You can always press Enter⏎ to continue
General Vulnerability Assessment Tool GR/ENG 

General Vulnerability Assessment Tool GR/ENG 

 Under The Guidelines of U.S Department  of Homeland Security and Infrastructure Security Agency [July 2019]
140Questions

Encrypted

Secure Form

Language
  • English (UK)
  • Greek
  • 1
    Press
    Enter
  • 2
    Press
    Enter
  • 3
    An asset is any onsite or offsite activities; process(es); systems; subsystems; buildings or infrastructure; rooms; capacities; personnel; or response, containment, mitigation, resiliency, or redundancy capabilities that support the storage, handling, processing, monitoring, inventory/shipping, security, and/or safety of the facility’s chemicals. Assets include but are not limited to: • Physical security infrastructure, activities, procedures, personnel, or measures that comprise all or part of the facility’s system for managing security risks; • Physical safety infrastructure, activities, procedures, personnel, or measures that comprise all or part of the facility’s system for managing process safety and emergency response measures; • Cyber systems involved in the management of processes, process safety, security, product or material stewardship, or business management and control; • Vessels, process equipment, piping, transport vessels, or any container or equipment used in the processing or holding of chemicals; • On-site and off-site response protocols; • Warehouses, vaults, storage bays, and similar infrastructure; and • Specially trained, qualified personnel who are engaged in the management of security and safety risk.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 4
    A critical asset is any onsite or offsite activities; process(es); systems; subsystems; buildings or infrastructure; rooms; capacities; personnel; or response, containment, mitigation, resiliency, or redundancy capabilities that support the storage, handling, processing, monitoring, inventory/shipping, security, and/or safety of the facility’s chemicals, whose theft, diversion, loss, damage, disruption, or degradation would result in a significant adverse impact to human life, national security, or a critical economic asset.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 5
    Drag and drop files here
    Select files to upload
    Max. file size: 10.6MB
    Cancelof
    Press
    Enter
  • 6
    You must describe the detection security posture and potential vulnerabilities. Specifically, you are asked to provide a high-level description of the protective measures that are in place to monitor the perimeter and/or critical asset(s) and to detect attacks at early stages. For example, detection security measures may include some combination of (1) personnel or protective force monitoring through stationed positions or roving patrols, (2) intrusion detection systems (IDS), (3) closed circuit television systems (CCTV), (4) lighting, (5) process controls and alarms, and (6) inventory control. After describing the current detection security posture, you should use this information to identify any gaps or vulnerabilities in your posture. For example, potential vulnerabilities may include (1) access points to the perimeter and/or critical asset(s) not currently covered by a method of detection, (2) inoperable or ineffective monitoring system, and (3) lack of training or procedures to support the monitoring capability.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 7
    Here we describe the delay security posture and potential vulnerabilities. When answering this question we consider all delay measures used to secure the perimeter and/or critical asset(s) and afford the facility sufficient time in which to detect an attack prior to the attack becoming successful and allow for appropriate response. For example, delay security measures may include some combination of (1) fencing and walls, (2) vehicle barriers, (3) locking mechanisms, (4) access control, (5) key and credential accountability programs, and (6) screening and inspections. After describing the current delay security posture, you should use this information to identify any gaps or vulnerabilities in your posture. For example, potential vulnerabilities may include (1) access points to the perimeter and/or critical asset(s) lacking an appropriate barrier or locking mechanism, (2) inoperable or ineffective access control system, and (3) lack of training or procedures to support the delay capability.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 8
    Here we describe your response capability and potential vulnerabilities. To answer this question, we provide information related to developing and exercising an emergency plan within the facility to respond to security incidents internally and with the assistance of local law enforcement and first responders. For example, response security measures may include (1) crisis management plans, (2) elevated and specific threat procedures, (3) communications equipment, (4) outreach with local law enforcement and first responders, (5) security drills and exercises, and (6) release mitigation capabilities. After describing the current response capability, you should use this information to identify any gaps or vulnerabilities in your posture. For example, potential vulnerabilities may include (1) incomplete or lacking documentation, (2) insufficient resources internally or externally, and (3) lack of training or procedures to support the response capability.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 9
