&EPA United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems f Office of Water (MC 140) EPA817-B-15-002B May 2015 ------- Enhanced Security Monitoring Primer Introduction A Water Quality Surveillance and Response System (SRS) provides a systematic framework for enhancing distribution system monitoring activities to detect emerging water quality issues and respond before they become problems. An SRS consists of six components grouped into two operational phases, surveillance and response. The surveillance components are designed to provide timely detection of water quality incidents in drinking water distribution systems and include: Online Water Quality Monitoring, Enhanced Security Monitoring, Customer Complaint Surveillance and Public Health Surveillance. The response components include Consequence Management and Sampling & Analysis, which support timely response actions that minimize the consequences of a contamination incident. The Water Quality Surveillance and Response System Primer provides a complete overview (USEPA, 2015). This document provides an overview of Enhanced Security Monitoring (ESM), a surveillance component of an SRS. It presents basic information about the goals and objectives of ESM in the context of an SRS. This primer covers the following four topics: • Topic 1: What is ESM? • Topic 2: What are the major design elements of ESM? • Topic 3: What are common design goals and performance objectives for ESM? • Topic 4: What are cost-effective approaches for ESM? Topic 1: What is ESM? ESM utilizes physical security equipment at key distribution system facilities to detect unauthorized entries that could lead to a contamination incident. ESM equipment can also be effective for detecting vandalism and theft. Furthermore, video monitoring systems used for ESM can provide operational benefits by allowing utility staff to view process equipment and conditions at remote facilities without a site visit. Figure 1 is a schematic representation of ESM. Intrusion detection is provided by equipment strategically located at a utility facility. Alerts generated are transmitted by a reliable communication system, and personnel are notified of the alerts through emails, mobile devices or display at a central control facility. ESM investigations are guided by documented procedures and coordinated with external agencies such as local law enforcement. Intrusion Detected * Contact Switches * M otion Detectors • Video Cameras Alert Transmitted • SCADA * Wired Network * Wireless Operator Action * View Alerts Investigate Alerts Figure 1. Schematic Representation of ESM ------- Enhanced Security Monitoring Primer Topic 2: What are the major design elements of ESM? The major design elements for ESM are shown in Figure 2 and described under the remainder of this topic. Contact Switch Motion Detector PTZ Camera Fixed Camera Network/Digital Video Recorder Communication SCADA Digital Cellular Radio High Speed Wired Data Line Information Management Alert Investigation Procedures Mobile Device Central Control Center Other Remote Locations Figure 2. ESM Design Elements Intrusion Detection Equipment The Intrusion Detection Equipment design element focuses on selecting facilities for security enhancements and proposing equipment for each selected facility. The facility and equipment selection process can use a risk-based methodology such as the Vulnerability Self-Assessment Tool, which is compliant with the J100 industry standard. This process assesses the threat of, vulnerability to and consequence of attacks at each facility under consideration and evaluates the overall reduction in risk provided by ESM enhancements. This analysis provides a quantitative basis for selecting facilities and equipment for ESM. The deployment of intrusion detection equipment is at the core of the ESM component. The ability of ESM equipment to detect intrusions depends on the placement, number and types of intrusion detection sensors and video cameras. Physical security equipment is continuously improving as sensing technology advances, with equipment becoming less expensive, more reliable and more configurable. These advances provide for broader coverage with fewer invalid alerts and have allowed utilities with limited resources to implement real- time security monitoring at remote utility facilities. DID You KNOW? The EPA's Vulnerability Self-Assessment Tool (VSAT) is a J100 standard compliant risk assessment software tool for water, wastewater and combined utilities of all sizes. The tool assists drinking water and wastewater facility owners and operators in performing security threat and natural hazard risk assessments, as well as updating utility Emergency Response Plans. (EPA, 2013). ------- Enhanced Security Monitoring Primer ESM equipment can be divided into two general categories: Intrusion Detection and Video Surveillance. Examples of each category are illustrated in Table 1. Table 1. ESM Equipment Equipment Types Intrusion Detection Video Surveillance Door and hatch sensors Motion sensors Fence-mounted sensors Buried-line sensors Internet protocol cameras Infrared cameras Event-based network or digital video recorders Video analytics Description Contact switches such as magnetic proximity and mechanical limit types Used at site access points (for example, on doors, windows or hatches) Used for site or interior area coverage (for example, along a row of windows) Used for disturbance sensing (for example, taut wires and magnetic field sensors) Used for perimeter security (for example, near fencing) Converts images into digital data Used for outdoor or low light conditions Transmits video clips on demand and stores video data Algorithms embedded in video software to detect static (loitering or unattended items) or dynamic (walking or