Appendix Risk Assessment
and Management Tools
1 Introduction
1.1 The methodology presented herein includes
five main phases:
-
.1
Threat assessment identifying
the different threat scenarios and determining the likelihood of each
occurring based on intent and capability.
-
.2
Impact assessment considering
what the consequence of each threat scenario materializing would be
and how much effect this would have.
-
.3
Vulnerability assessment
determining what the key assets are and how they can be exploited,
examining the mitigating controls in place and their effectiveness
and considering residual weaknesses.
-
.4
Risk scoring making an
assessment of the risk given all the factors noted in phases 1, 2
and 3.
-
.5
Risk management developing
action plans, where appropriate, to address weaknesses and mitigate
identified residual risks.
2 Risk register and terminology
2.1 The risk register
2.1.1 The risk register is a tool to document
different scenarios and the associated findings on threat (likelihood
based on intent and capability), impact, vulnerability and risk score.
The format (at Table 1, below) is listed below along with accompanying
explanations for each column. A step-by-step guide for completing
the risk register follows the definition as well as details on the
scoring mechanism.
Table 1
|
Reference
number
|
Threat
scenario
|
Lead
organization
|
Support
organizations
|
Threat
(likelihood)
|
Impact
|
Vulnerability
|
Mitigating
controls
|
Key
assets
|
Vulnerability score
|
Risk score
|
1
|
|
|
|
|
|
|
|
|
|
2
|
|
|
|
|
|
|
|
|
|
Column 1: Reference number
- Each scenario should be listed with an assigned number so that
it can be easily identified and its development tracked.
Column 2: Threat scenario
- This column is for the listing of the threat by name and a brief
description of what it entails.
Column 3: Lead organization
- Each scenario needs to have a lead organization or coordinating
body identified so that initial points of contact and responsibilities
may be established.
Column 4: Support organizations
- List of those agents directly involved but not leading such as
local police, fire departments, coast guards, etc.
Column 5: Threat (likelihood)
- This column gives the likelihood or probability of the situation
coming to fruition if there were no security measures or mitigating
controls in place to prevent them. It is scored on the basis of the
intent and capability of those wishing to commit the act. Scoring
for this element is explained later on in paragraph 3.4.
Column 6: Impact
- This column indicates the impact or consequence should the incident
occur. Again scoring for this element is explained further in paragraph
4.
Column 7: Key assets
- This column contains a list of the most important resource key
assets which could be affected by the scenario; this should include
people, objects, physical infrastructure and equipment. By listing
these assets a risk assessor is better able to consider what safeguards
are in place and hence assess the vulnerability more accurately.
Column 8: Mitigating controls
- List and consider any mitigating controls (security measures)
which are already in place to protect the key assets.
Column 9: Vulnerability score
- This is an assessment of the characteristics of a target or asset
that can be exploited, balanced against mitigating controls (listed
above). The scoring for this is also included later in paragraph 5.4
and considers what effect the mitigating controls have on the threat,
the associated impact or both.
Column 10: Risk score
- All of the information gathered on threat, impact and vulnerability
is used to score the risk. Groups or individuals should use the following
formula to produce the score for each scenario:
3 Threat assessment
3.1 What to consider
- Threat scenarios which could exist (or do exist);
- Who the lead and support organizations are for each scenario;
and
- How to score accurately the threat and impact.
3.2 Decide which threat scenarios apply
3.2.1 The process should identify criminal acts
which could take place.
3.2.2 The first task when completing a risk register
is to consider and agree on which scenarios or events could apply.
3.2.3 It is useful to have a (brainstorming) session
where subject matter experts consider:
- whether there are any additional scenarios, which should be listed;
and
- any refinements needed to develop to the initial list.
3.2.4 It is useful when producing this list to
consider potential perpetrators:
-
.1 Who are the groups and individuals who may
act? For example:
- Terrorists
- Criminals
- Political groups
- Ideological groups
- Activists (e.g., animal rights/environmental)
- Disruptive passengers
- Employees
- Mentally unstable
- Those with inadequate documentation
-
.2 How do perpetrators operate?
-
.3 Some variables to consider in how they operate
include:
- Reconnaissance, advanced planning; and
- Is there a precedent?
-
.4 What is their intent and their capability to
act?
-
4.1 Intent
-
- Definition: Motivation is what drives a perpetrator (e.g., financial
gain, publicity, vengeance). Intent is who/what they want to harm
to achieve their goal.
-
4.2 Capability
-
Variables to consider include:
- numbers/organization
- status
- training
- funding
- weapons available
- track record
- support
- operational security
3.3 Decide lead and support organizations
3.3.1 The lead organization(s) should either:
-
.1 own the assets;
-
.2 set the policy;
-
.3 have legal responsibility for, or have the
major role in, mitigating or responding to a particular threat; or
-
.4 a combination of the above.
