Transportation Security Administration Transportation Security Administration
Transportation Security Administration Transportation Security Administration
April 2011
Transportation
Security
Administration i
This page intentionally left blank.
Table of Contents
1 Introduction ............................................................................................................................... 1
1.1 Purpose ........................................................................................................................... 1
1.2 Scope .............................................................................................................................. 1
5 Criticality ................................................................................................................................... 9
5.1 Introduction .................................................................................................................... 9
5.2 Facility Criticality .......................................................................................................... 9
8 National Terrorism Advisory System (NTAS) Threat Level Protective Measures ........... 20
iv
TSA Pipeline Security Guidelines
Introduction
1 INTRODUCTION
Under the provisions of the Aviation and Transportation Security Act (Public Law 107-71), the
Transportation Security Administration (TSA) was established on November 19, 2001 with
responsibility for civil aviation security and “security responsibilities over other modes of
transportation that are exercised by the Department of Transportation.” To fulfill this mandate in
the pipeline mode, on September 8, 2002, TSA formed the Pipeline Security Division within what
is now the Office of Transportation Sector Network Management (TSNM).
1.1 Purpose
In executing its responsibility for national pipeline security, TSNM Pipeline has utilized the
Pipeline Security Information Circular, issued on September 5, 2002, by the Department of
Transportation’s (DOT) Office of Pipeline Safety as the primary Federal guideline for industry
security. Complementing this document, and also adopted by TSA, was the DOT-issued Pipeline
Security Contingency Planning Guidance of June 2002.
Recognizing that the Security Circular required updating, TSA initiated a process to amend the
Federal security guidance. After TSA commenced the document revision effort, Congress enacted
the Implementing Recommendations of the 9/11 Commission Act of 2007, P. L. 110-53 (9/11
Act). Sections 1557 and 1558 of the 9/11 Act directed TSA to review adherence to the 2002
guidance and to undertake other initiatives.
The revised Pipeline Security Guidelines were developed with the assistance of industry and
government members of the Pipeline Sector and Government Coordinating Councils, industry
association representatives, and other interested parties. This document supersedes the Pipeline
Security Information Circular and the Contingency Planning Guidance.
The 2002 Circular incorporated by reference the consensus guidance contained in petroleum and
natural gas industry association security publications. Building upon these documents, TSA’s
intention is not to make significant substantive changes to this guidance but to provide explicit
agency recommendations for pipeline industry security practices. Based on its Corporate Security
Reviews and other information, TSA believes that pipeline operators already employ most of these
recommendations in their security plans and programs.
NOTE: Nothing in this document shall supersede Federal regulatory requirements. This
document is guidance. It does not impose mandatory requirements on any person. The
term “should” means that TSA recommends the actions described.
1.2 Scope
These guidelines are applicable to natural gas and hazardous liquid transmission pipelines, natural
gas distribution pipelines, and to liquefied natural gas facility operators. Additionally, they apply
to pipeline systems that transport materials categorized as toxic inhalation hazards (TIH). TIH
1
TSA Pipeline Security Guidelines
Introduction
materials are gases or liquids that are known or presumed on the basis of tests to be so toxic to
humans as to pose a health hazard in the event of a release during transportation. (See the
Hazardous Materials Regulations: 49 CFR parts 171-180.)
Operators of pipeline systems not included in the descriptions above are encouraged to implement
the security measures contained herein to the extent appropriate to their particular system.
2
TSA Pipeline Security Guidelines
Corporate Security Program
Ensure sufficient resources, to include trained staff and equipment, are provided to
effectively execute the corporate security program;
Assign a qualified primary and alternate staff member to manage the corporate security
program;
Provide TSA with the 24/7 contact information of the primary and alternate security
manager, and the telephone number of the company’s security operations or control
center;
Develop a corporate security plan as described in Section 3;
Develop and maintain a cyber/Supervisory Control And Data Acquisition (SCADA)
security plan, or incorporate cyber/SCADA security measures in the corporate security
plan;
Develop and maintain security elements within the corporate incident response and
recovery plan;
Implement appropriate threat level protective measures upon receipt of an applicable
National Terrorism Advisory System (NTAS) alert; and
Notify TSA of all security incidents by phone or e-mail as soon as possible. (Notification
criteria and contact information are provided in Appendix B.)
