Security Plan Guidance
Security Plan Guidance
GUIDANCE
42 CFR § 73.11, 7 CFR § 331.11, and 9 CFR § 121.11
FEBRUARY 2020
Page | 1
Changes and Highlights
Revisions: This is a living document subject to ongoing improvement. Feedback or suggestions for improvement
from registered select agent entities or the public are welcomed. Submit comments directly to the Federal Select
Agent Program (FSAP) at:
CDC: [email protected]
APHIS: [email protected]
Revision History:
October 12, 2012: Initial posting
April 11, 2013: The revisions are primarily changes to correct editorial errors from previous version. July 3,
2013: Appendix added to document.
September 2017: Added Tier 1 requirements.
February 2020 (Revision 4): Revised Inventory language to match Inventory Guidance and to correct editorial
errors from previous version.
Page | 2
Introduction
Section 11 of the select agent regulations (42 CFR § 73.11, 7 CFR § 331.11, and 9 CFR § 121.11) requires a
registered entity to develop and implement a written security plan that is:
1. Sufficient to safeguard the select agents or toxins against unauthorized access, theft, loss, or release, and
2. Designed according to a site-specific risk assessment, providing graded protection.
The purpose of this guidance document is to assist an entity in developing and implementing its site-specific
security plan. As used in this document, the word “must” means a regulatory requirement. The use of either
“should” or “consider” signifies a suggested method that has requirements based on generally recognized
security “best practices.” Implementation is performance-based and entities may find other ways to meet a
regulatory requirement.
This document addresses the select agent regulations (SAR) with regard to security with one exception: Entities
with Tier 1 BSAT have pre-access suitably and ongoing suitability assessment requirements which are addressed
in the Guidance for Suitability Assessments.
Page | 3
Section 11(a) – Creating a Site-Specific Written Security Plan
Section 11(a) of the select agent regulations require entities to develop and implement a written site-specific
security plan. A security plan is a documented, systematic set of policies and procedures to achieve security goals
that protect BSAT from theft, loss, or release. Plans may also include agreements or arrangements with extra-
entity organizations, such as local law enforcement. Plans may be a single document, or incorporate other
documents, policies, and procedures that work to achieve those security goals.
Entities should establish specific policies that support their plan. Security policies should document strategies,
principles, and rules which the entity follows to manage its security risks. Effective policies provide a clear means
of establishing behavioral expectations and cover the spectrum from directives, to standard operating
procedures (SOPs). As part of security program management, the entity should consider formally documenting
security policies covering all operational controls.
Background checks and other personnel security measures should be vetted through the entity’s legal and
human resources department. See the FSAP Guidance for Suitability Assessments for additional information.
• It should result from collaboration between entity management, scientific, facilities, safety and security
personnel.
• It is built upon tested, well documented operational processes.
• It should account for and secure all biological select agents or toxins from creation or acquisition to
destruction.
• It complements other plans such as biosafety, disaster recovery, continuity of operations, and others.
• It does not violate any laws. Laws to consider when creating the security plan include the
Americans with Disabilities Act, OSHA Safety Standards, and local building and fire codes.
• The entity should provide security plan training to ensure every person understands his or her
responsibilities.
• It requires reporting of all suspected security incidents and suspicious activities.
• It is reviewed at least annually and updated whenever conditions change.
• It is based on a site-specific risk assessment.
An entity should be aware of, and collaborate with, the personnel responsible for and/or impacting security. This
may include:
Page | 4
• Campus security personnel
• Security personnel who observe video
• Local law enforcement or other response forces
• FBI – Weapons of Mass Destruction (WMD) coordinator
• Owner/Controller
• Principal Investigator (PI)
• Responsible Official (RO)
• Alternate Responsible Official (ARO)
• Human Resources
• Biosafety staff
• Security staff
• Institutional Biosafety Committee
• Laboratory Management
Entities should form a team of entity SMEs, supporting security professionals, and stakeholders. The team should
include entity professionals who are experts on the potential consequences of a theft, loss, or release of a select
agent or toxin and the daily operations of the entity. Entities are also encouraged to include federal partners (i.e.,
the FBI) as well.
