Appendix – Risk Assessment and Management Tools
Clasification Society 2024 - Version 9.40
Statutory Documents - IMO Publications and Documents - Circulars - Maritime Safety Committee - MSC.1/Circular.1283 – Non-Mandatory Guidelines on Security Aspects of the Operation of Vessels Which do not Fall Within the Scope of SOLAS Chapter XI-2 and the ISPS Code – (22 December 2008) - Annex – Guidelines on Security Aspects of the Operation of Vessels which do not Fall Within the Scope of SOLAS Chapter XI-2 and the ISPS Code - Part 1: Information for Member States and other authorities with responsibility for administering non-SOLAS vessels (other authorities) - Appendix – Risk Assessment and Management Tools

Appendix – Risk Assessment and Management Tools

1 Introduction

  1.1 The methodology presented herein includes five main phases:

  • .1 Threat assessment – identifying the different threat scenarios and determining the likelihood of each occurring based on intent and capability.

  • .2 Impact assessment – considering what the consequence of each threat scenario materializing would be and how much effect this would have.

  • .3 Vulnerability assessment – determining what the key assets are and how they can be exploited, examining the mitigating controls in place and their effectiveness and considering residual weaknesses.

  • .4 Risk scoring – making an assessment of the risk given all the factors noted in phases 1, 2 and 3.

  • .5 Risk management – developing action plans, where appropriate, to address weaknesses and mitigate identified residual risks.

2 Risk register and terminology

2.1 The risk register

  2.1.1 The risk register is a tool to document different scenarios and the associated findings on threat (likelihood based on intent and capability), impact, vulnerability and risk score. The format (at Table 1, below) is listed below along with accompanying explanations for each column. A step-by-step guide for completing the risk register follows the definition as well as details on the scoring mechanism.

Table 1
Reference number Threat scenario Lead organization Support organizations Threat (likelihood) Impact Vulnerability Mitigating controls
Key assets Vulnerability score Risk score
1                  
2                  

 Column 1: Reference number

  • Each scenario should be listed with an assigned number so that it can be easily identified and its development tracked.

 Column 2: Threat scenario

  • This column is for the listing of the threat by name and a brief description of what it entails.

 Column 3: Lead organization

  • Each scenario needs to have a lead organization or coordinating body identified so that initial points of contact and responsibilities may be established.

 Column 4: Support organizations

  • List of those agents directly involved but not leading such as local police, fire departments, coast guards, etc.

 Column 5: Threat (likelihood)

  • This column gives the likelihood or probability of the situation coming to fruition if there were no security measures or mitigating controls in place to prevent them. It is scored on the basis of the intent and capability of those wishing to commit the act. Scoring for this element is explained later on in paragraph 3.4.

 Column 6: Impact

  • This column indicates the impact or consequence should the incident occur. Again scoring for this element is explained further in paragraph 4.

 Column 7: Key assets

  • This column contains a list of the most important resource key assets which could be affected by the scenario; this should include people, objects, physical infrastructure and equipment. By listing these assets a risk assessor is better able to consider what safeguards are in place and hence assess the vulnerability more accurately.

 Column 8: Mitigating controls

  • List and consider any mitigating controls (security measures) which are already in place to protect the key assets.

 Column 9: Vulnerability score

  • This is an assessment of the characteristics of a target or asset that can be exploited, balanced against mitigating controls (listed above). The scoring for this is also included later in paragraph 5.4 and considers what effect the mitigating controls have on the threat, the associated impact or both.

 Column 10: Risk score

  • All of the information gathered on threat, impact and vulnerability is used to score the risk. Groups or individuals should use the following formula to produce the score for each scenario:
  • RISK = THREAT x IMPACT x VULNERABILITY

3 Threat assessment

3.1 What to consider

  • Threat scenarios which could exist (or do exist);
  • Who the lead and support organizations are for each scenario; and
  • How to score accurately the threat and impact.

3.2 Decide which threat scenarios apply

  3.2.1 The process should identify criminal acts which could take place.

  3.2.2 The first task when completing a risk register is to consider and agree on which scenarios or events could apply.

  3.2.3 It is useful to have a (brainstorming) session where subject matter experts consider:

  • whether there are any additional scenarios, which should be listed; and
  • any refinements needed to develop to the initial list.

  3.2.4 It is useful when producing this list to consider potential perpetrators:

  • .1 Who are the groups and individuals who may act? For example:

    • Terrorists
    • Criminals
    • Political groups
    • Ideological groups
    • Activists (e.g., animal rights/environmental)
    • Disruptive passengers
    • Employees
    • Mentally unstable
    • Those with inadequate documentation
  • .2 How do perpetrators operate?