Figure 1 identifies the major steps that each pipeline operator should take in creating and
implementing a corporate security program and the relevant sections in the guidelines where
specific details are provided.
3
TSA Pipeline Security Guidelines
Corporate Security Program
Critical Facility?
Yes
No
4
TSA Pipeline Security Guidelines
Corporate Security Plan
Identify the primary and alternate security manager or officer responsible for executing
and maintaining the plan;
Document the company’s security-related policies and procedures, to include, but not
limited to, methodologies used and timelines established for conducting criticality
assessments and security vulnerability assessments (SVAs), if applicable;
Reference other company plans such as the business continuity plans, incident response
and recovery plans;
Be reviewed on an annual basis, and updated as required based on findings from
assessments, significant modifications to the system or any of its facilities, substantial
changes to the environment in which it operates, or other significant changes;
Be protected from unauthorized access based on company policy, and;
Be available for review and copying by TSA upon request.
System(s) Description - Identify the pipeline system(s) to which the plan applies.
Security Administration and Management Structure - Identify the person(s) primarily
responsible for the corporate security program, and describe the responsibilities and
duties of personnel assigned to security functions.
Risk Analysis and Assessments - Describe the methodology used to conduct security risk
analysis to include criticality assessments and SVAs.
Physical Security and Access Control Measures - Describe the corporate policies and
procedures employed to reduce security risks throughout the company.
Equipment Maintenance and Testing - Discuss policies and procedures for ensuring
security systems and equipment are maintained and function properly. Information
contained in this section may address performance of equipment preventive maintenance
as well as inspection and testing of security systems.
5
TSA Pipeline Security Guidelines
Corporate Security Plan
6
TSA Pipeline Security Guidelines
Risk Analysis
4 RISK ANALYSIS
4.1 Introduction
The intent of these guidelines is to bring a risk-based approach to the application of the security
measures throughout the pipeline industry. As stated in the National Infrastructure Protection
Plan, DHS assesses risk as a function of threats, vulnerabilities, and consequences. With this in
mind, the most effective security programs employ a risk management process that facilitates
proactive planning and decision making to mitigate risks for pipeline assets. General steps
include:
Recognizing that there are multiple risk assessment methodologies, each operator should
determine the process and methodology most appropriate for implementation of their corporate
security plan and the facilities comprising their pipeline system. The operator’s risk assessment
methodology is subject to review by TSA.
Conduct facility criticality assessments on a periodic basis, not to exceed 18 months, for
all facilities;
Document the methodology used, and retain the criticality assessment until no longer
valid;
Conduct an SVA or the equivalent as outlined in Section 4.3 of this document for
facilities determined to be critical; and
Maintain and secure the company’s list of critical facilities.
The operator’s list of critical facilities is subject to review and evaluation by TSA. Operators and
TSA will work together towards concurrence on the facilities listed.
7
TSA Pipeline Security Guidelines
Risk Analysis
Conduct an SVA or the equivalent on a periodic basis, not to exceed 36 months, and
within 12 months after completion of a significant enhancement or modification to the
facility;
Document findings from each assessment and retain until no longer valid;
Implement appropriate findings from the SVA in a timely fashion but no later than 18
months after SVA completion; and
Document the methodology used and make the documentation available for TSA review
upon request.
8
TSA Pipeline Security Guidelines
Criticality
5 CRITICALITY
5.1 Introduction
The objective in determining which pipeline facilities are critical is to ensure that reasonable and
appropriate security risk reduction measures are implemented to protect the most vital assets
throughout the pipeline industry.
To the maximum extent possible, the approach these guidelines take regarding the determination
of pipeline facility criticality is to acknowledge that no entity is more familiar with and able to
judge the importance of industry assets than the operator of the facility. However it is necessary
for operators to determine the criticality of their facilities using consistent criteria.
Pipeline facilities meeting one or more of the criteria below are considered to be critical:
A facility or combination of facilities that, if damaged or destroyed, would have the potential to:
9
TSA Pipeline Security Guidelines
Criticality
No
No
Non-Critical Facility
10
TSA Pipeline Security Guidelines
Facility Security Measures
Operators should implement both baseline and enhanced security measures at each of their
critical facilities.
