Site security evaluation guide



Similar documents
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

Supply Chain Security Audit Tool - Warehousing/Distribution

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

How To Ensure Security At A Site Security Site

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Security Overview. BlackBerry Corporate Infrastructure

HIPAA Security Alert

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Court Security Guidelines

C-TPAT Self-Assessment - Manufacturing & Warehousing

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

Music Recording Studio Security Program Security Assessment Version 1.1

Statement of objective MALLS & MULTIPLEXES

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

Todd & Cue Ltd Your Business Continuity Partner

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Physical Protection Policy Sample (Required Written Policy)

Data Management Policies. Sage ERP Online

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Supplier Security Assessment Questionnaire

Intermec Security Letter of Agreement

Risk Assessment Guide

System Security Plan University of Texas Health Science Center School of Public Health

Seventh Avenue Inc. 1

Security Management Plan

IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness

Service Children s Education

FSIS Security Guidelines for Food Processors

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

APEC Private Sector. Supply Chain Security Guidelines

Security Guidelines for. Agricultural distributors

SUPPLIER SECURITY STANDARD

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Security Criteria for C-TPAT Foreign Manufacturers in English

Hosted Testing and Grading

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

C-TPAT Security Criteria Sea Carriers

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

PII Compliance Guidelines

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

Supplier Information Security Addendum for GE Restricted Data

A Self-Audit of Your Current Campus Security Systems

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

Global Supply Chain Security Recommendations

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Ten Steps for Preventing a terrorist Attack

Home Security Assessment Checklist DATE

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Physical Security for Drinking Water Facilities

Major Risks and Recommended Solutions

ISO IEC ( ) INFORMATION SECURITY AUDIT TOOL

Customs & Trade Partnership Against Terrorism (C TPAT)

Child and Adult Care Food Program Sponsoring Organization

C-TPAT Importer Security Criteria

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Hazardous Materials Security Awareness

Understanding Sage CRM Cloud

Rail Carrier Security Criteria

Does a fence or other type physical barrier define the perimeter of the facility?

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Winning Initiatives and Best Practices for Physical Security

Physical Security Assessment Form

Homeland Security for Schools: Threat Status Alert Worksheet

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

UK SBS Physical Security Policy

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/ Officer: Case No:

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

IT - General Controls Questionnaire

Does it state the management commitment and set out the organizational approach to managing information security?

Standard: Information Security Incident Management

SYRACUSE CITY SCHOOL DISTRICT

University of Pittsburgh Security Assessment Questionnaire (v1.5)

ISO Controls and Objectives

HEALTH & SAFETY PLAN

Transcription:

Site security evaluation guide

Table of contents Introduction...1 Site information...3 Site security evaluation summary...4 Site security evaluation guide...8 1. Risk assessment...8 2. Management policies...9 3. Physical security...11 4. Access control...13 5. Employee security...15 6. Information security...17 7. Material security...19 8. Emerging response...20 9. Crisis communication...21 10. Review/audits...22 Resources...23

Site security evaluation guide An in-depth risk assessment and analysis are the first steps in effective site security planning. The assessment is a systematic effort to identify potential threats and what assets need to be protected. Determining the likelihood and consequence severity helps prioritize the appropriate protective actions. Although security needs are unique for each organization, identifying assets that need to be protected will determine the proper level of security. Also, sites with hazardous materials and processes will require special protection and security considerations. For an enterprise, people, property and information are tangible assets that need to be protected. Intangible assets, such as goodwill and branding, are also critical. In addition to protection of assets, legal, regulatory and liability considerations are other important issues in site security planning. This site security evaluation guide provides guidance in assessing security at a fixed site. Additional sections for transportation and cargo security and satellite facilities can be added to expand the scope of this guide. This tool is neither a comprehensive security guide nor a prescriptive tool for security planning. It only attempts to point out various factors essential in security planning. Professional assistance should be obtained for situations involving unusual security threats. For further assistance, please contact: Zurich Services Corporation Risk Engineering 800-982-5964 www.zurichservices.com People assets include employees, visitors, contractors, the surrounding community and others associated with the business operation. Property assets range from building, machinery, and utilities to operations, equipment and systems. Informational assets are computer systems, processes and confidential business information, such as trade secrets and other proprietary information. Risk assessment should identify and target vulnerable assets in each of these categories. Identifying and evaluating vulnerability requires careful assessment of many risk factors and potential threats. These threats range from the routine threats of break-ins and thefts to the previously overlooked threats of terrorism, espionage and sabotage. Threats that were inconceivable in the past are now being considered possible. 1

