DEPARTMENT OF HOMELAND SECURITY | |||||
Transportation Security Administration | |||||
Pipeline Corporate Security Review (CSR) | CSR SH ONLY No SD FY2022 V.1 (December 2022) | ||||
Operator Name: | Assessment Date: | ||||
0 | 10/18/2021 | ||||
Question Type | Question # | CSR Question | N/A | Answer (Yes/No/X) | Comments |
SAI | 1.0000 | Security Plans | SAI | ||
1.0100 | Is your corporate security manager solely dedicated to a corporate security function or tasked with other responsibilities such as environmental, health, and safety? | ||||
1.0200 | Does your corporate security manager or equivalent position have a direct reporting relationship to the senior leadership in the company? | ||||
1.0300 | Does the company have a cross-departmental security committee? | ||||
1.0400 | Which of the following departments are represented on the security committee? | ZZZ | |||
1.0401 | Corporate Management | ||||
1.0402 | Human Resources | ||||
1.0403 | Security | ||||
1.0404 | Legal | ||||
1.0405 | Engineering | ||||
1.0406 | Operations and/or Maintenance | ||||
1.0407 | Information Technology | ||||
1.0408 | Other (if checked, elaborate) | ||||
R | 1.0500 | Have you established a corporate security program to address and document policies and procedures for managing security-related threats, incidents, and responses? | |||
R | 1.0600 | Does your company have a written corporate security plan? | |||
R | 1.0700 | Which of the following company plans are directly included or incorporated by reference in the corporate security plan? | |||
1.0701 | Business Continuity Plan | ||||
1.0702 | Incident Response Plan | ||||
1.0703 | Incident Recovery Plan | ||||
1.0704 | Enterprise Cybersecurity Plans | ||||
1.0705 | OT Cybersecurity Plans | ||||
1.0706 | Other (if checked, elaborate) | ||||
R | 1.0800 | Is the corporate security plan reviewed on an annual basis and updated as required? | |||
R | 1.0900 | Does the corporate security plan identify the primary and alternate security manager or officer responsible for executing and maintaining the plan? | |||
1.1000 | Is the corporate security plan readily available to those persons responsible for security actions? | ||||
R | 1.1100 | Do you incorporate the following elements into your corporate security plan or associated documents? | |||
1.1101 | System Description | ||||
1.1102 | Security Administration and Management Structure | ||||
1.1103 | Risk Analysis and Assessments | ||||
1.1104 | Physical Security and Access Control Measures | ||||
1.1105 | Equipment Maintenance and Testing | ||||
1.1106 | Personnel Screening | ||||
1.1107 | Communications | ||||
1.1108 | Personnel Training | ||||
1.1109 | Security Incident Procedures | ||||
1.1110 | National Terrorism Advisory System (NTAS) Response Procedures | ||||
1.1111 | Security Plan Reviews | ||||
1.1112 | Recordkeeping | ||||
1.1113 | Cyber/SCADA System Security Measures | ||||
1.1114 | Essential Security Contacts | ||||
1.1115 | Security Testing and Audits | ||||
1.1116 | Outreach (neighbors, law enforcement, media, public) | ||||
1.1117 | Other (if checked, elaborate) | ||||
R | 1.1200 | Do you have sufficient resources, including trained staff and equipment, to effectively execute the corporate security program? | |||
R | 1.1300 | Are appropriate financial resources allocated in the corporate budgeting and purchasing process to correct identified security deficiencies? | |||
1.1400 | How much operations and/or maintenance money did your company spend on security in the previous fiscal year? | ZZZ | |||
1.1401 | < $99,999 | ||||
1.1402 | $100,000 - $249,999 | ||||
1.1403 | $250,000 - $499,999 | ||||
1.1404 | $500,000 - $999,999 | ||||
1.1405 | $1,000,000 - $4,999,999 | ||||
1.1406 | >$5,000,000 | ||||
1.1500 | How much capital money did your company spend on security in the previous fiscal year? | ZZZ | |||
1.1501 | < $99,999 | ||||
1.1502 | $100,000 - $249,999 | ||||
1.1503 | $250,000 - $499,999 | ||||
1.1504 | $500,000 - $999,999 | ||||
1.1505 | $1,000,000 - $4,999,999 | ||||
1.1506 | >$5,000,000 | ||||
1.1600 | Has your company established security metrics? | ||||
R | 1.1700 | Are the corporate security plan, the enterprise cyber security plan, and the OT cyber security plan, as applicable, protected from unauthorized access? | |||
R | 1.1800 | Are the corporate security plan, the enterprise cyber security plan, and the OT cyber security plan, as applicable, available for TSA review upon request? | |||
SAI | 2.0000 | Security Plans - Cyber | SAI | ||
SAI | 3.0000 | Communication | SAI | ||
R | 3.0100 | Does your company have internal and external notification requirements and procedures for security events? | |||
