Pipeline CSR STAKEHOLDER ONLY No SD Workbook FY2022 V1 122922.xlsx

Pipeline Corporate Security Reviews and Security Directives

Pipeline CSR STAKEHOLDER ONLY No SD Workbook FY2022 V1 122922.xlsx

OMB: 1652-0056

Document [xlsx]
Download: xlsx | pdf

Overview

SSI Cover Sheet
Profile
Checklist
Checklist - IT
7 Recommendations
7A Recommendations Follow-up
10 Critical Facility List
12 Meeting Attendees
SAI List
PRA Burden Statement


Sheet 1: SSI Cover Sheet



Sheet 2: Profile

DEPARTMENT OF HOMELAND SECURITY
Transportation Security Administration
Pipeline Corporate Security Review (CSR) CSR SH ONLY No SD FY2022 V.1 (December 2022)

CSR Date

10/18/2021

Report Date























TYPE OF VISIT Name of Pipeline Operator
Stakeholder Self-Assessment


Street Address of Corporate HQ visited.


County

City
State
Zip Code

Corporation / Company Mailing Address
US States of Operation (List): Street Mailing Address of Corporate HQ visited if different from above.

City
State
Zip Code
International Cross-border Operations (Y/N):
Agency Website:
24-Hour Emergency Contact Telephone Numbers Employees

Purpose Telephone Total Corporate Employees
1 24-Hour Emergency
Total Pipeline Operations Employees
2

Product Flow
3

Number of pipeline systems operated
Products Carried (mark applicable with "X"): Total Pipeline Mileage

< Natural Gas/LNG
< Crude Oil Pipeline size(s)

< Refined Products

< NGL/LPG Maximum daily flow capacity

< Toxic Inhalation Hazard (TIH) Average daily flow capacity

< Chemicals (list below) Annual Deliveries
List >
Storage Capacity


Infrastructure Inventory
Quantity Infrastructure Quantity Infrastructure

Pipelines on Bridges
NGL Facilities

Standalone Pipeline Bridges
Marine Terminals

Storage Facilities
SCADA Control Rooms

Breakout Tank Facilities
Backup SCADA Control Rooms

Pumping Stations
Emergency Operations Centers

Compressor Stations
Delivery Points

LNG Facilities
Other
Corporation / Company Profile Comments:
Comments:
Security Personnel Interviewed
Name Title Telephone Cell E-mail

Security Coordinator



Alternate Security Coordinator












Review Team
Name Title Location Assignment Telephone E-mail

Lead SSI


Secondary SSI


TSS TSA - HQ











Supervisory Approval
Name Title Location Assignment Telephone E-mail

STSI



AFSD-I







TSA Headquarters Approval
Name Title Location Assignment Telephone E-mail

Program Manager HQ



HQ


Sheet 3: Checklist

DEPARTMENT OF HOMELAND SECURITY
Transportation Security Administration
Pipeline Corporate Security Review (CSR) CSR SH ONLY No SD FY2022 V.1 (December 2022)
Operator Name: Assessment Date:
0 10/18/2021




Question Type Question # CSR Question N/A Answer (Yes/No/X) Comments
SAI 1.0000 Security Plans
SAI

1.0100 Is your corporate security manager solely dedicated to a corporate security function or tasked with other responsibilities such as environmental, health, and safety?



1.0200 Does your corporate security manager or equivalent position have a direct reporting relationship to the senior leadership in the company?



1.0300 Does the company have a cross-departmental security committee?



1.0400 Which of the following departments are represented on the security committee?
ZZZ

1.0401 Corporate Management



1.0402 Human Resources



1.0403 Security



1.0404 Legal



1.0405 Engineering



1.0406 Operations and/or Maintenance



1.0407 Information Technology



1.0408 Other (if checked, elaborate)


R 1.0500 Have you established a corporate security program to address and document policies and procedures for managing security-related threats, incidents, and responses?


R 1.0600 Does your company have a written corporate security plan?


R 1.0700 Which of the following company plans are directly included or incorporated by reference in the corporate security plan?



