817R08010
Interim Voluntary
Security Guidance
For Water Utilities
December 9, 2004
American Society of Civil Engineers
4\\
American Water Works
Association
Water Environment
Federation'
/^vxcn-hiff & F.ntxwcing
the (itfibaf Wetter Kntinmment
-------
-------
Contents
Section Page
Preface xi
Acknowledgements xiii
Executive Summary xv
Disclaimer xix
Abbreviation and Acronym List xxi
Section 1 Introduction 1-1
1.1 Overview 1-1
1.2 Reasons for Water Utilities to Enact Security Measures 1-2
1.2.1 Mission Statement 1-3
1.2.2 Regulatory and Legal Requirements 1-3
1.2.3 Other Reasons 1-5
1.3 Overview of Water System Security Issues 1-5
1.4 Vulnerability and Risk Assessment 1-6
1.4.1 Definition of Vulnerability 1-6
1.4.2 Definition of Risk 1-7
1.4.3 Objectives 1-7
1.4.4 Vulnerability Assessment Methodologies 1-8
1.5 Understanding the Threats to Water Systems
Before Developing a Security Strategy 1-10
1.5.1 Malevolent Acts 1-11
1.5.2 Generic Threat Levels 1-14
1.5.3 Threat Level Assessment 1-16
1.6 Developing a Security Strategy 1-19
1.6.1 Determining the Required Level of Security 1-19
1.6.2 Conducting a Risk Reduction Analysis 1-20
1.6.3 Conducting a Cost-Benefit Analysis 1-20
1.6.4 Conducting a Cost-to-Risk-Reduction Analysis 1-20
1.6.5 Comparing Security Risks to Other Risks 1-22
1.6.6 Developing a Balanced Plan 1-22
1.6.7 Prioritizing Security Investments 1-25
1.6.8 Documenting the Process 1-25
1.6.9 Sharing Information 1-25
Section 2 Management Considerations for Optimizing Physical Security 2-1
2.1 Overview 2-1
2.2 Governing Board 2-2
2.3 Customers and Other External Stakeholders... ... 2-3
-------
contents
2.4 Financial Planning 2-4
2.4.1 Developing CIP Programs that Adequately Support Security Needs 2-5
2.4.2 Developing Funding Programs to Support Operating Fund Needs 2-6
2.4.3 Developing a Funding Program that
Governing Boards and Customers Can Support 2-7
2.5 Human Resources 2-8
2.5.1 Background Checks 2-9
2.5.2 Identification Badges 2-10
2.5.3 Employee Surveillance 2-11
2.5.4 Employee Response 2-11
2.5.5 Contractors 2-12
2.5.6 Training 2-12
2.6 Records Management 2-16
2.7 Policies and Procedures 2-18
2.7.1 Basic 2-18
2.7.2 Advanced 2-19
2.7.3 Suggested Policies 2-20
2.8 Procurement 2-21
2.8.1 Emergency Procurement 2-21
2.8.2 Procurement of Security-related Equipment and Services 2-23
2.9 Communications 2-24
2.9.1 Communications Equipment 2-24
2.9.2 Internal Communication Practices 2-25
2.9.3 External Communication Practices 2-26
2.9.4 Public Outreach 2-26
2.10 Interagency Coordination 2-27
Section 3 Operational Considerations for Enhancing Physical Security 3-1
3.1 Overview 3-1
3.2 General Considerations 3-2
3.2.1 Philosophy 3-2
3.2.2 General System Operational Practices 3-3
3.3 Source Water 3-7
3.3.1 Groundwater 3-7
3.3.2 Surface Water 3-8
3.3.3 Raw Water Intake 3-9
3.4 Raw Water Conveyance 3-10
3.4.1 General Considerations 3-10
3.4.2 Pump Stations 3-11
3.4.3 Pipelines and Appurtenances 3-11
3.4.4 Raw Water Storage Tanks 3-11
o
-------
contents
3.5 Treatment Facilities 3-12
3.5.1 Treatment Processes 3-12
3.5.2 Chemical Delivery (Chemical Systems) 3-13
3.5.3 Facility-wide Treatment 3-15
3.6 Finished Water Storage and Conveyance 3-16
3.6.1 Storage Tanks/Reservoirs 3-17
3.6.2 Pump Stations 3-17
3.6.3 Transmission Mains 3-18
3.6.4 Distribution System Mains and Appurtenances 3-18
3.6.5 Increased Awareness 3-22
3.7 Support Services Facilities 3-23
3.7.1 Maintenance Shops, Warehouses, and Storage Facilities 3-23
3.7.2 Administrative Offices 3-23
3.7.3 Fleet 3-24
3.7.4 Laboratories 3-24
Section 4 Design Considerations for Developing
Physical Security at New Facilities and Retrofits 4-1
4.1 Overview 4-1
4.2 Security System Design 4-2
4.2.1 Design Team Requirements 4-2
4.2.2 Basic Design Considerations - "10 States Standards" 4-3
4.2.3 Balanced Approach to Security System Design 4-5
4.2.4 Layers of Protection 4-5
4.2.5 Cost Implications 4-7
4.3 Crime Prevention Through Environmental Design 4-9
4.3.1 Perimeter CPTED Strategies 4-10
4.3.2 Site CPTED Strategies 4-10
4.3.3 CPTED Strategies for Building Envelope and Other Structures 4-11
4.4 Recommendations by Threat Level 4-11
4.4.1 Countermeasures Against Vandal Threats 4-12
4.4.2 Countermeasures Against Criminal Threats 4-15
4.4.3 Countermeasures Against Saboteur Threats 4-17
4.4.4 Countermeasures Against Terrorist Threats 4-20
4.5 Water Quality Monitoring 4-23
4.5.1 Contaminants of Concern and Their Concentrations 4-24
4.5.2 Fate and Transport Models for Contaminants 4-24
4.5.3 Sampling Frequency and Integration with
Existing Water Quality Monitoring Programs 4-25
4.5.4 Selection of Instruments 4-25
4.5.5 Siting of Instruments 4-25
4.5.6 Data Analysis and Interpretation 4-26
-------
contents
4.5.7 Communication System Requirements 4-27
4.5.8 Responses to Contamination Events 4-27
4.5.9 Operations, Maintenance, Upgrades, and Exercising the System 4-27
4.6 Recommendations for Source and Ground Water Facilities 4-28
4.6.1 Wells 4-28
4.6.2 Rivers, Lakes, and Reservoirs 4-29
4.6.3 Dams 4-29
4.7 Recommendations for Raw Water Conveyance Facilities 4-30
4.7.1 Pump Stations 4-31
4.7.2 Pipelines and Appurtenances 4-32
4.8 Recommendations for Water Treatment Facilities 4-32
4.8.1 Conventional Treatment Processes 4-34
4.8.2 Auxiliary Systems/Components 4-37
4.9 Recommendations for Finished Water Storage and Distribution System 4-40
4.9.1 Storage Tanks/Reservoirs 4-41
4.9.2 Pipelines and Appurtenances 4-42
4.9.3 Pump Stations 4-44
4.10 Recommendations for Customer Connections 4-44
4.10.1 Construction Meters 4-45
4.10.2 Meters 4-45
4.10.3 Backflow Prevention Devices 4-45
4.11 Recommendations for Support Services/Facilities 4-45
4.11.1 Maintenance/Equipment Storage/Warehouse Facilities 4-45
4.11.2 Remote Control Facilities 4-46
4.12 Recommendations for Administrative Facility Security 4-47
4.12.1 Control Access to Buildings 4-47
4.12.2 Safeguard Employees 4-48
Section 5 Cyber Security Management, Operations, and Design Considerations 5-1
5.1 Overview 5-1
5.2 Utility Cyber Networks 5-2
5.2.1 Business Network 5-2
5.2.2 Control Network 5-2
5.3 Cyber Security Threats 5-3
5.4 Management 5-4
5.4.1 Cyber Security Policies and Procedures 5-5
5.4.2 Cyber Security Training 5-5
5.5 Operations 5-6
5.5.1 Intrusion Defense 5-6
5.5.2 Internet Intrusion 5-6
5.5.3 Telephone System Intrusion 5-7
-------
contents
5.5.4 Wireless Intrusion 5-8
5.5.5 Insider Intrusion 5-8
5.6 Design 5-10
5.6.1 General Design Best Practices 5-10
5.6.2 Internet Intrusion Design , 5-11
5.6.3 Telephone Intrusion Design 5-12
5.6.4 Wireless Intrusion Design 5-12
5.6.5 Insider Intrusion Design 5-13
Section 6 Choosing the Optimal Physical Security Equipment 6-1
6.1 Overview 6-1
6.2 Questions to Ask 6-2
6.2.1 Threat 6-2
6.2.2 Known Vulnerabilities and Key Assets 6-2
6.2.3 Areas of Coverage 6-2
6.2.4 Levels of Resolution 6-3
6.2.5 System Size and Device Quantity 6-3
6.2.6 Electrical Power, Wiring, and Transmission Methods 6-3
6.2.7 Viewing and Assessment 6-3
6.3 Basic Information About Physical Security Equipment 6-4
6.3.1 Power and Wiring 6-4
6.3.2 Visibility and Lighting Recommendations 6-6
6.4 Types of Physical Security Equipment 6-8
6.4.1 Access Control 6-8
6.4.2 Interior Intrusion Detection 6-11
6.4.3 Exterior Intrusion Detection 6-12
6.4.4 CCTV Camera Systems 6-14
6.5 Summary 6-19
Section 7 Emergency Response Planning 7-1
7.1 Overview 7-1
7.2 Emergency Response Background 7-1
7.2.1 Regulations 7-1
7.2.2 Purpose 7-2
7.2.3 Governmental Support for Emergency Response: NIMS and ICS 7-2
7.2.4 Additional Information for Developing ERPs 7-5
7.3 Key Components of an ERP 7-5
7.3.1 Introduction 7-5
7.3.2 Planning 7-5
7.3.3 Response 7-11
7.3.3 Recovery 7-12
7.3.4 Termination... ....7-13
-------
contents
7.4 Revisions to ERPs 7-13
7.5 Sample ERP Outline 7-14
Section 8 Pulling It All Together Through Fully Integrated Security Planning and Design 8-1
8.1 Overview 8-1
8.2 Utility Case Studies 8-1
8.3 What is the Optimal Solution? 8-2
8.4 Multiple Benefits in Security Enhancements 8-3
8.5 Doing What is Best for Your Utility 8-4
8.6 Pulling It All Together 8-5
Glossary xxv
Bibliography xxix
Photo/Illustration Credits xlv
Figures
1-1: Interrelationships between Common Utility Programs and the Reduction of Risk 1-2
1-2: RAM-WTM Methodology 1-9
1-3: Vulnerability Self-Assessment Tool (VSAT™) 1-10
1-4: Examples of Adversaries 1-12
1-5: Sample Cost to Risk Reduction Curves 1-21
2-1: Sample Surcharge Language 2-4
2-2: The Code of Alabama 2-24
2-3: Case Study: CHIPS Program in Kennewick, WA 2-27
4-1: Sample Layered Security Recommendations for a Facility 4-6
4-2: Recommendations for Progressive Design Consideration 4-12
4-3: Example of Tamper-proof, Shackle-protected Lock 4-13
4-4: Entry Control Point with Protected Guardhouse 4-18
4-5: Perimeter Fence with Aircraft Cable Anchored to Concrete 4-19
4-6: Boom System 4-30
4-7: Turbidity Curtain 4-30
4-8: Secure Fencing with Aircraft Cabling 4-35
4-9: Fencing with Openings Too Narrow for Adversary to Get a Handhold or Toehold 4-36
viii
-------
contents
4-10: Fencing with Openings Too Narrow for Cutters to Grip 4-36
4-11: Example of Vehicle Access Approach to Reduce Speed 4-37
4-12: Example of Drop-Arm Crash Beam Vehicle Barrier 4-37
4-13: Bollards Protecting a Fence from Vehicle Entry 4-38
4-14: Example of Sensitive Equipment Isolated by Secure Grills 4-39
4-15: Example of a Protected Access Ladder to a Storage Tank 4-41
4-16: Example of a Special Fire Hydrant Locking Wrench 4-43
4-17: Example of Hydrant Locking Caps 4-43
4-18: Example of Hydrant Locking Caps and Wrenches 4-43
4-19: Example of Special Fire Hydrant Locking Wrench in Use 4-43
4-20: Example of Locking Water Meter 4-45
6-1: Typical Card Reader System 6-9
6-2: Typical CCTV System 6-14
7-1: Incident Management Team Organizational Structure 7-4
Tables
1-1: Threats to Water Systems 1-6
1-2: Threat Level Characteristics 1-13
1-3: Actions Based on Threat Level as Announced by the Department of Homeland Security 1-14
1-4: Summary of EPA Water Utility Response, Recovery and Remediation Guidance
for Man-made and/or Technological Emergencies 1-15
2-1: Types of Security and Emergency Response Training Relevant for Water Utility Personnel 2-14
3-1: General Considerations for Operational Security at a Water Facility 3-3
3-2: Maintenance Building and Warehouse Threat and Operational Considerations 3-22
3-3: Administrative Offices Threat and Operational Considerations 3-24
3-4: Fleet Vehicle Threat and Operational Considerations 3-24
-------
contents
4-1: General Considerations for Physical Security at a Water Facility 4-7
4-2: Source (Ground and Surface) Water Supply Threat and Security Design Considerations 4-28
4-3: Raw Water Conveyance Threat and Security Design Considerations 4-30
4-4: Water Treatment Facility Threat and Security Design Considerations 4-33
4-5: Finished Water Storage and Distribution Facility Threat
and Security Design Considerations 4-40
4-6: Customer Connection Threat and Security Design Considerations 4-44
4-7: Support Facility Threat and Security Design Considerations 4-46
4-8: Administrative Facility Threat and Security Design Considerations 4-47
5-1: Correlation Between Physical and Cyber Intruders 5-4
8-1: Example 1 - Treated Water Storage Tank 8-2
8-2: Example 2 - Raw Water Storage Reservoir 8-2
8-3: Multiple Benefits from Security Improvements 8-3
-------
Preface
The common water system design practices and guidelines that exist today are the same ones under
which drinking water facilities were originally designed and constructed. Concerns about water
utilities' responses to emergency events primarily focused on natural, often weather-related, events
such as floods, tornadoes, and fires. With the new millennium, it has become apparent that
malevolent acts are unpredictable and can affect any type of facility with possibly greater impacts
than would be expected for most natural events.
Updates to water system design practices over the past several decades have not incorporated the
significant security measures that are now considered to be a requirement. As such, the American
Water Works Association (AWWA), the American Society of Civil Engineers (ASCE) and the Water
Environment Federation (WEF) have entered into a cooperative agreement with the U.S.
Environmental Protection Agency (EPA) to improve water infrastructure security. EPA agreed to
provide the funding to support the development of this effort.
The three organizations (AWWA, ASCE, and WEF) divided the project into the areas of water supply,
treatment, and distribution systems (led by AWWA); waste and stormwater collection, treatment,
and disposal systems (WEF), and methodology and characteristics pertinent to designing
contaminant detection and monitoring systems (ASCE). In early 2004, AWWA requested proposals to
develop a standalone guidance document focused on the reduction of risk to drinking water systems.
CH2M HILL was awarded the opportunity to develop this guidance.
This guidance document was prepared in close coordination with AWWA, especially with the
members of the Project Advisory Committee (PAC). Following the technical review of the document
by the PAC, members of the Water Infrastructure Security Enhancements (WISE) Standards
Committee and various AWWA divisions provided additional review. The comments offered by the
reviewers served as a "real-world" test for the guidance, ensuring that the ideas and suggestions
presented in the guidance would work for the various sizes and configurations of utilities across the
country.
The purpose of this guidance is to provide a centralized starting point for utilities as they incorporate
modern security practices into the construction or retrofit of their water systems. The guidance
focuses on these four common principles:
• Maintaining decision-making about security at the local utility level
• Developing a balanced approach to security by applying design, management, and operations
strategies
• Developing cost-effective solutions
• Successfully introducing security into the culture of water utilities
* Although the information in this document has been funded wholly or in part by the US EPA under assistance agreement X-83128301-0 to
the American Society of Civil Engineers, it may not necessarily reflect the views of the Agency and no official endorsement should be inferred.
-------
preface
To enhance the value of this document, an annotated bibliography has been included in lieu of a
"References Cited" section. The bibliography contains not only a list of the materials and web sites
used in the preparation of this document, but also numerous other resources that may assist water
utilities as they design, operate, and manage their facilities.
With the same concept in mind, information has been included in this guidance that may seem to be
very basic or redundant. This purpose of this format is to ensure that all users of this guidance have
the same level of understanding on which the more advanced and complex concepts are built.
Where appropriate, concepts in this document are identified as basic and advanced. Each utility
should apply its own decision-making process as it determines which of the concepts most closely
meets its unique needs and situations.
xii
-------
Acknowledgements
Completion of a document such as this requires significant effort and expertise, not only from those
who construct the text, but also those who, often at their own expense, review the document and
provide invaluable guidance. In addition, this document would not have been possible except for the
initiative, cooperation, and direction provided by members of the U.S. Environmental Protection
Agency and the American Water Works Association (AWWA). It is with appreciation that the
following individuals are acknowledged for their key contributions to this document.
CH2M HILL Primary Authors
Ralph N. Bell Michael K. Brandon
William E. Desing, P.E. Forrest M. Gist, P.E.
Yakir Hasit, Ph.D. Rex T. Hesner
Sam Irrinki, P.E. Alan B. Ispass, P.E.
Kenneth A. Thompson Linda P. Warren, P.E.
AWWA Standards Council - all members
AWWA Technical & Educational Council and its Divisions- all members
AWWA Water Utility Council - all members
AWWA Staff and Project Advisory Committee Members
John H. Bambei, Jr., Denver Water Department Edward E. Baruth, AWWA
Elizabeth Behner, AWWA Steve L. Burian, Advanced Engineering and Environmental
Services, Inc.
David A. Cornwell, EE&T, Inc. Clyde R. Dugan, Lansing Board of Water & Light
Mark Grace, AWWA Neil S. Grigg, Colorado State University
Rick L. Harmon, AWWA Todd A. Humphrey, P.E., City of Portland
Bureau of Water Works
Thomas J. Lane, Malcolm Pirnie, Inc. Thomas Linville, Contra Costa Water District
Kevin Morley, AWWA David E. Rager, Greater Cincinnati Water Works
Elvira Ramos, AWWA J. Alan Roberson, AWWA
Roy G. Robinson, City of Albuquerque James S. Wailes, AWWA
Public Works Department
xiii
-------
preface
Water Infrastructure Security Enhancements (WISE) Standards Committee
Conrad G. Keyes, Jr., American Society of Civil Engineers Greg Welter, O'Brien & Gere Engineers
Technical Reviewers
Robert Berg, Long Beach Water Department Patty Barren, P.E., Birmingham Water Works and
Sewer Board
Scott Borman, Benton/Washington Regional Public Water Michael Clawson, P.E., U.S. Air Force
Authority
Dennis M. Diemer, East Bay Municipal Utility District Michael Dimitriou, ITT Industries
Alan Hais, U.S. Environmental Protection Agency Mary L. Howell, Backflow Management, Inc.
Carrie Lewis, Milwaukee Water Works John Mclaughlin, P.E., Brown and Caldwell
Kenneth C. Morgan, P.E., KCM Consulting Services, Inc. Irwin Silverstein, Ph.D., P.E., NHSRC
John P. Sullivan, P.E., Boston Water and Sewer Commission Kurt Vause, Anchorage Water & Wastewater Utility
xiv
-------
Executive Summary
Introduction
Management:
Optimizing
Physical Security
Operations:
Enhancing
Physical Security
L
Design:
Developing
Physical Security
Cyber Security
Physical
Security
Equipment
L
Emergency
Response
Planning
Integrated
Security Planning
and Design
The purpose of this document is to provide water systems with an initial guide to the design of new
facilities or the re-design or retrofit of existing facilities to create better physical security and reduce
risk to the public water supply. To protect the public water supply, this guidance emphasizes the
management and operations of the facilities and the facility design considerations that can make the
installation and upgrade of physical security systems easier to implement.
Information and suggestions are included or referred in the text for improving security and reducing
the risks presented by man-made actions. The document is organized in the following manner:
• Introduction
• Management Considerations for Optimizing Physical Security
• Operational Considerations for Enhancing Physical Security
• Design Considerations for Developing Physical Security at New Facilities and Retrofits
• Cyber Security Management, Operation, and Design Considerations
• Choosing the Optimal Physical Security Equipment
• Emergency Response Planning
• Pulling It All Together Through Fully Integrated Security Planning and Design
Each of these sections begins with a summary of the section contents. The sections are followed by an
annotated bibliography that provides references to materials available for further review and
XV
-------
executive summary
information in each of the areas addressed above. These references include items beyond the limits of
this guidance document.
Introduction
This section introduces the drivers that emphasize security. By identifying the missions of the water
utility, its customers, and its functions, a review of the system vulnerabilities can be performed. Once
the vulnerabilities that affect the utility's objectives have been addressed, the relative risk associated
with each vulnerability can be rated.
The section then reviews the threats to water systems, both in the types of threat and whether the
threat involves groups or individuals. This information, coupled with the vulnerabilities mentioned,
helps to focus the security design needs on areas such as these:
• Redundant systems • Operational design
• Operational backups • Backup power systems
• Water reserves • Building design and construction
Finally, information on assessing the level of threat and using that information to guide actions,
policies, procedures, and management of the physical security systems.
Management Considerations
for Optimizing Physical Security
This section reviews management and leadership levels and responsibilities, starting with the need to
establish a cultural change toward security in operations, continuous improvement, and matching
needs and technology.
Once policy and direction are under way, the care of the customers and stakeholders is
management's responsibility. Human resources, financial considerations, records management, and
governing polices and procedures are discussed.
Operational Considerations
for Enhancing Physical Security
This section focuses on overall system components, their design and operational consequences, and
methods to control disruptions to operations through operations and maintenance procedures and
functional flexibility. By blending the various security components and methods, the following areas
are addressed:
• Source water
• Treatment processes
• Distribution systems
and customer connections
• Raw water conveyance systems
• Finished water storage and conveyance systems
xvi
-------
executive summary
In addition, support services, their facilities, and the maintenance roles and functions are discussed.
Special discussions on cyber and Supervisory Control and Data Acquisition (SCADA) security are
more fully covered in a separate section.
Design Considerations for Developing
Physical Security at New Facilities and Retrofits
The philosophy of matching the level of threat to the cost of improvements is discussed and
addressed in this section. The major functions of a water delivery system are addressed in turn to
provide more specific guidance on improvements to security and the reduction of risk. The use of the
Vulnerability Assessment rankings is very important to the implementation of change. To achieve the
best improvements for the available funds, the measurement of risk and benefits are matched with a
balanced approach to improving security and reducing vulnerabilities. Design considerations for
developing physical security incorporate facility hardening, security equipment, and redundancy for
the components of a water system.
Cyber Security Management,
Operations, and Design Considerations
Beginning with the management aspects, the cyber policies and procedures that are an integral part
of the ability to combat security infractions and vulnerabilities for the water system are reviewed.
Also, a short discussion of intrusion methods and consequences is provided.
In the operations portion, the ability to use the information from a Cyber Vulnerability Assessment is
discussed. Control network operations and intrusion defense mechanisms are reviewed. These
mechanisms defend against threats from insiders, outsiders, and hackers through telephones, the
Internet, and physical damage to equipment.
Training for cyber security design issues that address the potential threats listed above,
communications, alarm systems, and bulk data handling are also considered.
Choosing the Optimal Physical Security Equipment
General information on how to choose optimal equipment leads the discussion of performance and
protection levels to consider for the various parts of a water system. Included are access control
features, water quality monitoring, intrusion detection, and others.
Differences considered between new and existing facilities are presented. Groundwater and surface
water systems are discussed separately, as are the different parts of pumping stations, pipelines, and
treatment operations. Other discussions include support services, equipment, outside utilities,
laboratory capabilities, backflow prevention, equipment storage, maintenance, and warehousing. The
discussions are supplemented with figures and operational details. Physical security for the cyber
system is covered in the Cyber Security Management, Operations, and Design Considerations
section.
xvii
-------
executive summary
Emergency Response Planning
This section emphasizes the use of the Incident Command System and how to best combine the
resources of local organizations to result in effective and efficient response to an emergency situation.
The advantages of formal mutual aid agreements and integrating with regional agencies for
coordinated emergency response to an event. The work referenced in the U.S. Environmental
Protection Agency's Response Protocol Toolbox (USEPA 2003) is incorporated here.
Putting It All Together Through
Integrated Physical Security Planning
This section summarizes the knowledge needed to develop the right solutions for an individual
utility. Examples for the types of threat addressed in previous sections are provided, along with the
protection, intrusion and control steps, and tools that can be used to counter intentional attacks on
the water supply.
xviii
-------
Disclaimer
The information presented in this guidance is intended to assist water utilities as they strive to
improve the safety and security of their facilities, their employees, and the public. While the
strategies and methods described can reduce risk and enhance response and recovery actions, they
cannot guarantee that any possible act of vandalism, violence, or terrorism will be prevented or
stopped. As such, those responsible for the content and publication of this document can provide no
guarantees for the performance of any actions taken in response to this guidance.
xix
-------
(This page intentionally left blank)
-------
Abbreviation and Acronym List
AC Alternating current
ACL Access control list
AMSA Association of Metropolitan Sewerage Agencies
AMWA Association of Metropolitan Water Agencies
ASCE American Society of Civil Engineers
ASDWA Association of State Drinking Water Administrators
AWWA American Water Works Association
AwwaRF American Water Works Association Research Foundation
Ca(OCl)2 Calcium hypochlorite
CaO Calcium oxide
CaOHj Calcium hydroxide
CBR Chemical, biological, or radiological
CCTV Closed-circuit television
CFR Code of Federal Regulations
CHIPS Citizens Helping in Policy Service
CIP Capital improvement plan
CMMS Computerized maintenance management system
CPR Cardio-pulmonary resuscitation
CPTED Crime Prevention Through Environmental Design
DBT Design basis threat
DHS Department of Homeland Security
DoD Department of Defense
DoS Department of State
HOC Emergency Operations Center
EPA United States Environmental Protection Agency
ERP Emergency Response Plan
EWS Early warning system
FBI Federal Bureau of Investigation
FEMA Federal Emergency Management Agency
-------
abbreviation and acronym list
FOIA Freedom of Information Act
GASB Government Accounting Standards Board
GETS Government Emergency Telecommunications Service
GIS Geographic information system
GPS Geographic positioning system
GSA General Services Administration
HAZMAT Hazardous Materials
HAZWOPER Hazardous Waste Operation and Emergency Response
HMI Human machine interface
HVAC Heating, ventilation, and air conditioning
IAP Incident Action Plan
ICS Incident Command System
ID Identification
IDS Intrusion Detection System
IED Improvised explosive device
HD Improvised incendiary device
IP Internet protocol
IS AC Water Information Sharing and Analysis Center
IT Information Technology
JPEG Joint Photographic Experts Group
K Kilobytes
LEPC Local Emergency Planning Committees
LIMS Laboratory Information Management System
MHZ Megahertz
MPEG Moving Picture Experts Group
Na2CO3 Soda ash
NaOCl Sodium hypochlorite
NaOH Sodium hydroxide
NFPA National Fire Protection Association
NIC NIMS Integration Center
NIMCAST NIMS Capability Assessment Support Tool
xxii
-------
abbreviation and acronym list
NIMS National Incident Management System
NIOSH National Institute of Occupational Safety & Health
NRWA National Rural Water Association
O&M Operations and maintenance
OSHA Occupational Health and Safety Administration
PC Personal computer
PIN Personal identification number
PIO Public Information Officer
FIR Passive infrared
PLC Programmable logic controller
PRV Pressure reducing valves
PSN Public switched network
PTZ Pan, tilt, and zoom
RAM Random access memory
RAM-D Risk Assessment Methodology for Dams
RAM-W™ Risk Assessment Methodology for Water Utilities
RFID Radio frequency identification
RPG Rocket propelled grenade
RTU Remote terminal unit
SCADA Supervisory Control and Data Acquisition
SOP Standard Operating Procedure
TOC Total Organic Carbon
UL Underwriters Laboratory
UPS Uninterruptible power supply
VA Vulnerability assessment
Vac Volts alternating current
Vdc Volts direct current
VSAT™ Vulnerability Self-Assessment Tool
WTP Water treatment plant
Hill
-------
(This page intentionally left blank)
-------
SECTION 1
Introduction
Management
Optimizing
Physical Securi
! -erations:
Enhancing
Physical Security
i
D
r >
• Understand the reasons for enacting security measures
• Understand security issues
• Understand the vulnerabilities and risks facing water utilities
• Understand the threats to water systems
• Develop a security strategy
w ^
Planning
and Design
1.1 Overview
Improving the physical security of water systems in the United States has become a priority for utility
managers and governing bodies since the events of September 11,2001. Protection of water systems
from malevolent acts is also a very high priority for federal agencies such as the Department of
Homeland Security (DHS) and the U.S. Environmental Protection Agency (EPA). In 1998, Presidential
Directive 63 designated water systems as part of the nation's critical infrastructure. For water utilities,
however, enhancing physical security is just one of many priorities. Because of this competition for
limited resources, including personnel and financial, the security tactic that a utility takes needs to be
carefully thought out, applying a balanced approach including each of the three major areas available
to the utility manager: 1) management tools, 2) operational approaches, and 3) physical security
design features
Numerous other documents, guidance manuals, and standards of operations focus on the first two
areas. The purpose of this American Water Works Association (AWWA) Security Guidance is to
provide water utilities with a document that also includes physical security design options and how
they can be tailored to individual water systems. Because these three areas are not mutually
exclusive, but are in fact integrated and interdependent, this document incorporates all three. The
diagram in Figure 1-1 illustrates these interrelationships to assist in understanding the underlying
intent of this document.
1-1
-------
introduction
Contamination Disposal On-line Monitoring
Cyber Security Site Security
Malevolent
Acts
Family Care
Unintentional
Evehts
Design Standards Risk Management
ERP Safety
Recovery Training
Risk Assessment
FIGURE 1-1
Interrelationships Between Common Utility Programs and the Reduction of Risk
This document provides guidance and a framework from which management, operations, and design
of a water system can be conducted to improve the security of the system. Additional information
that addresses threat mitigation, as well as general information on Homeland Security that may be
useful to water professionals, is provided in the annotated bibliography.
This section begins with the background and processes used to identify the priorities for the physical
security protection of a water system. Through vulnerability and risk assessment, utilities will
identify the level of threat that will drive development of a security strategy.
1.2 Reasons for Water Utilities to Enact Security Measures
There are a number of reasons that a utility would invest in the security of its system and facilities,
including meeting the goals defined in the utility's mission statement and regulatory and legal
requirements, among others. Investments can also serve the dual purpose of protecting the water
system from both malevolent and natural acts. For example, whether a pump station is disabled by a
criminal or a hurricane, it is in the water utility's best interest to have a plan that reduces the impact
of either event.
1 z
-------
introduction
1.2.1 Mission Statement
The purpose of a water utility is articulated by its mission statement and further defined by its goals
and priorities. These mission statements have at their core the protection of public health and safety
due to water quality or reliability attacks on the public water system. Many utilities recognize that
their mission statement includes the need to:
• Provide high quality water in sufficient quantity to its customers
• Operate in a manner that protects against, detects, and responds to man-made threats and
natural disasters from both inside and outside the utility
• Provide a safe work environment for employees and safe, reliable water delivery for the public
• Identify and maintain assets that are critical to the utility's ability to meet its mission
To meet these goals, a utility can identify and take the measures necessary to reduce its risk in the
face of malevolent acts.
1.2.2 Regulatory and Legal Requirements
Regulatory and legal reasons are also motivations for water utilities to make security improvements,
including best practices or lessons learned considerations.
1.2.2.1 Regulatory Drivers
Public Health Security and Bioterrorism Preparedness and Response Act. In June 2002, Congress
passed the Public Health Security and Bioterrorism Preparedness and Response Act (PL 107-188),
which requires vulnerability assessments be performed and Emergency Response Plans (ERPs) be
created or updated for community drinking water systems that serve more than 3,300 people. There
could, in the future, be pressure from groups inside and outside of the government to make
mandatory the implementation of recommendations resulting from the assessments.
Chemical Security Act. As of this writing, there is pending legislation that could require water
systems to address the security of certain chemicals. The Chemical Security Act of 2003 (House of
Representatives Bill 1861 and a similar Senate Bill [SB 157]) direct the EPA to regulate facilities that
store certain toxic chemicals over a specified threshold amount. The act would require the facilities to
assess the vulnerability of a water source to an attack or other unauthorized release; to identify
hazards that may result from such a release; and to prepare a prevention, preparedness, and response
plan. Facilities that store chlorine in quantities over 2,500 pounds would be subject to the Chemical
Security Act as it is currently drafted. However, the legislation may use the chemical lists and
thresholds established by the Risk Management Programs (40 CFR Part 68) to determine
applicability.
1-3
-------
introduction
1.2.2.2 Legal and Liability Issues
A basic tenet of legal liability may compel a water utility that is made aware of a condition to take
reasonable steps to eliminate or mitigate a hazardous condition. Publications such as this one that
discuss the need for water utility security, and the materials published by EPA and other entities,
could be considered notice that a hazardous condition may potentially exist. Once a vulnerability
assessment is complete, the resulting recommendations also could be considered as notice of a
dangerous condition. This notice could potentially result in liability if the recommendations are not
addressed. In some cases, water utilities may be able to claim immunity based on their charters or
municipal laws; however, some state laws waive or limit this immunity. A finding of negligence for
damages stemming from a security breach generally would require:
• Knowledge or reasonable ability to foresee the damages
• A duty to the injured person
• Violation of the duty proximately causing the injury
Generalized warnings of terrorism against water utilities may not impact liability, but a warning
relating to a specific plant or location could. The paraphrased axiom that, "the best defense is a well
thought out and implemented security program," can be applied here. Court rulings have found that
a water utility must exercise reasonable care in operating and maintaining its system. The definition
of "reasonable care" is key in determining liability. As more water utilities implement security
improvements, it could be argued that the definition of reasonable care is evolving to include
installation of security systems that only a short time ago were rarely found in water systems. This
document will include a two-tiered approach to security-related improvements using Basic and
Advanced categories. A water utility can identify those measures that actually provide security
improvements and that are a balance of the available resources, the utility's ability to execute the
improvements, and ongoing operational aspects of the utility.
The Basic category is a reasonable care approach to reduce identified risk levels at the most critical
assets. The Advanced category adds Best Business Practices to further lower risk levels across the
water utility, but at increased resource expenditures.
Benchmarking the security-related improvements that utilities have made can help define a standard
and provide guidance for other utilities struggling to determine which improvements to implement.
Utility staff can evaluate common practices in the water industry as one approach to making
decisions regarding the appropriate level of protection and investment for their systems.
1-4
-------
introduction
1.2.3 Other Reasons
Other reasons that water utilities have cited for the implementation of security systems include:
• Providing protection against non-terrorism threats such as vandals, low-level criminals, and
disgruntled employees. Vandalism and theft are a problem for many utilities, especially those in
larger urban areas — one that installing security systems can help to mitigate or prevent.
• Protecting employees from outsiders entering plants.
• Providing operational benefits beyond heightened security. For example, installing backup
generators to provide power in the event of an attack on the power substation feed will also
provide mitigation for power outages caused by other events, such as natural disasters or
construction-related incidents. Similarly, as part of vulnerability assessments, utilities that add
redundant pumps for pumping systems would significantly reduce process-related consequences
if the main pumps are no longer operational.
• Assuming the responsibility to maintain public confidence in the water system and provide
service to the community.
1.3 Overview of Water System Security Issues
Interruption of water system service, whether from natural disasters or malevolent actions, can result
in widespread public health impacts and economic or environmental damages. Because water
systems have been identified as critical infrastructure, these systems may be a target for adversaries.
Some examples on how water systems could be attacked by adversaries are listed below and
summarized in Table 1-1:
• Introduction of volatile compounds to the raw water system, which can cause explosions and
shut down water treatment processes
• Large releases of chlorine gas from water treatment facilities or booster disinfection facilities to
cause injury and death to workers and public within and outside of the facility
• Physical destruction of the water system assets
• Introduction of toxic chemicals or biological contaminants to the water treatment, storage, and
distribution systems
• Water distribution systems used to transport chemical and biological contaminants to a major or
critical water customer
Misuse of the Supervisory Control and Data Acquisition (SCADA) or connected cyber systems, which
can cause chemical over- or under-dosing, system interruptions, and damage to the drinking water
system components.
1-5
-------
introduction
TABLE 1-1
Threats to Water Systems
System
Source Water
and Water
Treatment
Facilities
Distribution
Systems
Pump
Stations
SCADA
System
Overall Issue
Source water
and delivery
areas are
sometimes
remote, not
typically
secured other
than by a fence
Numerous
facilities and
piping are easily
accessible and
are largely
unmonitored
Some locations
are remote and
unmanned
Hacking the
SCADA system
through
Internet or
interruption of
radio
frequencies
Examples of
Potential Threats
Damage to or disabling
of critical assets
Toxins introduced into
source or treatment
plant
Release of chlorine gas
Use of system as a
"conduit" for
adversaries
Improvised explosive
device set in facilities
or placed in vaults
Individuals driving or
walking up to a facility
to damage or disable
equipment
Shooting at pump
station panels
Disabling of alarms
Taking control of flow
and processes
Preventing operators
from knowing what is
occurring
Facilities
Damage to
structures and
equipment
Significant
disruption to
treatment processes
Damage to piping
and storage tanks
Damage to
structures and
equipment
Significant
disruption to
treatment and
distribution
processes
Impacts to
Personnel
Direct, potentially
fatal injuries to
workers from
explosives or toxic
substances
Direct, potentially
fatal injuries to
workers from
explosives or toxic
substances
Direct, potentially
fatal injuries to
workers from
explosives or toxic
substances
Indirect effects from
being unaware of
conditions
Community
Disruption of
service
Adverse health
effects from
contaminated water
or chlorine gas
plume
Disruption of
service
Adverse health
effects from using
contaminated water
Damage to
surrounding
buildings and
inhabitants
Adverse health
effects from lack of
water or
contaminated water
Disruption of
service
Adverse health
effects or lack of
access to account
information
1.4 Vulnerability and Risk Assessment
The Public Health Security and Bioterrorism Preparedness and Response Act of 2002 has required
that all community drinking water systems serving populations greater than 3,300 conduct a
vulnerability assessment (VA). The VAs have helped utilities to understand the most likely threats,
the most critical facilities and assets, and the relative risk for those critical facilities and assets. The
results of the VA provide a framework for the utility to enhance the physical security of its water
system so that its mission may be achieved.
1-6
-------
introduction
1.4.1 Definition of Vulnerability
As defined in the Sandia National Laboratories' RAM-W™ approach, "vulnerability" is an
exploitable security weakness or deficiency at a facility. Further definitions of vulnerability include
these:
• A characteristic of a critical infrastructure's design, management, or operation that renders the
infrastructure susceptible to destruction or incapacitation by a threat.
• A flaw in security procedures, software, internal system controls, or operation that may affect the
integrity, confidentiality, accountability, and/or availability of data or services. Vulnerabilities
include flaws that may be deliberately exploited and those that may cause failure due to
inadvertent human actions or natural disasters.
• Any weakness that can be exploited by an aggressor or, in a non-adversarial threat environment,
that can make an asset susceptible to hazard damage.
1.4.2 Definition of Risk
As defined in the Sandia National Laboratories' RAM-W™ approach, "risk" has two components: 1)
a measure of the potential damage to or loss of an asset and 2) the probability of an undesirable
occurrence to that asset. Further definitions of risk include these:
• The potential for realization of unwanted, adverse consequences to human life, health, property,
or the environment.
• The quantitative or qualitative expression of possible loss that considers the probability of a
hazard causing harm together with the consequences of that event.
Risk is usually expressed as a function of the probability of the occurrence of an adverse effect and
the consequence of the affect on the ability to maintain function.
1.4.3 Objectives
The objectives of vulnerability and risk assessments are to:
• Identify threats to the water system assets, including infrastructure, quality of water, employees,
information, finances, etc.
• Identify the specific assets that may be impacted by the identified threats, and the relative
criticality of these assets.
• Determine the likelihood that a threat may materialize.
• Calculate the consequences of losing part or all of the water system assets.
• Evaluate existing countermeasures.
• Analyze current risks associated with threats and assets.
• Identify additional countermeasures and prioritize based on a risk-reduction analysis.
1-7
-------
introduction
The goals of the vulnerability assessments are to develop information that the utility could use to:
• Protect public health and safety
• Protect or ensure the supply of water
• Provide a secure workplace for employees
• Protect the facilities the identified Design Basis Threat (DBT)
• Provide security management practices
• Provide measures to minimize insider threat
• Protect computer access and data, communications, and SCADA
• Protect operational systems and building support systems
• Protect power supplies and emergency backup power
1.4.4 Vulnerability Assessment Methodologies
Several methodologies can be used to conduct a VA. The assessment itself is important, not
necessarily the specific method used. As long as the assessment is accurate for a utility's own
particular given risks, then any method that produces an accurate picture of vulnerability and risk is
acceptable. The two most common methods are:
• Risk Assessment Methodology for Water Utilities (RAM-W™) developed by Sandia National
Laboratories with funding from EPA.
• Vulnerability Self-Assessment Tool (VSAT™) developed by Association of Metropolitan
Sewerage Agencies (AMSA) with EPA funding.
Other methods that can be used to conduct and vulnerability and risk assessment include, but are not
limited to:
• Security Vulnerability Self Assessment Guide for Small Drinking Water Systems (May 30,2002)
by the Association of State Drinking Water Administrators (ASDWA) and National Rural Water
Association (NRWA) for populations less than 3,300.
• Security Vulnerability Self Assessment Guide for Small Drinking Water Systems Serving
Populations between 3,300 and 10,000 (November 13, 2002) by ASDWA and NRWA.
• The application of CARVER (Criticality, Accessibility, Recuperability, Vulnerability, Effect, and
Recognizability), a method used by the military to assess the attractiveness of a particular target.
Use of a hybrid model is acceptable if it establishes vulnerabilities and risks.
1.4.4.1 Risk Assessment Methodology for Water Utilities (RAM-W™)
The RAM-W™ methodology, illustrated in Figure 1-2, is a "consequence-driven" approach that
focuses on evaluating the effectiveness of a security protection system (Sandia Corporation 2002). As
such, it offers numerous benefits. First and foremost, it offers utilities a systematic, defensible
approach to security protection systems. RAM-W1M helps utilities to identify those system
1-8
-------
introduction
components that are critical for the system to function and, in turn, helps them to prioritize security
upgrades and/or modify policies and operational procedures to mitigate identified risks. In turn, it
offers utilities a way to develop balanced security protection systems so that they can allocate the
appropriate resources to the areas where they are most needed to reduce risk.
Purpose, Objectives
Prioritize Facilities, PWC
Design Basis Threat (PA)
Prioritize Critical Assets (C)
Physical Protection and
Operating Systems (PE)
Facility
Characterization
Risk = Relative Risk
PA= Likelihood of Occurrence
0-PE) = Adversary Success
C = Consequence
RANGE OF VALUES
0.0 = None
1.0=Catastrophic
= PA(1-PE)C
Proposed Upgrades
End
FIGURE 1-2
RAM-W™ Methodology
1.4.4.2 Vulnerability Self-Assessment Tool (VSAT™)
VSAT™, shown in Figure 1-3, is a software-based tool for risk-based and cost-managed security
evaluation and planning. It is specifically designed to assist utilities in addressing the tasks necessary
to complete the six basic elements that the EPA requires for a water system vulnerability analysis.
VSAT™ imposes the rigor and logic necessary to perform an assessment that results in a
comprehensive analysis and that addresses these utility asset categories: 1) physical, 2) information
technology, 3) knowledge, 4) people/employees, and 5) customers/finances. A description of the
water system should be developed for each category to aid the utility in interpreting the results of the
assessment provided by the VSAT™. Additionally, the utility should review, and modify as
applicable, the software-generated language to ensure that the language is specific to the water
system being assessed. More information about VSAT™ can be found at www.vsahisers.net.
1-9
-------
introduction
', '• W
-• i .) "'ai-'Sewage Pumping
;' '.i "'rdiminary Treatment
SI- IP Primary Treatment (Clarif iers)
9 Ip Biological Treatment
1 -^jl Structures
I -:--€§ Electrical
:- J| Mechanical
! : @ Instrumentation
Secondary Clarification
Outfall
Equipment Management;
[+! A Administrative Office
siM | Control Room
(E ( ( Laboratory
5 ( ) ate
Disinfection (Chlonnation, UV)
Advanced Treatment (Reactors, filters)
Reclaimed Water System (Storage tanks, pumps)
-. • inosolids Management System
Wastewater Collection System
^ Gravity Sewers
S Pipes
Manholes
i } Pumping Stations
^ 5tormwater Sewers
|P Force Mains
D&M Support
Administrative
Laboratory
Warehouse
Maintenance Facilities
RolKng Stock
Business
Continuity Plan
* Readiness
# Response
* R«c-ov«ry
FIGURE 1-3
Vulnerability Self-Assessment Tool (VSAT™)
1.5 Understanding the Threats to Water Systems
Before Developing a Security Strategy
Threats to water systems have always included natural disasters, recurring events such as extreme
weather (e.g., flooding, lightning), and accidental (human-caused) events (e.g., chemical spills,
vehicle collision). Identified concerns for utilities from malevolent acts, such as vandalism, criminal
activity, and terrorism, exist. The use of water as a weapon, a means to defeat an enemy, or to affect a
population has historical precedent (see www.worldwater.org/conflict.htm).
The events of September 11, 2001 have heightened the way that utilities think about these malevolent
threats. Now, privately and publicly owned water utilities, along with other public infrastructure and
essential service providers, are clearly potential targets for destruction and disruption from domestic
and international adversaries. This concern has alerted water industry leaders, causing them to
recognize and address the potential consequences of threats such as vandalism and employee
misconduct to enhance their ability to maintain business continuity during these types of events.
1-10
-------
introduction
1.5.1 Malevolent Acts
Deliberate, malevolent events are intended to affect as many people as possible in order to create
concerns among the public and promote distrust of the authorities. This, in turn, causes dissention
and division and makes it easier for adversaries to affect the political and economic well-being of the
community.
1.5.1.1 Types of Malevolent Acts and Adversaries
Physical attacks on raw water supplies, water treatment plants, and distribution systems can take
different forms, creating a variety of results. The bombing of critical treatment plant processes or a
pump station, for instance, would result in significant property damage. Similarly, destruction of
electrical power grids or chemical suppliers servicing a water treatment plant would significantly
reduce or halt water deliveries for an indefinite period of time.
Sabotage or physical damage to a utility's chemical inventory would cause consequences for plant
staff, emergency response personnel, and community within the zone of influence. Once the initial
consequences of such an attack are addressed, the secondary concern would be the facility's inability
to use that chemical until temporary measures are established or the system is repaired.
Other types of malevolent acts include:
• Physical damage and destruction to the infrastructure assets
Use of explosive devices
Arson
Introduction of a flammable liquid into the water system
Vandalism
Sabotage of valves, tanks, etc.
Introduction of a chemical agent that can permanently contaminate the interior of pipes and
storage tanks
Damage to the power supply
Destruction of vital infrastructure
• Disruption of the water system
Introduction of a toxin into the source water, treatment facility, or distribution system
Hacking into the SCADA system
Removing hardcopy files or deleting electronic files
Vandalism
Sabotage of valves, tanks, etc.
Interrupt operations supporting the public
• Harming the workers and public
Release of toxic substance (e.g., chlorine)
Personal assault with or without a weapon on employees
Use of explosive devices
1-11
-------
introduction
- Arson
Kill, injure, or affect the health of large numbers of people
• Use of facilities for other malicious purposes
Access of customers' financial information
Equipment theft for personal gain
- Threat of contamination to invoke public fear
There are numerous types of adversaries as shown in Figure 1-4.
Threats may originate from an "insider" or from an "outsider." An
insider is a person with knowledge of the water utility and who has
access to the facilities or portions of the system as part of his or her
daily work activities. Insiders typically have access to information
systems as well. The appearance of an insider at a utility facility
does not typically cause suspicion. Examples of insiders include
employees, vendors delivering materials, and onsite contractors.
An outsider is a person who is not normally allowed access to any
of the water facilities. Suspicions might be raised if such a person is
seen on utility property. Outsiders typically do not have access
rights to buildings or information systems. Some outsiders,
• Current employee
• Former employee
' Spouse/partner of employee
• Vendor or contractor
• Customer
• Vandal
• Criminal
• Saboteur
• Terrorist
FIGURE 1-4
Examples of Adversaries
however, can have insider knowledge. These outsiders can include former employees, contractors, or
consultants who have some access or knowledge of the facility.
One way of differentiating these two is the manner of mitigation. For an insider, a utility is able to
apply insider risk reduction measures. The individuals need to fall under the utility's personnel
policies, procedures, and control. If they do not, the only remaining methods that can be applied are
those specific to an outsider.
The spectrum of malevolent acts is broad, and the actions to mitigate the risks associated with these
threats are more of a continuum than a discrete number of countermeasures. Consequently,
specifically in Section 2, "Management Considerations for Optimizing Physical Security," and to
some extent in Sections 3 and 4, "Operational Considerations for Enhancing Physical Security" and
"Design Considerations for Developing Physical Security at New Facilities and Retrofits,"
respectively, risk reduction actions are presented in the context of defined levels of threats.
In the sections that follow, threat levels are assumed to have the following defining characteristics as
shown in Table 1-2.
Prior to choosing a threat level on which to base a design, make operational changes, or revise
management policies, it is imperative to perform a vulnerability assessment and risk analysis on the
existing (or planned) water system. A thorough vulnerability assessment performed using either
RAM-W™ or VSAT™ (see Section 1.4.4, "Vulnerability Assessment Methodologies") will identify the
threats that should be addressed; a subsequent risk analysis will provide decision makers with the
data required to choose a strategy to reduce risks in the design, management, and operations of the
water system.
1-12
-------
introduction
TABLE 1-2
Threat Level Characteristics
Characteristic
Planning
Access
Weapons
Contaminants
Asset damage
Theft
Injuries
Fatalities
Threat Level
Vandal
None
Stealth
None
None
Minimal
None
None
None
Criminal
Possible
Stealth
Knife or pistol
None
Minimal
Probable
Possible
Possible
Saboteur
Definite
Stealth
Explosives
Possible
Significant
Possible
Possible
Possible
Terrorist
Extensive
Stealth or overt
Any
Probable
Extensive
Possible
Extensive
Likely
1.5.1.2 Secondary Benefits of
Designing for Security Against Malevolent Events
Utilities that have incorporated security for malevolent events are also finding that they have
enhanced their response to natural disasters and unanticipated failures and can restore system
operation and service more quickly. Water utilities have traditionally done an excellent job in
developing strategies for responding to natural events and unexpected system failures. Natural
events can include acute events such as violent weather, earthquake, fire, or flood, as well as chronic
events such as drought or expansive soils.
Because natural disasters tend to be geographically specific, not all water systems face the same
threats. Water utilities typically have countermeasures in place to mitigate the threats from natural
disasters common to the geographic area because building codes and standard engineering practices
consider natural threats in design standards and regulations (e.g., structures designed to withstand
120 miles per hour winds in hurricane prone areas). In addition, water utilities usually have disaster
preparedness plans and, possibly, response and recovery plans as well.
Unanticipated failures that can have a great impact on a water utility can include hazardous material
release, power or telephone service disruption, infrastructure failure, or even a labor strike or
slowdown. Standard operating procedures, key contact lists, and a complete inventory of emergency
parts and supplies are ways in which water utilities can response to these types of crises.
1.5.1.3 Management, Operations,
and Security Design Enhancements to Mitigate Malevolent Acts
The plans, processes, and procedures used to mitigate malevolent acts, as well as natural events and
unanticipated failures, are many. Some of the typical security enhancements for water systems that
mitigate these events include the following:
• Redundant systems
• Operational flexibility in design
1-13
-------
introduction
• Operational backups
• Backup power systems
• Alternate connectivity to other water supplies
• Uninterruptible power supply (UPS)/power filtration
• Increased treated water reserves
• Reduced quantities of hazardous materials (e.g., chlorine gas)
• Modified treatment process that is less hazardous
• Improved building design, construction, and materials
• Multiple sources
• Distributed treatment
1.5.2 Generic Threat Levels
The Department of Homeland Security has developed an advisory system that identifies the present
threat to the United States. In addition, the Water Information Sharing and Analysis Center
(WaterlSAC) advisory system (sponsored and developed by the EPA and AWWA) is another means
that can be used to communicate rapidly with water utilities about threats and threat levels. Utilities
need to be knowledgeable about how their operations and operational procedures should be adjusted
to coincide with these generic threat levels. Understanding the utility-level actions at the different
Homeland Security Advisory System levels (sample actions are shown in Table 1-3), reviewing
relevant materials, and planning are important for proper control and response actions. In support of
a utility's ERF, the EPA also provides guidelines for response in its Emergency Response Protocol
Toolbox (USEPA 2003). A summary of a portion of that guidance, provided in Table 1-4, demonstrate
good first steps.
TABLE 1-3
Actions Based on Threat Level as Announced by the Department of Homeland Security (DHS 2004, EPA 2004a)
Threat Level Announced Local Actions to Perform
Low (Green) Normal operations. Focus on facility assessments and ERPs. Review plans for
contingencies, and make sure checklists and other information are current.
Guarded (Blue) Normal operations. Advise employees of the status change; prepare to communicate
with first responders and other agencies; review ERPs.
Elevated (Yellow) Advise all employees of the status change. Have employees intercept and report all
visitors. Follow all utility-specific guidance for restricted access.
High (Orange) Double the frequency of checks on remote system operations. Review and re-stock
emergency use supplies as required. Fuel all vehicles, generators and equipment.
Charge all batteries.
Severe (Red) Cancel visits. Prepare for extended-hour work shifts. Stockpile reserves, such as fuel.
Maximize water storage.
1-14
-------
introduction
TABLE 1-4
Summary of EPA Water Utility Response, Recovery and Remediation Guidance
for Man-made and/or Technological Emergencies
I. Contamination Threat to the Water System, Unknown Contaminant, Unknown Location
Source Water
Notify local law enforcement, local Federal
Bureau of Investigation (FBI) field office
Increase sampling at or near system intakes
Review ability to isolate water source(s)
Treatment Facility
Notify local/state emergency management
organizations, notify ISAC
Preserve latest full battery background test
as baseline
Increase sampling efforts
Review ability to stop treatment and notify
customers
Coordinate alternative water supplies
Storage/Distribution
Notify other associated system authorities
Review ability to isolate storage and
distribution zones
II. Contamination Threat or Occurrence at a Major Event, Stadium, Convention Center, Etc.
Source Water
Notify local law enforcement, Local FBI Field
office, National Response Center, WaterlSAC
Treatment Facility
Notify local/state emergency management
organizations, notify wastewater system,
notify Governor
Storage/Distribution
Notify local government officials
Coordinate system isolation plan
Assist in draining contained water
Assist in developing sampling plan
Provide alternative water sources
III. Notification from Health Officials of Potential Water Contamination, Public Cases Identified
Source Water
Request information on symptoms, potential
contaminants and potential area affected
Increase sampling at or near system intakes
Consider whether to isolate source water
supplies
Treatment Facility
Notify local law enforcement, local/state
emergency management organizations, FBI
Field Office, and National Response Center
Preserve latest full battery background test
as baseline
Increase sampling efforts
Consider stopping normal operations and
notifying customers
Coordinate alternative water supply if needed
Storage/Distribution
Notify other associated system authorities,
local government official, and the Governor
Increase sampling in the area potentially
affected
Increase sampling at locations where
contaminant might have migrated
Consider whether to isolate
Consider whether to increase residual
disinfection levels
IV. Electronic Intrusion of the SCADA System
Source Water
Notify local law enforcement and local FBI
Field Office
Increase sampling at or near system intakes
Consider whether to isolate the source water
Treatment Facility
Notify the National Infrastructure Protection
Center
Preserve latest full battery background test
as a baseline
Increase sampling efforts
Temporarily shut down SCADA and use
manual operation procedures
Consider whether to shut down system and
provide alternate water
Storage/Distribution
Notify other associated system authorities,
and employees
Monitor unmanned components of the
storage and distribution system
Consider whether to isolate portions of the
system
1-15
-------
introduction
1.5.3 Threat Level Assessment
Identifying the threat level that faces a utility is a critical step in understanding the level of protection
required for its water system. The determination of a threat level is composed of two main
components:
• First, the type of threat
- Inside threats (employees, vendors, onsite contractors)
- Outside threats (vandals, criminals, cyber terrorists, domestic terrorists, foreign terrorists)
• Second, an assessment of the likelihood of a threat occurring at this utility
Capability of the threat (e.g., number of adversaries)
History of threats
Tactics and methods of attacks (including tools)
- Access to critical equipment (internal)
- Motivation of adversary
The threat level assessment process includes open dialogue with local law enforcement agencies. This
dialogue should include at a minimum conversations with the local Federal Bureau of Investigation,
the Sheriff, police department, and undercover task force personnel. Documented occurrences at the
utility, using the expertise and experience of the utility's employees, should be reviewed. It is also
worthwhile to talk to neighboring utilities regarding past experiences that they have encountered.
Capabilities. The capability of the threats identified is related to the likelihood that an event will
occur. Identification of a possible threat, such as a criminal or a terrorist, helps to identify the
capability of those individuals to be successful in causing disruptions. The more organized and less
spurious the intruder is, the more likely those adversaries will use more advanced equipment and
weapons. On the other hand, adversaries may be less likely to approach a facility where they could
be easily detected and stopped.
