Sei sulla pagina 1di 10

Oil & Gas Industry

Towards Global Security

A Holistic Security Risk Management Approach

www.thalesgroup.com/security-services
Oil & Gas Industry
Towards Global Security

This white paper discusses current security


issues in oil and gas industry and suggests a
holistic security risk management approach to
manage security risks to an acceptable level whilst
optimizing financial investment.

Threats In The Oil And Gas Field


Safe and reliable energy is a vital link in the nations critical infrastructure.
Oil and gas products play an important role in national economy, national
security and are integral to the way of life. As such, security has always
been and continues to be a priority across the oil and gas industry.
Reports from many international government agencies confirm
that various terrorism groups target the oil and gas industry.
The petroleum industry is in all probability generally subject to these
threats due to several factors:
The physical and chemical properties of the materials processed,
stored and handled at these facilities may create attractive
targets for an adversary to cause malicious release with the
intent to harm a neighboring population.
The critical importance of the products produced by companies,
to the domestic and international infrastructures and to other
businesses and individuals, may make disruption of operations of
the petroleum industry an attractive option.
The risks from terrorist attacks to the energy supply vary by segment
of the industry, which is broadly defined as exploration and production,
refining, pipeline transportation (liquids), marine transportation,
products distribution and marketing.
Nowadays, with the emergence of new kind of conflicts, asymmetric
threats using unconventional warfare tactics are the primary threats to
critical infrastructures. This is especially true for oil and gas
industry now involved in asymmetric conflicts.
Oil and gas private security forces are facing now new unconventional
opponents such as terrorists (international and national), activists,
pressure groups, single issue zealots, disgruntled employees, or
criminals, whether white collar, cyber hackers, organized or
opportunists. These threats may come from insider activity, external
action, or insiders colluding with external adversaries. These opponents
use different attacks including car suicide bombing, mortar rain,
rocket propelled grenade, improvised explosive devices (IED),
ambushes, hostages, hijacking, kidnapping, computer hacking,
information warfare, and so on. The attacks can be complex and
coordinated and can exploit a combination of physical, logical (information
technology), environmental, organizational and human weaknesses.

3
>
Security Risks
To address this issue the security needs to be evaluated in order to
fully analyze the major security risks: a risk is a combination
between the probability of the threat and the potential impact on a
critical asset. This is a complex task and therefore a holistic
security risk management methodology is required that enables all
security risks levels to be identified, whilst also evaluating the existing
technology (which should cover logical, physical and environmental
issues), organization and human factors security solutions.
Oil And Gas Critical Infrastructures
The potential threats are directed against the whole oil and gas
infrastructures but could target their critical and strategic assets
such as:
Oil and gas specific segments: Reservoirs, wells, offshore
production facilities, pipeline systems, mass storage facilities
and oil refineries.
Buildings: Administration offices, corporate offices, command
and control rooms.
Equipment: Process units and associated control systems,
product storage tanks, surge vessels, boilers, turbines, process
heaters, sewer systems.
Support systems: Utilities such as natural gas lines, electrical
power grid and facilities (including back-up power systems),
water-supply systems, wastewater treatment facilities.
Transportation interface: Railroad lines and railcars, product
loading racks and vehicles, pipelines entering and leaving
facility, marine vessels and dock area, off site storage areas.
The evaluation of the security risks starts with the identification of
Cyber systems and information technology: SCADA systems, the threats, the critical assets and the vulnerabilities. Then for each
computer systems, networks, devices with remote maintenance security risk that needs to be mitigated security objectives are
ports, laptops, PDAs. defined. Security solutions are then implemented.
Therefore, to protect those assets, the security measures should
be inline with the threat level and adapted to the security risk level.

Loss of human life (killed, injured)


Economic impact of destruction or
disruption
Business impact
Political consequences on public
confidence
Potential for loss of energy supply to civilian
areas
Potential impacts for environment
Extended time needed to repair
Potential for interdependency effects

4
Security Risk Management
The objective is to define a security program based on a collective Based on interviews, site surveys and documentation, the following
effort that seeks to reduce the likelihood that industry personnel, areas have to be addressed:
their families, facilities and materials shall be subject to any kind of Threat Assessment i.e. Define alert levels, identify the threats
attack, and to prepare to respond to the consequences of such and evaluate probability.
attacks should they occur. Criticality Assessment i.e. Identify critical assets and define
This section describes the security management process to asset criticality levels.
mitigate the risks and to develop a security program. Vulnerability Assessment i.e. identify vulnerabilities and evaluate
criticality. This includes manpower and security force protection
assessments.
Risk Assessment i.e. identify and evaluate the risks based on
previous assessments conclusions.
Consequently for each risks identified, the management decides
whether the risk should be controlled, ignored, insured or accepted.