1.0701 Business Continuity Plan



1.0702 Incident Response Plan



1.0703 Incident Recovery Plan



1.0704 Enterprise Cybersecurity Plans



1.0705 OT Cybersecurity Plans



1.0706 Other (if checked, elaborate)


R 1.0800 Is the corporate security plan reviewed on an annual basis and updated as required?


R 1.0900 Does the corporate security plan identify the primary and alternate security manager or officer responsible for executing and maintaining the plan?



1.1000 Is the corporate security plan readily available to those persons responsible for security actions?


R 1.1100 Do you incorporate the following elements into your corporate security plan or associated documents?



1.1101 System Description



1.1102 Security Administration and Management Structure



1.1103 Risk Analysis and Assessments



1.1104 Physical Security and Access Control Measures



1.1105 Equipment Maintenance and Testing



1.1106 Personnel Screening



1.1107 Communications



1.1108 Personnel Training



1.1109 Security Incident Procedures



1.1110 National Terrorism Advisory System (NTAS) Response Procedures



1.1111 Security Plan Reviews



1.1112 Recordkeeping



1.1113 Cyber/SCADA System Security Measures



1.1114 Essential Security Contacts



1.1115 Security Testing and Audits



1.1116 Outreach (neighbors, law enforcement, media, public)



1.1117 Other (if checked, elaborate)


R 1.1200 Do you have sufficient resources, including trained staff and equipment, to effectively execute the corporate security program?


R 1.1300 Are appropriate financial resources allocated in the corporate budgeting and purchasing process to correct identified security deficiencies?



1.1400 How much operations and/or maintenance money did your company spend on security in the previous fiscal year?
ZZZ

1.1401 < $99,999



1.1402 $100,000 - $249,999



1.1403 $250,000 - $499,999



1.1404 $500,000 - $999,999



1.1405 $1,000,000 - $4,999,999



1.1406 >$5,000,000



1.1500 How much capital money did your company spend on security in the previous fiscal year?
ZZZ

1.1501 < $99,999



1.1502 $100,000 - $249,999



1.1503 $250,000 - $499,999



1.1504 $500,000 - $999,999



1.1505 $1,000,000 - $4,999,999



1.1506 >$5,000,000



1.1600 Has your company established security metrics?


R 1.1700 Are the corporate security plan, the enterprise cyber security plan, and the OT cyber security plan, as applicable, protected from unauthorized access?


R 1.1800 Are the corporate security plan, the enterprise cyber security plan, and the OT cyber security plan, as applicable, available for TSA review upon request?


SAI 2.0000 Security Plans - Cyber
SAI
SAI 3.0000 Communication
SAI
R 3.0100 Does your company have internal and external notification requirements and procedures for security events?


R 3.0200 Does your company document and periodically update contact and communication information for Federal, state, and local homeland security/law enforcement agencies?


R 3.0300 Does your company have a defined process for receiving, handling, disseminating, and storing security and threat information?


R 3.0400 Do all critical facilities have primary and alternate communication capabilities for internal and external reporting of appropriate security events and information?



3.0500 Which of the following external agencies/organizations would the company notify in the event of a security incident, a security threat, or suspicious activity?
ZZZ

3.0501 National Response Center (NRC)



3.0502 Local emergency responders/911



3.0503 Transportation Security Administration / Transportation Security Operations Center (TSA/TSOC)



3.0504 Tribal emergency responders



3.0505 State emergency responders



3.0506 Other federal agencies



3.0507 Federal Bureau of Investigation (FBI)



3.0508 Department of Homeland Security (DHS)



3.0509 Neighboring companys



3.0510 Other (if checked, elaborate)


SAI 4.0000 Security Incident Procedures
SAI
R 4.0100 Are security elements developed and maintained within the corporate incident response and recovery plan?