History. Research and discussion with local law enforcement is imperative. Awareness of national or
international level security alerts does little to provide a picture of what is happening in local
neighborhoods. Regular discussions and information-sharing with the local police, sheriff, and FBI
field offices can provide a much clearer potential for man-made activity against utilities. The presence
of local extremist groups and vocal activist groups can have a direct effect on calculating the
likelihood that an event will occur on utility property.
Utilities should frequently share their events, trespasses, and cyber intrusion cases with their local
law enforcement agencies. Sharing knowledge of activities and actions against different parts of the
nation's infrastructure aids the FBI, sheriff, and police to better disseminate and evaluate information
in each region of the country.
Tactics and Methods. Tactics of carrying out malevolent acts include overt actions and surreptitious
actions. Overt actions include direct attack on infrastructure, assault, and hostage taking.
Surreptitious actions include vandalism, theft, contamination, use of explosives, and cyber attacks.
1-16
-------
introduction
Methods include unarmed individuals attacking individuals, damaging equipment, and shutting
valves, and using sewers as access-ways to otherwise secure sites unrelated to the utility. Other
methods include weapons such as knives, pistols, rifles, or submachine guns, and standoff weapons
such as rocket-propelled grenades and mortars. Explosives may be manufactured (e.g., hand
grenades) or improvised explosive devices (lEDs) that are placed at a location such as a pipe bomb in
a trashcan. TNT, C4, or other high explosive hidden in a vehicle that is parked or driven onto a site
and either manually or remotely detonated could be used. Adversaries may also use mail bombs or
bombs placed in packages or containers carrying materials that are delivered to the utility.
Contamination with chemical, biological, or radiological agents is a threat from two perspectives.
First, these agents may be used against utility personnel through dispersal in the air; through heating,
ventilation, and air conditioning (HVAC) systems; food; and the potable water supply. Second, these
agents can be introduced to the public through the source water system, directly into the treatment
system, or into the water distribution system. Depending upon the specific substances used, damage
may be acute and/or chronic.
Water systems also face malevolent acts to their information systems through cyber attacks. Such
attacks may originate internally or externally. Attacks directly on the utility may disable a SCADA
system and alarms, override process controls, or take over control of key points in the system
resulting in water outages or insufficiently treated water. Cyber attacks may also interrupt
communications, as well as intranet and Internet services.
Attacks on outside providers, such as power generators or power grid operators, can also
significantly affect the ability of water utilities to provide continuous and effective service.
Access. The VA process helps identify those parts of the water system that are critical to maintaining
operations. Protection of those key assets, without which the system would not be able to meet its
mission, is logical. Providing worker access to those critical assets is important, as is denying access
to others. If access to key locations can be achieved without detection and damage done or equipment
taken off line, key single points of failure can occur that affect other related and unrelated parts of the
process.
Motivation. The motivation of perpetrators ranges from the mischief of vandals to the desire of
adversaries to undermine the well-being of society. In between these two extremes are a variety of
motivating factors that include persons angry at the utility or individual of the utility. Disgruntled
employees who feel abused, belittled, unappreciated, or unrewarded may attack coworkers or
supervisors, damage infrastructure, destroy or change data, or steal equipment. Former employees
who believe they were wrongly terminated or desire to avenge a previous incident may return to the
workplace and commit an assault or murder, property damage, theft, or sabotage. Spouses and
partners of disgruntled employees and former employees may commit the same acts of revenge on
the utility or its management. Similarly, customers who believe they were wrongly treated,
overcharged, or who have experienced property damage may vent their anger in similar ways. It is
important to realize that the actions taken by these angry persons may be either planned or
impulsive.
1-17
-------
introduction
Economic gain may motivate persons, including employees, to steal equipment, supplies, vehicles, or
money. Such thefts may be a single breaking and entering, making the crime obvious. On the other
hand, thefts may be insidious if committed by persons such as employees, vendors or contractors
who have access to the organization's facilities. Thefts may also be conducted through an ongoing
scheme that involves stealing of rarely used items or embezzling small amounts of money, and
covered up through unauthorized adjustments to inventory or financial records. Such crimes may
remain unnoticed for long periods of time. Thefts by employees are unfortunately common. It is
estimated 68.6 percent of employees who commit these crimes have no previous criminal record. 1
At the extreme end of the motivation scale are the driving forces of the terrorist. While remaining a
topic of debate, motivating factors may be political, religious, social, or symbolic; revenge, change, or
the desire to gain attention may instigate it. There are two categories of terrorists: international and
domestic. International terrorists act with the intent of undermining stability and instilling terror
through destruction of economically important and symbolic assets, and, potentially, by killing large
numbers of people. These terrorists almost always work in groups, and spend considerable time and
resources to select and learn about their targets, and plan their attacks. At the extreme end, the
motivation of terrorists is so strong that they will adopt different lifestyles, deceive and betray friends
and family, and sacrifice themselves for their cause. Domestic terrorists may have a well-financed,
loose-knit working organization focused around their cause, but usually work alone.
1.5.3.1 Locate Information on Most Probable Threats
There are a number of sources that utilities can use to obtain local information on most probable
threats. As discussed in Section 1.5.2, "Generic Threat Levels," Water ISAC, operated by the
Association of Metropolitan Water Agencies (AMWA), can be consulted for current information on
security intelligence in the water industry. Additionally, information to supplement the utility's
knowledge and experience can be obtained through communication with law enforcement and other
utilities.
1.5.3.2 Use the Information
to Review the Utility's Organizational Security Strategies
Utilities can use a variety of existing information as part of reviewing their current organizational
security strategies. Some of the typical information that is readily accessible to utilities includes the
following:
• Operations and operational capabilities
• Current policies and procedures
• General physical security capability
• Maintenance and testing of security systems
Detecting Employees Who Steal, Workforce Management, November 2002, page 31
1-18
-------
introduction
1.5.3.3 Identify Response Capability and Actions
Response capability refers to a range of actions from appropriate water system operator responses to
police responses to the involvement of other public safety agencies. It also includes the built-in
operations responses within the water treatment and delivery system itself. It involves the
assessment of what is wrong and the decision of what to do about it. Response is based on the threat
identified in relation to the critical asset that is threatened.
1.6 Developing a Security Strategy
A security strategy is both a short-range list of activities and a long-range plan. Security strategy is
not developed as a stand-alone exercise, but requires an understanding of the information previously
introduced in this section.
Understanding system vulnerabilities, or critical "points of failure," that would keep a utility from
achieving its defined mission goals is the first part of a necessary strategy. How to keep in business is
the focus of the strategy. Any action to improve system redundancy, protect critical functions, back
up operations, train personnel, and organize business policies, procedures, plans, and functions
supports the goal of continuing the mission without interruption.
There are multiple parts to a good security strategy. Defining a goal of complete system
redundancy—of pumps, tanks, water sources, and other essential facilities—would be a long-range
plan. Addressing immediate issues identified in a security plan can help to reduce risk quickly by
focusing on management and operations activities under current control. When utilities perform this
analysis, it is important that they consider not only documenting the process, but also
communicating the assumed risk tolerance to policy makers and governing boards. It is critical for
utilities to have policy makers aware of and in agreement with utility management with respect to
the degree of risk tolerance selected. The level of acceptable risk tolerance that utilities can agree to is
subjective and can have considerable impact on the cost and degree to which utilities undertake
security improvements, change operating policies and procedures, and so on.
This guidance provides a broad range of tools and techniques to address water system security. Some
are simple and easy to implement; others are more complex and costly, possibly requiring a
significant involvement of time and resources. It is essential for utilities to realize that an effective
security plan is not necessarily complex or expensive. An effective security plan is one that makes
sense for and can be implemented within existing (and future) conditions. Utilities are encouraged to
apply the contents of this guidance in a commonsense and practical way.
The following sections can help with the development of a good security strategy.
1.6.1 Determining the Required Level of Security
As described in Section 1.2, a vulnerability assessment typically uses a risk-based approach to
prioritize potential security improvements. A vulnerability assessment does not, however, determine
the levels of risk, and thus security systems, that are acceptable and how the potential improvements
should be implemented. Many vulnerability assessments include determining the DBT, which
1-19
-------
introduction
identifies the types of adversaries and their capabilities; however, the assessments generally provide
limited guidance regarding how to select the threat. Methods that can be used to determine the level
of security improvements that should be implemented are described below.
1.6.2 Conducting a Risk Reduction Analysis
Risk is best assessed and analyzed if quantified (e.g., 1 to 100). Because risk is related to the likelihood
of occurrence (probability) and the severity (criticality) of the consequence. To generate a quantified
result, both probability and criticality should be stated in the same scale. Risk reduction is then
accomplished by reducing either the likelihood of occurrence, the severity of the consequence, or
both. The approach should be to optimize risk reduction, that is, to reduce as much of the risk at the
least cost through a cost risk-reduction analysis that leads to prioritizing countermeasures.
1.6.3 Conducting a Cost-Benefit Analysis
A cost-benefit analysis can be performed for security improvements as is commonly done for other
engineering alternative evaluations. A cost-benefit evaluation is most robust if benefits can be readily
quantified. For example, the cost of improvements in physical security (such as improved locks,
alarms, and fencing) can be compared to the value of avoided vandalism damages. Establish baseline
information by collecting information on historical events, such as:
• "tagging" events, trespass events, and unescorted visitors
• frequency and cost of fence and gate repairs
• system breakdowns (e.g., pumps, valves, filters, etc.) and the duration of out-of-service events
• supply equipment lead times
• personnel overtime events due to system problems
When considering design changes to operations, procedures, or physical security, a continued review
of the baseline indicators can provide documentable comparisons to the cost of doing business before
and after implementing changes.
1.6.4 Conducting a Cost-to-Risk-Reduction Analysis
Security improvements can also be prioritized by comparing the cost to implement each security
measure against the degree of risk reduction that the measure would provide. For risk assessment
methodologies such as RAM-W™, the amount of risk reduction can be expressed numerically by
determining the risk score for each asset before and after the proposed security improvement. This
analysis typically shows that measures requiring a relatively low capital investment, such as
implementing security policies and procedures, result in a low cost-to-risk reduction ratio. As shown
in Figure 1-5, a cost-to-risk-reduction curve can be generated, and a determination can be made as to
what measures should be implemented by identifying the "knee of the curve," or the point at which
the risk reduction associated with implementing additional costly security measures is marginal.
1-20
-------
Cost$
Cost$
Reduction in Risk Score
Policy & Procedure
improvements
SCAOA
Securiy
Background
Ch'«ks
KsyControi
Reduction in Risk Score
Operational Security
Improvements
iii System rests
improved Bench Stotik
kup Powef
Reduction in Risk Score
CostS
Physical Security
Improvements
iproved Contracts
Reduction in Risk Score
FIGURE 1-5
Sample Cost to Risk Reduction Curves
introduction
1-21
-------
introduction
1.6.5 Comparing Security Risks to Other Risks
Utilities face many risks other than those from malevolent acts that could substantially disrupt their
ability to meet their mission. Another prioritization method that can be used is to compare security
risks to these other "non-security" risks using a common ranking scale. Failures of major facilities or
pipelines due to obsolescence, water quality violations, and unexpected losses of key staff are
examples of risks that utilities must actively manage.
A utility can put its security risks in context by conducting an overall operational risk analysis in
parallel with the vulnerability assessment. While one type of risk is usually not compared to an
operational facet, both can affect the mission of the utility. Risks and issues that affect the ability to
disrupt the mission can be ranked one above or below another. Although the consequences of a
malevolent act could be high, the probability of occurrence may be relatively low. 2
1.6.6 Developing a Balanced Plan
The concept of balanced approach to security involves more than physical additions like fences,
guards, and dogs. These design approaches to improved security can be grouped into two general
categories —Basic and Advanced. Basic changes are those that can be implemented more quickly or
with fewer changes, and can occur across the organization in terms of Procedures, Operations and
Physical Security improvements. Examples of such changes include:
• The design of new facilities and retrofits of existing water system facilities that build in security
features. The training of personnel to observe, control, and respond to deliberate actions against
the utility. Without staff commitment to the security program, which will require a cultural
change in the way that business is conducted, the program will not be effective.
• Procedures and checklists that allow for recognition of problems and specify proper reactions to
problems.
• Systems that are operated and maintained for depth of capability and ease of control, including
methods to assess an alarm situation though the use of intrusion sensors, cameras, and other
technologies. Detection of deliberate actions against a water system can be determined in a
variety of ways. On-line monitors and system parameter guidelines indicate when a parameter is
out-of bounds. Placing monitors so that they can quickly pin-point aberrations in operational
parameters provides real-time capability to mitigate intrusions.
• The proper response to mitigate activities designed to keep a utility from meeting its mission
objectives.
• The steps necessary to return to normal operations quickly, efficiently and in a manner that
allows everyone to learn and improve so as to avoid a future occurrence with the same impact to
operations.
2 It is challenging to quantify the probability of a high-level adversary attack given the absence of incident history, while it is relatively easier to
estimate the probability of low-level threats like vandalism given that there is more likely to be an incident history from which to draw.
1-22
-------
introduction
These approaches can be organized into four categories — prevention, mitigation, response, and
recovery — with examples provided below. Detailed information can be found in subsequent sections.
1.6.6.1 Prevention
Proactive work by utilities on prevention can reap substantial benefits by securing their water
systems from malevolent attacks. Some examples of preventative measures for considerations follow.
1.6.6.1.1 Basic
Consider contracting with a computer security consultant to conduct a periodic audit of the firewall,
routers, and intrusion system. A consultant can relieve the burden of maintaining a high level of
expertise in this area. Balance the need to establish monitoring programs with the need for discretion
regarding water utility critical assets.
1.6.6.1.2 Advanced
• Continuously coordinate vulnerability assessment activities with other nearby utilities, including
organizations that control the source water used by the utility, and participate, to the extent
possible, in assessments conducted to determine that critical water sources and critical operations
are appropriately monitored and adequately protected.
• Work with chemical suppliers to initiate use of anti-hijacking technologies and to develop utility-
supplier protocols for preventing and responding to tampering during shipment.
• Establish a citizen's watch program and a law enforcement education program to help provide
monitoring of hydrants and water utility system sites with the intent of preventing unauthorized
use or entry.
As part of a long-range plan, some utilities may choose to upgrade the current backflow prevention
system by installing backflow prevention devices on commercial and industrial customers that pose
high risk to the water system. Utilities may also choose to eventually install backflow prevention
devices, such as dual check valves, on residential homes as part of a planned meter replacement
program that is part of their long-range Capital Improvement Programs.
1.6.6.2 Mitigation
The ability to prevent a deliberate and planned attack is always limited. The ability to control the
events offers a chance to mitigate the effects of a malevolent event. If water is contaminated or shut
off and the system has means to deliver potable water in other ways, then the effects of the attack
have been mitigated. Redundant delivery systems, backup power, and alternate treatment options,
for example, can mitigate a variety of man-made or natural disasters. To effectively mitigate, a utility
first identifies the parts of the operation that present the most risk or cannot be easily mitigated, then
conducts a risk reduction analysis. Risks and subsequent mitigations are identified and prioritized
until all have been considered.
Some malevolent events will be outside of the utility's control or just not practical to prevent from
occurring. Below are some ways that utilities can mitigate these types of events.
1-23
-------
introduction
Basic
• If a utility uses groundwater, reconsider developing a wellhead protection program to provide
additional protection to the aquifer.
• To lower consequences of critical asset damage, standardize equipment and maintain spare parts
or identify contractors that can supply these parts on short notice.
• Back up computer system data routinely.
• Identify secondary location for the operating control room.
Advanced
• Develop a computerized water quality/hydraulic monitoring system of the distribution system
that is linked to an integrated geographic information system (GIS) database for critical facilities.
• Consider installing real-time monitoring equipment that has recently been developed to enable
the direct detection of chemical contaminants in water distribution systems.
• Improve the electrical power feeds to the facilities. Redundant electrical power systems
significantly reduce the vulnerability risk to essential operations. Options for providing
redundant systems include installing sufficient backup generator capacity to operate the majority
of the treatment processes or installing an electrical feed from another power provider.
1.6.6.3 Response
Utilities cannot initiate a response to an event until detection and assessment of an intruder alarm or
the actual intrusion has occurred. Initiating response will typically require the notification and
cooperation, and will benefit from a good working relationship with, law enforcement. Additionally,
EPA's Response Protocol Toolbox is a good source of planning information. Below are some
suggested tools that can be adopted by utilities to improve detection, assessment, and response to
malevolent events.
Basic
• Develop procedures to respond to a security breach located at any water treatment plant (WTP)
facility (including alarm systems). Coordinate with local law enforcement.
• Identify high-priority facilities and work with local law enforcement to improve response time to
these critical facilities.
• Institute a policy that operators and maintenance workers contact the SCAD A/alarm monitoring
stations when site buildings and alarmed doors are accessed for operational purposes.
Advanced
• Purchase a "panic button" system to be worn by the operators and maintenance staff that enables
the staff to send a distress signal to the local law enforcement agency in an emergency situation.
1.6.6.4 Recovery
Recovery is a critical part of a utility's balanced approach to securing its water system against
malevolent events. This part of the approach refers to the ability of the utility system to return to full
1-24
-------
introduction
operation. The best outcome of a deliberate malevolent act is for the public to be unaware of the
event—that the systems, plans, and responses are able to restore services within the reserve capacity
of the system.
The goal of the recovery phase is to return the system to its optimal operational status as soon as
possible. Follow-up actions are also needed to learn and improve; document costs in resources, time
and labor; and to provide information to other agencies that can help to improve identification,
tracking, and prevention of future events.
1.6.7 Prioritizing Security Investments
Typically, developing a vulnerability assessment involves defining a relatively long list of
vulnerabilities and potential improvements, ranked according to the potential risk. When presented
with this list, utilities are able to contemplate how many of the recommendations to implement and
the level of protection that is acceptable. In prioritizing security investments, they need to consider
limited resources and balance the external demand for security with the internal resources available
to implement security measures. In addition to the legal considerations described earlier, there are
other considerations that may be addressed in answering this question.
1.6.8 Documenting the Process
Utilities need to thoroughly document the risk reduction analysis and mitigation decision process
and keep the documentation in a secure location with restricted access. The document is the utility's
roadmap to protecting its system.
1.6.9 Sharing Information
Utilities have a number of opportunities to share information that can reduce costs of enhancing
physical security of their water systems.
• Benchmarking and other industry activities. Participation in benchmarking or other related
industry activities can provide the utility with early access to best management practices that can
be cost-effectively integrated into the program.
• Provide cyber attack details to the local FBI office. The local FBI has established capabilities of
researching and investigating both successful and unsuccessful cyber attacks on utility systems.
• Coordinate/cooperate with contiguous utility systems. Coordination of security-related
programs with contiguous systems can provide additional redundancy and potentially reduce
the costs of securing the utility's water system.
1-25
-------
(This page intentionally left blank)
-------
SECTION 2
Management Considerations
for Optimizing Physical Security
Management:
Optimizing
Physical Security
Operations:
Enhancing
Physical Security
L
Desic
Develd
Physical 1
L
Emergj
Respc
Piann
Keep the governing board informed
• Involve all stakeholders
• Address financial resources
• Address human resources
• Manage records
• Update policies and procedures
* Plan for emergency procurement
* Ensure effective communication
Initiate interagency coordination
2.1 Overview
Many measures available to water utilities to reduce the risks associated with malevolent actions and,
to a great extent, natural disasters are those that can be developed and put into effect without
concrete, metal, or heavy equipment. While all utilities should make the development of security-
enhancing policies and procedures a priority, it is especially important that smaller utilities and those
with limited resources make the most from these low-cost/high-value actions, rather than being
frustrated by the inability to fund major infrastructure countermeasures. These actions include
organizational cultural changes, employee training, stakeholder awareness, and policies and
procedures that change business practices with the goal of a more secure workplace and better
protected facilities.
Utility management can implement these security enhancements for a relatively low cost and in a
manner designed to augment physical security measures that may be added at a later date. This
section provides concepts, strategies, and actions that water utility managers can consider when
contemplating how to possibly prevent and better prepare for both known and unknown challenges
that may arise.
2-1
-------
management considerations for optimizing physical security
As with all sections in this guidance, this section is not designed to be prescriptive, but rather as an
aid based on best practices used by the most efficient, effective, and secure water utilities in the
United States. It is also designed to guide management as it applies security considerations, even
though physical security upgrades may not yet be in place.
A reminder, as mentioned earlier in this document, that physical security is related to, but not the
same as, protection from natural disasters. Planning for natural disasters has been part of
management's responsibilities for decades. Protecting utilities against malevolent acts has become a
higher priority due to recent events. Preparedness, mitigation, response, and recovery for the threats
and hazards of human-caused events are more complex, requiring continuous re-evaluation of the
motivation and mindset of the threat.
2.2 Governing Board
The governing board of a water utility, whether comprising elected or appointed persons, is the
policy-making body of the utility. The board is ultimately responsible to the utility's customers for
ensuring proper management of the water system to maintain public health and to protect the
environment. From this standpoint alone, it is important for utility management to provide
governing board members with, at a minimum, a high-level overview of water system threats and
vulnerabilities and management's approach to mitigating the associated risks. However, because it is
likely that governing board approval will be required to implement policy changes and physical
security improvements that may impact capital and operations budgets, utility managers should
consider providing board members with more detailed information about water system security.
Possibly, the biggest obstacle to implementing security measures will be convincing the governing
board that water systems are indeed vulnerable. Utility managers may find it helpful to reference the
nationwide emphasis on securing water infrastructure.
• Consider describing EPA's Strategic Plan for Homeland Security and the development of tools
and guides by AWWA, the American Water Works Association Research Foundation (AwwaRF),
and AMWA to assist in the assessment of water system vulnerabilities and in the reduction of
security-related risks.
• Use factual occurrences as examples — illegal entry in distribution system storage reservoirs,
intentional and accidental dumping into a river or lake upstream of a water treatment plant, loss
of equipment due to criminal activity, or vandalism at a remote pump station that could have
resulted in water outages or financial impacts to the utility —to emphasize the importance of
water system security.
• Discuss how a security breach can impact public health, place utility employees at risk, and
damage the environment.
• Examine the effect of an incident for which the utility was unprepared on the credibility of the
utility and the governing board.
2-2
-------
management considerations for optimizing physical security
• Focus on opportunity cost versus the cost of not implementing security measures, including
possible liability and regulatory action, should the utility not address obvious vulnerabilities or
take reasonable security measures.
• Provide the governing board more than just the consequences; provide management's approach
to responding to the challenges by realistically forecasting short- and long-term needs and the
impact on resources, such as labor costs, other operation and maintenance (O&M) costs, and
capital, as well as on developing funding alternatives.
• Preparing and protecting against man-made events also serves the dual purpose of protecting
facilities against the effects of natural disasters.
While communication with the governing board is imperative, utility managers must be cautious
about those security details that might be revealed in public forums. Therefore, discussions about
water security with governing board members should be held privately if state and local sunshine
laws allow. Sunshine laws and the Freedom of Information Act (FOIA) stipulate the types of
discussions that can take place with board members outside of public meetings and how many board
members can meet without public notification. Sunshine laws are laws aimed at opening up
government procedures to inspection by the public, metaphorically letting the "sun shine" on the
procedures (http://WordIQ.com/definition). For example, the Ralph M. Brown Act governs open
meetings in California for local government bodies, such as boards, councils, and commissions. This
law guarantees the public's right to attend and participate in meetings of local legislative bodies.
Because laws vary from state to state, utility managers should seek guidance from their legal counsel
so that their efforts to keep discussions about security measures confidential do not violate the law. In
general, at public meetings, utility managers should refrain from long and detailed descriptions of
security needs and measures. If board members are briefed in closed sessions not open to public
participation, detailed public discussions should not be necessary.
Utility agencies should also consider formalizing these procedures, briefings, approval levels, and
responsibilities in a written security policy. A security policy can clarify what can and what cannot be
discussed in open forum, as well as outline the level of expectations of the city staff, the management
staff, and the utility staff in securing water facilities.
2.3 Customers and Other External Stakeholders
Utility managers may want to be prepared to respond to questions from customers, the media, and
other external stakeholders who may want to know if or why water security is an issue and what the
utility is doing to reduce risks to infrastructure, persons, and service. These external stakeholders
may include community organizations and environmental activists who are interested in the
countermeasures that the utility may use to prevent or mitigate the effects of events such as a
chemical or biological contamination, disruption of drinking water supply, and loss of fire flow.
Other external stakeholders may be government agencies, elected officials, and business owners who
want assurance that the utility has taken the appropriate steps to maintain service during malevolent
or natural disasters.
2-3
-------
management considerations for optimizing physical security
Unlike other utility matters, proactive communications with all customers and external stakeholders
about security measures may not be necessary or even desired due to the confidential nature of the
subject. However, utilities can initiate discussions about water security with a few categories of
external stakeholders (such as law enforcement, and fire and health departments) to improve the
planning and implementation of countermeasures and emergency response.
Water utility managers should also initiate discussions with wholesale customers —those cities,
counties, or companies operating regional water systems that provide water to a number of
downstream retail water providers. Wholesale customers can be encouraged to protect their water
systems at the same level of protection as that used by the wholesaler's retail customers. New or
renewed wholesale agreements can include requirements for the wholesaler to institute
countermeasures to mitigate risk to the utility's water system.
Implementation of security measures could have substantial impacts on water system budgets, both
capital and operating. Whether the utility will fund security projects from debt sources or net
revenue, pressure on water rates may necessitate a rate increase. Thus, utility managers will need to
inform customers of the importance of security measures in providing uninterrupted service and
protection of public health and the environment,
without revealing significant details about the
approach to security or specific countermeasures.
Water utilities may want to consider a specific
surcharge on the base water rate to fund security
projects. An example of this strategy is shown in
Figure 2-1. (CleanWaterAtlanta 2004).
Proactive communication with other water
utilities, regulatory agencies, and first-responders
is also important to developing and maintaining a
secure system, as described in Section 2.9,
" Communications."
2.4 Financial Planning
When looking for opportunities to facilitate ways
improve security, financial planning presents a
very important opportunity to reduce risks. Key
areas include:
• Developing Capital Improvement Plan (CIP)
programs that adequately support security
needs.
City of Atlanta - Ordinance 03-0-2212
SECTION 7: (a) That the imposition of a
surcharge shall be placed on all domestic,
commercial, industrial and other users of the City
of Atlanta Water and Wastewater System to pay
for the cost to implement the security and
infrastructure requirements as described in the
Safe Drinking Water Act and Public Heath
Security and Bioterrorism Preparedness and
Response Act. (b) that for purpose of this
ordinance, the surcharge will be described as the
"Water and Wastewater Systems Security
Surcharge." (c) that the Water and Wastewater
Systems Security Surcharge shall be $0.15 per
hundred cubic feet for all billing cycles beginning
on and after January 1, 2004. Funds collected
from the surcharge shall be deposited in a fund
separate and distinct from other funds of the
Water and Wastewater System.
Enacted January 2004
FIGURE 2-1
Sample Surcharge Language
Integrating Government Accounting Standards Board Statement 34 (GASB 34) considerations
with the CIP planning for security and reporting purposes. The following is the time line for
actions in the near future (see www.GASB.org for latest requirement details):
2-4
-------
management considerations for optimizing physical security
Phase 1 public entities - those with total annual revenues equal to or greater than $100
million; actions are required for fiscal years beginning after June 15, 2005.
Phase 2 public entities - with total annual revenues equal to or greater than $10 million but
less than $100 million; actions are required for fiscal years beginning after June 15, 2006.
With the exception of, "Public Institutions that report as special-purpose Governments
engaged only in business-type activities are required to report infrastructure upon
implementation, without regard to the phase-in periods included in this paragraph. The
transition period also does not apply to business-type activities for public institutions
engaged in both governmental and business-type activities."
• Developing a diversified strategy for funding both capital and operating needs that can be
supported by governing boards and customers.
Of these considerations the first three are described in more detail below.
2.4.1 Developing CIP Programs
that Adequately Support Security Needs
To meet normal customer demands on the systems and to accomplish security objectives, water
utilities invest in CIP programs and O&M programs to keep existing facilities at proper functioning
levels. Utilities may also need to modify or build additional facilities that have been identified as key
to improving security. Building facilities with improved security take a variety of forms, such as
providing redundancy where it currently may not exist, improving flexibility and management of
existing facilities, and restricting access to critical facilities.
It is obvious that having an adequate and integrated CIP and funding program is essential because
security-related projects often need to compete with many other capital projects, such as:
• System Growth Requirements. Many water systems with growing and developing population
bases need to spend substantial funding on capital projects to develop new raw water supplies,
expand treatment capacity, or extend distribution system networks to new areas.
• Correction of Identified Deficiencies Not Related to Security. Many utilities have neglected
aging assets. Inventory work and condition assessments conducted as part of asset management
programs have, in many cases, quantified the need for action to make up for past neglect.
• "Normal" Renewal and Replacement. Well-managed water utilities proactively plan to spend a
steady amount on the orderly renewal and replacement of aging system components. While these
projects contribute to the overall integrity of the systems in the long run, in the short run the
funding for these projects may compete with specific security-related investments that have high
priority.
These competing considerations make it increasingly important for water utilities to have sound
processes for identifying, prioritizing, and implementing their capital improvement programs.
Traditionally, water utilities have identified required projects but have not prioritized the projects or
documented how the projects relate to key goals and objectives of the utilities. Increasingly, utilities
2-5
-------
management considerations for optimizing physical security
are turning to more systematic decision management methodologies that identify and weigh criteria,
and then explicitly "score" the performance of candidate projects. In such systems, security
considerations could be explicitly recognized as a criterion and weighed in relation to other
competing priorities.
The Capital Planning Strategy Manual, published by AwwaRF and AWWA in 2001, includes
instructions and tools for implementing these more systematic prioritization decision management
methodologies. These approaches are sometimes called multi-attribute utility models because scales
are created that measure the contribution (value) added using both monetary and non-monetary
criteria. In addition, cost-benefit relationships can be identified to guide the planning process. The
decision management process can then include the efficiency of candidate projects toward meeting
fundamental agency objectives such as security. By selecting the projects that most efficiently
contribute to stakeholder goals, it is possible to identify a 5-year, 10-year, or 20-year series of capital
expenditures that maximizes the value of security and other goals within identified annual levels of
capital expenditure.
For smaller utilities without a large CIP or operating budget, the increased attention on simple,
effective O&M procedures becomes more important in protecting crucial functions of the system
from threats.
To satisfy both normal renewal and replacement needs as well as security needs, normal activities can
include appropriate security improvements. For example, when a tank is taken out of service for
repair/repaint, use the opportunity to modify valves, vents, hatches, ladders, etc. to enhance the
security of the tank.
Implementing security considerations on existing and new facilities, and the construction of new
facilities to meet growing customer demands, are not mutually exclusive activities. Rather, they are
similar in planning the dollar investment requirements. Normal or routine maintenance and renewal
of assets can be coupled, where it makes sense, to changes in how systems operate or to include
physical security improvements. New system facilities can be designed with those changes already in
place as part of construction and operational functions that help promote security consciousness.
2.4.2 Developing Funding Programs
to Support Operating Fund Needs
Developing funding programs that support the operating funds of a water utility is also critical to
reducing risks related to security. Defining and securing stakeholder and governing board support
for operating budgets supports risk reduction in a number of ways. The labor budget (or contract
budget where operations are performed through a private vendor) literally provides the funding
support for the crews that maintain, operate, and monitor the water utility's assets. Inadequate labor
budgets present several labor-related risks, including:
• Possibility of facility breakdowns (e.g., loss of the WTP or a break in a major distribution system
segment) that escalate into emergency situations because the situations go undetected during the
period in which there is still an opportunity for recoverable intervention.
2-6
-------
management considerations fnr optimizing physical security
• Risk that power failures, software system failures, computer viruses, or other system failures will
go undetected if there is inadequate or insufficiently trained staff to monitor and react to these
types of security threats.
In addition to providing the labor required to adequately staff the system, the operating budget
contributes to risk reduction/security enhancement by providing funding for operations and
maintenance of security systems, as well as general equipment and supplies needed to keep the
system in proper working order.
Beyond these basic labor and equipment/supply considerations, the operating budget contributes to
risk reduction/security by providing funding needed for the services listed below:
• Operating Reserves. Numerous utilities have set an internal goal of maintaining a minimum of
one billing cycle's worth of operating budget to be set aside in reserve so that utilities can make
payments required in the event of a crisis. Depending on the utility, as much as 90 to 120 days'
worth of operating budget may be required.
• Petty Cash/Liquid Funds. Cash on hand is needed to support immediate needs such as funding
emergency activities or allowing transactions with customers or vendors that do not have access
to alternate payment tools.
• Debt Service Coverage. Many water utilities fund at least a portion of their capital programs
through municipal bonds or through state revolving fund loans. In most cases, these funding
vehicles require that net revenues for the utility be adequate to provide some level of coverage
above the annual debt service payments. The required level varies but is often in the range of 1.10
to 1.25 times the annual debt payment. For utilities with substantial outstanding debt, the
coverage amount can represent millions of dollars. Water utilities that do not provide adequate
operating budgets to satisfy the coverage provisions for their bonds run the risk that their credit
ratings will decline and that they will not be able to incur additional debt for security-related
capital projects. In addition, bond covenants often require that utilities maintain specified levels
of funding such as debt service funds, debt service reserve funds, and emergency funds.
A sometimes overlooked element of operating fund adequacy relates to customer billing and
collection systems and processes. It is critical to long-term financial stability that utilities maintain
high collection rates for their bills or customers will stop paying the bills. Maintaining up-to-date
customer and collection records and taking prompt action to collect on unpaid bills are essential to
credibility. Therefore, it is important for utilities to consider the security and resilience of billing and
collection systems in their vulnerability assessments.
2.4.3 Developing a Funding Program
that Governing Boards and Customers Can Support
In addition to developing budgets that reasonably support the capital and operating funds that are
needed to improve security, water utilities need to develop budgets and funding programs that their
decision-making boards and customers will support. To gain support from governing boards, utility
staffs increasingly need to be able to document that:
1-7
-------
management considerations for optimizing physical security
• Proposed capital programs are justified (i.e., supported by a prioritization process, such as a
vulnerability assessment, and integrated with other capital needs through an asset management
program such as the one described in Section 2.4.1, "Developing CIP Programs That Adequately
Support Security Needs").
• Proposed rate and fee structures are equitable and supportable.
• Proposed financing plans for capital programs are optimal. For example, boards increasingly
want an evaluation (e.g., degree of bonding vs. equity funding, level debt structure vs. balloon
payments) of several financial planning scenarios to determine whether the selected path is
consistent with the utility's goals and objectives.
• Adequate outreach to all segments of the customer base regarding proposed rate increases or
changes in the rate and fee structures has been performed.
Boards understand the value proposition in the utility's overall planning process. Instead of just
performing a standard rate or revenue requirements study, utility systems are increasingly deciding
to conduct strategic or business planning studies that consider the merits of expanding or contracting
the activities that are conducted by the utility.
Customers and other stakeholders are increasingly sophisticated in their attention and interest in
water rate and financial considerations. To obtain support for rates and charges that support the
capital and operating funds required to reduce risks, utilities need to demonstrate to their customers
that:
• Proposed rates and charges are fairly divided among the system's customers and customer
classes.
• Rates and charges are affordable in light of income within the community and in comparison
with rates and charges in neighboring communities.
• Proposed spending by the utility is justified.
For additional information on water rates, see the 2004 AWWA Water Utility Council-sponsored
study titled, "Avoiding Rate Shock: Making the Case for Water Rates."
2.5 Human Resources
Just as employees are critical to the successful operation of a water system, they are also critical to
ensuring a secure water utility. Employees are "insiders"; they have unique knowledge of the water
system's infrastructure, processes, and vulnerabilities. They are authorized to access both facilities
and information; if that access is used with malicious intent, the results could be catastrophic.
Consequently, water utility managers are taking measures to mitigate the risks posed by new,
existing, and former employees.
Numerous federal, state, and local laws pertain to employee rights and the employer-employee
relationship. These laws determine the security measures that water utility managers can and cannot
take when employees are involved. In addition, bargaining unit agreements will undoubtedly
address employer-employee relations and may restrict the employer's use of otherwise lawful
2-8
-------
management considerations for optimizing physical security
security measures. It is imperative that a utility's legal counsel be consulted before any security
measures involving employees are implemented, including those discussed in this document.
Employees can provide a vital role in ensuring that the water system is kept secure thorough
heightened awareness and adherence to policies and procedures. To gain employee buy-in, consider
beginning with security awareness training for all employees as part of new employee orientation.
This training can provide an overview of the vulnerabilities faced by water utilities and the threats
that must be protected against. Employees can receive an explanation of new and proposed security
policies and be instructed on how they can assist in reducing security risks.
To integrate security concepts into the organizational culture, utility management can emphasize
security in its actions and communications. Some suggestions include:
• Discuss security with the staff during formal and informal meetings.
• Make security an agenda item at every staff meeting.
• Provide employees with adequate security training (see Section 2.5.6, "Training").
• Develop security policies and procedures and enforce them consistently and equitably.
• Include initial and recurring background investigations and quarterly employee reviews in
addition to annual performance reviews.
• Consider creating a position of utility security officer, or expand the responsibilities and
authority of an existing position (e.g., the safety officer).
• Give the individual(s) assigned responsibility for security the appropriate authority to correct
shortcomings and take necessary actions.
• Include articles on security in internal newsletters.
The approach to integrating security into the culture of the utility is similar to the process used to
integrate worker safety into all aspects of utility operations. While employees do not become security
guards (security guards are outside hires best suited for a temporary situation), full-time, permanent
employees offer the knowledge and awareness capability to detect, discern, and deny an outsider
from causing an emergency situation within the utility.
2.5.1 Background Checks
Utilities may want to consider adopting a practice of conducting basic background checks of
applicants for utility positions. Typically, such background checks can include confirming past
employment, education, professional certifications, and references, as well as any facts available
through public records. Advertisements and notices for positions should include a statement that
background checks are required, and applications for employment should include a waiver whereby
the applicant allows the background check and also authorizes the applicant's former employers to
speak with the utility. Background checks should be completed before job offers are made, or job
offers should be contingent on a background check. If lawful and if consistent with bargaining unit
agreements, background checks with periodic reviews should also be conducted for current
employees.
2-9
-------
management considerations for optimizing physical security
Consideration should also be given to expanding the background check to include criminal and other
records such as driver's license, worker's compensation, military service, credit history, and possibly
character references. Be aware, however, that there may be significant legal restrictions and liability
associated with enhanced background checks. Whatever level of background check is conducted, it is
imperative that the utility maintains consistency for all applicants or for all who apply for a specific
position.
It should be noted that background checks are sometimes faulty and need to be confirmed through
other channels, if possible. For example, criminal background checks may be incomplete or
erroneous. Local law enforcement agencies may only have criminal records of those persons living or
convicted within their jurisdiction. On the other hand, national databases may not contain
information from cities and counties unless such data was input specifically into the national system.
Similarly, credit records may be incomplete or inaccurate.
A more thorough discussion on the subject of background checks is contained in the AMSA
publication entitled, "Legal Issues in a Time of Crisis Checklist."^
2.5.2 Identification Badges
Depending on the size of the utility operation, the use of employee identification (ID) badges may be
considered. If so, the following paragraphs provide important areas to consider. If employee badges
are not used, employees still need to understand and act on the presence of unauthorized individuals
on utility jurisdictions areas.
Employee ID badges provide instant verification of whether individuals are authorized to be at a
utility's facility or to handle utility equipment. Color-coded badges can be used to alert others if
employees are in an inappropriate area and can deter employees from straying into restricted areas.
ID badges can contain an up-to-date color photo of the employee, along with a date of expiration.
Both the photo and date of expiration, and color code if used, should be visible from a distance of
several feet. Renewal of ID badges may occur at a period not to exceed 2 years from the date of issue.
The badges may contain security features such as holograms, watermarks, as well as magnetic strips
or radio frequency identification (RFID) devices that permit access to designated areas and track
locations of employees.
All employees, including temporary and part-time employees, interns, and volunteers, should be
issued ID badges and be required to wear them in plain sight. Employees who forget their badges or
who are visiting other utility locations should be issued temporary ID badges. Such badges should, at
a minimum, be time-sensitive or light-sensitive so that the "age" of the badge is visibly apparent. In
addition, or as an alternative, authorized personnel may escort employees visiting locations outside
of their authorized areas.
Association of Metropolitan Sewerage Agencies. 2002. Protecting Wastewater Infrastructure Assets... Legal Issues in a Time of Crisis
Checklist.
2-10
-------
management considerations for optimizing physical security
Removal and storage of employee badges when outside of the work areas should be a regular
practice, as well as when in public areas away from work. In terms of security, security badges
should not be visible to others who may want to copy the design.
2.5.3 Employee Surveillance
Employee surveillance serves two purposes: to enhance employee safety and to monitor potential
insider threats. While surveilling employees may seem to indicate that utilities' do not trust their
employees, this topic is included because the focus of this guidance is the increased security of
utilities and their assets.
Monitoring of employee activities at their workplace may be subject to federal and state privacy laws.
In general, however, it is acceptable to routinely monitor employee use of electronic media, such as e--
mail and Internet surfing. Depending on the size of the utility operation, the use of closed-circuit
television (CCTV) or other forms of video monitoring may be implemented. Monitoring of employees
through CCTV cameras is also typically acceptable, as long as the cameras are visible to employees.
One important prerequisite of employee surveillance is notifying employees that they are being
monitored; otherwise, the employees may have a reasonable expectation of privacy in their work
area, and the utility may face legal challenges to information obtained in this way.
Some utilities have taken a simpler approach and implemented a buddy system for entry into critical
facilities. However, to make this system effective, some type of recognition hardware needs to be in
place, such as cameras or access card readers.
2.5.4 Employee Response
Effective reaction to, and recovery from, malevolent or natural events depends upon a rapid and
thorough response by a knowledgeable and experienced workforce. Utility management should
develop policies and contingency plans to address problems that employees may have traveling to
utility sites and facilities during and after an incident. Additionally, management should be aware
that employees may decide to remain at home with their families or evacuate from the vicinity if a
disaster should occur, thereby leaving the utility without needed labor and expertise. Utility
management may want to consider developing a family shelter/evacuation plan that will provide
employees a level of confidence that their families are safe while they respond to their duties at the
utility. Human resource policies should address what will be considered an acceptable excuse for not
responding to work during an incident, or even if a severe malevolent act advisory is declared, and
what action should be taken for non-excused absences. It is important to note that such policies
should be determined with a thorough understanding of the utility's legal responsibilities governing
employee leave, including relief allowed employees under the Americans with Disabilities Act.
While many of these issues can be addressed in company human resources policies and procedures,
they can be repeated in the ERP, as discussed in Section 7, "Emergency Response Planning."
2-11
-------
management considerations for optimizing physical security
2.5.5 Contractors
It is important that utility managers consider not only their own employees as a potential insider
threat, but also contractors who may have access to utility facilities and information at any given
time. Venders, delivery personnel, service providers and outside utility representatives can also be
considered potential insider threats.
Suggested contractor security procedures include:
• Establishing good sign-in and sign-out procedures (e.g., requiring a photo ID that matches the
individual and his or her signature) and limiting access to sensitive areas (such as chemical areas
and SCAD A controls).
• Requiring visitors to sign in and wear a visitor badge so contractor employees are easily
identified. All visitors and badges should be accounted for at the end of the day.
• Requiring escorts if physical barriers are not present.
• Limiting use of private vehicles at the utility's sites.
• Remote read meters could be installed to limit some outside access, and deliveries can often be
made to other locations not located near sensitive or critical operational areas.
• Evaluating the environmental, health, and safety record of contractors before signing contracts;
considering offering environmental health and safety training to contractors onsite.
• Performing background checks on contractor personnel assigned to project sites. While this is a
sometimes difficult activity, it could be considered depending on the situation.
In addition, for construction contractors the following could be considered:
• Locking construction gates at end of the day and when not in use; using interlocking padlocks
with utility locks.
• Evaluating potential misuse of heavy equipment and taking appropriate measures.
• Considering ways of securing heavy equipment each night.
• Considering additional fencing and separate entrance, separate parking areas, and guards to
coordinate construction staff.
2.5.6 Training
To ensure that a security program is effective, the staff can be trained in many aspects of security and
emergency response. With improved security actions comes a new culture for water professionals.
This section discusses types of training and training resources important for utility staff.
2.5.6.1 Types of Training Sessions
Utilities can make their own determinations regarding the variety and level of detail relevant to their
situations. Initial and recurring training sessions can also be scheduled to reduce impacts to
operational budgets.
2-12
-------
management considerations for optimizing physical security
Table 2-1 lists training relevant categories that may be applicable to a complete spectrum of water
utility personnel. If a particular training is more important for one group of personnel, that group is
listed in the Notes column.
The main training type categories, as listed vertically in the first column, are subjects to which all
utility employees should be introduced. The specific areas, and the length and breadth of the training
may vary depending on size and scope of utility operations, and should be tailored to each situation.
Depending on budgets and schedules, a timetable should be established to have everyone reach basic
comprehension of the categories listed. Once achieved, further training, certifications or proficiency
levels, joint exercises, and the like can be planned on a more periodic basis.
2.5.6.2 Location of Training Exercises
Many state and local resources are available to conduct, and sometimes fund, training for utility staff.
When considering training, it is a good idea to check with city and county administration, police
departments, fire departments, local emergency planning agencies, local health departments, and the
Red Cross to inquire about available training. Nearby utilities may want to participate in training
sessions and contribute funding.
2.5.6.3 Staff Motivation
Staff often complain about attending training sessions, especially when their daily jobs are busy.
There are several incentives to help motivate staff to attend training:
• Provide certification toward professional development hours
• Require training as part of employee evaluations
• Further career goals/personal development
Providing lunch or snacks during a training session can also help to make the day more efficient and
enjoyable.
2.5.6.4 Cross-training
Training staff members in skills outside of their normal duties may be prudent so that multiple staff
members can perform needed tasks in times of emergency. For example, operators should
understand basic maintenance of pumps, motors, and electrical components. Likewise, maintenance
workers should understand the basics of treatment plant operations. A cross-training program
should involve treatment plant workers spending time with and learning the skills of distribution
system workers, as well as gaining knowledge of the raw water input system. A cross-training
program also provides a more flexible workforce that will not only improve response during an
emergency situation, but will also allow for improved efficiencies during normal operations.
Planning for a cross-training program may need to involve the utility's bargaining unit and human
resource professionals.
2-13
-------
I
Q3
0
CO
1
Relevant for Wate
0)
'cE
'2
lergency Response Ti
t
1 1 1
-a
c
ra
;t±
O
O3
V ***
<* "o
"j CO
-r 03
m Q.
i— I—
_^_
'o
z
en
'c
'ra
£
09
'5
0
0
09
1
o
CO
03
DC
e
o
jo.
o
IE
09
C
o>
m
03
M
O
B.
I
09
a.
£•
O)
^
c
s
1 —
i
to
"ra
E
•2
03
E
•c
si
O CO
"o o
Q_ 0
•t co 5
Provides the means to identify potential seci
concerns on a daily basis. This may include
information on physical and cyber security, <.
well as suspicious persons. The course also
reviews basic security procedures in use by 1
utility.
-o
" ra
CO 01 S
oES
V DQ CO
Facilitates a security
culture at the utility.
operating procedure
foreground.
•& -=
•;= « .
ZJ 03 "
0 c= P
To provide staff with se
awareness basics and
familiarize staff with gei
utility security procedui
-o "H
™ "i 2
to ra z3
£ 01 "
ra c= 2
g -o Q.
'§ cB 2
0 ~C3 03
CD CZ O.
CO ^ O
CO .^
o 9J.-2,
r & i.
0 « ]c
a. -o .•=
E = S
-&• 2 t?
"ra CD zz
C3 ra ra
99 G" ••"
°- TO 3
CO J^ "t±
LJJ E .E
j_r
ra "CD
CO O
o L~
"cz" OT
O3 o
E — ^
"C o
a. CD
03 CC
Q _
s|
O =3
Q_ 31
CO
E 03 .2
Provides background in understanding hums
behaviors; teaches various methods to handl
upset customers; practices techniques in var
situations.
co~
ra
co en S
03 CZ ^
§3 f «
S. .E « S S co
co cz" ^ E"E "S
Minimizes complain!
customer satisfactio
positive customer re
minimizes internal ei
encourages consists
documentation proo
03
E. o
0 E
To assist the public in a
and effective manner; t<
effectively manage
employees.
•o
CD
CZ
E
O)
CO
Q
_cp
cz
ra
° "M.
5 o
O CD
I CL.
51
CD
CZ 03
-o E
CD 03
o ra
> 0
CO Ol
>% "^
p" S"
LU £
^
ra
±±
CO
o
O
i_-
o
p
o
0
o
f
*ra
CO
Includes a walk-through of sections; reviews
location of information.
CZ
CD
e
CD
E
CD
CZ
Enhances efficiency
response.
CD
.cz
To familiarize staff with
plan.
c
cZ
03
CO
CD o
— Q.
CO
O) CD
E nr
"S ^.
"en Q3
v2 CJ>
CD *—
-a ^
cz E
^ LLJ
CJ
03
O)
^ 1
11
| 0
CO O>
CD CZ
H^
-2 o
ifi £
03" >*
o o
"o as
Q_ 01
4-T
S J2
E g
t; a.
SCO
CD
SOC
>,
0> 0
i— CZ
"- oi
=" £
S E
co "ro
83
Presents a scenario with key players
participating. Advances participants through
scenarios; lessons learned are presented.
CO
CO -0
CD c
II
O '£1
CD ra
» 8
Increases efficiency,
and interagency coo
coordination.
CO
CO
CD O3
S 8
To familiarize staff with
emergency response pr
and participants.
CO
CD
2* CO
CD =
UJ *^->
8-1
» i.
_f*i CO
7fl 03
(— cc
o"
CD
O)
^ E
CO O3
> £-
o ra
> 0
CO C3)
03 CZ
II
.2 0
0. Q.
F— co
II
O 03
•i-T
CD £?
E g
t; a.
ra co
o_ 03
03 CC
Q >,
CD °
l— CZ
"- 01
S E
_ UJ
co ra
CZ fj)
0 0
O —J
s
Presents a scenario where the key players ar
located at their respective agency locations
during a mock emergency. Lessons learned i
presented.
co"
CO -0
O3 £Z
II
*£ g_
Increases efficiency,
and interagency coo
coordination.
cz
"O
cz 01
ra cz
To enhance knowledge
capabilities needed duri
emergency response.
&
c
CD
^ CO
CD —
CZ •>-
LLJ ^
-S Lo
P 1
CO
LL CC
T3
1 i
> <£
CO 03
in 03 cz
CD g. 03
-— O t—
C3 Q- ra
03 CZ 0
Q . _ O)
|ra c ~
0 o3 Q.
co z: 03
03 CT *-
Cu 2? .E
1
o
o.
CO
cc
o1
c
O)
CD
UJ
8
O
CD CZ
s a
CO <
O)
_CZ Q3
Includes modules designed to start with the
basic structure of ICS and progress to becon
an Incident Commander and understanding t
responsibilities associated with that position
cz
CO ™
c t c
*— ra
0 0.
01 |0
"O nj
Enhances understan
allowing for future p
emergency.
CO g;
o 'i "P
To teach the principles
and to become familiar
the structure and termii
E
CO
CO
^
ro
E
E
o
O
CD
~ co"
cz S=5
CD
ez
0
cz
CO
03 =
O =
> 2
-S §
o •*—
5 s
*o3 °
O3 CD
CO CL
^
CO
cz
ra
CO
o
O
co"
CO
0 ,_
oS
-o g
ll
O3 O
-£Z O
1- 0
oc
S Q_
Teaches basic first aid to provide initial care
an injured person.
Teaches the steps to baby, child, and adult C
cz
03
CO P?
g s
CO ^
8.1
o P"
Enables assistance f
injured prior to emei
CD
To provide care to anot
person.
j>,
ra
cz
o
fz
Cu Q-
.2 — •
ra .2
11
,
O3
CO
•JQ"
I
CO
CZ
0 >_
o o
-§ ^
cz o
CD O
> 0
CO
o *-:
Provides background on how the machine w
and a skills test on how to use the equipmen
CO
T3
M
Prevents potential hi
CO
g
"ra
To understand the oper
and limits of a machine
CD
CO
ID
CD
E
a.
"z:
cr
UJ
fZ
•c
a
CD
Q
03
LL.
CO CD
m Z-
Teaches the parts to an extinguisher and typi
of extinguishers; practice using an extinguist
on a fire.
CO
Eliminates small fire
S
ra
To effectively use a fire
extinguisher and associ
types with the proper
extinguisher.
CD
CO
c
"x
LLJ
03
LlZ
1
-------
f
I
CL>
C
C
o
g
Relevant for Water Utility P
01
lergency Response Trainir
cz
LLJ
•o
CO
aj
•"H
Z3
O
CD
V w
~ "o
LU
i CO
CD
CO a.
< >;
P {-?
M
|
"B
'co
1—
09
•a
'>
o
£
o
i
9
O
W
a>
CC
B
0
|
U
M
a
*S
B
0)
GO
%
O
a.
1
09
a.
>•
1—
at
_e
'B
'«o
^
CO CO
2 S
so e
fit
to E =
o re
.•g-lo a.
™ M"CZ
§s|
ffi -3 «
15 « Q?
g ^ S
i_ -^ -a
o -— cz
u_ -a co
<
co
*:"
CO
CO
CZfl
_cz
1
CD
0
o
»z
'o
CD
s the use and maintenance of sp
Ing equipment.
CZ 0
C/l C
tu o
o: E
ll
Enables the utility to know abo
contaminant before it reaches 1
water plant or the distribution
system.
To teach use on-line
monitoring equipment
throughout the water
systems.
O)
c
•f—
o
0
2
V. -i
2 5
M ^
ll
O TO
0 CD ^
CO ^ 0
S i" «
S^ •— D)
£3 w Jr:
d ^ OJ
225
&
S
S1
^t
0>
c
C "£±
If
^
&a
PS
03 <"
S .r=
E LU.
_ CD
8^
S£
O>
El
CO =>
- CD
CO CJ
s the operations, channels, code
maintenance of the radio; practi
"CZ CO O
CO CD '-0
E £ Q
o_ CD TO
N
X
Ensures effective use of a 800
radio, which police and fire
departments use.
To teach the capabilities and
operations of a 800 MHz
radio.
N
X
fi
CD
.c:
o>
5.1
e—t "O
0 «
§ DC
|
S£
0
1
^
o
o
o
f
C/3
«
.C
^** CO
«- 03
CZ CO
;es the various types of equipme
g., breathing apparatus), their u
ties, and limitations.
1*1
CO .^ S.
^ X co
CD co o
CD
CO
Prevents a hazard event from
occurring by knowing how to i
safety equipment properly.
To learn about other types of
safety equipment, and
company and Occupational
Health and Safety
Administration (OSHA) laws.
>.
-t-? *->
03 C
S S
CO t
i_ Q-
« '5
S O"
0 LiJ
|
1
H
^
I
03 CO
i ."
o >-
§ s
CD £2
Q. E
4-- &
III
03 t
01 CO 01
CO o. CZ
m ^ '=
4? Q cz
if m S
g-uT1^
s^i"
rT) rf c
E?§ 03
CO ^ 01 „
E hH co ^
S & S S
UU C^ (g
>l LU ^-
CO Jj ZJ
03 CZ CO CO
-D CD 0 CZ
03 01 0 0
LL! < _l O
- o>
•*— ' Cf5 rvi
TO CM d-
£ 03 0 £ -2
sE£r.o-o:2.o3
HAZWOPER training requiremen
i conducted in accordance with "
Federal Regulations, Part 1910.
10.120). This training is requirec
lel who handle, ship, or dispose
ius materials, or who are assigm
ncy response teams for hazardo
Is. Both initial and annual refresi
is required.
^Soo>|°s«;
^zi"5frt0.;S22'co-=i
^ ^ O U— Q3 CO C r— {^
ii: E o o Q-.C » E i=
a
Fulfills federal regulations and
prevents hazards from occurril
O)
c
§•&
ia
1-Sa
'E 53 =
111
g „ £
ill
8-e I
-° s-o
o e6 c
J— -C CO
GO
-3
o -o -5T
^ CO CZ
5 » S
lit
i- "j~; *
"co CC
£8-1
O ° cB
^ OJ O)
S to 03
< 5 E
n: 5 LU
i—
*£
CO
0
is
=3 1-1
ct to critical f
lency operatii
•= e*
to w
03 E
CC CD
"c
B
1
g
i
1
c
o
go
•o
c
CO
s background information and h
to operate critical facilities.
03 O»
^ .E
> ^
£ S
I
Provides backup knowledge in
operation of critical facilities.
To familiarize employees witl
job responsibilities outside
their areas of responsibility.
cz
I
f^
1
o
0
r?
< -1
if
-53 S1 cz <
iMi
Ills
^^ 03
^ cz so S
CO « 5 f
CO -— 03 1
ll g$i
So > c O co
i > 1 •<=> -g
5 .E ^ ii 5
fel
£•£ ?
e°3 §,
1.3 g
i£ tS g £
-W-S d,
i« E?.i
S ° Z3 =
HH E ^zi 'to
e US
« « g S
2 cz E S
£_S£_£
O)
'E
s a concentrated emergency trai
ice.
co 53
"0 •*
> CD
O O.
>- X
LL O3
S
Improves coordination during ;
emergency.
>» o>
To provide general emergenc
management courses offeree
on the FEMA Emergency
Management Institute trainin
campus.
