2020 10 Security Handbook For Small To Medium RTOs Volume 1 FINAL
2020 10 Security Handbook For Small To Medium RTOs Volume 1 FINAL
Volume 1
Security Handbook for
Small to Medium Rail
Transport Operators
Volume 1
This Rail Industry Safety and Standards Board (RISSB) product has been developed using input from rail experts from across the
Rail Industry. RISSB wishes to acknowledge the positive contribution of all subject matter experts and DG representatives who
participated in the development of this product.
The RISSB Development Group for this Guideline consisted of representatives from the following organisations:
Development of this Guideline was undertaken in accordance with RISSB’s accredited processes. It was approved by the
Development Group, endorsed by the Standing Committee, and approved for publication by the RISSB Board.
I commend this Standard to the Australasian rail industry as it represents industry good practice and has been developed
through a rigorous process.
Deb Spring
Exec. Chair / CEO
Rail Industry Safety and Standards Board
Notice to users
This RISSB product has been developed using input from rail experts from across the rail industry and represents good practice
for the industry. The reliance upon or manner of use of this RISSB product is the sole responsibility of the user who is to assess
whether it meets their organisation’s operational environment and risk profile.
Document control
Document title Version Date
Security Handbook for Small to Medium Rail Transport Operators - Volume 1 1.1 Dec 2019
Document history
Publication version Date Reason for and extent of changes
2009 Edition May 2009 Approved for issue by RISSB Board and ARA Executive
2020 Edition 23 June 2020 Revised Edition - Approved for issue by RISSB Board
Approval
Name Date
Rail Industry Safety and Standards Board
Copyright
© RISSB
All rights are reserved. No part of this work can be reproduced or copied in any form or by any means, electronic or mechanical,
including photocopying, without the written permission of RISSB, unless otherwise permitted under the Copyright Act 1968.
References
Legislation
Rail Safety National Law (South Australia) Act 2012 Rail Safety National Law National Regulations 2012
Rail Safety National Law (NSW) No 8a Rail Safety (National Uniform Legislation) Act 2012 No 27 (NT)
Rail Safety (National Uniform Legislation) Regulations 2015 (NT) Rail Safety National Law (Tasmania) Act 2012 No 38
Rail Safety National Law Application Act 2013 No 22 (VIC) Rail Safety National Law (ACT) Act 2014
Rail Safety National Law (WA) Act 2015 Rail Safety National Law (WA) Regulations 2015
Rail Safety National Law (Queensland) Act 2017 Rail Safety National Law (Queensland) Regulation 2017
Commonwealth Places (Application Of Laws) Act 1970 Control of Weapons Act 1990 (Vic)
(Commonwealth)
Control of Weapons Regulations 2000 (Vic) Criminal Code Act 1995 (Commonwealth)
Drugs, Poisons and Controlled Substances Act 1981 (Vic) Environmental Planning and Assessment Amendment (Infrastructure
and Other Planning Reform) Act 2005 (NSW)
Evidence Act 2008 (1958) (Vic) Firearms Act 1996 (Vic)
Health and Safety in Employment Act 1992 (NZ) Information Act 2002 (NT)
Information Privacy and Data Protection Act 2014 (Vic) Information Privacy Act 2000 (Vic)
Injury Prevention, Rehabilitation, and Compensation Act 2001 (NZ) Intelligence Services Act 2001 (Commonwealth)
Justice Legislation Amendment (Terrorism) Act 2019 (NSW) Major Events (Crowd Management) Act 2004
Maritime Transport and Offshore Facilities Security Act 2003 Occupational Health and Safety (Commonwealth Employment) Act
(Commonwealth) 1991 (Commonwealth)
National Security Information Act (2004) Commonwealth Work Health and Safety Act 2011 (ACT)
Workplace Health and Safety Act 2011 (NSW) Occupational Health and Safety Act 2004 (Vic)
Work Health and Safety Law 2012 (SA) Occupational Safety and Health Act 1984 (WA)
Privacy Act 1988 (Commonwealth) Privacy and Data Protection Act 2014 (Vic)
Privacy and Personal Information Protection Act 1998 (NSW) Private Investigators and Security Guards Act 1974 (NZ)
Private Security Act (NT) Private Security Act 2004 (Vic)
Public Records Act 2002 (Qld) Rail Safety Act 1996 (SA)
Rail Safety Act 1997 (Tas) Rail Safety Act 1998 (WA)
Rail Safety Act 2006 & Rail Safety Regulations2006 (Vic) Railway Safety and Corridor Management Act 1992 (NZ)
Right to Information Act 2009 (Tas) Security and Investigation Agents Act 1995 (SA)
Security and Investigations Agents Act 2002 (Tas) Security and Related Activities (Control) Act 1996 (WA)
Security Industry Act 1997 (NSW) & Security Industry Amendment Act Security Industry Act 2003 (ACT)
2005 (NSW)
Security Legislation Amendment (Terrorism) Act 2002 Security of Critical Infrastructure Act 2019 (Commonwealth)
(Commonwealth)
Security Providers Act 1993 (Qld) Surveillance Devices Act (Workplace Privacy) Act 20061999 (Vic)
Surveillance Devices Act 1999 (Vic) Terrorism (Commonwealth Powers) Act 2002 (NSW)
Terrorism (Commonwealth Powers) Act 2002 (Qld) Terrorism (Commonwealth Powers) Act 2002 (SA)
Terrorism (Commonwealth Powers) Act 2002 (Tas) Terrorism (Commonwealth Powers) Act 2002 (WA)
