BUILDING DESIGN FOR HOMELAND SECURITY. Unit IV Vulnerability Assessment



Similar documents
BUILDING DESIGN FOR HOMELAND SECURITY. Unit I Building Design for Homeland Security

Risk Management Series Building Design for Homeland Security. Student Manual January 2004 FEMA E 155

Current as of 11/10/08 1 of 1

Chapter 8. EOC Security Concepts and Requirements:

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

Appendix B Florida Building Code Building Section Public Shelter Design Criteria

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Does a fence or other type physical barrier define the perimeter of the facility?

New Ontario Building Code Requirements for Mid-rise Wood Frame Buildings

Industrial Suburban District Regulations City of St. Petersburg City Code Chapter 16, Land Development Regulations

All substantial design decisions and budget confirmation shall be resolved for the College to approve the Design Development Submittal.

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

Certification: Building Plans Examiner. Exam ID: B3

EVACUATION Fire / Explosion / Smell of Smoke / Gas Odor / Fire Alarm / Bomb Threat

Data Center Due Diligence List

9770 CULVER BOULEVARD CULVER CITY, CA Incidental improvements: improvements that do not qualify as minor or

CyberFortress Data Center at Innovation Park Infrastructure and Topology Guide. Innovation Park Charlotte. NC DRAFT V0.

ORANGE UNIFIED SCHOOL DISTRICT SCHOOL FACILITIES MASTER PLAN NEEDS ASSESSMENT

Civil Engineering and Architecture (CEA) Detailed Outline

May 5, Client Client Address. Re: Inspection Address, Chicago, Illinois. Dear Mr. Client,

REVEWED BY: Ross Rogien B.O/P.R. ADDITIONAL REVIEW(S) REQ.-FIRE DEPT Y/N

Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc

DESIGN REVIEW CHECKLIST Chapter 6 Special Consideration Design Guidelines

2.4 Hardcopy submittals shall be provided at adequate size so that all notes are readable.

FRONTIER PITTS Datacentre Protection

COMMERCIAL PLAN SUBMISSION FOR NEW CONSTRUCTION AND/OR RENOVATIONS

Todd & Cue Ltd Your Business Continuity Partner

FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II

Total Building Commissioning: Case Study of the U.S. District Courthouse in Salt Lake City, Utah, USA

AT&T Internet Data Center Site Specification New York III (Secaucus, NJ)

Lease Security Standards: Instructions for Lease Acquisitions

Post Occupancy Evaluation (POE) Technical Instructions

New York State Unified Court System. Workplace Safety Assessment

APPENDIX A: BUILDING VULNERABILITY ASSESSMENT CHECKLIST

BUILDING DATA. Facility Assessment Report, Garland Independent School District 3. Williams Stadium (Facility #913)

Disaster Prevention and Protection Checklist

LogisticsCentre IV Distribution Center

Risk Management Report

City of La Vernia 102 E. Chihuahua Street, La Vernia, Texas Phone: (830) Fax: (830)

How To Visit An Internet Data Center

DRAPER ELEMENTARY SCHOOL

Prepared For San Francisco Community College District 33 Gough Street San Francisco, California Prepared By

SECTION TABLE OF CONTENTS. H Proposed Material, Product or Equipment Substitution Request

Sample Outline (courtesy of City of Guelph Museums) Building Conservation Plan

AT&T Internet Data Center Site Specification - Phoenix Area (Mesa, AZ)

ST. MONICA FOOD PANTRY HOUSTON, TEXAS

Hurricane Checklist. It is in the best interest to ensure that our employees are safe and that our properties are secure prior to a hurricane event.