4.0200 Does your company have a policy and/or procedure for handling security threat or incident information?



4.0300 From whom does your company receive current security threat information?
ZZZ

4.0301 Transportation Security Operations Center (TSOC)



4.0302 DHS Protective Security Advisor (DHS PSA)



4.0303 Joint Terrorism Task Force (JTTF)



4.0304 Federal Bureau of Investigation (FBI)



4.0305 Homeland Security Information Network (HSIN)



4.0306 State fusion center(s)



4.0307 Local law enforcement



4.0308 Coast Guard



4.0309 Corporate affiliations



4.0310 Department of Energy



4.0311 Homeland Infrastructure Threat and Risk Analysis Center (HITRAC)



4.0312 Other (if checked, elaborate)


R 4.0400 Does your company notify TSA via the Transportation Security Operations Center (TSOC) by phone or email as soon as possible if any of the types of security incidents listed in Appendix B – TSA Notification Criteria, 2018 TSA Pipeline Security Guidelines, occurs or if there is any other reason to believe that a terrorist incident may be planned or may have occurred?


R 4.0500 Has your company implemented procedures for responding to security incidents or emergencies and to pertinent National Terrorism Advisory System (NTAS) Bulletins or Alerts, including appropriate reporting requirements?


R 4.0600 Has your company implemented site-specific security measures for each critical facility to be taken in response to pertinent NTAS Bulletins or Alerts or other threat information?


R 4.0700 Are the site-specific security measures for each critical facility reviewed and updated as necessary at least every 18 months?


R 4.0800 Does your company have adequate staffing to implement security measures in response to security threat information?



4.0900 Does your company have contracts in place with private security providers to augment existing security staffing during times of heightened alert?


R 4.1000 Are bomb threat checklists posted by telephones at all staffed facilities?


R 4.1100 At an Elevated Threat Level, would your company enact the following physical access controls at your critical facilities?



4.1101 Limit facility access to essential personnel.



4.1102 Limit facility access to essential visitors, personnel, and vehicles.



4.1103 Increase surveillance of critical areas and facilities.



4.1104 Restrict deliveries to those essential to continued operations.



4.1105 Conduct random inspections of vehicles
and of bags, backpacks, purses, etc.




4.1106 Delay or reschedule non-vital maintenance and capital project work
that could affect facility security, as appropriate.




4.1107 Increase lighting in facility buffer zones, as appropriate.



4.1108 Verify the operating condition of security systems such as
intrusion detection, cameras, and lighting initially and
at least weekly thereafter until termination of the advisory.




4.1109 Request that local law enforcement agencies
increase the frequency of patrols of the facility.




4.1110 Other (if checked, elaborate)


R 4.1200 At an Elevated Threat Level, would your company enact the following measures on your cyber/SCADA system(s)?



4.1201 Increase monitoring of intrusion detection systems.



4.1202 Remind personnel of the reporting requirements for
any unusual enterprise or control systems network activity.




4.1203 Remind personnel to be vigilant regarding suspicious electronic mail.



4.1204 Other (if checked, elaborate)


R 4.1300 At an Elevated Threat Level, would your company enact the following communications measures at your critical facilities?



4.1301 Inform all employees and on-site contractors
of the change to the Elevated Threat Level.




4.1302 Conduct security awareness briefings
for all employees and on-site contractors.




4.1303 Brief employees and on-site contractors on
the characteristics of suspicious packages or mail.




4.1304 Review response procedures for suspicious packages or mail.



4.1305 Inform local law enforcement that the facility is at an Elevated Threat Level and
advise them of the security measures being employed.




4.1306 Verify the proper operation of intelligence and emergency communications
networks/channels, including those with TSA and first responder agencies.




4.1307 Monitor these networks/channels as appropriate.



4.1308 Other (if checked, elaborate)


R 4.1400 At an Imminent Threat Level, would your company enact the following physical access controls at your critical facilities?



4.1401 Cancel or delay non-vital contractor work and services.



4.1402 Allow deliveries by appointment only.



4.1403 Inspect all bags, backpacks, purses, etc. prior to entering the facility.



4.1404 Inspect all vehicles prior to gaining access to the facility.



4.1405 Inspect all deliveries, including packages and cargo.



4.1406 Secure all non-essential entrances and facility access points.



4.1407 Staff or monitor active facility entrances and access points 24/7.



4.1408 Erect barriers and/or obstacles to control vehicular traffic flow.



4.1409 Where possible, restrict vehicle parking to 150 feet
from all critical areas and assets.




4.1410 Coordinate with local authorities regarding closing
nearby public roads and facilities, if appropriate.




4.1411 Other (if checked, elaborate)


R 4.1500 At an Imminent Threat Level, would your company enact the following measures on your cyber/SCADA system(s)?