The first step is to set up the internal organization to pilot the risk
management process and to define the scope and
objectives of the Security Committee and the Security Working
Groups.
The organization should be based on: If the decision is to control the risk, security objectives are defined.
Security Committee, the SC includes top management that Then the security solutions (based on technology, organization or
develops security strategy, provides guidance, direction and human factors) should be provided (based on risk priority and
cooperation. objectives). Those solutions are categorized as prevention,
detection, response and recovery.
Security Working Groups, the SWG take actions, provide inputs
and feedbacks. They develop and recommend policy, prepare
planning documents, conduct risk assessments.
One of the SWG is the Threat WG, which consists on
Counterintelligence representative, Law Enforcement representative,
Information Operations representative and the Chemical, Biological,
Radiological, Nuclear and High Yield Explosive (CBRNE)
representative. Larger installations may include additional personnel
as assigned by the SC.

As a result, conclusions are formalized in the Security Master Plan


(SMP).

5
>
Best Practices In Security Management
Implement Solutions With decades of experience in the oil and gas industry and significant
Appropriate security solutions defined in the Security Master Plan depth of knowledge of security systems from its core competencies
should be implemented through a series of actions including: in defense and civil businesses, Thales has identified some best
practices of security management:
Prioritization of recommended security solutions.
Risk management: Integrate holistic security risk management
Planning implementation and funding of security solutions.
into the corporate risk management process.
The quality of this security management process is maintained using
Security organization: Create senior level security committee,
the PDCA model:
Security Working Groups, corporate security risk manager and
Plan: Establish or update the Security Master Plan to improve local security officers (IT, safety, facility, etc.).
security.
Coordination: Develop coordination with government and stake-
Do: Implement and operate the actions defined in the SMP. holders (customers, suppliers, infrastructure providers).
Check: Monitor, review the actions and report the results to Security Master Plan: Define the security doctrine, the
decision makers. operational concept and the means to achieve an efficient level
Act: Maintain and improve the actions. of security.
Resilience management: As global security is impossible to
achieve, resilient system designs and procedures should be
adaptable to the unpredictable. Contingency plans (business
continuity and emergency response and disaster plans) should be
formalized, tested and updated for rapid recovery from
disruptions.
Interdependencies: Evaluate contingency plans from an
infrastructure interdependencies perspectives and enhance
coordination with other infrastructure providers (e.g. electric
power, telecommunications, water, transportation).
Human resource: Background investigations for new hires and
periodic updates for current employees, define a hiring policy,
implement structured security requirements for critical suppliers
and partners. Formalized security policies and procedures. Raise
The management of security risks includes evaluating risks, employee awareness and education to be proactive on security
developing solutions, making decisions, implementing solutions, matters.
supervising, reviewing and improving security level. These are
Physical security: Identify and restrict access to sensitive areas,
essential follow-through actions of the risk management process.
implement access control list and badge program. Increase
After identifying and implementing additional countermeasures or security checkpoints, manned facilities, video surveillance, badge
mitigation efforts, it is essential to recalculate the risks. A risk identification, tracking of people and vehicles, escorted visitors
management scorecard is appreciated. and flyovers.
Information System and Network architecture: Define LAN/WAN
network perimeter, minimize external connections, keep up to
date mapping of network, enhance security of mission critical
systems, write and communicate an IT security policy. Enhance
traffic filtering, authentication controls, encryption, and access
controls, minimize or disable all unnecessary services and
software, filter emails, control viruses.
The Scope of Work that is proposed in this white paper details the
A yearly complete risk assessment is recommended.
development of a security strategy, which includes those best
practices.