3.3.2 Distinctions should be made where appropriate
between responsibilities for (i) preventive/protective security measures,
(ii) contingency planning and reactive security measures to deal with
and contain an incident, and (iii) implementation of the measures
in (i) and (ii). There may be a different lead organization for each
of these where responsibilities vary depending on type of threat,
location and method.
3.3.3 Support organizations will be those which
have a supporting role in mitigating the threat but don't meet the
criteria above. The risk assessor may decide all stakeholders are
support organizations in being vigilant, providing a deterring presence
and sharing information with others.
For some threats, identifying lead and support organizations
is not a simple task. There may be differing views but it is important
that consensus is reached, particularly as later on lead organizations
will have a primary role in developing and delivering action plans,
where these are necessary.
There may, quite correctly, be more than one lead organization
but if the group has listed several, it may be worth re-evaluating
to check accuracy and minimize the potential for confusion and duplication.
3.4 Scoring the threat
The score should reflect the likelihood of each of the threat
scenarios in the register occurring if there were no security measures
or mitigating controls in place to prevent them.
3.4.1 Checklist
To accurately score the threat, assessors should:
- consider local and international intelligence/knowledge about
similar events which have or could have occurred;
- discuss how likely it would be for each of the scenarios in the
register to occur at the port if there were no security measures in
place;
- read the definitions in Table 2 below
and decide which score best applies. N.B. this is the score without
any mitigating factors in place.
Risk register - scoring
definitions - threat
Score
|
Likelihood
|
Criteria
|
4
|
PROBABLE
|
|
There have been previous reported incidents
|
|
There is intelligence to suggest that there are groups or
individuals capable of causing undesired event
|
|
There is specific intelligence to suggest that the vessel or type
of vessel is a target
|
3
|
LIKELY
|
|
There have been previous reported incidents
|
|
There is intelligence to suggest that there are groups or
individuals currently capable of causing undesired event
|
|
There is general intelligence to suggest that the vessel or type of
vessel may be a likely target
|
2
|
UNLIKELY
|
|
There is intelligence to suggest that there are groups or
individuals capable of causing undesired event
|
|
There is nothing to suggest that the vessel or type of vessel is a
target for the undesired event
|
1
|
IMPROBABLE
|
|
There have been no previously reported incidents anywhere
worldwide
|
|
There is no intelligence to suggest that there are groups or
individuals capable of causing undesired event
|
The risk register is a template, rather than a straight jacket.
Administrations are free to employ an alternative method of scoring
if they find it produces a more logical and accurate assessment of
the threats and risks.
Remember to apply the agreed rules around confidentiality.
4 Impact assessment
4.1 Checklist
- List examples of the type and magnitude of impact that might be
expected if the event happened; e.g., loss/damage to people, infrastructure,
operations, finance or reputation;
- Assessors may wish to consider using or modifying the table at Table 3 below to record discussions.
Note that the list of possible impacts highlighted below is not exhaustive.
Table 3
|
|
Loss of life
|
Personal injury
|
Loss/damage to vessel
|
Damage to vessel infrastructure
|
Loss of use of equipment
|
Disruption to services
|
Financial loss to vessel
|
Damage to reputation
|
Publicity to perpetrator
|
Improvised Explosive Device (IED)
|
|
|
|
|
|
|
|
|
|
Sabotage
|
|
|
|
|
|
|
|
|
|
Arson
|
|
|
|
|
|
|
|
|
|
Unauthorized access
|
|
|
|
|
|
|
|
|
|
Theft of vessels
|
|
|
|
|
|
|
|
|
|
4.2 This information should provide a robust basis
for scoring. To score the impact accurately, groups or individuals
should, in the same way as for threat:
- consider the impact should the event occur;
- consider the impact on the vessel (to safety, security, finance
and reputation) of each of the risks occurring if there were there
no security measures in place;
- consider how to record the scores allocated under each of the
sub-headings. For simplicity an average may be taken in most cases.