R | 3.0200 | Does your company document and periodically update contact and communication information for Federal, state, and local homeland security/law enforcement agencies? | |||
R | 3.0300 | Does your company have a defined process for receiving, handling, disseminating, and storing security and threat information? | |||
R | 3.0400 | Do all critical facilities have primary and alternate communication capabilities for internal and external reporting of appropriate security events and information? | |||
3.0500 | Which of the following external agencies/organizations would the company notify in the event of a security incident, a security threat, or suspicious activity? | ZZZ | |||
3.0501 | National Response Center (NRC) | ||||
3.0502 | Local emergency responders/911 | ||||
3.0503 | Transportation Security Administration / Transportation Security Operations Center (TSA/TSOC) | ||||
3.0504 | Tribal emergency responders | ||||
3.0505 | State emergency responders | ||||
3.0506 | Other federal agencies | ||||
3.0507 | Federal Bureau of Investigation (FBI) | ||||
3.0508 | Department of Homeland Security (DHS) | ||||
3.0509 | Neighboring companys | ||||
3.0510 | Other (if checked, elaborate) | ||||
SAI | 4.0000 | Security Incident Procedures | SAI | ||
R | 4.0100 | Are security elements developed and maintained within the corporate incident response and recovery plan? | |||
4.0200 | Does your company have a policy and/or procedure for handling security threat or incident information? | ||||
4.0300 | From whom does your company receive current security threat information? | ZZZ | |||
4.0301 | Transportation Security Operations Center (TSOC) | ||||
4.0302 | DHS Protective Security Advisor (DHS PSA) | ||||
4.0303 | Joint Terrorism Task Force (JTTF) | ||||
4.0304 | Federal Bureau of Investigation (FBI) | ||||
4.0305 | Homeland Security Information Network (HSIN) | ||||
4.0306 | State fusion center(s) | ||||
4.0307 | Local law enforcement | ||||
4.0308 | Coast Guard | ||||
4.0309 | Corporate affiliations | ||||
4.0310 | Department of Energy | ||||
4.0311 | Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) | ||||
4.0312 | Other (if checked, elaborate) | ||||
R | 4.0400 | Does your company notify TSA via the Transportation Security Operations Center (TSOC) by phone or email as soon as possible if any of the types of security incidents listed in Appendix B – TSA Notification Criteria, 2018 TSA Pipeline Security Guidelines, occurs or if there is any other reason to believe that a terrorist incident may be planned or may have occurred? | |||
R | 4.0500 | Has your company implemented procedures for responding to security incidents or emergencies and to pertinent National Terrorism Advisory System (NTAS) Bulletins or Alerts, including appropriate reporting requirements? | |||
R | 4.0600 | Has your company implemented site-specific security measures for each critical facility to be taken in response to pertinent NTAS Bulletins or Alerts or other threat information? | |||
R | 4.0700 | Are the site-specific security measures for each critical facility reviewed and updated as necessary at least every 18 months? | |||
R | 4.0800 | Does your company have adequate staffing to implement security measures in response to security threat information? | |||
4.0900 | Does your company have contracts in place with private security providers to augment existing security staffing during times of heightened alert? | ||||
R | 4.1000 | Are bomb threat checklists posted by telephones at all staffed facilities? | |||
R | 4.1100 | At an Elevated Threat Level, would your company enact the following physical access controls at your critical facilities? | |||
4.1101 | Limit facility access to essential personnel. | ||||
4.1102 | Limit facility access to essential visitors, personnel, and vehicles. | ||||
4.1103 | Increase surveillance of critical areas and facilities. | ||||
4.1104 | Restrict deliveries to those essential to continued operations. | ||||
4.1105 | Conduct random inspections of vehicles and of bags, backpacks, purses, etc. |
||||
4.1106 | Delay or reschedule non-vital maintenance and capital project work that could affect facility security, as appropriate. |
||||
4.1107 | Increase lighting in facility buffer zones, as appropriate. | ||||
4.1108 | Verify the operating condition of security systems such as intrusion detection, cameras, and lighting initially and at least weekly thereafter until termination of the advisory. |
||||
4.1109 | Request that local law enforcement agencies increase the frequency of patrols of the facility. |
||||
4.1110 | Other (if checked, elaborate) | ||||
R | 4.1200 | At an Elevated Threat Level, would your company enact the following measures on your cyber/SCADA system(s)? | |||
4.1201 | Increase monitoring of intrusion detection systems. | ||||