6
Typical Thales Scope Of Work Identify constraints such as business, Thales considers the following actions:
industry, national and international Define a new security organization
Thales can assist organizations in setting up
regulations. including the Security Committee and
a program to develop an efficient security
risk management process. This program is Output: one or more Security Working Groups.
scheduled in five steps, as described in the Understanding of the context. Develop operational security procedures
figure below: including crisis management, incident
and antiterrorism responses.
The next step is to analyze the security risks Design security control rooms.
existing in the System. Define a training policy and develop a
Thales considers the following actions: training program i.e. operational and
Visit the System. technical.
Undertake the threat assessment, Implement physical security i.e.
the criticality assessment and the barriers, video surveillance, intrusion
vulnerability assessment. detection systems, access controls,
etc.
Do the risk assessment.
Implement information technology
Select risks to accept, to ignore, security i.e. LAN and WAN network,
to control or to insure. Information system architecture, server
Propose security objectives. hardening, etc.
Recommend mitigation security solutions. Implement communications security i.e.
Outputs: confidentiality, anti-jamming, resilience,
Security risk analysis results report. etc.
Implement individual protective
measures including personal protection
for personnel and family members.
Based on the decisions of the Security
Committee, a strategy is decided and a Develop specific software to produce
The original step is to define the scope of Security Master Plan is formalized to define daily scorecard of the risk situation
the Risk Management Program. the security doctrine and the operational (option: with geographic information
Thales considers the following actions: concept. system support).
Meet senior management. Thales considers the following actions: Develop resilience solutions based on
technology and organization.
Understand the business objectives. Define a security doctrine and an
operational concept. Maintain the solutions participating in the
Set up a Security Working Group.
Do-Check-Act process.
Define the scope of the System that will Formalize the Security Master Plan.
Outputs:
be concerned by the security risk Plan implementation of security
management program i.e. one or more solutions. Implementation and maintenance of the
infrastructures. security solutions.
Calculate the return on security
Outputs: investment (ROSI).
Definition of the Security Working Group. Propose a planning to implement the
Formalization of the scope of the security solutions.
System. Outputs:
Formalization of the planning of the Security Risk Management
security risk management program. Methodology document (adapted to
the organization).
Security Master Plan document.
Security doctrine and operational
The next step is to understand the concept document.
organization and the System concerned by
Implementation plan report.
the scope.
Return on security investment report. To support this SOW, Thales has developed
Thales considers the following actions:
a specific software CASRIM i.e. Critical
Understand the organization.
Asset Security RIsk Management. CASRIM
Understand the relations with The last step is the design and the helps Thales engineers to analyze the
government agencies. implementation of the actions described in situation and produces graphical outputs of
Understand the System. the Security Master Plan. the risk analysis.

7
>

Benefits
Determining the risk is essential since the management must
understand the threats, what assets are most important to protect,
and which of those important assets are most vulnerable.
Assessing security risk provides the value of an asset in relation to
the threats and the vulnerabilities associated with it. This aids the
management in balancing threats to vulnerabilities and the degree of
risk that the management is willing to accept by not correcting, or
perhaps being unable to correct, a vulnerability. For any vulnerability,
the management shall manage risk by developing a strategy to deter
incidents, employ countermeasures, mitigate the effects of an
incident, and recover from an incident.
The result of using a holistic methodology of this type ensures that
minimum appropriate investments are directed into security
solutions to reduce identified risks. In addition as there is integration
between the security technology, the organizations objectives and
processes, efficiencies can be gained whilst still remaining secure.
Security features that have been factored into initial infrastructure
facility design are more likely to be cost-effective, better integrated
and more operationally useful than those superimposed on existing
structures through add-ons or change orders. Likewise, security
features which have been coordinated early in the planning and
design process with the architects and other concerned regulatory
bodies, as well as with end-users (employees, clients, law
enforcement, public safety and regulatory agencies, and operations
and maintenance personnel) are more likely to be well received and
accepted, and thus more widely used and successful.

8
Oil & Gas Industry
Towards Global Security

Conclusion
By implementing a holistic security risk management methodology,
security solutions can be adapted to the changes in threats and
security risks, and the levels of investment can be adjusted in
accordance to the protection required.
The oil and gas cycle from initial field exploration through
production, transport and consumer retail operations is highly complex,
with countless potential weak links that are subject to security
breakdowns. The security should reflect the risk status and financial
resources of the infrastructure. Smaller infrastructures have limited
funding and have to plan their security projects with an eye toward
simplicity and manageable cost.
The methodology developed in this white paper is scalable and can cover
from a single infrastructure to the entire oil and gas chain starting with
exploration, development and production, then on through pipeline
transport to refineries and processing plants to storage facilities and
then on to distribution of refined products by land or sea, finishing at the
retail outlets.

Philippe Bouvier
Security Consulting
Thales - Security Solutions & Services Division

Organizations from around the world are already benefiting


from the use of this methodology including military
organizations, national airport authorities, energy and water
companies, financial institutions and transportation companies.
Thales brings together decades of experience in the oil and
gas industry and significant depth of knowledge of security
systems from its core competencies in defense and civil
businesses.
Thales is an unrivalled systems integrator of physical and IT
security solutions for the oil and gas industry.
If your organization would also like to reduce overall security
costs, improve the efficiency of security investment and
measurably reduce security risks then please contact your
local THALES representative for more information.

9
November 2007 - Photos: Thales, GettyImages

Thales
Security Solutions & Services Division
Security Systems
20-22 rue Grange Dame Rose
CS 80518
78141 Vlizy Cedex - France
Tel: +33 (0)1 73 32 00 00

Potrebbero piacerti anche