Where one score differs markedly from the other three it may be best
to record it separately for future consideration rather than losing
it in an average;
- read the definitions in Table 4 below
and decide which one best applies (remember the score is without mitigating
factors in place):
Risk register - scoring
definitions - threat
Score
|
Likelihood
|
Criteria
|
4
|
SUBSTANTIAL
|
|
Potential for: multiple
fatalities
|
|
Serious loss or damage to
assets, infrastructure, vessel
|
|
Economic cost of more than
(agreed figure)
|
|
Widespread coverage resulting in
serious reputational damage
|
3
|
SIGNIFICANT
|
|
Potential for: loss of
life
|
|
Significant but repairable loss
or damage to assets, infrastructure or craft
|
|
Economic cost of less than
(agreed figure)
|
|
National adverse media
coverage
|
2
|
MODERATE
|
|
Potential for: major
injuries
|
|
Short-term minor loss or
damage
|
|
Economic cost of less than
(agreed figure)
|
|
Major local reputational
damage
|
1
|
MINOR
|
|
Potential for: minor
injuries
|
|
Minimal operational
disruption
|
|
Economic cost of less than
(agreed figure)
|
|
Minor reputational
damage
|
5 Vulnerability assessment
The next step involves identifying the key assets or targets,
their relevant characteristics and consideration of the controls in
place to protect them and prevent criminal acts taking place. Assessors
should first draw up a list of key assets that could be affected by
a particular threat. This should include people (crew and passengers),
objects and physical infrastructure.
5.3.4 Assessors may find it useful to complete Table 6, below, as they go through
the Vulnerability stage.
-
.1 What are the key targets people, critical
infrastructure, communications and control, and support services?
-
.2 What are the systems designed to deter, detect,
delay or deal with unlawful acts?
-
.3 What are the weaknesses in these systems, including
consideration of predictability and opportunity?
Table 6
|
Target
|
Strengths (i.e. systems in place to deter ...)*
|
Weaknesses**
|
Opportunities
|
Predictability
|
Target Vulnerability (High/Medium /Low)
|
What Stakeholders have a part to play in reducing the vulnerability of
this target?
|
How?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Key
|
|
|
|
|
|
|
|
Strengths
|
=
|
systems designed to deter, detect, or deal with unlawful acts:
|
Weaknesses
|
=
|
includes things like limited intelligence to hand indicating the
likelihood of attack and the desirability of the target for the
perpetrator;
|
Opportunity
|
=
|
opportunities for the perpetrator to exploit a loophole, conduct
reconnaissance, etc.; and
|
Predictability
|
=
|
the
ways in which a target operates which make it predictable
|
|
|
|
|
|
|
|
|
* Examples of systems designed to deter, detect or deal with unlawful
acts
|
|
Company employee vetting system
|
|
Port security vetting pass system
|
|
Criminal record checks
|
|
Crew search and vehicle checks
|
|
CCTV
|
|
Restricted area, perimeter fencing and access
control
|
|
Control authority exercises
|
|
Uniformed police presence
|
|
Public awareness
|
|
Cargo/catering/cleaning regimes
|
|
Business continuity plans
|
|
|
|
|
|
|
|
|
** Examples of weaknesses
|
|
Accountability and funding
|
|
Sheer volume of people and goods
|
|
No searching (or regular searching)
|
|
No search on exit as routine/norm
|
|
Ability to respond to regulatory demands
|
|
Exemptions in general (e.g., VIPs)
|
|
Crew shortages
|
|
Indifference
|
|
Corruption
|
|
Confusing legislation
|
|
False documentation
|
|
Poor surveillance
|
|
|
|
|
|
|
|
|
Key issues to consider in vulnerability work
|
|
Need to consider high value assets
|
|
Identify which stakeholders have a part to play in reducing
the vulnerability of the target and how. This will assist in defining
who should work together on what
|
Access to sensitive area not
inside boundary of RA
Table 7 Access to sensitive area not inside boundary of RA
|
4
|
No mitigating controls
|
No counter measures in
place
|
3
|
Some mitigating controls
|
Some counter measures in
place
|
2
|
Acceptable management of the
risk
|
Measures in place sufficiently
reasonable to manage the threat down to an acceptable level
|
1
|
Robust and effective counter
measures
|
Full and complete measures in
place
|
5.1 Mitigating controls
Identifying the current mitigating controls and assessing
how effective they are is a vital but time consuming and intensive
process. It may be useful to use the following processes:
5.2 Process mapping
5.2.1 Drawing up process maps can be helpful in
understanding complete processes, how each process works, who plays
what role and what point, what the key points, strengths and weaknesses
are and in identifying where and how aspects may be exploited.
5.2.2 The perceived benefits of process mapping
are that it provides a genuinely holistic view of a process and is
potentially a better way of:
- appreciating and accurately evaluating the various processes that
take place;
- identifying synergies, duplication and gaps; and
- evaluating what action planning is required and how effective
it is.
5.2.3 Rather than considering each threat separately,
process mapping requires examination of the crime and security picture
either:
- by article: vessel's stores; cargo; or
- by individual: crew or passengers.
5.2.4 Process mapping involves mapping the complete
journey of a person or item and the evaluation and plotting of each
potential threat, early warning indicator and mitigating measure in
place. It should encompass all areas where and all times when the
criminal act could be perpetrated.
