UNDERTAKING AN OFFSHORE OIL AND GAS
Download
1 / 49

UNDERTAKING AN OFFSHORE OIL AND GAS - PowerPoint PPT Presentation


  • 356 Views
  • Updated On :

UNDERTAKING AN OFFSHORE OIL AND GAS SECURITY ASSESSMENT. A Guide. AIM To provide you with an understanding of the DOTARS Offshore Security Assessments Guidance material and how to use it to assist with the production of your Offshore Security Plans. . Note.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'UNDERTAKING AN OFFSHORE OIL AND GAS' - Angelica


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Slide1 l.jpg

UNDERTAKING AN OFFSHORE OIL AND GAS

SECURITY ASSESSMENT

A Guide


Slide2 l.jpg

AIM

To provide you with an understanding of the DOTARS Offshore Security Assessments Guidance material and how to use it to assist with the production of your Offshore Security Plans.


Slide3 l.jpg
Note

  • This presentation is provided to assist organisations who may not be familiar with the requirements for providing a security assessments.

  • It is acknowledged that a number of attendees are leaders in the field of offshore security. This presentation is aimed at assisting other industry participants who may not be as conversant of security issues or aware of the requirements.

  • Not intended to cover all parts of the RA, rather amplify specific areas.


Slide4 l.jpg

  • PURPOSE OF SECURITY ASSESSMENTS

    • To provide a sound risk based approach to the implementation of preventive security planning to prevent unlawful interference with offshore facilities.

    • Ensures a systematic and analytical process is conducted with the aim of identifying outcomes focused security measures and / or procedures that reduce the vulnerabilities of assets, individuals and operations to acceptable levels.


Slide5 l.jpg

  • Maritime Transport and Offshore Facilities Security Act 2003

  • Requires Offshore Security Plan to include:

  • A security assessment for the participants operations

  • Set out security measures for MARSEC 1, 2 & 3

  • Provisions for use of Declaration of Security;

  • Demonstrate implementation of Security Plan that contributes to maritime security outcomes

  • Complements Federal and State OH &S legislation


Slide6 l.jpg

  • Maritime Transport and Offshore Facilities Security Regulations 2003

  • Security Assessment must include:

  • statement outlining risk context or threat situation

  • identification and evaluation of important assets, infrastructure and operations

  • identification of possible risks or threats and the likelihood and consequences of occurrence


Slide7 l.jpg

Maritime Transport and Offshore Facilities Security Regulations 2003(cont)

  • identification of existing security measures

  • identification of weaknesses

  • identification, selection and prioritisation of possible risk treatments


Slide8 l.jpg

  • GENERAL GUIDANCE Regulations 2003

  • AS/NZS 4360 Risk Assessment

  • HB 436:2004 Risk Management

  • DOTARS Offshore Security

  • Assessments Guidance Paper

  • http://www.dotars.gov.au/transsec/oilandgas/docs/Offshore_Security_Risk_Assessment_Guidance_Paper.doc

  • Use simple plain English

  • Protected from unauthorised access


As 4360 2004 l.jpg
AS 4360 - 2004 Regulations 2003


Slide10 l.jpg

  • REQUIREMENTS OF SECURITY Regulations 2003

  • ASSESSMENTS

  • Date assessment completed

  • Scope - people, assets, infrastructure, facility or

  • facilities and operations

  • Summary of how the assessment was conducted

  • ID and evaluation of strategically important assets,

  • infrastructure and operations


Slide11 l.jpg

Requirements for Security Assessments (cont) Regulations 2003

  • ID and assessment of possible security

    risks and likelihood and consequences of

    their occurrence

  • ID of existing security measures,

    procedures and operations

  • ID, selection and prioritisation of possible

    risk treatments



Slide13 l.jpg

A useful and simple rating system is Low, Medium or High with relation to the criticality of the asset in the continued productive operation of the offshore facility.


Types of assessments plans l.jpg
TYPES OF ASSESSMENTS & PLANS Criticality Analysis)-example

Network - a security assessment covering more than one individual facility for which they are legally responsible.

Covering – used for several facilities and/or offshore service providers within a single area.


Slide15 l.jpg

  • The Current Security Environment Criticality Analysis)-example

  • Sources:

  • DOTARS Offshore Oil and Gas Risk Context Statement - Apr 2005

  • http://www.dotars.gov.au/transsec/oilandgas/index.aspx.

  • Other Threat of Risk Assessments for Critical Infrastructure

  • Law enforcement and security agencies

  • Professional and Industry bodies

  • Company personnel and expert advisers


Establishing the context external l.jpg
Establishing the Context- External Criticality Analysis)-example

  • Environmental and Geographical

  • Business and Operational

  • Statutory and Regulatory

  • Social and Cultural

  • Competitive

  • Political

  • Financial

  • Others you may deem appropriate



Establishing the context internal l.jpg
Establishing the Context - Internal Criticality Analysis)-example

  • The organisational culture

  • Internal stakeholders

  • Organisational structure

  • Capabilities in terms of resources such as people, systems, processes and capital

  • Goals and objectives and the strategies that are in place to achieve them.


