Security Management Systems (SEMS) for Air Transport Operators. Executive Summary



Similar documents
Framework for an Aviation Security Management System (SeMS)

THE UNIVERSAL SECURITY AUDIT PROGRAMME (USAP)

Business Continuity Management Policy

Subject: Establishment of a Safety Management System (SMS)

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005

University of Sunderland Business Assurance Information Security Policy

Business Continuity Management

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

MODEL REGULATION SAFETY MANAGEMENT SYSTEM REGULATION. International Civil Aviation Organisation

Passenger Protect Program Transport Canada

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Business Continuity Planning and Disaster Recovery Planning

1.0 Policy Statement / Intentions (FOIA - Open)

A GOOD PRACTICE GUIDE FOR EMPLOYERS

Implementing a Security Management System: An Outline

States shall establish a State safety programme, in order to achieve an acceptable level of safety in civil aviation.

Business Continuity Policy and Business Continuity Management System

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

WEST YORKSHIRE FIRE & RESCUE SERVICE. Business Continuity Management Strategy

DEPARTMENT OF DEFENSE COMMERCIAL AIR TRANSPORTATION QUALITY AND SAFETY REQUIREMENTS INTRODUCTION

BUSINESS CONTINUITY PLAN. Specific Issues for Public Health Emergencies. Guidelines for Air Carriers

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

Information Governance Strategy & Policy

Mitigating and managing cyber risk: ten issues to consider

Safety Oversight Audit Section

Outsourcing and third party access

Business Continuity Management Framework

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

1. This bulletin, which contains the Charter of the Office of Internal Oversight Services (IOS) of

Emergency Management and Business Continuity Policy

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Stellenbosch University. Information Security Regulations

Business Continuity Management. Policy Statement and Strategy

Business Continuity / Disaster Recovery Context

CATSA Screening Contractor Management System Standard (2015)

Risk Management Policy and Framework

Operational Risk Publication Date: May Operational Risk... 3

Business Continuity Management and BS by Steve Chan, Head of Training - HK, BSI Management Systems

The PNC Financial Services Group, Inc. Business Continuity Program

RUSSIAN FEDERATION MINISTRY OF TRANSPORT INNOVATION

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

National Occupational Standards. Compliance

Information Security Management System Policy

Integration of QMS, SMS,

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

CODE OF PRACTICE. Safety Management. Occupational Safety and Health Branch Labour Department CODE OF PRACTICE ON SAFETY MANAGEMENT 1

Information Security Management System Information Security Policy

Information Security Policy

ENTERPRISE RISK MANAGEMENT POLICY

RISK MANAGEMENT FRAMEWORK

FINAL May Guideline on Security Systems for Safeguarding Customer Information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

Third Party Security Requirements Policy

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for

ISO/IEC Information Security Management. Securing your information assets Product Guide

Compliance. Group Standard

Audit summary of Security of Infrastructure Control Systems for Water and Transport

HMG Security Policy Framework

CHAPTER 1: BUSINESS CONTINUITY MANAGEMENT STRATEGY AND POLICY

INTEGRATED MANAGEMENT SYSTEM MANUAL IMS. Based on ISO 9001:2008 and ISO 14001:2004 Standards

Why you should adopt the NIST Cybersecurity Framework

1.1 Terms of Reference Y P N Comments/Areas for Improvement

BUSINESS CONTINUITY POLICY

Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)

The PNC Financial Services Group, Inc. Business Continuity Program

UIB AVIATION AIRLINE RISK PROFILE. Dependable Corporate Insurance in any language

FINAL AUDIT REPORT. Audit of the information and communications technology (ICT) governance and security management in peacekeeping missions

Business Continuity Management

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Shepway District Council Risk Management Policy

Code of Conduct Sourcing & Supply Chain FAU-F-SPG-2400/EN

Information security policy

Financial Services Guidance Note Outsourcing

Business Continuity Policy

OH&S Management Systems Audit Checklist (NAT, E3)

NOT PROTECTIVELY MARKED BUSINESS CONTINUITY. Specialist Operations Contingency Planning Business Continuity Manager

Preparation for ISO OH&S Management Systems

I S O I E C I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

APPLICATION OF KING III CORPORATE GOVERNANCE PRINCIPLES 2014

GUIDANCE ON ORGANISATIONAL STRUCTURES

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Global Health & Safety Policy and Management Standards

Asset Management Policy March 2014

Emirates Airline. Cargo Security The EK Experience

The anglo american Safety way. Safety Management System Standards

NHS Business Services Authority Information Security Policy

Health, Safety and Environmental Management System

Business Continuity Policy

INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Health and Safety Management Standards