Terrorism (Commonwealth Powers) Act 2003 (Vic) Terrorism (Community Protection) Act 2003 (Vic)
Terrorism (Community Protection) Amendment 2018 (Vic) Terrorism (Emergency Powers) Act 2003 (NT)
Terrorism (Police Powers) Act 2002 (NSW) Work Health Act (NT)
Workplace Health and Safety Act 2011 (Qld) Workplace Health and Safety Act 2012 (Tas)
Workplace Surveillance Act 2005 (NSW) Workplace Video Surveillance Act 1998 (NSW)
Standards
AS/NZS 2201.1: 2007 Intruder alarm systems – Systems installed in AS 2201.5:2008 Intruder alarm systems – Alarm transmission systems
client’s premises
AS 3555.1: Building Elements – Testing and rating for intruder AS 3745:2010 Emergency control organisation and procedures for
resistance – Intruder-resistant panels buildings, structures and workplaces
AS 4145.1:2008 - Locksets – Glossary of terms AS 4485 Set:1997 – Security for health care facilities
AS 4145.2:2008 - Locksets – Mechanical locksets for doors in buildings AS 4806:2008 Set
AS 4811: 2006 - Employment Screening AS 5039:2003 – Security screen doors and security window grills
AS 5040:2003 – Installation of security screen doors and windows AS 5041:2003 – Methods of test – Security screen doors and window
grills
AS 7770 – Rail Cyber Security AS 8000:2003 - Corporate Governance – Good governance principles
AS/ISO 27799:2011 - Information security management in health using AS/ISO/IEC 27001 and 27002 IT Security Set: 2015 – Information
ISO/IEC 27002 technology - Security techniques
AS/ISO/IEC 27013:2017- Information technology - Security techniques AS ISO/IEC 27035 Set2017- Information technology - Security
- Guidance on the integrated implementation of ISO/IEC 27001 and techniques - Information security incident management
ISO/IEC 20000-1
AS/ISO/IEC 27002:2015- Information technology - Security techniques AS/NSZ ISO/IEC 11770 Security Set: 2008 – Information technology –
- Code of practice for information security controls Security techniques – Key management
AS/NZS 1170.2:1170.2:2002 – Structural Design Actions – Part 2: Wind AS/NZS IS O/IEC 9798 Set:2008- Security for health care facilities -
Actions General requirements Information technology - Security techniques
AS/NZS ISO/IEC 17799:2005 Information technology – Code of practice AS/NZS ISO/IEC 17799:2006 - Information technology - Security
for information security management techniques - Code of practice for information security management
AS/NZS ISO/IEC 18028:2008 - Information technology - Security AS/NZS ISO/IEC 27005:2012 – Information technology - Security
techniques - IT network security - Network security management techniques - Information security risk management (ISO/IEC
27005:2011, MOD)
AS/NZS ISO/IEC 27011:2017 – Information technology - Security AS/NZS ISO/IEC:2005 – Information technology – Security techniques
techniques - Code of practice for information security controls based – information security management systems - Requirements
on ISO/IEC 27002 for telecommunications organizations
HB 158 – Delivering assurance based on AS/NZS ISO 31001 HB 167:2006 - Security risk management
HB 171:2003 – Guidelines for the management of IT evidence HB 231:2004 - Information security risk management
HB 240 Guidelines for managing risk in outsourcing HB 324:2008 - Lexicon of key terms used in security
HB 327 – Communicating and Consulting about Risk HB 328:2009 - Mailroom security
HB 436 – Risk Management Guidelines – Companion to AS/NZS ISO ISO 31000:2018: Risk management Guidelines
31001
ISO Guide 73 – Risk Management – Vocabulary Protective Security Policy Framework (Commonwealth)
SRMBOK RMIA 2008 Victorian Protective Data Security Standard (VPDSS)
Other
A National Approach to Closed Circuit Television – National Code of ANZCTC – National Guidelines for Protecting Critical Infrastructure
Practice for CCTV Systems for the Mass Passenger Transport Sector for from Terrorism 2015
Counter Terrorism (COAG July 2006)
ANZCTC – Hostile Vehicles Guidelines for Crowded Places 2017 ANZCTC – National Counter-Terrorism Plan 2017
ANZCTC – Australia’s Strategy for Protecting Crowded Places from ANZCTC – Active Offender Guidelines for Crowded Places 2017
Terrorism 2017
ANZCTC – Improvised Explosives Devices (IED) Guidelines for Crowded ANZCTC – Chemical Weapon Guidelines for Crowded Places 2017
Places 2017
ASIO Mass Passenger Transport Systems Risk Context Statement June Attorney-General’s Department (2005) National Counter-Terrorism
2014 Plan, Canberra: CoA
Attorney General’s Department (2017) National Counter-Terrorism Attorney General’s Department - Protective Security Policy
Plan Framework (Critical Infrastructure Protection)
Attorney General’s Department Critical Infrastructure Resilience Attorney-General’s Department – Managing the Insider Threat to
Strategy Plan 2015 your business – A personnel security handbook
Attorney-General’s Department - Physical Security Management Australian Government – COMCOVER – Better Practice Guide – Risk
Protocol 2011 Management 2008
Australian Government- Cyber Security Strategy 2009 Australian Government - Improvised Explosive Device (IED) Guidelines
For Places Of Mass Gathering
Other