Site information Reviewed by Company/customer Site address Site general manager Security manager Products/services Number of employees Operating hours Site area Neighborhood Description of worst credible risk scenarios 3

Site security evaluation summary 1. Risk assessment Observed strengths Observed weaknesses Action plan 2. Management policies Observed strengths Observed weaknesses Action plan 3. Physical security Observed strengths Observed weaknesses Action plan 4

4. Access control Observed strengths Observed weaknesses Action plan 5. Employee security Observed strengths Observed weaknesses Action plan 6. Information security Observed strengths Observed weaknesses Action plan 5

7. Material security Observed strengths Observed weaknesses Action plan 8. Emergency response Observed strengths Observed weaknesses Action plan 9. Crisis communication Observed strengths Observed weaknesses Action plan 6

10. Reviews/audits Observed strengths Observed weaknesses Action plan 7

Site security evaluation guide 1. Risk assessment 1 Has the company completed a systematic risk assessment for security threats? Is it updated at least annually? 2 Does the risk assessment clearly identify key vulnerable assets and sensitive processes requiring protection? Are the threat levels clearly understood? 3 Does the risk assessment identify the likelihood and severity of consequences with credible threat scenarios? 4 Does a multi-disciplinary team conduct the risk assessment? Does the team have appropriate training to conduct the risk assessment? 5 Is there a plan in place which utilizes an effective strategy for prevention and mitigation? 6 Are any neighborhood operations, building tenants and location risk factors present that contribute to an increase in terrorism and other security threats? 7 Are there designated people and procedures in place for monitoring the early warnings of increasing threat levels and an escalation of security efforts in response? Alpha = Normal conditions Bravo = Credible threats issued (alert) Charlie = Reported incidents elsewhere Delta = Actual incident Date of last security risk assessment: 8

2. Management policies 1 Is top management support and involvement evident in the security planning? Consider policies, budgets, accountabilities, resources in the evaluation. 2 Is there a current security plan in place that addresses policies for access control and emergency response? Describe it. 3 Is there a current emergency response and crisis management plan in place specific to the site? 4 Does the emergency response plan address fire, explosion, bomb threat, civil disturbance, suspicious mail handling? 5 Does the access control policy address visitor registration, ID badge usage, background checks, escorting and other requirements for all visitors and contractors? 6 Is there a zero-tolerance workplace violence and weapons policy in place? 7 Is there a system for centralized reporting and analysis of all security-related incidents and suspicious activities? Are response procedures for security breaches developed? 8 Has the local law enforcement agency reviewed the current security plan? 9

2. Management policies (continued) 9 Is the security plan reviewed at least annually? Has the latest revision taken into account: New threats Risk assessment Change management 10 Are there defined procedures and resources for heightening the site security efforts in response to escalating threat levels? 11 Are there strict hiring and selection standards for security staff? Are there standards for security staff pertaining to the following: Licensing Background checks Physical health Psychological health Training Compensation Weapons policy 12 Is the security staff routinely involved in non-security tasks? 13 Is a lockdown procedure in place in response to an eminent threat? 14 Is there a business continuity plan in place based on business impact analysis? 10

3. Physical security 1 Is appropriate perimeter protection in place? Examples include: Fences Trenches Terrain Barricades Landscaping Turnstiles Roof access Waterside access 2 Are redundant layers of protection considered for core assets? 3 Are physical barriers in place that limit vehicle access to the building? 4 Are the perimeter doors, gates, windows and docks secured and in good working condition? Items to be considered include: Penetration resistance Security hinges and hardware Break and blast-resistant glass 5 Are the perimeter doors, gates and docks adequately staffed during working hours and secured after hours? 6 Are security surveillance cameras and perimeter (docks, doors, gates and windows) alarms in place? Suitable type and adequate number for appropriate coverage? 7 Are they monitored in real-time in case of life safety applications with ability for prompt response? 8 Are surveillance video records properly archived? 9 Are security cameras and alarms inspected and tested on a regular basis? 11