• SOPs, policies, and other organizational controls which can reinforce or be affected by security measures
• Public health consequences of the select agents and toxins
• Biosafety
• Operational requirements
• Value of the select agent or toxin work to the organization
• Knowledge of current security systems
Local, state, and federal law enforcement and security personnel members may be able to provide
knowledge of:
Once the team is formed, members should be consulted on a regular basis, including during the plan
development and implementation. The team should meet annually as part of the security plan
review.
Page | 6
Section 11(b) – Site-Specific Risk Assessment
Section 11(b) of the select agent regulations states: “The security plan must be designed according to a site-
specific risk assessment and must provide graded protection in accordance with the risk of the select agent or
toxin, given its intended use.” Graded protection is a result of mitigating the hazards (threat and natural) and
the vulnerabilities based on the consequences of a select agent or toxin in its current form.
Page | 7
Conducting a Risk Assessment
• Entities are encouraged to reach out to law enforcement and other experts to understand, assess,
and determine threats.
• An expert or group of experts model ‘threats’ in general, often using Design Basis Threat (DBT)1.
This capability is most common in federal and state facilities but may be available in larger entities.
• Historical data, including statistics on past local events (crimes), terrorist events worldwide,
social science research into terrorists’ behavior, official accounts, and/or terrorists own writings
about motivation and intent.
Insider Threats
An insider threat comes from personnel within the organization who have inside information regarding the
organization’s security, data to include Select Agent and Toxin inventory, access to biocontainment and
computers. The goals of such threats often involve fraud, information theft, intellectual property theft, theft
and/or misuse of Select Agents and toxins, and computer system sabotage.
External Threats
An external threat originates outside of the organization. These threats may include hackers, outages, and other
emergencies.
Natural Hazards
See the Incident Response Guide for resources to help you to determine if you are in a risk area for natural
hazards. As with threats, entities should assess the impacts of the hazard to its people, select agent or toxin
inventories as well as the entity as whole.
Page | 8
1
A profile of the type, composition, and capabilities of an adversary.
Understand and Assess Consequence
Consequence is the impact of the theft or release of the agents. It is the impact on public, animal, or plant health
and safety, and the potential for economic and psychological impacts. Entities should consider:
Key point: Unless there is sufficient data available to project a particular threat’s capability to enhance an agent,
entities do not have to consider hypothetical threats that would make an agent more virulent. Current
characteristics are sufficient for this assessment.
Assess Risk
A sufficient risk assessment should reflect the interactions of threat, vulnerability and consequence. In
implementing a risk assessment, threat, vulnerability, and consequence may be captured as discrete variables,
dependent variables (i.e., probability), or other methods. Also, entities may use a quantitative or qualitative
means depending on the amount of information available. See Risk Analysis Methods for more information and
examples of qualitative risk assessment. For guidance on mitigating the impacts of a natural hazard, see the
Incident Response Guide.
Communicating Risks
After the risk assessment is completed, the key entity leadership should determine if the current risk level is
acceptable. If the risk level is deemed unacceptable, then the entity should develop a means to mitigate the risk.
Some common risk mitigation measures are given below. It should be noted that any activity involving a select
agent or toxin will involve some level of unmitigated risk. The only way to eliminate risk completely would be to
not undertake this work.
Page | 10
Section 11(c) – Planning Requirements
Section 11(c)(1) of the select agent regulations requires the security plan to describe procedures for physical
security, inventory control, and information systems control. These descriptions should reflect the policies
implemented at the entity. This section explains different methods for ensuring that the entity’s security plan
complies with the regulations.
Effective inventory control measures for select agents and toxins can deter and detect a variety of insider threats.
How the inventory audits are conducted and inventory is maintained must be described in the entity’s security
plan and inventory records must meet the requirements of section 17 of the select agent regulations. The
security requirement includes:
• Current accounting of any animals or plants intentionally or accidentally exposed to a select agent.
• An accurate and current inventory for each select agent or toxin in long-term storage.
• Labeling and identifying select agents and toxins in the entity inventory in a way that leaves no question
that the entity’s inventory is accurately reflected in the inventory records.
• Accounting for select agents and toxins from acquisition to destruction.
• See Inventory Audits for more detailed instructions on maintaining effective inventory control.