4.1501 Limit network communications links to essential sites/users.



4.1502 Review remote access for individuals and revoke
any credentials that are not current and necessary.




4.1503 Other (if checked, elaborate)


R 4.1600 At an Imminent Threat Level, would your company enact the following communications measures?



4.1601 Inform all employees and contractors of the
increase to the Imminent Threat Level.




4.1602 Conduct daily security and awareness briefings for each shift.



4.1603 Participate in situation update briefings with TSA,
other government agencies including local law enforcement,
and pipeline industry associations.




4.1604 Other (if checked, elaborate)



4.1700 Does your company use an incident management system, such as the National Incident Management System (NIMS), for security-related events?



4.1800 Does your company have a process for assuring the viability of the OT cyber recovery plan, including a backup control center?


SAI 5.0000 Security Training
SAI
R 5.0100 Does your company provide security awareness briefings, to include security incident recognition and reporting procedures, for all personnel with unescorted access upon hiring and every three years thereafter?


R 5.0200 Does your company document security training and maintain records in accordance with company record retention policy?


R 5.0300 Does your company provide security training, to include incident response training, to personnel assigned security duties upon hiring and annually thereafter?



5.0400 Have your company’s security personnel availed themselves of any of the following training opportunities or affiliations?



5.0401 Security forums or conferences



5.0402 Pipeline forums or conferences



5.0403 Advanced security training



5.0404 Security Committee(s) participation



5.0405 Government Sector Committee(s)



5.0406 Industry security collaboration



5.0407 Other (if checked, elaborate)



5.0500 Does your company use any of the TSA security training material?


SAI 6.0000 Outreach
SAI
R 6.0100 Does each critical facility conduct outreach to nearby law enforcement agencies to ensure awareness of the facility’s functions and significance?


R 6.0200 Does each critical facility conduct outreach to neighboring businesses to coordinate security efforts and to neighboring residences to provide facility security awareness?


R 6.0300 For critical pipeline cyber assets, does your company ensure that threat and vulnerability information received from information-sharing forums and sources are made available to those responsible for assessing and determining the appropriate course of action?


R 6.0400 Does your company report significant cyber incidents to the following?



6.0401 Senior management



6.0402 Appropriate federal entities



6.0403 Appropriate state, local, and tribal entities



6.0404 Applicable ISAC(s)


SAI 7.0000 Risk Analysis and Assessments
SAI
R 7.0100 Does your company conduct criticality assessments for all facilities at least every 18 months?


R 7.0200 Is the methodology used to determine critical facilities documented in the corporate security plan?


R 7.0300 Did you utilize the criteria from the 2018 TSA Pipeline Security Guidelines to determine your list of critical facilities?


R 7.0400 During the criticality assessment of your facilities, were all of the following criteria considered?



7.0401 Critical to national defense



7.0402 Key infrastructure



7.0403 Mass casualty or significant health effects



7.0404 Disruption to state or local government public or emergency services



7.0405 National landmarks or monuments



7.0406 Major rivers, lakes, or waterways



7.0407 Deliverability to significant number of customers



7.0408 Significantly disrupt pipeline system operations
for an extended period of time, i.e., business critical facilities




7.0409 Other (if checked, elaborate)


R 7.0500 Does your company conduct a security vulnerability assessment (SVA) or equivalent of each critical facility at least every 36 months?


R 7.0600 Does your company conduct an SVA or equivalent within 12 months after achieving operational status for newly identified or constructed facilities?


R 7.0700 Does your company conduct an SVA or equivalent of any critical facility within 12 months of completing a significant enhancement or modification to the facility?


R 7.0800 Upon completion of an SVA or equivalent, are corrective actions implemented within 24 months?


R 7.0900 Are assessment results documented and retained until no longer valid?



7.1000 Does your company conduct SVAs or equivalent on your non-critical facilities?


R 7.1100 When conducting an SVA or equivalent, do you use one or more of the following methodologies?