3. Physical security (continued) 10 Is there regular patrolling of the perimeter to inspect the fence line damage, clear zone, obstructions, unoccupied/ unidentified vehicles and other breaches? Are logs maintained? Is there a prompt reporting and investigation of security breaches? Guard dogs? 11 Are the equipment and critical assets (utilities, HVAC/air intakes and control rooms and communication equipment) in the yard and on rooftops protected and monitored? Is access controlled? 12 Is the perimeter lighting adequate? Is lighting adequate for use of a surveillance camera? 13 Is there a parking lot security plan in place? The plan should include: Illumination Visitor parking restrictions Executive parking location Video surveillance and monitoring Patrolling Vehicle inspections 14 Is there a good housekeeping program in place for all exterior grounds? Inspection and emptying of trash receptacles? 15 Does the reception/security desk have a clear, unobstructed view of entrance? Best practices include: Landscape trimming No posters on glass Watch tower or guard post 16 Are proper warning signs (no trespassing, driver direction, restricted areas, etc.) posted? 12

4. Access control 1 Is the access approaching, and entry into, the facility controlled? Are there restricted access points? 2 Is there a documented access control procedure in place? Access control could include: Photo identification check Proximity access cards Strict key control program Biometrics 3 Are all visitors and contractors screened and required to sign-in/sign-out and produce valid photo identification? Are the logs reviewed regularly? 4 Are all visitors and contractors clearly identified and escorted while on the property? 5 Are the visitors and contractors briefed on the site s safety and security procedures including evacuation, restricted areas, search policies, etc.? 6 Are search procedures for packages and delivery/contractor/visitor vehicles activated in case of heightened security? Search procedures could include: X-ray scanning Metal detectors Physical searches Surprise security sweeps 7 Is there a list of approved contractors/ vendors, delivery and messenger services available to security staff? Is the approved list reviewed regularly? 8 Are deliveries restricted to regular working hours only? 13

4. Access control (continued) 9 Are sensitive areas identified and properly secured for authorized access? 10 Is the access control program organized to react promptly to lost/stolen identification and access cards and employee terminations? 11 Are locks changed immediately when the key controls are compromised? 14

5. Employee security 1 Is there a program for verification of past employment, academic credentials and references prior to start of employment? 2 Are background checks conducted on all employees in sensitive jobs and following transfer requests to more sensitive jobs? 3 Are personnel and employee medical records properly secured? 4 Does the new employee orientation program cover: Security Emergency evacuation Bomb threat procedures Drug policy Zero-tolerance workplace violence policy Confidentiality 5 Are photo identifications issued to all employees for access security and verification? 6 Are there controls in place for the issuance of replacement photo identification, missing ID and access cards? 7 Are employees required to carry photo identification while on the property? 8 Are employees encouraged to report all suspicious activities and security lapses? Best practices include: Challenging individuals without identification Confidential phone number for reporting 9 Is there a telephone number list for employee notification in case of an emergency? Is it kept current? 15

5. Employee security (continued) 10 Are confidentiality agreements/ background checks required for employees with proprietary and confidential information? 11 Is company property (credit cards, identification, keys, PCs, etc.) retrieved during exit interviews? 12 Is there a corporate policy on travel restrictions to dangerous locations? 13 Is there a plan to address the security of employees working alone and/or late hours? 16

6. Information security 1 Is there a document control program in place? Best practices include: Electronic/paper records Confidential/proprietary data Protection of records Back-up copies Retention and archiving Destruction/shredding of sensitive information 2 Is access to the network computer room and equipment restricted to authorized personnel only? Issues include: Physical access Working/non-working hours Monitored Remote/network access 3 Are authorization levels for sensitive information reviewed periodically? 4 Is there an effective audit ability to trace access/hacking into secured and sensitive work areas and computer networks? 5 Are all computers and networks equipped with appropriate fire walls and anti-virus protection? Are virus-protection patches updated regularly? 6 Is there a data center security plan in place? Considerations include: Fire and physical protection Intrusion protection/safes Virus protection and regular updates UPS (uninterruptible power supply) protection Electronic media and tapes Daily back-ups Off-site storage (distance?) Disaster recovery plans 17

6. Information security (continued) 7 Is there information security awareness/training for all employees? Issues requiring consideration include: New hires Password protection Unauthorized/unlicensed software Sensitive information on laptops Traveling w/laptops Policy on using laptops and cell phones in public Unattended sensitive information on computer screen 8 Is there password protection in place for employee access to all computers and electronic records? Is there a periodic password change policy in place? 9 Is there a priority for prompt revocation of computer access to all terminated and disgruntled employees? 10 Is access to fax machines restricted to reduce unauthorized reading of sensitive messages? 11 Is there a policy in place for controlling and shredding of sensitive materials at the end of business meetings? Sensitive materials may include: Flip charts and scrap papers Extra handouts Dry erase boards Residual memory from electronic whiteboards 18