O)
& =
CZ 'r«
if
E?!3
22 cz
E 03
uu E
— - 03
2 O)
03 CO
CD S
e
.8
a
O)
CU
i
S
•a
c
o ^^~
Q. O3
CD C=
•- o
•K S2
E: aa
Li_ a.
1
J
=3
»
C
O
o
if
i
O)
c
"2
1
o
01 - 03-
~ « S
CZ ^ CO
s a tour and brief classroom trai
to the utility's system componei
conditions, chemicals stored on
ble points, etc.
111!
">•••= E !2
0 CO fc £
£ s § ?
01
Increases communication and
decreases response time durin
emergencies.
To familiarize emergency
personnel (e.g., police, fire)
with utility facilities
O 03
•*- cz
EZ CZ
0 0
~ co
75 *—
X O3
-S Q-
^3
e &
^ c
^ 5
S? -
.•S CD
5 E
5 uu
-------
management considerations for optimizing physical security
2.6 Records Management
It is critical that utilities have policies in place that specify the documents that are sensitive, and that
the utilities manage their documents and records so that sensitive documents remain in a secure
environment. These actions are needed to prevent sensitive documents from being accidentally
released to the public, for example, in response to a FOIA request. Utilities should consider
developing levels of document security ranging from non-sensitive (available to the public without
restriction) to highly sensitive (available only to limited staff and maintained in a highly secure
environment). Examples of records and material that should be considered as sensitive include:
• Vulnerability assessments, including supporting documents and files
• Emergency response plans and disaster recovery plans
• Audit records related to security
• Security and emergency response training materials
• Plans and specifications for security systems
• Plans and specifications that show the locations of critical assets and security equipment
• Current and historical operating records
Suggested policies for consideration for securing sensitive documents include:
• Providing access to sensitive project materials to authorized staff only.
• Keeping all hardcopies of sensitive material in a locked metal file cabinets to which only
authorized project team members have access. Containers with locking bars could be used that
are similar to those specified by the federal General Services Administration (GSA) - minimum
Class 5 security containers. (See GSA specification AA-F-363D for more information regarding
these cabinets.)
• Shredding all discarded working copies and maintaining only the minimum number of hard
copies required. Shredding should take place onsite, and should not be contracted to an
outside vendor.
• Maintaining all electronic copies of sensitive material on a password-protected secure server.
Only authorized staff will be given access to this material. (See Section 5, "Cyber Security
Management, Operations, and Design Considerations," for additional information regarding
precautions that can be taken to prevent unauthorized access of electronically stored documents.)
• Attaching a confidentiality clause to all sensitive documents given to authorized outside agencies
and organizations. This clause can declare that these documents should not be reproduced nor
given to others without authorization. The confidentiality clause should be present on all pages
of a document, not just the covers.
• Prior to distributing sensitive documents, verify the identification of the recipient and determine
whether the need for the document is valid.
2-16
-------
management considerations for optimizing physical security
• Requiring individuals from outside agencies and organizations who are given access to
documents to sign confidentiality agreements.
• Preventing transmission of sensitive material electronically (such as via e-mail and downloading
from servers).
• Including a confidentiality notice with electronic correspondence, such as:
Confidentiality Notice: This e-mail and any files transmitted with it are confidential and
intended for the sole use of the individual(s) to whom they are addressed. If you have received
this e-mail in error, please delete the original message from your system and destroy any
copies.
Utilities should consider how information about their facilities is distributed to potential contractors,
consultants, and other outside agencies and organizations. Plans, maps, and specifications can serve
as roadmaps and planning tools for malevolent actions. To control documents circulated to
contractors, all bid documents can be distributed on a CD-ROM (that cannot be duplicated).
Requiring a deposit for the CD-ROM can also provide an incentive for unsuccessful bidders to return
the documents, which can be destroyed at that time.
Project materials are to be kept confidential at all times on consultant and contractor projects. To keep
these materials confidential, a clear project chain of command is identified and followed rigorously so
that information is exchanged only as specified. Second, all electronic project working files are
isolated in a secure, encrypted project library with access provided only to authorized users with
appropriate levels of password protection. Also, periodic security surveys are conducted to
determine whether staff, outside agencies, and consultants are following the security procedures.
Because public agencies are subject to state and federal FOIA requests, it is important to have
established measures to prevent sensitive documents such as vulnerability assessments or security
plans from being subject to public requests. An exemption for security-related information was
added to the federal FOIA law and was included in the Public Health Security and Bioterrorism
Response Act of 2002, which required community drinking water systems to conduct vulnerability
assessments. Because state laws are generally not superseded or limited by federal law, utilities in
some states cannot rely on the federal FOIA exemption to protect sensitive information. As such,
many states have also included special provisions in their FOIA laws to exempt security-related
information. Find out what your state's rules are by consulting your state agency. For a summary of
security-related FOIA exemptions, see "Protecting Water System Security Information" by the
National Conference of State Legislatures (2003) or "State FOIA Laws: A Guide to Protecting
Sensitive Water Security Information" by the AMWA.
Computerized Maintenance Management Systems (CMMSs) and SCADA systems, when fully
integrated, offer database compilation of considerable amounts of data pertinent to water system
operations. This data, along with the other documents listed at the beginning of this section, contain
important information regarding the utility that can be useful in both normal or emergency operating
2-17
-------
management considerations for optimizing physical security
conditions. Electronic databases offer benefits such as automatic backups and other security controls;
the policies and practices for managing electronic data should be comparable to those managing the
security of business files and other paper documents.
2.7 Policies and Procedures
Simple and effective changes to a utility's policies and procedures can often have just as great an
impact on risk reduction as capital improvements or installation of security devices. Policy and
procedure changes are generally quick to implement and low in cost, making them an extremely
effective way to improve utility security. The key to the success of any change is to make sure that the
staff understands and accepts the new policies and procedures. It is imperative that the staff is well
informed of the policies and procedures and the reason that these are important. Policies and
procedures can only be effective when they are consistently implemented. Some general policy and
procedural recommendations provided below.
2.7.1 Basic
• Track keys issued to personnel.
• Retrieve keys when no longer needed, including those instances when personnel are reassigned.
• Replace locks on an as-needed basis to reduce the likelihood of security breaches due to lost keys,
unauthorized duplicate keys, keys held by former employees, etc.
• Replace of the traditional key systems with a card reader system for better control options.
• Implement random, but frequent, inspections of the security perimeter at critical facilities
identified in the vulnerability assessment and designating appropriate review intervals for
inspections of security equipment at other facilities. Establish a minimum number of personnel in
the inspection crew in procedures, safety plans, etc.
• Implement a formal annual review of the adequacy of security plans, procedures, and equipment.
• Involve and cooperate with other organizations that can affect the utility's security. For example,
contact chlorine and other chemical suppliers to discuss the need for adequate security during
transport as well as to develop protocols to respond to missing or delayed shipments.
• Maintain replacement parts and emergency repair kits for critical assets, such as generators, that
are important during emergencies. Maintain redundant equipment, critical replacement parts,
etc. in a separate or isolated location. It can be on site or nearby, but not within the same building
or room.
• Develop a utility vehicle use policy (including locking vehicles and tool bins, securing tools, etc).
• Establish procedures for night shift workers at treatment facilities, including regular check-ins
with supervisors.
2-18
-------
management considerations for optimizing physical security
• Establishing published guidelines so that all future procurements and designs address security
issues and incorporate solutions. All requests for proposals should include a security portion so
that responding consultants are reminded that security must be addressed in their work and in
their own operational practices.
• Continuing to monitor the visitor entrance. Establish a policy for facility tours delineating who is
authorized to approve access, areas that can be accessed, and the times that tours are allowed.
• Establish and implement a system of chemical receipt checks as both a safety and security
measure. Detailed information on topics such as purchasing, pre-unloading verification,
sampling, and testing can be found in the September 2001 issue of Journal AWWA in the article
titled, "Improved Chemical Handling Procedures."
•
2.7.2 Advanced
• Compartmentalizing access to various parts of the water system so only necessary personnel are
granted access to specific areas. For example, limit access to SCADA cabinets to appropriate
personnel.
• Placing alarms at remote facilities into a non-alarm mode for temporary access when authorized
entry is made. This temporary mode will automatically revert to a secure mode after a preset
time.
Program this feature into card-key access systems.
Require call-in to alarm station prior to entry for facilities without card-key access.
• Supporting citizen crime-watch committees in areas around utility facilities.
• Establishing a maintenance program to keep alarm equipment, hardware, and fence lines
properly maintained. Maintenance of all security equipment, including physical systems such as
fences, is a vital part of the security of the water system. Dedicate required resources for proper
oversight of the security systems and maintenance program.
• Establishing distribution system contingency plans. Utilities can consider the use of distribution
system modeling for emergency response to isolate the distribution system and flush and contain
the contamination.
• Maintaining security incident, alarm, and audit logs.
• Ensuring that generators are exercised regularly under realistic loading scenarios so that their
reliability is ensured in an emergency.
The following is a list of general policy and procedural recommendations specifically for laboratory
facilities:
• Secure laboratory reagents and limit access only to authorized personnel.
2-19
-------
management considerations for optimizing physical security
• Continue to create and maintain an inventory of reagents kept at the laboratory. Such an
inventory would alert the plant manager if someone is buying dangerous chemicals (e.g., metals,
cyanide, etc.) each week for a few months and accumulating a large enough quantity to cause
serious problems at the plant.
• The laboratory manager should perform random checks to catch unusual patterns of excessive
purchase of dangerous chemicals. Currently, scientific chemical suppliers do not have limits on
quantities that can be ordered. The laboratory manager should arrange with the suppliers to limit
the amount of chemicals that can be ordered at one time. Also, the plant manager should arrange
with the chemical vendors to ship only those orders requested by authorized staff.
2.7.3 Suggested Policies
The following checklist can be used as a starting point for developing policies to address security at
the utility:
• Human Resource Policies
- Who is subject to background checks and what checks are made
Requirements for employee identification, including badging
- Protocol for contacting off-duty and on-call employees for emergency response
Management succession
• Training Policies
- Definition of appropriate training
- System of selecting staff for training
Cross-training goals
• Vehicle and Heavy Equipment Policies
Definition of authorized use, especially in emergency situations
- Circumstances under which vehicles and equipment can be taken home
- How and where vehicles and equipment are to be parked or stored
Requirements for locking vehicles and securing equipment
• Facility Access Policies
Key, card key, and lock control
Limiting access to facilities or portions of facilities by security level
Handling of visitors, tour groups, vendors and deliveries, chemicals, construction materials,
packages, mail
Construction site security
Alarm and CCTV monitoring protocols
Guard service
2-20
-------
management considerations for optimizing physical security
• Information Access Policies
SCADA
Management information system, facilities information system, laboratory information
management system, computerized maintenance management system), etc.
User name assignment and password protection
Internet and intranet use
• Records Management Policies
Storage and retrieval of documents
Archiving and long-term storage
Employee access to FOIA-exempt documents
Clear-desk and clear-screen issues
Bid plans and specifications
• Materials Management Policies
Responsibilities and authorities
Inventory frequency
Emergency purchasing authorization
2.8 Procurement
For the most efficient response and recovery to an emergency, utilities may want to be familiar with
both standard and emergency procurement procedures.
2.8.1 Emergency Procurement
To undertake rapid and effective response to and recovery from catastrophic events, it is imperative
for the staff of a water utility under specific circumstances to be able to procure supplies, materials,
and services quickly and outside the normal procurement process. Utility managers should
familiarize themselves with existing procurement policies to determine whether provisions exist for
emergency procurement and, if necessary, proceed with instituting changes that may be needed to
address malevolent acts in addition to the natural threats typically covered by procurement
regulations.
Emergency procurement of supplies, equipment, materials, even contract labor, are part of and
should be detailed in the ERP issued by a utility to ensure business and operational continuity.
Section 7, "Emergency Response Planning," contains additional discussion on ERPs.
Most water utilities have, or are covered by, policies of their parent governments that address
emergency procurement; however, these existing policies may not provide the flexibility needed to
effectively respond to the types of incidents that utilities may be facing today. Many procurement
policies allow for emergency purchases of materials and supplies, and possibly services, through an
abbreviated procedure that usually postpones the need for the highest level of approval typically
required for purchases. For example, approval of a purchase or an award of a contract that normally
2-21
-------
management considerations for optimizing physical security
requires governing board approval may be authorized by a utility staff member and brought to the
board for an "after-the-fact" approval once the emergency is over and with the expectation that
sufficient justification for the procurement action is required.
Procurement policies may require the declaration of an emergency by an elected official or the
highest level of the organization before the standard procurement steps can be waived. Other
procurement policies may delegate the authority to make an emergency purchase to a department
manager if that manager can justify that the purchase is necessary to immediately protect life, health,
and safety that would otherwise be jeopardized if the normal procurement procedures were
followed.
While most emergency procurement provisions have met the needs of water utilities over the years,
the malevolent acts now being faced create some new challenges that existing procurement policies
may not be able to meet. For example, an event may result in injuries, fatalities, and interruptions in
both communications and power. It may be impossible for local authorities to declare an emergency
condition, or if declared, utility staff may not receive the declaration in a timely manner. Similarly,
approval of an emergency procurement by a high-level official may not be possible within the
timeframe necessary to react to a life-threatening condition.
Consequently, procurement policies should address emergency purchases that may be necessary
under extreme conditions where high-level approvals may not be achievable and where
communication networks are out of service. The following provisions should be considered for
inclusion in a utility's procurement policy:
• Allow for the procurement of construction services, engineering services, and personnel services
in addition to the purchase of materials, equipment, and supplies.
• Permit emergency procurement to protect imminent harm to the environment and property and
maintain water service in addition to the protection of life, health, and safety.
• Authorize emergency procurement to protect "employees" in addition to the "public" to avoid
ambiguity.
• Eliminate the requirement of an official outside of the utility to declare an emergency as a
prerequisite to invoking emergency procurement procedures, and provide a chain of decision-
makers authorized to approve emergency purchases. For example, if the Utility Director is
unavailable or unreachable, the Water Operations Manager can give approval; if both are
unavailable or unreachable, the Maintenance Superintendent may give the approval.
• Authorize approval of emergency procurement to management and supervisory personnel at
different locations (facilities) throughout the utility.
• Provide for an automatic waiver of standard procurement procedures should a certain level of
threat be declared for the utility's location by a government agency (e.g., DHS raises the Threat
Advisory to "red").
• Include the need to strive for integrity and fairness in the procurement process, even during
emergency situations.
2-22
-------
management considerations for optimizing physical security
• In addition to making emergency procurement procedures more attuned to the threats faced by
water utilities, leverage other procurement methods to provide flexibility to prepare for, react to,
and recover from disasters. On-call contracts are an effective method to acquire materials or
services as needed without having to go through multiple procurements or invoking emergency
purchasing procedures. On-call contracts are procured through normal procedures at annual,
biennial, or even 5-year intervals.
• Have contractors and suppliers bid on a "basket" of items or services developed by the utility.
More than one contractor or supplier can be selected for the same items or services to allow the
greatest flexibility to the utility when the need arises. On-call contracts should require availability
of service 24 hours a day, 7 days a week, every day of the year. In selecting a contractor or
supplier, balance the need for a quick response that is better met by a company in proximity to
the utility with the fact that being in proximity may mean that a company may not be able to
respond if a regional catastrophe occurred.
• Use existing contractors to provide immediate availability of equipment and labor to respond to
an emergency. Utilities typically have a number of ongoing construction projects as part of their
CIP and annual maintenance activities. These existing contracts can be successfully used to
quickly bring in construction equipment and expertise to supplement the utilities' workforces.
• Initiate cooperative purchasing agreements to provide increased flexibility for procurement.
Cooperative purchasing allows a utility to procure items and services through contracts that exist
between other organizations (e.g., other utilities, government agencies, industry associations) and
their suppliers and contractors. In most states, municipalities and counties can make purchases
from state contracts, and state and local governments can make information technology
purchases from federal GSA contracts. Utilities may wish to coordinate with other utilities and
local governments in their states and adjacent states and cooperate on developing specifications
and allowing purchases from each other's contracts.
2.8.2 Procurement of Security-related Equipment and Services
Utility managers may be concerned about following standard procedures when procuring
equipment, materials, and services that relate to the security of assets. The requirement of public
advertising for bids on security equipment and projects with detailed plans and specifications may
jeopardize the very security being put into place. While states may enact laws exempting security-
related documents and drawings containing security information from FOIA requests, at least one
state has begun to address this issue of exempting the procurement of security-related materials or
projects from the requirement to publicly advertise and receive formal bids. As shown in Figure 2-2,
the State of Alabama recently did take such action by amending its State Code to exempt security-
related procurements. (Legislative Reference Service of the State of Alabama 2004).
While an exemption from public advertisement and bidding procedures provides a utility the
greatest flexibility, there are other methods that may reduce the risk of exposing a utility's security
strategy in its process of procuring equipment and construction services. Some steps that may be
taken for security-related projects include:
2-23
-------
management considerations for optimizing physical security
Allowing for soliciting of price quotes from vendors and contractors without widespread public
notice.
Pre-qualifying contractors, consultants,
and suppliers and allowing only those
meeting specific criteria to bid on
security-related projects.
Requiring that officers and staff of any
company desiring to do security-related
business with the utility sign
confidentiality agreements.
Allowing viewing of plans and
specifications only within a secure
room instead of distributing plans to
potential bidders or providing access to
a central "plan room."
Dividing projects so that no one bidder
has a complete view of the project.
The Code of Alabama
H39-2-2(g) "In the event of a proposed public works
project acknowledged in writing by the Alabama
Homeland Security Department as (i) having a direct
impact on the security or safety of persons or facilities
and (ii) requiring confidential handling for the
protection of such persons or facilities, contracts may
be let without public advertisement but with the taking
of informal bids otherwise consistent with the
requirement of this title and the requirements of
maintaining confidentiality. Records of bidding and
award shall not be disclosed to the public, and shall
remain confidential."
H41-16-51(a) "....the competitive bidding requirements
of this article shall not apply to: ...(15)Contractual
services and purchases of product related to, or having
an impact upon, security plans, procedures,
assessments, measures, or systems, or the security of
persons, structures, facilities or infrastructures."
Enacted May 2004
FIGURE 2-2
The Code of Alabama
• Considering design-build contracts
where one company is selected to both
design and construct the facilities, or in
the case of security equipment, both develop the specification and be responsible for its
installation.
2.9 Communications
When it comes to safety, security, and emergency response, effective communication is the single-
most important concept that can assist in repair of a problem and restore public confidence. It is also
a concept that is not often initially considered by the technical staff involved in an emergency event.
The benefits of effective communication include increased efficiency, improved coordination to
accomplish a goal, and more available resources, such as equipment and technical knowledge, from
other agencies. Furthermore, communication improves emergency response efforts by decreasing
response times and allowing utilities a sense of confidence based on anticipated assistance from other
agencies. Lastly, effective communication can create a sense of teamwork and camaraderie among
utility personnel and the outside agency personnel who assist them.
2.9.1 Communications Equipment
Many types of radios and phones can be used to communicate with utility employees or with outside
agencies such as the fire department utility management can consider using any of the following
options:
2-24
-------
management considerations for optimizing physical security
• Two-way radios4 are a highly effective means of standard communication between dispatchers
and field vehicles. Extra charged batteries can be carried at all times to prevent loss of contact.
• Cellular phones4 are becoming more popular, especially those with two-way radios built in.
Again, extra batteries and/or a charger should be readily available. Keep in mind that, during
large scale emergencies, cell networks can become overloaded and useless, or the repeater towers
and equipment are off-line.
• 800 MHz radios are used by fire and police departments; a utility is encouraged to have at least
one 800 MHz radio to facilitate communication with first responders. Training is required to
understand how to use this technology and communicate with responders. Training is often
available through local fire, police, or emergency managers.
• Volunteer Amateur (ham) Radio Operators offer an alternate distance communication channel.
Research the capabilities that may be available in your community.
• Government Emergency Telecommunications Service (GETS) Program (http://gets.ncs.gov/)
allows utility staff to obtain a telephone line by dialing an access code during an emergency. This
line can prove very useful in a situation when telephone and cellular phone lines are typically
busy. It is free to sign up and receive calling cards for selected staff. During use, there is a
minimal charge per minute. Utilities must sign up for this service prior to the actual emergency
or need to use the service.
2.9.2 Internal Communication Practices
Internal communication practices are important in preparing, identifying, and responding to security
concerns. Following standardized procedures when communicating with fellow staff during an
emergency is extremely valuable. It allows for efficient responses and decreased conversation time,
both beneficial during an emergency.
Utility management should provide personnel with a clear protocol for reporting security concerns.
This procedure is utility-specific and could simply be a telephone number to the utility manager or a
detailed procedure for notifying security staff or police.
Emergency contact lists are essential for contacting staff after hours for emergencies. Many utilities
maintain on-call schedules, with associated home, cell phone, and pager numbers. Utilities should
ask all personnel required for after hours service to provide an after hours contact number or ask that
they be willing to carry a utility cell phone for communication after hours. Contact lists should be
reviewed at least every 6 months, and updated as necessary. Managers must be aware of privacy
concerns, and they should restrict access to employee personal information to only those with a need
to know.
' Cell phones and two-way radios should not be used during a bomb threat because their signal may set off the bomb.
2-25
-------
management considerations for optimizing physical security
Methods of developing internal communication include holding employee meetings, posting weekly
newsletters, and conducting internal workshops. External activities, such as company picnics and
travel, also promote team building.
2.9.3 External Communication Practices
Prevention and emergency response involve many agencies beyond the water utility.
Communication between the utility and outside assistance is crucial both during planning for and
responding to an emergency. Initiating communication with outside entities should be addressed
during planning phases and should not wait for an actual emergency to begin.
Some benefits of communicating with local emergency service providers, government agencies, and
neighboring utilities include:
• Increased efficiency in daily operations and during an emergency
• Increased available resources
• Increased knowledge base
• Smoother coordination and recovery during an emergency
2.9.4 Public Outreach
Public outreach is required for a utility to develop a successful relationship with those it serves. A
utility may handle security and emergency response in a technically solid manner, but if the public is
not properly informed, then any situation can develop into a disaster.
Under normal conditions, public relation considerations can be necessary when performing day-
to-day operations and maintenance, such as installing physical protection. These considerations
can include:
• Informing citizens of upcoming work effects
• Gaining public acceptance before installing fencing and lighting in neighborhoods
Citizens need to feel that local government officials are listening to them and taking their concerns
into account. Local citizens can be extremely helpful in watching for suspicious activities, as shown in
the Citizens Helping in Police Service (CHIPS) program case study (Figure 2-3). To further consider
this issue, the measure of confidence that the public has in a utility has much to do with how it
communicates during normal times, and not just during emergencies. Maintaining standard methods
and regular instances of providing information to the local community can establish expectations of
current and valid information from the same source during an emergency. Using neighborhood
awareness programs, such as "Neighborhood Watch," can also create a sense of awareness and, thus,
confidence in the utility operations, strategy, and agenda.
During an emergency there are other key points to consider, such as when and how to notify the
public. This emphasizes the importance of a Public Information Officer (PIO).
2-26
-------
management considerations for optimizing physical security
The PIO is prepared to interact with local citizens
and provide appropriate messages from the utility.
It is vital that the person designated to interact with
the public and the media be trained to do so.
Choose this person before an emergency occurs. To
instill confidence during an emergency, use
personnel in uniform when TV cameras are present.
Having planned messages can provide the public
with organized and concise information, also
facilitating public confidence.
Distributing information to the community quickly
is essential. Waiting until all facts are known may
be counter-productive, as news agencies will
provide interpretations into the vacuum of
information not provided by the local government
and utility. Be prompt, frequent, and reliable. A
good article regarding public outreach for review
concerns the Tylenol poisoning crisis from 1982: "The
Tylenol Crisis - How Effective Public Relations Saved
Case Study: CHIPS Program in Kennewick, WA
Citizens Helping in Police Service (CHIPS) is an
organization of Citizen Volunteers that has been
a part of the Kennewick, Washington Police
Department for many years. The CHIPS group is
a formally structured non-profit organization
with elected officers, regular meeting dates,
operational procedures, and designated
uniforms. These citizen volunteers, working
together with common goals, provide a valuable
service to the Department and to the City of
Kennewick. The volunteers participate
in a number of tasks on a regular basis as well
as being an "on-call" group ready to
perform tasks on an "as-needed" basis.
One of the CHIPS projects, named "Operation
Camel," provides a daily physical check of
all water storage/pumping facilities
in the City of Kennewick.
FIGURE 2-3
Case Study: CHIPS Program in Kennewick, WA
Johnson & Johnson," by Tamara Kaplan, Pennsylvania State University
(http://www.personal.psu.edU/users/w/x/wxkll6/tylenol/crisis.html).
2.10 Interagency Coordination
Part of protecting utility infrastructure involves interaction with other agencies. By reaching out to
neighboring utilities, a utility may gain use of equipment and technical resources that lower costs.
Coordination with city or county offices such as emergency management agencies (e.g., Local
Emergency Planning Committees [LEPCs]) and health departments may open doors for existing
equipment, grants, and other assistance that the utility did not previously know existed.
Coordination with other major utilities such as electric and telephone companies prior to an
emergency can also prove beneficial during an emergency event.
• Think regionally and begin quarterly or monthly meetings regarding coordination, emergency
response, and other relevant topics with other utilities in the area.
• Invite police and fire to have a tour of facilities; learn to use their 800 MHz radios.
• Share telephone lists with key outside agencies; minimally, provide a single point of contact for
all agencies that may be involved in a security problem or emergency response action for the
utility to use during an emergency.
• Attend training workshops with other agencies and intermix employees so their primary
interactions are with people outside of their daily work environment.
• Hold emergency response exercises and invite external agencies to attend.
-------
management considerations for optimizing physical security
Prior to an incident, it is important to have mutual aid agreements in place with other utilities and
agencies. These agreements often save time, money, and confusion and should address:
• Interconnection with other water systems, if possible (with established rates and charges)
• Sharing of laboratory facilities and resources (with established rates and charges)
• Borrowing of supplies and materials (with the understanding that the borrowing utility will
replace the materials with like materials after the emergency is over)
• Borrowing of personnel and heavy equipment (with established rates and charges)
Not all interagency coordination should be performed locally because a large-scale disaster may
render local utilities and public works agencies unable to respond. Therefore, some coordination and
agreements should be established with utilities and agencies several hundreds of miles away.
2-28
-------
SECTION 3
Operational Considerations
for Enhancing Physical Security
Introduction
Management:
Optimizing
Physical Security
x
Operations:
Enhancing
Physical Security
Design:
Deveioping
Physical Security
L
Emergency
Response
Planning
Apply operations and maintenance
measures to enhance physical security
- Overall approaches
- Source water
- Raw water conveyance
- Treatment facilities
- Finished water storage and conveyance
- Support services
3.1 Overview
Water managers and operations staff have traditionally considered security to be an enhancement
provided for a limited number of facilities, and have focused on electronic access control systems and
CCTV monitoring. Today, water system managers, engineers, architects, and operations staff not only
consider natural acts and accidents, but also security issues as an integral operational consideration
for all aspects of their water systems that may potentially be threatened by acts of violence, such as
vandalism, crime, sabotage, or terrorism. The objective of this section is to provide guidance that
enables water utility managers, operators, and decision-makers to identify and apply operational
improvements to their systems. The purpose of these improvements will be to increase the safety of
utility facilities and to protect people, information, property, and assets related to the mission and
goals of the utility. That universal mission is to effectively provide water that meets quality and
quantity requirements for the community.
Operational changes often provide some of the more cost-effective approaches for utilities to enhance
the physical security of their systems. This section provides a variety of operational approaches that
water utilities may adopt to improve the security of their above ground and underground
3-1
-------
operational considerations for enhancing physical security
infrastructure and support facilities. It also evaluates the applicability of different operational
approaches to security for the four major threat levels from an outsider—vandals, criminals,
saboteurs, and terrorists —as well as threats posed by an insider. An added benefit to addressing
these threats is the enhanced capability of the water utility to respond to natural disasters and
unanticipated events.
It is important to note that utilities adhering to industry-standard O&M practices contribute to their
security enhancements when the operational measures identified here are included in utility O&M
programs. The sources used in this section include Water Treatment (AWWA1995), Water Transmission
and Distribution (AWWA 1996), Maintaining Distribution System Water Quality (AWWA 1986),
Distribution System Maintenance Techniques (AWWA 1987), Guidance for Management of Distribution
System Operation and Maintenance (Deb et al. 1999), and The Design and Evaluation of Physical Protection
Systems (Mary Lynn Garcia 2001). Other sources are included in the bibliography.
3.2 General Considerations
In addition to operational considerations specific to the various portions of the water system, a
number of general considerations apply to water systems in general.
3.2.1 Philosophy
Physical security through operations should be addressed in a layered approach similar to the design
concept of protection in depth, as described in Section 4.2.4, "Layers of Protection." The layered
approach starts with the outer perimeter of the facility and goes inward to the facility site, the
buildings, structures, other individual assets, and finally to the contents of those buildings,
structures, and assets. Approaching security in this manner allows utilities to incorporate additional
layers of operational security to match the threat that may be associated with specific assets at the
facility.
• The perimeter of the facility typically includes the fence and access gates that surround the site.
The perimeter is considered the first line of the physical security system that, through operational
practices, can be sufficient for basic threats such as poorly equipped vandals and criminals.
• The site is the area between the perimeter and the buildings, structures, and other individual
assets. This area provides a unique opportunity for early identification of an unauthorized
intruder on the site and initiation of early response.
• The buildings and structures within a facility, such as a treatment plant or pump station, provide
the next physical barrier for stopping intruders. The discussion of buildings and structures is
limited to the external features, such as doors, windows, walls, materials, and skylights.
• Building systems refer to the internal features of buildings and other structures that can protect
critical assets or processes from intruders. Examples of these types of features include internal
walls and doors, equipment cages, and redundant equipment.
3-2
-------
operational considerations for enhancing physical security
For these layers to be effective, the proper maintenance of each layer is critical. For example, the
fences and locks have to be maintained properly so that the associated layers can provide the
physical security expected from them. Similarly, the proper security procedures have to be followed
so that unauthorized entry is not permitted as discussed in Section 2.7, "Policies and Procedures."
The proper maintenance of infrastructure and the implementation of procedures are especially
important for the distribution system because there are fewer layers between a potential intruder and
the infrastructure.
3.2.2 General System Operational Practices
Table 3-1 provides general considerations for operational practices for the different layers within a
facility for the key threat levels.
TABLE 3-1
General Considerations for Operational Security at a Water Facility
Threat Type
Perimeter
Site
Building
Building Systems
Vandal
Keep site illuminated
Criminal
Keep gates locked
during non-working
hours
Repair breaks in fence
Ensure all locks are
functioning
In addition to the above: Keep site illuminated
Post guards at
access locations
during non-working
hours
Lock buildings during
non-working hours
Keep windows closed
and locked during non-
working hours
Follow intrusion alarm
response protocol
In addition to the above:
- Restrict access to
building
Supply employee/
visitor ID badges
Employ motion detector
alarms
Saboteur/
Terrorist
Insider
In addition to the above:
- Conduct perimeter
security inspections
Post guards 24/7
In addition to the above:
- Conduct video
monitoring 24/7
In addition to the above:
- Restrict access to
critical areas
In addition to the above:
- Conduct video
monitoring 24/7
Apply dual employee
requirement for critical
areas
3.2.2.1 Basic
Utilities may want to consider the basic general operational practices to improve physical security as
they identify ways in which to make their unique facilities more secure.
• Application of Visitor Control Policy. Visitors to facilities can include a number of different
groups such as employee guests, the public (tour groups), vendors, and contractors. All visitors
should be accompanied by an employee when they are going to sensitive areas. Site tours should
be accompanied by an employee at all times, and should also be restricted to non-sensitive areas
3-3
-------
operational considerations for enhancing physical security
of the facility. Some utilities have recently started requiring background checks on visiting
international groups.
Vendors and contractors who have been cleared through background checks and have been
assigned badges could sign a log when entering and exiting the utility. In all cases, prior to
granting entry to a visitor, a security staff member can collect the following information from the
visitor: the visitor's name, identification, company, the name of the employee being visited, and
the purpose of visit. Additional guidance is provided below under "Delivery Access Control."
• Alarm Response Protocols. Utilities can develop alarm response protocols for security-related
alarms. Utility staff can be trained in these protocols to understand their specific roles and
responsibilities. By following the alarm response protocol for each category, staff members with
proper training can then address the problem upon receipt of alarm notification.
Alarm response protocols should provide guidance to identify false alarms, unverified alarms,
panic and distress alarms, etc. Otherwise, false or non-urgent alarms will eventually render
responses to alarms ineffective as the staff will start to ignore them. The interrelationship
and interaction between security alarms and operational systems needs to be recognized
and understood.
• Application of Key Control Policy. A strict key control policy can be implemented by water
utilities. Features of the policy should include: 1) a limit to the number of employees with keys,
2) a ban on providing keys to contractors, 3) a prohibition on the duplication of keys, 4) use of
patented keys that prevent the unauthorized duplication of keys (patented key blanks are
protected and proprietary), 5) periodic and random change of keys, and 6) return of all utility
keys from employees when terminating employment with the utility.
Use of coded or cipher-based alternative keyless locks could also be considered. These include
(Garcia 2001, U.S. Department of Commerce 2003) mechanical combination, electromechanical
combination, mechanical entry control, and electromagnetic keyless control locks. Their main
advantages are simple operation and ease of code change, thus they are especially suitable for
smaller utilities. However, they are used primarily for access control and do not provide a high
degree of security when used alone. Some models have time-penalty and error-alarm features
and can be tied to alarm systems.
• Alarms and Set-points. Doors and windows that provide access to critical areas can be alarmed
so that any unauthorized entry will alert security personnel. Responses to such alarms should be
addressed in the alarm response protocols discussed above.
• Lock Control. Utility facilities often have multiple locks hooked together in a daisy chain to allow
easy access for other groups, such as contractors or other groups. The removal of daisy chains
and the development of an operational procedure for utility personnel to coordinate facility
access with non-utility groups is recommended.
3-4
-------
operational considerations for enhancing physical security
• Scheduling of Annual Maintenance Activities. The most critical times of operations occurs
during peak demand periods. During these times, operations require as much system
redundancy as possible to allow for reacting to both simple and complex operational issues.
Large annual maintenance activities should be scheduled during periods when the demands of
the system are at their lowest. This schedule should also include major shutdowns related to
construction activities at the water treatment plant or other impacted critical facilities.
Coordinating major annual maintenance activities, such water main flushing and valve exercising
in distribution systems, during low-demand periods reduces the system vulnerability because the
system has redundant capacity available.
• Application of Access Control Policy. Utility personnel, as part of their functional duties, have
different access requirements to the various facilities. Employee access to each facility should be
restricted based on job requirements. Limits to access can be accomplished through simple key
control or more sophisticated access control systems. Highly sensitive areas, such as those with
SCADA equipment and the operational control room, could have additional operational controls
requiring two-employee identification prior to allowing access.
• General Maintenance. Utilities need to keep the general facilities in repair, including lighting,
fencing and gates, doors, and windows. Similarly, distribution system air relief valves and air
vents in storage tanks need to be regularly maintained. Poorly maintained facilities can increase
the ease of unauthorized access.
• Clearzone Areas. An important concept in perimeter access control is a clearzone on both sides of
a fence. A clearzone is an area surrounding the perimeter of a facility that is free of shrubs and
trees and features well-maintained landscaping that does not provide hiding places for an
adversary. Similarly, no materials should be stored by the utility near the fence to obstruct view.
Clearzones enhance visual observation by security personnel and create a demarcation zone that
makes unauthorized persons more noticeable. Clearzone distances will vary based on siting
constraints; clearzone areas ranging from 50 to 100 feet from perimeter fence to building exterior
are common for new facilities and are typically smaller for existing facilities that are space-
limited. In either case, utilities are encouraged to maximize the space available.
Lighting is frequently is enhanced within clearzone areas, making it easier for employees and
passersby to observe and identify intruders. Within the clearzone space surrounding the critical
buildings, motion detection is sometimes installed, with instant-on, high-visibility lighting (3 to 5
foot-candles of illumination) that activates when people approach the building.
Critical facilities located within neighborhoods may be affected by zoning rules or neighborhood
covenants that, for example, specify or prohibit certain landscaping and fencing features. Utilities
can work with their governing municipalities to have the perimeter of critical facilities zoned as
clearzone areas, as is the case with military installations and airport runways.
3-5
-------
operational considerations for enhancing physical security
• Fences. Security fences, such as chain-link fences, typically do not prevent intrusion to a facility.
Even the use of barbed wire or barbed tape concertina may not provide significant delay for
intruders. However, by posting signs on the fence that trespassing is a criminal offense, fences
can provide some deterrence to vandals. Thus, fences need to be inspected, maintained, and
repaired as necessary to maintain their level of deterrence from vandals.
• Delivery Access Control. Deliveries present a difficult security challenge for facilities.
Particularly for water systems that have regular chemical and other material deliveries,
additional access control policies may be warranted:
- Physically inspect vehicles before allowing them to enter a facility perimeter.
• Construct a pull out area to stage delivery vehicles outside of the fence line.
• Require the supplier to provide the manifest and driver name, and coordinate delivery
time in advance.
• Adopt a procedure that requires faxed or electronically transmitted copies of delivery
bills-of-lading information and driver identification sent to the security office prior to the
truck arriving onsite.
• Have a trained security staff member meet the vehicle; physically inspect the driver,
vehicle, and cargo for contraband; and test the cargo for correctness, concentration, and
purity (if applicable) before it is allowed onsite. Unverifiable, unscheduled, or late
deliveries should be refused.
• Training security personnel regarding the necessity of keeping detailed logs of deliveries
and pick-ups, including driver information and destination.
The same procedure can be accomplished prior to allowing a vehicle to depart the facility,
checking for short deliveries, theft, or contraband.
Consider adding a CCTV video surveillance system. Deploy cameras to capture the vehicle
license plate and driver facial features.
Implement a procedure for ensuring that a driver who regularly picks up or delivers
hazardous materials, such as hazardous chemicals, is previously identified, given proper
identification badges, and trained in the facility security requirements.
• Vehicle Checkpoints. A vehicle checkpoint area for detaining vehicles for identification is
recommended in a perimeter access control system. The purpose is to screen all vehicles or
pedestrians prior to accessing the property. The key to this practice is that the perimeter fencing
must be as strong as the gate facility, based on the old concept that a chain is only as strong as its
weakest link.
- In a simple system, a vehicle checkpoint can consist of a gate with an intercom and video
surveillance system. When a vehicle approaches, the driver requests permission to enter the
facility using the intercom. After security staff has visually identified the visitor, access may
be granted or denied from within the facility. Adding an exterior card reader on a pedestal
outside the gate can serve to grant access to employees.
3-6
-------
operational considerations for enhancing physical security
In more elaborate security installations, a guardhouse facility may be located at the entrance
to a facility. A security officer, who screens all vehicles entering the site, staffs the
guardhouse. Vehicles that are not permitted to enter the site are turned back.
High-security applications use vehicle sally ports to detain and screen incoming vehicles. A
vehicle sally port consists of interlocking gates within a fenced area. Incoming drivers pass
through the first gate and stop at the second gate. Once both gates are closed and the vehicle
is captured within the sally port, a security guard may confirm the identity of the driver and,
if necessary, search the vehicle to confirm the contents. Once the vehicle and driver are
approved, the second gate opens and the vehicle may drive onto the facility.
3.2.2.2 Advanced
• Reevaluation of Minimal Accepted Personnel Staffing Levels. If the facility cannot be operated
in a manual mode with the existing staff, this is a significant operational vulnerability that must
be addressed. The utility ERP should have an emergency staffing plan that should include hiring
of temporary employees or contractors for the duration of an emergency. This plan should also
include staffing of facilities that are operated remotely. (For additional information about
protecting remote facilities, see Section 5, "Cyber Security Management, Operations, and Design
Considerations.")
3.3 Source Water
Source water marks the beginning of the utility water system and provides the first opportunity for
disruption of water service to customers. Loss of source water supplies through contamination or
disrupted delivery will have varying degrees of impact on a utility based on the utility's redundancy
of raw water supplies, delivery capabilities, and finished water storage in the distribution system.
Contamination of actual source water supplies is difficult to accomplish because of the large volumes
of water involved. The most vulnerable areas are typically associated with the transmission mains
that deliver water to the treatment facility or directly into the system (groundwater wells). The raw
water intake from lakes, reservoirs, dams, or wells can be monitored for entry control and access if
feasible and practical. Intake water characteristics can be monitored for changes, such as the presence
of petro-chemical contaminants. If a flammable or toxic substance is introduced into the intake
system, it is possible that this contamination may be discovered by plant operations personnel who
monitor water quality. Changes in the constituents of the water, such as color, pH, and odor, may
also be identified by operations, maintenance, or lab personnel. During periods of elevated security
risk, operators should make such inspections frequently and randomly throughout the day.
3.3.1 Groundwater
Groundwater supplies can be divided into two categories: 1) groundwater originating from a
protected aquifer and 2) groundwater under the influence of nearby surface water. These systems
have different vulnerabilities.
3-7
-------
operational considerations for enhancing physical security
3.3.1.1 Protected Groundwater Supplies
Protected groundwater supplies are unlikely to be intentionally contaminated through the
environment (e.g., spills) because of the depth of the groundwater, protective clay lenses, and the
volume of water. On the other hand, a well head provides a more vulnerable target. The two
intrusion points of a well head are the site inspection tube and the wellhead sample port. Either
component can act as a potential conduit for the introduction of contaminants.
Wellheads equipped with intrusion alarms can trigger an automatic shutdown of the well. This
would allow operations staff to inspect the facility for potential contamination prior to introducing
the well water back into the system.
3.3.1.2 Unprotected Groundwater Supplies
Unprotected groundwater supplies can be potentially influenced by nearby surface water sources
and percolation of contaminants through the soil. These sources typically lack protective clay lenses
and are relatively shallow supplies, which make them more vulnerable to contamination events. The
vulnerable components of these unprotected groundwater supplies are the water source, the site
inspection tube, and the wellhead sample port. Each of these components can be a conduit for the
introduction of contaminants.
Unprotected groundwater supplies typically go through additional treatment similar to surface water
sources prior to distribution. Online monitoring could be used for unprotected groundwater supplies
to provide early detection for unusual water quality changes that could be associated with a
contamination event. In addition, the wellheads can also incorporate the same types of operational
approaches identified above for protected wellheads.
3.3.2 Surface Water
The two common types of surface water supplies are reservoirs/lakes and streams/rivers. Both of
these types of supplies require treatment at water treatment plants. Operational considerations to
enhance security in both type of supplies include:
• Continuous raw water monitoring for surrogate parameters (such as pH, conductivity, total
organic carbon [TOC], and toxicity). The implementation of this measure will greatly depend on
the financial resources of the utility, as some of these monitors currently have relatively high life-
cycle costs. Furthermore, the interpretation of the measurements depends on an intimate
familiarity with baseline water characteristics and behavior under different conditions.
Regardless, the development of a raw water baseline sampling program followed by the
installation of inexpensive monitors for surrogate parameters would be a good start for most
utilities. After establishing baseline water characteristics, utilities might enhance their monitoring
with more advanced monitors, resources permitting. Information on online monitoring systems
both for source water and the distribution system can be found in Grayman et al (2001),
Hergesheimer, et al. (2002), and Pikus (in press).
• Site inspections are conducted at random times of the day.
3-8
-------
operational considerations for enhancing physical security
3.3.2.1 Reservoirs/Lakes
Reservoirs and lakes are typically large bodies of water, significantly reducing the potential for
introducing a contaminant at a dose high enough to be of concern. Additional operational
considerations to enhance security include those listed below.
Basic
• A neighborhood watch program with local park staff and other community users of the
reservoir/lake observing conditions at the site
• Inspection of dams under a dam safety program managed by FEMA or the appropriate state
agency to identify the vulnerabilities of the dam
Advanced
• Source water watershed protection agreements with other agencies (state or local watershed
districts) in which source water protection is a top priority for district managers
3.3.2.2 Streams/Rivers
Streams and rivers have a higher potential for short-term contamination events due to intentional
dumping or accidental releases of contaminants upstream of the raw water intake structures.
Additional operational considerations to enhance security include these:
Basic
• Coordination with local police departments, sheriff's departments, and other agencies, including
the Coast Guard and Harbor Patrols, where appropriate, to develop early warning systems
(EWSs) for reporting illegal and accidental discharges into the river or stream
Advanced
• Development of an integrated water quality monitoring response program that evaluates
surrogates that are indicative of an unusual and unanticipated change in water quality
3.3.3 Raw Water Intake
Raw water intake structures for both reservoirs/lakes and streams/river systems are among the
vulnerable facilities in the raw water system. The intake structures are typically located in remote
locations (resulting in a slow response time), are gravity fed (allowing easier introduction of
contaminants), and are often single of points of failure for the raw water delivery system (easily
allowing disruption of raw water deliveries). Some operational considerations for ensuring the
security of raw water intake structures include those listed below.
3.3.3.1 Basic
• At random times of the day, site inspections conducted of screens and bars by operations staff
during elevated alert periods, and temporary use of guards during emergencies
• Coordination with other agencies and community groups to develop an "alert" program
3-9
-------
operational considerations for enhancing physical security
3.3.3.2 Advanced
• Fencing installed on the land side of the intake structures with intrusion alarms and CCTV
cameras for utilities that have the resources.
• Hatches and valves secure from tampering and entry attempts into the intake structure
• Daily, randomly timed site inspections of screens and bars by operations staff during elevated
alert periods, and temporary use of guards during emergencies
• Coordination with other agencies and community groups to develop an "alert" program
3.4 Raw Water Conveyance
Raw water conveyance facilities are sometimes located in remote locations, making supervision of the
facilities relatively difficult for operations staff. Some typical operational practices include improved
awareness, site visits by operations staff, and physical protection system monitoring. These practices
are described below.
3.4.1 General Considerations
General security considerations for raw water conveyance facilities are divided into Basic and
Advanced categories.
3.4.1.1 Basic
Increased Awareness. A heightened awareness of utility staff, other local government employees,
and the public observing trespass and physical disturbance is critical to keeping remote facilities
secure.
Operator Visits. Although the trend over the last one to two decades has been to reduce the
frequency of utility staff visiting remote facilities, for high-level threats reversing this trend may be
reasonable. Coordinating with local police on facilities critical to the water system can add to the
routine presence of authority and reduce the response time, if notified. This is especially true for
master pump stations, tanks, or reservoirs that serve significant portions of the service areas. Site
visits by operations staff should be scheduled at random times of day.
3.4.1.2 Advanced
Physical Protection and Monitoring. Remote pump stations, tanks, and reservoirs should be
monitored by intrusion alarms, SCADA systems, and CCTV if threat levels warrant. Utilities should
have procedures to ensure perimeter fences are maintained, gates are locked, and hatches are secure.
Security audits of remote facilities can be performed every 6 months, or more often for critical
facilities or if high threat levels exist.
3-10
-------
operational considerations for enhancing physical security
3.4.2 Pump Stations
Raw water pump stations are typically located in remote areas and are unmanned, increasing the
vulnerability of these facilities to malevolent acts. Operational considerations specific to raw water
pump stations are provided below.
3.4.2.1 Basic
• Routine testing of stand-by pumps
• Maintenance of a spare part inventory for critical components in secure location apart from the
pump station
3.4.2.2 Advanced
• At random times of the day, site inspections conducted by operations staff during elevated alert
periods
• Automatic shutoff for pump stations with open wet wells that are susceptible to introduction of a
contaminant
3.4.3 Pipelines and Appurtenances
Raw water pipelines create a unique problem in terms of protection from malevolent acts. The
pipeline typically extends for many miles, realistically cannot be fenced off and protected, and
provides a number of areas of exposure (e.g., exposed pipeline sections, airvacs, and vent pipes).
Operational considerations for raw water pipeline security can include daily pipeline inspections by
operations staff during elevated alert periods, including inspection and repair, as necessary, of air
vent screens.
3.4.4 Raw Water Storage Tanks
Raw water delivery systems often include storage tanks upstream of the pump stations to serve as
wet wells for the pumps. The major vulnerability for the tanks is intentional contamination through
hatches and vent structures. The general operational considerations for raw water conveyance listed
above can also be applied to raw water storage tanks. Additional operational considerations are
provided below.
3.4.4.1 Basic
• Daily site inspection by operations staff during periods of high alert
• Response protocol for bypassing the tank when unauthorized intrusions have been detected
3.4.4.2 Advanced
• Hatch and vent intrusion alarms that automatically activate the tank effluent valve to isolate the
tank
3-11
-------
operational considerations for enhancing physical security
3.5 Treatment Facilities
Water treatment facilities are designed to include multiple barriers to malevolent acts by
incorporating redundancy in treatment processes. The advantage of the multiple barrier approach is
that if one barrier is breached, the plant will still have the capability of producing water that meets
regulatory requirements. Additional information on operational measures for treatment facilities can
be found in Water Treatment (AWWA 1995).
3.5.1 Treatment Processes
The typical treatment processes in a water treatment facility include:
• Pre-treatment, which includes screening to remove debris (in a surface water source),
presedimentation to remove sand, addition of chemicals such as chlorine for slime control and
oxidation of some metals and organics present in water, and potassium permanganate for taste
and odor control
• Coagulation, flocculation, and sedimentation, which involve the addition of chemical coagulants
(e.g., aluminum salts, ferric salts, and polymers), rapid mixing, and sedimentation to enhance
removal of solids from the raw water
• Filtration, which is accomplished using conventional media filters (e.g., sand, garnet, and
anthracite) or membrane filters (microfiltration or ultrafiltration) to provide final solids and
microorganism removal, and polishing of the water
• Disinfection, which is typically accomplished using gaseous or liquid chlorine to deactivate any
remaining microorganisms in the water prior to delivery to customers for consumption
• Treated water clearwell and pump stations, which deliver the treated water to the water
distribution system
Each of the unit processes typically has redundant trains that allow periodic maintenance to be
performed while the water treatment plant remains in operation. Operational security considerations
for water treatment facilities include:
• Routine maintenance performed during low-demand periods of the year to ensure continuous
operations during emergency events
• Construction-related shutdowns scheduled during low-demand periods of the year to ensure
continuous operations during emergency events
• Cross-training of operations staff for improved response capabilities
• Development and testing of response protocols for unit process failures and upsets to verify the
potability of water leaving the water treatment facility
• Restriction of access to critical facilities and utilization of the buddy system if insider threat is a
concern
3-12
-------
operational considerations for enhancing physical security
• Ban on public tours in critical areas of the facility
• Staff escorts to accompany visitors (e.g., vendors, contractors, and tours) while inside the
boundaries of the facility
3.5.2 Chemical Delivery (Chemical Systems)
Water treatment facilities use a variety of chemicals as part of the treatment process. There are four
major areas of concern regarding chemical feed systems: 1) loss of chemical feed systems that can
result in the inability to properly treat the water, 2) introduction of contaminated chemicals into the
process, 3) release of chemicals into the environment endangering the safety of workers and the
public, and 4) mixing of certain chemicals, such as ammonia with liquid chlorine, on site where
hazardous conditions are created. These events have the potential to impact public health and the
environment. General operational security considerations for chemical storage and feed systems
include those listed below. Following the general considerations are more specific considerations for
gaseous and liquid chlorine (hypochlorites), the most common disinfectants used in water treatment,
and other water treatment chemicals.
3.5.2.1 Basic
While chemical shipments are outside of utilities' direct control, utilities can work with their
suppliers (especially chlorine suppliers) to identify ways to address potential hazards.
• Reject or batch test chemical deliveries that are suspect (e.g., those with a broken seal or late
delivery). When possible, screen deliveries before offloading into storage tanks.
• Contact the vendor if chemical delivery has not occurred at the specified time to verify the status
of the shipment, both for utility security as well as the safety of delivery personnel.
• Develop protocols with chemical suppliers minimize the potential for tampering during transit
and to identify whether tampering has occurred upon arrival at the facility.
• Continuously monitor chemical feed systems and development of operational response to
system failure.
3.5.2.2 Advanced
• Continuously monitor performance surrogates for processes using treatment chemicals to
identify trends in reduced performance.
• Develop procurement specifications that require use of anti-hijacking technology and proof of
compliance with the security guidance developed by the Chlorine Institute.
3.5.2.3 Gaseous Chlorine
Gaseous chlorine is stored in 150-pound cylinders, 1-ton cylinders, tanker trucks, or, at times, railcars.
The highest area of concern for gaseous chlorine is a sudden release into the atmosphere due the
failure of a tank or valve placing employees and nearby public at risk. The second area of concern is
3-13
-------
operational considerations for enhancing physical security
the loss of chlorine disinfectant for use in finished water, which could potentially cause a public
health problem. Operational security considerations for water treatment disinfection include
the following.
Basic
• Continuous monitoring using a chlorine gas leak detector and trained operations staff available
for small leak response.
• Coordination with local hazardous materials (HazMat) teams for response to large chlorine gas
releases.
• Continuous monitoring of chlorine residual and testing of operational protocols to respond to
loss of residual.
• Minimal amounts of gaseous chlorine stored onsite.
Advanced
• Change of the type of disinfecting chemicals to a less volatile type.
• Safety devices, such as self-contained breathing equipment, emergency repair kits, and adequate
ventilation equipment, provided at every chlorination facility. Furthermore, these devices are to
be regularly checked for proper operation and repaired as necessary.
3.5.2.4 Hypochlorite
In the past hypochlorination was typically used by smaller systems. However, due to security and
safety concerns, larger plants have shifted from gaseous chlorine to hypochlorite. The most common
forms are calcium hypochlorite (Ca(OCl)2 in dry granules, powder, or tablet form) and sodium
hypochlorite (NaOCl in liquid form). Operational security considerations for hypochlorite include the
following:
• For Ca(OCl)2, special storage must be provided to avoid contact with organic materials. Contact
with organic material can generate enough heat and oxygen to start a fire. Similarly, when
mixing with water, heat is generated; therefore mixing of with water to generate liquid chlorine
must be done by adding the calcium hypochlorite to water to minimize the generation of heat.
Thus, storage areas must be secure and must not contain any organic matter or water that
adversaries can use to start a fire.
• For sodium hypochlorite (which has a pH of between 9 and 11), attention must be given to its
corrosivity. Sodium hypochlorite must be stored away from equipment susceptible to corrosion
damage. Otherwise, adversaries can use it to damage plant equipment.
3.5.2.5 Ammonia
Ammonia is used in the chloramination of finished water to maintain a disinfectant residual.
Ammonia and chlorine added to water form chloramines, which remain in water for a longer
duration than free chlorine as disinfectant. Ammonia can be added to water as anhydrous or aqueous
ammonia (liquid form) or ammonium sulfate (powder form). The liquid form is volatile and
3-14
-------
operational considerations for enhancing physical security
explosive, and is thus considered a safety hazard. Spills or leaks may require evacuation of the
treatment plant, warehouse, or surrounding areas. Thus, operators must inspect ammonia tanks at
every shift to ensure that there are no leaks.
3.5.2.6 Fluorides
Fluoride is added to water to reduce tooth decay in children. Fluoride compounds used in water
treatment include sodium fluoride (powder or crystal), sodium fluorosilicate (powder or crystal) and
fluorosilicic acid (liquid). As an acid, the liquid form is of special concern as it is very corrosive and
can cause skin irritation. It is clear, colorless to yellowish, and generates fumes with a pungent odor.
Fluoride is available in 13-gallon and 55-gallon drums for small users, and in tank cars or trucks for
large users. Operators must handle it with caution and must inspect containers for leaks at every
shift. For the powder forms, operators must ensure that any spillage is quickly cleaned up to avoid
the inhalation of the dust. In addition, because fluoride overdosing would not be detected by taste or
odor, its potential as a hazard is increased. Utilities may want to verify that their water treatment
facilities' feed systems have been designed to make accidental (or intentional) overdosing unlikely.
3.5.2.7 Lime Softening
Water softening is used to precipitate the naturally occurring minerals found in water. The chemicals
most commonly used for this purpose are lime (either as hydrated lime [i.e., calcium hydroxide,
CaOH2] or as quicklime, [i.e., calcium oxide, CaO]), soda ash (Na2CO3), and caustic soda (sodium
hydroxide, NaOH). Hydrated lime, quick lime, and soda ash come in powder or granular form.
When lime is slaked for addition to water, great amounts of heat is generated, creating potential
safety hazards. Corrosivity of softening chemicals is also of concern, one requiring that they are
handled with care. Similarly, their dust can pose a health hazard. Dust control equipment must be
well maintained and used while handling these chemicals.
An additional chemical that is sometimes used to stabilize softened water is sulfuric acid. It has the
same safety issues of other corrosive chemicals used in water treatment plants.
3.5.3 Facility-wide Treatment
There are a number of operational considerations that can be applied to typical water treatment plant
processes. A brief description of key operational practices is provided below.
• HatcVVaults. Hatches and vaults can be locked when plant staff is not using them. These
appurtenances often provide direct access to critical processes or assets that, if attacked, could
provide significant damage to the facility operations. The integrated use of remote detection
devices, covered in Section 6, "Choosing the Optimal Physical Security Equipment," can help
utilities to monitor portions of the system that are not regularly checked by utility personnel.
• Valve/Sluice Gate Operators. Valve and intake gates can be locked out in the normal operating
configuration to avoid malicious tampering or an unintentional action by an employee. Utilities
have used chains and locks effectively for years for this use.
3-15
-------
operational considerations for enhancing physical security
• Electrical Panels, Control Boxes, and Motor Control Centers. These devices can have locking
mechanisms that, when kept locked at all times, can help to prevent unauthorized access.