running) situations captured by monitoring cameras Communications The Communications design element consists of systems that transmit ESM alert information from facility intrusion detection equipment to a central control facility. The communications infrastructure must be capable of supporting the required data speed (bandwidth) such that ESM alert information can be transmitted to the central control facility in a timely manner. Data speed requirements will vary greatly depending on whether the system includes video data and how the video monitoring system is configured to transmit data. Information Management Once the data is delivered to the central control facility, it should be displayed on a user interface that allows utility staff to quickly recognize and respond to the alert. Furthermore, ESM alert information must be stored and accessible for post- incident analysis. Information technology architecture configurable by system administrators is a standard approach. DID You KNOW? A useful resource for ESM is the Guidelines for the Physical Security of Water Utilities / Guidelines for the Physical Security of Wastewater/Stormwater Utilities (ASCE/AWWA, 2011), a collaborative publication from the American National Standards Institute, American Society of Civil Engineers (ASCE), American Waterworks Association (AWWA), and Water Environment Federation. This document is available for purchase from ASCE. For both the Communications and Information Management design elements, leveraging existing network and communications infrastructure can reduce the cost of equipment and installation. When designing these elements of the system, consideration should also be given to in-house capabilities and compatibility with existing equipment. ------- Enhanced Security Monitoring Primer Alert Investigation Procedures ESM alerts need to be promptly investigated by utility personnel to determine whether or not the potential intrusion might be related to drinking water contamination. The following are basic example steps that may be performed during ESM alert investigations. 1. An ESM investigation begins after utility staff receives an intrusion alert. 2. Utility personnel use a checklist to guide them through a predetermined investigation procedure to determine whether the intrusion could disrupt utility operations or present a risk of contamination. The checklist may guide actions such as: a. Assessing known activity at the facility, such as maintenance by utility personnel or contractors b. Assessing video, if available, to verify the intrusion incident c. Notifying and dispatching investigators to physically inspect the facility where the alert originated 3. If definitive video evidence is not available, an investigation is conducted to verify or rule out the intrusion and determine whether there was access to the finished water supply. If the investigation determines that the alert , ,., , . . . , ... , , Invalid alerts associated with procedural errors was not caused by unauthorized activity, the investigation is closed and logged. If the investigation verifies an intrusion with access to the finished water, the investigation Equipment and environmentally-caused invalid '-. \\J l_/± V/^/^/W-LJ-A ^/kJ ±±± II. I. W ty's Consequence Management Plan. continues according to procedures in the .... . ..,:; , „ alerts are less common. drinking water utility s Consequence DID You KNOW? are common and often caused by employees who forget to call in when accessing a monitored facility or forget to completely close all monitored doors when leaving the facility. Topic 3: What are common design goals and performance objectives for ESM? The design goals and performance objectives established for ESM by the utility provide the basis for the design of an effective component. ESM Design Goals Design goals are the specific benefits that utilities expect to achieve by implementing ESM. A fundamental design goal of an SRS is the ability to detect and respond to possible distribution system contamination incidents. In addition to this fundamental SRS design goal, other ESM-specific design goals such as detecting theft, vandalism and sabotage incidents can be realized. Examples of common ESM design goals are listed in Table 2. ------- Enhanced Security Monitoring Primer Table 2. Examples of Common ESM Design Goals Design Goal Description Identify intrusion incidents that could lead to water contamination ESM can provide early warning of contamination incidents that could harm public health or utility infrastructure, which can trigger response actions to minimize consequences. In some cases, ESM may even preempt water contamination if the perpetrator is caught in the act. Deter, detect and respond to theft, vandalism and sabotage ESM systems can detect all types of intrusion incidents including those where contamination is not the intent of the intruder. Such criminal activity may not have a significant impact on public health, but can place utility staff at-risk and impact a utility's operating budget and day-to-day maintenance activities. Remote monitoring of process equipment If ESM includes video monitoring, operational benefits can be realized if the ESM cameras can also be used to monitor process equipment at unstaffed facilities. For example, pumps can be observed for malfunctions and intake structures can be monitored for the build-up of debris. Video monitoring can reduce the amount of travel time and on-site inspections required, thus reducing utility labor costs. Increased collaboration within the utility and with local law enforcement Collaboration with law enforcement during water utility drills and exercises can lead to improved coordination during response to real-world emergencies. Also, an ESM camera with a field of view of a public area can support