DHS Official: CFATS Program More Important Now Than Ever

The Chemical Facility Anti-Terrorism Standards (CFATS) program is more important now than ever.

That was the message Wednesday from Sue Armstrong, director of the Department of Homeland Security’s Infrastructure Security Compliance Division, in her update of the CFATS program, which requires all high-risk chemical facilities to perform security vulnerability assessments and develop and implement site security plans that meet 18 risk-based performance standards established by DHS.

The program celebrated its four-year anniversary of being signed into law just more than a week ago. And, according to Armstrong, speaking at ASIS 2010 at the Dallas Convention Center, all indicators suggest that awareness of the program is higher now than in previous years --  even as the department’s implementation of its strategy continues to evolve, creating a need for more outreach to the 4,776 facilities that must comply with its regulations.

“CFATS exists for a very good reason, and that is because the threat to our country is very real,” Armstrong said, adding that terrorist factions already are within U.S. borders, where they’re being radicalized domestically first before going to other countries for further training and support. “For those of you who aren’t aware, the U.S. intelligence community has changed its estimate of that threat. . . . We are in a new threat environment domestically, and the CFATS program is here to protect our communities.”

Armstrong said that, unlike ASIS update sessions in previous years, ISCD now is “on the ground, doing inspections,” having recently filled its ranks with 92 inspectors who are roving the country in all 50 states.

She said the division has received 3,669 site security plans to date and has completed its review of 220 of those plans. Meanwhile, the division has several notices of proposed rulemaking on the boards and is instigating listening sessions with stakeholders across the country. Also, ISCD has launched an online site dedicated to training, assessment, and top-screening assistance, as well as a CFATS “Help Desk” line at 1-866-323-2957.

Dan Walters, CPP, manager of Security & Environment Risk for Terra Industries, joined Armstrong at the podium to offer a private sector perspective on implementing and maintaining a CFATS-compliant program. He recommended that even if facilities do not yet have a site security plan, officials need to review their top-screens, which are questionnaires that enable DHS to perform a basic consequence assessment that results in a facility being preliminarily considered high-risk and placed in a preliminary tier.

“Treat your plan as if it were a regulatory compliance document,” Walters said. “Develop a separate security plan to lay out requirements of those with security responsibilities.” He added that facility managers should calendar their plans with trigger points based on such elements as training audits, drills, and document retention strategies, and then adhere to those plans. “Whether you have a 3-year or 6-year document retention plan, stick to the plan. If you’re not required to keep the document after that time, don’t keep it,” because if you do, you won’t be in compliance, he said.

Walters also advised managers to conduct incident investigations of all security incidents and to notify either DHS or the FBI -- or a host of other agencies -- when incidents happen, and to watch for changes to either the CFATS rule or the Appendix A list, which Armstrong said ISCD has already initiated a review on.

Finally, Walters said, “When in doubt, utilize the CFATS Help Desk,” which can refer managers to inspectors and staff and offer direction to training modules online.

About the Author

Ronnie Rittenberry is print managing editor for Security Products and Occupational Health and Safety magazines.

Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3