Unrestricted access to this equipment could allow an immediate shutdown of unit processes and
control systems, creating a high-level operational emergency. The integrated use of remote
detection devices for these items is covered in Section 6.
• Standby Equipment. Standby equipment (e.g., generators, tanks, and pumps) should be rotated
into operating mode routinely. The advantage of rotating equipment is to allow minor
maintenance activities to be conducted routinely so that standby capacity is readily available.
• Spare Equipment. Critical spare equipment, such as pumps, should be stored in a location away
from the operating equipment (e.g., in another building). This protects the equipment from a
malevolent act that is directed at damaging the operational systems and allows the utility to
quickly restore operations after an event occurs.
• Power Supplies. Loss of power can result in the failure of a water system to achieve its mission.
Operational approaches to rapidly respond to localized or large power failures include these:
Power Failure Emergency Plan. Response to a power failure is an essential component of the
emergency operations plan. The plan needs to identify the strategy that the utility will take (a
systematic shutdown or continuous operations). The strategy selected will help to determine
the requirements of secondary power needs. This, in turn, will identify the best way to
supply alternate power, either through a secondary power supply or backup generation.
Backup Generators. Utilities can either purchase backup generators or rent generators using
standing, guaranteed contracts with local equipment providers. Advance preparation for the
use of backup generators includes installing and testing switchgears and pre-wiring the
system to accept the alternate source of power. Switchgears are generally critical assets with a
high vulnerability to risk, requiring special protection to prevent the loss of facility power.
• Security Guards. Temporary use of security guards during emergencies should also be
considered during periods of high alert for those assets that do not have remote detection devices
attached.
3.6 Finished Water Storage and Conveyance
Finished water storage and conveyance is the backbone of supplying treated water to customers.
Failure of storage and conveyance facilities would have a major impact on customers. The finished
water storage and conveyance systems comprise water storage tanks, pump stations, transmission
mains, distribution system lines, service lines, and various appurtenances. Additional information on
operational measures for finished water storage and conveyance systems can be found in Water
Transmission and Distribution (AWWA1996), Deb et al (1999), and Von Huben (1999). Operational
security considerations for these areas are discussed below.
3-16
-------
operational considerations for enhancing physical security
% 3.6.1 Storage Tanks/Reservoirs
Treated water is stored in water storage tanks at key locations in the water distribution system for a
multitude of reasons. These include (AWWA 1996):
• Equalizing supply and demand
• Increasing operating convenience
• Leveling pump requirements
• Decreasing power costs
• Providing water during power source or pump failure
• Providing large quantities of water to meet fire demands
• Providing surge relief
• Increasing detention times
• Blending water sources
Storage tanks typically supply water to the water system either by gravity or pump stations. Areas
that provide access to the water stored in the reservoirs include hatches and cleaning pipes. Cleaning
pipes are installed on the roofs of some tanks for vacuum cleaning by divers. These access points are
typically 1l/2- to 2-inch pipes with simple galvanized, unsecured screw caps. Removal of the cap
provides direct access to treated water. Operators need to ensure that these caps are locked and
cannot be removed by unauthorized persons.
Another access point in storage tanks is air vents that provide free flow of air in the tanks during
filling and draining cycles. Their protection is limited to simple mesh screens. Depending on the
design of the tanks, these vents may be directly accessible or accessible only by climbing the
reservoir. Inspection of the screens needs to be included during the inspection of the tanks.
In general, operational security considerations for water storage facilities include:
• Development of a protocol for hydraulically isolating a storage reservoir when intrusion alarms
are activated and tampering at the tank is verified
• Integration of intrusion alarms with automatic isolation valves for discharge lines when activated
• Development of a protocol for identifying contaminants, cleaning the tank, and restoring service
• Establishment of a neighborhood watch program in the community surrounding a storage
facility
3.6.2 Pump Stations
Treated water pump stations are placed at key parts of the water distribution system to boost water
to higher elevations for direct delivery to customers or storage reservoirs. Pump stations that supply
water directly to customers without backup storage are often identified as critical facilities. The
criticality of other pump stations in the water distribution system is dependent on the water demand
3-17
-------
operational considerations for enhancing physical security
on the system and the amount of storage available to meet short-term fire flow requirements. Because
an unmanned pump station can be an effective injection point for a large-scale intentional
contamination, utilities may want to closely evaluate the security at critical pump stations.
Operational security considerations for pump stations include the following.
3.6.2.1 Basic
• Maintenance of a spare pump and critical replacement part inventory in a location away from the
pump station
• Routine testing of standby pumps and rotation of the standby pumps into service
3.6.2.2 Advanced
• Development and testing of an operations protocol to run the distribution system in a pressure
mode in the event that a water storage tank is out of commission
• Development and testing of a protocol for turning off the pump when intrusion alarms are
activated and tampering at the pump station is verified
3.6.3 Transmission Mains
Transmission mains are generally large diameter pipelines with no service connections. They are
commonly greater than 24 inches in size and convey finished water from the water treatment plant to
the distribution system or wholesale customers. Transmission mains are primarily located outside the
service areas, placing them in more isolated areas. Depending on the topography and the distance
covered, stretches of the mains may be alternately buried, exposed, suspended, or elevated. These
exposed stretches pose a particular vulnerability to physical, vehicle, and outsider access. Access to
transmission mains can also occur through air- and pressure-relief valves when the valves are
exposed. Thus, routine, periodic inspection of exposed areas and air and pressure relief valve screens
is suggested.
3.6.4 Distribution System Mains and Appurtenances
Distribution mains convey water from the transmission main to service lines and typically are less
than 24 inches in size. These mains are located within the service area and are rarely exposed at
ground level. However, access to the distribution mains can occur at numerous locations such as fire
hydrants, air-relief valves, storage or surge tanks, pump stations, pressure-relief valves, and service
connections within buildings. Access through fire hydrants and other appurtenances described above
provides a potential means of contaminating particular services areas. Because of the lack of control
and the inability to secure the different components, the distribution system is considered to be the
most vulnerable part of a water system.
3-18
-------
operational considerations for enhancing physical security
3.6.4.1 General Considerations
In general, the following operational considerations apply to distribution systems and their
appurtenances. Note that most of these items are often part of industry-standard practices for utility
O&M programs.
Basic
• Protective covers for all appurtenances, secured at all times
• Development of an emergency isolation and flushing protocol for the distribution system
• Development of a disinfection and testing protocol for distribution system pipelines
• Maintenance of a replacement part inventory for critical pipeline appurtenances and a
replacement pipe inventory or a standing, guaranteed contract for emergency delivery
Advanced
• Locking covers for fire hydrants installed in coordination with fire departments
• Backflow devices on appurtenances to reduce the potential for intentional or accidental back
siphoning into the distribution system
3.6.4.2 Construction Meters
Utilities often maintain little or no control over construction meters used by contractors throughout
the distribution system. Construction meters provide direct access to the water distribution system
and, in uncontrolled situations, can create confusion over authorized use areas. Some of the effective
operations approaches that have been used by utilities include the following:
Basic
• Installation of all construction meters by the utility and tracking of the locations of current meters
installed.
• Use of Reduced Pressure Principle Devices (attached to construction meters) to prevent
accidental contamination from backflow into the water system.
• Inspection of construction meter activities on a routine basis promotes compliance with utility
requirements.
• Establishment of standard points of use and possible establishment of water stations controlled
by the utility for contractor supply.
• Use of utility personnel, other local government employees, law enforcement, and
"Neighborhood Watch" groups to maintain vigilance with respect to permitted construction
meters. Section 3.6.5, "Increased Awareness," provides additional discussion on such approaches.
Advanced
• Implementation of "construction meter" program elements developed by utilities that have
implemented comprehensive security programs. These elements include 1) regulating the
issuance of such meters, 2) controlling access to hydrants for construction use through a permit
program, 3) inspecting and approving all permittee equipment to be used to connect to utility
3-19
-------
operational considerations for enhancing physical security
infrastructure, and 4) establishing a labeling system for permittee's equipment that clearly
identifies the equipment that may be connected to utility infrastructure.
3.6.4.3 Meters
Most utilities in the United States meter the finished water delivered to residential and commercial
customers. In areas of the United States where freezing temperatures are common, water meters are
often located inside and openly accessible to the occupant. Locking lids on water meters can provide
greater security. Limited operational security considerations for water system meters are adding
locking lids to meters. In addition, the implementation of industry-standard practices for utility O&M
programs, which include meter testing and replacement, important enhances the security of a utility.
3.6.4.4 Backflow Prevention Devices
Utilities have routinely practiced backflow prevention on industrial and commercial facilities that
pose a risk to the domestic water system. Residential meters have not traditionally been backflow-
protected because they have been considered to be low risk to water systems and the high cost to
implement an effective program.
Most state drinking water programs have regulations in place with regard to cross-connection
control. Utilities should be, and should continue to be, in compliance with state and local cross-
connection regulations. Those that are not in compliance need to enforce these regulations to protect
one of the most vulnerable areas of the water systems.
Another operational security consideration for backflow protection is the continued use of an
industrial/commercial backflow protection program. This program employs the appropriate types of
devices for the annual inspection of high-risk applications. Implementing industry-standard practices
for utility O&M programs that include cross-connection surveys and backflow prevention programs
is critical in enhancing the security of a utility.
3.6.4.5 Valves
Multiple types of valves for various purposes are found in a distribution system. These include:
• air/vacuum-relief valves • globe valves
• butterfly valves • needle valves
• check valves • pinch valves
• control valves • plug valves
• diaphragm valves • pressure relief valves
• gate valves
The value of system valves is their function in operating the system, especially in the event of an
emergency. Valves serve many purposes, including regulating or shutting off flow, releasing pressure
or air, allowing air to enter the system, preventing flow reversals, separating zones of different
pressures, and regulating tank levels. Most valves do not present an avenue for introduction of
-------
operational considerations for enhancing physical security
contaminant into the distribution system; however, due to their criticality in system operations, their
proper operation is of utmost importance, especially when trying to isolate sections of the system
during emergencies. Operational security considerations for valves include:
• Routine exercise and replacement programs for water distribution system line valves
• Maintenance of a replacement inventory for critical valves
3.6.4.6 Hydrants
Fire hydrants are typically located at street intersections or intermediate points. Hydrants provide
adversaries the opportunity to introduce large volumes of contaminant directly into the distribution
system. As mentioned above, the implementation of industry-standard practices for utility O&M
programs that include the inspection and testing of hydrants is important in enhancing the security of
a utility.
3.6.4.7 Blow-offs
Blow-offs are small diameter pipes (2 to 4 inches) extending from mains to above the ground surface.
Used to flush water mains where there is not a hydrant, they often are located at distribution system
dead ends and at low points for sediment removal. Blow-offs are direct points of access for injection
of contaminants into the distribution system; therefore, they are to be inspected periodically for
tampering and to examine the condition of their screens.
3.6.4.8 Access and Inspection Hatches
Access hatches and vaults are part of most assets of a distribution system such as large mains, storage
tanks, and pump stations. These vaults are secured either by padlocks or bolts. At a minimum,
utilities could harden these access points with better locks and inspect them on a regular basis.
3.6.4.9 Service Lines
Ranging in sized, service lines convey water from distribution mains to the customers. Because they
are connected to the customers' piping, they provide a point of access into the distribution system.
This access can occur at the customer meters or taps, providing an intentional or unintentional source
of contamination of the water system. Unintentional contamination can occur through cross-
connections. Residential customers may have cross-connections from chemical dispensers on garden
hoses, water softeners (drain connected to sewer), sprinkler systems, submerged garden hoses (such
as filling a pool or hot tub) or taps (particularly those extended with hoses), etc. Commercial
customers may have cross-connections at chemical vats and laboratory washing equipment, for
example. Intentional contamination can occur using commonly available equipment to exceed service
pressures and pump contaminant into the distribution system.
3-21
-------
operational considerations for enhancing physical security
3.6.4.10 Sample Taps
Sample taps for water quality monitoring are located at various locations within the distribution
system, sometimes next to fire hydrants and within pump stations, buildings, storage tanks, and
vaults. Operators can check the locks of the sampling station boxes or vaults to determine whether
there has been tampering.
3.6.5 Increased Awareness
Increased public awareness of water distribution system operations is an effective way to increase the
utility's knowledge of unauthorized activities and potential malevolent acts. The two primary groups
that can be effectively engaged in this process are utility employees and the public.
3.6.5.1 Employees
Given that distribution systems are underground and can cover wide areas, it is impossible to
constantly monitor a distribution system. Consequently, it is important to rely upon the utility staff to
be cognizant of anomalies that may indicate a breach of security in the distribution system or
pumping stations. While traveling along daily routes or from job to job, employees should take notice
of any security discrepancy. Any persons or equipment, other than those of the utility or utility
contractors, around water facilities should raise suspicion and be reported according to standard
operating procedures.
In addition to utility employees monitoring the security of the distribution system, management
should work with other local government departments and agencies to train their employees to be
aware of any unauthorized entry into water system vaults, pump stations, or tampering with fire
hydrants. In addition to the police, refuse haulers and road crews can also be made aware of water
system security because of their frequent travels across a municipality.
3.6.5.2 Public
Given the large number of points of entry to a water distribution system, heightened awareness by
the public is valuable for identifying unauthorized access to these systems. Water utility managers
should work with those involved in community policing programs, such as Neighborhood Watch, to
educate citizens on distribution system security. Identification of unauthorized tapping of fire
hydrants, vandalism, and open or damaged fences and hatches should be reported. Individuals who
note suspicious behavior and know how to contact the authorities can act as a deterrent and
significantly reduce the risk to the system. In areas of low visibility or in remote areas, however,
installation of fire hydrant locks and anti-theft devices, in coordination with the local fire
departments, are recommended.
3-22
-------
operational considerations for enhancing physical security
3.7 Support Services Facilities
Support service facilities include maintenance shops, warehouses, and storage facilities;
administrative offices; fleet; and laboratories.
3.7.1 Maintenance Shops,
Warehouses, and Storage Facilities
Utility maintenance facilities provide a central location for the utility to conduct routine repair and
maintenance of equipment. Especially critical maintenance facilities include ones that store the
various chemicals discussed above and large amounts of fuels such as gasoline, diesel, natural gas, or
propane. For large facilities, temporary use of security guards during emergencies should be an
option.
Similarly, warehouse facilities are used to store supplies for utility operations. These facilities serve
an important function for providing key supplies during emergency events. Loss of the utility
warehouse will impair the ability of staff to rapidly respond and correct system problems. Table 3-2
describes the potential threat and operational considerations for maintenance shops and warehouses.
TABLE 3-2
Maintenance Building and Warehouse Threat and Operational Considerations
Threat Type Threat Operational Considerations
Vandal Malicious damage Keep facility locked during non-working hours
Employ intrusion alarm response protocol
Criminal Equipment theft Provide employee and visitor identification badges
Injury to employees Lock tools in protected cages
Saboteur/Terrorist Use of equipment or fuels to Establish emergency contracts with local businesses and
destroy or damage property suppliers
Establish operational procedures to isolate and shut off fuel
valves in maintenance buildings
Post guards
Insider Revenge, personal gain Restrict access to maintenance buildings and warehouses
3.7.2 Administrative Offices
Utility administrative offices provide the business functions (e.g., human resources, billing, and
purchasing) that are required to keep the utility operating. The administrative offices contain
sensitive information about employees, customers, and utility operations. Many of the utility
administrative functions are not easily contracted out and need to be functional quickly after an
incident occurs. Table 3-3 describes the potential threat and operational considerations based on the
adversary type.
3-23
-------
operational considerations for enhancing physical security
TABLE 3-3
Administrative Offices Threat and Operational Considerations
Threat Type
Threat
Operational Considerations
Vandal
Criminal
Saboteur/Terrorist
Insider
Malicious damage
Property theft
Injury to employees
Destruction or disabling of utility
operations
Damage to revenue stream
Injury to employees
Revenge, personal gain
Keep facility locked during non-working hours
Employ intrusion alarm response protocol
Provide employee and visitor identification badges
Store sensitive documents in secure location
Establish back-up locations to quickly restore business
functions
Isolate the management system and use third-party billing
and collections
Post guards
Restrict access to sensitive documents and areas
3.7.3 Fleet
The utility fleet typically includes personal vehicles (e.g., trucks and cars) and large construction
machinery (e.g., backhoes and tractors) that are critical for routine operations and emergency
response. Although the utility fleet is an essential component for operations, in most cases, local
business can supply short-term rentals in the case of emergencies. Table 3-4 describes the potential
threat and operational considerations for the four types of outsider threat.
TABLE 3-4
Fleet Vehicle Threat and Operational Considerations
Threat Type
Threat
Operational Considerations
Vandal
Criminal
SaboteurATerrorist
Insider
Malicious damage
Property theft
Injury to employees
Disruption of ability to operate and
respond
Injury to employees
Revenge, personal gain
Keep facility locked during non-working hours
Employ intrusion alarm response protocol
Provide employee and visitor identification badges
Lock vehicles in protected compound
Install geographic positioning system (GPS) tracking in
vehicles
Establish emergency contracts with leasing companies
Post guards
Restrict access to vehicle keys
Install GPS tracking in vehicles
3.7.4 Laboratories
Water quality and process laboratory facilities provide operational and regulatory testing for the
utility. These facilities are considered to be less critical because the work can sometimes be
outsourced to contract laboratories on a short-term basis, if needed. Security considerations for
laboratories include those listed below.
3-24
-------
operational considerations for enhancing physical security
3.7.4.1 Basic
• Use a chemical receipt log that indicates the name of chemicals received and the name of the
person to whom the chemical is released.
• Create and maintain an inventory of chemicals kept at the laboratory.
• Remove chemicals that are consumed in process, disposed, or shipped from laboratory inventory
logs.
• Secure laboratory reagents and limit access only to authorized personnel.
• Store highly toxic materials and hazardous materials in locked cabinets, freezers, or refrigerators.
This applies to sodium cyanide, potassium cyanide, arsenic compounds, select agents, and other
materials that may be readily recognizable as poisons.
• Limit the number of staff that are authorized to purchase chemicals and supplies.
• Establish arrangements with other laboratories to be used in situations where the utility's lab
does not have a certain analytical capability, is overloaded with work, or is unable to provide
service. Maintain an up-to-date list other laboratories and the types of analyses performed.
3.7.4.2 Advanced
• Limit the amount of chemicals that are stored at the facility.
• Protect laboratory gas cylinders, service and spare, in secure wire mesh cage.
• Limit the amount of chemicals that suppliers can provide at one time.
• Establish a secondary location at the treatment facility for conducting process control-related
analysis.
• Consider the use of RFID tags for valuable instrumentation such as the gas chromatograph/mass
spectrometer.
3-25
-------
(This page intentionally left blank)
-------
SECTION 4
Design Considerations for Developing Physical
Security at New Facilities and Retrofits
Management:
Optimizing
Physical Security
^
Operations:
Enhancing
Physical Security
Design:
Developing
Physical Security
Cyber Security
Physical
Security
Equipment
Understand water system security design
Apply Crime Prevention Through Environmental Design strategies
Consider appropriate measures based on Design Basis Threat
Monitor water quality
Evaluate specific measures based on facility type
4.1 Overview
The objective of this section is to provide guidance that enables water utility decision-makers and
designers to develop secure sites and facilities. Because water systems cannot be made immune to all
possible attacks, system design needs to address issues of critical asset redundancy, monitoring,
response, and recovery to minimize risk to the utility. All public water supplies can identify and
address security needs in the design and construction of new projects and retrofits of existing
systems.
The considerations presented in this section are for the purpose of increasing security and reducing
risk, and are applicable to designs of new facilities, water infrastructure upgrades, expansions of
existing infrastructure, and retrofitting of existing infrastructure. This section addresses the delay and
denial protective measures that should be coupled with detection and assessment technology.
Attacks targeting command, communications, and control systems, referred to as cyber attacks, are
addressed in the Section 5, "Cyber Security Management, Operations, and Design Considerations,"
although physical attacks by those adversaries to gain access to the facilities housing cyber systems
can be protected using measures described in this section.
4-1
-------
design considerations for developing physical security at new facilities and retrofits
The significant capabilities of an adversary pose challenges to any security system. Though complete
protection against an attack may not be achievable, actions taken to lessen the effects of an attack can
significantly reduce the damage caused by less capable adversaries.
4.2 Security System Design
Criteria for the design of security systems are based on identification of critical assets that may
become potential targets and threat related to those assets. The vulnerability assessment characterizes
and prioritizes those assets that may be targeted, evaluates where they are vulnerable to attack, how
they are currently protected, and considers the consequences of a successful attack. The threat
assessment determines which threats are credible and likely against a particular asset.
Identification and characterization of assets is based on consideration of the mission and the
resources required for performance. For example, an administration building may house a number of
different types of assets: people, records, money, tools, keys, computers, controls, and security or
process monitoring systems. Once the assets have been identified, they can be characterized (i.e., their
characteristics described with respect to their attractiveness to various types of adversaries) and
prioritized based on their criticality. For example, records, money, tools, and computers may be most
attractive to criminals interested in theft; security and utility monitoring systems may be more
attractive to saboteurs and terrorists interested in compromising the system to accomplish their
objectives.
This section provides a number of key design considerations and criteria to be used when designing a
security system for large, medium, and small water utilities. Design considerations are divided into
Basic and Advanced Categories, with future considerations included where applicable. It includes
information about the criteria used to evaluate designs as well as recommendations for the design
team based on threat level and adversary.
4.2.1 Design Team Requirements
The utility should consider including design team members with demonstrated knowledge of, at a
minimum, the following methods of protecting a facility:
• Securing the site perimeter.
• Regulating the avenues of approach to the building through the use of architectural design
elements such as barriers and obstacles.
• Creating sufficient setback.
• Building hardening to mitigate potential blast damage.
• Using progressive collapse mitigation measures.
• Addressing envelope security appropriate openings, hardware, and site flow.
• Applying HVAC mitigation measures versus the risk associated with chemical, biological, and
radiological threats.
4-2
-------
design considerations for developing physical security at new facilities and retrofits
• Protecting utility systems (indoor and outdoor) from intentional or unintentional damage,
tampering, and accidents. This also includes safeguarding communications systems so they can
be used in an emergency.
• Controlling building access by using barriers, keys, keypad systems, access cards, smart cards, or
biometrics, as appropriate.
• Protecting high-risk spaces within the building, such as hazardous material storage rooms,
loading docks, and laboratories.
4.2.2 Basic Design Considerations - "10 States Standards"
Utilities may want to consider applying the following water system security design guidance taken
from the "Recommended Standards for Water Works" developed by the Great Lakes - Upper
Mississippi River Board of State and Provincial Public Health and Environmental Managers. This
document, which is also known as the "10 States Standards," may be considered an industry
standard that utilities can implement to potentially limit liability.
• Security should be an integral part of drinking water system design. Facility layout should
consider critical system assets and the physical security needs for these assets. Requirements for
submitting, identifying, and disclosing security features of the design, and the confidentiality of
the submission and regulatory review should be discussed with the reviewing authority.
• The design should identify and evaluate single points of failure that could render a system
unable to meet its design basis. Redundancy (geographically separated) and enhanced security
features should be incorporated into the design to eliminate single points of failure when
possible, or to protect them when they cannot reasonably be eliminated.
• Critical components that comprise single points of failure (e.g., high volume pumps) that cannot
be eliminated should be identified during design and given special consideration. Consideration
should be made to ensure effective response and timely replacement of critical components that
are damaged or destroyed. Design considerations should include component standardization,
availability of replacements and key parts, re-procurement lead times, identification of suppliers,
and secure retention of component specifications and fabrication drawings. Readily replaceable
components should be used whenever possible and provisions should be made for maintaining
an inventory of critical parts.
• Human access should be through controlled locations only. Per the 10 States Standards, intrusion
deterrence measures (e.g., physical barriers such as fences, window grates, and security doors;
traffic flow and check-in points; effective lighting; and lines of sight) should be incorporated into
the facility design to protect critical assets and security sensitive areas. Effective intrusion
detection should be included in the system design and operation to protect critical assets and
security sensitive areas. All cameras and alarms installed for security purposes should include
monitors at manned locations.
4-3
-------
design considerations for developing physical security at new facilities and retrofits
• Vehicle access should be through controlled locations only. Physical barriers such as moveable
barriers or ramps should be included in designs to keep vehicles away from critical assets and
sensitive areas. It should be very difficult for a vehicle to be driven either intentionally or
accidentally into or adjacent to finished water storage or critical components without facility
involvement. Designated vehicle areas such as parking lots and drives should be separated from
critical assets with adequate standoff distances to eliminate or minimize impacts to these assets
from possible explosions of material carried in vehicles.
• Sturdy, weatherproof, locking hardware should be included in the design of access for all tanks,
vaults, wells, well houses, pump houses, buildings, power stations, transformers, chemical
storage, delivery areas, chemical fill pipes, and similar facilities. Vents and overflows should be
hardened through use of baffles or other means to prevent their use for the introduction of
contaminants.
• Computer-based control technologies such as SCADA should be secured from unauthorized
physical access and potential cyber attacks. Wireless and network-based communications should
be encrypted as deterrence to hijacking by unauthorized personnel. Vigorous computer access
and virus protection protocols should be built into computer control systems. Effective data
recovery hardware and operating protocols should be employed and exercised on a regular basis.
All automated control systems should be equipped with manual overrides to provide the option
to operate manually. The procedures for manual operation include a regular schedule for
exercising and ensuring an operator's competence with the manual override systems should be
included in facility operation plans.
• Per the 10 States Standards, real-time water quality monitoring with continuous recording and
alarms should be considered at key locations to provide early warning of possible intentional
contamination events.
• Facilities and procedures for delivery, handling, and storage of chemicals should be designed to
minimize the chance that chemicals delivered to and used at the facility can be intentionally
released, introduced, or otherwise used to debilitate a water system, its personnel, or the public.
Particular attention should be given to potentially harmful chemicals used in treatment processes
(e.g., strong acids and bases, toxic gases, and incompatible chemicals) and on maintenance
chemicals that may be stored onsite (e.g., fuels, herbicides, paints, and solvents).
In designing physical protection systems, it is important NOT to interfere with life safety,
occupational safety, and fire protection provisions. Security systems can be balanced with and
complementary to other design criteria and requirements as well as the overall operability and
maintainability of the water system.
-------
design considerations for developing physical security at new facilities and retrofits
4.2.3 Balanced Approach to Security System Design
When developing a security design, it is important that a balance between hardware and procedural
elements be adopted. A balanced approach would consider the following:
• To be effective, physical protection (doors, alarms, cameras, etc.) should also include policies and
procedures designed to keep the physical protection systems functioning as intended. For
example, an alarm system on doors does little good if the doors are routinely propped open.
• As discussed in Section 2, "Management Considerations for Enhancing Physical Security," and
Section 3, "Operational Considerations for Enhancing Physical Security," security policies and
procedures can be cost-effective in reducing risk.
• Without staff commitment to the security program, the program will not be effective.
4.2.4 Layers of Protection
Layered security systems are essential. They are built on the "protection in depth" principle, which
requires that an adversary defeat several protective barriers or security layers to accomplish its goal.
In addition, balanced protection implies that no matter how an adversary attempts to accomplish his
goal, he will encounter effective elements of the physical protection system.
For example, as depicted in Figure 4-1, an effective security layering approach requires that an
adversary penetrate multiple, separate barriers to gain entry to a critical asset at a water facility.
Protection in depth helps to ensure that the security system remains effective in the event of a failure
or an adversary bypassing a single layer of security. If funding is a limitation, utilities can add
multiple layers as funds are available to increase security at each critical asset.
For each facility, multiple layers of security protection should be considered. To provide multiple
layers, perimeter intrusion detection methods should be placed at the outer edges of the asset
boundary, and delays should be located as close to the edge as possible. In this way, the security
system can generate an early alarm in the event of intrusion of a facility, while delaying an adversary
as it attempts to reach the intended target.
The layered approach starts with the outer perimeter of the facility and goes inward to the facility
site, the buildings, structures, other individual assets, and finally to the contents of those buildings,
structures, and assets. Approaching security in this manner allows utilities to incorporate additional
layers of physical security to match the threat that may be associated with specific assets at the
facility. For example, the perimeter of the facility typically includes the fence and access gates that
surround the site. The perimeter is considered the first line of the physical security system that,
through operational practices, can be sufficient for basic, low-level threats such as vandals.
The site is the area between the perimeter and the buildings, structures, and other individual assets.
This open space provides a unique opportunity for early identification of an unauthorized intruder
and initiation of early response. This space is used to calculate the standoff distance, that is, the
distance between the outside perimeter (the public areas) to critical facilities or buildings inside the
perimeter (the restricted access area).
4-5
-------
design considerations for developing physical security at new tacilities and retrofits
.P.
Perimeter Fence
Security Layers
Site Perimeter:
" Perimeter Fence
' Landscaping
© Vehicle Barriers
[ I Secured Gate
© Signage
Inner Perimeter:
-------
design considerations for developing physical security at new facilities and retrofits
TABLE 4-1
General Considerations for Physical Security at a Water Facility
Type Threat
Vandal
Criminal
Saboteur/
Terrorist
Perimeter
Site
Building Envelope
Building Systems
Fencing with barbed
wire
Locked gates
No Trespassing signage
In addition to above:
Well-lit parking areas
In addition to the above:
Increased fence height
Perimeter vehicle
barriers
Increased CCTV at site
perimeter
Clearzone
Standoff distance
Illuminated site areas with
6:1 light-to-dark ratio
In addition to the above:
Emergency telephones
In addition to the above:
Increased standoff
distance
Secondary fencing around
assets/facility
Vehicle inspection entry
with guard house and sally
port
CCTV at vehicle inspection
entry
Secured utility connections
Key-locked buildings 24/7
Illuminated building
exterior
Door ajar status alarm
monitoring
In addition to the above:
Signage that does not
describe assets
Visitor waiting area
Facility access control
CCTV at vehicle gate
CCTV at building
entrances
In addition to the above:
Turnstile personnel entry
Motion-activated lighting
Area presence sensors
Increased CCTV at
building perimeter
CCTV at building interior
Vandal-resistant materials,
such as composite
plastics, lights with low-
profile lenses, locks, cages
In addition to the above:
Bars on windows
Security deadbolts on door
locks
Shatter-resistant glazing
on glass
In addition to the above:
Forced-entry resistant
materials
Bomb-resistant glazing and
door materials
Blast walls at large
windows and entrances
Protected HVAC intakes
4.2.5 Cost Implications
Utilities, like most organizations, are required to use their financial resources wisely. This section
focuses on the considerations for effectively applying a utility's resources on security.
4.2.5.1 Threat Levels versus Cost
Threats are described based on type of adversary and severity of attack; anticipated tactics (such as a
theft or moving vehicle bomb); weapons, tools, explosives, and/or contaminant agents; and
likelihood of attack. Protective measures against high-level threats may (or may not) provide
sufficient protection against low-level threats, but utilities may want to consider all types of threats
during a threat assessment because the protective measures may differ for each type of threat
regardless of severity level. The summation of this information is referred to as the Design Basis
Threat (DBT). The DBT provides the information needed to design a physical protective system to
detect and delay an attack for the most probable adversary.
4-7
-------
design considerations for developing physical security at new facilities and retrofits
The vulnerability assessment considers the routes and means used to attack and to protect the asset
from attack. A vulnerability assessment may consider features and effectiveness of a existing facilities
or, as a design tool for new facilities, may consider how access can be gained to an asset, how the
asset may be compromised or destroyed, and similar considerations. The consequences of a
successful attack can also be considered when weighing the cost and impact of implementing
appropriate physical protective measures. For example, if vandals using spray paint is the DBT, it
may be costly to replace existing building finishes with materials that resist paint adhesion. If the
likelihood of the attack is low and consequences minimal (i.e., no loss of life, no mission disruption,
nor depletion of functionality anticipated after spray painting the building walls), the utility may
determine that the consequences do not justify the investment to address that DBT. In another
example, a successful theft may be disrupted after removal of the asset but before the thief
successfully escapes the site. This allows the delay factor to include "getaway" time as long as the
asset is still intact when the adversary is apprehended.
Identification of the DBT for a facility/asset/organization is an important management decision that
requires the input of various operational and management level personnel. The DBT has a potentially
significant impact on the cost and complexity of a security program that supports the utility's
mission.
4.2.5.2 Ensuring Security Investments are Effective
Typically, developing a vulnerability assessment involves defining a list of vulnerabilities and
potential improvements, ranked according to the potential risk. When presented with this list,
utilities contemplate what level of protection is acceptable and how many of the recommendations to
implement. In prioritizing security investments, utilities typically attempt to balance the external
demand for security with the limited internal resources available to implement security measures. In
addition to the legal considerations described in Section 1, "Introduction," there are other
considerations that may be addressed in answering this question.
A cost-benefit analysis can be performed for security improvements, as is commonly done for other
engineering alternative evaluations. A cost-benefit evaluation is most robust if benefits can be readily
quantified, and it is less effective when benefits are not easily converted to monetary terms. For
example, the cost of improvements in physical security (such as improved locks, alarms, and fencing)
can be compared to the value of avoided vandalism damages, yet it is difficult to quantify the value
of lives saved.
Security improvements can also be prioritized by comparing the cost to implement a security
measure against the degree of risk reduction that the measure would provide. For risk assessment
methodologies such as RAM-W™, the amount of risk reduction can be expressed numerically by
determining the risk score for an asset before and after the proposed security improvement. A cost-
to-risk-reduction curve can be generated (as shown in Figure 1-5), and a determination can be made
as to the measures that should be implemented by identifying the "knee of the curve," or the point at
which the risk reduction associated with implementing additional costly security measures becomes
marginal.
4-8
-------
design considerations for developing physical security at new facilities and retrofits
Reducing all components of a water system's risk in the case of a terrorist attack to low is, therefore,
not practical. Rather than attempt to reduce all risks to low, the utility would be better served by
implementing improvements that reduce risk to all critical facilities to medium. The resources saved
could be used to improve response in the case of an event. Thus, protection of the water system
mission could be strengthened by a combination of physical protection improvements to prevent an
attack and improved response, helping to ensure continued delivery of quality water in the event of
an attack.
A utility may choose to implement a security plan over multiple years, depending on funding
demands and current revenues. Utility management teams need to develop an implementation plan
that fits the projected financial conditions relative to the timeframe chosen for implementation.
Implementing security policies and procedures such as background checks, key control, and alarm
response procedures are usually relatively low in cost and often implemented first as part of a holistic
approach. When designing physical security for a new facility or a facility retrofit, improvements can
be prioritized in the following order, working from the outside perimeter to critical assets: perimeter
(e.g., fence, signs), site (e.g., additional lighting, video surveillance for alarm assessment), facility
(e.g., buildings and valve vaults with locks, alarms, and motion sensors), video surveillance for alarm
assessment, and building systems (e.g., to fix glass doors and windows, install tamper-resistant door
hardware).
4.3 Crime Prevention Through Environmental Design
Crime Prevention Through Environmental Design (CPTED) strategies deter crime by reducing the
opportunity to commit crimes, the likelihood that a crime will occur, and fear of crime generated by
experience related to certain environmental conditions. Deterrence is typically not considered in
vulnerability assessment methodologies such as RAM-W™, but deterrence can be a method to reduce
risk. The concepts embodied in CPTED strategies may be applied to all facilities, regardless of specific
threats, resulting in enhanced security as an integral part of design. Because CPTED strategies may be
widely and cost-effectively implemented as prudent measures regardless of specific threats, they
should be considered among the basic design considerations for new, upgraded, and expanded water
facilities of any size. CPTED strategies can be considered within the following four categories:
• Access control. Physical guidance of vehicles and people going to and coming from a space
through judicious placement of entrances, exits, landscaping, lighting, and control devices (e.g.,
guard stations and turnstiles).
• Territorial reinforcement. Physical attributes that express ownership, reinforce territoriality,
designating a gradient from public to restricted spaces. Examples include natural markers
(landscaping, choke points), symbolic markers (signage, stickers), physical barriers (fences), and
procedural barriers (receptionist, guard).
• Surveillance. The placement of physical features, activities, vehicles, and people to maximize
visibility by others during their normal activities. Surveillance may be natural or electronic,
informal (office windows placed to facilitate surveillance of entry roads) or formal (continuous
monitoring).
4-9
-------
design considerations for developing physical security at new facilities and retrofits
• Image and maintenance. Vigilant site and facility maintenance indicates that the space is being
used and regularly attended to, and possibly occupied. Proper ground maintenance also sustains
surveillance. Image and maintenance activities are most often related to management and
operations rather than design.
The following CPTED strategies should be considered for the design of water system facilities. As
with the other strategies in this document, each should be evaluated for its specific applicability to a
utility's needs before implementation.
4.3.1 Perimeter CPTED Strategies
• Provide outside access via no more than two designated and monitored entrances.
• Position all pedestrian entrances next to vehicle entrances.
• Control access with fences, gates, and/or attendants (guards).
• Provide sufficient lighting at all entrances.
• Create gateways or formal entrances delineated by plantings, different paving materials, fencing,
and gates to separate public areas from controlled areas.
• Define vehicle entrances by different paving materials and signage.
• Avoid opaque fencing, landscaping, and walls that might provide hiding places along the
perimeter.
4.3.2 Site CPTED Strategies
• Avoid dead-end driveways and pathways.
• Provide outside access to both the front and back of buildings to facilitate patrols.
• Provide close-in parking spaces for third-shift workers.
• Restrict access to roofs from adjacent buildings, dumpsters, loading docks, poles, and ladders.
• Place approach and parking as to be visible by building occupants, especially from a reception
area (if one is planned), operations center, and/or guard shacks.
• Use walls only where necessary; consider stretched aircraft cable as an alternative for maximum
visibility.
• Prevent creation of hiding places (e.g., blind pathways or storage yards).
• Plan storage yards for visual and/or vehicular access by patrol cars and/or facilities staff, but
limit access to personal vehicles.
• Use landscape plants that mature within the available space and do not obstruct light fixtures.
4-10
-------
design considerations for developing physical security at new facilities and retrofits
• Use plant materials that prevent easy passage as boundary delineators (e.g., crown of thorns and
other thorned shrubs, hollies, and Spanish bayonet).
• Include highly visible, appropriate signage, but do not describe the asset or facility function on
the signs. Use building numbers rather than names that could identify potential asset locations.
4.3.3 CPTED Strategies for
Building Envelope and Other Structures
• Design entrances to be well-lit, well-defined, and visible to public areas, facilities staff, and/or
patrol vehicles.
• Place elevators close to main entrances. The entire interior of the elevator should be in view from
the entrance when the doors are open; in addition, the entire entrance should be visible from the
interior of the elevator.
• Design stairways to be visible without solid walls.
• Position all employee entrances next to employee parking.
• Position restrooms to be observable from nearby offices or work areas.
• Design interior windows and doors to provide visibility into hallways.
4.4 Recommendations by Threat Level
The measures discussed in this section can provide specific and measurable results if implemented as
part of a comprehensive physical protection system. As noted, detection, delay, and response are the
basic elements of a physical protection system. This section addresses those physical security
elements that support detection (such as fencing that delineates a boundary at which detection is
provided) and delay or prevent the attack through application of target-hardening enhancements.
This section recommends protective measures that may be most appropriate for the specific threats
identified in Section 1: vandal, criminal, saboteur, and terrorist.
The measures indicated within this section were selected based on minimum measures being
implemented for many federal facilities, including Department of Defense (DoD), Department of
State (DoS), and General Services Administration (GSA) facilities. They relate to assumed threats
such as stationary vehicle bombs carried in trucks parked near targeted facilities, various levels of
forced entry, and ballistics threats. In addition, some recommended measures were developed from
the following: The Design and Evaluation of Physical Protection Systems by Mary Lynn Garcia and
course materials presented in the "Physical Protections Systems Training Course," offered by
CH2M HILL.
These measures are listed as general guidelines. The specific DBT for a facility affects the
implementation or selection of these measures, which in turn impacts implementation cost. For
example, a minimum 25- or 50-foot standoff distance from an asset is included as a default distance
where space allows. For high threat levels (very large quantities of explosives), this distance may be
insufficient; for extremely low quantities of explosives, such as what can be carried by a pedestrian or
4-11
-------
design considerations for developing physical security at new facilities and retrofits
bicyclist, a lesser standoff distance is possible. Explosive threats require specific design to balance
standoff distances (the least costly means of increasing survivability of structures against blast
threats) with hardening of construction assemblies.
The following considerations are in addition to those listed in the section above on CPTED strategies.
These protective measures are considered design and construction enhancements that "harden"
facilities to resist various types of attacks. Because the threats are in order of severity, protective
measures listed for each lower-level threat are not repeated for the higher-level threats but assumed
to be considerations for the higher levels as well. Figure 4-2 depicts the recommendation that the
design of all water facilities include CPTED strategies, and that for increasing threats additional
considerations are recommended to be added to the design.
f
\
>r \
Countermeasures
against vandal
threats
Section 4.4.1
v ^j
I*
Countermeasures
against criminal
threats
Section 4.4.2
rf-
Countermeasures
against saboteur
threats
Section 4.4.3 .
rf
Countermeasures
against terrorist
threats
Section 4.4.4
All ,
designs
1 Designs for ,
vandal threats
Designs for
i
criminal threats '
. Designs for
i
saboteur threats 1
, Designs for
FIGURE 4-2
Recommendations for Progressive Design Consideration
4.4.1 Countermeasures Against Vandal Threats
Vandals typically use basic hand tools, such as pliers, wire cutters, hammers, crowbars, and baseball
bats, to gain access to assets. They may also damage facilities using fire crackers, fuel to start fires,
improvised incendiary devices (IIDs), and spray paint. To prevent vandals from accomplishing their
objectives, numerous materials, assemblies, and components have been developed for areas that
attract significant vandalism and graffiti. These vandal-resistant items include:
• Composite plastics that resist graffiti, shattering, and scratches
• Lights with low-profile lenses or recessed lenses
• Security cameras and equipment
• Switches and controls
• Locks
• Valves
• Cages or other protective fittings
4-12
-------
design considerations for developing physical security at new facilities and retrofits
In addition to implementing vandal-resistant materials and components, the following physical
protection measures can be considered.
4.4.1.1 Perimeter Zone
• Provide 6-foot perimeter fencing with three-strand
barbed wire and break-away stanchions. Consider
high-quality fencing, but it does not have to be
specifically rated for vehicle crash-resistance.
• Establish a 25-foot minimum (preferably 50-foot or
greater) standoff distance from perimeter fencing
to the facility structure.
• Establish an 8-foot clearzone region on either side
of fence. This should be an important consideration
of the landscaping design.
• Within the clearzone region adjacent to the fence,
there should be no planted material or landscape
feature that is taller than 24 inches or wider than 15 inches at full maturity.
• If visual screening of the facility is desired outside the fenced perimeter, provide appropriate
landscaping no closer than 10 feet from fence. Verify that vegetation at full maturity will not
provide climbing advantage to an adversary attempting to enter site property.
• Provide 12-foot double swing gates for vehicle access, manually opened (non-electric).
• Close entrance gates and lock with a
shackle-protected padlock (as shown in
Figure 4-3).
• Provide exterior shackle-protected
padlocks that are weather resistant, with
4,500 Ibs. of resistance against pulling
Tips for Small Utilities
If a particular facility experiences
frequent acts of vandalism, consider
renting and temporarily mounting a
small CCTV system. The camera images
may then be shown to police and parents
in the area. In many cases, the
troublemakers live nearby and will stop if
the police confront them with camera
evidence. When the
vandalism stops, the system
may be removed and
returned or used at another site.
Hootenedtonm
Superior protection
against costing
shackle attacks and resistant to 10,000 Ibs.
minimum pressure from bolt cutter
attacks.
Solid Metal Shroud
Amiored protection
against be* cu»ws,
StaWess Steel
Bearing Lot kino
ProtecSofi rjgairar
prying and hammering.
Triple «ated, So«d Steei
Three layea of plating
provides high resistance
to rus? and corrosion.
High Security Minder
wtti Spool Mm
Provide high resistance
to pitting.
Reinforced interiodcing
construction lor high
impart resatonca.
Permits fast and easy
cylinder replacement
lo restore security.
FIGURE 4-3
Example of a Tamper-proof, Shackle-protected Lock
Post "No Trespassing" signage at
appropriate intervals (a minimum of
every 50 feet) on perimeter fencing. Install
signs that read "Trespassers Will Be Prosecuted" and "Video Surveillance." Follow local
municipal ordinances, and state and federal regulations in installing signs. Depending on the
diversity of the population, multi-lingual signs may be required. (Signs mainly serve as
deterrence to low-level threats such as vandalism.)
4-13
-------
design considerations for developing physical security at new facilities and retrofits
4.4.1.2 Site Zone
• For the standoff region between facility exterior and perimeter fence, use appropriate
landscaping vegetation, i.e., no taller than 24 inches or wider than 15 inches, with a density of less
than 15 percent of landscaped region at full maturity.
• No specific vehicle control measures are recommended because a locked main gate prevents
public vehicles from accessing site.
• Provide lighting in the site yard area between the facility and the fenced perimeter that is 1 foot-
candle, minimum.
• Provide lighting at entrance gates, roadway, and perimeter door entrances that is 2 foot-candles,
minimum.
• Provide a minimum light-to-dark illumination ratio of no greater than 6:1, and preferably 4:1, for
all lighting.
4.4.1.3 Building Envelope and Other Structures
• Lock exterior doors with a deadbolt cylinder keylock during business and after hours.
• Use hardened steel inserts on keylocks to protect plug face, shell, and sidebar, and for drilling
attack resistance.
• Provide facility exterior lighting that is 1 foot-candle, minimum.
• Locate door status switches at perimeter doors to monitor for door ajar and door forced-open
conditions. Use a high-security, balanced magnetic switch.
4.4.1.4 Building Systems
• Use non-removable bolts, hinges, screws, and other attachments to prevent removal of locks,
fittings, and other items that are attached to surfaces.
• For surfaces that may be subject to vandalism, use glazed concrete masonry units or glazed
ceramic tiles. Special vandal-proof tiles that look attractive but will not readily mark or scratch
are also available.
• Apply non-stick, non-mark polyurethane-based paints and coatings for internal or external
surfaces that are subject to graffiti.
• Use solvents specially designed to remove graffiti made using paint, lipstick, felt-tip pens, and
oil; solvents are available for easy-to-clean or untreated surfaces.
• Use rough-textured bricks, blocks, or rough concrete surfaces to resist damage. These could
present a challenge to vandals, although they are difficult to clean.
• Use climb-resistant cages around exterior ladders.
• Locate luminaries beyond reach, placing them on high posts or high on building walls.
• Locate lighting equipment away from hidden corners or behind buildings to discourage
tampering.
4-14
-------
design considerations for developing physical security at new facilities and retrofits
)• Select lighting and other exposed equipment with scratch and vandal-resistant finishes that
prevent corrosion, bending and deforming, and with locked and/or concealed fittings and
controls.
• Consider shatter-resistant plastic materials such as polycarbonate instead of glass.
• Select exterior furnishings of strong, vandal-resistant construction that are free of easily removed
or projecting parts and are easily repaired. Anchor items to concrete if possible.
• Locate signs beyond reach, where possible and feasible.
• Use vandal-resistant plastics in illuminated bollards, light fixtures, and traffic lights.
• Locate pipes, valves, and other appurtenances that may be damaged behind sturdy fencing or
panels with tamper-proof fastenings.
• Use materials that are nonflammable.
4.4.1.5 Critical Assets
• Provide locked security cages around meters and exposed valves or fittings. Use vandal-resistant
locks.
• Fence the top of smaller site elements to completely enclose critical areas within the site.
• Provide status switch alarms on all hatches or vault covers to monitor for forced-open conditions.
4.4.2 Countermeasures Against Criminal Threats
The criminal threat includes weapons such as knives and handguns, as well as hand and power tools.
To accomplish criminals' objective of using stealth, power tools are unlikely to be employed except
by criminal threats that fall into the saboteur category. Criminals are generally assumed to be less
interested in creating damage than they are in obtaining an asset and leaving the crime scene
undetected. In addition to security systems considered to deter vandalism, consider the following.
4.4.2.1 Perimeter Zone
The measures that can be applied to the perimeter zone for a criminal threat are the same as those
that can be applied for a vandal threat (see Section 4.4.1.1, "Perimeter Zone").
4.4.2.1 Site Zone
• Provide emergency telephones throughout site, enabling staff to summon emergency help.
Another option would be to provide operations staff with panic buttons that immediately
summon emergency help when activated.
• Bury or otherwise protect conduits and wires carrying electric supply, telecommunications, and
alarm signals.
4-15
-------
design considerations for developing physical security at new facilities and retrofits
4.4.2.2 Building Envelope and Other Structures
• Minimize signage that may guide adversaries to specific asset locations. Refer to room numbers
rather than asset locations.
• Provide warning signs to restrict access, but avoid describing the asset or reason for the
restriction.
• Provide a waiting area for visitors.
• Provide a facility access control system that:
- Monitors perimeter openings (personnel doors, rollup doors, and roof hatches) and locked
interior doors for door ajar status.
- Establishes a primary entrance door and adds access control, a visitor intercom, and video
surveillance equipment.
- Identifies critical exterior circulation doors. These doors should be designated as access-
controlled doors and should be accessible only by employees. Access-control methods could
consist of adding key locks, keypads, or card readers with or without entering a personal
identification number (PIN) for entry.
Designates remaining doors without exterior access control as exit-only. Exterior door
hardware from exit-only doors is removed. Appropriate exit hardware remains on the
interior side of the doors, allowing free egress under emergency conditions.
Establishes a secure lobby area, with hardened doors capable of being activated by security to
go to "lock-down" mode.
• Consider adding layered access control to high-value areas within the facility (such as SCADA
rooms).
• Segment access control such that only employees requiring access to high-value areas are
permitted access, rather than all employees having access to all areas.
4.4.2.3 Building Systems
• Locate door locks minimum of 40 inches from adjacent windows.
• Use single-cylinder dead bolt locks with minimum 1-inch throw on primary ground floor exits.
• Equip solid exterior doors with 180-degree door viewers.
• Minimize windows, including those in glazed entrance doors.
• Use shatter-resistant glazing materials.
• Use two locking devices on all windows.
• Consider installing bars or grilles inside windows.
• If DBT includes the potential to threaten people with handguns, provide bullet-resistant
construction assemblies (e.g., walls, windows, and doors) in those areas. For example, provide
bullet-resistant prefabricated guard shelters, control rooms, or bill-paying booths for accounts
receivables areas.
4-16
-------
design considerations for developing physical security at new facilities and retrofits
4.4.2.4 CCTV Surveillance
• Provide CCTV camera system, with integration to security access control system. In an ideal
setup, CCTV video images would be viewed directly on the access control computer workstation
monitors, with alarm images called up and displayed automatically during security events using
a single program. =^^====^^^^^
Tips for Small Utilities
. Suggested Camera Locations: When contemp|atjng a sma|, CCTV
Vehicle Gate: Provide a minimum of one color, camera system at a remote site,
fixed-position camera viewing each vehicle entrance C0^idfr ca™ras havin9 '"*^
hard disks which can store images
gate. Position camera to view car, driver, and |oca||y at the ^ reducjng the need
vehicle license plate. Image target (incoming for costly cabling and
vehicle) typically occupies a minimum of communications back to the security
25 percent of image scene. headquarters. During an alarm
condition, these cameras can signal
Building Entrances: Provide a minimum of one the securjty Qr SCADA system that a
color, fixed-position camera at each exterior door security alarm event is occurring,
viewing incoming personnel entering facility. Image «*nd responders can view
., and retrieve video onsite.
target (entering personnel) to occupy minimum of ^^^^^^^^^^^^^^
25 percent of image scene.
4.4.2.5 Critical Assets
• Locate critical assets and functions to the interior of facilities to maximize layers of delay between
access points and assets. The assets should be in view of areas occupied 24 hours per day
if possible.
• Locate critical assets and functions in areas of buildings where they may be difficult to find. For
example, locate control rooms or accounting areas away from lobby areas.
4.4.3 Countermeasures Against Saboteur Threats
Saboteurs intent on destruction, disruption, or contamination will avail themselves of an almost
unlimited variety of hand, power, and thermal tools (including construction tools such as cutting
torches), contaminant agents, lEDs, and IIDs, as well as higher-level ballistic weapons. This
represents a significant threat level and effective protection measures can be very costly. Consider the
following security systems in addition to those for the vandal and criminal threats.
4.4.3.1 Perimeter Zone
• Increase fencing height to 8 feet, with 3-strand barbed wire and helical razor wire as top dressing
with break-away stanchions.
• Provide secondary secure fencing (anti-climb) around critical assets or primary facilities.
4-17
-------
design considerations for developing physical security at new facilities and retrofits
• Increase standoff distance. If conventional building construction is used, the standoff zone is
generally a minimum of 45 meters (148 feet)5 from asset location to provide survivability against
vehicle bombs. However, depending upon the DBT, the standoff distance necessary may be
substantially greater. Refer to DoD's Unified Facilities Criteria6 and the Army's IED Safe Standoff
Distance Cheat Sheet7 for further guidance.
• Control access to sites by unauthorized vehicles through use of an entry control point for
vehicular and pedestrian traffic (Figure 4-4). An effective entry control point provides these
features:
Means to associate vehicle with driver, such as validation of the drivers' identification prior
to authorizing access
Mechanism to turn away unauthorized vehicles or pedestrians
Location, including bomb detection equipment, for inspection of vehicles and their contents
Location to detain unauthorized persons and their vehicles
Bullet-resistant guardhouse with toilet facilities and weather protection
Turnstile for pedestrians that can entrap potential adversaries failing validation of
identification
Barrier to prevent a vehicle from
penetrating the gate or crashing into the
guardhouse
Crash-resistant gate
A telephone or intercom
Dual-vehicle entrance gate to eliminate
tailgating (where a second vehicle,
bicycle, or person on foot enters after the
first vehicle)
• Design entry control points to provide
unimpeded access by emergency vehicles
(e.g., fire-rescue, police, ambulance).
• Provide vehicle barriers surrounding
FIGURE 4-4
Entry Control Point with Protected Guardhouse
perimeter of site, capable of stopping a 4,000-pound vehicle traveling at 30 miles per hour within
5 feet or less.
- Vehicle barriers to resist moving vehicles can be designed for the vehicle weight, including
explosives carried, and the speed at which the vehicle may be traveling. The location of
the barrier can consider the time to activate and fully deploy the barrier before the vehicle
reaches the barrier, as well as the acceleration opportunity that distance allows for
the vehicle.
5 DoD Minimum Antiterrorism Standards for Buildings.UK 4-010-01, October 8, 2003
6 Ibid.
7 Improvised Explosive Device (IED) Safe Standoff Distance Cheat Sheet, U.S. Army
4-18
-------
design considerations lor developing physical security at new facilities and retrofits
Vehicle barriers to resist moving vehicles may be active or passive depending on the
application requirements. If unrestricted access is generally required with deployable barriers
available to stop unauthorized vehicles, active barriers can be used.
Active barriers that resist ramming include: ^_____^_.^^_^
Tips for Small Utilities
• "Pop-up" bollards
• Hydraulic ramp, wedge, and plate barriers
• Manual plate barriers
• Portable crash barriers
Passive barriers that resist ramming include:
Installing landscaping
boulders around perimeter
areas can serve as a cost-
effective and attractive yet
practical vehicle barrier.
• Aircraft cable barriers that may be integrated into the perimeter fence. Aircraft cable should have
anchorage and foundation systems designed to resist the forces of moving vehicles loaded with
explosives (Figure 4-5).
• Landforms and landscaping
elements such as ditches, berms,
heavy vegetation, boulders,
bollards (designed to resist
vehicle ramming), and concrete.
• Provide remote meter reading
devices or locate meters outside
of the perimeter barrier to
eliminate the need for electric,
gas, and water meter readers to FIGURE 4-5
come onto the facility site. Perimeter Fence with Aircraft Cable Anchored to Concrete
4.4.3.2 Site Zone
• Control the potential for vehicles to gain speed between the entry control point and assets by
chicanes, speed bumps, or other traffic-calming devices.
• Select sites for critical assets that allow minimum 100 feet stand-off distance around occupied
facilities and the critical assets that may be subjected to attack.
• Consider placing critical assets below grade or using earth-sheltered buildings to protect assets.
• Provide redundant critical utility connections, such as power service, communications, water,
and wastewater, for high-security assets.
• Secure exposed exterior valves, hydrants, manholes, pipes, or other appurtenances.
• Enclose exterior areas housing critical assets with expanded metal mesh enclosures, reinforced
grouted concrete block, or reinforced concrete walls with roof grilles to prevent access to assets.
• Locate fuel tanks, natural gas lines, or fueling stations as far from critical assets as possible.
4-19
-------
design considerations for developing physical security at new facilities and retrofits
4.4.3.3 Building Envelope and Other Structures
• Use forced entry-resistant window and door assemblies. Assemblies can be rated for forced-entry
resistance commensurate to the DBT level anticipated (rated assemblies are tested for minutes of
resistance to attack using various combinations of hand, power, and thermal tools) and should
include the entire assembly: window/door, frame, anchorage to wall, and lock and hinge
hardware.
• Provide high security, forced entry-resistant hardware, including locks, lock bolts, and hinges.
• If a magnetic lock is installed at a facility door, the 2000 edition of National Fire Protection
Association (NFPA) 101, Life Safety Code, Section 7.2.1.8.2 requires a request-to-exit motion
sensor and a push-to-exit button at the door. The security panel should have a connection to the
facility's fire alarm panel (if there is one onsite).
4.4.3.4 CCTV Surveillance
No cameras are provided for general site surveillance. However, if general surveillance capabilities
are desired, provide one pan/tilt/zoom color camera with a minimum of three presets for viewing
site conditions from a remote location.