Access Control
Section 11(c)(2) – Provisions for Access and Safeguarding
Section 11(c)(2) of the select agent regulations require the security plan to describe how the select agent or toxin
is physically secured against unauthorized access. The security plan is performance based and should
complement the Incident Response Plan and Biosafety Plan. An effective physical security plan deters, detects,
delays, and responds to threats identified by the site-specific risk assessment. A successful security plan creates
sufficient time between detection and the completion of an attack for response force to arrive. The physical
security plan should include:
• Security barriers that both deter intrusion and deny access (except by access approved personnel)
to the areas containing select agents and toxins:
o Perimeter fences
o Walls
o Locked doors
o Security windows
o Trained person (e.g., security guard, trained laboratorians, or escorts)
• Biosafety measures and other environmental factors that increase security such as:
o Access or locking system which denies access to BSAT, e.g. mechanical locks, card key access
systems or biometrics
o Tamper-evident devices for select agents and toxins held in long-term storage
• A balanced approach so that all access points, including windows and emergency exits, are secured at
the same level
• A procedure or process to keep the number of alarms to a minimum
Page | 11
Create a system that limits access to select agents and toxins to those approved by the HHS Secretary or APHIS
Administrator for access to select agents and toxins. The access control system should:
• Include provisions to limit unescorted/unrestricted access to the registered areas to those who have
been approved by the HHS Secretary or APHIS Administrator to have access to select agents and toxins.
• Include provisions for the safeguarding of animals and plants exposed to or infected with select agents.
• Regularly review and update access logs.
• Be modified when access requirements change or be responsive to changes in personnel’s access
requirements during personnel changes.
Remain flexible enough so non-approved personnel can be escorted if needed. See Non-Tier 1 Barrier Scenarios
for a visual representation of adequate physical security barriers. See Intrusion Detection Systems for a chart that
defines and explains the use of various IDS options.
The security plan must state how cleaning, maintenance, and repairs will be accomplished in areas where BSAT
are stored or used. When allowing maintenance, cleaning, or repair personnel (whether in-house or contract
services) into a registered area, an entity should practice one or more of the following:
Section 17 (Records) of the select agent regulations requires that access logs must be in place to record the name
and date/time of entry into the registered area, including the name of an escort.
• Serving as a physical barrier between the non-FSAP approved person and select agents and toxins.
• Being knowledgeable about the entity’s security policies.
• Training non-FSAP approved persons on emergency protocols and risks related to the BSAT before
they enter the registered space.
• Executing safety protocols as necessary.
• Receive approval for escorted access and notifying the RO when escorted entry has concluded.
See the Security Risk Assessment FAQs for more information about escort provisions.
Page | 12
Section 11(d)(6) – Prevent Sharing Access Credentials
The security plan must state that any person accessing select agents and toxins will not share their unique means
of access (such as key cards and passwords) with any other person. This should include how the entity prevents:
Challenge all individuals who tailgate or piggyback a secured access entry point.
The security plan must describe the procedures for changing access after personnel changes in order to prevent
access by personnel who have previous approved access to select agents and toxins. This can include:
The security plan must indicate that the following incidents must be reported to the RO:
Page | 13
Unauthorized or Suspicious Persons
Section 11(c)(4) – Reporting and Removing Unauthorized or Suspicious Persons
An “unauthorized person” is not approved to have access to select agents and toxins or is not authorized by the
entity to be in a particular area or be involved in particular conduct. A “suspicious person” is any individual who
has no valid reason to be in or around the areas where select agents and toxins are possessed or used.
The security plan must describe the process for identifying and removing unauthorized and suspicious persons. It
must also require follow-up actions such as reporting the information to the RO; and the RO reporting the
information to entity security personnel, and possibly contacting local law enforcement agencies or FSAP, as
appropriate.
Unauthorized and suspicious persons attempting to gain entry into registered areas without proper credentials
should be identified, challenged and removed immediately. The RO must be notified immediately (see Section
11(d)(7) for more details).
• Integrating an access control measure (e.g., card key) into an alarm system that notifies a responder
when an unauthorized person attempts to gain access (similar to an IDS, but does not involve an actual
break in).
• Having a badge system that clearly identifies who does and does not have approved access to select
agents and toxins.
• Provide training on how to remove unauthorized personnel (e.g., procedures for notification of security
personnel and/or local law enforcement).