7.1101 Criticality, Accessibility, Recuperability,
Vulnerability, Effect, Recognizability (CARVER)




7.1102 American Petroleum Institute/National Petrochemical
and Refiners Association (API/NPRA)




7.1103 Mission, Symbolism, History, Accessibility,
Recognizability, Population, Proximity (MSHARPP)




7.1104 Third-party or corporate proprietary



7.1105 Other (if checked, elaborate)


R 7.1200 Does your company integrate security risk mitigation measures during the design, construction, or renovation of a facility?


SAI 8.0000 Risk Analysis and Assessments - Cyber
SAI
SAI 9.0000 Drills & Exercises
SAI
R 9.0100 Does your company conduct periodic security drills and exercises for all facilities, including in conjunction with other required drills or exercises?


R 9.0200 Does your company require each critical facility to conduct or participate in an annual security drill or exercise, including common drills or exercises in which multiple facilities may participate?


R 9.0300 Does your company require each critical facility to prepare a written post-event report assessing security drills and exercises and documenting corrective actions?



9.0400 Over the past three years, with whom has your company participated in security drills or exercises?
ZZZ

9.0401 Local emergency responders



9.0402 Tribal emergency responders



9.0403 State emergency responders



9.0404 Federal emergency responders



9.0405 Federal Bureau of Investigation (FBI)



9.0406 Department of Homeland Security (DHS)



9.0407 Transportation Security Administration (TSA)



9.0408 Neighboring companys



9.0409 Other (if checked, elaborate)


R 9.0500 Does the corporate security plan include policies and procedures for auditing and testing the effectiveness of the company’s security procedures, to include documentation of results?


SAI 10.0000 Cyber Security
SAI

10.0500 Are methods in place to verify the accuracy of the diagrams and/or other documentation related to your OT system?



10.2400 Does the OT system deny network traffic by default and allow only authorized network traffic?



10.2600 Do OT system controls protect the integrity of electronically-communicated information? (e.g., preventing man in the middle)?



10.2700 Does the OT system prevent traffic from being routed to the internet?


SAI 11.0000 Physical Security & Access Control
SAI

11.0100 Which of the following security measures does your corporate security plan require at critical facilities?
ZZZ

11.0101 Fences



11.0102 Gates equivalent to attached barriers



11.0103 Signage such as No Trespassing, Do Not Enter,
Authorized Personnel Only, CCTV in Use, etc.




11.0104 Closed circuit television (CCTV)



11.0105 Intrusion sensors



11.0106 Alarms



11.0107 Clear zones around fence lines



11.0108 Locks



11.0109 Barriers such as bollards, planters, or Jersey barriers



11.0110 Tamper devices



11.0111 Patrols



11.0112 Lighting



11.0113 Crime Prevention Through Environmental Design (CPTED)



11.0114 Unarmed Guards



11.0115 Armed Guards



11.0116 Video-analytic Systems



11.0117 Video Recording



11.0118 Intrusion-detection Systems



11.0119 Other (if checked, elaborate)



11.0200 How does your company physically control access to controlled-access areas?
ZZZ

11.0201 Lock and Key



11.0202 Biometric reader



11.0203 Digital keycard



11.0204 PIN Code



11.0205 Proximity Card



11.0206 Radio Remote Control



11.0207 Other (if checked, elaborate)



11.0300 Which of the following security measures does your corporate security plan require at all facilities?
ZZZ

11.0301 Fences



11.0302 Gates equivalent to attached barriers



11.0303 Signage such as No Trespassing, Do Not Enter,
Authorized Personnel Only, CCTV in Use, etc.




11.0304 Closed circuit television (CCTV)



11.0305 Intrusion sensors



11.0306 Alarms



11.0307 Clear zones around fence lines



11.0308 Locks



11.0309 Barriers such as bollards, planters, or Jersey barriers



11.0310 Tamper devices



11.0311 Patrols



11.0312 Lighting



11.0313 Crime Prevention Through Environmental Design (CPTED)



11.0314 Unarmed Guards



11.0315 Armed Guards



11.0316 Video-analytic Systems



11.0317 Video Recording



11.0318 Intrusion-detection Systems



11.0319 Other (if checked, elaborate)


R 11.0400 Does the corporate security plan require the following security measures at all facilities?



11.0401 Employ measures to impede unauthorized persons from
gaining access to a facility and restricted areas within a facility.




