Association of American Railroads & American Chemistry Council Security Task Force - This document contains recommendations developed to assist in the safe and secure handling of Poison-by-Inhalation (PIH) tank cars. The recommendations include information on communications and information exchange, the storage of tank cars during transit and rail access control at plant sites. (Restricted Use - For Official Use Only)
The ASP provides an option for regulated facilities to submit information necessary to document site security measures that address the Risk Based Performance Standards (RBPS) through a format other than the SSP template. Recently, the American Chemistry Council released a guidance document and template developed in consultation with DHS to assist its members with the development of ASPs.
Chemical Sector Security Awareness Guide - A guide for owners, operators, and chemical supply-chain professionals. The purpose of this document is to assist owners and operators in their efforts to improve security at their chemical facility. The goal is to make professionals working in the Chemical Sector aware of the security risk to the sector and to provide a list of activities or actions that they can take to reduce that risk.
Chemical Faciltiy Anti-Terrorism Standards (CFATS) Site Security Plus Lessons Learned Fact Sheet - The Department of Homeland Security (DHS) has reviewed hundreds of Site Security Plans (SSPs) submitted by high-risk chemical facilities, under the Chemical Facility Anti-Terrorism Standards (CFATS) regulation. Based on these reviews, DHS has identified some helpful hints to assist with completing your SSP as part of the authorization and approval process.
Chemical Faciltiy Anti-Terrorism Standards (CFATS) Risk-Based Performance Standards Guidance - The purpose of this document is to assist owners and operators in their efforts to improve security at their chemical facility. The goal is to make professionals working in the Chemical Sector aware of the security risk to the 7 sectors and to provide a list of activities or actions that they can take to reduce that risk.
- Key policy issues debated in previous Congresses contribute to the current re-authorization debate. These issues include the adequacy of DHS resources and efforts; the appropriateness and scope of federal preemption of state chemical facility security activities; the availability of information for public comment, potential litigation, and congressional oversight; the range of chemical facilities identified by DHS; and the ability of inherently safer technologies to achieve security goals. The 113th Congress might take various approaches to this issue.
Department of Homeland Security - Risk-Based Performance Standards Guidance - Chemical Facility Anti-Terrorism Standards - May 2009
Department of Homeland Security (DHS) has issued its final Risk-Based Performance Standards Guidance. High-risk chemical facilities can use this document both to help them gain a sense of what types and combinations of security measures and processes are likely to satisfy a given risk-based performance standard (RBPS) for a facility at their tier level and to help them identify and select processes, measures, and activities that they may choose to implement to secure their facility.
DHS - Know Your Customer Tips - Product stewardship can prevent businesses from becoming unwitting participants in illicit activities. A good stewardship program allows a business to know who is buying the chemical, where the chemical is going, and what the customer intends to do with the chemical. Be aware—you know what is normal for your business.
FBI - Potential Indicators of Cyber Threats to Industrial Control Systems - Industrial Control Systems manage the United States’ critical energy, water, transportation, manufacturing, and other infrastructure systems. A cyber attack on an ICS is one of the only ways to cause real-world physical effects from the cyber realm and may appeal to a variety of cyber-based threat actors.
Ten Basic Cybersecurity Measures to Reduce Exploitable Weaknesses and Attacks - According to the 2012 Data Breach Investigations Report, 79 percent of data breach victims had computers or other systems with an easily exploitable weakness rather than being pre-identified for attack. 96 percent of victims succumbed to attacks that cannot even be described as highly difficult. As a result of its investigation, Verizon Business concluded that most data breaches are avoidable without difficult or expensive countermeasures.