See RO Reporting for more detailed instructions for what activities should be reported to the RO.
Access Approval
Section 11(c)(7)
Section 11(c)(7) requires the entity to ensure that all individuals with access approval from the HHS Secretary or
APHIS Administrator understand and comply with the security procedures. All approved individuals should
undergo training that covers general security as well as security training as it applies to their specific work. See
the Training Requirements guidance document for general information on training provisions.
Section 11(d)(1)
Create a system that limits access to select agents and toxins to those approved by the HHS Secretary or APHIS
Administrator for access to select agents and toxins. Individuals must have passed a security risk assessment and
have approval from either the HHS Secretary or APHIS administrator before they obtain access to any select agents
or toxins.
RO Reporting
Section 11(c)(8) – Suspicious Activities
The security plan must describe procedures for how the RO will be informed of suspicious activity that may be
criminal in nature and related to the entity, its personnel, or its select agents and toxins. Individuals with access
Page | 14
to select agents and toxins must be aware of the protocol for reporting suspicious or criminal activity. The plan
must also describe procedures for how the entity will notify the appropriate federal, state, or local law
enforcement agencies of such activity. Identify who best can respond to the circumstances during the security
portion of the risk assessment.
The security plan must include procedures for how the entity will notify the appropriate Federal, State, or local
law enforcement agencies of any suspicious or criminal activity.
Page | 15
Information Systems Security Controls
Section 11(c)(9) – Information Systems Security Controls
Please see the Information Systems Security Controls Guidance for details about meeting the requirements of
this section of the regulations.
With exception of exports out of the country, shipments containing select agents and toxins between entities
must be authorized by FSAP, coordinated through an APHIS/CDC Form 2, and tracked so the receiving entity
knows when the shipment will arrive. Both the sender (unless the sender is outside of the United States) and the
recipient (unless the recipient is outside the United States) of the package must be approved for access to select
agent or toxins.
The individual who packages the BSAT for shipment must have an SRA approval and appropriately trained.
The package containing select agents and toxins is not considered “received” by the entity until the intended
recipient takes possession of the package. The intended recipient must have SRA approval and, if the agent is Tier
1, have gone through the entity’s pre-access suitability and is subject to the entity’s ongoing assessment.
When received by the intended recipient, the shipment should immediately be secured in a registered space.
Ideally, the shipment is taken to the receiving laboratory; however, the package may be temporarily stored in
other registered spaces.
Shipping and receiving areas must be registered if the select agents or toxins packages are identified or accessed.
For example:
If select agent or toxin packages are not identified or accessed, the shipping and receiving area may not need to
be registered.
The entity must also have a written contingency plan for receipt and security for unexpected shipments. An
“unexpected shipment” is when an entity receives a legitimate shipment of a select agent that it had neither
requested nor coordinated for. The entity must have a contingency plan to have approved personnel gain control
of the unexpected shipment of BSAT without delay and secure it in a registered area.
Page | 16
Entities that conduct intra-entity transfers must describe in their security plan how these transfers will take place,
including chain-of-custody documents and provisions for safeguarding the select agents and toxins against theft,
loss, or release. Please see the example intra-entity transfer form to see what information should be captured
according to section 17 (Records) of the select agent regulations. Transfers must include a chain-of-custody
document and ensure that select agents and toxins will not be left unattended. See the Intra-Entity Transfer
Template. The entity is not required to cover intra-entity transfers in the security plan if they do not conduct
them.
• Misspelled words
• Addressed to a title only or an incorrect title
• Badly taped or sealed
• Lopsided or uneven
• Oily stains, discolorations, or crystallization on the wrapper
• Excessive tape or string
• Protruding wires
• Return address does not exist or does not make sense
The security plan must describe how the entity will inspect packages based on the site-specific risk assessment.
The entity should inspect all packages and items before they are brought into or removed from areas where
select agents and toxins are used or stored (registered laboratory, etc.). Suspicious packages should be inspected
visually or with noninvasive techniques before they are brought into, or removed from the area where select
agents and toxins are stored or used. See the USPS guidelines for recognizing suspicious packages for more
detailed information.
Page | 17
Section 11(d) – Security Requirements
This section describes the policies and procedures that the entity must implement in order to be in compliance
with the select agent regulations.