SUBSTANTIAL IMPROVEMENT OR SUBSTANTIAL DAMAGE NOTICE TO PROPERTY OWNER

Lindsay Thurber Comprehensive High School Red Deer School District No. 104 School Facilities Evaluation Project Page 1

Suffolk County Department of Health Services. Division of Environmental Quality

Commercial Building Valuation Report

When is a Permit Required? What Types of Permits are Required? The most common types of projects that require permits are:

AT&T Internet Data Center Site Specification Dallas Area (Allen, Tx)

Vestibule Case Study. Vestibule Requirement Intent [2003 IECC, 2006 IECC, 2003 IBC, 2006 IBC, , ]

Protection of unoccupied or void properties

HATFIELD TOWNSHIP DEMOLITION PERMIT APPLICATION PROCEDURES

Security Risk Assessment and Mitigation Prioritization

Emergency Preparedness

AT&T Internet Data Center Site Specification Chicago Area (Lisle, IL)

ORANGE UNIFIED SCHOOL DISTRICT SCHOOL FACILITIES MASTER PLAN NEEDS ASSESSMENT

NON-RESIDENTIAL BUILDING PERMIT PROCEDURES

NATIONAL INSTITUTE OF GOVERNMENT PURCHASING (NIGP) DESIGN AND CONSTRUCTION CODES

DIVISION 00 - PROCUREMENT AND CONTRACTING REQUIREMENTS

East Mississippi Community College. Scooba Campus * Mayhew Campus Department of Public Safety. Campus Emergency Action Plan.

Building Permit Application

CITY OF BERKELEY BUILDING PERMIT DETAILED CHECKLIST

MTA UNIVERSAL STATION PEDESTRIAN BRIDGE Los Angeles, CA. Project Manual and Specification 100% PE SUBMITTAL TABLE OF CONTENTS

Lot Number. City. Architect Name SUBCONTRACTORS - COMPLETE AND ATTACH LIST ON PAGE 4

Accela Automation User Manual for Gwinnett County Automated Inspection Request System (IVR)

Bureau Veritas Contact Information

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/ Officer: Case No:

Physical Security Assessment Form

AT&T Internet Data Center Site Specification Washington-DC Area (Ashburn, VA)

Walkthrough Inspection Checklist

Factors to Consider When Developing an Evacuation Plan

Commercial or Business Security Survey

Aurora Mall. Aurora (Denver), Colorado

PARKVILLE HIGH SCHOOL LIMITED RENOVATION

Vulnerability Assessment. U.S. Food Defense Team

29 Broadway- 14 th Fl Tel: New York NY Fax: Due Diligence Report. New York, New York

Commercial Building Valuation Report

CONSOLIDATED EDISON CO. OF NEW YORK, INC. 4 IRVING PLACE NEW YORK, NY DISTRIBUTION ENGINEERING DEPARTMENT SUBSTATION & EQUIPMENT SECTION

BUILDING PERMIT SPECIFICATIONS

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

Assessment of Existing Data Centers for Critical Facilities Round Table Group

Preventative Maintenance

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013

Facility Assessment for East Main Street, Huntley, IL

BUILDING ASSESSMENT QUESTIONNAIRE. B. TENANTS Is there more than one tenant in the building? YES

Transcription:

Unit IV Vulnerability Assessment

Vulnerability Any weakness that can be exploited by an aggressor or, in a non-terrorist threat environment, make an asset susceptible to hazard damage Unit IV-2

Unit Objectives Explain what constitutes a vulnerability. Identify vulnerabilities using the Building Vulnerability Assessment Checklist. Understand that an identified vulnerability may indicate that an asset: is vulnerable to more than one threat or hazard; and that mitigation measures may reduce vulnerability to one or more threats or hazards. Provide a numerical rating for the vulnerability and justify the basis for the rating. Unit IV-3

Vulnerability Assessment Identify site and building systems design issues Evaluate design issues against type and level of threat Determine level of protection sought for each mitigation measure against each threat Unit IV-4

Assessment Flow Chart AssetValue Assessment (Section 1.1) Cost Analysis Analyze how mitigation options affect asset criticality and ultimately risk Vulnerability Assessment (Section 1.3) Risk Assessment (Section 1.4) Identify Mitigation Options (Chapters 2 and 3) Decision (Risk Management) (Section 1.5) Threat/Hazard Assessment (Section 1.2) Analyze how mitigation options change vulnerability and ultimately risk Unit IV-5

Identifying Vulnerabilities Multidisciplinary Team Engineers Architects Security specialists Subject matter experts Outside experts if necessary Unit IV-6