Suggested camera locations for vehicle gates and building entrances are the same as those that can be
applied for a criminal threat (see Section 4.4.2.4, "CCTV Surveillance").
4.4.4 Countermeasures Against Terrorist Threats
Unless a terrorist is intent on stealth, detection is relatively easy and of little importance to the
terrorist. Depending on the specific DBT, the following tactics may be employed by terrorists:
stationary vehicle bombs parked near targeted facilities; moving vehicle bombs; carried explosives
and lEDs; rocket propelled grenades (RPGs) and mortars; IIDs; any type of hand, power, or thermal
tools; automatic assault-type weapons; and contaminant agents.
Protective measures to resist blast threats are intended to prevent or minimize casualties; more costly
systems may result in greater survivability and reusability of structures. Blast threats require specific
blast engineering to develop appropriate resistance levels to various explosives threats. The greater
the distance a blast can be kept from assets, the less likely the asset will be injured or damaged, so
standoff distance is paramount where space allows. In addition to appropriate protective measures
listed for the vandal, criminal, and saboteur threats, consider the following improvements relative to
the utility's DBT.
4.4.4.1 Perimeter Zone
• Establish a "no stopping" zone along the roadway serving the facility, with appropriate signage.
Security personnel or local law enforcement can monitor and patrol the roadway and have
stopped or parked vehicles towed.
• Provide a security checkpoint with guards and electronic access control equipment to search
vehicles travelling within the standoff zone.
4-20
-------
design considerations for developing physical security at new facilities and retrofits
The security checkpoint can consist of a guardhouse adjacent to a vehicle sally port where
vehicles can be detained until the driver identity can be confirmed and the vehicle contents
and undercarriage can be examined.
Provide bullet-resistant guardhouses with toilet facilities and weather protection. Barriers can
prevent a vehicle from penetrating the gate or crashing into the guardhouse.
Install a video surveillance system at the sally port.
• To reduce search requirements, exempt authorized personnel with appropriate credentials
(personal and vehicle IDs that are linked in databases for validation) and who have had
background checks.
• Require pedestrians to pass through a high-security turnstile (which may be used to entrap
potential adversaries failing validation of identification). Other options include providing a
location to detain unauthorized persons and their vehicles.
• During unmanned periods, crash-resistant gates can be used. A telephone can be provided for
use by on-call personnel for entry, if required.
4.4.4.2 Site Zone
• Locate assets away from vantage points from where weapons such as RPGs may be fired.
• Provide pre-detonation screens at site perimeter between assets and vantage points. If provided,
pre-detonation points should be as far as possible from assets, including parking areas and
occupied buildings.
• Consider circulation and access to site facilities, including service and mail deliveries. Provide
sufficient area to allow location of receiving areas to be a minimum of 100 feet away from
occupied facilities or assets in the event bombs are delivered in service or delivery vehicles.
• Prevent parking adjacent to and under/over facilities (such as rooftop parking or parking under
occupied sections of buildings). Keep unrestricted parking areas as far from buildings as possible.
• Park vehicles in publicly accessible spaces at least 100 feet from the structure.
• Locate areas for dumpsters and trash barrels as far away from asset locations as practical.
• Provide motion-activated lighting at the building perimeter and site yard for "instant-on" from
nominal 1.0 foot-candle illumination to 5 foot-candle illumination under motion activity.
• For alarm assessment, provide a minimum of one color, fixed-position camera viewing each
alarmed site element (hatch, substation, etc.). Position camera to view protected asset and
attacker. Image target (attacker) to occupy 30 percent of image scene.
• For parking lot surveillance, provide a minimum of two color, low-light capable, fixed-position
cameras for viewing parking areas. Position camera to serve an approximately 200-foot by
100-foot field of view. Provide sufficient cameras to monitor entire parking lot areas.
4-21
-------
design considerations for developing physical security at new facilities and retrofits
• For site surveillance, provide a minimum of one color, low-light capable, pan/tilt/zoom camera
with a minimum of three presets for viewing site conditions from a remote location. Camera to
serve approximately 200-foot by 200-foot region. Add cameras as necessary to serve entire site.
• Provide site intrusion detection system, using one of three sensor technologies as applicable to
site conditions: microwave, buried cable, or fence-mounted.
4.4.4.3 Building Envelope and Other Structures
• Provide area presence sensors within the interior spaces to monitor for unauthorized presence of
personnel within the building. Presence sensors to be dual technology (passive infrared and
microwave) high-security sensors.
• Install area presence sensors approximately every 75 feet within the building interior and at
critical corridor intersections.
• Install interior detector sensors that meet Underwriters Laboratory (UL) Standard UL639,
Intrusion Detection Units (http://ulstandardsinfonet.ul.com/scopes/0639.html).
• Provide push-button duress system for signaling operator assistance. When an operator who is
threatened or under attack presses the duress button, the security system is notified that there is a
security condition alert, and response personnel are dispatched to the scene to investigate.
4.4.4.4 Building Systems
• Locate blast walls behind entrances and large windows to prevent glass shards from penetrating
building interiors.
• Design building systems to resist blast and aerosol contamination attacks that may be included in
the DBT.
• Isolate areas where bombs could be received, including loading docks, mail rooms, storage areas,
and lobbies. If provided, isolation should be accommodated in both structural and mechanical
systems. Provide vestibules at entries.
• Locate air intakes high (a minimum of 10 feet above grade) in building walls to prevent
contaminants from being introduced. Verify that equipment, loading docks, trash receptacles,
ladders, and other building or site appurtenances do not allow access to air intakes. Where
locating air intakes away from these items is not feasible, move air intakes to higher elevations.
• Provide breathing mask dispensers in convenient locations.
• Protect openings to air intakes with sloped mesh screens to prevent objects from being tossed
into intake openings.
• Install low-leakage dampers to minimize penetration of introduced contaminants after HVAC
system is shut down.
• Where a chemical, biological, or radiological (CBR) release at some distance from a facility is part
of the DBT, design facility for air tightness or pressurize facility to limit infiltration.
4-22
-------
design considerations for developing physical security at new facilities and retrofits
Establish a protected clearzone around ground-level or low air intake openings with entry
restricted to authorized personnel only. Clearzone may be fenced or walled (provisions for air
circulation required by air intake and HVAC equipment should be considered). Illuminate and
monitor the clearzone (guard patrols or CCTV).
Provide grilles with openings no larger than 6 inches in diameter (both intake and return air).
Grilles should be forced-entry resistant and anchored firmly into the building structure to
prevent penetration through ductwork or openings.
Prevent unrestricted or public access to rooftop areas where mechanical equipment is located.
Other roof openings, including skylights and roof scuttles, should be locked and replaced with
forced entry-resistant assemblies.
Restrict access to mechanical equipment yards and rooms to authorized personnel only.
Illuminate and monitor entrances to these areas.
Evaluate building control programs to consider isolation and zoning of various areas of facilities
that house critical assets, especially with respect to egress areas, and that may be targeted by
contamination tactics, automatic shut-off switches to zones or facilities, and pressurization and
airflow control. "Shelter in Place" concepts require a single point of control to immediately shut
down all HVAC systems when a contamination event has been detected or is anticipated (i.e., if a
cloud is moving toward a facility). This switch should also be readily accessible to building
personnel or facility manager.
Install back-draft dampers on exhaust fans.
Provide safe rooms with separate, dedicated HVAC systems to provide secure areas for
personnel to move to when the facility may be exposed to contaminants. Safe rooms should
include indoor air purifiers.
Use ducted returns to limit access points from which CBR contaminant agents may be
introduced.
Minimize mixing between HVAC zones.
Evaluate adsorbent filtration options with respect to specific DBT contaminants. Higher efficiency
filtration may be beneficial for certain exposures, but not effective against chemical vapors or
gases used in chemical attacks, and will likely be extremely costly, require extensive area to
accommodate filters, and reduce airflow. Refer to National Institute of Occupational Safety and
Health (NIOSH) guidelines for more considerations and information.
4.5 Water Quality Monitoring
The use of water quality monitoring systems for security purposes is a relatively new and, currently,
relatively rare application among water utilities. Thus, guidance for the design of water quality
monitoring systems, that is, early warning systems (EWSs), is rather limited. Despite the extent of
information gaps in the design of EWSs, some utilities are proceeding in installing EWSs in their
4-23
-------
design considerations for developing physical security at new facilities and retrofits
utilities. These can be considered best-in-class utilities and their experiences are helping the
development of industry-standard practices and guidance for other utilities.
As mentioned in Section 3, "Operational Considerations for Enhancing Physical Security," there are
three key documents that provide information on the subject. They are Grayman, et al. (2001) for
source water, Pikus (in press) for distribution systems, and Hergesheimer, et al. (2002) for both. These
documents provided information for the guidance provided here.
The reasons for installing EWSs can be summarized as follows:
• They should detect accidental or intentional contamination of the water supply by chemical
(including biotoxins), biological, and radiological contaminants early enough to take
countermeasures, if possible.
• The consequences of contamination would put public and employee health, public confidence,
and regulatory compliance at risk.
• There should be as few false positives and false negatives as possible.
• They should be affordable and cover as many customers as possible.
To meet these objectives, the factors discussed below need to be considered in the design of EWSs.
4.5.1 Contaminants of Concern and Their Concentrations
A comprehensive list of potential contaminants that include chemical (including biotoxins),
biological, and radiological contaminants would be large and unrealistic to tackle. Lists of potential
contaminants have been developed (Pikus 2004). Utilities should not take any general list as
definitive for the specific purposes of its use. Contaminants that are more readily available in a
specific region or that seem for any other reason to be more appropriate for the utility in question to
consider should be added. Utilities, using their DBTs, are responsible for identifying the
contaminants for which they should design their EWSs.
Although there is no consensus on the concentrations that need to be detected, it appears that
concentrations above NOAEL should be considered. NOAEL is defined as "the greatest concentration
or amount of a substance, found by experiment or observation, which causes no detectable adverse
alteration of morphology, functional capacity, growth, development, or life span of the target
organism under defined conditions of exposure." (Pikus 2004).
4.5.2 Fate and Transport Models for Contaminants
In the selection of the instruments and their locations, utilities need to understand where the
contaminants travel and what kinds of changes occur during their transport. For surface waters spill
models are typically used to estimate the fate and transport of contaminants, while distribution
system network models are used for distribution systems. Water utilities need to have access to
appropriate models to apply to their water supply systems.
4-24
-------
design considerations for developing physical security at new facilities and retrofits
4.5.3 Sampling Frequency and Integration
with Existing Water Quality Monitoring Programs
Water systems monitor water quality for both regulatory and operational performance purposes.
Water samples are collected at specific locations and, depending on the parameters, are either tested
at the field or in the laboratory. These grab samples are collected periodically from a relatively small
number of locations. Because a contamination event may last a relatively short period of time, grab
sampling may miss contamination events of concern. Furthermore, regulatory samples are typically
sent to laboratories, adding more lag time to the detection of a contaminant.
As such, continuous or near continuous monitoring (in-line or on-line) is recommended for EWSs.
Most utilities already collect continuous samples at their plants, monitoring parameters such as flow,
pH, turbidity, and chlorine residual, so there is already a foundation for continuous monitoring in
water systems. The challenge is selecting meaningful parameters, instruments, and locations for
sampling. At this time, due to technological limitations, the presence and properties of contamination
are inferred from changes in surrogate parameters. Unfortunately, the sensitivity and accuracy of
these parameters by which the contamination event can be detected is still questionable.
In designing an EWS, a utility should integrate it with its existing monitoring program by using staff
already knowledgeable in sample collection, analysis, and instrumentation.
4.5.4 Selection of Instruments
Until further advances occur in instrumentation, the emerging practice is the use of Tier 1
instruments for detecting contamination and its location. Tier 1 instruments typically measure
changes in some of the basic properties of water, such as pH, oxidation reduction potential, chlorine
residual, TOC, and adsorption of light. These measurements should be followed by Tier 2
instruments for identifying the contaminant and its concentration (including the use of laboratory
analysis).
In the selection of instruments, consider the following:
• parameters measured, sensitivity, accuracy, reliability, ruggedness, cost
• characteristics of the instrument location (see Section 4.5.3, "Sampling Frequency and Integration
with Existing Water Quality Monitoring Programs")
• O&M characteristics such as maintenance requirements, down time, calibration and testing
requirements, housekeeping, and data reporting capabilities
4.5.5 Siting of Instruments
Identifying where to place an instrument is relatively easy for source water, but very complex in
distribution systems. In source waters the pathway of water is known, so the instruments are
typically placed upstream of the intakes with the distance and location somewhat determined by the
use of surface water spill models. In the case of distribution systems, as the intrusion point and time
of the contaminant are not known, there is an infinite number of potential locations that the
4-25
-------
design considerations for developing physical security at new facilities and retrofits
instrument could be placed. A utility needs to identify the best locations and number of instruments
that will cover the largest number of consumers within its budget. Depending on the technical and
financial resources of a utility, these locations could be identified either by using staff intuition, or
distribution system network simulation models, or distribution system network optimization models.
Because optimization models are too complex for routine utility use, the other options should be
considered. While simulation methods are better than intuitive methods (because they incorporate
some of the intuitive factors), there is no implication that sensors located there will 1) detect the
contaminants 2) in a timely fashion. EPA's PipelineNet model can be used for this purpose.
Regardless of the method used, both local and system-wide factors need to be considered in the
selection of candidate sites (Pikus 2004).
4.5.5.1 Local Factors
• Easy access to the instrument site by authorized personnel
• Available space for the instruments and auxiliary equipment
• Suitability of candidate instruments or sample collection method for the sampling site
• Physical security of the instrument site
• Hydraulic conditions at sampling sites
• Existing water quality sampling sites
4.5.5.2 System-wide Factors
• Potential areas or entry points of contamination
• Likely contaminants
• Contaminant transport time and concentration
• Vulnerable populations (such as children, elderly, sick) at different parts of the network
• Relative water demand and associated flow characteristics
• Frequency of sampling, i.e., periodic vs. continuous sampling,
4.5.6 Data Analysis and Interpretation
Pikus lists the following objectives for analyzing the data from EWS instruments:
• To identify the presence and location of significant contamination in the system (essential)
• To identify the contaminant or its class with sufficient specificity to allow appropriate responses
(desirable)
• To characterize the contaminant concentration profile (pulse morphology) (desirable)
• To determine time to consumer (essential)
• To eliminate false negatives and minimize false positives (essential)
4-26
-------
design considerations for developing physical security at new facilities and retrofits
• To assess public health risk (highly desirable)
• To provide timely information to decision maker (essential)
To properly interpret the data from instruments, reasons for water quality parameter variations need
to be well understood. The sources of variation include:
• noise in the instrument
• variations in the actual properties of the water
• variations in the measured parameters from changes in operating conditions
To determine whether a set of readings is an indication of contamination, a utility needs to
distinguish between a contamination event and the other possible causes of the measured changes.
For this reason, the utility needs to identify the baseline water quality characteristics of its source
water and its potable water in the distribution system. This baseline will require at least one year of
water quality sampling and analysis of parameters monitored via an EWS, enabling the utility to
better interpret whether the variations in water quality are due to contamination or other reasons.
4.5.7 Communication System Requirements
An EWS typically consists of a number of instrument platforms located throughout the water system
that are operating continuously and producing large quantities of data. The data would be sent to a
central data analysis facility at which they would be processed and interpreted.
The data can be transmitted to the data analysis center over existing SCADA linkages or over
separately configured and managed linkages. Most utilities would probably prefer to use an existing
SCADA system for these communications. For security reasons, it is better to encrypt the data.,
although this might create compatibility problems with an existing SCADA system.
Proper guidance for such communications is provided in Section 5, "Cyber Security Management,
Operations, and Design Considerations."
4.5.8 Responses to Contamination Events
This factor is covered in Section 7, "Emergency Response Planning."
4.5.9 Operations, Maintenance, Upgrades,
and Exercising the System
Pikus (2004) provides extensive recommendations regarding these factors. They cover topics such as
unscheduled and scheduled downtime, preventive maintenance, built-in testing and diagnostics,
integration with SCADA, supplies, spare parts, and training for staffing.
4-Z7
-------
design considerations for developing physical security at new facilities and retrofits
4.6 Recommendations for
Source and Ground Water Facilities
In the security evaluation of water facilities, the raw water system, composed of the raw water
supply, intake, pumping, and transmission to the main plant, are typically considered to be critical
components of the water supply system.
Table 4-2 provides general security design consideration for surface and groundwater facilities. The
following subsections provide more specific measures by facility.
TABLE 4-2
Source (Ground and Surface) Water Supply Threat and Security Design Considerations
Threat Type Threat Security Design Considerations
Vandal Malicious damage Harden facility using cage, fencing, locks
Use appropriate signage and lighting
Provide intrusion alarm
Criminal Equipment theft Chain and lock portable equipment
Install card access system
Saboteur/Terrorist Destroy or disable facility systems Install CCTV at facility perimeter
Contaminate water Install alarmed entry
Injure employees Install alarmed interior presence sensors
Use multi-parameter water quality probe
Restrict boat access to intake
Insider/Additional Revenge, personal gain Restrict access by job function
Considerations
4.6.1 Wells
Consider the following security design measures for wells:
• Enclose the wellhead with cages or buildings that restrict access to avoid physical destruction or
intentional contamination of well water supply. Cages can be of simple construction, such as a
reinforcing bar.
• Protect gravel chutes and chemical application points with a cage to avoid intentional
contamination of the water supply.
• Use shackle-protected locks to prevent the lock from being cut by a bolt cutter.
• Post warning signs on the perimeter fence for deterrence and to protect the utility from liability.
Follow local ordinances when signs are installed. Depending on the diversity of the population,
multi-lingual signs may be required.
• Increase site lighting to allow suspicious activity to be easily noticed by citizens or passing law
enforcement. Motion-detecting lighting can be used in area where local residents are sensitive to
external lighting in facilities.
4-28
-------
design considerations for developing physical security at new facilities and retrofits
• Dual utility power supplies from different substations or a backup power generator will provide
a continuous supply of water even when the primary utility power supply fails.
• Provide redundancy for treatment, disinfection, and water quality monitoring structures, which
typically consists of aeration, pH adjustment, and disinfection.
• Use a multi-parameter probe to measure contaminants such as pH, oxidation-reduction potential,
conductivity, turbidity, chlorine residual, and dissolved oxygen in the aquifer or well discharge
for early detection of chemical/biological contamination. Major deviations from the baseline of
these parameters would indicate potential biological or chemical contamination of the water.
4.6.2 Rivers, Lakes, and Reservoirs
Design considerations to protect water supply from rivers, lakes, and reservoirs include:
• Source water watershed protection.
• A multi-parameter probe to measure contaminants such as pH, oxidation-reduction potential,
conductivity, turbidity, chlorine residual, and dissolved oxygen in the river for early detection of
chemical/biological contamination. Major deviations from the baseline of these parameters
would indicate potential biological or chemical contamination of the water.
• A fence around the facility or site. However, this may not be feasible depending on the size of the
facility/site and may also be opposed by the public because it will not be aesthetically pleasing.
• Consider an aquarium-type fish tank where small portion of raw water is directed to the fish
tank. Effects to the fish will indicate water contamination. This is a basic system that requires
operator attention, although there are more sophisticated units available to alert the operator.
4.6.3 Dams
Dam breach can have a significant impacts downstream: flooding, loss of life and property and loss of
water supply source. Vulnerability assessments for dams can be conducted using the RAM-D tool
developed by Sandia National Laboratories. Based on the results from the assessment, some of the
following security improvements can be applied. Design considerations to improve security at dams
include these:
4.6.3.1 Basic
• Restrict access to the spill way, overflow, and intake to avoid placement of explosives at these
structures.
• Restrict vehicle access on the dam using locked gates or bollards.
• Warning signs on the perimeter fence for deterrence and to protect the utility from liability.
4-29
-------
design considerations for developing physical security at new facilities and retrofits
4.6.3.2 Advanced
• Use boom systems or turbidity curtains, as shown in Figures 4-6 and 4-7, to restrict boat access to
the intake to avoid contamination of water.
• Use video cameras for alarm assessment to verify whether the
alarm is real or a nuisance alarm so that the utility can take
appropriate action.
• Limit switches on gate operators to alert the operator when
someone is closing or opening the gates on dams.
FIGURE 4-6
Boom System
Increase lighting so that
suspicious activity can be
easily noticed by citizens or
passing law enforcement.
Web Strips
White or Yeltcw flaat Collar
Brass
Grommets
Optional 5/16"Chain curtain ballast
FIGURE 4-7
Turbidity Curtain
Design considerations to improve
security at intake, pretreatment,
and water quality monitoring structures include:
• If the utility is considering a second intake, it is recommended to spatially separate the two
intakes so that an impact on one intake does not affect the other.
• An intruder alarm can alert an operator when an unauthorized person gains access to the facility.
• Video camera for alarm assessment can verify whether the alarm is real or a nuisance alarm so
that the utility can take appropriate action.
4.7 Recommendations for Raw Water Conveyance Facilities
Table 4-3 provides general security design considerations for raw water conveyance facilities. The
following subsections provide more specific measures by facility type for utilities to consider.
TABLE 4-3
Raw Water Conveyance Threat and Security Design Considerations
Threat Type
Threat
Security Design Considerations
Vandal
Criminal
Cause malicious damage
Steal equipment
Harden facility using cage, fencing, bolting
Use appropriate signage
Provide intrusion alarm
Lock access
4-30
-------
design considerations for developing physical security at new facilities and retrofits
TABLE 4-3
Raw Water Conveyance Threat and Security Design Considerations
Threat Type Threat Security Design Considerations
Saboteut/Terrorist Destroy or disable facility systems Implement alarmed entry
Contaminate water Implement CCTV at pump station
Injure employees Install pipelines below ground
Insider/Additional Seek revenge, personal gain Restrict access to facility by job function
Considerations
4.7.1 Pump Stations
Redundant units and adequate capacities under peak flow conditions with at least one unit out of
service is generally considered a standard for design of pump facilities. Pump stations can be
designed to enable removal of pumps and motors for repair while maintaining the operability of the
facility at full capacity. If possible, at least two discharge pipes and two discharge locations should be
considered in the design to provide additional redundancy. Consider restricting access to the pump
station using access control systems.
4.7.1.1 Perimeter/General Site Security
• Install chain-link fence with three strands of barbed wire, break-away stanchions, and signs
50 feet apart.
• Use shackle-protected locks to prevent the lock from being cut using a bolt cutter.
• Use video cameras for alarm assessment to verify whether the alarm is real or a nuisance alarm
so that the utility can take appropriate action.
• Increase lighting so that suspicious activity can be easily noticed by citizens or passing law
enforcement.
4.7.1.2 Electrical Supply and Equipment
• Provide a redundant utility power supply from a different
Tips For Small Utilities
substation, pre-wired connection for a backup generator, or a
Smaller utilities can
portable backup generator. coordjnate ^ ^ |o(ja|
• Match the plug on the portable generator to the emergency Utilities Of rental
companies for generators
power receptacle at the pump station.
and pre-wire the facility to
accept the generator.
4.7.1 .3 Control Room _==_
• Use card access to restrict access to the control room to authorized personnel.
• Install a door status switch and motion sensor to alert operator when an unauthorized person
gains access.
4-31
-------
design considerations for developing physical security at new facilities and retrofits
4.7.1.4 Pumps and Appurtenances
Consider redundancy of critical components.
4.7.2 Pipelines and Appurtenances
When adding a second pipeline to meet additional demands, bury the second pipeline in a trench
that is physically separated from the first pipeline.
4.7.2.1 Underground and Aboveground Pipelines
• Reduce the area of aboveground exposure for the pipeline.
• Use high-pressure pipeline material (such as ductile iron) in exposed areas if the DBT includes
small explosive capabilities. If a significant threat exists, consider using Schedule 80 piping.
4.7.2.2 Pipelines on Bridge Crossings
• Use high-pressure pipeline material (such as ductile iron) in exposed areas if the DBT includes
small tools or small explosive capabilities. Consider using Schedule 80 pipe if a significant threat
exists.
• Protect the pipeline with fan structures or concrete encasement to restrict access.
• Replace overhead pipelines with pipelines in tunnels under the river or creek if the DBT includes
significant explosive capabilities.
4.7.2.3 Distribution System Appurtenances
• Add bolts that require a special wrench to unlock (where generally available screw drivers and
wrenches would not work) for access hatches and valve vaults.
• Add protective cages over aboveground appurtenances to restrict access.
4.8 Recommendations for Water Treatment Facilities
Two key design approaches for limiting negative impacts to treatment plants are redundancy and
adequate capacity. Redundancy in design that is geographically distant provides multiple tanks,
basins, treatment units, pumps, and conveyance piping and channels to minimize the potential for
single points of failure, which are likely to be key targets for knowledgeable adversaries. Whenever
feasible, consider providing multiple trains for each process unit with bypass systems to enable an
individual process train to be removed from service. Similar redundancy for auxiliary and support
processes and equipment such as chemical feed pumps should be evaluated. Redundancy can be
extended to entire treatment trains of multiple process units that are, if possible, separated by a
physical distance but connected for maximum operational flexibility.
4-32
-------
design considerations for developing physical security at new facilities and retrofits
Flexibility to respond rapidly to unplanned shutdowns of process units should be considered during
design by allowing channels, gates, pumps, valves, and piping to enable tanks and pumps to be used
for different processes. Critical valves, gates, and transfer pumps can be automated to allow for quick
shutdown or diversion of flows. However, in the event that automated controls or SCADA systems
are compromised or inoperable, a means to operate the processes manually is recommended.
On-the-shelf spares, such as process pumps, motors, valves, meters, and controllers, provide
redundant critical components. Redundant utilities, particularly electrical power, are vital to a secure
operation. In addition to the need for at least two independent main power supplies to the treatment
facility, looped power distribution networks within the treatment plant should be considered to
enable rapid isolation and removal of a damaged power feed or inoperable electrical equipment from
the power net.
The approach for adequate design capacity works in tandem with redundant unit processes. At a
minimum, the design for individual processes should be conservative and meet peak demands with
one unit out of service. For treatment plants with multiple trains, consider peak demands with one
train out of service. Higher redundancies should be considered for critical processes, such as
disinfection systems, where redundancies are often 100 percent of design capacity.
Where practical and feasible, tanks and open channels should be covered, and the access doors and
hatches should be secured. Critical components such as pumps, motors, motor control centers, and
SCADA components can be secured within enclosures and hidden from view. Where feasible, piping
and appurtenances can be installed below ground or within secured structures. Locking mechanisms
can be considered for critical valves and gate operators.
However, designers should consider the impacts of limiting access to normal O&M activities.
Adequate access and room for routine maintenance and repair can be considered in the layout of
individual unit processes. The ability to remove enclosures may be necessary to replace or repair
equipment.
Table 4-4 provides general security design considerations for water treatment plants. The following
subsections provide more specific measures by facility type.
TABLE 4-4
Water Treatment Facility Threat and Security Design Considerations
Threat Type Threat Security Design Considerations
Vandal Cause malicious damage Harden facility using fencing, locks, and bollards
Install appropriate signage and lighting
Provide intrusion alarms
Criminal Steal equipment Lock access ladders, hatches, buildings, and gates
Install a card access system for building entry
Harden windows, doors, and other entry points
Provide signage with no asset information
4-33
-------
design considerations for developing physical security at new facilities and retrofits
TABLE 4-4
Water Treatment Facility Threat and Security Design Considerations
Threat Type Threat Security Design Considerations
Saboteur/Terrorist Destroy or disable facility Install CCTV at facility perimeter
systems install alarmed entry
Contaminate water install alarmed interior presence sensors
Injure employees use multi-parameter water quality probe
Provide vehicle inspection area
Install vehicle barriers
Install redundant power connections
Install tamper-switches on SCADA panels
Install duress switches for operators
Install bolting for critical valve vaults
Insider/Additional Seek revenge, personal gain Restrict access to areas by job function
Considerations Provide secure fence to isolate critical assets within facility
4.8.1 Conventional Treatment Processes
The WTP unit processes for conventional treatment usually consist of pretreatment; flocculation and
sedimentation and filtration (supplemented by the backwash of the filters using a backwash supply
tank); and disinfection (including the use of a clearwell for storage and contact time).
4.8.1.1 Pretreatment System
Special considerations are required where the DBT includes adversaries with explosives. Individual
concrete structures, such as splitter boxes and pump stations, may serve as single points of failure
that can be hardened against the threat, or duplicated and separated to preserve functionality if one
unit is damaged.
4.8.1.2 Flocculation/Sedimentation and Filtration
• The redundancy of the flocculation/sedimentation trains reduces the criticality of each individual
train; however, loss of flocculation system could adversely impact water quality. The flocculation
basins are potential points of contamination. Limiting access, intrusion detection
• Maintain the effectiveness of filtration through an effective backwash or cleaning system.
Interconnected, dual backwash systems, each with a capacity for 50 percent of the peak flow, can
provide the redundancy desired. Chemical systems used to enhance filtration can also include a
measure of redundancy. Consider storing replacement media in a secured storage building away
from the filters.
• If pneumatic valves are used for the filter inlet/outlet control valves, consider a backup air
compressor for the pneumatic valves. Also, a pressure transmitter on the air supply to detect loss
of air supply to the valves can be added.
• Consider a backup power supply for key electrical valves.
4-34
-------
design considerations for developing physical security at new facilities and retrofits
4.8.1.3 Backwash Supply Tank
For plants with one backwash tank, obtain redundant backwash supply from tapping the finished
water discharge with appropriate pressure-reducing valves (PRVs).
4.8.1.4 Disinfection - Chlorination, Ozonation, Ultraviolet
Typically, the final step of water treatment is the disinfection process, a key process in the treatment
train. Adversaries may target this process in an effort to discredit the utility and promote concerns
and fear within the general public about the quality of the finished water. Increased security
approaches, such as more restrictive access control and hardened physical protective systems, are
warranted for this process. Regardless of the type of disinfection system used (i.e., chemical or
ultraviolet light), provisions or plans can be considered for a backup disinfection system using a
liquid disinfectant such as sodium hypochlorite. This backup system could consist of temporary
pumps, tanks, and piping.
For treatment plants using gaseous chlorine and/or gaseous ammonia, special design considerations
are required if the DBT includes saboteurs and terrorists, as these chemicals are highly toxic and have
the potential for significant and dramatic impacts on employees and area residents if released into the
atmosphere. Standard design considerations for handling and use of these chemicals include, but are
not limited to, separate rooms and ventilation systems or independent buildings for storage and feed
equipment, leak detection and alarm systems, automatic shut-off valves if leaks are detected, and air
scrubbers for containment and neutralization of a release of the entire contents of the largest cylinder
or tank in the storage room. For threats including saboteurs and terrorists, countermeasures can
include an additional layer of security that includes secure fencing, detection devices, and monitoring
as described below.
In addition to very restrictive control of individuals authorized to enter these facilities (if deemed
appropriate to the threat), the design can include sufficient stand-off distances (parking lots are away
from these areas) and structural hardening to prevent damage and rupture to the gas cylinders or
tanks. Delivery areas and loading areas can also be tightly controlled and monitored. The following
security features can also be considered.
• Install a security fence to isolate toxic chemicals to
prevent unauthorized access to these sensitive
areas. Figures 4-8 through 4-10 show desirable
secure fencing characteristics.
• Use shackle-protected locks prevent the lock from
being cut using a bolt cutter.
• Install motion-sensors to alert the operator when
there is an unauthorized person onsite.
• Use a video camera for alarm assessment to verify
whether the alarm is real or a nuisance alarm so
that the utility can take appropriate action.
FIGURE 4-8
Secure Fencing with Aircraft Cabling
4-35
-------
design considerations for developing physical security at new facilities and retrofits
• Increase site lighting so that suspicious activity can be
easily noticed by utility employees.
• Use a card reader or key pad to limit access to only
authorized utility employees.
The best defense may be to avoid the use of extremely
hazardous chemicals (chlorine and ammonia), replacing them
with less dangerous chemicals (sodium hypochlorite and liquid
ammonium sulfate), and installing physical treatment processes
where possible.
FIGURE 4-10
Fencing with Openings
Too Narrow for Cutters to Grip
FIGURE 4-9
Fencing with Openings Too Narrow for
Adversary to Get a Handhold or Toehold
4.8.1.5 Clean/veil
• If there are two or more clearwells, ensure that one
can be isolated if it is contaminated to provide
finished water from the other clearwells. The utility
should consider installing a multi-parameter probe to
measure contaminants such as pH, oxidation-
reduction potential, conductivity, chorine residual, and dissolved oxygen in the clearwells for
early detection of chemical/biological contamination. Major deviations from the baseline for
these parameters may indicate potential biological/chemical contamination of water.
• For clearwell hatches, use unique shackle-protected locks and not locks that use a master so that
only authorized utility staff have access to minimize an insider threat.
• For clearwell vents, consider installing goosenecks with thick, double-meshed, offset screens that
cannot be easily cut to prevent chemicals from being introduced through the vents. For greater
protection, add internal baffles and a structure around the vent that would make chemical
addition more difficult while still providing an opening for ventilation.
• Use tide valves on clearwell overflow pipes in lieu of a flapper valves to minimize the ability to
introduce chemicals into the pipe.
• Add intrusion alarms on clearwells that are coupled with automatic effluent shut-off valves for
immediate isolation.
4-36
-------
design considerations for developing physical security at new facilities and retrofits
4.8.2 Auxiliary Systems/Components
Utilities have numerous opportunities to increase security throughout a facility as shown below.
4.8.2.1 Perimeter/General Site Security
• Install chain-link fence with three strands of barbed wire. Consider a fence detection system such
as fiber optic or taut wire.
• Post warning signs on the perimeter fence
for deterrence and for liability to protect the
utility. Follow local ordinances when signs
are installed. Depending on the diversity of
the population, bilingual signs may be
required.
• Install aircraft cable for perimeter fence
where the fence is potentially exposed to
adversaries in high-speed vehicles to
prevent forceful entry onto plant site.
• Add concrete vehicle barriers at the entry
gate to slow traffic to prevent vehicles
crashing into the property, as shown in
Figure 4-11.
• Lock entry gate operator enclosures with a shackle-protected pad lock.
• Provide a system, such as a Knox box, to allow emergency response personnel to gain access to
the facility during an emergency when utility employees are not at the site or are unable to open
the entry gate. Consider a small side-entry man gate.
• Install drop-arm crash beam type vehicle barriers
at the vehicle entry gates to restrict forceful entry
of unauthorized vehicles, as shown in Figure 4-12.
• Add fixed security cameras at the main gate to
record entry/exit events (e.g., date and time) and
to provide a means for the receptionist to verify
(e.g., call to find out if there is supposed to be a
delivery) or record (e.g., in case there is a question
about a delivery later) who is at the gate before
opening the gate.
• Increase site lighting so that suspicious activity
can be easily noticed by citizens, law enforcement,
or utility employees. This is discussed in detail in
Section 3.
FIGURE 4-11
Example of Vehicle Access Approach to Reduce Speed
FIGURE 4-12
Example of Drop-Arm Crash Beam Vehicle Barrier
4-37
-------
design considerations for developing physical security at new facilities and retrofits
4.8.2.2 Finished Water Pump Station
• Consider redundant (stand-by) pumps and other critical components.
• Provide intrusion detection on doors to alert operator when there is an intruder.
• Provide access control on doors to restrict access to authorized personnel only.
• Design backup or redundant power supply.
4.8.2.3 Chemical Storage and Feed Systems
Utilities typically use numerous chemicals at a WTP; these include liquid ferric sulfate or alum, liquid
oxygen, aqueous or anhydrous ammonia, chlorine gas or sodium hypochlorite, sodium hydroxide,
hydrofluorosilicic acid, and polymer. Depending on the specific chemical in use, the chemical and its
feed equipment can be targets of saboteurs and terrorists. Based on the DBT, chemical buildings or
chemical rooms within buildings can be provided with a higher security, as can outside chemical
storage areas, using methods such as these:
• Consider visual access so that chemicals can be observed from outside without going into the
building.
• To provide adequate redundancy, keep at least two storage tanks per liquid chemical on hand.
• Provide adequate spill containment and control or all storage tanks, and separate containment
structures for each chemical. It is standard practice to design the containment to hold the volume
of the largest tank within the containment.
• Include spill detection systems in the design of storage and feed areas to assist in detecting theft
or release of the chemical. Typical systems include liquid levels in containment sumps.
• Include instrumentation to alert the operator when there is an overdosage of chemicals.
4.8.2.4 Electrical Supply and Equipment
The following considerations can be taken into account to improve security for electrical supply,
which is one of the most critical assets at a treatment plant:
• Redundant utility power supplies from
different substations or a backup generator.
Provide bollards to protect intentional or
accidental damage of power transformers, as
shown in Figure 4-13.
FIGURE 4-13
Bollards Protecting a Fence from Vehicle Entry
4-38
-------
design considerations for developing physical security at new facilities and retrofits
• Isolate critical electrical components
such as switchgear from the rest of
the plant using secure grills, as
shown in Figure 4-14. Tampering
with switchgear can result in a loss
of power failure for an entire facility.
4.8.2.5 SCADA/
Control System Equipment
• Provide lock and intruder switch on
control panel.
• Provide signal supervision and
tamper alarms to detect loss of
signal and tamper attempts.
FIGURE 4-14
Example of Sensitive Equipment Isolated by Secure Grills
4.8.2.6 Control Room
• Limit access to the control room with a card reader or key pad.
• Provide employee-activated as well as "deadman" duress switches to alarm station operator,
control room operator, personnel working alone in remote facilities, and other key personnel.
4.8.2.7 Administrative Area
• Limit access to the administrative areas with a card reader or key pad.
• Upgrade door hardware on mission-critical facilities as follows:
Install tamper-resistant hinges (tack-weld hinge pins at minimum) and security pins into
doorjamb or use Z-strip (a protective shroud that safeguards hinges and doors from
tampering).
Use shackle-protected locks that are hardened to provide delay values consistent with other
door delay values.
Install balanced magnetic switches tied into central alarm system to alert the operator.
Install expanded metal grating on interior of door louvers and 3/8-inch (or thicker) Lexan®
on interior of door windows to prevent forceful entry into a room through these openings.
Install tamper-resistant panic door hardware on all exterior doors to provide additional delay
in forceful entry.
Replace doors that have glass windows with solid metal doors to provide additional delay.
• Upgrade windows:
If windows must be capable of opening for ventilation, install a securely-attached expanded
metal grating on interior. One-quarter inch anchor bolts inserted a minimum of 1 inch into
the window frame is recommended. Anchor bolt head should incorporate a tamper-resistant
fitting so that a specialized socket is required for removal.
-------
design considerations for developing physical security at new facilities and retrofits
If windows are not required to open, install an expanded metal grating or 3/8-inch Lexan®
on interior of windows.
- If a room is alarmed, install glass-break sensors to provide earlier detection of penetration
attempts at highly critical facilities such as chlorine storage.
4.8.2.8 Laboratory
A water utility's laboratory typically contains sophisticated and valuable analytical equipment, as
well as computer hardware and software that may be a target of vandalism and theft. In addition,
laboratories have various hazardous reagents and, consequently, may be targets of saboteurs or
terrorists. As with the other security measures described in this document, the design considerations
discussed in this section should be employed based upon the identified DBT. If the laboratory is
located within the perimeter of a treatment facility, consideration should be given to enclosing the
laboratory within a higher security layer. Chemicals or gases (in cylinders) that are stored outside of
the laboratory can be secured with lock and chain and enclosed in a cage in accordance with the
determined DBT.
4.9 Recommendations for
Finished Water Storage and Distribution System
Table 4-5 provides general security design considerations for the finished water storage and
distribution system. The following subsections provide more specific measures by facility type.
TABLE 4- 5
Finished Water Storage and Distribution Facility Threat and Security Design Considerations
Threat Type Threat Security Design Considerations
Vandal Cause malicious damage Harden facility using cage, fencing, locks, and bolting
Install appropriate signage and Lighting
Provide intrusion alarms
Criminal Steal equipment Lock access ladders, hatches, and hardened entry points
Saboteur/Terrorist Destroy or disable facility Install CCTV at facility perimeter
systems Install alarmed entry
Contaminate water |nsta|| a|armed interior presence sensors
Injure employees Use mu|ti-parameter water quality probe
Install tamper-switches on SCADA panels
Install motion-sensor (dual technology) for storage tank
ladders
Insider/Additional Seek revenge, personal gain Restrict access to areas by job function
Considerations Provide electronic key that provides access to only authorized
personnel
-------
design considerations for developing physical security at new facilities and retrofits
4.9.1 Storage Tanks/Reservoirs
• Use locks or hatches on storage tanks/reservoirs.
• Consider security cameras only at mission-critical sites for
alarm assessment.
• Consider intrusion alarms on control panels that are mounted
outdoors to alert operator.
Tips for Small Utilities
Small utilities can consider
welding a bar over hatches to
restrict access into tanks.
Consider intrusion alarms on hatch covers that are interconnected with automatic shut-off valves
on tank discharge line.
Increase site lighting so that suspicious activity can be easily noticed by citizens or passing law
enforcement.
Replace existing non-bolted covers on valve vaults with bolted covers or add bolts that require a
special wrench to secure the existing covers.
Consider an anti-climb shield, such as the one shown in
Figure 4-15, with lock-on storage tank ladders. Add a
bulkhead (e.g., a reinforced door) to stairs to restrict access to
top of the storage tank. Alternatively, ladders can be
removed so that a portable man lift or ladder is required for
utility staff to access the top of the storage tank for
maintenance.
Consider a dual technology motion sensor (both microwave
and passive infrared) on storage tank ladders. This sensor is
designed to pick up any intruder approaching the top of the
tank, and would not generate nuisance alarms from birds or
other objects.
4.9.1.1 Perimeter/General Campus Security
FIGURE 4-15
Example of a Protected Access Ladder
to a Storage Tank
Provide shackle-protected locks or an electronic lock that can be programmed to open only for
authorized utility staff for the entry gate. Use locks or hatches on storage tanks/reservoirs.
Consider non-duplicate keys that are specifically made for the utility.
Post warning signs on the perimeter fence for deterrence and for liability to protect the utility.
Follow local ordinances when signs are installed. Depending on the diversity of the population,
multi-lingual signs may be required.
4-41
-------
design considerations for developing physical security at new facilities and retrofits
4.9.1.2 Hatches
• Provide shackle-protected locks.
• Weld bar on top of hatch to restrict access (for tanks that require infrequent access).
• Interconnect intrusion alarms to automatic tank discharge shut-off valves to isolate the tank if
there is an indication of a potential threat to water supply.
• Consider dual hatches for additional delay on critical valve vaults for higher level DBTs.
4.9.1.3 Air Vents
• Consider installing thick, double-meshed, offset screens on vents.
• Install baffles to prevent insertion of contaminants into tank.
4.9.2 Pipelines and Appurtenances
Underground and aboveground pipelines are discussed in this section, as well as pipelines on bridge
crossings, appurtenances, fire hydrants, and monitoring equipment.
4.9.2.1 Underground and Aboveground Pipelines
• Reduce area of aboveground exposure for pipelines.
• Use high-pressure pipeline material (such as ductile iron) in exposed areas if DBT includes light
explosive capabilities. Consider using Schedule 80 pipe if the threat level warrants.
4.9.2.2 Pipelines on Bridge Crossings
• Use high-pressure pipeline material (such as ductile iron) in exposed areas if DBT includes light
explosive capabilities.
• Protect pipeline with fan structures of concrete encasement to restrict access.
• Replace overhead pipeline with a tunnel under the river or creek if the DBT includes substantial
explosive capabilities.
4.9.2.3 Appurtenances
• Add bolts that require a special wrench to unlock (where generally available screwdrivers and
wrenches would not work) for access hatches and valve vaults.
• Secure transfer valve vaults with bolting between pressure zones.
• Add protective cages over aboveground appurtenances.
4.9.2.4 Fire Hydrants
To minimize tampering of fire hydrants, install special nuts or caps, such as the ones shown in
Figures 4-16 through 4-19. These devices require wrenches that are only sold to fire departments and
water utilities.
4-42
-------
design considerations for developing physical security at new facilities and retrofits
To minimize the risk that firefighters would be unable to use the hydrant during a fire, consider these
actions:
• Training on the use of specialized equipment should be provided to 100 percent of the personnel
in local fire departments and all other fire departments with which there are mutual aid
agreements or that would respond to an emergency.
• Provide the appropriate wrenches to all fire departments that may use the hydrant when
responding to an emergency.
FIGURE 4-16
Example of a Special Fire Hydrant Locking Wrench
FIGURE 4-17
Example of Hydrant Locking Caps
FIGURE 4-18
Example of Hydrant Locking Caps and Wrenches
FIGURE 4-19
Example of Special Fire Hydrant Locking Wrench in Use
4.9.2.5 Monitoring Equipment
The technologies for distribution system monitoring are rapidly advancing. Simple techniques such
as measuring chlorine residual and pressure loss can sometimes be effective in determining if a
chemical contaminant has potentially affected the system or if the system has been physically
compromised. With new technologies being developed, utilities can determine if it is necessary to
upgrade their existing monitoring systems after evaluating new technologies and case studies.
• Install a multi-parameter probe to measure pH, oxidation-reduction potential, conductivity,
temperature, chorine residual, and dissolved oxygen in the distribution system for early
detection of contamination in storage tanks.
4-43
-------
design considerations for developing physical security at new facilities and retrofits
4.9.3 Pump Stations
Security information regarding pump stations includes site security, electrical supply and equipment,
SCADA/control system equipment, the control room, pumps, and appurtenances.
4.9.3.1 Perimeter/General Site Security
Post warning signs on the perimeter fence for deterrence and for liability to protect the utility. Follow
local ordinances when signs are installed. Depending on the diversity of the population, multi-
lingual signs may be required.
4.9.3.2 Electrical Supply and Equipment
• Provide an emergency receptacle for the backup power supply that matches the plug on a
portable generator.
• Provide a redundant utility power supply from a different substation, a pre-wired connection for
rental generators, or a backup portable generator.
4.9.3.3 SCADA/Control System Equipment
Provide signal supervision and tamper alarms to detect loss of signal and tamper attempts.
4.9.3.4 Control Room
Provide employee-activated as well as "deadman" duress switches to alarm station operator, central
control room operator, personnel working alone in remote facilities, and other key personnel.
4.9.3.5 Pumps and Appurtenances
Secure sampling point stations with an enclosure and a shackle-protected lock.
4.10 Recommendations for Customer Connections
Table 4-6 provides general security design considerations for customer connections. The following
subsections provide more specific measures by facility type.
TABLE 4-6
Customer Connection Threat and Security Design Considerations
Threat Type
Vandal
Criminal
Saboteur/Terrorist
Insider/Additional
Considerations
Threat
Cause malicious damage
Steal equipment
Destroy or disable systems
Contaminate water
Seek revenge, personal gain
Security Design Considerations
Install locks
Install special bolting
Install backflow protection
Install dual check valves with residential meters
(advanced practice)
Restrict access to areas by job function
Provide electronic key that provides access to only
authorized personnel
-------
design considerations for developing physical security at new facilities and retrofits
4.10.1 Construction Meters
Install integrated reduced-pressure backflow devices to prevent intentional or accidental
contamination of water through this temporary meter connection.
4.10.2 Meters
• In high-risk areas for commercial properties such as hotels and
motels, consider meters that have an appropriate level of backflow
protection and anti-tamper devices to prevent the introduction of
chemicals through a sink.
• Secure the water meter with a special bolt or use a locking meter, as
shown in Figure 4-20, to protect from tampering.
• Consider automatic meter reading to continuously monitor flow for
detection of unusual flow patterns. FIGURE 4-20
Example of Locking
4.10.3 Backflow Prevention Devices WaterMeter
Backflow prevention devices for the following areas can be considered to prevent intentional or
accidental contamination of water.
• Evaluate appropriate backflow protection for all high-risk industrial and commercial facilities.
• Consider installing backflow protection c on residential properties in conformance with the
Universal Plumbing Code for high-risk applications (e.g., pools, irrigation systems).
• Consider installing dual check valves with residential meters for additional backflow protection
in high-risk areas. Meter installations will require the use of an expansion chamber downstream
of the backflow device for protection of the residential water system.
4.11 Recommendations for Support Services/Facilities
Protecting utilities' support services and facilities can be equally as important as protecting the more
high profile water system components.
4.11.1 Maintenance/Equipment Storage/Warehouse Facilities
Criminal theft of equipment, chemicals, and tools should be the minimum DBT for maintenance
shops, warehouses, and storage facilities. At the threat levels of saboteur and terrorists, consideration
should be given to providing a higher layer of security for these facilities and locating them a
substantial distance from the treatment processes that they serve. Thus, should damage occur to the
treatment process units, repairs can still be made — spare parts, replacement equipment, and
materials such as filter media will still be available for use.
• For saboteur and terrorist threat levels, design delivery areas for equipment and supplies, as well
as for chemicals and fuel, to consist of an inspection area that is separated from the eventual
4-45
-------
design considerations for developing physical security at new facilities and retrofits
destination to allow for inspection of the delivery vehicles and contents of the delivery. The
inspection area can be designed to allow multiple inspections should more than one delivery
vehicle be detained for inspection. The inspection areas can also include appropriate equipment
to allow for the sampling of chemical and fuel deliveries so that a chemical assay can be done
prior to accepting the delivery.
• Utilities with vehicle fueling stations should be located at a sufficient standoff distance of 200 to
300 feet from treatment process units and inhabited buildings based upon the DBT.
Table 4-7 provides general security design considerations for support facilities. The following
subsections provide more specific measure by facility type.
TABLE 4-7
Support Facility Threat and Security Design Considerations
Threat Type Threat Security Design Considerations
Vandal Cause malicious damage Keep doors locked
Install appropriate signage and lighting
Provide intrusion alarms
Criminal Steal equipment Install card access system for building entry
Harden windows and entry points
Use signage that provides no asset information
Saboteur/Terrorist Destroy or disable facility systems Install CCTV at facility perimeter
Contaminate water Install alarmed entry
Injure employees Install alarmed interior presence sensors
Install duress switches for operators
Insider/Additional Seek revenge, personal gain Restrict access to areas by job function
Considerations
4.11.2 Remote Control Facilities
• Provide employee-activated as well as "deadman" duress switches to alarm station operator,
control room operator, personnel working alone in remote facilities, and other key personnel.
• Upgrade door hardware on mission-critical facilities:
- Install tamper-resistant hinges (tack-weld hinge pins at minimum) and security pins into
doorjamb or use Z-strip (a protective shroud that safeguards hinges and doors from
tampering).
- Harden locks to provide delay values consistent with other door delay values.
Install balanced magnetic switches tied into the central alarm system.
Install expanded metal grating on interior of door louvers and 3/8-inch (or thicker) Lexan®
on interior of door windows. One-quarter inch anchor bolts inserted a minimum of 1 inch
into the window frame is recommended. Anchor bolt head should incorporate a tamper-
resistant fitting so that a specialized socket is required for removal.
4-46
-------
design considerations for developing physical security at new facilities and retrofits
Install tamper-resistant panic door hardware on all exterior doors.
Replace doors that have glass windows with solid metal doors.
• Upgrade windows:
If windows must be capable of opening for ventilation, install a securely-attached expanded
metal grating on interior.
Install glass-break sensors to provide earlier detection of penetration attempts through
windows.
4.12 Recommendations for Administrative Facility Security
Loss of the business functions provided in administrative facilities may not necessarily disrupt the
water supply, but may instead disrupt the ability to handle the financial and management duties that
keep the utility running smoothly. Table 4-8 provides general security design considerations for
administrative facilities. The following subsections provide more specific measures by facility.
TABLE 4-8
Administrative Facility Threat and Security Design Considerations
Threat Type Threat Security Design Considerations
Vandal Cause malicious damage Keep doors locked
Provide intrusion alarms
Criminal Steal equipment Install card access system for building entry
Install harden windows and entry points
Install CCTV at parking areas
Saboteur/Terrorist Destroy or disable facility systems Install CCTV at facility perimeter
Contaminate water Install CCTV at building interior/public areas
Injure employees Install lock-down means at building lobby
Install alarmed entry
Install alarmed interior presence sensors
Install duress switches for operators
Insider/Additional Seek revenge, personal gain Restrict access to areas by job function
Considerations Install card access
4.12.1 Control Access to Buildings
The minimum DBT for administrative offices will most likely be theft, although a saboteur or terrorist
may target the utility's management and administrative staff as well as the treatment plant
infrastructure. Administrative offices of any organization are typically the target for an insider threat
on management. Thus, consideration should be given to an increased threat level for administrative
offices, even if the DBT of the surrounding facility is at a vandal or criminal threat level.
If applicable, designs for administrative offices should include space for gatekeepers such as
receptionists or guards at the entrance to the buildings and possibly at key locations on other floors.
Silent panic alarm buttons can alert local law enforcement of malevolent acts.
4-47
-------
design considerations lor developing physical security at new facilities and retrofits
4.12.2 Safeguard Employees
• Provide employee-activated as well as "deadman" duress switches to alarm station operator,
control room operator, personnel working alone in remote facilities, and other key personnel.
• Provide a public address system to contact employees in a timely manner when there is
imminent threat.
4-48
-------
SECTION 5
Cyber Security Management,
Operations, and Design Considerations
Operations:
Enhancing
Physical Security
Management:
Optimizing
Physical Security
ntroduction
Design:
Developing
Physical Security
Physical
Security
Equipment
Cyber Security
• Understand cyber security system components
• Identify threats against the system
• Implement appropriate policies, procedures, and training
• Institute preventive operational controls
• Design with cyber security in mind
5.1 Overview
Cyber security is the protection of enterprise information systems from outside or inside attack. The
reliance of a water utility on its automated systems can be substantial: the SCADA system runs the
plant, the financial system maintains fiscal equilibrium, and several systems facilitate most business
processes. Competitive financial pressures have decreased the staff at most facilities to the point
where few, if any, utilities can run in "manual mode" for long. In short, if the information systems do
not work, the enterprise will not operate.
Unfortunately, security was largely an afterthought in the developing computer industry. The
Internet has gone from a trusting network of academic colleagues to daily world-wide alerts for
destructive viruses. By virtue of their isolation, SCADA systems have typically been the least
defended systems of all. Proactive prevention and response plans can provide utilities with
substantial levels of protection from both external and internal adversaries.
5-1
-------
cyber security management, operations, and design considerations
This section first describes the components of a cyber system and then identifies existing threats
against the system. Management, operations and maintenance, and design guidance that applies
specifically to cyber security is then included. Keep in mind that, as in the rest of this document, the
intent of the guidance is to provide suggestions and ideas for consideration by utilities as they each
create their own customized security plan.
5.2 Utility Cyber Networks
A water utility often deploys an array of specialized information systems. This document will
distinguish between those systems residing on the business network versus those on the control
network.
A valuable tool for management to understand those portions of the enterprise system that are at
greatest risk is the cyber security vulnerability assessment. This type of vulnerability assessment is a
focused examination of the entire business and control network from a security perspective. Each
component is evaluated for its degree of susceptibility to outside or inside attack. Based on analysis
of the utility's DBT, specific recommendations are developed aimed at preventing the most likely
types of attacks. (This information can be found in Section 5.6.1, "General Design Best Practices."
5.2.1 Business Network
The business network hosts software applications and databases that facilitate enterprise business,
scientific, and engineering processes. These include:
• Enterprise Resource Program. A comprehensive financial program that includes modules for
General Ledger, Accounts Payable, Accounts Receivable, Payroll and possibly Human Resources.
• LIMS. A repository of laboratory result information and process data to support regulatory
compliance and treatment plant operations.
• CMMS. A work order system to provide preventative maintenance on assets, such as pumps,
pipes, hydrants, and valves.
• Customer Information System. A system that facilitates customer invoicing and resolving
customer complaints.
• Internet/Intranet. A tool that provides customers and employees with the ability to interact
around-the-clock with the utility from any computer.
• Other Systems. E-mail, permitting, geographic information system, and fuel usage.
5.2.2 Control Network
The SCADA system consists of numerous electronic components distributed in the plant and over a
large, sometimes very large, geographic area. The system's main function is to oversee and operate
the pumps, valves, and instruments that control the intake, treatment, and distribution of finished
water to customers. Operable elements of the SCADA system are located in a wide range of facilities,
including the intake facilities, the treatment plant, pump or booster stations, tanks, reservoirs, wells,
5-2
-------
cyber security management, operations, and design considerations
and other remote facilities. Though SCADA systems vary widely in their composition, the following
represents a typical list of components, grouped by function:
• Computers
SCADA servers
SCADA Human Machine Interface (HMI) programming workstations
SCADA HMI workstations and view nodes
• Networking
Switches (optical and Ethernet)
Routers
Hubs
Firewalls
Modems
Serial interfaces (connecting telephone lines to SCADA devices)
• Data Conveyance
Ethernet cabling
Optical cabling (e.g., plant loop)
Telephone lines (leased or owned)
Radio transmitters and antennas
Wireless transmitters and antennas
• Distributed Control Components
Programmable Logic Controllers (PLCs)
- Remote Terminal Units (RTUs)
5.3 Cyber Security Threats
There is no shortage of potential intruders to the enterprise from the Internet. For the purposes of the
following cyber security discussions, intruders are defined as:
• Outsider Hackers. The primary goal of hackers is unauthorized entry; their motivation is thrill-
seeking or criminal opportunity.
• Outsider Attackers. The primary goal of attackers is to destroy enterprise operations; their
motivation is often political.
• Insider Attackers. The primary goal of an inside attacker is to disrupt enterprise operations; their
motivation is personal gain or vengeance.
To maintain consistency with discussions of physical security in other sections of this document,
Table 5-1 correlates physical intruders and cyber intruders.