4.1202 | Remind personnel of the reporting requirements for any unusual enterprise or control systems network activity. |
||||
4.1203 | Remind personnel to be vigilant regarding suspicious electronic mail. | ||||
4.1204 | Other (if checked, elaborate) | ||||
R | 4.1300 | At an Elevated Threat Level, would your company enact the following communications measures at your critical facilities? | |||
4.1301 | Inform all employees and on-site contractors of the change to the Elevated Threat Level. |
||||
4.1302 | Conduct security awareness briefings for all employees and on-site contractors. |
||||
4.1303 | Brief employees and on-site contractors on the characteristics of suspicious packages or mail. |
||||
4.1304 | Review response procedures for suspicious packages or mail. | ||||
4.1305 | Inform local law enforcement that the facility is at an Elevated Threat Level and advise them of the security measures being employed. |
||||
4.1306 | Verify the proper operation of intelligence and emergency communications networks/channels, including those with TSA and first responder agencies. |
||||
4.1307 | Monitor these networks/channels as appropriate. | ||||
4.1308 | Other (if checked, elaborate) | ||||
R | 4.1400 | At an Imminent Threat Level, would your company enact the following physical access controls at your critical facilities? | |||
4.1401 | Cancel or delay non-vital contractor work and services. | ||||
4.1402 | Allow deliveries by appointment only. | ||||
4.1403 | Inspect all bags, backpacks, purses, etc. prior to entering the facility. | ||||
4.1404 | Inspect all vehicles prior to gaining access to the facility. | ||||
4.1405 | Inspect all deliveries, including packages and cargo. | ||||
4.1406 | Secure all non-essential entrances and facility access points. | ||||
4.1407 | Staff or monitor active facility entrances and access points 24/7. | ||||
4.1408 | Erect barriers and/or obstacles to control vehicular traffic flow. | ||||
4.1409 | Where possible, restrict vehicle parking to 150 feet from all critical areas and assets. |
||||
4.1410 | Coordinate with local authorities regarding closing nearby public roads and facilities, if appropriate. |
||||
4.1411 | Other (if checked, elaborate) | ||||
R | 4.1500 | At an Imminent Threat Level, would your company enact the following measures on your cyber/SCADA system(s)? | |||
4.1501 | Limit network communications links to essential sites/users. | ||||
4.1502 | Review remote access for individuals and revoke any credentials that are not current and necessary. |
||||
4.1503 | Other (if checked, elaborate) | ||||
R | 4.1600 | At an Imminent Threat Level, would your company enact the following communications measures? | |||
4.1601 | Inform all employees and contractors of the increase to the Imminent Threat Level. |
||||
4.1602 | Conduct daily security and awareness briefings for each shift. | ||||
4.1603 | Participate in situation update briefings with TSA, other government agencies including local law enforcement, and pipeline industry associations. |
||||
4.1604 | Other (if checked, elaborate) | ||||
4.1700 | Does your company use an incident management system, such as the National Incident Management System (NIMS), for security-related events? | ||||
4.1800 | Does your company have a process for assuring the viability of the OT cyber recovery plan, including a backup control center? | ||||
SAI | 5.0000 | Security Training | SAI | ||
R | 5.0100 | Does your company provide security awareness briefings, to include security incident recognition and reporting procedures, for all personnel with unescorted access upon hiring and every three years thereafter? | |||
R | 5.0200 | Does your company document security training and maintain records in accordance with company record retention policy? | |||
R | 5.0300 | Does your company provide security training, to include incident response training, to personnel assigned security duties upon hiring and annually thereafter? | |||
5.0400 | Have your company’s security personnel availed themselves of any of the following training opportunities or affiliations? | ||||
5.0401 | Security forums or conferences | ||||
5.0402 | Pipeline forums or conferences | ||||
5.0403 | Advanced security training | ||||
5.0404 | Security Committee(s) participation | ||||
5.0405 | Government Sector Committee(s) | ||||
5.0406 | Industry security collaboration | ||||
5.0407 | Other (if checked, elaborate) | ||||
5.0500 | Does your company use any of the TSA security training material? | ||||
SAI | 6.0000 | Outreach | SAI | ||
R | 6.0100 | Does each critical facility conduct outreach to nearby law enforcement agencies to ensure awareness of the facility’s functions and significance? | |||