5.3 Event cause analysis
5.3.1 This is a useful method to establish how
a risk could materialize at the port and what areas of control need
to work well.
5.3.2 Taking in turn the risks, the following
five questions should be considered:
- What type of individuals or groups would want to carry out this
event?
- Where is this event likely to take place? (Targeted at what?)
- How would it be carried out?
- What is going to deter or delay or detect or deal with them?
- What can go wrong? (e.g., poor communication).
5.3.3 Assessors may want to use the table in Table 5 below to note all this information
down.
This is a useful review tool to reconsider the effectiveness
of control measures highlighted in the risk register and identify
where there are weaknesses and gaps.
Table 5
|
CONTROL MEASURES REVIEW
|
Possible Actions
|
Breach of Security
|
Security patrols
|
Deterrence and
|
Monitoring of security
equipment
|
Detection
|
Education and training of
crew
|
Pre-empt breach or
|
|
Swift response
|
|
Crew awareness
|
Inadequate resources
|
Discuss issues with relevant
personnel
|
Gaps in security
coverage
|
Consider redeployment of
resources
|
Insufficient training
|
Organize crew training
programme
|
5.4 Vulnerability assessment scoring
5.4.1 Evaluation of targets' characteristics on
the one hand and the early warning indicators, embedded monitors and
existing mitigating controls on the other should be translated into
a vulnerability score. Table 7 below
illustrates a possible scoring system to be used for assessing vulnerability:
6 Risk scoring
6.1 Risk score
6.1.1 Finally, all of the information gathered
on threat, impact and vulnerability should be used to identify and
assess the residual risk. To score the risk accurately, groups or
individuals should use the formula:
RISK
|
= |
THREAT x IMPACT x VULNERABILITY
|
6.1.2 So, for example, using an initial threat
score of 2, an impact score of 4 and, where there are no mitigating
measures in place (a vulnerability score of 4) the residual risk score
would be 32 (2 x 4 x 4 = 32). Where measures are adjudged to reduce
the vulnerability to some extent, but not to an acceptable level,
the residual score would be 24. The threat and impact scores of 2
and 4 remain but the vulnerability score is now 3; hence 2 x 4 x 3
= 24. And so on. There is a presumption that no threat scenario can
be managed totally out of existence, i.e. you can never have a threat,
impact or vulnerability score of 0.
6.1.3 It should be noted that scenarios with differing
individual threat, impact and vulnerability scores can have the same
overall risk score. For instance a particular scenario may have a
threat score of 2 an impact score of 2 and a vulnerability score of
2 whereas another scenario may have a threat score of 1, an impact
score of 4 and a vulnerability score of 4. Both scenarios produce
a risk score of 16 despite having differing individual values of threat,
impact and vulnerability.
6.1.4 Risk can then be ranked into three broad
categories: high, medium and low:
- HIGH - A residual risk score of 27 or more.
- MEDIUM - A residual risk score of between 8 and 24.
- LOW - A residual risk score of 6 or less.
7 Risk management
7.1 The risk management phase considers how best
to address the weaknesses identified during the vulnerability and
risk scoring stages and how to mitigate the risk effectively and practically
on a sustainable long-term basis.
7.2 This can be achieved by all stakeholders working
together to agree joint tactical action plans. The checklist below
gives some pointers on how to work through the process:
7.3 Drawing up action plans
|
Consider the overall risk profile from the risk register:
|
|
|
High =
|
Unacceptable Risk seek
alternative and/or additional control measures,
|
|
|
Medium =
|
Manageable risk requires
management/monitoring,
|
|
|
Low =
|
Tolerable risk no further
control measures needed.
|
|
Reconsider the Control Measures Review table. The
concerns and do nexts should assist in drawing up action
plans.
|
|
Agree the priorities for action. These should be the high risks in
the first instance.
|
|
Identify what actions can and need to be taken to bring the risk down
to a medium: manageable risk and from there to a low: tolerable
risk.
|
|
Agree who will be the lead agency in implementing changes.
|
|
Consider the resource implications.
|
|
Document recommendations.
|
|
Document actions taken and link these back to the threats
in the risk register:
|
|
|
-
|
Timetable for
action
|
|
|
-
|
Review of
actions
|
|
Agreed actions should be recorded and progress monitored.
Such records are also evidence of decisions taken.
|
|
Assessors may need to develop further systems for sharing
information and intelligence.
|
|
Look for opportunities to share resources and assist
others.
|
7.4 Actions will probably fall into the following
categories:
- Actions that may be implemented by the group;
- Tactical or operational issues; and
- National, policy or strategic issues.
8 Re-evaluation
8.1 Risk assessments should be reviewed as conditions
change, or on a regular schedule (e.g., annually).
|