5-3
-------
cyber security management, operations, and design considerations
TABLE 5-1
Correlation Between Physical and Cyber Intruders
Physical Intruder Equivalent Cyber Intruder
Vandal Outside Hacker
Criminal Outside Hacker
Saboteur Outside Attacker
Terrorist Outside Attacker
Insider Insider Attacker
Information systems are more vulnerable than ever before. Today's information management trends
point to a technology convergence resulting in a standardized system architecture. A demanding
regulatory environment and the need for defensible decision-making push today's utilities to
integrate previously isolated information systems onto standardized platforms. In addition,
employees increasingly request 24 hour-per-day access to internal information systems. Taken
together, these trends create more, not fewer, opportunities for intruders to access and affect the
entire enterprise information structure.
Gaining unauthorized entrance to an organization's information infrastructure is no longer the
province of a small cadre of skilled intruders. The specific vulnerabilities of widely used platforms,
like Microsoft Windows™, are detailed on numerous web sites. An arsenal of hacking tools is readily
available on the Internet at no cost. These "freeware" programs are easy to operate and effective at
gaining entrance to organizations via the Internet, radio, telephone, or wireless devices. Novice
hackers can generate destructive virus code from special applications with no knowledge of
programming. This shorter learning curve benefits attackers intent on intrusion and destruction.
Cheap laptops, anonymous Internet accessibility, and readily available hacking tools offer political
organizations a potent tactical weapon.
As the result of the existence of these adversaries, utilities have realized the need to become more
vigilant to protect their valuable infrastructure. Information system failure can have catastrophic
repercussions to a utility. Compromise of the financial system can result in millions of dollars of lost
revenue. Corruption or destruction of operational data can lead to fines due to late or inaccurate
regulatory reporting. A sabotaged web site has the potential to shake public trust during a time of
crisis. Interruption of the plant process because of SCADA malfunction can lead to a wide range of
health implications for the community.
5.4 Management
Management considerations for cyber security provides the policies and procedures that tie
operational practices and system designs into an integrated approach for utilities. Key areas of
concern focus on SCADA system access, passwords and other IT interface points within the utility.
5-4
-------
cyber security management, operations, and design considerations
5.4.1 Cyber Security Policies and Procedures
The most effective course of action available to utility management is the creation of a cyber security
plan (often within the context of a physical security plan). A cyber security plan provides the policies,
procedures, and direction for system enhancements that minimize intrusion risk as well as insider
malfeasance. It is, however, an unfortunate reality that even the most vigorous anti-intruder security
may not thwart a determined attacker.
For water utility operators, the SCADA system is of particular concern. Any disruption to the
accurate operation of the SCADA system could have adverse health repercussions to the community.
As such, specialized assessment of the SCADA system is indicated due to its marked difference from
a more traditional information technology (IT) system. It is worth noting that the trend in automation
systems is to use a more "open architecture" that does not rely on proprietary vendor protocols. The
result is a more publicly available standardized operating platform, which increases the odds that its
vulnerabilities are more widely known.
The centerpiece of a cyber security plan is its policies. Publicized and enforced policies can reduce the
opportunity for an insider to anonymously sabotage any portion of the information system. Elements
of this plan should include:
• a process for granting/revoking access to information systems
• password policies
• restricted information flow between the business and control networks
• comprehensive system documentation
• outlawing of unauthorized wireless or modem connections
• a Disaster Recovery Plan
• incident response goals
A forward-looking plan also provides a method for continuous security improvements. In this
rapidly evolving field, it is essential to stay current. Several organizations are in the process of
formulating cyber security standards. At the time of this writing, for example, the National Institute
of Standards and Technology, a federal standards agency, maintains a highly informative web site
that publicizes best practice security guidelines (csrc.nist.gov).
5.4.2 Cyber Security Training
Training activities can result in a higher level of cyber security in the workplace. User acceptance is
an important part of adherence to security policies. Training sessions help to review security
procedures and impart to all employees the importance of individual responsibility. Basic examples
of the types of training to perform include these:
5-5
-------
cyber security management, operations, and design considerations
• Training for the general user population so that they understand all security policies and
procedures. Specific items to be discussed should include:
Not to share passwords with others.
Not to write passwords down.
- Not to set up wireless networks or wired connections between networks without
authorization.
To password-protect home personal computers (PCs) used to connect to the enterprise.
• Training network administrators to analyze server and network log files to pinpoint
unauthorized activity.
• Training operators should be trained to log out of the HMI whenever leaving the control room to
prevent unsupervised access to the SCADA system.
5.5 Operations
Cyber security addresses the need to for the continuous functioning of the information systems
serving the utility. Of special concern to water utilities is the SCADA system, whose distributed
components maintain the process. Given the complex and interrelated nature of the SCADA system,
a detailed approach is recommended to safeguard its reliability.
5.5.1 Intrusion Defense
Cyber intruders can gain access to an enterprise network via one of four broad avenues:
1. Internet
2. Telephone system,
3. Wireless (including radio)
4. Inside attacks
The following subsections outline methods of preventing unauthorized entry from each avenue.
5.5.2 Internet Intrusion
Internet access to the enterprise is not always under the control of utility IT staff. It is common for the
umbrella municipality to administer all security aspects of the Internet gateway, including firewall
configuration and Intrusion Detection System (IDS) oversight. In that case, it is important that the
utility IT staff participate in municipal IT matters via technical committees or similar intra-
organization forums.
5-6
-------
cyber security management, operations, and design considerations
5.5.2.1 Outside Hacker
The outside hacker is most easily deterred at the firewall. If no entry point is penetrable, the hacker
will likely move on and choose an easier target. Thus, utilities may want to:
• Coordinate with the enterprise or utility IT department to conduct penetration tests on the
Internet firewall. These tests are designed to uncover "open ports" commonly used by hackers to
gain entrance to the enterprise network. Once inside, a hacker is free to access any computer on
the business network, including SCADA computers if the business and control networks are
connected.
• Restrict general user access to critical applications. For example, segregate financial servers by
locating them on a separate network segment with tightly restricted access.
5.5.2.2 Outside Attacker
Even the most daunting security at the Internet gateway may succumb to the efforts of a determined
attacker. Additional steps are necessary to further secure the SCADA system if connections exist
between the business and control networks. Thus, basic steps that utilities may want to consider
include these:
• Identify and disconnect all connections between the business and control networks that have no
security controls, such as a router or firewall. Network traffic between the two networks should
be strictly controlled to allow only legitimate connections.
• Conduct server and workstation software audits to verify that the operating systems have been
"hardened" with the most current upgrades and security-related patches. The Microsoft
Windows™ operating system, for example, is a favorite target of hackers because of its
widespread use and well-documented security flaws. Some basic activities associated with this
audit might include the following:
Verifying that anti-virus software is updated with the latest virus patterns.
Verifying that all servers have latest security patches applied for applications (e.g., database
programs, email, etc.) as well as the operating system.
Reviewing system logs for inappropriate activity.
Confirming that every administrator password for the operating system and HMI have been
changed from the default passwords.
5.5.3 Telephone System Intrusion
The most common method of telephone system intrusion is via dial-up modem. Most SCADA
systems employ a modem to facilitate operations and maintenance of the HMI by vendor or in-house
SCADA technicians. Traditionally, these modem connections have little or no security; they are an
attractive target for "war-dialing," a common technique used by telephone hackers that uses a
software program to automatically call thousands of telephone numbers to look for any that have a
modem attached.
5-7
-------
cyber security management, operations, and design considerations
5.5.3.1 Outside Hacker
These basic suggestions can provide increased cyber security at little or no cost to the utility.
• Configure modems to allow dial-up access from a restricted set of telephone numbers.
• Leave modems connected to the SCADA system turned off. Turn on only for use by verified
personnel (vendor or SCADA technician).
• Use a timer to turn off modems after a preset period of time (e.g., one hour) if not in use.
• Coordinate with the enterprise IT department to verify security on non-SCADA modems
connected to the business network.
5.5.3.2 Outside Attacker
Utilities should instruct employees not to divulge user information—especially passwords — over the
telephone. Hackers have a high success rate of obtaining passwords from unwary employees by
posing as an IT technician needing user account information. This technique is known as "social
engineering." Employees can be made aware of any authorized need for this information and asked
to report any attempt to elicit password information without the proper authorization.
5.5.4 Wireless Intrusion
The explosion of wireless networking at home and in the workplace has created an enormous
security risk for network administrators. Many wireless installations in the workplace can exist
without the knowledge of the IT group. These installations generally have little or no security and
can be accessed by anyone within signal range.
5.5.4.1 Outside Hacker
Utilities should eliminate unauthorized wireless networking (use wireless detection software and
appropriate antenna/laptop software to identify unauthorized installations). A wireless access point
using the default settings is open to network attack. Many wireless products are capable of
configuration to acceptable levels of transmission security.
5.5.4.2 Outside Attacker
Modify and configure authorized wireless networking to the highest encryption levels. Minimize
broadcast range and consider turning off "beaconing" features.
5.5.5 Insider Intrusion
Although an inside attacker has a decided advantage by possessing access privileges to the enterprise
system, a stringent security environment renders operational staff activities less anonymous. A well-
designed cyber security plan seeks to minimize inadvertent or intentional damage to the SCADA
system by former or current employees and contractors. At the core of any security plan is an
enforceable security policy and accompanying procedures that promote operational accountability
and auditability.
5-8
-------
cyber security management, operations, and design considerations
The water utility industry is often staffed by long-term employees. The introduction of more
stringent security procedures can rankle as untrusting. The current security-minded national
environment, however, supports the perception that procedural changes to protect the enterprise are
inevitable.
5.5.5.1 Management and Operational Security of the SCADA System
Several security practices that promote accountability and auditability are part of this mainstream
movement, including these basic operational security considerations:
• Development of security policies that are posted in all control rooms
• Requirement for individual logon credentials to access the SCADA system
• Configuration of HMI logon privileges to match responsibility level
• HMI log files that are associated with user logon credentials with actions and changes made to
HMI (creating a non-refutable audit trail of operator actions)
• Requirements for appropriate password strength rules for user access (i.e., more "complex"
passwords for those with higher access privileges, such as an administrator)
• Immediate removal of a user account from the HMI if the account becomes inactive due to
voluntary, and especially involuntary, termination
• Configuration of an inactivity timeout logout (or proximity sensor logout) to protect the control
system if no one is present in the control room or the operator has stepped away from a remote
workstation
• Requirement for a password to make software programming changes to RTUs/PLCs
• Programming of set point ranges to reject potentially harmful out-of-range adjustments
Advanced operational security considerations include these:
• Install third-party software—or upgrade current HMI version—to enable change propagation
capability that monitors revisions to programming by date/time and login credentials. This
software can also "undeploy" programming changes and revert to a previous version.
• Install safeguards for laptops used for onsite programming of remote PLCs or RTUs against theft
or unauthorized use.
5.5.5.2 Physical Security of SCADA Components
Sensitive electronic SCADA components are often completely accessible to anyone in the plant.
Utilities can reduce crimes of opportunity through these basic operational security considerations:
• Backup of SCADA servers and programming workstations to tape every night. Appropriate
tapes should be stored offsite to ensure disaster recovery.
• Lockable PLC cabinets.
• Protective, lockable casing for exposed outdoor RTUs.
5-9
-------
cyber security management, operations, and design considerations
SCADA servers secured in locked, climate-controlled areas.
Restriction of access to the control room (and network/server room) with an entry system that
stores information about who has entered and departed.
5.6 Design
Design considerations for cyber security should be coordinated with planning for the physical
security of the organization. For example, card-reader access systems can be specified in the physical
security plan to regulate access to restricted areas. Card readers can also benefit cyber security by
doubling as a logon device that can record who has logged in and out of a computer.
Consistent with the previous intrusion defense discussion, design considerations will fall under the
main areas of unauthorized entry: Internet, telephone system, wireless, and insider.
5.6.1 General Design Best Practices
Several design elements are recommended to bolster both insider and outsider defense, as well as to
minimize less malicious levels of unauthorized entry. Utilities should evaluate implementation of the
following basic activities:
• Identify and characterize all connections between the business and control networks. Though
business and control networks have traditionally been separate, current demands for enterprise-
wide data access dictates intra-network communication. By designing a secure connection
between the networks, the enterprise can reap the benefits of data extraction from the control
network and transport to the business network without compromising the mission-critical
SCADA system. All network traffic between the two networks should be strictly controlled.
Methods of securely segmenting the business and control networks include these:
Virtual Air Gap. Allows one-way data traffic from a control network server to a business
network server by means of an optical isolator.
Dual-homed Server. Directs SCADA process data into a database server via one network
card on the control side; allows access to the database only from the other network card on
the business network.
Router. Restricts traffic to a small number of destinations as regulated by an Access Control
List (ACL). A firewall is appropriate here as well, especially if control of the Internet gateway
is not under the utility IT purview.
Firewall. Of particular value in the case where utility IT has no control over the enterprise
Internet gateway.
• Review the policy governing entries on the router ACL so that only appropriate Internet Protocol
(IP) addresses (such as a designated printer or the email server) can be accessed across the
business and control system networks.
• Implement restricted access (and policies) to the SCADA control room. Consider biometric
devices for areas requiring the highest levels of security.
• Provide a climate-controlled, locked enclosure for SCADA servers and networking components.
5-10
-------
cyber security management, operations, and design considerations
• Install and use a lock and intruder switch on control panels.
.
• Configure identical SCAD A servers for "fail-over" redundancy.
• Install anti-virus software and configure for daily virus pattern updates on all servers and
workstations.
• Reset all operating system and HMI passwords away from default settings.
• Verify that the backup system consistently captures a "snapshot" of designated servers and
workstations. Provide offsite storage of selected tape backups necessary for disaster recovery
purposes.
• Routinely back up all SCADA programs for PLCs, distributed control units, RTUs, SCADA
servers, and similar programmable devices to provide for rapid recovery in the event of loss of
program or need to install new devices. Store programs offsite.
• Provide individual UPSs for critical SCADA devices not protected by the main UPS system.
The following advanced activities can also be considered:
• Provide a UPS for all servers, networking components, and vital workstations. Consider addition
of diesel-powered generator if warranted by system criticality.
• Provide a backup method to collect the data from the remote systems in case of communications
failure. If, for example, a spread-spectrum radio network is the main method of remote SCADA
communication, then telephone lines could be used for dial-up access in case of radio failure.
5.6.2 Internet Intrusion Design
Enterprise Internet security for municipal utilities is often under the stewardship of a municipal IT
department. Given its level of specialization, training may be required for the IT staff who maintain
security at the Internet gateway. Regardless, the principles are the same whether applied at the
Internet gateway or between the utility and municipal networks.
Devices such as firewalls and routers, if properly configured, can effectively insulate a utility's
network from outside attack. It is recommended that the utility appoint an appropriately skilled staff
member or hire a consultant to determine the current best practices in Internet intrusion design
because these technologies are evolving rapidly. Important basic design elements at the time of this
writing are listed below:
• Contract for periodic evaluation of firewall and IDS effectiveness by a third-party security
specialist to continuously maintain and improve operational performance.
• Consider using a Virtual Private Network solution to prevent unauthorized access into the
enterprise from the Internet.
• Ensure that the firewall is either "stateful packet inspection" or "proxy" served.
5-11
-------
cyber security management, operations, and design considerations
Advanced design elements include these:
• Implement both types of firewalls in a "layered" approach.
• Install an IDS at the Internet gateway and regularly audit IDS logs for evidence of unauthorized
entry. An IDS, properly monitored, can identify when a firewall is under attack and provide
valuable information about intrusion attempts. Other IDS tools can detect system configuration
changes and log file anomalies.
5.6.3 Telephone Intrusion Design
The telephone system is vulnerable to unauthorized access through modems. Typically, modems are
often found in three areas: attached to the SCADA server for maintenance purposes, attached to
remote access servers on the business network to facilitate employee dial-in, and "informal" modems
attached to workstations so that the individual employee can work from home. This last type of
modem is difficult to track down and usually has no security configured. A basic design element to
reduce risk from modems is to :
• Create policies designed to prevent the installation of unauthorized modems on enterprise
equipment. Those modems are often used in conjunction with remote control software to
facilitate working from home. The security risks to the business usually outweigh the
convenience for the individual.
Advanced design elements to reduce risk from modems include:
• Use commercial telephone-scanning software that can usually identify modem connections not
sanctioned by the utility.
• Equip all SCADA modems with "lock and key" hardware devices. Distribute the "keys" to
SCADA technicians and trusted vendors only. This solution provides flexibility as well as a
higher degree of security. Technicians needing access can call at any time and from any telephone
(e.g., a SCADA technician on travel).
• When telephone lines are used to connect to RTUs from the field, consider encrypting commands
to prevent interference from attackers "tapping" into leased or owned lines.
5.6.4 Wireless Intrusion Design
Many utilities rely on radio transmission to interact with remote SCADA components in the field.
RTUs in the field exchange, monitor, and control information in "plain text." These unencrypted
broadcasts can be intercepted and retransmitted with different—potentially harmful — information.
As a basic method of risk mitigation, utilities may want to:
• Provide "hardened," lockable enclosures for all remote control system units. Many of these units
are in isolated areas with few protective measures to deter vandalism.
• Provide signal supervision and tamper alarms to detect loss of signal and tamper attempts.
5-12
-------
cyber security management, operations, and design considerations
More advanced methods of risk mitigation for wireless components include:
• Encrypting radio traffic between RTUs (or PLCs with radio units) to master unit with
scrambler/descrambler devices. As an alternative, modify radios with appropriate capabilities to
spread spectrum frequency-hopping.
• Specifying wireless networking configurable to an appropriate security level.
• Turning off "beaconing" and minimize reception area through a combination of antenna type
and wireless access point configuration.
5.6.5 Insider Intrusion Design
The difficulty in designing a secure enterprise against an insider attack is evident—the insider
already has direct access to information systems. The key to deterrence is a strong and enforced
security plan that:
• Reduces the chances of acting anonymously.
• Restricts potential damage through limited access privileges, both physical and electronic.
5-13
-------
(This page intentionally left blank)
-------
SECTION 6
Choosing the Optimal
Physical Security Equipment
Introduction
Management:
Optimizing
Physical Security
Operations:
Enhancing
Physical Security
L
Design:
Developing
Physical Security
Cyber Security
,._.
Physical
Security
Equipment
L
* Determine the type of equipment needed
* Identify the required equipment features
• Match needs with available security equipment
6.1 Overview
The previous sections of this document identified applications for which utilities may want to
purchase and install electric and electronic security devices. Utilities should base their decisions on
their DBTs, as well as other operational and design considerations.
A variety of security systems and components are commercially available. Before implementing a
security system, it is important to understand the characteristics and requirements of the area and
facility to be protected. With this understanding in hand, detailed criteria can be developed to specify
exactly how the security system should be implemented.
This section provides an overview of issues and situations that should be considered, as well as basic
information, when determining the type of electric or electronic security system to install once the
decision has been made that such a system will be employed. Included are descriptions of three major
categories of security equipment: intrusion detection systems (both interior and exterior), access
control (card reader) systems, and closed-circuit surveillance camera systems. Each of these sections
provides information on recommended security devices, including interior and exterior intrusion
detection systems, card readers, biometric readers, camera lens and equipment requirements, digital
6-1
-------
choosing the optimal security equipment
video recording and CCTV compression. Lighting, power, and security wiring standards are also
discussed.
6.2 Questions to Ask
To determine the type of security system to install, it is important to understand the characteristics of
the area to be protected, as well as the security expectations and requirements. This section describes
the information that should be obtained and questions that should be asked to help utilities plan and
implement a security system.
6.2.1 Threat
The types of security equipment employed will be dependent on the utility's DBT. Questions to
consider include:
• Is the anticipated adversary an outsider, an insider, or an outsider collaborating with an insider?
• What tactics, motivation, skills, knowledge, tools, or weapons might the adversary use?
Protecting a facility from a skilled, trained adversary with knowledge of the facility requires a
different tactic than protecting against a teen-aged vandal.
6.2.2 Known Vulnerabilities and Key Assets
A utility's vulnerability assessment identifies the assets that are most critical to meeting its mission.
The types of assets to be protected influence the types of equipment recommended to protect them.
6.2.3 Areas of Coverage
The characteristics of the area that the equipment will be expected to cover are critical factors that
need to be taken into account. Questions to consider include:
• What is the area or region to be protected?
• Does the area occupy a level surface?
• Is the area enclosed? Is the area indoors or outdoors? Indoor areas typically have lower nuisance
alarm rates and are easier to protect.
• If indoors, what ambient noise levels, thermal conditions, or vibrations may exist?
• If outdoors, what humidity, temperature conditions, and wind conditions exist?
• Are small animals or children living near the protected space?
• How large is the area?
• What is the configuration and physical layout of the area to be protected?
• What are the existing lighting conditions within the area?
• Are there any restrictions that limit placement or levels of site lighting, such as neighborhood
zoning requirements?
6-2
-------
choosing the optimal security equipment
• Are the assets visible from the perimeter fence or property line?
6.2.4 Levels of Resolution
To accurately specify the required security hardware, it is important to define the required level of
resolution that the security system must achieve: detection, classification, or identification.
• Detection. The capability to determine the presence of an intruder (but not necessarily classify as
a human, animal, or object).
• Classification. The capability to determine the classification of an intruder as human.
• Identification. The capability to determine the identity of a human intruder.
6.2.5 System Size and Device Quantity
Before selecting equipment, it is also important for a utility to think about the size of the area that it
wants to cover and the number of devices it will need. Understanding the potential growth of the
water system also allows the designer to provide a security system that scales with a minimum of
cost and effort as the system size and requirements expand.
6.2.6 Electrical Power, Wiring, and Transmission Methods
Availability of electrical power will also influence selection of security devices. Questions to consider
include:
• What electrical power is available for the security hardware, if any?
• What backup power is provided for security?
• Are lightning strikes a consideration? Is a lightning protection system advisable for new
electronic equipment?
• Will all wiring be protected within conduit?
• How are alarm signals transmitted back to a monitoring system?
• Will hardwired systems be used or are wireless communication methods being considered?
• What bandwidth is available for transmitting security alarms and video images? For example,
dial-up telephone modems or radio telemetry systems provide limited bandwidth for
transmitting video images, whereas high bandwidth broadband connections allow higher rates of
transmission and smoother video image playback.
6.2.7 Viewing and Assessment
Utilities also need to consider how information transmitted by security devices will be used.
Approaches to viewing and assessing camera images and responding to alarms should be part of the
criteria when making decisions on equipment selection. Questions for consideration include:
• What areas need surveillance? What camera surveillance systems may be required? Is there a
need to have CCTV camera coverage at the entire site perimeter?
6-3
-------
choosing the optimal security equipment
• What monitoring system is in place to receive the alarms: a SCADA system or a separate
intrusion detection system? For example, it is advisable to separate SCADA from security alarms
whenever possible so that an adversary cannot disable both simultaneously.
• Who will monitor the alarms? Will the system be monitored on a continuous basis, or as alarms
come in?
• Who will view the security alarms and assess them?
• Where is the monitoring system located?
• What is the security response once an alarm occurs?
• Is the response onsite or offsite?
• What is the response time?
6.3 Basic Information About Physical Security Equipment
Before determining the type of physical security system that would be the best for a utility, it is
important to understand the basic components, features, and requirements on which a utility will
have to decide.
6.3.1 Power and Wiring
Without a reliable power source and intact wiring, a security system cannot function. Indeed, cutting
the power to a security device may be an adversary's first course of action. Recommendations for
reliable power and security wiring are presented here.
6.3.1.1 Power Supplies
Typically a security system includes items that require 120 Vac (volts alternating current) power and
low-voltage (12 Vac, 24 Vdc [volts direct current]) power. If an auxiliary power supply is included for
supplying low-voltage power, be sure that calculations are performed on the load and voltage drop
of the system. Load and voltage drop should meet the following criteria:
• The power supply should be loaded to no greater than 75 percent of capacity to allow for future
expansion.
• Worst-case voltage drop should be no greater than 10 percent for the longest length low-voltage
circuit from power supply to device.
6.3.1.2 Lightning Protection
In many parts of the country, a lighting protection system is essential for the protection of electronic
devices. The goal of a lighting protection system is to:
• Limit step or contact voltage and induced voltage.
• Limit fire propagation.
• Reduce the effect of surges on sensitive equipment.
6-4
-------
choosing the optimal security equipment
Typically, a lightning protection system utilizes a separate grounding system that is tied to the facility
ground system. Consider the following when planning for a lightning protection system:
• Coordination is required with roofing, parapet, and interior building design to allow for
installation of air terminal or riser cables.
• Criteria for lightning protection may involve the utility's insurance company.
For more specific information, refer to NFPA 780, Standard for the Installation of Lightning
Protection Systems.
6.3.1.3 Power Backup
For all electronic components of the security system, some method of power backup is recommended.
With automatic generator-backed systems, if normal alternating current (AC) power fails, there is a 5-
to 10-second lag before the generator backup engages. With manual systems this time period can be
much longer.
Some basic backup power considerations are as follows:
• UPS systems are recommended for security devices requiring 120 Vac power, such as computers
and video monitors.
• Batteries are cost-effective and reliable for low-voltage
devices, such as cameras and card reader systems. Provide Consjder usjng battery bac|(up
automatic charging means to automatically maintain and a small self-charging UPS
battery charge under normal power conditions. for backup power to smaller
security installations.
• Battery recharge circuits should automatically recharge ^^==^^^^=^^^^^=
batteries within 24 hours after the batteries have been discharged.
• Modular battery backup systems provide an advantage because they may be expanded by simply
adding more components and batteries. As backup power requirements increase, the battery
system capacity can be adjusted to meet current needs.
• When considering UPS systems, compare the cost and flexibility of using smaller point-of-use
UPS units against a large system-wide UPS. In some cases, greater flexibility and cost-
effectiveness may be achieved using point-of-use UPS units. Additionally, the cost of maintaining
a spare point-of-use UPS unit is much lower then providing a redundant system-wide standby
UPS unit.
6.3.1.4 Security Wiring
Basic
• All interconnecting wiring between security system components should be monitored for
integrity so that an abnormal condition (e.g., wire-to-wire short, wire break, or wire ground-fault
condition) is automatically indicated when arming the system.
• Coaxial cable RG-59U, the most common coaxial cable style is rated for up to 750 feet. Use fiber-
optic cable for CCTV runs farther than 750 feet.
6-5
-------
choosing the optimal security equipment
Advanced
• Fiber optic cable offers several advantages over coaxial cable; it is impervious to electromagnetic
interference, radio frequency interference and offers good security against eavesdropping. For
new CCTV installations, fiber is recommended over coaxial cable, except for very short runs
(under 50 feet).
6.3.1.5 Sample System Performance Criteria
Utilities may want to consider including performance standards such as these when determining the
type of basic physical security system to purchase and install:
• Four-hour battery backup, at a minimum, should be provided for security equipment.
• All exposed security wiring should be installed in conduit.
• No splices or wire nuts should be used within wiring circuits. All wiring terminations should be
made via mechanical termination blocks.
• All wiring shall comply with the NFPA 70, National Electrical Code, specifically Articles 725 and
800, as appropriate.
• Security panels shall be UL listed as meeting standard UL804.
6.3.2 Visibility and Lighting Recommendations
Visibility and lighting are critical elements of a successful security system.
6.3.2.1 Visibility
Within a parking lot, trees and shrubs should not obstruct viewing. Tree branches and leaves should
not be lower than 10 feet above the lot surface. Interior shrubs and bushes should not be higher than
18 inches so as not to obstruct vision or conceal an adversary.
6.3.2.2 Lighting
A significant part of visibility is lighting. Lighting should enable people parking to note individuals
at night at a distance of 75 feet or more and to identify a human face at about 33 feet. These are
distances that will allow them, if necessary, to avoid the individuals or take defensive action while
still at a safe distance.
Security lighting increases the effectiveness of guard forces and closed circuit television by increasing
the visual range of the guards or CCTV during periods of darkness. It also provides increased
illumination of an area where natural light does not reach or is insufficient. Lighting also has value as
a deterrent to individuals looking for an opportunity to commit crime. Normally, security lighting
requires less intensity than lighting in working areas. An exception is at normal doorways.
6-6
-------
choosing the optimal security equipment
Exterior lighting for areas such as parking lots should provide a minimum level of visibility when
guards perform inspection of the protected area. Guards and CCTV surveillance systems must be
able to:
• see badges, people, and other guards at gates
• observe activity
J
• inspect vehicles
r
• observe illegal entry attempts
• detect intruders in the protected area
• observe unusual or suspicious circumstances
•
Each parking lot presents its own particular security challenges based on physical layout, terrain,
atmospheric conditions, and security requirements. The goals of direct illumination are to provide a
specified intensity throughout the area for support of guard forces or CCTV, provide good visibility
for customers or employees, and have a minimum of glare.
The most severe problem is illuminating the small narrow "corridors" formed by adjacent parked
cars. To get light into these areas, it is recommended that any point in the entire parking lot be
provided with illumination from at least two and preferably four lighting (pole) locations. The lights
should be mounted at a minimum height of 20 feet.
6.3.2.3 Example System Performance Criteria
• Provide lighting that is a minimum of 0.2 foot-candles around key assets for observation by
unaided eye.
• Provide minimum of 1 foot-candle (the average maintained horizontal to the surface) for self-
parking areas.
Tips for Small Utilities
Lighting at entry and exit points should be at least 1.5 to 2.0 Low-pressure sodium
foot-candles for safety and for adequate observation by lights are reasonably
employees or CCTV. efficient and provide a
uniform lighting ratio.
Two foot-candles of lighting should be provided for attendant =======
parking areas because of liability and potential damage to automobiles.
Where additional lighting for business attractions or customer convenience is a consideration,
lighting of 5.0 foot-candles and higher is often used.
The light-to-dark ratio should be designed such that the lowest value of illumination on the
pavement is not less than one-fourth of the recommended average (a 4:1 light-to-dark ratio). The
lighting should be maintained at no worse than 6:1.
RP-20-98, Lighting for Parking Facilities, published by the Illumination Engineering Society of
North America (IESNA), provides recommended illumination levels for parking facilities.
6-7
-------
choosing tho optimal security equipment
6.4 Types of Physical Security Equipment
Once the utility understands the characteristics of the area to be protected and the security
expectations and requirements (as described in the previous section), the utility can determine the
type of security equipment to use. There are many different types of security equipment. These types
include:
• Access control systems (card readers, PIN access, and biometrics)
• Intrusion detection (interior and exterior)
• CCTV surveillance
Each of these types of security equipment is described in this section.
6.4.1 Access Control
An access control system allows the movement of authorized personnel and material into and out of
facilities while detecting and possibly delaying movement of unauthorized personnel or contraband.
Entry control elements may be found at a facility boundary or perimeter, such as at vehicle gates,
building entry points, or doors into rooms or other special areas within a building.
Access control systems make a verification decision and then determine whether to grant or deny
access to a person. This verification decision is usually based on determining whether the person:
• carries a valid credential, such as an access card.
• knows a valid PIN.
• possesses the proper unique physical characteristic that matches the person's characteristic
recorded at enrollment. This is called biometrics and includes characteristics such as a fingerprint
or hand geometry.
These three concepts, from basic to advanced, can be thought of as "what you have," "what you
know," and "what you are."
6.4.1.1 Credentials (Access Card Types)—What You Have
There are a number of different types of credentials (or
access cards) used in personnel access control, Tips for Small Utilities
including photo identification, exchange, stored-image
Single door card reader systems are
badges, and coded credentials. There are many available that include everything necessary
techniques available for coding a badge or card. The to control a single door. These may be cost-
most common techniques include magnetic stripe, bar effective for a small utility having few doors
j rr, or staff. Also available are single-door
codes, proximity, and smart cards. The most commonly
access control systems that use a PIN
used card readers are magnetic stripe or proximity for door entry but can be
technology. integrated into a networked
card reader system in the future.
Card reader access control systems provide the most ^^__^_^^^_^_^^^^_^^___^^^_
reliable, flexible method of controlling access to a
6-8
-------
choosing the optimal security equipment
facility. Card reader systems come in many configurations, from stand-alone systems that control
only one door to scaleable systems that can provide enterprise-wide control for an entire corporation
spanning multiple continents. Newer card reader systems offer sophisticated database intelligence
that allows integration with payroll, information technology, and human resources databases. If an
employee is terminated, his or her access privileges can be revoked within the access control system
instantaneously. Some access control systems offer seamless integration with video surveillance
systems, where access control alarms and video surveillance images are displayed on common
PC workstations.
As shown in Figure 6-1, the card reader system typically consists of:
• a computer server or workstation that displays alarm conditions and allows programming of
the system
• a badge station,
allowing creation
and programming of
badges
• local control panels
that control the
doors, card reader
units, and access
cards
• a printer unit that
prints each event
and alarm condition
Under normal operation, BylkJtag A Building 8
the system grants access
at doors with card
readers by comparing
the time and location of any attempted entry with information stored in memory. Access is
granted only when the security card used has a valid entry code at the card reader for a
designated time frame.
Significant advantages of the card reader system include the capability for event tracking and
programmable software functions, such as these:
• Event tracking/event logs are lists of security events recorded by the access control system that
indicate the actions performed. Each event log entry contains the time, date, and other
information specific to the event.
• Two-man rule software is software programming that is optional on many card reader systems. It
prevents an individual cardholder from entering a selected empty security area unless
accompanied by at least one other person or exiting if only one person will remain in the area.
FIGURE 6-1
Typical Card Reader System
6-9
-------
choosing the optimal security equipment
Once two cardholders are logged into the area, other cardholders can come and go individually
as long as at least two people are in the area. Conversely, when exiting, the last two occupants of
the security area must exit together.
• Anti-passback software prevents users from giving their cards to someone else to use. This
feature is sometimes available with keypads. To prevent the same PIN from being used by many
people, a time element can be programmed in—the PIN will not work again until that time
expires. Some anti-passback systems require that if a card is used to enter an area that card must
be used to exit that area before it can be used to gain access to a different or unrelated area. This
feature also helps eliminate "piggy-backing" or tailgating by unauthorized persons.
6.4.1.2 PIN—What You Know
There are two primary considerations for selecting a secure PIN. First, the PIN should be long enough
and have enough digits to prevent easy guessing. Second, the PIN should not be a number that is too
meaningful to the individual to whom it is assigned (e.g., birthday or nickname). If a person is
allowed to choose his or her own PIN, he or she should be discouraged from choosing a PIN that is
too meaningful and could be easily guessed.
Some systems provide a maximum number of PIN entry attempts before disallowing the credential
or generating an alarm to the central control system.
6.4.1.3 Biometrics—Who You Are
Commercial equipment is available that uses hand or finger geometry, handwriting, eye pattern,
fingerprints, speech, face, and various other physical characteristics to identify an individual. When
selecting or deploying biometric devices, consideration of the security objectives is required so that
the optimal device is selected and that it will operate as desired.
Hand readers and fingerprint readers are the most common biometric access control applications.
Fingerprint reader stations are physically smaller in size and have a lower cost than hand geometry
readers. Fingerprint readers are best suited for installations with smaller user populations (such as a
lab area accessed by approximately 20 people), whereas larger user populations are better served by
hand geometry readers.
Not everyone can use biometric devices. Fingerprint readers have a higher false-rejection rate than do
hand geometry readers. For example, a portion of the population cannot use fingerprint readers
because of dry skin. Manual labor staff who routinely use their hands may have worn fingerprints or
scars on their fingertips, making it difficult for effective fingerprint reading. In addition, physical
changes occur with age or injury that can impact biometric reader effectiveness. In these cases, a hand
geometry reader might be a more effective technology.
Training on the capabilities and limitations of the selected biometric device is essential. The
procedures need to provide for the periodic update of biometric data for each person tracked by the
device; enrollment of staff into a biometric reader is not a one-time action.
6-10
-------
choosing the optimal security equipment
6.4.2 Interior Intrusion Detection
Many types of interior intrusion detection systems are in use today, including volumetric sensors and
boundary penetration sensors.
6.4.2.1 Interior Volumetric Sensors
Volumetric sensors monitor an internal area to detect the presence of an intruder. There are several
types of volumetric sensors, including microwave, ultrasonic, passive infrared (PER), and dual-
technology (microwave and PIR). The most commonly used are dual-technology sensors.
Dual-technology sensors use both microwave and PIR sensor =^^=^^==s^=
Tip for Small Utilities
circuitry within one housing. An alarm condition is generated if
Designs for smaller
either the microwave or PIR sensor generates an alarm condition. In
utilities might consider an
some dual-technology sensors, alarm settings may be adjusted to exterior door contact(s)
require that both the microwave and the PIR unit detect an intruder and interior dual-
presence before an alarm condition is generated. technology sensor
connected to a SCADA
Dual-technology sensors have some drawbacks; for example, the alarm point.
PIR channel is relatively vulnerable. An elusive burglar may use an
infrared emission-blocking cloak or screen to camouflage his infrared radiation. In addition, in hot
climates when air-conditioning is off, there is a serious problem of misdetection with high ambient
temperatures. Some dual-technology sensors attempt to overcome this limitation by having installer-
selectable logic, where detectors from either channel are enough to trigger an event. However, this
mode is not very popular because it suffers from the false alarm weaknesses of both technologies.
6.4.2.2 Interior Boundary Penetration Sensors
Boundary penetration sensors detect the presence of an intruder across an interior boundary, such as
a door, window, or hatch. The most typical boundary penetration sensors are door switches, glass-
break sensors, and linear-beam sensors.
• Door switches. The workhorse of the security intrusion detection field, door switches include
contact switches, magnetic switches, and balanced magnetic switches. These switches may be
used in a variety of applications, from monitoring doors to monitoring hatches, vaults, and panel
enclosures. By far, the most effective is the balanced magnetic switch. This switch has internal
circuitry that resists tampering or defeat from strong magnetic fields. By comparison, standard
magnetic switches have been defeated by applying a strong magnet to the exterior of the door to
bypass an alarm and force the door open.
• Glass-break sensors. There are three basic types of glass-break sensors: acoustic sensors (listens
for an acoustic sound wave that matches the frequency of broken glass), shock sensors (feels the
shock wave when glass is broken), and dual-technology sensors (senses acoustic and shock
vibrations). Because glass-break sensors do not sense motion or intrusion from entering a door or
hatch, the sensors should be used in conjunction with other methods (such as volumetric
sensors). It is recommended that glass-break sensors not be placed directly on a glass surface.
6-11
-------
choosing the optimal security equipment
• Linear-beam sensors. Also referred to as a photoelectric beam or photoelectric eye, linear-beam
sensors consist of a transmitter that emits a beam of light that is invisible to the human eye and a
receiver that receives the beam of light. If the beam of light is interrupted or broken by motion
from an intruder, an alarm is triggered. Linear beam detectors can be surface mounted or
recessed. These sensors require a straight line of sight between the transmitter and the receiver.
6.4.3 Exterior Intrusion Detection
Several types of exterior intrusion detection sensors exist and may be classified according to type,
method of use, style, and mode of application. The following exterior systems are most applicable to
water system applications and are listed in order from basic to advanced in the following paragraphs:
freestanding sensors, buried-line sensors, and fence-mounted sensors.
6.4.3.1 Freestanding Sensors
Freestanding sensors are the most common style of exterior sensor ^^^^^^=^^^^^==
., ,, „ . , ,_• • r_ j nm Tips for Small Utilities
available. Types include active infrared, FIR, microwave, and dual-
technology sensors. Microwave and dual-technology detectors are Monostatic microwave
sensors work well for
frequently used as freestanding sensors. monitoring reservoir
• Microwave sensors come in two styles: bistatic and monostatic. ladders or other small
D. areas. The device can be
Bistatic microwave sensors use a transmitter and receiver pair. ajmed dowp a ^^
Monostatic microwave sensors use a single sensing unit that ladder toward the ground,
incorporates both transmitting and receiving functions. With for example. Make sure the
both bistatic and monostatic sensors, the sensors operate by device is rated for Outdoor
,. .. „ , . . , use before installing.
radiating a controlled pattern of microwave energy into the _^_____^___^_^_
protected area. The transmitted microwave signal is received,
and a base level "no intrusion" signal level is established. Motion by an intruder causes the
received signal to be altered, setting off an alarm. Microwave signals pass through concrete and
steel and need to be applied with care if roadways or adjacent buildings are near the area of
coverage, otherwise nuisance alarms may occur. Many monostatic microwave sensors feature a
cut-off circuit, which allows the sensor to be tuned to cover only a selected region to reduce
nuisance alarms.
• Dual-technology sensors use a combination of FIR and microwave technology, as discussed
previously.
6.4.3.2 Buried-line Sensors
Buried-line sensors include pressure/seismic sensors, magnetic field sensors, buried-ported coaxial
cable, and buried fiber-optic cable sensor systems. Each of these systems relies on sensing the
presence of an intruder by means of a buried cable system within the ground.
A factor that must be considered when using buried-line sensors are the presence of underground
utilities. Underground utilities, such as gas, water, and sewer lines, must be sufficiently below the
6-12
-------
choosing the optimal security equipment
detection zone, or false alarms may result. Typically, 3 feet is sufficient to prevent false and nuisance
alarms. Underground electrical wires must also be considered.
Other factors also need to be considered when using a buried-line sensor. Rodents have been known
to cause maintenance problems by gnawing on the sensor cables. Installations also should not be in
areas where running water will either wash away the soil that buries the sensor, cause nuisance
alarms during a heavy rain, or result in standing water or pooling issues.
A drawback to the buried-line sensor system is that it may have different sensitivities when buried
below different surfaces. For example, if a continuous system is buried below a concrete surface as
well as under a lawn, the sensitivities required for each surface may be different. A good sensitivity
adjustment for concrete may be too sensitive for grass. In this case, it may be best to individually zone
those areas so that the sensitivities may be adjusted for each.
6.4.3.3 Fence-mounted Cabling Sensors
With fence-mounted systems, it is critical that the fence construction ==^==^=^=
be of high quality, with no loose fabric, flexing, or sagging material. Tlps for Sma" Utlllties
The fence should also have solid foundations for posts and gates. Fence-mounted sensor
systems work well
Otherwise, nuisance alarms may occur. in afeas
Several types of fence-mounted perimeter intrusion detection systems animals or passersby;
otherwise nuisance alarms
exist. These include electro-mechanical vibration sensing, coaxial rp
-------
choosing the optimal security equipment
Possible defeat measures include tunneling, jumping, or bridging across the fence system. Careful
climbing at corner posts also may not generate sufficient vibration to generate an alarm condition.
6.4.4 CCTV Camera Systems
CCTV camera surveillance systems are integral to effective assessment of alarms. This section
describes some of the requirements and components comprising a CCTV system.
As shown in Figure 6-2, a
CCTV system typically
consists of:
• one or more cameras
• transmission media (fiber
cable, coaxial, or twisted-
pair cabling)
• a monitor for viewing
incoming camera images
• a matrix switcher or
multiplexer that receives
incoming video streams
and directs them to
monitors and recording
equipment
Video Recording
FIGURE 6-2
Typical CCTV System
• a means to record each event and alarm condition
6.4.4.1 Camera Characteristics
There are several key performance characteristics of a video surveillance camera. Among these are:
• Camera resolution. The amount of detail that the camera can distinguish and produce. The higher
numbers indicate better resolution.
• Minimum illumination. The minimum amount of light needed for the camera to display images.
For illumination, the lower the number, the better.
• Lenses. The lens size and type required for the camera.
Other important considerations of CCTV camera systems are
whether the cameras are fixed-position or pan, tilt, and zoom
(PTZ) cameras:
• Fixed-position camera mounts. The camera is mounted in a
fixed position and cannot rotate or pan. A good application
for fixed cameras is detection surveillance, because video
motion detection can be more readily applied to the static
field of view.
Tips For Small Utilities
Because pan/tilt cameras are
three to four times the cost of
comparable fixed cameras,
consider using multiple
fixed cameras in place of
one pan/tilt camera.
6-14
-------
choosing tho optimal security equipment
• PTZ camera mounts. These camera mounts allow the camera to rotate, pan, tilt, and zoom.
Because of the drive motor and housing, PTZ cameras are often four times more expensive than
fixed cameras. PTZ cameras are often used for surveillance applications to view and assess alarm
conditions.
6.4.4.2 Other Camera System Elements
Matrix switchers are components that provide switching capability between cameras and viewing
monitors. They typically offer functionality that allows programmable settings such as camera
naming, guard-tour camera sequences, and salvo switching.
Digital video recording provides a great improvement in camera image storage. Benefits include
eliminating consumable media (tapes), reducing physical storage space, ease of search-and-playback
functions, and the capability to add watermarks for documenting evidentiary recordings.
Video motion detection systems permit detection of entry or intrusion using video images. This new
technology is based on computer algorithms that analyze the received video image and compare it to
stored images in the system memory. The incoming video is analyzed for the direction of the object's
movement and changes in images and background "texture."
6.4.4.3 Low-light Cameras
Several technology solutions are available to permit viewing under low light conditions, including
black/white switching cameras, infrared illuminators, or thermal imaging cameras. It is important to
design illumination specifically for the CCTV camera being used. The range that the camera will see
in the dark depends on the sensitivity and spectral response of the camera and lens combination.
Color - black/white switching cameras. Some cameras will automatically switch from color during
daytime to black/white at night, which permits viewing under low light conditions. This can be an
effective solution in situations where the existing illumination levels are too low during night
conditions to permit color camera use, but color camera use is desired during daytime conditions.
Numerous CCTV camera manufacturers offer auto-switching black/white cameras.
Infrared Illuminators. The human eye cannot see infrared light. Most mono-CCTV cameras,
however, can. Thus, invisible infrared light can be used to illuminate a scene, which allows night
surveillance without the need for additional artificial lighting. Infrared also provides many other
benefits above conventional lighting, including:
• IR beam-shapes that can be designed to optimize CCTV camera performance
• Extended bulb-life
• Covert surveillance, no visible lighting to alert or annoy neighbors
• Lower running costs
A number of camera manufacturers produce a variety of beam patterns, such as 10° and 30° spot
(precise) illuminators and 60° flood illuminators.
6-15
-------
choosing the optimal security equipment
Thermal imaging cameras. Thermal imaging cameras use special technology that senses heat
signatures rather than visual information. These cameras operate under complete darkness. Thermal
imaging cameras are best used in long-range detection and surveillance applications. Because they
register a heat signature, it is not possible to resolve the identification of the adversary; instead, these
cameras are best used to indicate the presence of an adversary.
6.4.4.4 CCTV Assessment
Utilities need to consider how they will assess incoming security alarms. It is particularly important
to assess alarms quickly, accurately, and without compromising the entire process. Visual
observation or CCTV camera surveillance is imperative for assessment. If frame-grabber technology
is used (recording pre-and-post alarm video images upon alarm conditions), then CCTV assessment
is simplified and can be nearly automatic.
6.4.4.5 CCTV Compression Standards
Digital images and digital video are always compressed to save space on hard disks and make
transmission faster. Typically, the compression ratio is 10 to 100. An uncompressed image with a
resolution of 640 x 480 pixels is approximately 600K (kilobytes) (2 bytes per pixel). Compressed 25
times, the image is approximately 25K. There are a number of common compression standards:
• Joint Photographic Experts Group, more commonly known as JPEG, is a good and very popular
standard for still images that modern programs support. This is the preferred standard for many
network cameras. The JPEG compression ratio is approximately 10:1.
• Motion-JPEG is a variation of JPEG where still images are shown at a high frame rate. It results in
very high-quality video, but unfortunately, consists of a lot of data, with a compression ratio of
approximately 20:1.
• Moving Picture Experts Group (MPEG) 2 is a standard for video. Many variations are possible,
but normally MPEG 2 performs at 720 x 480 pixels, 30 frames-per-second. Only modern
computers (such as Pentium III with adequate random access memory [RAM]) can decode
MPEG 2, as it requires larger computing capacity. The compression ratio is approximately 20:1
or better.
• MPEG 4 is a new standard for video. It provides better performance than MPEG 2, but it is not
commonly used. Compression ratios for MPEG 4 can be 200:1 or better.
6.4.4.6 CCTV System Recommendations
Consider these recommendations when purchasing a CCTV system:
• Look for ease of use.
• Investigate the scalability of the system. If more cameras are needed locally or remotely, what is
the effort required to add new cameras?
6-16
-------
choosing the optimal security equipment
• Ask the dealer if the new system or device is compatible with existing devices such as cameras,
matrix switches, and multiplexers. Rewiring for new cameras and devices is labor-intensive and
can be expensive.
• Understand the service plan. Manufacturers provide service and maintenance programs, and
some have premier service plans that provide feature upgrades and enhancements on computer-
based video recorders.
• Consider how the images will be viewed, the number of monitors needed to support the system,
and how multiple camera scenes will be multiplexed onto a common monitor (not every camera
requires an individual monitor).
Considerations when implementing a CCTV system include these:
• Use ample light. The most common reason for poor quality images is that the light level is too
low. Generally, the more light, the better the images. With lighting levels too low, images become
noisy and blurry with dull colors.
• Avoid backlight. Try to avoid bright areas in the images. Bright images might become over-
exposed (bright white) and objects might appear too dark. This problem typically occurs when
trying to capture an object in front of a window.
• Reduce the contrast. A camera adjusts the exposure to obtain good average light level in the
image. A person in front of a white wall tends to appear too dark. If a gray wall is used instead,
this problem does not exist.
• Sensor size. The lens must make an image large enough for the sensor. The larger the sensor, the
more expensive the lens. A lens made for a a/2-inch sensor will work for 1/2-inch, 1/3-inch, and
1/4-inch sensors, but not for a 2/3-inch sensor. If a lens made for a smaller sensor is used on a
bigger sensor, the image will have black corners.
• Lens and field of view. The lens selection and alignment should be established so that a
reasonable width of the alarm sector (8 to 10 yards minimum) can be seen at the near field of
view. The far field of view should be no more than 45 yards wide at the far end of the alarm
sector to allow at least 4.5 pixels to cover a 1-foot square target. This minimum resolution is
needed to classify the intrusion source as being a person versus an animal or debris, and requires
that the camera be mounted several yards outside the zone being assessed.
• Focal length. Wide-angle lenses have a better depth of field than telephoto lenses. This means
that you can focus both close to the camera as well as at a distance. Telephoto lenses require a
more precise focus adjustment.
• Iris. Always use auto-iris lenses for outdoor applications. The iris automatically adjusts the
amount of light reaching the camera and thereby optimizes its performance. The iris also protects
the image sensor from being damaged by strong sunlight. With an auto-iris lens, always set the
focus in low light. If the adjustment is made in sunlight, it is very easy to focus, but then at night
the iris diameter increases and the image is no longer in focus. Special dark focus filters are
available that reduce the light up to ten times.
6-17
-------
choosing the optimal security equipment
6.4.4.7 Mounting a Camera Outdoors
When mounting a camera outdoors, remember that lighting changes depending on the time of day
and the weather. Because of this, consider the following for outdoor cameras:
• As discussed previously, always use auto-iris lenses with outdoor cameras.
• Use caution when mounting a camera behind glass. If you mount a camera behind glass, such as
in a housing, make sure that the lens is close to the glass. If the lens is too far away from the glass,
reflections from the camera and the background will appear in the image.
• The mounting height for the camera should be high enough to angle the camera down to avoid
sunglare, yet low enough so that no lamps are visible in the camera field-of-view.
• Avoid direct sunlight. Direct sunlight blinds the camera and may permanently bleach the small
color filters on the sensor chip, causing stripes in the image. If possible, position the camera so
that it is looking in the same direction as the sun.
• When using a camera outdoors, avoid viewing too much sky. Due to the large contrast, the
camera will adjust to achieve a good light level for the sky, and the interesting landscape and
objects might appear too dark. One way to avoid these problems is to mount the camera high
aboveground. Use a pole if needed.
• Always use sturdy mounting equipment to avoid vibrations caused by strong wind. Wood poles
should NOT be used for cameras, and the use of cantilevered-arm mounts or poles is discouraged
because of stability concerns in wind. Metal triangular antenna tower sections are ideal for
stability.
6.4.4.8 Sample System Performance Criteria
• For cameras used to detect an intruder (that is, the capability to determine the presence of an
intruder but not necessarily classify as a human, animal, or object), the area of interest should
occupy a minimum of 10 percent of the field of view, with a maximum field of view of 300 feet in
length or less.
• For cameras used for classification of an intruder (that is, the capability to determine the
classification of an intruder as human), the area of interest should occupy a minimum of 15 to 20
percent of the field of view, with a maximum field of view of 200 feet in length or less.
• For cameras used for identification of an intruder (that is, the capability to determine the identity
of a human intruder), the area of interest should occupy a minimum of 25 percent of the field of
view, with a maximum field of view of 75 feet in length or less.
• Exterior cameras should have minimum resolution of 470 horizontal lines.
• Exterior cameras should be rated for use at 0.05 foot-candles.
• CCTV cameras should be listed in accordance with UL 3044, Surveillance Closed Circuit
Television Equipment.
6-18
-------
choosing the optimal security equipment
The camera should provide adequate onsite digital recording capacity for all cameras at 30 days
of continuous storage at 1 frame per second.
CCTV equipment should have integral digital video motion detection capabilities. The system
should be programmable to degree of motion, range of motion, speed, number of pixels to cause
motion, and area of motion detected.
To conserve bandwidth and storage requirements, the CCTV equipment should be capable of
providing a video compression ratio of 20:1 (or better).
6.5 Summary
A variety of different security systems and components are commercially available. Before
implementing a security system, it is important to understand the characteristics and requirements of
the area and facility to be protected. With this understanding, detailed and specific criteria can be
developed to specify exactly how the security system should be implemented.
Technology and manufacturers of security devices are rapidly changing. Therefore, web resources are
useful for getting the latest information on security products. EPA has published guidance for water
and wastewater utilities on security devices and equipment in the form of its Security Product
Guides. This guides are kept up-to-date on EPA's web site at
http://www.epa.gov/safewater/security under the Primary Topic of "Security Enhancements,
Research, and Technology." At the time of writing, guides are available for security products, cyber
protection products, physical asset monitoring products, and water monitoring products.
6-19
-------
(This page intentionally left blank)
-------
SECTION 7
Emergency Response Planning
Introduction
Management:
Optimizing
Physical Security
Operations;
Enhancing
Physical Security
• Understand the context of the plan
• Specify an incident command system
• Develop the components needed to support the system
• Update the system components on a regular basis
Emergency
Response
Planning
Integrated
Security Planning
and Design
7.1 Overview
A security system can never prevent all events, thus a utility needs to be prepared to respond and
recover from malevolent acts and unintentional events (such as natural disasters and accidents).
Emergency response is divided into four types of actions: planning, response, recovery and
termination.
This section presents information for water utilities to consider when planning for and responding to
incidents in order to rninimize disruption of service and to protect employees and the public. The
issues discussed provide the basis for development of an Emergency Response Plan (ERP). General
information and resources on emergency response are provided in this section; references listed in
Section 7.2.4, "Additional Information for Developing ERPs," and the bibliography should be
consulted for emergency response plan specifics.
7.2 Emergency Response Background
To prepare an effective ERP, it is important to understand its background and purpose.
7.2.1 Regulations
As discussed in Section 1.2.2.1, "Regulatory Drivers," the Public Health Security and Bioterrorism
Preparedness and Response Act requires the creation of or an update to an ERP for all community
7-1
-------
emergency response planning
drinking water systems serving populations greater than 3,300. The focus of this guidance is to help
utilities to incorporate the responses needed in the face of man-made threats as well as those
responses already included for natural disasters and accidents.
Many states have created regulations in parallel with or in response to the Act. Utilities are
encouraged to ask their state regulatory agencies and local public health districts to provide those
prescribed requirements for water emergency plans.
Emergency plans are an important tool in planning and recovery for all utilities. Joint utilities (water
and wastewater) should consider combining the ERP efforts for the required water system emergency
plan with a wastewater and stormwater plan to gain additional value for the time and money
invested on the water plan.
7.2.2 Purpose
The purpose of an ERP is to provide a utility with a standardized response and recovery protocol to
prevent, minimize, and mitigate injury and damage resulting from emergencies or disasters of
human-caused or natural origin. There are two types of data needed to develop an ERP: detailed
information about the risks to critical water system facilities and knowledge of emergency response
protocols, personnel, and resources.
Water utilities performed vulnerability assessments (VAs) before ERPs were developed or revised as
part of complying with the Act. The VA identified and prioritized the types of risks to the utility's
critical assets, as well as listing ways to reduce risk to these assets. This information is used to
develop an ERP that focuses on response to and recovery from these risks.
The ERP is also developed using knowledge obtained through workshops and consultations with
local emergency management personnel and first responders; this communication provides the utility
with specifics about local resources and begins the agency coordination necessary to successfully
respond to an emergency. With this information, the ERP can clearly outline the communication and
coordination that will occur between the utility and local emergency response personnel, including
police, fire, and public health officials. The ERP will also define procedures, identify available
equipment and personnel resources that can assist the utility in response and recovery.
7.2.3 Governmental Support
for Emergency Response: NIMS and ICS
On March 1, 2004, the DHS established the National Incident Management System (NIMS) pursuant
to Homeland Security Presidential Directive-5. NIMS consists of five major subsystems that
collectively provide a total systems approach to risk incident management. These five elements are
the Incident Command System (ICS), Training, Qualifications and Certification, Publication
Management, and Supporting Technology.
7-2
-------
emergency response planning
On September 8,2004, the DHS sent a letter to state governors that outlines the requirements of NIMS
as our nation's first standardized approach to incident management and emergency response. The
minimum FY 2005 requirements for local jurisdiction support of NIMS are:
1. Completing the Introductory NIMS Awareness Course, available online at
http:/ / training.fema.gov/EMIWeb/ IS/ is700.asp.
2. Formally recognizing the NIMS and adopting NIMS principles and policies. The NIMS
integration center (NIC) has tools to help with NIMS (www.fema.gov/nims).
