Information

  • Document No.

  • Audit Title

  • Client / Site

  • Conducted on

  • Prepared by

  • Location
  • Personnel

SECTION I - THREAT ASSESSMENT

  • 1. Does your security measures correspond with the level of threat?

  • 2. Do you have a documented system for processing the flow of threat information?

  • 3. Do you have a process in place to receive, disseminate, and store classified information?

  • 4. Do you collect and analyze threat information periodically?

  • 5. Do you have internal methods (internet, media, toll-free number) to receive threat information?

  • 6. Do you have external resources (state agency, ISAC, FBI, LEO) to receive threat information?

SECTION II - VULNERABILITY ASSESSMENT

  • 1. Do you conduct vulnerability assessments of your assets?

  • 2. Do you have a documented vulnerability assessment program?

  • 3. Do you conduct the vulnerability assessments with the help of an outside source (e.g., state officials, contractors, facility owner/operator)?

  • 4. Do you use a standard for conducting vulnerability assessments (e.g., CARVER, AASHTO, ODP)?

  • 5. Does your vulnerability assessment recommend corrective actions?

  • 6. Are the assessments and corrective measures reviewed at the executive level?

  • 7. Is your vulnerability assessment information protected from disclosure (e.g., statute, policy, regulation)?

  • 8. Do you have method of determining who has access to the completed vulnerability assessments?

SECTION III - CRITICALITY

  • 1. Do you have a list of critical assets in your security plan?

  • 2. Do you internally determine which assets are critical?

  • 3. Do you use a standard methodology for determining criticality (e.g., AAR, AASHTO)?

  • 4. Is your critical list protected from disclosure (e.g., statute, policy, regulation)?<br>

  • 5. Do you allocate security resources based on criticality (e.g., critical facilities, most visible facilities, no resources)?

SECTION IV - MANAGEMENT AND OVERSIGHT OF THE SECURITY PLAN

  • 1. Do you have a documented security plan? If not, how do you address security in your organization (e.g., response plan, emergency plan, disaster recovery plan)?<br>

  • 2. Do you conduct reviews and update your security plan periodically?

  • 3. Do you have a designated security officer?

  • 4. Are the security officer’s duties documented?

  • 5. Do you have access to a 24/7 emergency response/operations center?

  • 6. Do you maintain an updated list of contact information for your personnel?

  • 7. Do you conduct security planning at the organizational level?

  • 8. Do you have executive level support for implementing security enhancements?

  • 9. Do you have dedicated funding mechanisms (e.g., budget line item, fee, tax) to make security enhancements?

  • 10. Do you have specific processes in place to reallocate and/or redirect resources in a heightened alert?

  • 11. Do you require that employees who have access to the security plan sign non-disclosure agreements?

  • 12. Do you have an emergency response plan?

  • 13. Do you use multiple methods to communicate threat information?

  • 14. Do you have a list of Federal points of contact to notify when an incident occurs? (If yes, indicate the name and contact information for the contact.)

  • 15. Do you participate in industry forums to discuss lessons learned?

SECTION V - PERSONNEL SECURITY

  • 1. Do you provide company identification cards to employees?

  • 2. Do you use identification card technology to verify employee identities (e.g., biometrics, photo)?

  • 3. Do you conduct background checks on your employees? (If so, indicate what consists of the background check.)

  • 4. Do you conduct different levels of background checks based on type of employment (e.g., executive, operational, police)?

  • 5. Do you provide company identification cards to contractor personnel?

  • 6. Do you conduct background checks on contract personnel?

  • 7. Do your written contracts require specific background checks for contractor personnel who enter company property?

SECTION VI - TRAINING

  • 1. Do you conduct employee training on security awareness and security plan implementation?

  • 2. Do you conduct employee refresher training?

  • 3. Do you use a formal training curriculum (AAR, FEMA, IAIP, Highway Watch)?

  • 4. Do you maintain records of employee training?

SECTION VII - SECURE AREAS

  • 1. Do you have access control at your facilities?

  • 2. Are there designated secure areas at your facilities?

  • 3. Do you differentiate between levels of access into secure areas?

  • 4. Do you use technology to verify identities when allowing access into secure areas (card readers)?

  • 5. Do you track and document employee access to secure areas?

  • 6. Do you track and document contractors access to secure areas?

SECTION VIII - PHYSICAL SECURITY COUNTER MEASURES

  • 1. Do you have preventative measure to deter terrorist attacks?

  • 2. Do you use physical security barriers at your facility?

  • 3. Do you use intrusion detection devices in your facilities?

  • 4. Do you have surveillance capabilities at your faciliites?

  • 5. Do you use guard services / patrols (e.g., armed / unarmed contract, law enforcement, National Guard, USCG)?

  • 6. Are you aware of infrastructure co-located near additional transportation or utility networks (e.g., electric, water, rail)?

  • 7. Do you have a documented key control program?

  • 8. Do you have remote locking mechanisms on your vehicles?

  • 9. Do you require drivers to conduct pre- and post trip inspections of the vehicle?

  • 10. Is the integrity of the cargo checked prior to loading and / or before departure?

  • 11. Do you use a tracking system for vehicles (GPS)?

  • 12. Are loads matched with cargo manifest with a copy of the manifest supplied to the driver?

  • 13. Are drivers responsible for handling luggage and placing it in bins below?

  • 14. Do passengers have their tickets verified when they give a bag to be checked on the bus?

SECTION IX - CYBER SECURITY

  • 1. Does your computer system incorporate cyber security?

  • 2. Do you have provisions for data backup, an uninterruptible power source, and remote access?

  • 3. Do you have a backup control center housed at an alternate location?

  • 4. Are your operations systems housed on an isolated network?

  • 5. Do you conduct system penetration tests?

  • 6. Do you have procedures in place to prevent unauthorized access to your operations systems?

  • 7. Do you have a designated internal or external cyber security officer?

  • 8. Is the shipment bill of lading data resident in the tracking system database before the truck departs the shipping point?

SECTION X - EXERCISES

  • 1. Do you conduct exercises and drills?

  • How often are training exercises conducted?

  • 2. Do you include external resources when conducting exercises and drills (e.g., LEO, first responders)?

  • 3. Do you document the results of the exercises and drills?

WARNING

  • This document contains Safety Sensitive Security Information that is controlled under 49 CFR 1520. No part of this document may be released to persons without a need to know, as defined in 49 CFR 1520, except with the written permission of the company owner. Unauthorized release may result in civil penalty or other action.

  • Do you understand that you will not disseminate this information to anyone without the written permission of the company owner / official?

  • Signature of Assessor

  • Signature of Company Official

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.