11.0402 Close and secure perimeter gates or entrances when not in use.



11.0403 Post “No Trespassing” or “Authorized Personnel Only” signs
at intervals that are visible from any point of potential entry.



R 11.0500 Does the corporate security plan require the following security measures at all facilities?



11.0501 Employ measures to impede unauthorized access to facilities.



11.0502 Maintain fences, if used, without gaps
around gates or underneath the fence line.




11.0503 Ensure that there is a clear zone for several feet on either side
of the fence, free of obstructions, vegetation, or objects that
could be used for concealment or to scale the fence.



R 11.0600 Does the corporate security plan require that each critical facility implement procedures (e.g., manual or electronic sign in/out) for controlling access to the facility and restricted buildings or areas within the facility?


R 11.0700 Does the corporate security plan require that each critical facility create a security perimeter that impedes unauthorized vehicles from entering the facility perimeter or critical areas by installing and maintaining barriers (e.g., fences, bollards, jersey barriers)?


R 11.0800 Does the corporate security plan require that each critical facility ensure that visitors are monitored and escorted?


R 11.0900 Does the corporate security plan require that each critical facility install and maintain gates of an equivalent quality to the barrier to which they are attached?


R 11.1000 Does the corporate security plan require that each critical facility provide sufficient illumination for human and technological recognition of intrusion into the facility perimeter or critical areas?


R 11.1100 Does the corporate security plan require that each critical facility or critical areas within a facility have security measures to monitor, detect, and assess 24 hours per day, 7 days per week?


R 11.1200 Does your company have key control procedures for key issuance, tracking, collection, loss, and unauthorized duplication at each critical facility?


R 11.1300 Does your company conduct a key inventory at least every 24 months at each critical facility?


R 11.1400 Does your company use restricted, patented, or electronic keys at each critical facility to prevent unauthorized duplication?


SAI 12.0000 Personnel Security
SAI
R 12.0100 Has your company established policies and procedures for applicant pre-employment screening and behavioral criteria for disqualification of applicants and employees?



12.0200 Is there at least one individual within your company who holds a current federal security clearance?



12.0300 What is the highest level of clearance that is held within your company?
ZZZ

12.0301 Secret



12.0302 Top Secret



12.0303 Top Secret SCI



12.0400 Does your company conduct pre-employment background investigations on all potential employees?


R 12.0500 Does your company conduct pre-employment background investigations of applicants for positions that involve any of the following?



12.0501 Authorized regular unescorted access
to control systems or sensitive areas.




12.0502 Authorized access to sensitive information.



12.0503 Assigned security roles



12.0504 Assigned to work at or granted
access rights to critical facilities.



R 12.0700 Do pre-employment background investigations of applicants for positions described in Question 12.0500 above include all of the following?



12.0701 Verification and validation of identity



12.0702 Criminal history check



12.0703 Verification and validation of
legal authorization to work



R 12.0800 Has your company developed identification and badging policies and procedures for personnel who have access to secure areas or sensitive information that address the following?



12.0801 Lost or stolen identification cards or badges



12.0802 Temporary badges



12.0803 Personnel termination



12.0900 Does your company use the federally-established list of disqualifying crimes (listed in 49 CFR 1572.103) to assess the suitability of personnel for positions described in Question 12.0500 above?


R 12.1000 Does your company conduct recurring background investigations at least every ten years for employees occupying security positions or who have access to sensitive information or areas?


R 12.1100 Does the corporate security plan require that each critical facility ensure that company or vendor identification is available for examination by being visibly displayed or carried by personnel while on-site?


R 12.1200 Does your company verify that contractors have background investigation policies and procedures at least as rigorous as the company’s?


R 12.1300 Does the corporate security plan require that each critical facility ensure personnel identification cards or badges are secure from tampering and contain the individual’s photograph and name?



12.1400 Does your company have a policy and/or procedure in place addressing security issues related to employee termination?



12.1500 Are the following actions taken during termination activities?



12.1501 Retrieve badge or identification card.



12.1502 Disable passwords.



12.1503 Retrieve keys.



12.1504 Retrieve operational and/or security manuals.



12.1505 Block computer-system access.



12.1506 Discharged employee signs nondisclosure agreement.



12.1507 Other (if checked, elaborate)


SAI 13.0000 Equipment Maintenance and Testing
SAI
R 13.0100 Has your company implemented a maintenance program to ensure that security systems are in good working order?


