing, under supervision

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Transcription:

Vulnerability Assessment U.S. Food Defense Team

Vulnerability A weakness in a processing, handling or storage facility or operation that would allow for intentional contamination of a food product

Vulnerability Assessment Process of identifying and prioritizing the weaknesses in a food operation weakness = vulnerability Used to identify specific points in the food supply chain where intentional contamination has the greatest potential to cause economic and public health harm specific points = critical process steps

Vulnerability Assessment CARVER+Shock Criticality = public health and economic impacts Accessibility = physical access to the target Recognizability = ease of identifying a target Vulnerability = ease of adding sufficient contaminant Effect = amount of direct loss Recuperability = ability of the system to recover +Shock = psychological effects

Why Use CARVER+Shock? Simplifies and standardizes the process Breaks down exposure and hazard into characteristics that are easily defined and can be examined independently Provides a measurable scale for each of the characteristics to facilitate quantitative assessment Examines public health, economic, and psychological consequences of an attack

How does vulnerability assessment help address food defense? Allows targeting of resources in the following areas: Foods and agents of greatest concern Selection of mitigation strategies Research Analytical methods (rapid and confirmatory) Nature of disease (e.g., oral infective dose) Food-agent compatibility Food processing mitigation steps Physical security mitigation steps

How does vulnerability assessment help address food defense? Allows targeting of outreach to stakeholders: Guidance Industry and regulator training Preparedness exercises Communication Emergency response preparedness Sufficient laboratory capacity/capability Sufficient medical mitigations Effective disposal methods

Vulnerability Assessment in Action Break a food system into its unit operations (in other words create a process flow chart) Analyze each unit operation to identify targets most vulnerable to contamination = critical nodes Leads to the identification of mitigations to reduce the vulnerability at those nodes

Aggressor Profile Attackers could range from disgruntled employees to international terrorist organizations Different capabilities and different goals Major assumption used by FSIS and FDA Insider with the goal to cause mortality and economic harm to the company by adding acutely toxic agents to food products That assumption does impact the scoring of the various parts of the supply chain and the scales for the attributes have been developed with that in mind

Industry Focus and Impact Learning from VA s done with the U.S. food industry: For best prevention of intentional contamination focus mitigation efforts on reducing: VULNERABILITY ACCESSIBILITY

Accessibility Measure of the ease with which an attacker can physically access the intended target to intentionally contaminate the food

Accessibility A target is accessible when an attacker can reach it to conduct the attack and leave undetected Accessible = openness of the target to the threat OR

Accessibility Scale CRITERIA Easily Accessible (e.g., target is outside building and no perimeter fence). Accessible (e.g., target is inside building, but in unsecured part of facility). Partially Accessible (e.g. inside building, but in a relatively unsecured, but busy, part of facility). Hardly Accessible (e.g., inside building in a secured part of facility). Not Accessible (e.g., there are physical barriers, alarms, and human observation to prevent reaching the target). SCALE 9 10 7 8 5 6 3 4 1 2

Vulnerability Measure of the ease with which a contaminant can be introduced in quantities sufficient to achieve the attacker s purpose (once the target has been accessed)

Vulnerability Determined by the characteristics of the target Volume appropriate to accommodate contaminant Sufficient and uniform mixing after addition Ability to work unobserved, e.g, poor supervision Time available for introduction of agents Downstream processing will not eliminate the contaminant It is also important to consider what interventions are already in place that might prevent an attack

Vulnerability Scale CRITERIA Highly Vulnerable (e.g., product is openly exposed and there is lots of time to allow for easy introduction of contaminants without being seen). Vulnerable (e.g., product has some open exposure and there is sufficient time to almost always allow for introduction of contaminants without being seen). Somewhat Vulnerable (e.g., product has limited exposure points and limited times when contaminant can be added without being seen). Barely Vulnerable (e.g., product has limited exposure points but is almost always under observation while in production). Not Vulnerable (e.g., product is in sealed vessels/pipes with no practical exposure points or it is under full and controlled observation). SCALE 9 10 7 8 5 6 3 4 1 2

Volume Measure of the amount of product that could be affected if a contaminant was successfully added at a particular point

Volume Scale (What is the impact of a single contamination at this point?) CRITERIA Very Large Volume Impact (e.g., a single instance of contamination at this point would contaminate multiple days of the production of this line). Large Volume Impact (e.g., a single instance of contamination at this point would contaminate multiple shifts of the production of this line). Medium Volume Impact (e.g., a single instance of contamination at this point would contaminate one shift or less of the production of this line). Small Volume Impact (e.g., a single instance of contamination at this point would contaminate two hours or less of the production of this line). Low Volume Impact (e.g., a single instance of contamination at this point would contaminate 30 minutes or less of the production of this line). SCALE 9 10 7 8 5 6 3 4 1 2

2006: E. coli and spinach - Demonstrates vulnerability: efficient and widespread distribution

2009: Salmonella and peanuts

Factors that contribute to high VA scores Serving size - sufficient agent delivery Short shelf life rapid turnaround at retail, rapid consumption Ability to disguise the contaminant High impact consumer = children, elderly Lack of processing/preparation steps to inactivate, reduce agent Uniform Mixing

Factors that cause high VA scores Large batch size high number of contaminated servings, potential affected individuals Uniform mixing efficient agent distribution into servings

Factors that cause high VA scores Easy access Ability to reach process at high risk points Poorly supervised food production areas, processes Widely disseminated foods Efficient food distribution = potential for mass casualties Decreased chance of public health recognition, intervention

Vulnerability Assessment Software No cost, downloadable Includes agriculture and manufacturing modules Focus on Vulnerability and Accessibility www.fda.gov/fooddefense

Where to start Select a person or team to be responsible Answer the questions in the assessment to help determine which parts of the facility may be more vulnerable Consider both potential internal and external threats Keep results confidential so that they do not provide a roadmap for future attacks

Thank you www.fda.gov/fooddefense