|
NPHS 1510: Federal and International Framework |
Emergency Problem Solving, Decision-Making and Risk |
|
|
Critical Assets |
|
The US Department of Homeland Security is responsible for managing the security of government owned and privately owned assets designated as critical infrastructure or key resources (CI/KR). The 18 critical infrastructures and the lead agency responsible for their direct oversight is listed below. |
|
Infrastructure Sector | Responsible Agencies |
Agriculture and Food | Department of Agriculture Department of Health and Human Services |
Defense Industrial Base | Department of Defense |
Energy | Department of Energy |
Healthcare and Public Health | Department of Health and Human Services |
National Monuments and Icons | Department of the Interior |
Banking and Finance | Department of the Treasury |
Water | Environmental Protection Agency |
Chemical | Department of Homeland Security |
Commercial Facilities Critical Manufacturing Dams Emergency Services Nuclear Reactors, Materials, and Waste | Office of Infrastructure Protection |
Information Technology Communications | Office of Cybersecurity and Communications |
Postal and Shipping | Transportation Security Administration |
Transportation Systems | Transportation Security Administration United States Coast Guard |
Government Facilities | Immigration and Customs Enforcement Federal Protective Service |
|
|
Historically these agencies have performed risk analyses on the critical infrastructure in their sector. |
|
Asset Risk Assessment |
Below is a list of some of the more popular risk assessment methodologies.
Some of the risk assessment methodologies are generic (e.g. CARVER, RAAMCAP). Others, such as the RAM Series developed by Sandia Laboratories, are specific to an industry or target.
- CARVER: Criticality, Accessibility, Recoverability, Vulnerability, Effect/Espyability (Notoriety), Redundancy/Recognizability
- MSHARPP: Mission, Symbolism, History, Accessibility, Recognizability, Population, Proximity of secondary/collateral targets
- PSRAT: Port Security Risk Assessment Tool
- ACAMS: Automated Critical Asset Management System
- HLS-CAM: Homeland Security-Comprehensive Assessment Tool
- PairPM: Pairwise Program Management
- RAMCAP: Risk Analysis and Management for Critical Asset Protection
- CAPRA: Critical Asset & Portfolio Risk Analysis
- Sandia Labs RAM Series
- RAM-D: Dams
- RAM-C: Communities
- RAM-W: Water (water treatment and wastewater)
- RAM-WSM: Small Water Utilities
- RAMT: High Voltage Electric Transmission Lines/ oil transmission lines
- RAM-CF: Chemical Facilities
- RAM-FE: Fossil Energy
- RAMPART: Property Analysis and Ranking Tool
- SEA: Security Evaluation Assessment, USAF/Navy Facilities
- VSAT Water and Wastewater: Vulnerability Self Assessment Tool
In this session we will explore two of the more mature and comprehensive methodologies: CARVER and RAMCAP.
|
|
RAMCAP: Risk Analysis and Management for Critical Asset Protection |
|
RAMCAP was developed by the American Society of Mechanical Engineers (ASME) under contract from the Department of Homeland Security. It is an extensive system designed to address the specific problems associated with heavy industrial facilities particularly those that might become terrorist targets (e.g. nuclear power plants, chemical actories, etc.) RAMCAP is comprised of seven steps of analysis. The RAMCAP package has extensive worksheets for recording and compuing the elements of the assessments at each step.
- Asset Characterization and Screening -
the analysis of a facility or system’s operational processes to identify critical assets and hazards, while making a preliminary forecast of potential consequences from a terrorist act. The assets evaluated include both physical and cyber assets. The analysis includes identification of existing layers of protection.
- Threat Characterization -
the identification of specific and general modes of attack that may be used by terrorists against a given target. DHS has developed a set of baseline threats that are to be evaluated for each asset or system. These threats are based on the collective activities of law enforcement and intelligence organizations that are charged with developing an understanding of the means, methods and motivations of terrorists. The threats include various modes of attack (e.g., air, land, and water), and various sizes of attacks (e.g., small, medium, large). The owner/operator then applies these threats to the facility or system based on in-depth knowledge of the operation’s assets. Consequently, not all threats apply to all assets, so some threats will be screened from further consideration.