    Here we provide measures and vulnerabilities related to the policies, procedures and resources necessary to support the application and management of the facility’s security plan and posture. For example, these measures may include (1) inspection, testing, and maintenance program, (2) security awareness and training program, (3) personnel surety, (4) incident reporting and investigations, (5) security organization, and (6) recordkeeping. After describing the current policies, procedures, and resources, you should use this information to identify any gaps or vulnerabilities in your posture. For example, potential vulnerabilities may include (1) incomplete or lacking documentation, (2) insufficient resources to manage the security plan, and (3) lack of training to support the security plan.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 10
    Select Yes if the facility maintains onsite security personnel. Other wise, select No.
    Press
    Enter
  • 11
    If you select Yes for Question , you MUST answer this question.
    Press
    Enter
  • 12
    Provide an explanation
    Press
    Enter
  • 13
    If you select Yes for Question , you MUST answer this question.
    Press
    Enter
  • 14
    Press
    Enter
  • 15
    Yes if the facility operates 24 hours a day and 7 days a week.
    Press
    Enter
  • 16
    Enter the minimum number of personnel onsite for each time period.
    Press
    Enter
  • 17
    Yes if the facility utilizes posted personnel to provide surveillance of areas and identify unauthorized activities and/or access to materials.
    Press
    Enter
  • 18
    Yes if facility utilizes personnel for detection.
    Press
    Enter
  • 19
    Yes if the facility utilizes mobile patrol type at facility’s perimeter and any identified assets. 
    Press
    Enter
  • 20
    Yes if the facility utilizes mobile patrol type at facility’s perimeter and any identified assets. 
    Press
    Enter
  • 21
    Enter the estimated average response time for the initial offsite security representative to engage adversaries if an incident occurred at your facility AND; Mention if these response times are documented and tested in response exercises.
    Press
    Enter
  • 22
    Yes if the facility HAS a program to ensure and enhance communication between management and facility personnel to reduce workplace violence, prevent sabotage and improve security awareness.
    Press
    Enter
  • 23
    Select Yes if the facility utilizes an IDS. Otherwise, select No.
    Press
    Enter
  • 24
    If you select Yes for Question Q.3.1, you MUST answer this question.
    Press
    Enter
  • 25
    If you select Yes for Question Q.3.1, you MUST answer this question. Yes if the facility’s IDS can be controlled at the location.  No if the facility does not use the location to control the IDS.
    Press
    Enter
  • 26
    If you select Yes for Question Q.3.1, you MUST answer this question. Yes if facility’s IDS can be administered at that location.  No if the facility does not use the location for IDS administration .
    Press
    Enter
  • 27
    If you select Yes for Question Q.3.1, you MUST answer this question.Yes if facility’s IDS can be monitored at the location.  No if the facility does not use the location for monitoring the IDS. .
    Press
    Enter
  • 28
    Select the answer that most accurately describes the monitoring frequency of your facility’s IDS.
    Press
    Enter
  • 29
    Here we describe intrusion detection technology deployed within the facility. If sensor exists then yes
    Press
    Enter
  • 30
    Type
    Press
    Enter
  • 31
    Here we describe intrusion detection technology deployed within the facility. If sensor exists then yes
    Press
    Enter
  • 32
    Type
    Press
    Enter
  • 33
    Here we describe intrusion detection technology deployed within the facility. If sensor exists then yes
    Press
    Enter
  • 34
    Type
    Press
    Enter
  • 35
    Here we describe intrusion detection technology deployed within the facility. If sensor exists then yes
    Press
    Enter
  • 36
    Type
    Press
    Enter
  • 37
    Here we describe intrusion detection technology deployed within the facility. If sensor exists then yes
    Press
    Enter
  • 38
    Type
    Press
    Enter
  • 39
    Here we describe intrusion detection technology deployed within the facility. If sensor exists then yes
    Press
    Enter
  • 40
    Here we describe intrusion detection technology deployed within the facility. If sensor exists then yes
    Press
    Enter
  • 41
    Yes if the facility provides sufficient illumination levels for security, safety, and surveillance. (“Sufficient illumination” is lighting that permits individual(s) to perform their duties, provide appropriate surveillance, and properly utilize all security equipment (e.g., CCTV systems).
    Press
    Enter
  • 42
    Yes if security lighting has a backup power supply.
    Press
    Enter
  • 43
    Yes if lighting system covers the area of the facility.  No if lighting system DOES NOT cover the area.
    Press
    Enter
  • 44
    Yes if lighting system covers the area
    Press
    Enter
  • 45
    Yes if lighting system covers the area
    Press
    Enter
  • 46
    Yes, if the facility utilizes a CCTV system. Otherwise,  No.
    Press
    Enter
  • 47
    Yes if the CCTV system has a backup power supply. Otherwise,  No.
    Press
    Enter
  • 48
    Yes if CCTV system covers the area within the facility. Otherwise,  No.
    Press
    Enter
  • 49
    Yes if CCTV system is integrated with access control system (ACS). Otherwise,  No.