R | 6.0200 | Does each critical facility conduct outreach to neighboring businesses to coordinate security efforts and to neighboring residences to provide facility security awareness? | |||
R | 6.0300 | For critical pipeline cyber assets, does your company ensure that threat and vulnerability information received from information-sharing forums and sources are made available to those responsible for assessing and determining the appropriate course of action? | |||
R | 6.0400 | Does your company report significant cyber incidents to the following? | |||
6.0401 | Senior management | ||||
6.0402 | Appropriate federal entities | ||||
6.0403 | Appropriate state, local, and tribal entities | ||||
6.0404 | Applicable ISAC(s) | ||||
SAI | 7.0000 | Risk Analysis and Assessments | SAI | ||
R | 7.0100 | Does your company conduct criticality assessments for all facilities at least every 18 months? | |||
R | 7.0200 | Is the methodology used to determine critical facilities documented in the corporate security plan? | |||
R | 7.0300 | Did you utilize the criteria from the 2018 TSA Pipeline Security Guidelines to determine your list of critical facilities? | |||
R | 7.0400 | During the criticality assessment of your facilities, were all of the following criteria considered? | |||
7.0401 | Critical to national defense | ||||
7.0402 | Key infrastructure | ||||
7.0403 | Mass casualty or significant health effects | ||||
7.0404 | Disruption to state or local government public or emergency services | ||||
7.0405 | National landmarks or monuments | ||||
7.0406 | Major rivers, lakes, or waterways | ||||
7.0407 | Deliverability to significant number of customers | ||||
7.0408 | Significantly disrupt pipeline system operations for an extended period of time, i.e., business critical facilities |
||||
7.0409 | Other (if checked, elaborate) | ||||
R | 7.0500 | Does your company conduct a security vulnerability assessment (SVA) or equivalent of each critical facility at least every 36 months? | |||
R | 7.0600 | Does your company conduct an SVA or equivalent within 12 months after achieving operational status for newly identified or constructed facilities? | |||
R | 7.0700 | Does your company conduct an SVA or equivalent of any critical facility within 12 months of completing a significant enhancement or modification to the facility? | |||
R | 7.0800 | Upon completion of an SVA or equivalent, are corrective actions implemented within 24 months? | |||
R | 7.0900 | Are assessment results documented and retained until no longer valid? | |||
7.1000 | Does your company conduct SVAs or equivalent on your non-critical facilities? | ||||
R | 7.1100 | When conducting an SVA or equivalent, do you use one or more of the following methodologies? | |||
7.1101 | Criticality, Accessibility, Recuperability, Vulnerability, Effect, Recognizability (CARVER) |
||||
7.1102 | American Petroleum Institute/National Petrochemical and Refiners Association (API/NPRA) |
||||
7.1103 | Mission, Symbolism, History, Accessibility, Recognizability, Population, Proximity (MSHARPP) |
||||
7.1104 | Third-party or corporate proprietary | ||||
7.1105 | Other (if checked, elaborate) | ||||
R | 7.1200 | Does your company integrate security risk mitigation measures during the design, construction, or renovation of a facility? | |||
SAI | 8.0000 | Risk Analysis and Assessments - Cyber | SAI | ||
SAI | 9.0000 | Drills & Exercises | SAI | ||
R | 9.0100 | Does your company conduct periodic security drills and exercises for all facilities, including in conjunction with other required drills or exercises? | |||
R | 9.0200 | Does your company require each critical facility to conduct or participate in an annual security drill or exercise, including common drills or exercises in which multiple facilities may participate? | |||
R | 9.0300 | Does your company require each critical facility to prepare a written post-event report assessing security drills and exercises and documenting corrective actions? | |||
9.0400 | Over the past three years, with whom has your company participated in security drills or exercises? | ZZZ | |||
9.0401 | Local emergency responders | ||||
9.0402 | Tribal emergency responders | ||||
9.0403 | State emergency responders | ||||
9.0404 | Federal emergency responders | ||||
9.0405 | Federal Bureau of Investigation (FBI) | ||||
9.0406 | Department of Homeland Security (DHS) | ||||
9.0407 | Transportation Security Administration (TSA) | ||||
9.0408 | Neighboring companys | ||||
9.0409 | Other (if checked, elaborate) | ||||
R | 9.0500 | Does the corporate security plan include policies and procedures for auditing and testing the effectiveness of the company’s security procedures, to include documentation of results? | |||
SAI | 10.0000 | Cyber Security | SAI | ||