Table 1 identifies the baseline and enhanced security measures for operators to implement at
appropriate pipeline facilities.
11
TSA Pipeline Security Guidelines
Facility Security Measures
Close and secure doors, gates, or Monitor and escort visitors at critical
entrances when not in use. facilities.
Facility Lighting
Provide sufficient illumination for human or
technological recognition of intrusion.
Intrusion Detection & Monitoring
Equip critical facilities or critical areas within
a facility with 24/7 monitoring capability to
detect and assess unauthorized access.
12
TSA Pipeline Security Guidelines
Facility Security Measures
13
TSA Pipeline Security Guidelines
Facility Security Measures
Integrate security measures during the Update the facility SVA within 12 months
design, construction, or renovation of a following significant modifications.
facility.
Communication
Develop internal and external notification Ensure primary and alternate
Communication
requirements and procedures for security communication capabilities exist for internal
events. and external reporting of all appropriate
security events and information.
Document and periodically update contact Establish a defined process for receiving,
(who) and communication (how) handling, disseminating, and storing
information for Federal, state, and local security and threat information.
homeland security/law enforcement
agencies. (See Appendix B for TSA
contact information.)
Personnel Training
Personnel Training
14
TSA Pipeline Security Guidelines
Facility Security Measures
Recordkeeping
Develop and document recordkeeping
policies and procedures for security
information. Protection of Sensitive
Security Information (SSI) in accordance
with the provisions of 49 CFR part 1520
should be specifically addressed.
Recordkeeping
15
TSA Pipeline Security Guidelines
Cyber Asset Security Measures
In this section, the term “system” refers to interconnected hardware and software components,
comprising computers, databases, applications, and control and monitoring devices that together
perform a particular function or interrelated set of functions. The term “control systems” refers to
Supervisory Control and Data Acquisition (SCADA) systems, Process Control Systems (PCS),
and Distributed Control Systems (DCS).
To implement an effective cyber security strategy, pipeline operators should take advantage of
industry and government efforts to develop methodologies, industry standards, and best practices
for securing control systems. A list of planning and implementation guidance is provided in
Section 7.4.
Pipeline control system cyber assets that are essential to safety and/or reliability
objectives are classified as critical cyber assets. Baseline and enhanced security
measures should be applied to these assets.
Pipeline control system cyber assets that are not essential to safety and/or reliability
objectives are classified as non-critical cyber assets for the purposes of this guideline.
Baseline security measures should be applied to these assets.
16
TSA Pipeline Security Guidelines
Cyber Asset Security Measures
Review and reassess all cyber security procedures annually. Update as necessary.
Review and reassess cyber asset criticality periodically, not to exceed 18 months.
Develop a cross-functional cyber security team and an operational framework to
ensure coordination, communication, and accountability for information security on
Information Security
Establish and document standards for cyber security controls for use in evaluating
systems and services for acquisition. Encourage vendors to follow software
development standards for trustworthy software throughout the development
lifecycle.
Incorporate security into cyber system design and operation, whether designing a
new system or modifying an existing system. Secure design and operation of the
SCADA control system architecture is critical for the creation of a sustainable and
System Lifecycle
reliable system. Mitigate any security deficiencies found in control system hardware
and software.
Establish and document policies and procedures for assessing and maintaining
system status and configuration information, for tracking changes made to the control
systems network, and for patching and upgrading operating systems and
applications.
Establish and document policies and procedures for the secure disposal of
equipment and associated media.
Plan and prepare for the restoration and recovery of control systems in a timely
Restoration &
17
TSA Pipeline Security Guidelines
Cyber Asset Security Measures
Provide training in information security awareness for all users of control systems
Training
Segregate and protect the control systems network from the business network and
Functional Segregation
the Internet through the use of firewalls and other protections. This applies both to
Access Control and
Use control systems hosts and workstations only for approved control system
activities.
Establish and enforce access control policies for local and remote users, guests, and
customers. Procedures and controls should be in place for approving and enforcing
policy for remote and third-party connections to control networks.