3. Establishing a NIMS baseline by determining which NIMS requirements the jurisdiction already
meets. There is a NIMS Capability Assessment Support Tool (NIMCAST) under development
from NIC.
4. Establishing a timeframe and developing a strategy for full NIMS implementation.
5. Institutionalizing the use of the ICS.
ICS is a standardized response management system that is a key component of NIMS. It is an "all
hazard/all risk" approach to managing crisis response operations as well as non-crisis events by
enhancing command, control, and communication capabilities. In the early 1970s, ICS was developed
to manage rapidly moving wildfires and to address the following problems:
• Different emergency response organizational structures
• Unclear or unspecified incident objectives
• Too many people reporting to one supervisor
• Lack of reliable incident information
• Inadequate and incompatible communications
• Lack of structure for coordinated planning among agencies
• Unclear lines of authority
• Terminology differences among agencies
Information and training on ICS can be obtained online at http://training.fema.gov/emiweb/
is/crslist.asp.
7.2.3.1 Benefits of ICS
The adoption of ICS offers these benefits:
• A flexible, but formal, response management system that allows for the cultivation of response
management expertise at all levels of applicable response organizations.
• Increased coordination between utilities, their personnel, and other first responders such as
police, fire, public health, and public works departments
• Application to any response situation ("all hazard/all risk")
• Logical and smooth organizational expansion and contraction
• Autonomy for each agency participating in the response
7-3
-------
emergency response planning
• Increased support of trained personnel during major incidents
• A "public domain" system that allows unrestricted distribution by commanding officers to
improve capabilities and unify the local response community into a more effective organization
7.2.3.2 ICS Command Structure
The Incident Management Team, as shown in Figure 7-1, consists of the Command Staff (incident
commander, public information officer, liaison officer, and safety officer) as well as the operations,
planning, logistics, and financial sections of the utility. Not all positions may be activated during an
emergency. Based on this structure, the ERP describes the utility personnel who will fill each role (at
least two people for each position on the team) and their roles and responsibilities.
Command Staff
Incident
Commander
Public Information
Officer
Operations
Planning and
Intelligence
Finance and
Administration
FIGURE 7-1
Incident Management Team Organizational Structure
During an emergency situation, the Incident Management Team members will, at a minimum:
• Identify an Incident Commander to manage the Operations, Planning/Intelligence, Logistics,
Finance/Administration Sections, and related sub-functions of the ICS.
• Set priorities and implement previously developed Incident Action Plans (lAPs).
• Control and mitigate emergency situations.
• Coordinate and support all field-level incident activities within the utility service area.
• Gather, process, and report information to stakeholders within the utility service area and to
other levels of the ICS.
• Coordinate with local governments, organizations with which the utility has mutual aid
agreements, or regional Emergency Operations Centers (EOCs) as appropriate.
7-4
-------
emergency response planning
• Coordinate the transition of expanded ICS responsibilities to outside agencies when the scope
and parameter of emergency response exceeds jurisdictional capability.
• Request resources from appropriate agencies.
• Organize recovery and cleanup of emergency response activities.
7.2.4 Additional Information for Developing ERPs
It is not the intent of the ERP section of this document to supplement the exhaustive research already
conducted by AWWA and the EPA on emergency planning, but only to emphasize a few areas for
further consideration. Additional information can be found at the following web sites: http://
www.awwa.org/advocacy/learn/security/ and http://www.epa.gov/ebtpages/emergencies.html.
• EPA has developed "Emergency Response Plan Guidance for Small and Medium Systems," and
"Large Water System Emergency Response Plan Outline: Guidance to Assist Community Water
Systems in Complying with the Bioterrorism Act." These documents can be downloaded from
the Water Security Page on the EPA's web site (http://cfpub.epa.gov/safewater/watersecurity).
Select "Emergency/Incident Planning" under Primary Topics.
• VSAT™, described in Section 1.4.4.2, has an ERP module that can be used to guide a water utility
through ERP development.
7.3 Key Components of an ERP
The basic components of an ERP address the four types of actions involved in emergency response:
planning, response, recovery, and termination. The sections below describe the ways in which each
action can be included in an ERP.
7.3.1 Introduction
To familiarize the reader of the ERP with ideas relevant to the development and use of the plan, it is
helpful to include an introduction to the document. The introduction describes how the four actions
are integrated into the ERP, as well as its purpose, goals, underlying regulatory requirements, and
overall document organization.
7.3.2 Planning
Planning is integrated into the ERP in a number of areas, including in the overview of utility facilities,
concept of emergency operations, emergency facilities and equipment, the crisis communications
plan, incident management, document management, training, water contamination and
decontamination.
Planning is also part of the utility's emergency response partnerships, mutual aid agreements, and
emergency response policies, procedures, and documents that summarize the scenarios from the
vulnerability assessment that are addressed in the ERP.
7-5
-------
emergency response planning
7.3.2.1 Overview of Utility Facilities
An overview of a utility's facilities is needed to identify that the essential information on which to
base decisions is ready in the event of an emergency. The overview can include a description of the
raw water supplies, treatment and distribution systems, storage capability, and design standards.
Tables can be useful in displaying the volume of information concerning critical facilities, such as
pump station locations. System maps, site plans, flow diagrams, hydraulic profile schematics, and
data tables can either be part of the overview or readily available to aid in the understanding of
system capacities and the interrelationships between system components.
7.3.2.2 Concept of Emergency Operations
The concept of operations lays out the plan for emergency response. This section can include
descriptions of emergency direction and control, the incident management team, and mutual aid
agreements. The emergency direction and control portion discusses the ICS, unified command, and
initial and sustained operations.
The incident management team portion describes the roles for utility personnel (at least two people
should be prepared to assume each position on the team) and their associated responsibilities. The
team normally consists of an incident commander, public information officer, liaison officer, and
safety officer, as well as the operations, planning, logistics, and financial representatives (see
Figure 7-1). Not all positions may be activated during an emergency. In some cases, depending on the
size of the utility or the severity of the event, one individual may fill multiple roles.
Mutual aid agreements describe the additional resources that the utility can expect to receive from or
provide to other organizations in the event of an emergency.
This section also includes other relevant planning materials, such as the utility's polices and
procedures, and plans to mitigate emergency incidents, such as how the utility will respond to
threats. It describes activation of the Emergency Operations Center (described in the following
section), response capabilities, personnel safety provisions, and protective action protocols.
A relevant source of information for utilities as they plan to assess and respond to threats is the EPA's
Emergency Response Protocol Toolbox (http://www.epa.gov/safewater/security). Utilities can refer
to the Toolbox for guidance on handling the various stages of threat assessment, including the
possible stage, credible stage, and confirmed stage, as well as site characterization and use of
laboratories that are capable of detecting a broad range of contaminants.
7.3.2.3 Emergency Facilities and Equipment
The emergency facilities and equipment section discusses the EOC, emergency equipment, and
communication resources. An EOC is a pre-designated facility where the overall response and
support for an emergency will be coordinated. The EOC can be a portable or fixed separate room
equipped and designated for emergencies only or one that can easily be equipped for use during
emergency events. Primary and secondary EOC locations for the utility are designated, as well as city
7-6
-------
emergency response planning
or county HOC locations. A map showing the relationship between these EOCs, as well as their
addresses and telephone numbers, is a helpful tool during an emergency.
The HOC should have sufficient administrative and office supplies, including the items listed below:
• Communication equipment (telephones, computers, fax, two-way radios, etc.)
• Copies of the ERP, system-related maps and drawings, and operational procedures
• Chalk or white boards, paper, pens, calendars, logbooks, printers, etc.
• Tables and chairs
Consideration should also be given to providing overnight accommodations at or near the HOC
including cots and bedding, a supply of food and water, and bathrooms with showers.
Emergency equipment addresses the recommended equipment, from safety gear to office supplies, to
be stored in the EOC, along with references to available field equipment such as vehicles and portable
generators. The communication resources related to facilities and equipment consist of available
intra-agency and inter-agency communication methods available during an emergency, such as cell
phones, two-way radios, and the GETS service (previously described in Section 2.9.1,
"Communications Equipment").
7.3.2.4 Crisis Communications Plan
During a crisis, clear and timely communication can save lives, property, and credibility. The crisis
communications plan details communication procedures and capabilities within the incident
management team and with stakeholders, crisis communications tools, and key messages for the
public. If there is a need to communicate to the public directly or through the media, this role should
be performed by a person designated by the Incident Commander.
Planning communications with stakeholders, both internal and external to the utility, includes
identifying who should be notified during crisis situations and the procedures for such notifications.
This section often includes primary and alternate emergency contact information (such as current
telephone numbers and the order in which contacts are made) for, at a minimum, the following
groups:
• Utility's Incident Management Team
• Crisis communications team
• Utility personnel and next-of-kin
• Local, state, and federal organizations, including emergency response and regulatory agencies
• Chemical and equipment suppliers or other vendors
• Contractors and consultants
• Mutual-aid partners
• Media
• Sensitive customers
7-7
-------
emergency response planning
The crisis communications plan discusses the various tools for disseminating information to internal
and external audiences. The key messages section emphasizes the importance of facilitating rapid
communication during an emergency event, providing press release templates and guidance on
interaction with the media and the public. Communication resources (such as those included as part
of "Facilities and Equipment") can also be included in this plan.
Section 2.10, "Interagency Coordination," of this document discusses the importance of coordination
and communication with emergency responders and local emergency management agencies, health
departments, and neighboring utilities, and provides tips on improving coordination. The better the
coordination and communications protocols are established before an emergency, the more efficient
and successful the response will be in a crisis.
7.3.2.5 Incident Management
Incident management planning specifies how utilities will respond to, recover from, and terminate an
emergency, including the way in which operations will proceed and how damage will be assessed
and repaired.
Emergency response checklists can be used to guide the operation of affected facilities during and
after the emergency. The types and content of the checklists can vary depending on location and
nearby agencies. For example, utilities may want to develop response checklists for:
• activation and deactivation of the utility's EOC
• evacuation
• sheltering-in-place
• power failure
• severe weather
• earthquakes
• medical emergencies
• fire/explosion
• chemical release
• destruction/failure of any part of the system
• dam failure
• bomb threat
• unauthorized entry
• workplace violence
• civil disorder/terrorism
• contamination threat to the system
• SCADA attack (both electronic and physical)
7-8
-------
emergency response planning
Many of the events may occur in conjunction, requiring the use of more than one checklist. For
example, a fire or explosion may also result in a medical emergency and chemical release.
7.3.2.6 Document Management
Document management plans consider records preservation and storage, and the documentation
required for insurance coverage. Records preservation stresses the importance of the incident
commander's responsibility to compile all records associated with an emergency event and to
arrange for record storage in accordance with standard utility procedures. Records storage identifies
the security requirements for the documents, including how the records are handled and by whom,
and the physical security of the storage location.
One type of essential records to be collected and preserved are the handwritten or electronic logs
generated during the emergency. Developed and controlled by the Incident Management Team,
these logs become official documentation of the emergency and can serve as the basis for the post-
incident review.
The insurance coverage section describes how additional funding for emergency response and
recovery from major disasters may be obtained. To file claims with FEMA, other governmental
agencies, the utility's insurance carrier, or private organizations, specific supporting documents must
be created and provided. A description of the documents needed and how they should be processed
can be included here.
Because it is important to track the location of copies of the ERP so that all are updated when changes
to the plan are made, utilities may want to consider developing a tracking log. This log can identify
the copy by number, the individual who has been assigned that copy, as well as that individual's
address and telephone number.
7.3.2.7 Training
The ERP also contains a section that discusses the utility's emergency response training program.
Training and drilling are critical to successful emergency response. The quality of the ERP will not
matter if utility personnel are not trained to use it, or if utility personnel and emergency responders
are not used to working together.
The training section covers both internal and external training methods. Internal training methods
may include employee awareness training, classroom training, tabletop exercises, drills, full-scale
exercises, electronic mail response training, and emergency response coordination with federal and
state emergency response organizations. External support training can include such subjects as
hazardous waste training by HAZWOPER, use of a fire extinguisher, and CPR/first aid. (These
methods are addressed in more detail in Section 2.5.6, "Training.")
Training programs, such as those that follow, can be specifically related to emergency response:
• Orientation sessions. Orientation sessions include basic instruction and explanation of the ERP
and IAP procedures. Written tests may be used to verify a specified level of comprehension by
the attendees.
7-9
-------
emergency response planning
• Table-top exercises. Table-top exercises are extremely helpful in testing emergency procedures
and enabling communication between personnel who would respond to an emergency.
Participants are presented with a fabricated major event and are asked to discuss their potential
responses. Table-tops involve many players acting out an emergency situation in an indoor
setting within one or more rooms. An exercise director facilitates the exercise and develops a
plausible scenario with a "trusted agent" from the utility. After the exercise is complete, the
exercise director conducts a review of the exercise and lessons learned with the participants.
Information on FEMA's training program is located at
http://www.fema.gov/fima/education.shtm.
• Exercises drills. Larger-scale field drills that involve the utility and other agencies are an eye-
opening exercise for participants. These dress rehearsals for emergencies are an excellent way to
find flaws in communication, equipment, response times, and many other areas that are critical to
recovery during a real emergency. These exercises are the most expensive of the possible training
methods, but are very worthwhile if a community can afford to coordinate them.
7.3.2.8 Water Contamination and Decontamination
Utilities can develop response plans for water contamination and decontamination with information
provided in the EPA Emergency Response Protocol Toolbox modules. Plans can discuss incidents
that include threat warnings, the threat evaluation process, site characterization, and laboratories.
The threat warning section can describe the various types of threat warnings and references threat
documentation forms that may be included in an ERP appendix.
As discussed in the Module 2 of the Emergency Response Protocol Toolbox, the threat evaluation
process includes three stages: possible, credible, and confirmed. The possible stage section defines
how to determine the threat should be investigated or dismissed as impossible. The credible stage
section defines whether there is enough information and evidence to indicate a contamination event
may have occurred and the actions that should be taken. The confirmed stage is based on definitive
information demonstrating that the water has been contaminated, which is preferably through a
laboratory analysis that proves the presence of contaminants.
The laboratories section discusses the contact and protocols that utilities should have when working
with laboratories that are capable of detecting a broad range of contaminants. It also discusses the
various guidelines that the laboratories should follow.
Knowledge of decontamination is evolving quickly, as are other topics in the security arena. The EPA
Water Security web site (http://cfpub.epa.gov/safewater/watersecurity/) has documents to assist
utilities in understanding contamination and decontamination, and how to plan for these types
of actions.
7-10
-------
emergency response planning
7.3.2.9 Appendices of Related Information
The appendices to the ERP can include various documents relevant to emergency response of the
utility, such as those listed below:
• EPA-suggested measures for responding to emergencies at water utilities (e.g., Table 1-4,
"Summary of EPA Water Utility Response, Recovery and Remediation Guidance for Man-made
and/or Technological Emergencies")
• Maps and other relevant system information
• Copies of mutual aid agreements
• Contamination and/or bomb threat documentation forms
• Contamination threat evaluation worksheets
• Generic site characterization plans
• Site characterization report forms
• Equipment lists
• Example public notices and press releases
• Damage assessment reporting forms
7.3.3 Response
Response to an emergency event includes containment and control of a situation; mitigation of the
emergency situation; damage assessment, in which the utility determines the extent of damage, and
estimates repair or replacement costs; prioritizing actions, in which the utility identifies the resources
necessary to return the damaged system to full operation; and implementing actions, in which the
utility works to stabilize the system and return to normal. The response actions are based on the
information provided in the ERP.
Numerous agencies have published information providing assistance for utilities in formulating
ERPs. Some of the more widely known are included here.
• FEMA has developed extensive information relating to emergency prevention and response. A
number of these documents are listed in the references section of this document. Additional
information and documents can be found on the FEMA web site at http://www.fema.gov.
Locate the FEMA Library for information on "Preparation & Prevention," "Disaster and
Emergencies," and "Response and Recovery."
• The EPA's Response Protocol Toolbox: Planning for and Responding to Contamination Threats to
Drinking Water Systems contains six modules designed to help the water sector effectively and
appropriately respond to intentional contamination threats and incidents. The Toolbox files can
be downloaded in PDF or Microsoft® Word format at http://www.epa.gov/safewater/
watersecurity. Locate the information by selecting the primary topic of "Emergency/Incident
Planning," then selecting the toolbox from the list of "Emergency Response Tools and Guidance
Documents."
7-11
-------
emergency response planning
• Also available from the EPA is a "Laboratory Compendium" database of laboratories with water
testing capabilities. This database was populated through voluntary information from
laboratories nationwide. It can be used to determine where to send contaminated water samples
for testing. With permission from EPA, a utility can access the compendium at
http://www.epa.gov/safewater/watersecurity. Locate the information by selecting the primary
topic of "Emergency/Incident Planning," the selecting the compendium from the list of
"Emergency Response Tools and Guidance Documents."
• The American Society of Industrial Security (ASIS) published an "International Disaster
Preparation Guide" in 2003. This easy-to-read overview of emergency response that is useful for
utility employees is available on-line at http://www.asisonline.org. Select the guide title from
the Crisis Response list.
7.3.3 Recovery
Planning helps a utility to continue to meet its mission during and following an emergency. The
recovery plan emphasizes the importance in appointing a recovery manager who then selects a
recovery team to develop a strategy prior to emergency termination. The types of activities that could
be conducted during recovery include determining repair costs and contracts, conducting an
environmental consequence assessment, considering long-term operational changes, undertaking
facility and/or environmental restoration, and the disseminating information. This section identifies
plans that can help to ensure continuity during recovery from an emergency event.
7.3.3.1 Water System Operations Centers
It is recommended that the essential operations centers establish alternate location(s) for the
continuation or resumption of normal business operations. This includes establishing alternate
locations for computer, communications, and SCADA systems, as well as equipment storage and
supplies. Alternate work locations should include the necessary telephones, computers, and other
office-related machines and supplies.
Alternate business operations should be tested and exercised as part of the training program.
7.3.3.2 Electronic Records
The storage and retrieval of records is an integral part of a good recovery plan. Onsite backup storage
of computer files is problematic and can be devastating. Options include the establishment of real-
time backup and offsite storage of computer information. In the absence of real-time backup, daily
backup and offsite storage of records can be considered a basic recommendation. Backup operating
systems and software are recommended if needed for the alternate operations locations to be used
properly.
7-12
-------
emergency response planning
7.3.3.3 Communications, Control, and Coordination
Managers and supervisors require continuous information to react as best suits the emergency
situation, especially in the case of the relocation of the operations centers. Communication with other
water operations staff may be necessary through the use of alternate radios and cell-phones.
Support from outside agencies can be planned and anticipated during alternate and recovery
operations. Sharing of communications and control equipment and services can be arranged ahead of
time, and such activity tested in the atmosphere of exercises.
7.3.3.4 Lessons Learned
Immediately following a table-top exercise, field exercise, or actual emergency response, the ICS
leaders should convene a Lessons Learned review. The lead representatives in the ICS organization
can review the response actions with their personnel immediately following the exercise or event.
These key staff members can then meet to discuss updates and upgrades to the ERP and follow-on
actions. From this review, changes to procedures, actions, and supporting information can be
streamlined. Changes to existing ERP documents should be coordinated, then tested at the next
scheduled exercise.
7.3.4 Termination
There are impacts and costs incurred during emergency operations. Consequently, steps can be
planned and established that will facilitate a resumption of normal operations and the formal
cessation of emergency operations.
• Make a determination as to the time, materials, and equipment necessary to return original
structures to operating condition.
• Complete the documentation of internal and external labor costs, supply costs, equipment costs,
infrastructure costs from power and telephone, and the opportunity costs resulting from the loss
of routine activities during the emergency.
• Maintain and safeguard such summary records to support subsequent reimbursement claims, to
critique the emergency response; and to make them available for future study to determine
whether response modifications should be made.
• Identify the equipment needed or to be replaced due to loss or improvements learned as a result
of the emergency.
7.4 Revisions to ERPs
An ERP is never a final document. ERPs should be revisited and revised often. A utility staff member
can be assigned responsibility and given utility-wide authority for keeping the ERP up-to-date,
including maintaining contact lists and equipment information. A review of the ERP should take
place annually at a minimum, and should be based on the operational and procedural
recommendations of the most recent vulnerability assessment, results of training exercises, and
lessons learned from actual emergency responses. The vulnerability assessment identifies and
7-13
-------
emergency response planning
prioritizes risks to the utility, and the ERP should contain procedures for responding to and
recovering from these risks. The ERP should also be updated to include procedures involving new
security equipment and technology used at the utility.
7.5 Sample ERP Outline
The following outline is an example of an ERP for a medium-sized utility. The contents of the outline
have been based on EPA guidance documents. Many types of response plan formats are available, as
discussed in Section 7.2.4, "Additional Information for Developing ERPs."
I. Plan Development Introduction
II. Overview of Facilities
III. Concept of Operations
Emergency Direction and Control
Incident Management Team
Mutual Aid Agreements
TV. Emergency Facilities and Equipment
HOC Location (Primary and Alternate)
Emergency Equipment and Supplies
Physical Communication Resources
V. Crisis Communications Plan
Communicating within Your Team
Communications with Stakeholders
Crisis Communications Tools
Key Messages
VI. Incident Management
Emergency Response
Damage Assessment
Recovery Organization
Recovery Plan
Termination and Review
VII. Document Management
Records Preservation
Insurance Coverage
7-14
-------
emergency response planning
VIII. Training
Internal
External
IX. Water Contamination and Decontamination
Threat Warnings
Threat Evaluation
Site Characterization
Laboratories
Appendices
Summary of Mutual Aid Agreements
Emergency Contact Lists
Emergency Response Checklists
7-15
-------
(This page intentionally left blank)
-------
SECTION 8
Pulling It All Together Through
Fully Integrated Security Planning and Design
Operations:
Enhancing
Physical Securitx
management:
Optimizing
Physical Security
itroduction
• Develop a balanced approach tailored to the utility
• Identify benefits in addition to increased security
Emergency
Response
Integrated
Security Planning
and Design
8.1 Overview
Water utilities throughout the United States have enough differences that the idea of developing a
single physical security solution for protecting their systems is not realistic nor practical. The purpose
of this AWWA Security Guidance is to provide utilities with a toolkit full of ideas ranging from
design approaches and operational strategies to management practices. The best approaches that
utilities have developed for their water systems have been those that integrate best practices from
each of the three areas into an integrated approach.
8.2 Utility Case Studies
Table 8-1 and Table 8-2 provide examples of how utilities have applied this balanced approach to
protecting different facilities in their water systems. The names of the utilities and water systems
have not been identified to protect their confidentiality.
8-1
-------
pulling It altogether through fully integrated security planning and design
TABLE 8-1
Example 1 - Treated Water Storage Tank
Utility A
Utility B
Design Basis Threat
Design Approach
Operational Approach
Management Approach
Vandals
Boundary - Chain-link fence and
hardened locks on gate
Hatches - Welded steel bar
Vents - Double-screened vents
Daily site visits
Key control policy
Saboteur/Terrorist
Boundary - Chain-link fence and hardened locks on
gate
Hatches - Hardened steel lock and intrusion alarm
Vents - Double-screened vents
Outlet pipeline - Automatic shutoff valve
Daily site visits
Standard operating procedure (SOP) - Automatic
isolation of reservoir with hatch intrusion alarms
SOP - Reverse pressure zone pumps to hydraulically
isolate storage tank with hatch intrusion alarm
ERP - Response protocol to place system on
pressure operation when storage tank isolated
Key control policy
Local neighborhood watch program
TABLE 8-2
Example 2 - Raw Water Storage Reservoir
Utility A1
Utility B2
Design Basis Threat
Design Approach
Operational Approach
Management
Approach
Vandals
Accidental/Intentional Dumping
Containment structure around intake structure
Vehicle containment fence around reservoir
Monitoring system at stream inflow point
Response protocol to respond to spills in
reservoir
Daily site inspections
Community watch program with Park Ranger
Work with upstream gas wells to add
containment onsite
Vandals
Accidental/Intentional Dumping
Monitoring system at the Water Treatment
Plant influent line
SOP to switch raw water sources during water
quality events
Daily site inspections
Community watch program with Lake Ranger
1 Utility A owned and operated the reservoir.
2 Utility B did not control operations of reservoir and leased storage capacity.
8.3 What is the Optimal Solution?
There is no right or wrong approach for water utilities to implement physical security for their water
systems. The solution needs to be consistent with a number of factors, such as those identified below,
and is often independent of the size of the utility:
• Financial ability to pay for security improvements
• Design basis threat
• Community restrictions
8-2
-------
pulling it all together through integrated physical security planning
• Political pressures
• Water system redundancy
• Sophistication of utility staff
Utility managers need to understand the internal and external factors prior to developing a plan for
their water systems. Often, a utility manager will be asked to compare his utility's approach with the
approaches of other utilities or directed to protect his system from an attack from international
terrorists by the utility's governing body. This is when the utility manager needs to work with the
utility's legal council to identify the most appropriate method to communicate to the governing body
in a manner that does not jeopardize the overall water system approach to security.
8.4 Multiple Benefits in Security Enhancements
Utilities are faced with numerous funding requirements ranging from compliance with regulations to
annual maintenance of their system. Competition for funding can be difficult when the requirement,
such as security system compliance, may be perceived as just another unnecessary and poorly
thought out federal requirement. An effective approach that utilities have used to tackle this dilemma
has been to identify multiple benefits associated with the planned security improvements. Table 8-3
below provides some examples of security improvements that utilities have incorporated that have
also improved other parts of their business.
TABLE 8-3
Multiple Benefits from Security Improvements ^^
Security Improvement
Security Benefit
Operational/Management Benefit
Two operators per shift at WTP
New treated water
storage reservoir
New parallel pipeline
Integrated water quality
monitoring system
Expanded backflow
protection program
Security awareness training
Purchase spare parts for
critical components
Back-up power
Employee background checks
Improved monitoring capabilities of
security equipment
Added ability to bypass reservoir
during breach of tank
Added ability to maintain service if
pipeline is disrupted.
Added ability to detect, respond, and
mitigate water quality contamination
events
Protected against intentional
contamination acts against water
system
Promoted cultural acceptance of
security into utility
Improved response to restoring
service during malevolent event
Protected critical facilities from
intentional acts against power feed
Protected against malevolent acts
against system by insider
Improved safety of operators for off-hour
operations
Improved delivery service for service area with
additional storage capacity
Added operational flexibility to deliver water
into system
Improved operational knowledge of water
quality in system, and improved ability to
identify and correct an operational problem
before system is in violation
Protected water system during operational
problems associated with sudden pressure
loss in the water system
Improved employee awareness of water
system operation and safety
Improved operational ability to restore service
associated with a maintenance failure
Provided operational flexibility during power
outages associated with natural events
Reduced financial losses from insider theft
8-3
-------
pulling it altogether through fully integrated security planning and design
8.5 Doing What is Best for Your Utility
Utility managers have many tools available to put together the best solution for their water systems
to enhance overall physical security. Utilities do not need to buy "luxury" when "economy" will
accomplish the same task.
Example One. Utility A had a number of high-quality steel doors with glass windows in its water
treatment facility. The initial thought was to replace them with steel doors with safety glass at a cost
of $1,000 to $1,500 each. The utility also had a simpler solution —install a Lexan® PC resin plate on
the inside of the window to provide the security required and still maintain the visual capabilities.
The cost of the solution was less than $50 per door. The utility asked the question—does practical have
to be pretty? In the end, the utility went with the practical solution, saving thousands of dollars.
Example Two. Utility B had a number of wellheads in a local golf course that had open, unhindered
access. The community would only allow decorative special fencing to be used around the golf
course. The cost of the fencing was significant, so the utility came up with a more cost-effective
solution. A small concrete pad was constructed around the wellhead and a heavy metal grating
slipped over the wellhead to prevent tampering. The metal grates were constructed in the utility
maintenance shop and installed for less than $100 per wellhead.
Example Three. Utility C was concerned about undetected hatch entry into its distribution system
storage tanks, but it did not have the funds to add detection devices or automatic shut-off devices to
each tank. The utility identified the tanks that had no history of water quality problems and only
required cleaning every 3 to 5 years. The utility welded shut the hatches to these tanks, which was
sufficient for the DBT of kids and vandals. The cost of this solution was less than $100 per tank.
Example Four. Utility D was concerned with its inability to track meters that were provided to
contractors for construction water. The solution was to have utility staff to install the meters, then
mark and lock in place backflow-protected construction meters. Contractors were charged a fee to
cover these costs. Construction meters found in use that did not have proper utility markings and
locks were confiscated.
Example Five. Utility E had many doors on each of its buildings that required detection and entry
devices that would have been a very significant cost to the utility. The solution was to provide one
access entry point into each of the buildings. The other doors were made egress-only by removing
exterior hardware and, when necessary, installing concealed door hinges. Operations and
maintenance staff had to adjust to not having numerous entry points into each of the buildings, but
the capital and annual operating cost savings were significant.
When developing your approach to security, think simple and practical. Before inviting a security
equipment vendor to discuss equipment, first identify what you really need to protect your system.
Providing the appropriate level of physical security for your water system does not need to break
the bank.
-------
pulling it all together through integrated physical security planning
8.6 Pulling It All Together
Sections 1 through 7 have identified a number of areas for utilities to consider regarding developing
and implementing the optimal security solution for their systems. Every utility has its own unique
qualities that require a customized solution that fits its level of threat, organizational culture, and
financial situation. Key considerations that utilities should include in security planning are:
• Integration of management, operations, and design strategies into the security approach
• Simple solutions
• Solutions that provide multiple benefits
• A cross-functional utility team to develop the solutions
Developing a security solution for a utility does not need to create a significant financial burden,
impede existing operations, or require a complete redesign of the system in most cases. Utility staff
members understand their system better than consultants, regulatory agencies, and equipment
vendors. Using internal resources to develop the initial security master plan, which can be
supplemented by external resources, will be by far the most cost-effective approach.
8-5
-------
(This page intentionally left blank)
-------
Glossary
Americans with Disabilities Act
Chicane
Clearzone
Conduit
Countermeasures
Criminal
Daisy chain
Debt service funds
Debt service reserve funds
Design basis threat (DBT)
Signed into law in 1990, U.S. Public Law 101-226
prohibits discrimination based on disability, that it, the
inability to perform daily tasks using traditional
methods.
A sequence of tight curves on a roadway used to slow
cars.
An area surrounding the perimeter of a facility that is
free of shrubs and trees, and features well-maintained
landscaping that does not provide hiding places for an
adversary.
A channel carrying something to or from a place.
A reaction to or as defense against a hostile action to
deal with a threatening situation.
An individual acting alone or in a group, using
personal resources and some knowledge of utility
assets, intent on economic gain. The possibility exists
that a criminal may possess weapons and may inflict
harm.
Groups of padlocks connected together and hooked to
a common chain locking an entrance way.
A fund into which the issuer makes periodic deposits
to ensure that sufficient sum of money is available for
payment of the debt. Typically, the amount deposited
and the schedule of deposits ensure match between the
deposits and the due date of the payments.
A fund in which money is placed in reserve to be used
to pay debt service if there is not enough revenue to
pay the debt. If the reserve fund is used in whole or
part to pay debt service, the issuer usually is required
to replenish the fund from the first available revenues.
The adversary against which the utility must be
protected. Determining the DBT requires consideration
of the threat type, tactics, mode of operations,
capabilities, threat level, and likelihood of occurrence.
-------
glossary
EPA Response Protocol Toolbox
Foot-candle
Harden
Incident Command System (ICS)
National Incident Management System
(NIMS)
NOAEL
Public Health Security and Bioterrorism
Preparedness and Response Act
Revolving Fund Loans
Tools designed to help the water sector to effectively
and appropriately respond to intentional
contamination threats and incidents
A unit of light intensity defined as the amount of light
measured on a surface one foot from a uniform point
source of light equal to the light of one candle. A foot-
candle is equal to one lumen per square foot.
To improve the physical strength of.
A standardized response management system that is a
key component of NIMS. It is an "all hazard/all risk"
approach to managing crisis and non-crisis response
operations by enhancing command, control, and
communication capabilities.
A system comprising five major subsystems that
collectively provide a total systems approach to risk
incident management. These subsystems are the
Incident Command System (ICS), Training,
Qualifications and Certification, Publication
Management, and Supporting Technology.
The greatest concentration or amount of a substance,
found by experiment or observation, which causes no
detectable adverse alteration of morphology, functional
capacity, growth, development, or life span of the
target organism under defined conditions of exposure
(Pikus 2004)
Signed into law in 2002, U.S. Public Law 107-188
requires vulnerability assessments be performed
and Emergency Response Plans be created or updated
for community drinking water systems that serve more
than 3,300 people.
The federal Safe Drinking Water Act (SOWA) of 1996
allowed states to establish a Drinking Water State
Revolving Fund (DWSRF) program to assist public
water systems with financing infrastructure upgrades
needed to achieve and maintain compliance with the
SDWA requirements and to protect public health.
Funded by Congress, the DWSRF provides low interest
loans to public water systems.
uvi
-------
glossary
Saboteur
Set-points
Sunshine laws
Terrorist
Triggers
Vandal
Vehicle sally port
Zone of influence
An individual acting alone or in a group, with the
intent of disrupting the utility's ability to operate and
respond, and, possibly, injuring employees.
Pre-determined high and low response levels for an
sensor that trigger an alarm signal.
Laws that make government procedures available for
inspection by the public.
An individual acting alone or in a group, with the
intent of undermining stability and instilling terror
through destruction of economically important or
symbolic assets and, potentially, by killing. Terrorists
spend considerable time and resources to select and
learn about their targets, and plan their attacks.
Pre-determined action levels that initiate a response.
An individual acting alone or in a group, using spray
paint to write graffiti or hand tools to inflict minor
damage to utility assets.
Interlocking gates within a fenced area where incoming
drivers pass through the first gate and stop at the
second gate. Once both gates are closed and the vehicle
is captured within the sally port, a security guard may
confirm the identity of the driver and, if necessary,
search the vehicle to confirm the contents. Once the
vehicle and driver are approved, the second gate opens
and the vehicle may drive onto the facility.
Area of a distribution system that is impacted by a
chemical contamination event.
xxvii
-------
(This page intentionally left blank)
-------
CO
g
1
i
Reference
T3
O3
>
CD
CC
o
z
• UJ
So >,
Abraham, Dulcy. 2003. "Sewer Asset Management Decisions, Rehabilitatil
and Security." Proceedings of the American Society of Civil Engineers (AS
International Conference on Pipeline Engineering and Construction "New
Pipeline Technologies, Security, and Safety," Najafi, Mohammad (ed.), Jul
13-16, Baltimore, Maryland. Reston, VA/ASCE, 0-7844-0690-1, 1817 pp.,
2vol.
•a
i
>
03
cc
o
•z.
Allgeier, Steve. 2004. "Responding to Contamination Threats." Water
Resources Update, Universities Council on Water Research, in publication
CO
Z3
CO
CD
£-•
.. S
03 £1
CO CO
-0 S
0 ^
»-, o>
S tz
E!
** -n
03 "
B o
f§
CO '^
ZJ 13
CO tz
=1 •£
03 |
2 =
0 0
•E. °
Si
™ .2
0 =
•5 S
S .E
.i"**
o E
Q.2
SCO
_ -B
T3 C=
03 03
E -t=
f-i O3
S «
-o S
03 CO
O3 i_
01 0
to co
03 E
•2 o3
53 i
•*=> S
03 0.
5 %
CO 03
fEl
O3
American College of Preventative Medicine. 2004. "Recognizing Waterbon
Disease and the Health Effects of Water Contamination" (web site).
0)
_cz
'-^-
CO
E
^tz
lo
'to
CO
re
to
"tz
03
"tj
'O3
JZ
•o
tz
to
&
o
03
2 £?
CJ 'w
m =>
fe 8
O CO
-a £?
CO :=
P
= "5
o
-S -°
S co
Sg
CO O
CO "CO
*± a
S -S
E 52
3 -52
-1
CO ^
s a
1— CO
American Institute of Architects (AIA). 2001. Building Security Through
Design. Washington, DC.
SO)
,tz
lo t3
t— ^~
^ °
CO 4—i
CO CO
Z3
ts §
E tz
to .2
o> to
.E E
II
co tz
03 —
T3 to
>- ^
s. =
CO 0
cB .E
CD i-.
.— tj
.E to
O> co
03 —
"co 01
^ tz
*t -Q
M E
.H O
03 J=
° «
ll
^ cB
03 *-
•o to
'S°
to i2
03 0
•0 03 to
'> fc o>
O <" tz
Jr O3 ^
°-x: =
t± •" z)
o "o .0
&s i"
CO '.=
co ,c "to
fil
American Society of Civil Engineers (ASCE). 1999. Structural Design for
Physical Security. Prepared by Task Committee, Structural Engineering
Institute, ASCE, Paul F. Mlakar (chmn). ASCE, 0-7844-0457-7.
C
CO
CO
o>
CO
c
CO
E
£
"S
V
«
S
o
i
TJ
S
o
a.
•o
tz
CO
i
"55
•o
"3
O)
CO
CO
•o
Q
ex
lo
3
CZ
CO
CO
Ic
American Water Works Association (AWWA). 1980. Water Utility
Management. Manual of Water Supply Practices— M5, Denver, CO.
|
3
r~>
E
o
o
O)
C
"•a
"o
C
«
-£
o
i
O3
CZ
CZ
O
a
3
A
•£
T3
"o
E
O
1
03
a.
o
•a
tz
CO
tz co
O) 'TZ.
•& g.
co -=
•o g
CD CO
£ E
CO 03
g £
o to
0 -o
is
i= 01
CO CZ
E'-S
CO "O
il
American Water Works Association (AWWA). 1989. Distribution Network
Analysis for Water Utilities. Manual of Water Supply Practices— M32, First
Edition. Denver, CO.
5
03
e
to"
_^
c=
03
*^
03
i —
4=
*o
CO
C
CO
E
03
O3
0)
^cz
\—>
zs
0
_cz
S9
^£
tz
s
O3
"to
i
03
O3
to
tz
0
CZ
.2 M
ll
E S
c5 Oi
S C
-"•a
£ x
-S <»
'> ""="
o =
S co
Q. -
_ CO
1.1
lit
CO -^
1=1
American Water Works Association (AWWA). 1998. Steel Water-Storage
Tanks. Manual of Water Supply Practices— M42, First Edition. Denver, CO.
CO
o "&
~ tz
S •§
" CO
>> Q.
tZ 03
™ Q.
0 >,
£ ^
CO ^
I §>
zi 2
:~ E
S1 03
-O
T3 JO
S g
za S
CO ^
S w o
•° tz •=
52*
S § «
t± -jz; H
5 IS |=
£ E 5
iis
•a •- as
03 to 0
CO 03 tZ
0 ^a '«
fc— Z3
"•"o g
•a tz fa
« « °-
iii
•53 E a.
"a to tz
'= ^ S
ai- E
ai co 03
•= 03 io
•^ jz JS
0 f8 S
t_ "•* "nfJ
Q..2 ^
TZi ^_.
5 •- CO
S S g
re 03 -2
E Jo J5
CO Q. Z3
— 03 0)
i^ iS. 2
0
American Water Works Association (AWWA). 2001 . Emergency Planning f
Water Utilities. Manual of Water Supply Practices— M1 9, Fourth Edition.
Denver, CO.
«
o
•£
I
O3
CO
CO
.C
u
ZI
CO
0
Q-
o
C3
0 CO
II
CO CO
ESr
CO
a oj
•- 1
2 *
03 -E
c: -o
03 c
0> §
T3 0
He
to 2
IZ -j=J
o ^S
'J= C
CO O3
S E
CO ^
ct'K
u •
'« "°
S to
tz c"
•i °
i'l
o E
o o
m =
=J to
tz
E§
CO 53
I s
1— CO
American Water Works Association (AWWA). 2001 . Instrumentation and
Control— M2,Third Edition, Denver, CO.
I
-------
2
3
Annotation
o
£
CO
"S
oc
re
— 03
en ~
03 >
ra S
_o a.
° ?
il
it
S H
re •>—
-f^ cz
E .0
about water main
II minimize disrupt
it informatior
ptions that wi
E °
t .0
o E
.E o
re o cz
•g CD o
803" ^
•S =2
— -° 0
re co cn
ir -> !=
re <" E
EO3 03
TZf 4->
cn ^ 01
1— -— —
o3
to
^_
0
cz
o
.i
15
O3
cc
5
o
CM
^^
<£
5 o
<_ ^~
.- >
.2 S
"CO Q
'O r- "
S.I
to .-t±
< T3
merican Water Wor
lains— M28, Secom
< s
CT>
^ en
"re en
1 >-
^ z3
H
il
2? re
^ ZJ
lanning for Water I
IB assessment of h
Emergency P
uidance on th
03 C"
plementto
lent provid
zt S
cn "5.
re a.
cn
en cn
"^
c
CO
cn
"en
"co
cz
Z3
o
CD
C/3
O
ez>
OJ
^_^
^
|
cz
o
to
"o
° si
« j
merican Water Wor
esponse for Water 1
< cc
cn
03
"a.
Q.
en
03
03
cz
o
cz
re
Q.
re
a.
o
03
O3
•a
o
0
JC
o
o
to
|
'i
TZl
g
0.
"re
Z3
CZ
CO
cn
15
^
o
cn
S
re
5
0
CM
^_^
«^
S O
> CJ
CD
CZ >
o cz
re Q
C3 _-
o cz
cn _o
cn LJJ
merican Water Wor
lanning— M50, Firs
< 0-
cn
CD CZ
•^Z .C3>
GO "
-E CZ
1 1
o E
4—i Q
cn CD
CD cn
§1 T3
ft
"D i—
« re
agers, supervisors
•egulations, as well
E 03
>, re
S-? cn
11
o ~°
il
was desigr
practices a
CO ^
Z3 Q)
co J5
E ^
^ ji
I— ^5
1
**
o
**~
S3
O
ol
f
'cO
CV3
csi
(Z>
OJ
^^
^
Is
^ ^
o ^
."§ S
en r-f
< 1
merican Water Wor
tilities— M3, Sixth 1
< :=)
fz
re
2
Q.
"5
8
o
CD
CZ
cz
o
o
idices for a cross-
duresand pn
CD
O.
cn
CD
o
o.
"re
Z3
CZ
re
E
cn
^
03 g-
"G "-^
2 S
Q. U-1
•a "2
-S j=
E i
CD -L
cc o
^J- CZ
0 0
o o
cz
^-^ o
^ "-^
5 CD
1 1
' — o
cz rf.
° en
"re 2
"o o
il
<" 0
merican Water Wor
ir Backflow Prevent
enver, CO.
< *- Q
•*-<
03
E
O3
>
0
Q.
E
"co
'a.
re
o
re 42
»- cz
O CD
il
E |
utilities in the deve
ost cost effective ir
assist water
ioritize the m
o •-
-•-- Q-
f 1
If
en 03
•— TZl
CD
0 =
O -i-i
cn re
en cz
1— "5.
"g 0)
re .E
-•— ». C
LJ_ C
!
re to o
'o 'o >,
0 0 .0
cn cn
en cn TZI
< < E
en en re
j*: ^ a.
merican Water Wor
merican Water Wor
trategy Manual. Pre
, 0
o? en
•^ TZl
5 c
0 w
-^ C31
CZ CZ
o 'E
1 §
E -^
t; re
O CD
c .+_
- o
cn re
.9? S
•= Q-
= TZ!
fe 5
j£Z CO
> CZ
* O)
-S "tn
J2 <*>
Q. "c
° "*
cz ^
^ -a" 2
15 03 0)
re *^ "^
E en .•§
cn 03 cz
-— cn o
• ^ cz
H— re cz
o en
<=> F
CM 53
u^ "en
S a>
< cz
11
• — ' cz
CZ 0
o 5
"c3 k—
o 5
Li- CD
_£Z E
O 23
re o
03 CO
03 03
a: .S
CZ CJ
O ^
^ *~ m
o ^- c
O Tn ^
cn f— ^>
"* cnc5
i2.E^
merican Water Wor
esign of Early Warn
repared by Walter l\
< Q Q-
03
re
£
1
O3
O
O3
'o
jrrences and types
ilities.
o ,
0 is
o .E
°K T^
™ O3
E t
° I
« S
11
ej
'^3 re
CJ 1-1
03 03
2 cz
to
en JD
t- B
s-l
O CQ
OJ Q
*"* "^»
D^ -°
S CD
< i_
C CO
<^ §"
O en
"co -^
-a :=
II
(— -Ji
o ^
O3 •+— •
en co
CZ CD
O >
— 1 1 1
'o .??
1 c!
^ w
merican Water Wor
ctual and Threatens
Gere Engineers, In
< ,
o S
'to -g
•a E
cz re
g g-
Li- >-
_r~
L£ fi
CD '£Z
cn ^=
CD '-^
CC ^
cz ^r
o +1
"rd ^
'o
en °
en **~
< CD
en fz
-^ .E
merican Water Wor
ecurity Practices Pr
orporation.
-
-t-^ CD
c: z3
o o
tn w
H
(33 _
CO O
'o g1
tn '"5
•.^ cz
re 43
en ff
en •§
^ ="
CO
03
CZ
42 ^
re "^
5 ZJ
03 O)
« cS
0 g
Cti CO
CQ 5
o 03
"*— cn
CD -^
CD tn
-TT
OJ ~
cn t_
^ E
Z3 O
O ^.'
03 O)
^^ O
TZl -J
CZ ^1?
re -jz
03 ZJ
Eo
03
O en
o cz —
»-S E
1=5
tn g a-
_c m g
cc E -1
LU 03 -f5
< co" ^z £
1
1
TZl
re
11
••— • o
11
~ O3
'•§ -
_ 0
ter and wastewatei
] improve service t
ed to help wa
duce cost am
Q. CD
^ "~
CD cn
T3 TD
en ?2
re £
5 03
^ E
o . •
0 CZ
-O CD
"O CZ
=r cz
^ CD
2 CD
•^ re
en cz
£ E
cz*
*c5)
re
cz
re
o
cz>
CM
^"
CO
S.
cn
CD
'o C-3
CZ Q
03
o> cz
-------
e
a
1
c
1
c5
c: -_•
entification of legal issues that r
revention, and response to crisis
.T3 0-
£ .E
cr cr
CO CO
.9? "Q.
This document assists wastewater agenc
after a crisis. It is intended to help in the
£
CO
03
a
CO
o>
CM
CD
O
CM
cf
:=•
JJ»
CO
03
'cj
cr . _•
n Sewerage Age
Washington, DC
i«
o =
n of Metrop
Crisis Check
o ~
-— 03
o E
< co
03 cr ^
1 1 1 i
«_ fe ~ H5
ed by the National Conference o
of state FOIA statutes and infori
nber of states where the statute
ystem security information prot
° O3 "^ »—
O *— O3 ^
0 03 -Q3 »_
>, .> CO O
"H co co co
This article contains the results of the sti
Legislatures. The study included an exter
from state drinking water agency staff in
unclear to obtain clarification of the statu
.f
^3 CO
O CD
CO .£
E —
If
§ CO
O) °
c CD
"S c
1! e
0 .03
: o
s «
§ |
*— -£^
O "^~
>* CD
E CO
CO i_
—1 CD
•o to „
B*S
s "= ™
o ••§ .a
co rr
cz § »
S ° &
< -E co
3
c
O3
E
cr
iria for site security using enviro
duce crime risk.
£: 03
•cz '-
'CO 03
This article contains the assessment and
design, which utilizes the building enviro
•o
(— ^^
« .1?
01 _3
i 8
S1!
i— — ^ i
— t -Q _i_
O C •§ •= •£
CZ =J 0 0
"||| =
This article provides recommendations ir
that allows for natural surveillance and u
who belong on the property, preventing i
and integrating the security technology ii
= .
o
•o
cr
_
CD
O
cr
'o
^>
i_r
o
03 E
gning Against T
com/cpted17.ht
CO >,
03 ~
P =5
if
•^ §
=: O-
CO CJ
cr ?
co 3
OC ^
co" ~>
CO O.
< s
B "i
"o 2
8 E
i Through Environmental design
lat, through proper design and u
ities for and fear of predatory cr
t± 01 t
<5 .E o
> CO O-
03 O 0.
>- CL 0
°- 0 03
O3 _ CJ
This article presents the concept of Crimi
(CPTED). This is a design methodology p
built environment, the architect can redui
improve the quality of life.
f
CD -^
1— ^
= - ^
SI
ai o
"*"" ^
CD ^
6
rt ^
-^ "O
_ Q.
ronmental Desic
11. http://www.ci
"> Q-
^ i_"
. CD
§51
CT) CD
1— D.
^ CO
co cr
-o o
i '13
rf r3
co" 1o
co cr
T= o
< 0
03
£ *-
13 ^
« S
omic Analysis of Terrorism Ever
d the first homeland security cer
1 university experts in relation to
C CD *-"
"li
if!
-^ r- «
m ™ O
The Homeland Security Center for the Rii
University of Southern California has bee
excellence. The center will partner with s
infrastructure and "cybersecurity."
CO
.92
"^
2o ^
°- c3
._ «
ii
CO CNJ
Q_
fi^ ^y
CD |5[
>
'= 0
^? >
cz o>
urity: Governme
Civil Engineerin
CJ 3
— '
CD"
i'lo
^£ <~i
mination of Drir
:er Resources U|
53 co
-^ .E cr
§>.£="
LL f— *—
«" g S
•E 1/3 co
.« >; 03
m co cr
•£ H "g
SCO CO
E c°
iproach can help identify and rec
te inventory and using a decisior
lated risks are identified and add
•" 0- CD
S E 0
||!
This article addresses how the asset mar
to public utilities. Through development i
process developed for the United States ,
o
t
-E ;g
III
c o
1 1 I TO
-o e
c: Q-
ra o.
js2
CO CZ
= CD
CT§
O) CD
•— cc?
U ro
TT» ^
03 S
agner. 2002. "R
ehensive Asset 1
ngs, September
f3 E CD
g c5 o
-a co Q-
LU .c CD
^ 0 cB
§ i^ il
rr^ ^.^ f
L^ >» tj
£ ZJ CM
O cj O
O O3 CD
CO CO CM
1
-------
B
O
1
C
03
U
03
£
09
CC
o >,
•^ -0
This article addresses the post September 11, 2001 security changes that have been made
protect the water and wastewater infrastructure system for the residents and visitors of
Southern Nevada. There is particular concern over protecting Lake Mead, which is formed
the Hoover Dam, which is the Las Vegas area's largest drinking water source.
i— CM
. CD
CD O
J3 CM
E 0
03 LLJ
§t
O -
CD ™
It: -2=
LU J£
CD C/3
1 — CD
c\i 5
00 co
CD ^
Zj "o
£•» cO Jrr
S £ E
CO 5^
3hillip, Eric Leveque, ar
in the Las Vegas Area \
ence Proceedings, Sep
"-"— t_J ^—
P^^ "
^ CD O
CD CM O
This guide provides information on types of weapons of mass destruction that terrorists
might use including heath information, treatment options, and ways to minimize exposure.
t -
S ^
=3 =3
2 CL.
S"? O
_. co DC
^ en °
-^ 0 5"
- Q. ^
o e/3 ^
.2 ^^
^ O Q
O) -—
'.= CD O
^ E CO
Q_ LLJ ^
? E J2
CO CO k-
- 'tZ O
O) O >
cz t
-a o Q-
"> C3> CZ
CO O CO
" CD CD
^ "O t
^-il
03 F 03
H O3 "o
CQ O Q-
This guide is intended to assist California public water systems in creating or updating an
emergency response plan designed to address both man-made and natural threats that wil
meet state and federal guidelines.
c
03
S>
CD
1 1 i
CO
"c
.0
CO
. CD
CO ^2
O 55
CVJ o
to /--?
CD
>
CO c
f — .2
^ CO
nia Department of Heal
nse Plan Guidance. Ver
° i.
^ co
CO 03
0 CC
Not Reviewed
"^S
g
-1
03
—t
O
CL
r?
:=
CZ
CO
S
E
CD
O
O)
d
•^
L_
Q.
led
= CD
o in
CD CO
CM . .
. O3
S co"
CC en
-03 3
CO ^
0 ^
•o
This paper examines the problems with automation and information systems before
September.l 1, 2001 and the when, where, and how to apply evolving cyber security best
practices to water automation. The paper also addresses the advantages, disadvantages, a
cost impact of apply best management practices to existing systems and designing secure
features for new systems.
j»j
O
CD ^^
CO ^
II
CD Q3
"cO Q_
r"» ""
2 >•
Q- ^
"o
="E
'^ -a
> c
0 co
Q_ CO
O3 O3
"5 g ci.
CD ^ f n
c — 4— ^""^
HILL. 2002. "Solving t
Providing Operations E
HILL Communications
^ 03 :>
CM — CM
0 5 0
This article addresses some of the issues and constraints that must be considered when
upgrading a facility and its assets to reduce the risk of malevolent attacks.
^^
J3
1
CO
o.
03
D_
^_;
O3
E
CO
CD ^*
S2 §
LU
a>
o
f—
1 —
.2 CO
O3 CO
> O3
O3 *—
i£ 21
.^ 03
' .^
CO ^
§i-
CM -0
S c5
S>! CD
O D_
t
This web site page lists the proposed ordinance (HB175) relating to the exemption of secu
related procurements from some portions of the Code of Alabama.
.
tJ
§
0
0
j^l
03 =
" o
ra °
is
° 8
03 CN1
J3 T^
C/3 "re
-Q Q-
= !2
00 o
• • 'cii
CM 2^
••— o
CM _
CM S
9 «5
VaterAtlanta. 2004. "03
y 5. www.cleanwateral
sed October 26, 2004)
? § 03
CO ^ O
0 -3 —
03
This article provides an approach to evaluating a utility system to reduce threats. The artici
includes recommended approaches to security assessment, evaluation of current security,
threat assessment, definition of assets, vulnerability assessment, risk assessment,
countermeasures, emergency response planning, and financing.
£
•*-•
O
£ ' .
i?!
0 CO
CD CO
co g3
en eO
F •&
§ "=
2 03
- l_
CM O
CD "~
° -g
°* CO
CO 0 £^
.E Q. ^
"^ C2~ cz
O T3 — 3
, 5
1
-------
c:
o
S
0
C
<
Referenci
Not Reviewed
c
en
CO
£ S
S t=
re £
o3 03
tz c
"5 o
> 0
ter Security
/astes 2003
i*
Crum, Ron. 2003. "Prioritizing Water/Waste
Light of 9-11 Using a Case Study." Industria
Proceedings, April.
Not Reviewed
CO
Z3
"o CD'
.2 §
±± d.
"re en
gtheVulner
ter Resource
ilication.
•=51=)
ift > -=.
Danneels, Jeff and Ray Finley. 2004. "Asses:
Drinking Water and Wastewater Systems." \
Universities Council on Water Research, in f
-a
CO
•g
">
0
a.
CO
£i
4—1
0
c
1
e
o
'S.
o
en
O3
•O
re
en"
ZJ
^
S
O3
E
=>
o
0
-o
e
P
o
O3
en
re
This document is
^_-
|,°'
CD f—
O3 1 —
t= CO
'cn *~r
C CNj
L1J £
94. Security
irce AFMAN
05 £
Departments of the Army and the Air Force.
Project Development. Army TM 5-853-1 , Air
May.
CO
-C=
•o
s
i °>
o .E
c c:
i S
S.E
••£ 03
"^ "^
o
CD C/J
cn CD
' .0
"O -^
CO 00
•JT7 CD
f -S
ll
H- 05
2s
i-
E l—
ll
ft
05 CO
~ £-
JC O
o in .
'^ "> E
^ ~3 &
r— ^ en
•==>,><
tu -"-^ en
« § 03
3 le
£ co .E
8 = o
CD re o
Q. 05 0
re 1-5
'^— i -t— CO
— 3= 05
"03 |> -£?
£o-0
.<2 V •§
en o ^
£ 81
e- 1
0 X
.« CO
> ^r
2 S
< i
-^ CO
£• = re1
=J en .22
O 05 03
*i5
-a 03 en
!< i
c "? o5
i s «•
Department of Homeland Security. 2002. "H
System - Guidance for Federal Departments
www.dhs.gov/dhspublic/interapp/press_rele
March 12 (accessed October 26, 2004).
en
±3
O
il
05 CD
.C S-
0 "-" 05
c %•£
S. -o £
*^ =j en
>< o en
« i £ ^
^ r,tj fe
"~~ ^^ "O >
E S- ™ o
0 §- 0 Q.
E " % <2
i_ re re
.« 05 03 x:
en re o ej
E 3 c S
03 re re „
CO CD CD CD
S"g i^ =
I'lil
ci :^ re
C O CJ ^
o o re ^=
^ o !!l •-
as s »
5 S P *
re -a »— o
» S? ° -a
i i S i
-!-• . CO
^ ^ « fc-
13 O .52 CD
1 S 7B I
CO CD ™ ^
*= -s "= =
c ° m 05
— "K 4* E
« 2 ^ S
-^ ^ ^ 03
Tr a ea 2
This article states
attacks. The amoi
however there is
interdependency
CD
1
>
It
cn
•c
CO
a.
X
>;
05
j^
~E.
E
en
Dessoff, Alan. 2001. "Water-related Bioterro
Environment Technology, December.