R 13.0200 Does your company identify and respond to security equipment malfunctions or failures in a timely manner?


R 13.0300 Do all critical facilities, through routine use or quarterly examination, verify the proper operation and/or condition of all security equipment?


R 13.0400 Do all critical facilities provide an equivalent level of protective security measures to mitigate risk during power outages, security equipment failure, or extended repair of security systems?



13.0500 Does your corporate security maintenance program include all of the following?



13.0501 Corrective maintenance



13.0502 Preventive maintenance



13.0503 Testing



13.0504 Inspection


SAI 14.0000 Recordkeeping
SAI
R 14.0100 Does the corporate security plan address recordkeeping policies and procedures for security information, including the protection of Sensitive Security Information (SSI) in accordance with the provisions of 49 CFR Parts 15 and 1520?


R 14.0200 Do all facilities retain the following documents, as appropriate, until superseded or replaced?



14.0201 Corporate security plan



14.0202 Criticality assessment(s)



14.0203 Training records



14.0204 Security drill or exercise reports



14.0205 Incident response plan(s)



14.0206 Security testing and audits


R 14.0300 In addition to the documents listed in Question 14.0200 above, does each critical facility retain the following documents until superseded or replaced?



14.0301 SVA(s)



14.0302 Site-specific security measures



14.0400 Does your company have a document-marking policy or procedure?


R 14.0500 Does the company make the security information records described in Questions 14.0200 and 14.0300 above available to TSA upon request?



14.0600 Has your company taken any of the following steps to apply operations security (OPSEC) in daily activities?



14.0601 Mark documents.



14.0602 Hold conversations in appropriate locations.



14.0603 Report undue interest in pipeline security or operations.



14.0604 Secure sensitive documents outside of
office areas such as in vehicles or in transport.




14.0605 Dispose of documents properly.



14.0606 Dispose of computer equipment and associated media securely.



14.0607 Create strong passwords.



14.0608 Change passwords periodically.



14.0609 Vary patterns of behavior



14.0610 Remove badges in public



14.0611 Other (if checked, elaborate)


R 14.0700 Does your company maintain and secure criticality assessments, critical facility lists, and security vulnerability assessments or equivalent?



Sheet 4: Checklist - IT

DEPARTMENT OF HOMELAND SECURITY
Transportation Security Administration
Pipeline Corporate Security Review (CSR) IT Questions CSR SH ONLY No SD FY2022 V.1 (December 2022)
Operator Name: Assessment Date:
0 10/18/2021




Question Type Question # CSR Question N/A Answer (Yes/No/X)
SAI 2.0000 Security Plans - Cyber
SAI
SAI 4.0000 Security Incident Procedures
SAI
R 4.1200 At an Elevated Threat Level, would your company enact the following measures on your cyber/SCADA system(s)?



4.1201 Increase monitoring of intrusion detection systems.



4.1202 Remind personnel of the reporting requirements for
any unusual enterprise or control systems network activity.




4.1203 Remind personnel to be vigilant regarding suspicious electronic mail.



4.1204 Other (if checked, elaborate)


R 4.1500 At an Imminent Threat Level, would your company enact the following measures on your cyber/SCADA system(s)?



4.1501 Limit network communications links to essential sites/users.



4.1502 Review remote access for individuals and revoke
any credentials that are not current and necessary.




4.1503 Other (if checked, elaborate)



4.1800 Does your company have a process for assuring the viability of the OT cyber recovery plan, including a backup control center?


SAI 5.0000 Security Training
SAI
SAI 6.0000 Outreach
SAI
R 6.0300 For critical pipeline cyber assets, does your company ensure that threat and vulnerability information received from information-sharing forums and sources are made available to those responsible for assessing and determining the appropriate course of action?


R 6.0400 Does your company report significant cyber incidents to the following?