10.0500 | Are methods in place to verify the accuracy of the diagrams and/or other documentation related to your OT system? | ||||
10.2400 | Does the OT system deny network traffic by default and allow only authorized network traffic? | ||||
10.2600 | Do OT system controls protect the integrity of electronically-communicated information? (e.g., preventing man in the middle)? | ||||
10.2700 | Does the OT system prevent traffic from being routed to the internet? | ||||
SAI | 11.0000 | Physical Security & Access Control | SAI | ||
11.0100 | Which of the following security measures does your corporate security plan require at critical facilities? | ZZZ | |||
11.0101 | Fences | ||||
11.0102 | Gates equivalent to attached barriers | ||||
11.0103 | Signage such as No Trespassing, Do Not Enter, Authorized Personnel Only, CCTV in Use, etc. |
||||
11.0104 | Closed circuit television (CCTV) | ||||
11.0105 | Intrusion sensors | ||||
11.0106 | Alarms | ||||
11.0107 | Clear zones around fence lines | ||||
11.0108 | Locks | ||||
11.0109 | Barriers such as bollards, planters, or Jersey barriers | ||||
11.0110 | Tamper devices | ||||
11.0111 | Patrols | ||||
11.0112 | Lighting | ||||
11.0113 | Crime Prevention Through Environmental Design (CPTED) | ||||
11.0114 | Unarmed Guards | ||||
11.0115 | Armed Guards | ||||
11.0116 | Video-analytic Systems | ||||
11.0117 | Video Recording | ||||
11.0118 | Intrusion-detection Systems | ||||
11.0119 | Other (if checked, elaborate) | ||||
11.0200 | How does your company physically control access to controlled-access areas? | ZZZ | |||
11.0201 | Lock and Key | ||||
11.0202 | Biometric reader | ||||
11.0203 | Digital keycard | ||||
11.0204 | PIN Code | ||||
11.0205 | Proximity Card | ||||
11.0206 | Radio Remote Control | ||||
11.0207 | Other (if checked, elaborate) | ||||
11.0300 | Which of the following security measures does your corporate security plan require at all facilities? | ZZZ | |||
11.0301 | Fences | ||||
11.0302 | Gates equivalent to attached barriers | ||||
11.0303 | Signage such as No Trespassing, Do Not Enter, Authorized Personnel Only, CCTV in Use, etc. |
||||
11.0304 | Closed circuit television (CCTV) | ||||
11.0305 | Intrusion sensors | ||||
11.0306 | Alarms | ||||
11.0307 | Clear zones around fence lines | ||||
11.0308 | Locks | ||||
11.0309 | Barriers such as bollards, planters, or Jersey barriers | ||||
11.0310 | Tamper devices | ||||
11.0311 | Patrols | ||||
11.0312 | Lighting | ||||
11.0313 | Crime Prevention Through Environmental Design (CPTED) | ||||
11.0314 | Unarmed Guards | ||||
11.0315 | Armed Guards | ||||
11.0316 | Video-analytic Systems | ||||
11.0317 | Video Recording | ||||
11.0318 | Intrusion-detection Systems | ||||
11.0319 | Other (if checked, elaborate) | ||||
R | 11.0400 | Does the corporate security plan require the following security measures at all facilities? | |||
11.0401 | Employ measures to impede unauthorized persons from gaining access to a facility and restricted areas within a facility. |
||||
11.0402 | Close and secure perimeter gates or entrances when not in use. | ||||
11.0403 | Post “No Trespassing” or “Authorized Personnel Only” signs at intervals that are visible from any point of potential entry. |
||||
R | 11.0500 | Does the corporate security plan require the following security measures at all facilities? | |||
11.0501 | Employ measures to impede unauthorized access to facilities. | ||||
11.0502 | Maintain fences, if used, without gaps around gates or underneath the fence line. |
||||
11.0503 | Ensure that there is a clear zone for several feet on either side of the fence, free of obstructions, vegetation, or objects that could be used for concealment or to scale the fence. |
||||
R | 11.0600 | Does the corporate security plan require that each critical facility implement procedures (e.g., manual or electronic sign in/out) for controlling access to the facility and restricted buildings or areas within the facility? | |||
R | 11.0700 | Does the corporate security plan require that each critical facility create a security perimeter that impedes unauthorized vehicles from entering the facility perimeter or critical areas by installing and maintaining barriers (e.g., fences, bollards, jersey barriers)? | |||
R | 11.0800 | Does the corporate security plan require that each critical facility ensure that visitors are monitored and escorted? | |||
R | 11.0900 | Does the corporate security plan require that each critical facility install and maintain gates of an equivalent quality to the barrier to which they are attached? | |||
R | 11.1000 | Does the corporate security plan require that each critical facility provide sufficient illumination for human and technological recognition of intrusion into the facility perimeter or critical areas? | |||