  • .3 Some variables to consider in how they operate include:

    • Reconnaissance, advanced planning; and
    • Is there a precedent?
  • .4 What is their intent and their capability to act?

  • 4.1 Intent

    • Definition: Motivation is what drives a perpetrator (e.g., financial gain, publicity, vengeance). Intent is who/what they want to harm to achieve their goal.
  • 4.2 Capability

  • Variables to consider include:

    • numbers/organization
    • status
    • training
    • funding
    • weapons available
    • track record
    • support
    • operational security

3.3 Decide lead and support organizations

  3.3.1 The lead organization(s) should either:

  • .1 own the assets;

  • .2 set the policy;

  • .3 have legal responsibility for, or have the major role in, mitigating or responding to a particular threat; or

  • .4 a combination of the above.

  3.3.2 Distinctions should be made where appropriate between responsibilities for (i) preventive/protective security measures, (ii) contingency planning and reactive security measures to deal with and contain an incident, and (iii) implementation of the measures in (i) and (ii). There may be a different lead organization for each of these where responsibilities vary depending on type of threat, location and method.

  3.3.3 Support organizations will be those which have a supporting role in mitigating the threat but don't meet the criteria above. The risk assessor may decide all stakeholders are support organizations in being vigilant, providing a deterring presence and sharing information with others.

  For some threats, identifying lead and support organizations is not a simple task. There may be differing views but it is important that consensus is reached, particularly as later on lead organizations will have a primary role in developing and delivering action plans, where these are necessary.

  There may, quite correctly, be more than one lead organization but if the group has listed several, it may be worth re-evaluating to check accuracy and minimize the potential for confusion and duplication.

3.4 Scoring the threat

  The score should reflect the likelihood of each of the threat scenarios in the register occurring if there were no security measures or mitigating controls in place to prevent them.

3.4.1 Checklist

 To accurately score the threat, assessors should:

  • consider local and international intelligence/knowledge about similar events which have or could have occurred;
  • discuss how likely it would be for each of the scenarios in the register to occur at the port if there were no security measures in place;
  • read the definitions in Table 2 below and decide which score best applies. N.B. this is the score without any mitigating factors in place.

Risk register - scoring definitions - threat

Score Likelihood Criteria
4 PROBABLE
There have been previous reported incidents
There is intelligence to suggest that there are groups or individuals capable of causing undesired event
There is specific intelligence to suggest that the vessel or type of vessel is a target
3 LIKELY
There have been previous reported incidents
There is intelligence to suggest that there are groups or individuals currently capable of causing undesired event
There is general intelligence to suggest that the vessel or type of vessel may be a likely target
2 UNLIKELY
There is intelligence to suggest that there are groups or individuals capable of causing undesired event
There is nothing to suggest that the vessel or type of vessel is a target for the undesired event
1 IMPROBABLE
There have been no previously reported incidents anywhere worldwide
There is no intelligence to suggest that there are groups or individuals capable of causing undesired event

  The risk register is a template, rather than a straight jacket. Administrations are free to employ an alternative method of scoring if they find it produces a more logical and accurate assessment of the threats and risks.

  Remember to apply the agreed rules around confidentiality.

4 Impact assessment

4.1 Checklist

  • List examples of the type and magnitude of impact that might be expected if the event happened; e.g., loss/damage to people, infrastructure, operations, finance or reputation;
  • Assessors may wish to consider using or modifying the table at Table 3 below to record discussions. Note that the list of possible impacts highlighted below is not exhaustive.
Table 3
  Loss of life Personal injury Loss/damage to vessel Damage to vessel infrastructure Loss of use of equipment Disruption to services Financial loss to vessel Damage to reputation Publicity to perpetrator
Improvised Explosive Device (IED)                  
Sabotage                  
Arson                  
Unauthorized access                  
Theft of vessels                  

  4.2 This information should provide a robust basis for scoring. To score the impact accurately, groups or individuals should, in the same way as for threat:

  • consider the impact should the event occur;
  • consider the impact on the vessel (to safety, security, finance and reputation) of each of the risks occurring if there were there no security measures in place;
  • consider how to record the scores allocated under each of the sub-headings. For simplicity an average may be taken in most cases. Where one score differs markedly from the other three it may be best to record it separately for future consideration rather than “losing” it in an average;
  • read the definitions in Table 4 below and decide which one best applies (remember the score is without mitigating factors in place):