PART A. .3 to ensure the early and efficient collection and exchange of security-related information;

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

QUALITY MANAGEMENT IN VTS

Transcription:

Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011

Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early 2002, the Security Committee requested IATA s help to draft the Security Management document incorporating both aviation security and corporate security, the recommended security structure for an airline and guidance on the management of security. Security management system was not designed to impose a complete overhaul of one s security operations rather it was created to demonstrate what should be aimed for. If current policies and practices within an organization provide a satisfactory outcome, there may not be any need to change or modify the approach. This executive summary should be used in conjunction with the IATA Security Manual and other tools which provide detailed guidance on the implementation of the various aspects outlined in this document. Security management systems (SeMS), by integrating security awareness throughout the organization and verifying compliance through quality assurance, can be a significant force in achieving the highest possible level of regulatory compliance. Specific security practices, training and audit functions within a security management system should all be built so as to ensure compliance with applicable national aviation security programmes. This executive summary is to provide the reader with an overview of security management systems, the elements required to obtain and implement such a system, and a model implementation guide. Why Security Management Systems? The aviation industry remains a legitimate target in the eyes of terrorists. The focus of terrorist attacks has changed since 2001 as now casualties are a central part of terrorist operations rather than simply be collateral damage. Since 2001, every organization involved in air transportation has re-assessed and is still re-assessing their security measures. The ultimate goal of the Security Management System is to serve as a guideline for IATA s member airlines in helping them build effective aviation security measures. A standardized structure, such as SeMS, provides better and more uniform security standards throughout the airline industry. Through implementation of SeMS an effective and focused threat assessment should contribute to making security practices proactive instead of relying on more traditional reactive procedures.

What is a Security Management System? A Security Management System is an element of the corporate management responsibility which sets out a company s security policies and its intent to manage security as an integral part of its overall business. It is important to keep in mind however that each airline must implement the system that works best in their specific situation there is no one-size-fits-all system. A SeMS is a businesslike approach to security. As with any business plan, goals are set, levels of authority are established and so on. Ultimately, SeMS becomes woven into the fabric of the organization and becomes part of its culture. Core Elements In order to have and effective Security Management System, it should include the following Core Elements and sub-elements. As there is no one-size-fits-all, each airline may choose to group or break down these elements and sub-elements in different ways, in accordance with their own security management system structure, but the each objective of the elements are met: Senior Management Commitment Head of Security Security Department Organization Resource Management Staff Selection Staff Evaluation Security Training Program Security Awareness Management of Service Providers Threat Assessment & Risk Management Identification of threats and risks Threat Assessment Risk Assessment Management of Emergency & Incidents (Resilience) Emergency Preparedness & Response Crisis & Contingency Management Plans Security Incident Management Quality Control & Quality Assurance Corrective Action mechanism External Service Providers Aviation Security Program Document Procedures

Understanding the Core Elements Senior Management Commitment No matter the size, type or complexity of operations, senior management of the parent company as well as the top executive of the organization play a major role in determining a company s commitment to security. General directions and visions should come from the senior management at the highest level. They are responsible for setting the security standards and promoting security within the organization. Based on the size, structure and complexity of an operator s organization, the position of head of security is filled by a management individual that has responsibilities that are in addition to security. However the organization is structured, it is important that one management official is the designated focal point for security management on behalf of the operator. The head of security is generally assigned responsibility for: Formulation of an overall security policy for senior management acceptance; The development and promulgation of security standards and practices to provide line management with direction and control; Establishing a clear order of command in the security structure; Ensuring effectiveness of security program by regular evaluation and inspection; Effective liaison with governments, authorities and law enforcement agencies; Ensuring an effective risk analysis, threat assessment and response capability; Initiating special security measures during periods/instances of increased threat; A clear organizational chart of the Security department should be drafted where all necessary responsibilities have a dedicated point of contact. The organizational chart should be proportionate to the size of the company. Communication of security information, as appropriate, is a very important part of the senior management commitment. Resource Management Procedures should be put in place to hire competent staff and ensure that they have been cleared by background checks as outlined in National legislation, and the air carrier security program. An efficient training program should be developed for staff involved in implementation of security measures. Effective and measurable initial and recurrent training and testing/evaluation modalities should be developed. Security awareness training session should be attended by all employees, periodically, in order to promote a security culture. Performance appraisals should be conducted on a regular basis to ensure that all employees perform their functions adequately in a cooperative and constructive manner benefiting both the employer and the employee. Procedures should also be put in place for service providers regarding selection, security training and awareness.