R | 11.1100 | Does the corporate security plan require that each critical facility or critical areas within a facility have security measures to monitor, detect, and assess 24 hours per day, 7 days per week? | |||
R | 11.1200 | Does your company have key control procedures for key issuance, tracking, collection, loss, and unauthorized duplication at each critical facility? | |||
R | 11.1300 | Does your company conduct a key inventory at least every 24 months at each critical facility? | |||
R | 11.1400 | Does your company use restricted, patented, or electronic keys at each critical facility to prevent unauthorized duplication? | |||
SAI | 12.0000 | Personnel Security | SAI | ||
R | 12.0100 | Has your company established policies and procedures for applicant pre-employment screening and behavioral criteria for disqualification of applicants and employees? | |||
12.0200 | Is there at least one individual within your company who holds a current federal security clearance? | ||||
12.0300 | What is the highest level of clearance that is held within your company? | ZZZ | |||
12.0301 | Secret | ||||
12.0302 | Top Secret | ||||
12.0303 | Top Secret SCI | ||||
12.0400 | Does your company conduct pre-employment background investigations on all potential employees? | ||||
R | 12.0500 | Does your company conduct pre-employment background investigations of applicants for positions that involve any of the following? | |||
12.0501 | Authorized regular unescorted access to control systems or sensitive areas. |
||||
12.0502 | Authorized access to sensitive information. | ||||
12.0503 | Assigned security roles | ||||
12.0504 | Assigned to work at or granted access rights to critical facilities. |
||||
R | 12.0700 | Do pre-employment background investigations of applicants for positions described in Question 12.0500 above include all of the following? | |||
12.0701 | Verification and validation of identity | ||||
12.0702 | Criminal history check | ||||
12.0703 | Verification and validation of legal authorization to work |
||||
R | 12.0800 | Has your company developed identification and badging policies and procedures for personnel who have access to secure areas or sensitive information that address the following? | |||
12.0801 | Lost or stolen identification cards or badges | ||||
12.0802 | Temporary badges | ||||
12.0803 | Personnel termination | ||||
12.0900 | Does your company use the federally-established list of disqualifying crimes (listed in 49 CFR 1572.103) to assess the suitability of personnel for positions described in Question 12.0500 above? | ||||
R | 12.1000 | Does your company conduct recurring background investigations at least every ten years for employees occupying security positions or who have access to sensitive information or areas? | |||
R | 12.1100 | Does the corporate security plan require that each critical facility ensure that company or vendor identification is available for examination by being visibly displayed or carried by personnel while on-site? | |||
R | 12.1200 | Does your company verify that contractors have background investigation policies and procedures at least as rigorous as the company’s? | |||
R | 12.1300 | Does the corporate security plan require that each critical facility ensure personnel identification cards or badges are secure from tampering and contain the individual’s photograph and name? | |||
12.1400 | Does your company have a policy and/or procedure in place addressing security issues related to employee termination? | ||||
12.1500 | Are the following actions taken during termination activities? | ||||
12.1501 | Retrieve badge or identification card. | ||||
12.1502 | Disable passwords. | ||||
12.1503 | Retrieve keys. | ||||
12.1504 | Retrieve operational and/or security manuals. | ||||
12.1505 | Block computer-system access. | ||||
12.1506 | Discharged employee signs nondisclosure agreement. | ||||
12.1507 | Other (if checked, elaborate) | ||||
SAI | 13.0000 | Equipment Maintenance and Testing | SAI | ||
R | 13.0100 | Has your company implemented a maintenance program to ensure that security systems are in good working order? | |||
R | 13.0200 | Does your company identify and respond to security equipment malfunctions or failures in a timely manner? | |||
R | 13.0300 | Do all critical facilities, through routine use or quarterly examination, verify the proper operation and/or condition of all security equipment? | |||
R | 13.0400 | Do all critical facilities provide an equivalent level of protective security measures to mitigate risk during power outages, security equipment failure, or extended repair of security systems? | |||
13.0500 | Does your corporate security maintenance program include all of the following? | ||||
13.0501 | Corrective maintenance | ||||