05
en
= 3
±t o
. JC
03 °
O> ^3
re Q.
r E
— re
03 X
j= g
= m
0 «
« CO
re ?;
J2 C3
J= CD
_ CM
O - O5
•G ^ —
Q. 03 °
P .a cn
.E c= en
05 § -2
e s. 03
_ CD -C
I173 »
en c °
li2-S
— •— CD
5 co o
CO •*-•
s « »
en 2 -^
03 ^- C
s^S.
re > >>
03 > a)
E = ^
"TOO
§ ™ ^
C/3 -^J ^T
rrt i— O
This article discui
the renovated Pei
blast- resistant te
£•
re
=j
.Q
CD
U_
f
O
%
Government
s
CO
_CD
1
a
tn
i
cc
i
CD
S
CD
CM
Z
+
S
—3
Q
&
>- C
0 03
<= C31
CO tl
C3) 03
03 E
F °
1 =
1_ TO
•s -5
£ 05
So-
e i i
= o °-
ll"
a- E =
en'— °
fit
€|&
re -a c
_ re 03
£ c cn
> .0 03
ill
i § =
— O ro
"= ^C 0)
l_ ' '
CD tO "C
fCD CO
•a Q.
2 CD
S.E ?
g'<— o
c: •*-
k- CD O5
°- E to
lit
re ~° as
§5 .« ro
fc ,-= T3
This document is
response plans. 1
response plan an
-
e/3
E S<
CD *^
t=^
w S -
CD Z CM
S 1 i
c Drinking V\
Environmer
blication #3!
X3 £ Q-
Emergency Response Planning Guide for Pu
2003. Washington State Department of Heal
Programs, Division of Drinking Water. DOH
Not Reviewed
^~
o
CM
c CM"
H-; CM
en i_
1 CO
~~_ ja
2S
go
0 "S
TD to
3 03
CO 8
-t-* CO
-§ &
Emergency Management Institute. "Indepen
http://training.fema.gov/EMIweb/IS/crslist.ai
1
^
\fi
CD
•a c
j__ , CD
CD
•i-i -°
C CD
03 >
en re
gj f~
C3. «
^£
•^-< *^
c en
11
" CD
£ E
re o
« "
1?
W ™
s §>
s i
tl
=3 " .
8S^
111
o en £
* 1 S
E s 32
^ o £
M C
= °-t/3
» ^'i
-£= '^ 2.
« 3 «
CD CD +-i
C/3 C/J f
en _ 03
This article addre
some informatior
developed to prol
cn
C
H- °
^ 3
So
be =
« °
CD re
•= 03
-a c
re 05
|»-
•= en c
^ re a.
> J= <
!===£?
•^ -r-i -r-
. c: =j
cn re cj
Emigh, Jacqueline. 2004. "NewTechnologie
wireless systems, email, instant messaging
in the security department." Government Se
re CD
•> |3
-^ 3
0
re c
ii *=
re 05
c en
<° w
o co
.^ p—
-^ 2
C/3 -C=
"w Q-
_,_, CD
re 05
CD _
•° &
>< c
re CD
E E1
ta |
r~ CZ.
+_, CD
CD CO
i.|
E to
-!-• C
C/3
Is
r—
._ CO
,n -D "a
CO T3 ~
=>'•§»
— ^ f— ^~
re ._ 03
" 03 5
ses the crit
frastructur
•ks, and po
en i= n
This article addre
cyberspace. The i
distribution netwi
05
CD
" E
« i
§ 5
s g
^ 0
0 CM
1 1
^
Iss
^ ez> >,
03 CM 0
£ ~,- ^
r °° 5
:= >, o
^^^
Eng, Paul. 2002. "The Clouds of Digital War:
Delivered Via Cyberspace?" ABCNews.com.
http://abcnews.go.com/sections/scitech/Dail
-------
Annotation
CD
O
i
•s
nr
co
CD
-a
Z3
0 0 ^
CO CZ "-
qj •— ' to
"O f— r~
CZ I CD
CO "^ >
Ip
Q. C13 O)
A guide designed to provide citizens with information they need to be pre
correctly in the event of a natural disaster, or technological or man-made
information regarding planning for an event, evacuation and shelter durin
recovery from an event.
o
CD
•o
"=J
CD
«^
•5;
CO
QC
ZJ
O
S
=
<
LU
U_
j^
CZ
03
Ol
^J^
CZ
03
03
Ol
CO
CZ
CO -
^ cn
cn
>-i CD
P crt
O3 r-i
E 03
LU £
CO CZ
CD jsj
LL o
- „
"S ^B
to S
CD «
._ C/5
CZ ...
CO P
Q. cO
»— C/f
£ g
A step-by-step approach to emergency planning, response, and recovery
sizes. Including a planning process, emergency management consideratil
sources, and other information sources.
cz
O3
E
Q3
CO
CZ
CO
^^
0
cz
CD
OJ
CD
LU
|"
LU
>.
O
CZ
03
Ol
^f
c V1
03 i;
E «
03 ^
«i
^^ cz
^ CO
>-, en
o en
C. CD
CD CZ
P en
CD =
m o
CO ^
CD TZ*
TD ' =
CD
LL CD
CD
O>
CZ i—
_ cz o
T3 CO
C CZ ^3
™ S
c? 0 cz
O CO "ft
This guide is designed to aid state and local emergency planners in devel
maintaining a Terrorist Incident Appendix to an Emergency Operations PI
consequences of terrorist incidents that involve weapons of mass destrui
terrorism hazards
o
cz
CD
Ol
O3
fZ
LU
CD
-CZ
Ol
CZ
i
CO
s
<
LU
LL.
J^
O
S - •
01 52
i pi
O •"
CZ CD
CD r~~>
•j~ -iJ
P-o
cz "=
E o
This checklist contains questions that can help to determine the type of e
occur in the area, how to prepare for an emergency, and what supplies w
o
O3 TZ*
O) O.
CD cj
E Q"
Sit
T— ';=
I §
LU O
LL^ 0>
^ CO
0 E
01 s|
< g
CD ^
E b.
CD jzl
d <_i
^ iz
cz -£=
CD O
P cn
03 en
E cz
LU TZI
CD
2 CO
CD Q.
T3 CD
CD >-
LL. Q_
•o
CO
o>-£
r— CZ
'5. ®
— "o
£.=
CD t— ,
i!
f/5 CO
The purpose of Attachment G is to aid state and local emergency planner:
maintaining a Terrorist Incident Appendix to an Emergency Operations PI
involving terrorist-initiated weapons of mass destruction.
CO
TO
^r *&
<•£ CD
i- "S.
O CO
•*— j=
CD O
"O
~^Z -r—
s °
" . 03
51
o JS
CM CD
srl
§ °
1 1 1
^ ™
O 03
SB
01 co
< ,
tz 01 .-=
li <
03 CZ
Ol CO ^
co 5- cz
cz °- cn
co en "k_
S cz o
.2 t
CD O3
P o" CD
E ^ ^
LU CZ £
— 03 E
™ Ol .CZ
o3 cB ^
"S E S
u_ LU «=r
03
^Z
O3
r>> Ol
« CO
2 cz
•3 E
§" o
03 :a
The objective of this document is to provide the insurance, finance, and t
community with information regarding terrorism risk and the tools availa
risk.
i"«
LL. 2
CO
Z3 *"
C/3 ^
— "-a
sd
CD m
CNJ CZ
^ ^
i £
LU =
Ll_ 03
" CO
L3 ^
S s
O) ^J,
^C "rn
S £
03 _
03 .g
co en
cz ,_
CD CD
P E
CD -r-
E Q- -
t i I ^ CD
CO ™ £
— - -
CD CZ 0?
u_ co O
CD CD
|E ^
c/i =
4_ CZ
O) CD
cz o
CD Z3
El
CO ,-, (X
This guide was written for the building sciences community of architects
objective of the manual is to reduce structural damage of buildings and t<
of casualties during a conventional bomb attacks or other terrorist attack
o __.
— CD
i!
^ C_5
^ £
cz CD"
CD C\J
CD ^
"oS ^
. LU
CO LJ-
CM g1
^ "H
1 1 i GO
LL. +-,
^ "
S51
Ol ^~
< ^
= CO
11
CD „
01 cn
ca -r-
cz 0
^ c5
CZ CO
03 W
Ol CZ
C_ CD
03 *=
||
CD _&>
CD ^
U_ ^
+- 1
CZ
.^ CD
t — CZ
i= CD ,-J
° i i
1 11
ai ^ W
This guide provides the tools needed for wastewater utilities to assess thi
systems from a variety of causes. It provides the tools to make sound ris
discussions to ensure the reliability of their system during an emergency
CD
I
CO
CD
"TO
g
CD
5
O
CD
CM
I"
LU-
LL.
>,
0
CZ
CD
^^
"CZ O3
CD TZI
E "5
03 CD
Ol ^,
CO CZ
S °>
CX3 r—
•^ CZ
•= C/5
O) <*-
LLJ CO
cz
co E
fe °
"O »•-
CD CD
LJL. Q_
0)
CZ
cz
^- cz
"CD J5
CD "CO
11
O- Ol
ZJ CD
This guidance is intended to help state and local governments refine and
emergency operations plans. It also recommends that states encourage r
among local jurisdictions.
cz
g
ZJ
•o
0
cz
CM'
S 03
° £
ZJ CD
< 01
• cz
< "E
LU .2
LL. Q-
*>i C/J
s «
o) 2
3
CD
^— •
CZ
tn
"cO
=
S
CD
CM
O3
CO
-CZ
o
en"
03
o
u_
i—
01
o
0
cz
_cz
o
This article covers perimeter security. It describes the use of fiber optic t<
perimeter control, including the different levels of technology available.
1z
CD
E
E
>
o
CD
8
f
O
CO
CD
"CD
E
CD
f)
CZ
o
QJ>
•_§
1
^*
<£
CD
CD
CM
CD —
i"^
cn •'c
S =J
-s s
LL. CO
-------
E
C
0
s
Q
C
C
Reference
•o
CD
i
1
*
13
cz o
13 0 03 "0
Fox, Jack. 2003. "Pipeline Infrastructure Security." Proceedings of th
American Society of Civil Engineers (ASCE) International Conference
Pipeline Engineering and Construction "New Pipeline Technologies, S
and Safety," Najafi, Mohammad (ed.), July 13-16, Baltimore, Marylan
Reston, VA/ASCE, 0-7844-0690-1, 1817 pp., 2 vol.
T3
.03
O3
DC
0
Fox, Kim. 2004. "Water Treatment and Equipment Decontamination
Techniques." Water Resources Update, Universities Council on Water
Research, in publication.
•o
O3
'>
O3
or
•&
z
S
as
^*
Gelting, Rick. 2004. "Public Health Surveillance Systems for Drinking
Water Resources Update, Universities Council on Water Research, in
publication.
i
"d
£3
£2
CO
r—
O
8
CO
"o.
1
CO
1
03
£
B
CO
O3
:5
CO ^^
-a 2
co 'c
"O O
CO "
T3 CO OO
<2 .c oo
•— o^J ^3
General Services Administration. 2001. "Furniture: Technical Descripl
Test Standards." June 1.
http://www.gsa.gov/Portal/gsa/ep/channelView.do?pageTypeld=8207
Page=%2Fep%2Fchannel%2FgsaOverview.jsp&channelld=-14005(a(
December 9, 2004).
03
— O.
. 0
O O3
03^ O3 >
a. "O oo
£ - "c?
-i—i rt —
"fe CJ 2
If «
QJ o d
i.l 3
III
± CZ 03
S-^l
75 E «
1 gl
OJ*; =
•° g c=
•— ^ r-»
O 1= •*-'
2 ^ w
c CD H~l
III
111
= 0 00
S "to 03
O3 ^ O>
i> <° •§
|1|
co ,_ -rr
O3 O Q.
•a -4- o
.<2 -££ cS.
;fz ca a.
r— cj CO
o
s
General Services Administration. 2003. Facilities Standards for the PL
Buildings Service (P-100). Chapters, "Security Design," March.
O3
^~" o
g § •'S
i_ O) 92
Q3 d 1-
£ '-E -o
00 " 3
•g co o
05 ^ c
iii
c5 ^ "^-
E § i
S> S "°
1 S e
_c— m
i-_ f^~ ***
o 1— o
gf f
E C M
'E " 0)
Q. 1 0>
"5 Q. "g
cz *-- ;^1
Q. .tz •«-
ell
co E co
CD *-
1 g-i"
0 5 =3
•- >, 03
i 1 E
S 3
— *-^ 'tJ CO
if .E?'|
1— t: ^3 co
Gompers, James. 2004. "Security Improvement Starts With a Plan."
Government Security, April.
03
CZ
o
.CZ
&.
03
S
CO
E
CD
03
J=
O
g
O3
O
CO
•a
cz
CO
•s
i
03
*-
0
CZ
o
CO
I
CZ
1
a.
1
CO
CD
•a
>
o
Sm
Q.
CD
±±
CO
-O
1 1
•— "oo
Government Emergency Telecommunications Service. 2004.
http://gets.ncs.gov/ (accessed October 26, 2004).
oo
0 CL
CQ -
CO O.
"E 0.
CO CZ
•a 'g
CO &
~ cz
cz w
it
O =>
rf CJ
^* CD
= "
E -S
E cn
03 ^
> CZ
0 C
CD to
en Q-
r~ |^
la o
O) O)
CD t-~
=~ CO
CO C3>
OO =
"•a m
O3 CO
CD<
CO CD
cxii
CD ^"
*± CO
~ =
II
co 52
t^ CO
O3
1z
O3
0
Governmental Accounting Standards Board. "Statement 34 Resource
www.gasb.org (accessed October 26, 2004).
o
CO
0
1
1
Q.
CO
•o
C.
CO
1
Q.
"o
1
ca.
S
CO
cz
™
5
03
•^ co
S .03
"~ :=
_ CJ
CO *~
CD •£
II
11
il
•o ^
""E
Is
CO ™
.!2 to
IE i
o *—
= o
*^ *~
=] 00
Great Lakes - Upper Mississippi River Board of State and Provincial P
Health and Environmental Managers. 1997. "Recommended Standard
Wastewater Facilities." Health Research Inc., Albany, NY.
-------
I
i
o
s
o
i
Reference
•o
J- CD
0 TZI >,
CD" £ o-
o 1 g-
6 | S
CO £ !_
t- O CD
'io
^ *~" 3
.5?T=> 0
CO = ~
CD CO _Q
« g a
-2£ CO i—
0 g? .2
5 o co
.£ Q..2
!S l± to
5 05 ™
0> cz .1=
CZ £ 0
"E ™ S
|sf
§11
„; CO
policy statement!
rim standards foi
reparation of plar
to S °-
<= -J= s
— o 3
C <2 CZO
I e s
1:1 o. „
3 CO
° 11 S
•n CO c
13 zj TZI 55
CO O CZ •**
".cz |g .JS >,
i— £2 t/> to
Great Lakes - Upper Mississippi River Board of State and Provincial Public
Health and Environmental Managers. 2003. "Recommended Standards for
Waterworks." Health Research Inc., Albany, NY.
1
03
">
CD
DC
^_,
o
^
"CO
Grigg, Neil S. 2003. "Water Infrastructure Security: Performance Metrics."
Proceedings of the American Society of Civil Engineers (ASCE) Internation
Conference on Pipeline Engineering and Construction "New Pipeline
Technologies, Security, and Safety," Najafi, Mohammad (ed.), July 13-16,
Baltimore, Maryland. Reston, VA/ASCE, 0-7844-0690-1, 1817 pp., 2 vol.
•o
cz
CO
cz
CD
CO
to
CD
CO
£
J£
CO
•z:
o>
cz
^
CO
o>
CD
£
p^
3
guidance to wate
CO
CD
"O
">
o
Q.
c
p =
E CD
11
13 co
CO CZ
!E ^
I- E
Grigg, Neil S. 2003. "Water Utility Security: Multiple Hazards and Multiple
Barriers," Journal of Infrastructure Systems, Vol. 9, No. 2, June.
co
D. Q3 ~
E -Q o
o CD CZ
o? 13
^J ~ >>
ill
^1
° di =
>i CO CD
CO ZJ ^3
3 o tz
>,-= ro
c -E "
<~t . . CO
** ±± —
- o£
-4-j TI3 ••— '
« e|
S > -r-i
e misconception
cost-effectively i
de consultant am
istment.
f S'^ i
03 E 0 ~
to to ..< P
CO CO ^ t
CD CD O CD
§ ^ o> 01
^ ™ .E £
03 .£• B -
•el gl
« 2 <2 ^
n> 5 -3 «
.to cz g E
^ "5 *- "
1— > O CO
Hall, Terry. 2004. "Outsourcing Vulnerability Assessments— Tips for the
Smaller Utility District." WaterWorld, April.
CO
tz
CD
fZ
to
CD
= §
c '"
CD ^
P CD
S «
§ 0
2 TD
Q. CZ
.i S
>--°
.TT C
= 2
S 0
" S
o -S
cz -|-
£ o
= -c
^S
E .E
i "2
E co
w to get the maxi
mmendations rec
0 0
•= 0
co £
CO CO
zl •§
« •§
••& cz
CD "„,
P
re CO
.52 CD
JZ -CZ
h- 1-
>
I
1z
CD
i
CO
CO
<
J?
2
2
CD
C
> ^
i— O
II
E co-
il
18
0 ^
11
O CO
>• •£
= o
s^
0 "
^ 2
&£
^b
_- CO
5i
"a
CD
">
CD
CC
0
•z.
Hasan, Jafrul. 2004. "The Promise of Early Warning Systems." Water
Resources Update, Universities Council on Water Research, in publication.
•o
CD
'>
CD
CC
'o
Z
iZT
o
Hellar, Miriam. 2003. "Infrastructure Security, Dependencies, and Asset
Management." Proceedings of the American Society of Civil Engineers (AS
International Conference on Pipeline Engineering and Construction "New
Pipeline Technologies, Security, and Safety," Najafi, Mohammad (ed.), Julj
13-16, Baltimore, Maryland. Reston, VA/ASCE, 0-7844-0690-1, 1817 pp.,
2vol.
•o
1
CD
'>
CD
DC
'o
0
Herrmann, Jon and Janet Pawlukiewicz. 2004. "Water Security Policy and
Research." Water Resources Update, Universities Council on Water Reseai
in publication.
o
•»-•
CD
CZ
o
•Q
.0
-o
"S
o
e—
CO
CO
£1
CD
CO
CZ
o
f-t
CO
2
T3
£Z
CO
o>
^cz
'cz
cz
CO
o.
'o
CD
C3.
sxampleof thety
an emergency.
i °
co £2
O3 O
> CO
'5. Q-
c •-
Ij
II
13 E
co •£
(— -^
i^ E
03
s
Hildebrand, John. 2003. "Preparing For An Environmental Emergency." Se;
Daily Journal of Commerce Online Edition, Environmental Outlook 2003
special section. July 17. http://www.djc.com/news/en/11146998.html
-------
Annotation
CD
U
e
cu
"S3
oc
ind manage the risks
CT3
lis article discusses strategies a utility can use to overcome
sociated with present and future security needs.
-^ CO
I— CO
CD =3
•° -p
s £
11
"« °
ll
>» LU
2 .22
5 .CO
>
. . >
S i,,-
"o u
£5 S
Q_ CO
"CD "co
0> 'C
II
ackand Alan Manning. 2004.
id not doing) to prepare for a 1
gy, Vol. 16/No.2, February.
-*•§
CO • — ' O
•S <=» £
O c -^
o •— o
CO 0 03
-D -a f—
-&
s
B
cb
frt
erability assessment
es that being responi
d "Srt
iis document outlines what utilities have gained through vul
periences and the weaknesses that still exist. This article sti
epares utilities for terrorists and even more.
-1= X •-
I— CD O.
—i
0 _
"^. *^
Si
> o
> UJ
' t
.-S'g
iv,
53 £*
C CO
•5 EZ
> i
T3 3
i <°
>• s
CD <2
?> t3
cri^
O "^
o ^
** •
.E O) CD
C C -D
5 "5 2
« Q t5
S «_ O
« z JC
< -o i"
E < "S
ra o> 8
^ c o
c "o (t
€° S
"5 DO t=
CO'-O £
olf
O O B
"£<§
CO
C3
CO
CT>
_>,
CO
CD
CD
.C
cz
8
=3
CO
QL
is paper discusses the cyanide poisonings using Tylenol ca
mmarizing the event and the company's response.
E 3
•o
CO
13 f
CD a)
CO §
e/5 *
§ I
1 ^
nr
CJ o
^f 0
°- ^. ®
O3 -— ^*
> co $•
•^ CD CO
CD .2 ^
*= t= S
LU rs -g
S S -?
amara. "The Tylenol Crisis: He
& Johnson." Pennsylvania Sta
w.personal.psu.edu/users/w/x
19, 2004).
"- <= i. ?
c- o > S
I c^^-g
S-gg-ts
^ -1 d O
•o
c;
CO
5 *.
CO CO
d towards drinking w
a secure web tool th
j cyber threats.
CD CO F
is article is a description of WaterlSAC, which is a tool gear
istewater executives, managers, and security officers. This i
avides early warning of potential physical, contamination, ai
P i 5.
f
_J
1
0
CD
I
1—
S t
ames R. (ed). 2003. "WaterlS
' Public Works Journal, Janua
te"¥
-C =!
O o
i5 CO
SB
•p
1_
Q.
s and other compute
om hackers, but also
i= i=
is article addresses security myths regarding SCADA syster
mponents of a utility. The article focuses mainly on threats
ormation about other security problems.
£ S =
f
3
O
*
CD
f
0
•o ^
c= t^-
CO co
"S i
=5 ™
o ^
Q =
— r co
CD x:
•° "tl
=3 ^
^ 2
—
n
Jj
0
ism and terrorist atta
a system.
(Tl H—
is gives general guidelines for protecting against both vand,
;o includes information on how to assess the vulnerability o
J= SI
\— CO
CO
II
*— CD
IE 1
5 .2 ca
<•— CD O-
o c: o.
•=. £ co
So eo
.92 :n ai
2 o o
CD •*=
> "co 5
O c= ^.
c: = J2
^t O fy
E^ *
-s g 1
2.2 -S
CD => C
^ 0 JO
S OT «
-Brooks, Richard. 2002. "Wat
ewater Security Problems and
online), February.
w.homelandsecurity.org/journ
llfl
O ^ 3 T*l
SE ^g"
_l co CO J=
o>
c
•^ -a
C CD
ll
3 and test a real-time
about a secure Web-
tion, or cyber threats
*= r- CO
is article outlines a pilot program funded by the EPA to crea
.ter monitoring system. The article also contains informatioi
rial that offers early warning of potential physical, contamin
j= g o
t— 5 o.
c
o
CO
1
&"
Z-3?
CD ™
"a 3
g S
_J CO
•a
cz
0) ™
1 S1
QJ CD
•a >
o o
Eo
CD
CD •-
£ w"
1— co
CO T3
'kZ CO
CD
CO S-
o d>
-a .£=
is article outlines the tool HAZUS that is used to model haze
Ips agencies evaluate the cost-effectiveness of various plani
tigation projects.
iE£ E
o> ><
ll
"O <"*
Q5 QJ
l£.
~ C\J
Sci
z
o
CM CO
1^5
f >.
p ><
If
" j=
o o
Q eo
•"^ i
\. Scott, Bouabid Jawhar, and
mces," Water Environment & "
— a)
ii
o o
en t/>
11
03
CO
53
11
ie State of Alabama, i
lode of Alabama, and
s <->
is site provides an online legislative information system for
:ludes information about the current legislative session, the
nstitution.
J= " 0
1- .£ 0
CO"
CJ
*J
O
O
"S
(A
^i B
<=> CO
t~*i ^i,
™ 0.
il
S"5,
CO O
-.f ^
Is
s <:
3 Reference Service of the Sta
Jb.legislature.state.al.us/acas/
_> CO
1o 5
tO ->. ^~
'o> S- o
CD t; c=>
— J .C CSJ
„ 0
1— "0
. CD
co .ti:
•£ =
llnerability assessmei
opie agencies are rec
:r CD
is article addresses the regulations from the EPA requiring \
icie addresses what the smaller serving less than 1 00,000 p
and some general guidelines on how to proceed.
j= -C o
1— co ta
CD
E
|
w
CD
C
"rsj
1
03
1
o
CO
•t
§
CO
1—
B
^<
= i
^ S
•i "^
Q cf
= o
CO 0
O CD
3*2
-------
c
o
s
o
c
^
Reference
~a
cB
>,
o ^
CD ?j
CO Qj
CO C/D
O)^
•^3 CO
C rj
CD CD
1" 0*
•o ^
c Q.
* -a
01 cr
c: ca
+ij — r
CD o
o 'c
o o
<¥ CD
C *"
-9 -jo
E —
.11
CD 0
•a c
o —
L
O CO
i 1
E °-
.1= "^
•— r ^
03 Q3
111
CO CO CD
1— '"O 0.
s
i
CO =
a :E
= i
C ^
= .
j, Eric and William Sieglend. 2002. Security Pla
ry. American Public Works Association (APWA]
jonal Publishing.
CO -> C/)
3 0 05
ra 03 2
S CC Q-
1
03
CC
0
"= 03
5 o
< c
i_ 03
'S -2
Q 0
0 CJ
1— PJ
O> t — >
O CM
g, Alan. 2002. "Terrorism: How To Use Technoi
;0&D)." AWWA Joint Management Conference
Jings, March.
d . QJ
"r— O Q3
d CD CJ
« "S 2
S Q Q_
;5
£5
- O3
CO C .
E "B o
03 > »-
1/3 03 .!5
>, T3 CO
cn 3 >.
_>, "o «
§• co .2
•co •— 03
^_ O3 O
O = =
C/3 =3
3? .co co
3 03 "O
O 3 ^
" l"g
^1 f^ CO
o t to
03 .E £
CO l~ "^
03 'CO" 03
S E -o
t5 Qj ^j
If i
S CO ^
fz QJ ^-J*
0. 03 -a 03
E-> k— c/}
o ca c
" TS 0) Q.
^ '^ co •-
Q. 0) g 'g
Q3 C CO E
*-• 03 CO CO
CO CO O3 *-
•C £ 20 a
1— a. ca o
,
CO
CD
o
c/f
2
£
Jj
.arry W. 2004. Water Supply Systems Security.
c/f
CO =
2 ^
eg
CD
(4_ >
o £
-^ E
o -—
•J2 c
S CO
ro o
••-1 CD
o E
it
i-
CO CD
CD J=
CO ^
Q 0
Q- -1=
>- TD
"Z. C
03 ™
£ 03 CO
" co S
03 ~ S
-> co co
2 3 co"
CO CO Q3
f= JC CO
H to 1.
CZ c O5
«d = ^
°°1
Z3 ~ C/J
2? 5 ?
£ ° £
T— CO
.52^—0-
O3 E O3
'JE 03". SG
1— CO T3
•o
c
CO
CO
CO
CD
C
•o
03
S.
Q>
a.
^^
0
CI
I1
03
LLJ
Q
CL.
Ol
C
o
a.
E
c\i
0
CZ3
CM
ca •»"
a. *-
1 =
S <
to c
c= o
V^ Q.
CJ CD
^ CC
•o
O3
03
1
DC
•z
1
1
O
CXI
Engineering Security Manual, TM 5-853-1/AF3
/ Engineering -- Project Development
ii
i »
S CO
•o
O3
1
"S
DC
0
•z
cxi
09
1
CD
CXI
Engineering Security Manual, TM 5-853-2/AF3
/ Engineering -- Concept Design
j§ •=
•"= CD
2 CO
•a
03
1
CD
CC
z
CO
09
1
r—
C3
T —
CXI
Engineering Security Manual, TM 5-853-3/AF3
/ Engineering -- Final Design
al
= 03
^> CO
•o
I
03
CD
CC
O
03
1
CD
CXI §3
Engineering Security Manual, TM 5-853-4/AF3
/ Engineering -- Electronic Security Systems (rn
S "=
•.= o
= O3
S co
T3
1
CD
CC
"o
-o ^
co ££
*i
CD
|O
O
CD 52
£ -B
o °-
«-< o
to ^
CD -2
C CD
"3 co
O =
"O >
« £
w i£
E c
CD O3
"co 12
C
O3 CO
£0 C
g CO
°J O.
CO 03
CO CO
3 c:
_ 0
cO *""*
E £
co >-
•ffi Q-
o* Q
« >
03 .-
1 =
0 2
O CO
"S ii
II
c _:
. . ~>
O3 Of
03 'R
e-i CO
X CO1
1 S
*- "03
act
1 Small Flows Clearinghouse. 2003. "Preparing
nent Process for Small Wastewater Systems."
, Winter.
c= S3 d
to ert -^-
^ < ?
1
CD
CD
CC
0
IS
o
o
CO
09
CC
1 g
- "cO
•^~ n
Eileen and Alan Hais. 2004. "Wastewater Secur
Universities Council on Water Research, in pul
l" ts
^ "o.
O ZJ
-------
f
i
c
o
5
c
c
^
Reference
o
03 CO"
| S
% -a
11
| 0
en "r~:
>, =
CO :=
0 TD
"o re
03 ^
re 1
O -^
.9 -^
ll
-!-• "CO
cz cz
CL ° "to
"CD — co
|||
•o £«
fe.o S
°- .-5 'H
co £; "
£ « o
t— T3 0
.IZ
1 "5
"yj tO
co.E
^ -a 1-03
O a} CO" *J cz
t3 o ' S °>
Ostfeld, Avi and Elad Salomons. 2003. "An Early Warning Detf
(EWDS) for Drinking Water Distribution Systems Security," Pr
World Water and Environmental Resources Congress, June 2i
Philadelphia, Pennsylvania; Sponsored by Environmental and '
Resources Institute (EWRI) of the American Society of Civil Er
ASCE/EWRI, 0-7844-0685-5.
re
° .«
CZ oj
•a >,
cz re
|E
£ jz
cz *t
03 ^0
"g '&
3 £
^ "o
"o co
*^ 03
TZI a.
E 'H
CO CD
££
cz -a
O 4-<
Q. Z3
CO O
CD .O
_^ CO
CO CZ ^_I
.^ o cz
**— "+^ CD
CO ^ "D
-j^ E "o
CO i— c
£f ~
co cz t
s'sr"
ts -§ e
? i £
eb site contains
sm incident. It ir
a response to a
5 1 =
CO 2 ~
j= fe =>
(— S -o
O3
O
CO
CD
TZ>
0
Q.
CO
Pennsylvania Emergency Management Agency. 2002. First Re
to Terrorism Incidents, http://www.pema.state.pa.us/
cz
CO
CO
CD
2 .y
O. ~r^
CD O.
it
03 .92
"G CO
Q. ^
.E o
o >.
5 °-
« Q.
'55 >.
en re
03 ^
ll
O CO
to CD"
* 5
|I
CO CZ
E 0
•^. •—
.•& te
1 5
4S o>
0 .>>
ll
03 C
co —
— co
CD —
•o ±± co
o> .J2 .—
i-ii
1— 0 -Q
C
•o
CD ^^
co a.
Q. S
CD o
Q- "co"
c
Pennsylvania Emergency Management Agency. 2003. Disastei
Planning Guide for Facilities, http://www.pema.state.pa.us/per
view.asp?A=566&Q=254838. September.
to
03
1
o
CD
CO
O
f—
O
i
CD
O>
"o
o
CD
_Q
=3
O
-a
c
CO
O)
"CD
CO
O)
cz
^
0)
cz
aguidetoinsta
CO
CO
"~
Ja-
1—
o
CD
^
Phillips, Bill. 2002. The Complete Book of Electronic Security.
McGraw-Hill.
O
& 0)
c3 c
O> Z3
co "o
I-i
> co"
O CD
Q.O
T3 S3
03
S E
re 03
03 j-
o re
'.^ CD
-Q JZ
o S
•»-• Z3
CO 0.
| o
.C CD
« 5 E
CO Q. M
J=l O> ~
E Q. 0
S E £
°£-l
CD "55 o
° -*2 tz
1§£
;t addresses the
nd local governi
encies resulting
re ™ p>
.CO ^ CD
1 — CO CD
CO
CO
CD
CZ
TD
£
CO
CL
O3
n
Public Law 107-188, Public Health Security and Bioterrorism I
and Response Act of 2002.
|
ii
"co
c
0
CL
CO
CD
CO
CD
CZ
CD
"55
cz
^
o
CD
Q.
CD
CO
•d
CL
EcS
O-'o
Q. cz
CO CD
D) E?
cz £
'.fr E
~ 03
o o>
c cz
o ^5
**— cz
CO CO
CD .CZ
^ °
S CO
an contains pro
ovides guideline
°- 5.
to
•a
a.
o
•g
0
Q.
« 1
CD ~^
CO -*-1
fi
re o>
11
:E O>
T3 .E
re CO
£ g1
Z «
11
S. c
w °
CD -a
CO S
co fo
CD re
-c5 -°
-a co
re cz
03 JS
73 <=-
t 03
re ^j^
co m
•p co
1— T3
2^ a>
"g 1 S E
— CD CD s—
l-e g
kA- CD f^ f^
« -E S- "
S E « 9-
Ringert, Kathy J. 2002. "An Approach to Terrorism Preparedm
Health and Hospital System." Journal of Homeland Security (c
Reprinted with permission from Baylor University Medical Cer
2001;14:231-235.
http://www.homelandsecurity.org/iournal/articles/rinnerthealtt
o
CO CZ
CZ 0
0 Q.
•= co
co 2?
II
1 s=
o *°
~a g
CO "-S
"o" -—
-t "P
g 8
0 0
c?>
.E o
o o.
Ii
f i
ll
'— «
o .,
03 0
Z3 Qj
l.t
«|E
CZ CO CO
~ O3 C=
s <=>-•«
E = >,
ZJ O o
O CO ^
•a E 01
-•— • CD e t CO
Rostami, Jamal and H. Besharatian. 2003. "Application of Inte
Systems for Improved Protection, Security and Reduced Main
Pipelines," Proceedings of the American Society of Civil Engin
International Conference on Pipeline Engineering and Construi
Pipeline Technologies, Security, and Safety," Najafi, Mohamm
13-16, Baltimore, Maryland. Reston, VA/ASCE, 0-7844-0690-'
2vol.
o>
o
o
0
«
{
s
^
^
£
o
•o
CD
CZ
O)
"co
s
1
CO
ii
s
h—
i
"V
•1
ocument is a "Ti
•a
CO
Ic
1—
2
CO
CD
ra
s
Sandia Corporation. 2002. Risk Assessment Methodology for
May.
-------
e
0
75
•5
C
C
eference
cc
CZ
g
CO
'O
CD
-o
CO
*— CZ
P P
il
CD "^
E «
CD P)
CD O
id model that includes
jactive capability of an
re ~
|H
5 en
CD CZ
E -Q.
CO P
This paper presents a dynamic risk fi
model. The model focuses on a deve
Ix:^
-2 3= CD
P CZ J3
C CD CZ
-= i— 53
S^l
r — w— -1—
§ ° co-
"4= CO CD _,-
re 01 cj T
E .E ^5 T
u_ T3 ?^ O>
o 5 ° co
!§£?
Js: c: l_ *3-
£ D_ CD CO
— = lo r-
fe 5 A
i 1 •- tb
io S.E5
2 •£ i§ =
o c p ^
i i t^ ;"r.
i H. 2003. "A Dynam
ritical Infrastructure f
Risk-Based Decision
ra, California. ASCE/E
-CZ CJ CZ ra
0 re ° "2
""^ _ CD re
w — cz m
53 ^> CD ™
1 '§ .£ re
ZJ 0 CZ CO
CO CD P
CO CO O 00
CO
CO "g
CD ^
-O CD
> '^
O n.
t: 22
information secure. It f
d hardware and softwa
jblic works
ormation an
This article addresses how to keep p
recommendations about web site inf
ta
.X
o
o
_Q
Z3
Q_
E
CO
o
CD
1 —
CD
JZJ
3-
"co
CZ
're
S1
D)
CZ
•s
03
2
Q-
^
•
CD -CZ
CD °>
CD £ P
Hi
« ~ §5
CD £3 CD
£ re -°
CO g
o>.92 fa
.E ±± J=
co^ °
•S2 re -E
/astewater facilities are
esame risks as water 1
from water agencies w
& .CZ CZ
1 'S S
i|i
0 CZ CO
o „, o>
This article discusses the security pr
reports that wastewater facilities fac<
are many lessons wastewater agenci
the process.
£?
=>
S
w £•
3: «
CD =1
= Z
CD CD
J= LL.
1—
- CN
^r P
S ^
s^
11
CD -
3 P
<"-§
wE
ion D. and Wendelyn
r Environment & Tec
CZ S
rrt Co
•= 5
rrt "^
C/J
8" 22"
C ^
CD ±i
Q. =J
V) O
o
o
cr
CD
E.J
Ss
CO _
CO U»
S •-
II
^ P
as the Vulnerability Se
ks and the advantages
11
CZ S
CD
This article describes a software pac
(VSAT™). This article describes how
CO
.92
=> ^5
«>
.92 >;
-±± O)
11
CD JZ
c o
— CD
g ^
o> ^
c~ .
Eyes: In assessil
ater Environmen'
s K. 2004. "Watchful
their assets first," W
lary.
""PC1
E ° ^
3 0 £
- p
i^'2
Z3 ^
"5 .cz <3
CO co i-
p
CO
°>c3
E o
^ o
o «J
-i^ o
c: CD
s &
el"
CO <»
and on effective policie
nology that can restrict
co" "o
E oj
Si
o-S
Information on various access contr
employee access. Including informal
only areas the employee works in.
E
CO
CO
8
o
:ess Control."
business-crime/a
Police. No date. "Ao
imesvalley.police.uk/
^e
5 1
•^ >
crt >
CD ^
E >:
If
P)
CZ
CZ
re
£
•2
're
CO
Z3
P
J3
CQ
e including informatior
bout chlorin
This web site contains information a
of chlorine.
P
www.cl2.c
3
CZ
g
"co
mportant Inform
•*
CD
O
CM
O
CZ
s"
Z3
"co
f~
CD
^cz
o
s
o
CD
f
!•
intrusion-detection uni
rements for
"Z3
CD-
CD
_J
^
CD
.CZ
^-<
CO
.^
CD
O>
a
5
CO
jg
CD
CO
|E
73
K
~ CO
O> cj
CO cO
11
= oi
i CO
to
c J=s
o ^
•^ co
O CD
CD Q.
II
-II
CO O
IB
- g
csi o
.aboratories Inc. 200
. http://ulstandardsin
)04).
«°^
CD *_ CT>
4— CD c\J
•L= jzi v;
g E »
-S ™ o
T3 CZ1. -Jz!
CZ CD "
Z3 CO O
CO
c "P
ca cz
Q. re
0 «
8 g
i- 0)
0) 'CO
-CZ CD
-*~l "O
"O
CZ CO
™ S3
CO OJ
p> re
C CZ
i!
-° c?
s^
°5
0- CO
3 "H
_ re
S 5
1 °
« -o
CD CD
•° re
CZ CD
s^1
ts z:
.CZ C=
This document presents measures t
from airborne hazards. The docume
security planners.
"CD
•o
CZ
re
CO
O)
CZ
'S
1. Protecting Bui
Washington, DC
•ps of Engineers. 200
m Airborne Hazards.
5 S
o *-
>• £2
E cz
E ra
ronmental and occupat
n an ISCORS survey an
IS
CD CD
05 CO
P
'4= CD
-S «
This document provides recommeni
precautions. The recommendations
CD
If
—3 CO
CO CD
CZ CD £?
P P. 5
ill
g g CO
~ CO CZ
|.E V»
rr >- cO
O ^v -—
0 •> CD
.Ell
nteragency Steer
ssment of Radio.
t of Radioactive I
jnt Works.
;nt of Energy (DOE) I
idards. ISCORS Asse
tions on Managemen
blicly Owned Treatmi
E «-§<£
t! CO cz .^
co ,-
-------
I
I
c
o
re
•s
B
C
Reference
.a of g"
|| |
*° 1= S
"CD +S c
C CD CO
O yj" .p- O
05 S 'g 1
"• fii o. -2
SO3 03 C=
c ° 03 >
re „ CD ^~
C 05 !t .&
03 05 0 =
-- o -g o
E ^'5 3,
O O) —
1 ^ -= 'ol
o>" 03" . S1
fe S £-§-
ra £E = o~
en "I s S ;E
CD is 3 £3
25 " d 03 i=
^ -^-. rT)
| '~- c .£? 1
••— • ~n rrt -4—" o
C~ T-i ~
1 3 1 1 1
>_ re fe £ ~
guide is intended 1
te, and governmer
ols, transportation
nmendationswith
naintenance, admi
05 5 o 5 ~
g •£ -5 y =
1— Q. 03 K: re
£; 03
g CD Q
•^ ^ J3
U.S. Department of Health and Human Services, Centers for Disease Coi
and Prevention (CDC), and National Institute of Occupational Safety and
(NIOSH). 2002. Guidance for Protecting Building Environments from Aii
Chemical, Biological, or Radiological Attacks, May.
0
o
'•E
E
o
£
o>
'•f oi
.2 05
o ^
O> p
^ ?»
•^ "05
m nd
Q r^
'w -^
^ "5<
il
§1
o 2>
.9-i
^i ?
i— re
S of
C/l "'
05 S
.E o
•55 w
'5 o
sl
i!
05 05
-g «
> ^
e 'te
0_ 0.
O3 ^.
&* * —
U.S. Department of State (DoS) Office of Foreign Buildings Operations.
A & E Design Guidelines for U.S. Diplomatic Mission Buildings. Chapter
"Security and Risk Management Design." June.
CD
re
05
£3
CD
CD
E
fa
.c
c
re
OL
05
O
CL
O5
CD
CD
O5
e
re
I
05
O
0
1
^
c
CO
-Q _£O
§ E
= 05
03 .!=
.Q ID
S O5
O ^
CD re
.•° 05
13 -O
CO -r~.
-^ T
re
U.S. Environmental Protection Agency (EPA). Integrated Contingency PI
Guidance.
05
E
E
CD
CT
05
0>
"c
"Q.
>.
O
CD
O>
CD
03
U
I
CO
£2
o
CO
CD
CO
CD
•^
^
_g
document explain;
O5
t^
CD
^
T-
U.S. Environmental Protection Agency. "RCRA, Superfund, and EPCRA 1
Training Module: Introduction to Emergency Planning Requirements."
•o
C.
CO
o
Q.
LLJ
1 oi
^-* re
E "5-
E .!=
O CD
CJ ^
i".E
c Sfi
C. CD
J2 =
0. 05
>^ re
g-|
CD
Si E
05 .«
E o
S V
— S
"± 0
03 0
document is a guii
nmends including
O5 O
IE °
Q.
LLJ
05 e/3
"re ^
U.S. Environmental Protection Agency (EPA). 2001. "LEPCs and Deliber
Releases: Addressing Terrorist Activities in the Local Emergency Plan."
550-F-01-005. August.
T_,
re 05
O5 "c
05 9J
^ *"
O5 O
T3 03
I ^
1= 05
1|
-1- ^
o -P
"-S CO
.fO CI
"S 5
E ^
"" ^o
CO ^
CD
> CO
o ^
0 t
CD O
co" ®
C "0
O ^
o. o
*- CD
CO C
CD '—
-a CD
11
II
CD
S E
^ 05
O) "^
05 2
_-a
C3
i_ 05
U.S. Environmental Protection Agency (EPA). 2002. "Guidance for Wate
Utility Response, Recovery, & Remediation Actions for Man-Made and/c
Technological Emergencies." Prepared by Michael Baker Jr., Inc. for the
USEPA's Water Protection Task Force. April 15.
http://www.epa.gov/Arkansas/6wq/swp/security/EPAEmergencyResponi
anc.4-15-02.pdf
1
O> •!-•
g -
5 CD
co E
en Q3
« >
*2 0
J» o-
o? E
ii
0 =1
ciC
E 2
CO CO
g1^
1^1 -^ J_
^ E +^
^ ^ 5
" g re
-a 3 05
g 1=3
U- CD CD
o> E S
-Ii£
0 i= g
S Tj?, ><
en c Q.
52 g 1
S ?S
CO ^* -T3
iPA's Clean Water
ng to assist public
ict public heath am
~a 4^
^ c o
t— S CL.
U.S. Environmental Protection Agency (EPA), Office of Wastewater
Management. 2003. "Use of the Clean Water State Revolving Fund to
Implement Security Measures at Publicly-owned Wastewater Treatment
Works", January. http://www.epa.gov/OW-M.html/cwfinance/cwsrf/
security.pdf
c
., d
o 'c:
tj "~
CD i«_
i"^
4-. CO
II
if
11
c. >
05 ~°
3 O3
J2 5
•^ s
c — j-i
CD j
11
C
"CD °
CO -J^
CO C
•— E
X CO
-§ I
o o
° re
esponse protocol
ling a response to
r modeling.
^ CD
£11
U.S. Environmental Protection Agency (EPA). 2003. "Response Protoco
Toolbox: Planning for and Responding to Drinking Water Contamination
Threats and Incidents." Interim Final, December.
http://cfpub.epa.gov/safewater/watersecurity/index.cfm
-------
c
o
•i
c
t=
Reference
CO g
re 03 EZ
51 -5 o
CD C^" -^-<
CO CD CO
C *~ ^
CD co 92
CC 'r- cz
>» 1— .S-
c "G °"
» « "i
Er^ ^
^
LU O Crt
cz g- £
CO CD ZJ
03 DC TZI
111
Q. 0 Ci
•S fe c
CD o *~*
"- 03 CO
document provides guidance
ired under the Public Heath S
munity drinking water system
:ed in a terrorist attack.
CO Z) cz .^
3" ?
CZ CO
O3 „,
III
cz cz ~o
LU o CD
HI
C/3 £3 p
i— ro £~,
tection Agency. 2003. Large Wate
Guidance to Assist Community V
ilic Health Security and Bioterrori!
July.
o • • •"
— ; ^ Q3 C3
£5^2
CD c ^= O
.^03^03
f r, co E co
{". 03 0 03
=> CC o CC
o ti
^— • cz
.C CO o
•^1 i
i— O CD
CO CD "yj
S* C/? co*
*— -^ ^_ -^t:
£ CD -22 «
^o^2
>. ^: 01 co
•_ = S 0
O3 Q_ cz t
TO 03 "C 03
E CD •— c
=) -S <= —
— ^ ZJ "a
« = E S
fill
|||1
document provides guidance
are an Emergency Response 1
jrrorism Response Act. This a
s, procedures, and equipmeni
CO Q. ^ cz
'^ e .2 ss
|— Q. CQ Q.
O3~
CO t_
O ~ .a
03 ~,~ai ts
O c* O3
c tz co
CD 03 CO
E? w 0
92 en So
tection Agency (EPA). 2004a. "En
1 and Medium Community Water
:ewater/watersecurity/index.cfm (
11^
10^ §
C 0 =?
CD **~ ni
I s &
c CZ r-»
o « -§
ill-
cz -3 o
. — >* ;5*
C/l 1^ °- C^
- J3 4± o
^» Q_ ^. cxi
>. co
"— CD
-*— ' •*— '
Z3 CO
cd co
^ 2 o
.2 .2 Q-
Jr; cz *o
CD
o S aS
"c^ "W '£
I 8 S
0- CL CT3
CD w O
S 'CO g
CO Ol -r;
CD CO co
ill
CO 0 ••=
i ^ I
111
o a. "5
is ft
1_ TO .CZ
EPA developed the Security P
agers in reducing risks from,
intentional terrorist attacks. T
lable to enhance physical sect
£ I a I
CD
to
5
CD
to
£ o
•a 'l~
co -5
CD S
to
tection Agency (EPA). 2004b. "W
3water/security/guide/index.html.
° -S ™
O- ~ 3Q
]3 c! o
SI cri
US
Set |
|f|
"^ 03 ±2
Z3 CO E
Reviewed
0
L_
CD
^
S
a
CO
03
•o
O
E ef
o> °
to fa
leed for Improved Distribution Sy
ncil on Water Research, in public
O3 O
3 CD"
CM ^3
CZ O3
.— O
~~ "* ZJ
>- o
03 CO
-Q CD
ID CC
o
•o
CD
•o
1
CO
CO
Ol
cz
_o
_o
CO
•o
CO
•o
c= -J
2 a
co eg
E i
antiterroris
f a terrorist
document outlines the DODs
mize casualties in the event o
£ 'E
o
CO
•o
CO
•o
co
E
—
. 2003. "DoD Minimum Antiterroi
. October 8.
•| o
•»-• O
o o
CO CO
LU 01
Is is
'E '5
Z3 CD
^ c?
»'S
o -o
!5 <=»
•§ .E
~ S
g 0
>> 0
CD O
CO CD
° -o
O Z3
-^ O
>— £Z
o —
3 2
o => >,
« i H
•S-ffi S,
CZ [^ CD
CD 1— £
Ol • £=
CO •£- 03
CO 03 CZ
.* c= co
r public wol
cy managei
overy from
article addresses the need fo
icies in all phases of emergen
ning for, response to, and rec
.52 55 c
(^ co° "B.
"5
_
12
o
o
D_
f~>
rst Responders' Need to Speak U|
f-
ii
. CO
. CJ
-C LO
CO CO
^D i-
Reviewed
==
CO
CD
;S
5
CO
£
ssment Tool™ for Water & Waste\
;essed October 22, 2004).
CO S-
< *-
M— O3
"CD =
CO CO
>, 03
±i co
il
CD >
| I
?• i
Reviewed
=
O3
0
ZJ
O
CO
y
"o
CO
Risk Manager's First Impression
ifornia-Nevada Section, AWWA.
— Ol
CO CO
5 ^
01
II
i 2
Q- Q.
CD O
.4—1
CO 03
s y
i g
0 CO
co -5
"O 03
i s
CD "O
f «
s ?
o "i
**~ Q.
-I 1
2 co
Q. CD
01 0
manual presents current desi
ons. The manual is intended t
'mation.
to 'jz; o
jllji
CD CD
^ M—
.Q °
-a -a £
c 22 o
cO "-^
•*"* ^^ "«
tn • Q-
ca uj cz
eration (WEF). 1993. Design of V\
tations. WEF Manual of Practice F
f Wastewater and Stormwater Pu
eration. Alexandria, VA.
•o co o -o
£ 01 1= £
^- c C3) -t-i
CZ "Q. "CO CZ
CD r- CD CD
E I Q E
§^ § S
1 1 I 1
LU g o LU
^ E ^ is
CO O to co
5 CO I- 5
-o
c
03 "S
CO .2
CO C3-
E CD
e -s
•*— cz
"S CD
03 >
Q. CO
x .=
o
O -d
r- i_
5 O3
Ol CO
cz c:
~ « to'
fi Q. .03
managemei
written for
y case stud
manual focuses on recovery
t to plan for. This manual was
ral disaster and includes man
CO CO Z3
IE -= to
t— 5 cz
^o
•^
O3
E
1
CO
-22
"to
i
Q
2
Z3
CJ3
C33
cn
LU
cz .92
o .-t;
to 'o
H
II
E 03
g^
-5 S
CZ CO
LU g
i_ CD
CD •*— '
^ CO
CO CO
55
•o
§.s
O) "a
cz E
^ 03
""• £
ja -a
r—
.E co
co ,,r
CD SG
-— t^
.•t: zs
**- 2
^ ^
.^ to
to 03
co
OJ >
LL. ,
ronment
ations foi
1-1
LU Z3
v- E
-S I
> o
5 o
-------
S
i
cf
"to
CD
•o
CD
1
CD
CO
1
o
T3
I
CO
£>
to
-D
_cz
CD
CO
CO
cipal Wastewater
Water Environment Federation (WEF). Design of Muni
Treatment Plants, Manual of Practice 8, 4th Edition.
_Q
•a
CD
CO O
ZJ <-•
CO "P
•a P»
o t
« "1
— &
o —
*— 03
cz -Q
0 CZ
" 8
-C Co"
•*-* CD
-a "d
i I
TT ^
£ -O CO
•H- .E O
(— C~ +•*
£ E ez
_ ZJ O
o CD o
.Si's >,
0 4= ID
™ CD *i-
O. S CO
.cz <"
L— £ >
CO CO o
03 — t:
CO CO Q.
CD .O cz
42 w .22
ZJ ^ '^~
co .iz -"^
03 CO tl
•*- CO~ O3
co .9? E
05 = to
I 45 S
This article
production
wastewater
i ?
9. Protecting Worl
'astewater Treatm
igton University.
Water Environment Research Federation (WERF). 199
from Exposure to Physical and Chemical Hazards at V\
Plants. Project 97-HHE-3. Prepared by George Washir
a
E .E
*~* -a
1 «
CD CT
yj co
S -S
5
l_ ••— •
Q rS
**"" •§
CO CZ
CD ^
'If
co
o. o
C CO
"CO CD
>t i—
o —
£ 3
•§ P? o"
c c
111
»- CO 3
CD —5 "O
.> g, E
^ Q3
03 ^ cz
CO S C
O3 CZ CD
!•= 03 >
'*= ZJ CZ
CZ == O
CD CZ O
-^2
This manua
examines tt
alternatives
i
-a
1
cc
03
'o
E
CO
Water Environment Research Federation (WERF). 200
Design Practices. WERF Project No. OO-CTS-5.
•o
O3
O3
OC
O
CZ
il
0 0
O3 Q-
co E
"T _r
Water Environment Research Federation (WERF). 200
the Wastewater Sector: A Prioritized Research Agendc
Proceedings, January.
•o
03
"S
OC
"cO
O.
'o
Planning for Muni
Water Pollution Control Federation. 1989. Emergency
Wastewater Facilities. Manual of Practice SM-8.
CO
TD
O
.CZ
03
E
cz
o
js
CD
•a
"co
i
"cO
*f
,2
c
CO
S1
CO CZ
03 0
S'B
"CD .E
„ 1^
CO CD
i o
03 ,^
•"• y)
*- O3
03 M
H CD
C O
^ "i
Q_ «>
co -a^
CD CD
% g1
3-s.
.!2 E
-a CD
CD CD
•D -0
"-F <=
« s
11
s; and Richard M.
November 2003.
Whelton, Andrew J.; Janet L. Jensen; Todd E. Richard
Valdivia. 2003. "The Cyanic Threat." Civil Engineering,
O3
1
03
OC
'o
z
CO
•>
O3~
id Water for Reus
White, G. Clifford. 1978. Disinfection of Wastewater ai
Nostrand Reinhold Company, New York, NY.
CD
O)
S
O _
to c5
"cO "d
o c;
It
"1 CO
° o E
•&* 3 qj
'k_ CO -O
Z3 CZ O
0 CD i-
CD _ Q-
<" ° &
03 CD •—
£ "0 ZJ
CO j_j
•i s-
eg ^ S
CO "*"^
eo 2 -S
CO ^
o ^ —
£2 co ^
C -t— - O
o f — *^
'i= 03 73
CO E 03
T3 O3 CO
p 2 ">
E §" tz
|i|
i se
CZ i-, >^
0 £• CD
co E £
^ i i
1 !-•&
o cr i_
i; o 3
Q. CO CJ
CD CO ^
0 CD «
— -a 03
•it
ill
i— ±; 03
8«
- c
>. 03
A Sense of Securi
." Water Environs
Whiting, Nancy E. and Russell Rocha. "Safety Corner:
Part 2 Enhance your facility's onsite chemical security
Technology, February 2002.
O3
1
I
OC
'o
orner: A Sense of
Resource —
y 2002.
Whiting, Nancy E. and Russell Rocha. 2002. "Safety C
Security, Part 1: Protect Your Facility's Most Precious
Personnel." Water Environment & Technology, Januai
•o
CO
5
CD
CZ
B
o
JZ1
p
Ol
cz
'cz
cz
CO
a.
13
0
CD
CO
**—
C
o
CO
E
|
C
C
1
5
CD
B
E
»*— CD
03 -jz;
° :=
"E c1
co -K
JZ 'x
1— 03
CO
i
Institute of Architf
cz
CO
o
03
CZ
'53
O3
Q
•a
i
C31
CZ
'cz
cz
CO
OL
•S
o
CD
CO
i
CNJ
§ S
03
CD *-*
-0 "o
CO 03
CD "o
_ Q_
> O
O3 "^
^3 CD
'co "°
CO o
d. .E
03 T3
.E 03
1 -S
O3 '(y5
03 CZ
•a o
CO °
11
>1 2
co o
^ f~
CD CO
Ii
D) "*"""
c Sfi
•^ CD
CZ Z3
•o s
= JZ CO
« ^ 03
CO -= 03
Q. ZJ CO
.^ CO CO
O3 c O
= -a w
'53 -a o
CO CO **
This guide i
component
system and
ulnerability Self
jary 4, 2004.
Wisconsin Rural Water Association. 2004. "Security V
Assessment Guide for Drinking Water Systems." Febri
http://www.wrwa.org/System_Security.html
-o
CD
Not Review
*
vironment Resean
Zieburtz, William B., Jr. 2003. "Economics." Water En
Literature Review, September/October 2003.
-------
(This page intentionally left blank)
-------
Photo/Illustration Credits
Figure 4-3, page 4-13. Illustration courtesy of Master Lock Company, www.masterlock.com
Figures 4-6 and 4-7, page 4-30. Photo and illustration courtesy of Watermark Navigation Systems,
LLC. www.navbuoy.com
Figures 4-9 and 4-10, page 4-36. Photos courtesy of Riverdale Mills Corporation, www.wirewall.com
Figure 4-12, page 4-37. Photo courtesy of SecureUSA, Inc. www.secureusa.net
Figure 4-14, page 4-39. Photo courtesy of All Storage Systems, www.securitycages.com
Figure 4-15, page 4-41. Photo courtesy of Ladder Gate - R B Industries. P.O. Box 4734, Greensboro,
NC 27404
Figures 4-16,4-17, and 4-20, pages 4-43 and 4-45. Photos courtesy of McGard, Inc. www.mcgard.com
Figures 4-18 and 4-19, page 4-43. Photos courtesy of Hydra-Shield Manufacturing, Inc.
www.hydra-shield.com
xlv
-------
(This page intentionally left blank)
-------
-------
------- |