Storage
Section 11(d)(3) – Storage Control
The entity is required to “provide for the control of select agents and toxins by requiring freezers, refrigerators,
cabinets, and other containers where select agents or toxins are stored to be secured against unauthorized
access (e.g., card access system, lock boxes).” See Access Control Devices for more information on methods of
securing BSAT against unauthorized access.
The entity can comply with this requirement in a number of ways. Typically, physical locks, key card access,
biometrics, or some combination of those provide adequate storage control. Tier 1 select agents and toxins
require more stringent conditions. See the Tier 1 guidance document for more information.
Entities have discretion on how they conduct these audits. The depth of an audit should depend on the
circumstances. Entities should consider the following when determining the depth of an entity audit:
Page | 18
5. The size of the collection being audited and the manner it is stored. Inventories which are
intermixed with other samples may require a ‘vial by vial’ audit.
Select agent inventories should be confirmed, at a minimum, annually. For those inventories with
frequent access, regardless of the number of individuals accessing, it is recommended that
inventory records are confirmed semi-annually or quarterly for those specific accessed storage
containers.
A suggested best practice is to have two individuals involved in confirming the inventory records to
ensure counts are accurate and verified. Each individual could record their respective inventory
counts on an inventory verification worksheet with initials or signatures indicating the verification.
If two individuals cannot be involved in the verification count, then one individual conducting the
select agent inventory confirmation could conduct two counts of the inventory and record both
counts on the inventory verification worksheet to provide verification of an accurate inventory
count. Sealed boxes should have the security tape identification confirmed. There should be a
record available of a vial-by-vial inventory being conducted at the time of the box being sealed. If
there are doubts of the sealed box contents then the box should be opened and a confirmed
inventory identification and count conducted and recorded. Frequency of the inventory
confirmation may vary depending upon how often inventories are accessed and the manner of
storage.
For those inventories that contain a mixture of varying agent identifications, or inventories with
multiple individuals frequently accessing storage areas, it is recommended that quarterly inventory
confirmations are conducted for those storage containers involved in such access occurrences.
During the quarterly, semi-annual, or annual inventory confirmation, those containers which are
accessed and having inventory added or removed should have all vials or containers in those
specific storage boxes/containers counted and confirmed. The percentage of additional inventory
that is to be confirmed on an annual basis will vary with the inventory size. Laboratories with large
inventory volumes should confirm inventories for any storage boxes/containers accessed
throughout the year. Inventory collections containing lesser quantities of material and routine
access should have the entire inventory confirmed at least on an annual basis.
See the Inventory Audit Conditions table for more detailed instructions for when an inventory
audit is necessary.
Maintain audit records in accordance with section 17(c). Changes to the inventory must be
recorded in accordance with section 17(a) as well.
Page | 19
Section 11(f) – Tier 1 Security
Tier 1 select agents and toxins require additional security measures to be implemented including the
addition of pre-access suitability assessments, extra access controls, and extra barriers. These extra
measures are intended to safeguard Tier 1 select agents and toxins further from theft, loss, or
release. The list of Tier 1 select agents and toxins includes:
• Bacillus anthracis
• Bacillus cereus Biovar anthracis
• Botulinum neurotoxins
• Botulinum neurotoxin producing species of Clostridium
• Burkholderia mallei
• Burkholderia pseudomallei
• Ebola virus
• Foot-and-mouth disease virus
• Francisella tularensis
• Marburg virus
• Rinderpest virus
• Variola major virus (Smallpox virus)
• Variola minor virus (Alastrim)
• Yersinia pestis
An effective security plan for Tier 1 BSAT describes how the requirements of the regulations are met.
The security plan should also discuss who manages security control measures. This may include:
• How the entity manages access controls – This management may include keys, card keys,
access logs, biometrics and other access control measures for each of the security barriers
in the security plan. This may be accomplished by directly controlling or interacting with a
service provider (e.g., a security guard company).
• Designating personnel to manage the entity’s security systems, including intrusion detection
• How the intrusion detection alarm code is managed (who has it, when it is changed)
• How the entity tests and manages the configuration of the system
• How the entity responds to an access control or intrusion detection failure (e.g., alarm)
• How the entity screens visitors
Page | 20
Section 11(f)(2) – Responsible Official Coordination with Other Safety and
Security Professionals
Entities must describe procedures for how an entity’s Responsible Official (RO) will coordinate their
efforts with the entity’s safety and security professionals to ensure security of Tier 1 select agents and
toxins and share, as appropriate.