6.0401 Senior management



6.0402 Appropriate federal entities



6.0403 Appropriate state, local, and tribal entities



6.0404 Applicable ISAC(s)


SAI 8.0000 Risk Analysis and Assessments - Cyber
SAI
SAI 9.0000 Drills & Exercises
SAI
SAI 10.0000 Cyber Security
SAI

10.0500 Are methods in place to verify the accuracy of the diagrams and/or other documentation related to your OT system?



10.2400 Does the OT system deny network traffic by default and allow only authorized network traffic?



10.2600 Do OT system controls protect the integrity of electronically-communicated information? (e.g., preventing man in the middle)?



10.2700 Does the OT system prevent traffic from being routed to the internet?


SAI 12.0000 Personnel Security
SAI

Sheet 5: 7 Recommendations

0
Recommendations

Recommendation # CSR Question # SAI Category Recommendation Narrative
1


2


3


4


5


6


7


8


9


10


11


12


13


14


15


16


17


18


19


20


21


22


23


24


25


26


27


28


29


30


31


32


33


34


35


36


37


38


39


40


41


42


43


44


45


46


47


48


49


50


51


52


53


54


55


56


57


58


59


60


61


62


63


64


65


66


67


68


69


70


71


72


73


74


75


76


77


78


79


80


81


82


83


84


85


86


87


88


89


90


91


92


93


94


95


96


97


98


99


100



Sheet 6: 7A Recommendations Follow-up

CSR Recommendations Follow-up

Pipeline Operator 0 CSR Date: 10/18/2021

Follow-up Request Date Stakeholder Response Date 18-24 Month Follow-up Window



From: To:

4/18/2023 10/18/2023

Recommendation # CSR Question # Recommendation Stakeholder Response Code Stakeholder Response Narrative

1





2




Response Codes
3





4




1 - Recommendation has been completed/implemented
5




2 - Recommendation will be completed/implemented
6




3 - Recommendation being evaluated
7




4 - Recommendation will not be completed/implemented
8




5 - Recommendation no longer applicable
9





10





11





12





13





14





15





16





17





18





19





20





21





22





23





24





25





26





27





28





29





30





31





32





33





34





35





36





37





38





39





40





41





42





43





44





45





46





47





48





49





50





51





52





53





54





55





56





57





58





59





60





61





62





63





64





65





66





67





68





69





70





71





72





73





74





75





76





77





78





79





80





81





82





83





84





85





86





87





88





89





90





91





92





93





94





95





96





97





98





99





100






Sheet 7: 10 Critical Facility List

0
Critical Facility List
# Critical Facility Name Address City State Latitude Longitude Description / Notes
1






2






3






4






5






6






7






8






9






10






11






12






13






14






15






16






17






18






19






20







Sheet 8: 12 Meeting Attendees

0
Meeting Attendees




Date: 10/18/2021






TSA Pipeline Security Attendees
Name Title Division Name Title Division






















































Pipeline Corporation Attendees
Name Title Division Name Title Division








































































Other Attendees
Name Title Organization / Company Name Title Organization / Company














































































CSR Form Filled Out By
Name Title Division Name Title Division







Sheet 9: SAI List

SAI # SAI Description
1 Security Plans
2 Security Plans - Cyber
3 Communication
4 Security Incident Procedures
5 Security Training
6 Outreach
7 Risk Analysis and Assessments
8 Risk Analysis and Assessments - Cyber
9 Drills & Exercises
10 Cyber Security
11 Physical Security & Access Control
12 Personnel Security
13 Equipment Maintenance and Testing
14 Recordkeeping

Sheet 10: PRA Burden Statement

Paperwork Reduction Act Burden Statement:  This is a voluntary collection of information.  TSA estimates that the total average burden per response associated with this collection is approximately 8 hours and an additional 1-3 hours for follow-up on TSA recommendations.  An agency may not conduct or sponsor, and a person is not required to respond to a collection of information unless it displays a valid OMB control number.  The control number assigned to this collection is OMB 1652-0056, which expires on 02/29/2020. Send comments regarding this burden estimate or collection to: TSA-11, Attention: PRA 1652-0056 Pipeline CSR, 601 South 12th Street, Arlington, VA 20598.
File Typeapplication/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File Modified0000-00-00
File Created0000-00-00

© 2024 OMB.report | Privacy Policy