Threat Assessment and Risk Management Air carriers should identify the threats and risks their organization is exposed to as a first step. The nature of the threats will then be evaluated as well as their likelihood and consequence which could render the organization at risk. The risk assessment is then used to address risks consistently and transparently; to protect staff, assets and brand; to prioritize resource allocation; and to serve as an early warning system. The assessment of risk also enables the operator to measure security performance against measures contained in the airline and airport security programs. Some States offer assistance in the threat assessment process. State mandates should have priority when they are in place. IATA has developed a Risk Assessment Template which IATA member airlines could refer to (available by IATA upon request). Management of Emergency and Incidents (Resilience) Public confidence is imperative in commercial air transportation. Although statistically, air travel is the safest mode of transportation, the fact is that air travel accidents usually involve massive loss of life, human suffering and hull loss which contribute to damaging public confidence for the industry as a whole. Failure to act accordingly during, and even after an incident will directly impact the affected organization. Air carriers should ensure that procedures are in place to handle security-related incidents and avoid operations being disrupted from them. Security-related incidents should be reported, investigated and managed. Standards should be in place to ensure that the Operator has suitable crisis and contingency management plans in place, which are implemented and tested, which address any breaches of security likely to result in an act of unlawful interference in relation to its operations, the response to changes in threat level or any other relevant disruption. For security incidents likely to result in an act of unlawful interference or expose the operator to vulnerability, a timely and comprehensive investigation is necessary. Quality Control and Quality Assurance Quality control and quality assurance are undertaken in order to review and assess procedures and processes, in place within the organization, are with desired security outcomes. The organization shall have a process in place for conducting periodic or eventdriven security surveys which identify the needs and weaknesses of the Security Program, including operational security procedures and infrastructure. The organization shall also have a quality assurance program that provides for the auditing and evaluation of the management system and operational security functions at planned intervals to ensure it is complying with the Security Program, achieving the Security Program objectives; and properly applying security standards.

Many options exist for quality control measures, both internally and externally, each with their advantages and disadvantages. Mechanisms shall also be put in place for addressing the findings under quality control and quality assurance which describe the necessary actions and time frames towards addressing the findings. The organization must ensure that their external service providers carry out functions and responsibilities consistent with contractual agreements and host state regulatory requirements. Aviation Security Program The air carrier should have a formal Security Program that includes the requirements of the civil aviation security program of the State, the applicable requirements of other states where operations are conducted and the security policy and standards of the Operator. The Security Program is required in order to: Protect customers, personnel and assets from any act of unlawful interference or related unlawful act; Provide directions on security measures required; Comply with regulatory requirements The Security Program provides a structure for security policy and awareness, which flows from senior management to all levels of operational personnel within the organization. The documented Security Program, as a minimum, specifies or makes reference to other documents that specify: Airline security policy and objectives; Means for achieving these objectives including establishing a security department; Structure and responsibilities of the security department; Security responsibilities of operational personnel, handling agents and other contractors; Minimum and contingency protective measures; Risk analysis, threat assessment and counter measures. In addition to stating responsibilities of the designated head of security, the Security Program specifies responsibilities of other personnel that perform operational security functions within the organization. Security issues which are important to air carriers, but not necessarily directly related to compliance of the Security Program, may also be included in the SeMS 1. This further reiterates that SeMS is designed to be an all encompassing security document that promotes security awareness. It is not meant however to replace the Security Program. 1 Such issues can be: Disruptive passengers, inadmissible passengers, stowaways, protection of layover crew, theft, fraud and insider crime, building and infrastructure security, cooperation with airport security and other AVSEC regulatory agencies, aviation security roles of station managers, etc.

Understanding a Security Management System When establishing a security management system, organizations should build on existing procedures and practices rather than starting from an empty sheet or rather starting all over. The adoption of best practice standards must be the goal in the process. A security management system is company wide, established at the corporate level, the SeMS should then devolve to individual departments; Flight operations, in-flight, baggage services, passenger service, airport services, and all other departments whose activities contribute to security need to develop their own procedures under the umbrella of security management systems. Each air carrier is responsible for the development of security procedures and operational bulletins based the core elements, taking into account their own operational environment resources available and regulatory framework of their State of Registry and State(s) of operation. If some security operations are outsourced, contract should identify the need for equivalent, auditable SeMS in the supplier. Implementing a Security Management System A Model Plan When an organization decides that it will implement a security management system in their operations, it is essential that a plan is drawn out. The implementation of SeMS is complex and involves a great number of entities within and outside of the organization. It is paramount that all affected parties are aware of what is expected of them, who they will need to co-operate with and at which moment in the project. Clearly the size and scope is very dependent many variables including the size of the organization, the current level of integration, regulatory requirements, etc. A model SEMS implementation plan is included in Table 1 below. Only high level activities are mentioned. When an organization decides to implement SEMS, it will need to identify each individual task, under all the main project components, detail them and provide a timeline. Multiple tasks can and should be undertaken at the same time. However, some tasks will be dependent on the outcomes of other. For large organizations the number of line items can easily be in the hundreds.