Vulnerability Assessment Preparation Coordinate with the building stakeholders: Site and Building Plans Utilities Emergency Plans (shelter, evacuation) Interview schedules Escorts for building access Unit IV-7

Assessment GIS Portfolio Unit IV-8

10-Mile Radius Unit IV-9

Regional Transportation Unit IV-10

Metro Center Imagery Unit IV-11

Site Emergency Response Unit IV-12

Site Public and Government Buildings Unit IV-13

Site HazMat Unit IV-14

Site Local Transportation Network Unit IV-15

Site Principal Buildings by Use Unit IV-16

Site Perimeter Imagery Unit IV-17

Site Truck Bomb Unit IV-18

Site Car Bomb Unit IV-19

Options to Reduce Vulnerability 1) Define Site Functions 2) Identify Critical Systems Interviews with Site Personnel 3) Evaluate Facility System Interactions 4) Determine Common System Vulnerabilities 5) Physically Locate Components and Lines 6) Identify Critical Components and Nodes Review Prints and Specs; Check with Systems Experts On-site Inspections Apply Vulnerability Checklist 7) Assess Critical Nodes vs. Threats Threat Spectrum Evaluation 8) Determine Survivability Enhancements Survivability Options 9) Document Entire Analysis Process Records Unit IV-20

Facility System Interactions Figure 1-8: Facility System Interactions, page 1-23 Unit IV-21

Single-Point Vulnerabilities Unit IV-22

Functional Analysis SPVs Standard 11 Standard 13 and 17 Standard 1 Standard 1 The loading dock and warehouse provide single point of entry to the interior The mailroom is located within the interior and not on exterior wall or separate HVAC system The telecom switch and computer data center are adjacent to the warehouse The trash dumpster and emergency generator are located adjacent to the loading dock Figure 1-10: Non-Redundant Critical Functions Collocated Near Loading Dock, p. 1-41 Unit IV-23

Infrastructure SPVs Electrical Service Air Intakes Drive Through Telecom Service Unit IV-24

Building Vulnerability Assessment Checklist Compiles best practices from many sources Includes questions that determine if critical systems will continue to function during an emergency or threat event Organized into 13 sections Each section should be assigned to a knowledgeable individual Results of all sections should be integrated into a master vulnerability assessment Compatible with CSI Master Format standard to facilitate cost estimates Unit IV-25

Building Vulnerability Assessment Checklist Site Architectural Structural Systems Building Envelope Utility Systems Mechanical Systems (HVAC and CBR) Plumbing and Gas Systems Electrical Systems Fire Alarm Systems Communications and IT Systems Equipment Operations and Maintenance Security Systems Security Master Plan Unit IV-26

Building Vulnerability Assessment Checklist Vulnerability Question Guidance Observations 6 Mechanical Systems (HVAC and CBR) 6.1 Where are the air intakes and exhaust louvers for the building? (low, high, or midpoint of the building structure) Are the intakes and exhausts accessible to the public? Air intakes should be located on the roof or as high as possible. Otherwise secure within CPTED-compliant fencing or enclosure. The fencing or enclosure should have a sloped roof to prevent throwing anything into the enclosure near the intakes. Ref: CDC/NIOSH Pub 2002-139 Is roof access limited to authorized personnel by 6.2 means of locking mechanisms? Is access to mechanical areas similarly controlled? Roofs are like entrances to the building and are like mechanical rooms when HVAC is installed. Adjacent structures or landscaping should not allow access to the roof. Ref: GSA PBS P100, CDC/NIOSH Pub 2002-139, and LBNL Pub 51959 Extracted from Table 1-22: Building Vulnerability Assessment Checklist, pages 1-46 to 1-92. Unit IV-27

Building Vulnerability Assessment Checklist 5.19 5.20 By what means does the main telephone and data communications interface the site or building? Are there multiple or redundant locations for the telephone and communication service? Does the fire alarm system require communication with external sources? 5.21 By what method is the alarm signal sent to the responding agency: telephone, radio, etc.? Is there an intermediary alarm monitoring center? Extracted from Table 1-22: Building Vulnerability Assessment Checklist, pages 1-46 to 1-92. Unit IV-28