Risk register - scoring definitions - threat

Score Likelihood Criteria
4 SUBSTANTIAL
Potential for: multiple fatalities
Serious loss or damage to assets, infrastructure, vessel
Economic cost of more than (agreed figure)
Widespread coverage resulting in serious reputational damage
3 SIGNIFICANT
Potential for: loss of life
Significant but repairable loss or damage to assets, infrastructure or craft
Economic cost of less than (agreed figure)
National adverse media coverage
2 MODERATE
Potential for: major injuries
Short-term minor loss or damage
Economic cost of less than (agreed figure)
Major local reputational damage
1 MINOR
Potential for: minor injuries
Minimal operational disruption
Economic cost of less than (agreed figure)
Minor reputational damage

5 Vulnerability assessment

 The next step involves identifying the key assets or targets, their relevant characteristics and consideration of the controls in place to protect them and prevent criminal acts taking place. Assessors should first draw up a list of key assets that could be affected by a particular threat. This should include people (crew and passengers), objects and physical infrastructure.

  5.3.4 Assessors may find it useful to complete Table 6, below, as they go through the Vulnerability stage.

  • .1 What are the key targets –people, critical infrastructure, communications and control, and support services?

  • .2 What are the systems designed to deter, detect, delay or deal with unlawful acts?

  • .3 What are the weaknesses in these systems, including consideration of predictability and opportunity?

Table 6
Target Strengths (i.e. systems in place to deter ...)* Weaknesses** Opportunities Predictability Target Vulnerability (High/Medium /Low) What Stakeholders have a part to play in reducing the vulnerability of this target? How?
               
               
               
               
               
Key              
Strengths = systems designed to deter, detect, or deal with unlawful acts:
Weaknesses = includes things like limited intelligence to hand indicating the likelihood of attack and the desirability of the target for the perpetrator;
Opportunity = opportunities for the perpetrator to exploit a loophole, conduct reconnaissance, etc.; and
Predictability = the ways in which a target operates which make it predictable
               
* Examples of systems designed to deter, detect or deal with unlawful acts
• Company employee vetting system
• Port security vetting — pass system
• Criminal record checks
• Crew search and vehicle checks
• CCTV
• Restricted area, perimeter fencing and access control
• Control authority exercises
• Uniformed police presence
• Public awareness
• Cargo/catering/cleaning regimes
• Business continuity plans
               
** Examples of weaknesses
• Accountability and funding
• Sheer volume of people and goods
• No searching (or regular searching)
• No search on exit as routine/norm
• Ability to respond to regulatory demands
• Exemptions in general (e.g., VIPs)
• Crew shortages
• Indifference
• Corruption
• Confusing legislation
• False documentation
• Poor surveillance
               
Key issues to consider in vulnerability work
• Need to consider high value assets
• Identify which stakeholders have a part to play in reducing the vulnerability of the target and how. This will assist in defining “who” should work together on what

Access to sensitive area not inside boundary of RA

Table 7 – Access to sensitive area not inside boundary of RA
4 No mitigating controls No counter measures in place
3 Some mitigating controls Some counter measures in place
2 Acceptable management of the risk Measures in place sufficiently reasonable to manage the threat down to an acceptable level
1 Robust and effective counter measures Full and complete measures in place

5.1 Mitigating controls

 Identifying the current mitigating controls and assessing how effective they are is a vital but time consuming and intensive process. It may be useful to use the following processes:

5.2 Process mapping

  5.2.1 Drawing up process maps can be helpful in understanding complete processes, how each process works, who plays what role and what point, what the key points, strengths and weaknesses are and in identifying where and how aspects may be exploited.

  5.2.2 The perceived benefits of process mapping are that it provides a genuinely holistic view of a process and is potentially a better way of:

  • appreciating and accurately evaluating the various processes that take place;
  • identifying synergies, duplication and gaps; and
  • evaluating what action planning is required and how effective it is.

  5.2.3 Rather than considering each threat separately, process mapping requires examination of the crime and security picture either:

  • by article: vessel's stores; cargo; or
  • by individual: crew or passengers.

  5.2.4 Process mapping involves mapping the complete journey of a person or item and the evaluation and plotting of each potential threat, early warning indicator and mitigating measure in place. It should encompass all areas where and all times when the criminal act could be perpetrated.

5.3 Event cause analysis

  5.3.1 This is a useful method to establish how a risk could materialize at the port and what areas of control need to work well.

  5.3.2 Taking in turn the risks, the following five questions should be considered:

  • What type of individuals or groups would want to carry out this event?
  • Where is this event likely to take place? (Targeted at what?)
  • How would it be carried out?
  • What is going to deter or delay or detect or deal with them?
  • What can go wrong? (e.g., poor communication).