TABLE 1 : Model SEMS Implementation Plan SEMS High-Level Implementation Project Plan (Model) Task Name Duration Guidelines SEMS Project 6-2 years Project Management 6-2 years Project Charter 2 weeks - 3 Presentations to Civil Aviation Authority Ongoing duration of project Need to track all monthly status meeting reports and working sessions. Long time due to the scale and scope of the project and required senior management approval and endorsements. Provide regular updates to civil aviation authority on progress. Gain provisional guidance to ensure compliance to the regulatory requirements. Regulation and Standards 1 week - 1 month Ongoing if not a Regulation by local authority When no regulatory requirement for SEMS exist, it can be difficult to determine what is necessary. In the case where there are no regulatory requirements, it will necessary to use baseline standards to measure against. IOSA Security standards can be used. Once the requirements are known a gap analysis will have to be performed against the set requirements. Kick-off Meeting 1 week - 1 month Meeting Preparation should be included. Document Current State (Documented, Implemented and Controlled within Core Elements) 2 weeks - 3 Project team will conduct an audit of their business unit determining if the Core Element as defined was Documented, Implemented and Controlled. If an element is not documented but implemented or partially, (most of the time) it can therefore not be Controlled. The gap analysis will determine the amount of work needed to be done and also identify areas where it is possible to leverage current processes. Corporate Policies 2 weeks - 3 Corporate Security policy review process but also review of policies that can be affected by security.

SEMS High-Level Implementation Project Plan (Model) Task Name Duration Guidelines Organizational Structure 1 week - 4 Determine the infrastructure required to implement and sustain SEMS. Job Competencies 2 weeks - 6 Integrated Business Processes SEMS Project - IT Solution Communication SEMS Quality Manual 1 month - 6 0 days - 2 years Ongoing duration of project 2-1 year Documentation of all management functions, including the process and ownership to sustain and manage once documented. Documentation of a common process for all entities to follow ensuring continuity and when trending, comparing similar reports. If possible a Corporate standard for reporting activities in all disciplines should be established. Develop an IT system to manage and sustain all that processes developed. This is normally one of the largest task with the longest timeline. Tracking of the communication plan / strategy Documenting a Quality Manual documenting all of the Corporate standards and processes in response to SEMS and regulatory or baseline requirements. This may be incorporated within existing manuals depending on the size and complexity of the organization. Risk Model 2-1 year Security Incident Reporting Mechanism Security Committees Company-wide Audit Programme SEMS Training 1 month - 1 year 2 weeks - 4 2 weeks - 4 Ongoing duration of project Documenting a Corporate Risk model to ensure all reports are managed in the same manner. Documentation of process to support written policy, ensuring fair and equal treatment. Need to consider and get approvals from unions, associations, third party contractors, etc. Documentation of all Security team/committee meetings, including attendees, mandate, authority, hierarchy, etc. Normally, not required but does contribute to decrease costs if there is an integrated audit plan developed that cross-utilize resources. Develop and track all training required for SEMS readiness. Very important component to ensure compliance.

SEMS High-Level Implementation Project Plan (Model) Task Name Duration Guidelines Internal SEMS audit SEMS Submission to Regulator for Approval 1 month - 6 Dependant on Regulators requirements and timelines Project Closure 2 weeks - 3 Internal audit in preparation of Regulator assessment. Should Include usage of assessment questions to be used and unbiased auditors conducting the audit, documenting findings and allowing time for corrective actions. Tracking of compliance process. Can include the final assessment of the Organisation's SEMS. Administrative, project management issues. Timeline dependant on complexity and length of project. Please note that the timelines indicated are guidance only and will be dependant on the size and complexity of the organization. It can take anywhere from 6 for a small carrier up to 2 years for a legacy carrier to implement SeMS. As with any project, the dedication and commitment of resources are critical to ensuring timelines are met and adhered to. Benefits of Security Management Systems A Security Management System allows each organization to achieve the same goal in a way that s appropriate to their business model. SeMS also provides the flexibility to achieve outcomes in a way that can be tailored to individual operations and to change as business models change. SeMS Feedback Loop Continuous Improvement Threats, Risks, Vulnerabilities Corrective actions, Adjustments Government regulations, Corporate requirements Performance measurement, Audits Policies, Processes

Next Steps IATA is developing a Security Management Systems Implementation Guide for Air Transport Operators which will be available in October 2011. For further information please contact: secfal@iata.org