13.0502 | Preventive maintenance | ||||
13.0503 | Testing | ||||
13.0504 | Inspection | ||||
SAI | 14.0000 | Recordkeeping | SAI | ||
R | 14.0100 | Does the corporate security plan address recordkeeping policies and procedures for security information, including the protection of Sensitive Security Information (SSI) in accordance with the provisions of 49 CFR Parts 15 and 1520? | |||
R | 14.0200 | Do all facilities retain the following documents, as appropriate, until superseded or replaced? | |||
14.0201 | Corporate security plan | ||||
14.0202 | Criticality assessment(s) | ||||
14.0203 | Training records | ||||
14.0204 | Security drill or exercise reports | ||||
14.0205 | Incident response plan(s) | ||||
14.0206 | Security testing and audits | ||||
R | 14.0300 | In addition to the documents listed in Question 14.0200 above, does each critical facility retain the following documents until superseded or replaced? | |||
14.0301 | SVA(s) | ||||
14.0302 | Site-specific security measures | ||||
14.0400 | Does your company have a document-marking policy or procedure? | ||||
R | 14.0500 | Does the company make the security information records described in Questions 14.0200 and 14.0300 above available to TSA upon request? | |||
14.0600 | Has your company taken any of the following steps to apply operations security (OPSEC) in daily activities? | ||||
14.0601 | Mark documents. | ||||
14.0602 | Hold conversations in appropriate locations. | ||||
14.0603 | Report undue interest in pipeline security or operations. | ||||
14.0604 | Secure sensitive documents outside of office areas such as in vehicles or in transport. |
||||
14.0605 | Dispose of documents properly. | ||||
14.0606 | Dispose of computer equipment and associated media securely. | ||||
14.0607 | Create strong passwords. | ||||
14.0608 | Change passwords periodically. | ||||
14.0609 | Vary patterns of behavior | ||||
14.0610 | Remove badges in public | ||||
14.0611 | Other (if checked, elaborate) | ||||
R | 14.0700 | Does your company maintain and secure criticality assessments, critical facility lists, and security vulnerability assessments or equivalent? |
DEPARTMENT OF HOMELAND SECURITY | |||||
Transportation Security Administration | |||||
Pipeline Corporate Security Review (CSR) IT Questions | CSR SH ONLY No SD FY2022 V.1 (December 2022) | ||||
Operator Name: | Assessment Date: | ||||
0 | 10/18/2021 | ||||
Question Type | Question # | CSR Question | N/A | Answer (Yes/No/X) | |
SAI | 2.0000 | Security Plans - Cyber | SAI | ||
SAI | 4.0000 | Security Incident Procedures | SAI | ||
R | 4.1200 | At an Elevated Threat Level, would your company enact the following measures on your cyber/SCADA system(s)? | |||
4.1201 | Increase monitoring of intrusion detection systems. | ||||
4.1202 | Remind personnel of the reporting requirements for any unusual enterprise or control systems network activity. |
||||
4.1203 | Remind personnel to be vigilant regarding suspicious electronic mail. | ||||
4.1204 | Other (if checked, elaborate) | ||||
R | 4.1500 | At an Imminent Threat Level, would your company enact the following measures on your cyber/SCADA system(s)? | |||
4.1501 | Limit network communications links to essential sites/users. | ||||
4.1502 | Review remote access for individuals and revoke any credentials that are not current and necessary. |
||||
4.1503 | Other (if checked, elaborate) | ||||
4.1800 | Does your company have a process for assuring the viability of the OT cyber recovery plan, including a backup control center? | ||||
SAI | 5.0000 | Security Training | SAI | ||
SAI | 6.0000 | Outreach | SAI | ||
R | 6.0300 | For critical pipeline cyber assets, does your company ensure that threat and vulnerability information received from information-sharing forums and sources are made available to those responsible for assessing and determining the appropriate course of action? | |||
R | 6.0400 | Does your company report significant cyber incidents to the following? | |||
6.0401 | Senior management | ||||
6.0402 | Appropriate federal entities | ||||
6.0403 | Appropriate state, local, and tribal entities | ||||
6.0404 | Applicable ISAC(s) | ||||
SAI | 8.0000 | Risk Analysis and Assessments - Cyber | SAI | ||
SAI | 9.0000 | Drills & Exercises | SAI | ||
SAI | 10.0000 | Cyber Security | SAI | ||
10.0500 | Are methods in place to verify the accuracy of the diagrams and/or other documentation related to your OT system? | ||||
10.2400 | Does the OT system deny network traffic by default and allow only authorized network traffic? | ||||
10.2600 | Do OT system controls protect the integrity of electronically-communicated information? (e.g., preventing man in the middle)? | ||||
10.2700 | Does the OT system prevent traffic from being routed to the internet? | ||||