18
TSA Pipeline Security Guidelines
Cyber Asset Security Measures
American Chemistry Council, Guidance for Addressing Cyber Security in the Chemical
Industry
American Gas Association (AGA) Report Number 12, Cryptographic Protection of
SCADA Communications, Part 1: Background, Policies and Test Plan
American National Standards Institute (ANSI)/International Society of Automation (ISA)
– 99.00.01 – 2007, Security for Industrial Automation and Control Systems:
Terminology, Concepts, and Models
ANSI/ISA – 99.02.01 – 2009, Security for Industrial Automation and Control Systems:
Establishing an Industrial Automation and Control System Security Program
American Petroleum Institute (API) Standard 1164 Pipeline SCADA Security
U.S. Department of Commerce, National Institute of Standards and Technology (NIST),
Special Publication 800-82, Guide to Industrial Control Systems (ICS) Security
U.S. Department of Homeland Security, National Cyber Security Division, Catalog of
Control Systems Security: Recommendations for Standards Developers
Because of ongoing technological changes, operators should consult these and other cyber
security references on a frequent basis in developing and reviewing their company’s security
measures.
19
TSA Pipeline Security Guidelines
National Terrorism Advisory System (NTAS) Threat Level Protective Measures
TSA has developed a supplement to this document containing recommended security measures
to reduce vulnerabilities to pipeline systems and facilities during periods of heightened threat and
to establish a consistent security posture within the pipeline industry. This supplement is
unclassified but sensitive and is marked as Sensitive Security Information (SSI). The password-
protected document may be obtained by email request to [email protected].
20
TSA Pipeline Security Guidelines
Appendix A – Recurring Actions
Note: 1. Baseline measures apply to all pipeline operators. Enhanced measures apply to operators’ critical facilities.
2. All baseline and enhanced security measures are detailed in Section 6 of this document.
21
TSA Pipeline Security Guidelines
Appendix B - TSA Notification Criteria
When contacting the TSOC, provide as much of the following information as possible:
22
APPENDIX C – LIST OF ACRONYMS
AGA American Gas Association
ANSI American National Standards Institute
APGA American Public Gas Association
API American Petroleum Institute
CFR Code of Federal Regulations
DCS Distributed Control System
DHS U.S. Department of Homeland Security
DOT U.S. Department of Transportation
FEMA Federal Emergency Management Agency
HSEEP Homeland Security Exercise and Evaluation Program
HSIN Homeland Security Information Network
ICS Industrial Control System
INGAA Interstate Natural Gas Association of America
ISA International Society of Automation
IT Information Technology
NIST National Institute of Standards and Technology
NPRA National Petrochemical and Refiners Association
NTAS National Terrorism Advisory System
PCS Process Control System
SCADA Supervisory Control and Data Acquisition
SSI Sensitive Security Information
SVA Security Vulnerability Assessment
TIH Toxic Inhalation Hazard
TSA Transportation Security Administration
TSNM Transportation Sector Network Management
TSOC Transportation Security Operations Center
WMD Weapons of Mass Destruction
23
APPENDIX D – REFERENCE DOCUMENTS
Operators should consult the current edition of these and other security references on a frequent
basis in developing and reviewing their company’s security program.
American Chemistry Council, Guidance for Addressing Cyber Security in the Chemical Industry
American Gas Association (AGA), Interstate Natural Gas Association of America (INGAA) &
American Public Gas Association (APGA), Security Guidelines: Natural Gas Industry,
Transmission and Distribution
AGA Report Number 12, Cryptographic Protection of SCADA Communications, Part 1:
Background, Policies and Test Plan
American National Standards Institute (ANSI)/International Society of Automation (ISA) – 99.00.01
– 2007, Security for Industrial Automation and Control Systems: Terminology, Concepts, and
Models
ANSI/ISA – 99.02.01 – 2009, Security for Industrial Automation and Control Systems: Establishing
an Industrial Automation and Control System Security Program
American Petroleum Institute (API) & National Petrochemical & Refiners Association (NPRA),
Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries
U.S. Department of Commerce, National Institute of Standards and Technology (NIST), Special
Publication 800-82, Guide to Industrial Control Systems (ICS) Security
U.S. Department of Homeland Security, National Cyber Security Division, Catalog of Control
Systems Security: Recommendations for Standards Developers
24
This page intentionally left blank.
25