A Holistic Approach to CFATS Compliance

Knowing the identity of workers and monitoring their access to various operations are key capabilities required to meet Chemical Facility Anti-Terrorism Standards (CFATS). Several of the Department of Homeland Security (DHS)'s 18 Risk-Based Performance Standards (RBPS), which were formulated to ensure protection of chemical facilities, specifically mention the need for comprehensive monitoring of employee identity and control of access to critical areas.

For example, RBPS 3 specifies the need to “implement a regularly updated ... system that checks the identification of facility personnel and other persons seeking access to the facility.” Ensuring identity and controlling access to critical areas are also requirements for compliance with RBPS 7, which calls for deterrence of insider sabotage. RBPS 8 is specific to cyber sabotage, including the need to “prevent on-site or remote access to critical process controls,” such as computerized systems, disruption of which could be used for terrorist purposes.

RBPS 12 requires appropriate background checks and credentials for facility personnel and for unescorted visitors with access to restricted areas or critical assets. Specifically, RBPS 12 necessitates measures designed to verify and validate identity, to check criminal history and to verify and validate legal authorization to work. RBPS 12 also requires proper security training of facility personnel, which is another aspect of monitoring employee compliance with CFATS standards.

Taken together, the RBPS standards point to a need for a holistic approach to physical security management. Most chemical organizations operate multiple facilities across the country and around the world, some located in unstable regions. The high-risk nature of the compounds used in these diverse environments, especially in the higher-risk facilities categorized as Tier One and Tier Two by DHS, makes it imperative that they be protected against terrorists and internal sabotage.

Complying with CFATS requires multiple stages of evaluation and compliance; lack of compliance can trigger significant daily fines or even the requirement that a facility cease operations. A comprehensive approach to managing physical identities and their access across disparate physical access control systems enables a facility impacted by CFATS to meet the various RBPS standards, whether specific to identity or broader in scope.

Use of specialized commercial off-the-shelf software can unify and streamline a chemical facility's efforts to meet CFATS guidelines in many ways. Advanced software can provide a single interface to manage all identities, roles and related-area access across a global security infrastructure. Software can also perform as an integral part of facility operation, making CFATS compliance an element of daily operations rather than a separately managed project.

A software-based solution provides a flexible, scalable and secure approach to managing employees, contractors and visitors for CFATS compliance. Software can integrate with an existing physical security infrastructure while ensuring compliance with CFATS. Software can automate all processes that encompass the “life cycle” of an identity as it relates to physical security. Integration with external databases automates completion of background checks required for facility personnel and visitors. Security staff can easily design and manage multiple badge templates and enroll Transportation Worker Identification Credential (TWIC) cards centrally. A Web-based self-service interface enables end-users to be part of the credentialing process – with workflow capabilities for approval, notification, and changes, all with a complete audit trail.

A comprehensive software-based approach to identity management helps chemical facilities achieve several of the RBPS standards, including:

Screening and access control (RBPS 3), by automating condition-based access including successful background check, approval from an area owner and completion of training.

Shipping, Receipt and Storage (RBPS 5), by automating processes involved with vehicle inspection including pre-registration of shipments and real-time background checks of drivers against internal and external watch list databases.

Theft or Diversion (RBPS 6), by defining multiple controls for access to restricted areas, ensuring background checks and automating check-in/check-out processes of vehicles and drivers within a facility.

Sabotage (RBPS 7), by automating visitor management processes such as escort sign-in, access control and background verification. Facilities may also maintain their own watch list of persons of interest, such as disgruntled ex-employees.

Personnel Surety (RBPS 12), by automating background checks, including those mandated for chemical facilities.

Elevated Threats (RBPS 13), by responding to changes of threat levels with various sets of actions and outcomes.

Reporting of Security Metrics (RBPS 15), including reporting functionality with pre-built reports and customized reports for security metrics.

Ensuring compliance and providing security metrics are particular areas where a software-based system adds value. Software can help physical security practitioners define, assess and report on a variety of risks across the security infrastructure. By automating key policies and procedures, a system prepares organizations to prevent risk-based events before they occur. A library of pre-defined physical and integrated security risks can be tied to key indicators such as terminated users, abnormal badge usage or watch listed identities. Aggregating, correlating and processing data from multiple external systems can provide a graphical view of key metrics to enable quick decision-making and to promote awareness and understanding of risks.

Under the umbrella of compliance, software can quickly identify and mitigate concerns and ensure that cardholder access control is driven by policy, that change history is always available and that dormant/orphaned accounts are reliably deactivated. Software can provide centralized enforcement of internal or external regulations. In addition to CFATS, regulatory concerns include the U.S. Maritime Transportation Security Act’s (MTSA) requirement to implement the Transportation Worker Identification Credential (TWIC) program.

CFATS lists a set of broad-based standards to ensure protection of critical chemical facilities but does not specify how the standards are to be achieved. That piece of the puzzle is left up to the facilities themselves, working in conjunction with various hardware and software providers, consultants and integrators. Because of the broad nature of CFATS requirements, achieving them requires a combination of technology and security-related operations and policies. Rules-based software can bridge the gap between technology and operations by integrating adherence to security policies as part of a unified identity management program. Software can automate and enforce global physical security policies and help to ensure both governance and compliance using an organization's existing physical security and IT infrastructure. Unifying hardware solutions with security policies using rules-based software that is custom-configured to a site's specific needs is a cost-efficient and effective route to CFATS compliance.

Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.