SAI | 12.0000 | Personnel Security | SAI |
0 | |||
Recommendations | |||
Recommendation # | CSR Question # | SAI Category | Recommendation Narrative |
1 | |||
2 | |||
3 | |||
4 | |||
5 | |||
6 | |||
7 | |||
8 | |||
9 | |||
10 | |||
11 | |||
12 | |||
13 | |||
14 | |||
15 | |||
16 | |||
17 | |||
18 | |||
19 | |||
20 | |||
21 | |||
22 | |||
23 | |||
24 | |||
25 | |||
26 | |||
27 | |||
28 | |||
29 | |||
30 | |||
31 | |||
32 | |||
33 | |||
34 | |||
35 | |||
36 | |||
37 | |||
38 | |||
39 | |||
40 | |||
41 | |||
42 | |||
43 | |||
44 | |||
45 | |||
46 | |||
47 | |||
48 | |||
49 | |||
50 | |||
51 | |||
52 | |||
53 | |||
54 | |||
55 | |||
56 | |||
57 | |||
58 | |||
59 | |||
60 | |||
61 | |||
62 | |||
63 | |||
64 | |||
65 | |||
66 | |||
67 | |||
68 | |||
69 | |||
70 | |||
71 | |||
72 | |||
73 | |||
74 | |||
75 | |||
76 | |||
77 | |||
78 | |||
79 | |||
80 | |||
81 | |||
82 | |||
83 | |||
84 | |||
85 | |||
86 | |||
87 | |||
88 | |||
89 | |||
90 | |||
91 | |||
92 | |||
93 | |||
94 | |||
95 | |||
96 | |||
97 | |||
98 | |||
99 | |||
100 |
CSR Recommendations Follow-up | ||||||
Pipeline Operator | 0 | CSR Date: | 10/18/2021 | |||
Follow-up Request Date | Stakeholder Response Date | 18-24 Month Follow-up Window | ||||
From: | To: | |||||
4/18/2023 | 10/18/2023 | |||||
Recommendation # | CSR Question # | Recommendation | Stakeholder Response Code | Stakeholder Response Narrative | ||
1 | ||||||
2 | Response Codes | |||||
3 | ||||||
4 | 1 - Recommendation has been completed/implemented | |||||
5 | 2 - Recommendation will be completed/implemented | |||||
6 | 3 - Recommendation being evaluated | |||||
7 | 4 - Recommendation will not be completed/implemented | |||||
8 | 5 - Recommendation no longer applicable | |||||
9 | ||||||
10 | ||||||
11 | ||||||
12 | ||||||
13 | ||||||
14 | ||||||
15 | ||||||
16 | ||||||
17 | ||||||
18 | ||||||
19 | ||||||
20 | ||||||
21 | ||||||
22 | ||||||
23 | ||||||
24 | ||||||
25 | ||||||
26 | ||||||
27 | ||||||
28 | ||||||
29 | ||||||
30 | ||||||
31 | ||||||
32 | ||||||
33 | ||||||
34 | ||||||
35 | ||||||
36 | ||||||
37 | ||||||
38 | ||||||
39 | ||||||
40 | ||||||
41 | ||||||
42 | ||||||
43 | ||||||
44 | ||||||
45 | ||||||
46 | ||||||
47 | ||||||
48 | ||||||
49 | ||||||
50 | ||||||
51 | ||||||
52 | ||||||
53 | ||||||
54 | ||||||
55 | ||||||
56 | ||||||
57 | ||||||
58 | ||||||
59 | ||||||
60 | ||||||
61 | ||||||
62 | ||||||
63 | ||||||
64 | ||||||
65 | ||||||
66 | ||||||
67 | ||||||
68 | ||||||
69 | ||||||
70 | ||||||
71 | ||||||
72 | ||||||
73 | ||||||
74 | ||||||
75 | ||||||
76 | ||||||
77 | ||||||
78 | ||||||
79 | ||||||
80 | ||||||
81 | ||||||
82 | ||||||
83 | ||||||
84 | ||||||
85 | ||||||
86 | ||||||
87 | ||||||
88 | ||||||
89 | ||||||
90 | ||||||
91 | ||||||
92 | ||||||
93 | ||||||
94 | ||||||
95 | ||||||
96 | ||||||
97 | ||||||
98 | ||||||
99 | ||||||
100 |
0 | |||||||
Critical Facility List | |||||||
# | Critical Facility Name | Address | City | State | Latitude | Longitude | Description / Notes |
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 | |||||||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 |
0 | |||||
Meeting Attendees | |||||
Date: | 10/18/2021 | ||||
TSA Pipeline Security Attendees | |||||
Name | Title | Division | Name | Title | Division |
Pipeline Corporation Attendees | |||||
Name | Title | Division | Name | Title | Division |
Other Attendees | |||||
Name | Title | Organization / Company | Name | Title | Organization / Company |
CSR Form Filled Out By | |||||
Name | Title | Division | Name | Title | Division |
SAI # | SAI Description |
1 | Security Plans |
2 | Security Plans - Cyber |
3 | Communication |
4 | Security Incident Procedures |
5 | Security Training |
6 | Outreach |
7 | Risk Analysis and Assessments |
8 | Risk Analysis and Assessments - Cyber |
9 | Drills & Exercises |
10 | Cyber Security |
11 | Physical Security & Access Control |
12 | Personnel Security |
13 | Equipment Maintenance and Testing |
14 | Recordkeeping |
Paperwork Reduction Act Burden Statement: This is a voluntary collection of information. TSA estimates that the total average burden per response associated with this collection is approximately 8 hours and an additional 1-3 hours for follow-up on TSA recommendations. An agency may not conduct or sponsor, and a person is not required to respond to a collection of information unless it displays a valid OMB control number. The control number assigned to this collection is OMB 1652-0056, which expires on 02/29/2020. Send comments regarding this burden estimate or collection to: TSA-11, Attention: PRA 1652-0056 Pipeline CSR, 601 South 12th Street, Arlington, VA 20598. |
File Type | application/vnd.openxmlformats-officedocument.spreadsheetml.sheet |
File Modified | 0000-00-00 |
File Created | 0000-00-00 |