7. Material security 1 Is there any theft-prone material on property? Are there theft control procedures in place: Precious metals Laptops Highly toxic chemicals Biohazard material Radioactive material 2 Are screening procedures in place for recognizing suspicious mail and packages? Methods to mitigate risk include: Employee training X-ray Explosive sniffing dogs 3 Is there a package pass program in place for removal of any company-owned property from the facility? 4 Are controls in place for scrap disposal and pick-up? 5 Are accurate inventory records maintained for sensitive materials? Is inventory reduction implemented in response to heightened security? 19

8. Emergency response 1 Is there a current site-specific emergency response plan in place? 2 Does the emergency response plan address specific threats such as fire, explosion, utility failures, civil disturbance, bomb threat, product contamination and natural hazards? 3 Is there an incident command (IC) to coordinate and deploy internal assets/ resources and the external resources? Considerations include: Designated people Alternates First responders Damage assessment Communication 4 Does the security staff play a role in emergency response? 5 Are the emergency numbers posted prominently? 6 Are the pagers and cell phone numbers for the emergency response team verified and tested periodically? 7 Is there an effective program for training/ refresher training for emergency responders? Protective equipment Resources 8 Is there a bomb threat response procedure? Considerations include: Telephone instructions Law enforcement notification Systematic searches (who) Employee training 20

9. Crisis communication 1 Is there a media and public relations plan in place? 2 Is there a qualified designated spokesperson to manage all media inquiries? Is there an alternate? 3 Does management receive appropriate media training? 21

10. Review/audits 1 Are comprehensive security audits conducted randomly? Review the following: Last audit Results Corrective actions 2 Is employee and management training support provided to address the changing security needs, emerging threats and enhance skill levels? 22

Resources http://www.usps.com/news/2001/press/pr01_bestpractices.htm http://www.usps.com/news/2001/press/mailsecurity/security.htm http://www.fema.gov/hazard/terrorism/index.shtm http://www.atf.treas.gov/explarson/information/bombthreat/index.htm http://www.stimson.org/cwc/terror.htm http://www.chlorineinstitute.org/files/pdfs/securityguidanceacc1.pdf #search=%22american%20chemical%20society %20site%20security%20guide%22 http://www.us-cert.gov/reading_room/infosheet_nipp.pdf#search=%22 national%20infrastucture%20protection%22 http://www.dhs.gov/dhspublic/theme_home6.jsp http://www.bt.cdc.gov/documentsapp/anthrax/protective/ 10242001Protect.asp http://www.cdc.gov/mmwr/indexbt.html http://www.fda.gov/oc/opacom/hottopics/bioterrorism.html http://www.asisonline.org/about/faqs.xml Industry Best Practices for Mail Security from U.S. Post Office Suspicious mail poster from USPS Fact sheet on terrorism from FEMA (Federal Emergency Management Agency) Bomb Threats and Physical Security Planning guide from ATF (Bureau of Alcohol, Tobacco and Firearms) Extensive information on chemical and bio-terrorism from The Stimson Center Site Security Guidelines for the U.S. Chemical Industry from American Chemical Council, Chlorine Institute, Synthetic Organic Chemical Manufacturer's Association Fact sheet on National Infrastructure Protection Plan (NIPP-cyber Security Plan) Homeland Security National Infrastructure Protection Center: A U.S. government/homeland Security site for information on threat assessment, warnings, investigations and response for threats on critical infrastructure Interim recommendations for the selection and use of protective clothing and respirators against biological agents Anthrax and bioterrorism information from CDC (Centers for Disease Control) Food safety and public health information from FDA (Food and Drug Administration) American Society for Industrial Security 23

Zurich Services Corporation 1400 American Lane, Schaumburg, Illinois 60196-1056 800 982 5964 www.zurichservices.com Zurich Services Corporation Risk Engineering A1-16560-C (01/07) 06-1287 ISO 9001:2000 Quality-Assured Solutions Provider The information in this publication was compiled by Zurich Services Corporation from sources believed to be reliable. We do not guarantee the accuracy of this information or any results and further assume no liability in connection with this publication, including any information, methods or safety suggestions contained herein. Moreover, Zurich Services Corporation reminds you that this publication cannot be assumed to contain every acceptable safety and compliance procedure or that additional procedures might not be appropriate under the circumstances. The subject matter of this publication is not tied to any specific insurance product nor will adopting these procedures insure coverage under any insurance policy. 2007 Zurich Services Corporation