    Press
    Enter
  • 50
    Yes, if CCTV system is integrated with the intrusion detection system. Otherwise,  No.
    Press
    Enter
  • 51
    Yes if your CCTV system can be controlled at the location.Otherwise,  No
    Press
    Enter
  • 52
    Yes if CCTV system can be administered at the location. Otherwise,  No.
    Press
    Enter
  • 53
    Yes if CCTV system can be monitored at the location. Otherwise,  No.
    Press
    Enter
  • 54
    Describe
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 55
    Answers below are positive percentages integer and not greater than 100.
    Press
    Enter
  • 56
    Press
    Enter
  • 57
    Here we describe the process control functions supporting facility’s detection measures.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 58
    Press
    Enter
  • 59
    Press
    Enter
  • 60
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 61
    Delay means physically limiting the accessibility of the facility or critical asset(s) such that there is a low likelihood of an adversary successfully breaching the facility perimeter or critical asset(s) or using the area immediately outside of the facility’s perimeter to launch an attack. Completely adequate perimeter security is rarely achievable through the deployment of a single security barrier; rather an optimal security solution typically involves the use of multiple protective measures providing layers of security. Layering of security measures can be achieved in many different manners, such as incorporating different types of security measures (e.g., integrating physical protective measures, such as barriers, lighting, and electronic security systems, with procedural security measures, such as procedures guiding how security personnel should respond to an incident). A layered approach to perimeter security potentially increases the opportunity to use existing facility and natural features or more applicable technologies to meet the performance objectives at a reduced cost.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 62
    Yes if facility has a perimeter.
    Press
    Enter
  • 63
    Yes if facility has a defined perimeter marked by company property, has no trespassing signage, fencing, or other barriers.
    Press
    Enter
  • 64
    Yes if facility uses the measure to define its perimeter. Select No if facility does not use the perimeter characteristic.
    Press
    Enter
  • 65
    Yes if the facility maintains standoff distance. Standoff distance is a security measure that focuses on preventing unscreened people and vehicles from approaching within a certain distance of the facility perimeter or a critical asset. Otherwise, select No.
    Press
    Enter
  • 66
    Yes if the facility has topographical barrier. Select No if the facility does not have the barrier.
    Press
    Enter
  • 67
    Drag and drop files here
    Select files to upload
    Max. file size: 10.6MB
    Cancelof
    Press
    Enter
  • 68
    Yes if the facility has topographical barrier. Select No if the facility does not have the barrier.
    Press
    Enter
  • 69
    Drag and drop files here
    Select files to upload
    Max. file size: 10.6MB
    Cancelof
    Press
    Enter
  • 70
    Yes if the facility has Vegetation near to fences. Select No if the facility does not have any Vegetation.
    Press
    Enter
  • 71
    For example, a clear zone (i.e., zones that are not subject to environmental disturbances, such as foliage, birds, squirrels, etc.) can be present on either side of the facility’s fence that allows persons to be detected at the boundary.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 72
    Press
    Enter
  • 73
    Press
    Enter
  • 74
    Press
    Enter
  • 75
    Press
    Enter
  • 76
    Yes if the facility uses the anti- personnel barrier. Select No if the facility does not use the barrier.
    Press
    Enter
  • 77
    Yes if the facility uses the Access Controll. Select No if the facility does not use the barrier.
    Press
    Enter
  • 78
    Press
    Enter
  • 79
    Press
    Enter
  • 80
    Press
    Enter
  • 81
    Press
    Enter
  • 82
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 83
    Press
    Enter
  • 84
    Press
    Enter
  • 85
    Press
    Enter
  • 86
    Press
    Enter
  • 87
    Press
    Enter
  • 88
    Press
    Enter
  • 89
    Press
    Enter
  • 90
    Press
    Enter
  • 91
    Press
    Enter
  • 92
    Press
    Enter
  • 93
    Press
    Enter
  • 94
    Yes if your facility uses the Access Control System (ACS) interface. Select No if your facility does not use the interface.
    Press
    Enter
  • 95
    Press
    Enter
  • 96
    Press
    Enter
  • 97
    Press
    Enter
  • 98
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 99
    Yes if your facility uses the Access Control System (ACS) interface. Select No if your facility does not use the interface.
    Press
    Enter
  • 100
    Press
    Enter
  • 101
    Press
    Enter
  • 102
    Press
    Enter
  • 103
    Press
    Enter
  • 104
    Press
    Enter
  • 105
    Press
    Enter
  • 106
    Press
    Enter
  • 107
    Press
    Enter
  • 108
    Press
    Enter
  • 109
    Press
    Enter
  • 110
    Press
    Enter
  • 111
    Press
    Enter
  • 112
    Press
    Enter
  • 113
    Press
    Enter
  • 114
    Press
    Enter
  • 115
    1. Facilitie΄s Key Inventory Measure. 2. Facilitie's key compromise procedures.
    • Huge
    • Large
    • Normal
    • Small
    Ok
    quoteCreated with Sketch.
    Ok
    Press
    Enter
  • 116