Ideally the entity’s RO, safety, and security professionals should meet on a
regular or defined basis. This may be annually in conjunction with the security
plan review, after a security incident, when there is a significant entity
change that affects security, or in response to a threat. See Figure 2 for an
example of the personnel who should be involved in creating a security plan
for entities registered to possess or use Tier 1 BSAT.
• Self-Reporting – Individuals should be trained on how to report any incidents or conditions that might
impact their ability to safely have access to select agents and toxins and to safeguard them from theft,
loss, or release.
• Peer-Reporting – Individuals should be trained on how to report incidents or conditions that might
impact the ability of others to safely have access to select agents and toxins. Peer-reporting should be
safe and anonymous and protect whistle-blowers from repercussion.
• Employee Training – All employees must be trained on the entity’s policies and procedures for reporting,
evaluating, and corrective actions concerning suitability assessments. This type of training may include
threat awareness, self- and peer-reporting, behaviors of concern, and suitability policies.
• Ongoing Suitability Monitoring – All individuals with access to Tier 1 select agents and toxins must
undergo ongoing suitability monitoring. There are several ways to achieve this, including annual
performance reviews, access reviews, and criminal record reviews.
Section 11(f)(4)(i) requires the entity to limit access to a Tier 1 select agent or toxin to only personnel who have
been approved by the HHS Secretary or APHIS Administrator, following a security risk assessment (SRA)
conducted by the Attorney General, and have had an entity-conducted pre-access suitability assessment. Such
individuals must also be enrolled in an ongoing suitability assessment program conducted by the entity.
• Make sure that only HHS or USDA approved individuals have access to Tier 1 BSAT.
• Conduct a pre-access suitability assessment before granting access.
Page | 21
• Enroll each individual to be given access to Tier 1 BSAT in an ongoing suitability assessment program.
Limiting access to registered spaces outside of normal business hours does not mean that personnel cannot
work outside these hours; however, they should get specific approval by the RO, or his/her designee, before
doing so. The entity may choose to establish specific after-hours work policies. For example, the entity could
establish a rule that states at least 2 persons should be working in the laboratory if work must be conducted
after hours. This rule should consider, and implement, any necessary justification for after-hours work, such
as 24 hour animal studies.
Security Barriers
Section 11(f)(4)(iv) of the select agent regulations requires a minimum of three security barriers safeguarding Tier
1 select agents and toxins against theft, loss, or release. A barrier is a physical structure designed to prevent
unauthorized access. Cameras, security lighting, and IDS are not considered security barriers because, while they
may monitor and detect unauthorized access, they cannot, by themselves, prevent access. These security barriers
must be identified on the entity’s registration (APHIS/CDC Form 1) and described in the security plan.
Security barriers should be implemented based on a site-specific risk assessment and should ensure that the
following conditions are met:
• Each security barrier must add to the delay in reaching the areas where select agents and toxins are used
or stored. Most security barriers, in and of themselves, do provide additional delay to forced entry.
• All access points, including emergency exits, must be secured. If there is a card key lock on the main door,
the emergency exit should be secured to prevent ingress – for example, by having no outside handle.
• One of the security barriers must be monitored in such a way as to detect circumvention of established
entry control measures under all conditions. This may include video cameras, monitoring access control
Personnel who are trained to identify and respond to suspicious activities can be considered a security barrier.
Persons who receive ‘insider threat,’ ‘suspicious person’ or similar training along with response procedures (i.e.,
calling security, 911, etc.) are considered ‘trained personnel.’ Therefore, when they are physically present, they
may be considered a security barrier.
Section 11(f)(4)(vi) requires that personnel monitoring the IDS must be capable of evaluating and interpreting the
alarm and alerting the designated security response force or law enforcement. Some response options include:
If the IDS is monitored by a service provider with a local law enforcement response, the entity should coordinate
with local law enforcement to assist them in understanding the importance of the information from the service
provider. For example, due to the volume of false alarms, local law enforcement may not treat the alarm as a
serious matter. Entities are encouraged to discuss the consequence of the theft of a select agent or toxin with
local law enforcement so they can understand the seriousness of the threat and also understand that an alarm
at an entity housing select agent requires immediate response.