Establishing the context internal cont l.jpg
Establishing the Context – Internal (cont) Criticality Analysis)-example

Consideration of :

  • Critical Assets and Resources

  • Critical functions and business activities

  • Operational capabilities

  • Risk management capabilities

  • Activities and Programs

  • Existing risk controls

  • Risk tolerance level

  • Limitations on risk treatments


Slide20 l.jpg


Slide21 l.jpg

  • The Risk Management Context Criticality Analysis)-example

  • The goals, objectives, strategies, scope and parameters of the activity, or part of the organisation to which the risk management process is being applied, should be established.

  • Consideration of need to balance costs, benefits and opportunities, resources required and the records to be kept should also be specified.


Slide22 l.jpg

  • Defining the risk management context Criticality Analysis)-example:

  • Determining resources and expertise

  • needed

  • Defining the risk reporting criteria

  • Defining the Likelihood (Probability or

  • Frequency) criteria

  • Defining the Impact (Consequence) criteria

  • Defining the Risk Rating criteria

  • Outlining the local security risk context


Slide23 l.jpg

Specific issues to consider: Criticality Analysis)-example

Roles and responsibilities of various parts of the organisation participating in the risk management process; and

Relationships between the project or activity and other projects or parts of the organisation.


Slide24 l.jpg

Template 8.4. Risk Management Context-examples Criticality Analysis)-example


Slide25 l.jpg

  • Consideration of risks resulting in: Criticality Analysis)-example

  • Unlawful interference with offshore oil and gas

  • operations

  • Death or injury

  • Adverse social impact

  • Adverse economic impact

  • Adverse environmental impact

  • Symbolic effect

  • Business disruption and losses

  • Damage to offshore oil and gas business /

  • reputation

  • Significantly reducing public confidence in

  • offshore oil and gas production and supply.



Slide27 l.jpg

Advanced version of consequence table p.33 Criticality Analysis)-example


Slide28 l.jpg

  • Table 8.9 Criticality Analysis)-exampleLikelihood Assessment Criteria -example


Slide29 l.jpg

  • The Current Security Environment Criticality Analysis)-example

  • Sources:

  • DOTARS Offshore Oil and Gas Risk Context Statement - Apr 2005

  • http://www.dotars.gov.au/transsec/oilandgas/index.aspx.

  • Other Threat of Risk Assessments for Critical Infrastructure

  • Law enforcement and security agencies

  • Professional and Industry bodies

  • Company personnel and expert advisers


Slide30 l.jpg

IDENTIFYING SECURITY RISKS Criticality Analysis)-example

OIP’s should consider the following terrorist related risk areas:

  • Bomb or explosive device, including suicide bombings

  • Hijacking and hostage siege

  • Deliberate infringement of exclusion zones

  • Sabotage

  • Arson

  • Hoax calls and scare tactics

  • Blockage of transport routes


Identifying security risks cont l.jpg
IDENTIFYING SECURITY RISKS - cont… Criticality Analysis)-example

  • Tampering with supplies, essential equipment or systems

  • Unauthorised access or use of various equipment, including cyber attack

  • Unauthorised access to secure areas

  • Use of industry transport to carry those intending to cause a security incident and their equipment

  • Use of a mode of industry transport or industry facility infrastructure as a weapon or a means to cause damage or destruction

  • Use of a ship, helicopter or aircraft to transport explosives, hazardous goods or weapons.


Slide32 l.jpg

RISK CATEGORIES AND SOURCES OF HARM Criticality Analysis)-example

  • Vandalism – vandals

  • Misappropriation and sabotage - disgruntled insiders

  • Interference - violence prone individuals or groups (politically motivated or otherwise)

  • Crime - criminals

  • Terrorism – terrorists




Slide35 l.jpg

RISK SCENARIOS - one method examples Cont..

  • Used to determine how the various risks might be realised and unfold

  • Use previous security incidents (security history)

  • Security history must be viewed in the context

  • Operators must consider own unique risk scenarios

  • Consider possible risk scenarios to determine how the risk may be initiated and realised

  • It is important that significant risk causes and scenarios are identified.





Slide39 l.jpg

RISK SCENARIOS example

  • Used to determine how the various risks might be realised and unfold

  • Use previous security incidents (security history)

  • Security history must be viewed in the context

  • Operators must consider own unique risk scenarios

  • Consider possible risk scenarios to determine how the risk may be initiated and realised

  • It is important that significant risk causes and scenarios are identified.






Slide44 l.jpg

* Note – only general information is required for risk treatment options. However, details of proposed security measures/procedures and desired outcomes should be outlined in table 8.16 Risk Treatment Implementation Schedule.


Slide45 l.jpg

This Implementation Schedule must be included with assessment and plan



Slide47 l.jpg

  • SUMMARY example

  • Please be aware of the DOTARS Offshore Security Assessments Guidance Paper.

  • This is the minimum requirement. If your assessment process exceeds this requirement please ensure that there is a clear explanation of the methodology, acronyms and relevant data and sources used.


Summary cont l.jpg
SUMMARY cont example

  • Ensure there is linkage with the outcomes of the Risk Assessment with the Security Plan.

  • Complete your plan in accordance with the Guide on preparing an Offshore Security Plan for Offshore Facility Operators.

  • Please liaise with the local DOTARS office or Veena Rampal on 02 6274 7648


Slide49 l.jpg

QUESTIONS? example


ad