law enforcement investigations unrelated to a water incident. Improved response decision making Developing ESM procedures can streamline and standardize a utility's decision-making process when investigating an intrusion incident. Thus, procedural improvements can enhance a utility's overall preparedness and responsiveness to physical security alerts. ESM Performance Objectives Performance objectives are measurable indicators of how well the SRS meets the design goals established by the utility. Throughout design, implementation and operation of the SRS or its components, the utility can use performance objectives to evaluate the added value of each capability, procedure or partnership. While specific performance objectives should be developed by each utility in the context of its unique design goals, general performance objectives for an SRS are defined in the Water Quality Surveillance and Response System Primer (USEPA, 2015) and are further described in the context of ESM as follows. • Incident coverage: Detect and respond to abroad spectrum of water quality incidents. One of the primary focuses of ESM is deploying intrusion detection sensors and video monitoring equipment to reduce the risk of contamination at select sites. The intent of such equipment is to monitor all areas that provide access to finished water, and detect all intrusions that could lead to a contamination incident. ESM design goals may also include detection of vandalism and theft, which could require monitoring of areas that do not provide access to finished water. • Spatial coverage: Achieve spatial coverage of the entire distribution system. ESM is limited in its ability to detect contamination incidents throughout the distribution system because only specific utility facilities are monitored for intrusions. However, utility facilities are chosen for ESM equipment based on their overall risk of contamination and the amount of risk reduction that would result from such enhancements. Thus the sites selected for enhancements can have the potential to impact a large portion of the distribution system and general population. • Timeliness of detection: Detect water quality incidents in sufficient time for an effective response. Utility staff must be immediately alerted of intrusions and investigate alerts in a timely manner. To meet this objective, alerts from remote facilities must be transmitted to the central control facility without delay. ESM also includes procedures for initiating and conducting an investigation in a timely manner. With a rapid response, it may be possible for the ESM component to prevent a contamination incident from occurring. ------- Enhanced Security Monitoring Primer Operational reliability: Minimize downtime for equipment, personnel and other support functions necessary for the component to meet the other performance objectives. One of the criteria for selecting intrusion detection equipment and information management systems should be reliability. In many cases, selecting a more reliable device that is more expensive can save money over its lifecycle when compared to a less expensive device requiring more maintenance. Alert occurrence: Reliably indicate unauthorized intrusions with a minimum number of invalid alerts. When implementing ESM enhancements, proper commissioning is recommended to ensure that each intrusion sensor is sensitive enough to detect intrusions with at least a 95 percent confidence level, but not overly sensitive and prone to an unacceptable number of invalid alerts. Sustainability: Realize benefits that justify the costs and level of effort required to DID You KNOW? Utilities may be able to make modest changes or additions to existing physical security capabilities to implement their ESM component. implement and operate ESM. Benefits are realized through attainment of the design goals for ESM. The AWWA's J100 Risk Analysis and Management for Critical Asset Protection Standard can be consulted for quantifying non-quantifiable benefits of security enhancements (ANSI/ASME-ITI/AWWA, 2010). Costs should be considered over the lifecycle of the component, including implementation costs, operation and maintenance costs, and renewal and replacement costs. Topic 4: What are cost-effective approaches for ESM? Utilities can take the following simple steps to develop the foundation for ESM: • Rank maj or utility facilities with respect to the risk of contamination. • At the facilities determined to have the greatest risk, add simple, inexpensive intrusion sensors, such as contact alarms on doors and hatches. Use existing communications to transmit ESM alerts if possible. • Establish procedures for the j oint utility and law enforcement investigation of ESM alerts that might be indicative of contaminated drinking water. Next Steps Visit the Water Quality Surveillance and Response Website at http://water.epa.gov/infrastructure /watersecurity/lawsregs/initiative.cfm for more information about SRS practices. The Website contains guidance and tools that will help a utility to enhance surveillance and response capabilities, as well as case studies that share utility experiences with SRS implementation and operation. References ANSI, ASME-ITI and AWWA. (2010). Risk Analysis and Management for Critical Asset Protection (RAMCAP®) Standard for Risk and Resilience Management of Water and Wastewater Systems. AWWAJ100-10. Denver, CO. ASCE and AWWA. (2011). Guidelines for the Physical Security of Water Utilities (56-10) and Guidelines for the Physical Security ofWastewater/Stormwater Utilities (57-10). Denver, CO. USEPA. (2013). Vulnerability Self Assessment Tool (VSAT). Retrieved from http://yosemite.epa.gov/ow/SReg.nsf/description/VSAT. USEPA. (2015). Water Quality Surveillance and Response System Primer, 817-B-15-002. ------- |