Building Vulnerability Assessment Checklist 1.15 Is there minimum setback distance between the building and parked cars? 4.1 What is the designed or estimated protection level of the exterior walls against the postulated explosive threat? 4.2 Is the window system design on the exterior façade balanced to mitigate the hazardous effects of flying glazing following an explosive event? (glazing, frames, anchorage to supporting walls, etc.)? Extracted from Table 1-22: Building Vulnerability Assessment Checklist, pages 1-46 to 1-92. Unit IV-29

Building Vulnerability Assessment Checklist 6.1 Where are the air intakes and exhaust louvers for the building? (low, high, or midpoint of the building structure) Are the intakes and exhausts accessible to the public? 1.9 Is there any potential access to the site or building through utility paths or water runoff? (Eliminate potential site access through utility tunnels, corridors, manholes, storm water runoff culverts, etc. Ensure covers to these access points are secured.) What type of construction? 3.1 What type of concrete and reinforcing steel? What type of steel? What type of foundation? Extracted from Table 1-22: Building Vulnerability Assessment Checklist, pages 1-46 to 1-92. Unit IV-30

Building Vulnerability Assessment Checklist 2.19 Are loading docks and receiving and shipping areas separated in any direction from utility rooms, utility mains, and service entrances, including electrical, telephone/data, fire detection/alarm systems, fire suppression water mains, cooling and heating mains, etc.? 1.16 Does adjacent surface parking on site maintain a minimum standoff distance? For initial screening consider using 25 meters (82 feet) as a minimum with more distance needed for unreinforced masonry or wooden walls. Reference: GSA PBS-P100 Extracted from Table 1-22: Building Vulnerability Assessment Checklist, pages 1-46 to 1-92. Unit IV-31

Vulnerability Rating Very High One or more major weaknesses have been identified that make the asset extremely susceptible to an aggressor or hazard. High - One or more significant weaknesses have been identified that make the asset highly susceptible to an aggressor or hazard. Medium High An important weakness has been identified that makes the asset very susceptible to an aggressor or hazard. Medium A weakness has been identified that makes the asset fairly susceptible to an aggressor or hazard. Medium Low A weakness has been identified that makes the asset somewhat susceptible to an aggressor or hazard. Low A minor weakness has been identified that slightly increases the susceptibility of the asset to an aggressor or hazard. Very Low No weaknesses exist. Unit IV-32

Critical Functions Function Cyber attack Armed attack (single gunman) Vehicle bomb CBR attack Administration Asset Value 5 5 5 5 Threat Rating 8 4 3 2 Vulnerability Rating 7 7 9 9 Engineering Asset Value 8 8 8 8 Threat Rating 8 5 6 2 Vulnerability Rating 2 4 8 9 Extracted from Table 1-20, page 1-38 Unit IV-33

Critical Infrastructure Function Cyber attack Armed attack (single gunman) Vehicle bomb CBR attack Site Asset Value 4 4 4 4 Threat Rating 4 4 3 2 Vulnerability Rating 3 5 9 9 Structural Systems Asset Value 8 8 8 8 Threat Rating 3 4 3 2 Vulnerability Rating 2 4 8 9 Extracted from Table 1-21, page 1-39 Unit IV-34

Summary Step-by-Step Analysis Process: Expertly performed by experienced personnel Determines critical systems Identifies vulnerabilities Focuses survivability mitigation measures on critical areas Essential component of Critical Infrastructure and Critical Function Matrices Unit IV-35

Unit IV Case Study Activity Vulnerability Rating Background Vulnerability: any weakness that can be exploited by an aggressor or, in a non-terrorist threat environment, make an asset susceptible to hazard damage Requirements: Vulnerability Rating Approach Use rating scale of 1 (very low or no weakness) to 10 (one or major weaknesses) Refer to HIC case study and rate the vulnerability of asset-threat/hazard pairs: HIC Critical Functions HIC Infrastructure Unit IV-36