Monitor Access to Mission Critical Facilities
By DON CIO CIP Team - Published, June 2, 2011
This CIP Tip expands on one of the CIP Vulnerability Assessment Benchmarks by explaining why it is important, ways to implement this benchmark and where to find additional information.
Having installation or command security personnel monitor access to mission critical mechanical, electrical, and telecommunication rooms and facilities is a best practice. Mission critical equipment includes both Department of Defense and non-DoD assets essential to project support and to sustain military forces and operations worldwide.
Why should we do this?
The failure to identify, protect and monitor these mission critical facilities could delay the response to a malfunction, such as high volume air conditioning or water pressure failure, or a disruptive natural event, such as a lightning strike or flood. It may also allow an attacker or insider to degrade or destroy the ability of the facility to support its assigned mission essential function.
Actions taken to deter an attack or sabotage by an insider and pre-planned rapid responses to disruptive events are examples of Defense Critical Infrastructure Protection remediation and mitigation actions.
How can this best practice be implemented?
The CIP lead for each installation or command should ensure the installation or command security officer is aware of every mission critical room and facility on the installation. The security of these rooms and facilities should be regularly monitored, either by roving patrols, alarms, closed circuit television or, better yet, a combination of two or more of these methods.
Where can I find additional information?
2009 Joint Staff/Defense Threat Reduction Agency DoD Vulnerability Assessment Benchmarks: SO-PLN-24, Critical Asset Security. Submit a request for a copy of this benchmark or any other, using the Ask an Expert form. Be sure to select the CIP topic area.