Geoscience Reference
In-Depth Information
example of a checklist methodology is the Security Vulnerability Self-Assessment
Guide for Small Drinking Water Systems. Under that methodology, the water sys-
tem is evaluated by answering questions for each area of concern: general security,
water source protection, treatment plant protection, hazardous materials, distribu-
tion plant protection, personnel controls, information/cyber controls, and public
relations information controls. Table 8.1 provides an example of checklist items
that are included in the self-assessment guide.
Based on the understanding that a methodology is a written documentation
of a systematic process to be used by specialized teams or even normal employees
to conduct an assessment of the risk or vulnerabilities of an asset or facility, cer-
tain other forms of tools or guidance documents were not included in this survey.
Guidance documents may present a general discussion of the objectives or scope of
a vulnerability, risk, or security assessment; may provide typical security measures
or criteria for various types of facilities or assets; or may outline potential mitiga-
tion measures for various types of vulnerabilities or assets. They do not, however,
provide a step-by-step systematic, documented process to be followed in order to
Table 8.1 Example Checklist Items from Security Vulnerability Self-Assessment
Guide for Small Drinking Water Systems
Category
Example Question
General security
Are facilities fenced, including well houses
and pump pits, and are gates locked where
appropriate?
Water sources
Are well vents and caps screened and
securely attached?
Treatment plant and suppliers
Can you isolate the storage tank from the
rest of the system?
Distribution
Do you control the use of hydrants and
valves?
Personnel
Are your personnel issued photo-
identification cards?
Information storage/computers/
controls/maps
Is computer access “password protected”
or are maps, records, and other
information stored in a secure location?
Public relations
Does your water system have a procedure
to deal with public information requests
and to restrict distribution of sensitive
information?
 
Search WWH ::




Custom Search