    Response within the security plan context primarily refers to the response of appropriately trained personnel (either facility personnel or external first responders) to a threat or actual theft or release of Chemical of Interest (COI). This includes plans to mitigate or respond to the consequences of a security incident and to report security incidents internally and externally in a timely manner. An appropriate response should involve not only designated facility emergency response personnel but all facility personnel (including security personnel), as well as local law enforcement and other off-site emergency responders. Response security measures should address the identification of hazards and the proper response plans. Response plans should identify the numbers, capabilities, equipment, and training of the various response personnel. Properly equipped personnel, who understand the potential consequences of a security incident and the need for timely, effective actions, coupled with well- rehearsed response plans reduce the probability of an attack achieving the adversaries’ desired goals. Additionally, response personnel practiced in their response plans help ensure that onsite responders and local law enforcement, firefighting, ambulance, mutual aid, and rescue agencies are familiar with the facility and the chemicals stored onsite and that they are not impeded from reaching the location of the security event.

    Press
    Enter
  • 117
    Press
    Enter
  • 118
    Press
    Enter
  • 119
    Press
    Enter
  • 120
    Press
    Enter
  • 121
    Press
    Enter
  • 122
    Press
    Enter
  • 123
    Documented process for increasing security measures during periods of elevated threats
    Press
    Enter
  • 124
    Press
    Enter
  • 125
    1 of 4
    Press
    Enter
  • 126
    Press
    Enter
  • 127
    Press
    Enter
  • 128
    Press
    Enter
  • 129
    Press
    Enter
  • 130
    Press
    Enter
  • 131
    Press
    Enter
  • 132
    Press
    Enter
  • 133
    Press
    Enter
  • 134
    1 of 5
    Press
    Enter
  • 135
    1 of 5
    Press
    Enter
  • 136
    1 of 8
    Press
    Enter
  • 137
    Press
    Enter
  • 138
    Press
    Enter
  • 139
    Press
    Enter
  • 140
    Press
    Enter
  • Should be Empty:
Question Label
1 of 140See AllGo Back
close