  5.3.3 Assessors may want to use the table in Table 5 below to note all this information down.

  This is a useful review tool to reconsider the effectiveness of control measures highlighted in the risk register and identify where there are weaknesses and gaps.

Table 5
CONTROL MEASURES REVIEW Possible Actions
Breach of Security
Security patrols Deterrence and
Monitoring of security equipment Detection
Education and training of crew Pre-empt breach or
  Swift response
  Crew awareness
Inadequate resources Discuss issues with relevant personnel
Gaps in security coverage Consider redeployment of resources
Insufficient training Organize crew training programme

5.4 Vulnerability assessment scoring

  5.4.1 Evaluation of targets' characteristics on the one hand and the early warning indicators, embedded monitors and existing mitigating controls on the other should be translated into a vulnerability score. Table 7 below illustrates a possible scoring system to be used for assessing vulnerability:

6 Risk scoring

6.1 Risk score

  6.1.1 Finally, all of the information gathered on threat, impact and vulnerability should be used to identify and assess the residual risk. To score the risk accurately, groups or individuals should use the formula:

RISK = THREAT x IMPACT x VULNERABILITY

  6.1.2 So, for example, using an initial threat score of 2, an impact score of 4 and, where there are no mitigating measures in place (a vulnerability score of 4) the residual risk score would be 32 (2 x 4 x 4 = 32). Where measures are adjudged to reduce the vulnerability to some extent, but not to an acceptable level, the residual score would be 24. The threat and impact scores of 2 and 4 remain but the vulnerability score is now 3; hence 2 x 4 x 3 = 24. And so on. There is a presumption that no threat scenario can be managed totally out of existence, i.e. you can never have a threat, impact or vulnerability score of 0.

  6.1.3 It should be noted that scenarios with differing individual threat, impact and vulnerability scores can have the same overall risk score. For instance a particular scenario may have a threat score of 2 an impact score of 2 and a vulnerability score of 2 whereas another scenario may have a threat score of 1, an impact score of 4 and a vulnerability score of 4. Both scenarios produce a risk score of 16 despite having differing individual values of threat, impact and vulnerability.

  6.1.4 Risk can then be ranked into three broad categories: high, medium and low:

  • HIGH - A residual risk score of 27 or more.
  • MEDIUM - A residual risk score of between 8 and 24.
  • LOW - A residual risk score of 6 or less.

7 Risk management

  7.1 The risk management phase considers how best to address the weaknesses identified during the vulnerability and risk scoring stages and how to mitigate the risk effectively and practically on a sustainable long-term basis.

  7.2 This can be achieved by all stakeholders working together to agree joint tactical action plans. The checklist below gives some pointers on how to work through the process:

7.3 Drawing up action plans

• Consider the overall risk profile from the risk register:
    High = Unacceptable Risk — seek alternative and/or additional control measures,
    Medium = Manageable risk — requires management/monitoring,
    Low = Tolerable risk — no further control measures needed.
• Reconsider the Control Measures Review table. The “concerns” and “do nexts” should assist in drawing up action plans.
• Agree the priorities for action. These should be the “high” risks in the first instance.
• Identify what actions can and need to be taken to bring the risk down to a “medium”: manageable risk and from there to a “low”: tolerable risk.
• Agree who will be the lead agency in implementing changes.
• Consider the resource implications.
• Document recommendations.
• Document actions taken and link these back to the threats in the risk register:
    - Timetable for action
    - Review of actions
  Agreed actions should be recorded and progress monitored. Such records are also evidence of decisions taken.
  Assessors may need to develop further systems for sharing information and intelligence.
  Look for opportunities to share resources and assist others.

  7.4 Actions will probably fall into the following categories:

  • Actions that may be implemented by the group;
  • Tactical or operational issues; and
  • National, policy or strategic issues.

8 Re-evaluation

  8.1 Risk assessments should be reviewed as conditions change, or on a regular schedule (e.g., annually).


Copyright 2022 Clasifications Register Group Limited, International Maritime Organization, International Labour Organization or Maritime and Coastguard Agency. All rights reserved. Clasifications Register Group Limited, its affiliates and subsidiaries and their respective officers, employees or agents are, individually and collectively, referred to in this clause as 'Clasifications Register'. Clasifications Register assumes no responsibility and shall not be liable to any person for any loss, damage or expense caused by reliance on the information or advice in this document or howsoever provided, unless that person has signed a contract with the relevant Clasifications Register entity for the provision of this information or advice and in that case any responsibility or liability is exclusively on the terms and conditions set out in that contract.