A Holistic Approach to CFATS Compliance

Knowing the identity of workers and monitoring their access to various operations are key capabilities required to meet Chemical Facility Anti-Terrorism Standards (CFATS). Several of the Department of Homeland Security (DHS)'s 18 Risk-Based Performance Standards (RBPS), which were formulated to ensure protection of chemical facilities, specifically mention the need for comprehensive monitoring of employee identity and control of access to critical areas.

For example, RBPS 3 specifies the need to “implement a regularly updated ... system that checks the identification of facility personnel and other persons seeking access to the facility.” Ensuring identity and controlling access to critical areas are also requirements for compliance with RBPS 7, which calls for deterrence of insider sabotage. RBPS 8 is specific to cyber sabotage, including the need to “prevent on-site or remote access to critical process controls,” such as computerized systems, disruption of which could be used for terrorist purposes.

RBPS 12 requires appropriate background checks and credentials for facility personnel and for unescorted visitors with access to restricted areas or critical assets. Specifically, RBPS 12 necessitates measures designed to verify and validate identity, to check criminal history and to verify and validate legal authorization to work. RBPS 12 also requires proper security training of facility personnel, which is another aspect of monitoring employee compliance with CFATS standards.

Taken together, the RBPS standards point to a need for a holistic approach to physical security management. Most chemical organizations operate multiple facilities across the country and around the world, some located in unstable regions. The high-risk nature of the compounds used in these diverse environments, especially in the higher-risk facilities categorized as Tier One and Tier Two by DHS, makes it imperative that they be protected against terrorists and internal sabotage.

Complying with CFATS requires multiple stages of evaluation and compliance; lack of compliance can trigger significant daily fines or even the requirement that a facility cease operations. A comprehensive approach to managing physical identities and their access across disparate physical access control systems enables a facility impacted by CFATS to meet the various RBPS standards, whether specific to identity or broader in scope.

Use of specialized commercial off-the-shelf software can unify and streamline a chemical facility's efforts to meet CFATS guidelines in many ways. Advanced software can provide a single interface to manage all identities, roles and related-area access across a global security infrastructure. Software can also perform as an integral part of facility operation, making CFATS compliance an element of daily operations rather than a separately managed project.

A software-based solution provides a flexible, scalable and secure approach to managing employees, contractors and visitors for CFATS compliance. Software can integrate with an existing physical security infrastructure while ensuring compliance with CFATS. Software can automate all processes that encompass the “life cycle” of an identity as it relates to physical security. Integration with external databases automates completion of background checks required for facility personnel and visitors. Security staff can easily design and manage multiple badge templates and enroll Transportation Worker Identification Credential (TWIC) cards centrally. A Web-based self-service interface enables end-users to be part of the credentialing process – with workflow capabilities for approval, notification, and changes, all with a complete audit trail.

A comprehensive software-based approach to identity management helps chemical facilities achieve several of the RBPS standards, including:

Screening and access control (RBPS 3), by automating condition-based access including successful background check, approval from an area owner and completion of training.

Shipping, Receipt and Storage (RBPS 5), by automating processes involved with vehicle inspection including pre-registration of shipments and real-time background checks of drivers against internal and external watch list databases.

Theft or Diversion (RBPS 6), by defining multiple controls for access to restricted areas, ensuring background checks and automating check-in/check-out processes of vehicles and drivers within a facility.

Sabotage (RBPS 7), by automating visitor management processes such as escort sign-in, access control and background verification. Facilities may also maintain their own watch list of persons of interest, such as disgruntled ex-employees.

Personnel Surety (RBPS 12), by automating background checks, including those mandated for chemical facilities.

Elevated Threats (RBPS 13), by responding to changes of threat levels with various sets of actions and outcomes.

Reporting of Security Metrics (RBPS 15), including reporting functionality with pre-built reports and customized reports for security metrics.

Ensuring compliance and providing security metrics are particular areas where a software-based system adds value. Software can help physical security practitioners define, assess and report on a variety of risks across the security infrastructure. By automating key policies and procedures, a system prepares organizations to prevent risk-based events before they occur. A library of pre-defined physical and integrated security risks can be tied to key indicators such as terminated users, abnormal badge usage or watch listed identities. Aggregating, correlating and processing data from multiple external systems can provide a graphical view of key metrics to enable quick decision-making and to promote awareness and understanding of risks.

Under the umbrella of compliance, software can quickly identify and mitigate concerns and ensure that cardholder access control is driven by policy, that change history is always available and that dormant/orphaned accounts are reliably deactivated. Software can provide centralized enforcement of internal or external regulations. In addition to CFATS, regulatory concerns include the U.S. Maritime Transportation Security Act’s (MTSA) requirement to implement the Transportation Worker Identification Credential (TWIC) program.

CFATS lists a set of broad-based standards to ensure protection of critical chemical facilities but does not specify how the standards are to be achieved. That piece of the puzzle is left up to the facilities themselves, working in conjunction with various hardware and software providers, consultants and integrators. Because of the broad nature of CFATS requirements, achieving them requires a combination of technology and security-related operations and policies. Rules-based software can bridge the gap between technology and operations by integrating adherence to security policies as part of a unified identity management program. Software can automate and enforce global physical security policies and help to ensure both governance and compliance using an organization's existing physical security and IT infrastructure. Unifying hardware solutions with security policies using rules-based software that is custom-configured to a site's specific needs is a cost-efficient and effective route to CFATS compliance.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity


New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • ResponderLink


    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3