- Consequence Analysis -
the identification of the worst reasonable consequences that could be generated by the specific threat. This step looks at facility or system design, layout and operation in order to identify the types of consequences that might result. Consequences that are quantified include financial costs, fatalities and injuries. Consequences that are noted qualitatively are psychological impacts and effects on national security or government functions. The SSGs describe the step-by-step approach to consequences based on the spectrum of threats as defined by DHS.
- Vulnerability Analysis -
the determination of the likelihood for a successful attack using a specific threat on a particular asset. This involves analyzing the existing security capabilities, countermeasures and mitigation strategies and their effectiveness in reducing the probability of a successful attack.
- Threat Assessment -
Threat assessment includes two steps: an evaluation of asset attractiveness and a full threat assessment. Asset assessment considers the perceived value to the terrorist of attacking a given facility or system considering the deterrence value of security measures and the robustness of the potential target. This area is assessed by the owner/operator. Threat assessment is performed by DHS and includes normalized assessments of attractiveness in light of the high level objectives of terrorists and intelligence-based assessments of adversary capabilities and intent.
- Risk Assessment -
a systematic and comprehensive evaluation of the previously developed terrorism related data for a given facility or system. The owner/operator risk assessment creates a foundation for selecting strategies and tactics to defend against terrorist attacks by establishing priorities based on risk.
- Risk Management -
the deliberate process of understanding risk and deciding upon and implementing action (e.g., defining security countermeasures, consequence mitigation features or characteristics of the asset) to achieve an acceptable level of risk at an acceptable cost. Risk management is characterized by the identification, evaluation and control of risks to a level commensurate with an assigned or accepted value.
|
|
CARVER: Criticality, Accessibility, Recoverability, Vulnerability, Effect/Espyability (Notoriety), Redundancy/Recognizability |
|
CARVER is a comprehensive risk assessment methodology originally developed by the US military during World War II and extended. It is in wide use by all branches of the US Defence establishment and by a number of corporations. CARVER is an acronym for the measurement dimensions of the methodology. The dimensions and a n overview of their interpretation are given below. |
- Criticality – Single points of failure, Degree of importance to system operations
- Accessibility – Ease of access to critical assets
- Recoverability – The time and effort to recover system operation after an adverse event
- Vulnerability – Level of exposure to attack based on adversary capability
- Effect – Scope and magnitude of adverse consequences that would result from malicious actions and responses to them
- Recognizability – Likelihood that potential adversaries would recognize that an asset was critical
|
Each potential target asset is assessed along the dimensions using a matrix format (i.e. the CARVER Matrix). Each subsystem or significant component of the asset is assessed. Each assessment for each CARVER dimension is given a score on a scale of 1 to 10 where a lower score is favorable to the attacker and a higher score is favorable to the defense of the asset. The individual CARVER scores are summed for each component to give a total score. Lower total scores signify that a component is at a higher risk. A typical CARVER Matrix is given below. |
|
| Criticality | Accessibility | Recoverability | Vulnerability | Effect | Redundancy | Total Score |
Target Component | |
Component A | 10 | 8 | 5 | 6 | 6 | 4 | 39 |
Component B | 4 | 4 | 8 | 3 | 6 | 8 | 33 |
Component C | 10 | 8 | 10 | 9 | 6 | 4 | 47 |
Component D | 3 | 3 | 8 | 6 | 6 | 7 | 33 |
Component E | 6 | 8 | 6 | 2 | 3 | 4 | 29 |
|
|
A CARVER Matrix spreadsheet template can bee downloaded by clicking here. |
|
Exercise |
Develop a risk assessment for the University of Pittsburgh using the CARVER methodology.
|
|
|
|
|
|
|
Copyright © 2011 Ken Sochats |