A response force is a force capable of interrupting a threat. It may be unarmed guards, armed guards and/or local
law enforcement – though law enforcement is preferable.
The target for response time, 15 minutes or less, is based on the Department of Defense adopted standards for
protecting high consequence assets. However, entities are strongly encouraged to coordinate with local law
enforcement and/or federal partners to assist with threat assessment to determine the appropriate response
There are many ways to reduce response time for the response force to less than 15 minutes. One method is to
perform the following steps:
Though not required, entities should consider the effect of natural hazards, such as a hurricane or blizzard, when
addressing response times.
In the event of an incident that disrupts or cuts off power to the registered space, the entity must have a plan in
place to ensure that security is maintained, and three physical barriers will remain in place, until power can be
restored. Some acceptable methods include:
• Fail-safe locks that are locked or remain locked when power is interrupted or there is a power
outage.
• Adding personnel/guard forces at doors that acts as one of the three physical barriers but may fail and
open instead of being closed/locked in the event of a power failure.
• Backup generators or batteries that will restore power to the access control systems.
For example, if power is lost and the door locks (even if it can be opened only from the inside), then it meets this
requirement. If power is lost and the door unlocks (it can be opened from the outside), then it does not meet
the “fail safe” requirement.
Depending upon the access control systems (ACS) and equipment, the entity should consider changing lock
combinations, ACS password/PIN, intrusion detection system (IDS) password/PIN, and access approvals in
which the departing personnel was assigned when they are removed from the program and/or access to Tier 1
select agents. Former employees that retain the ability to use and control the locks, ACS, and the IDS would be
considered a vulnerability.
For more information, see the Drills and Exercises guidance document.
Generalized Regression
Relative Risk Score Fault/Event Trees Models
Scenarios
Delphi Method
For example, the square risk map is a qualitative analysis method that relies on a common sense
understanding of the combination of threat and vulnerability with the consequence of such an incident
occurring.
Threat + Vulnerability
Figure 1: Square Risk Maps assess risk by comparing the
threat and vulnerability of a situation to the consequence.
The risk is assessed as Low, Medium, High, or Extreme.
Mechanical Key • All keys must be tracked in a log. • All personnel with access to the key must have SRAs.
• Change locks if key is lost or compromised. • If in a key box, all personnel with access to the key box
• All keys must be returned when people quit or are key must have an SRA.
terminated. • If there is no IDS, the following people must have SRAs:
• Log access and retain for 3 years. • All personnel with access to a master key.
• If the key is secured in a key box, the key box key • All personnel with access to a facility or building grand
must meet the requirements above. master.
• Entity locksmiths if they have or can make the key and
the key can be traced to the door.
Cipher Key/Combination lock • Change the code or lock when personnel quit or are • All personnel with the code/combination or access to
terminated. Changes must be reflected in a log. the code/combination must have SRAs.
• Change the code or lock in the event of • If there is no IDS, the following people must have SRAs:
compromise. • All personnel who can change the code.
• Log access to registered areas and retain access
records for 3 years.
Card Key • Maintain electronic or physical logs of access to • All personnel with card-key which can open door
registered areas for 3 years. • (includes facility wide keys)
• The log must be capable of being printed.
• The access control network must meet the
information security requirements.
Card Key+ Pin • Maintain electronic logs of access for 3 years. • No additional requirement
• The access control network must meet the
information security requirements.
Multiple kinds of access control • All the requirements for each type of access control • All the SRA requirements for both systems unless use
(i.e., Card Key and Mechanical systems when or if used. of the access control device triggers the IDS (use of a
Lock on same door) mechanical key in Card-Key door will often trigger a
‘forced door’ alarm. The same alarm if someone broke
the door down).
Remote opening (e.g., someone • Maintain electronic logs of access for 3 years. • No additional requirement
‘buzzes’ a person in) • The access control network must meet the
information security requirements.
“Emergency” card key kept with • Log of access. • No SRA requirement for first responders
First Responders • Inventory of key.
• Notification of the RO and FSAP in the event of its
use.
Emergency mechanical key or • Maintain electronic logs of access for 3 years. • No SRA requirement for first responders
Card-Key in Knox Box (key • Notification of the RO and FSAP in the event of its
stored in secured ‘box’ only use.
accessible to first responders)
Infrared A device that -Inside registered areas -Areas where things are Ensure that system
motion detects a change -Along a hall that leads to heated (warming) - is focused at key
detector in ambient registered areas Very large areas areas and not
temperature (heat -Doors that lead to ‘randomly’ located
sensor) registered areas throughout entity
-Storage freezers
Contact Devices that alarm -Inside registered areas Areas with glass Ensure the
Switches when a circuit is -Along a hall that leads to windows or doors that emergency exit has
broken (door or registered areas provide direct access to an alarm and
window opened) -Doors that lead to registered area windows have
registered areas sensors
-Storage freezers
Broken A device that -Laboratories with glass -Entities where there Ensure all the doors
Glass detects the sound windows which provide are frequent severe also have a sensor.
Sensors frequencies access to registered space storms
generated by -Entities with synthetic
breaking glass. windows
Acoustic An active device -Inside registered areas -Animal rooms Ensure that system
Motion that detects -Along a hall that leads to -Rooms where is focused at key
Sensor motion by registered areas equipment is areas and not
(emits transmitting -Doors that lead to continuously left on or ‘randomly’ located
sounds) sounds that registered areas after work hours (i.e., throughout entity
reflects off objects -Storage freezers shakers, incubators) -
Very large areas
Acoustic A passive device -Inside registered areas -Animal rooms Ensure exterior
Sensor that monitors the -Along a hall that leads to - Rooms where noises do not set
(listens for sounds to registered areas equipment is the alarm off (i.e.,
sounds) determine when continuously left on or animals in the
an intrusion occurs after work hours (i.e., laboratory next
and/or to shakers, incubators) door)
determine the -Entities without
nature of the exterior sound
intrusion dampening
SELECT AGENT/TOXIN
Comments:
28 | P a g e
Security Plan Guidance Document
Appendix V: Scenarios (Non-Tier 1 Barriers and Access Controls):
Trained Personnel
Unlocked Freezer, Door to
Agent or Toxin Present
Incubator, etc. Registered Space
(Laboratorian)
Operational controls are controls in place specifically to prevent unauthorized access to any select
agent or toxin. Appropriate operational controls are based on the nature of all work in the registered
area, the physical features in the area, and the entity’s risk assessment.
29 | P a g e
Security Plan Guidance Document
Outsider Threat
Barriers deter but cannot be relied on to stop an outsider. The outsider cannot be stopped by locks, doors or other barriers, only delayed. The only thing
that will stop an outsider is a response force.
Threat Task Time without Mitigation
Break Window
Force Door
10 minutes to BSAT
Break Window
Intrusion
Threat Detection Walk down hall Force Door Open Freezer BSAT
System
Force Door
Protect Security
Information
Alarm
Visitor Controls
INITIAL QUANTITY:
WHERE STORED:
BUILDING: ROOM: FREEZER:
INVENTORY OF USAGE
CURRENT DATE QUANTITY USED DATE RETURNED QUANTITY RETURNED PURPOSE OF DATE
REMOVED REMOVED RETURNED
QUANTITY FROM BY TO STORAGE BY USE DESTROYED
REMOVED BY QUANTITY
STORAGE
REMAINING
Comments/Discrepancies:
32 | P a g e
Security Plan Guidance Document
Entities may also choose to consider inventory when following conditions occur:
Condition Inventory
Laboratorian or support staff removal 10% of the samples in that PI’s
from registration collection that the individual
worked with.
100% check of sealed containers for
indication of tampering.
Audit commences as soon as
practical after the person is
removed.
Destruction of agents 100% of the agents being
destroyed.
33 | P a g e
Security Plan Guidance Document
Tier 1 Barrier Scenarios
Scenario 1: Typical Working Facility
Unlocked
Door, Fence,
Agent or Toxin Freezer/ Lab Door Door
Guards, etc.
Centrifuge/BSC
Locked Freezer/
Agent or Toxin Lab Door Door
Centrifuge/BSC
Vulnerability
Barrier
34 | P a g e
Security Plan Guidance Document