Australian Government - Investigation Standards (AGIS) 2012 Australian Government – Organisational resilience – Critical
Infrastructure 2011
Australian Government – Physical security Management Guidelines – Australia’s Counter Terrorism Strategy 2015
Physical Security of ASIS International – ASIS ORM.1-2017 – Security
and Resilience in Organizations and their Supply Chain – Requirements
with Guidance
Building Code of Australia Centre for the Protection of National Infrastructure – Security
Lighting: Guidance for Security Managers 2015
Queensland Police Service - Crime Prevention Through Environmental Commonwealth Attorney-General’s Department (2005)
Design (CPTED) Guideline (Parts A and B) Commonwealth Protective Security Manual, Canberra: CoA
CPNI UK – Door Security 2013 CPNI UK – CCTV for CNI Perimeter Security 2014
CPNI UK – Integrated Security Guide for Hostile Vehicle Mitigation 2nd CPNI UK – Integrated Security Guide for Hostile Vehicle Mitigation
Edition 2014 2nd Edition 2014
CPNI UK - Levels 1 and 2 Operational requirements for Hostile Vehicle CPNI UK – Protecting against Terrorism 3rd Edition 2010
Mitigation 2010
Crowded-places-security-audit Dept of Home Affairs – National Surface Transport Security Strategy
Dept of Home Affairs – National Code of Practice for CCTV Systems for Department of Infrastructure - National Policy Framework for Land
mass passenger transport sector for counter-terrorism Transport Technology
Department of Transport CPNI (SIDOS) UK – Security in Design of Dr Miles Jakeman – Citadel Group Limited - Australia – Guide to
Stations 2012 SRMBOK RMIA – Physical Security Specifications and Postures
Handling and Transporting Cash – Security Risks – General Guide 2014 HM Government UK – Protecting Crowded Places – Design and
Technical Issues 2014
Home Office Scientific Development Branch UK – CCTV Operational ICT equipment, systems, and facilities 2011
Requirements Manual 2009
Information Privacy Principles Instruction (SA) Inter-Governmental Agreement for Surface Transport Security
International Union of Railways – Station Security for Station Business National Critical Infrastructure Resilience Strategy July 2016
National Guidelines For The Protection Of Places Of Mass Gathering National Guidelines for Protecting Critical Infrastructure from
From Terrorism September 2010 Terrorism
Protecting Crowded Places from Terrorism 2017
Risk Management Institute of Australia (RMIA) – Security Risk RISSB Security Handbook Vol 1 - Managing Security Related Risks in
Management Body of Knowledge Rail Organisations
RISSB Code of Practice – Rail Cyber Security in Rollingstock RISSB Code of Practice – Rail Cyber Security in Train Control
RISSB Guideline – Implementation of AS 7770 State Government of Victoria – Guide to Develop CCTV for Public
Safety in Victoria
Transport and Infrastructure Senior Official Committee, A national Trusted Information Sharing Network for Critical Infrastructure
approach to close circuit television, national code of practice for CCTV Protection – Defence in Depth 2008
systems for the mass passenger transport for counter-terrorism
USA MTI – The Challenge of Protecting Transit and Passenger Rail – US Department of Transport – Transit Security Design Considerations
Understanding how Security works against Terrorism 2004
UFC 4-022.02 – Selection and Application of Vehicle Barriers 2009 UFC 4-010-01 – DoD Minimum Antiterrorism Standards for Buildings
Victorian Critical Infrastructure Resilience Strategy July 2016 Victorian Ministerial Guidelines for Critical Infrastructure Resilience
Hazard table
Contents
1 Introduction ................................................................................................................... 7
1.1 Background ..................................................................................................... 7
1.2 Structure and Application ................................................................................ 7
1.3 Purpose........................................................................................................... 8
1.4 Terminology .................................................................................................... 8
2 Roles and Responsibilities ............................................................................................ 8
2.1 Developing the Security Risk Management Program (SRMP) ......................... 8
3 Security Risk Management ......................................................................................... 10
3.1 Overview ....................................................................................................... 10
3.2 Integrated Safety, Security and Emergency Risk Management ..................... 10
3.3 Risk Assessment ........................................................................................... 10
4 Rail Transport Security Risk Management Strategies ................................................. 18
4.1 Rail Transport System Characteristics........................................................... 18
4.2 Security Principles ......................................................................................... 18
4.3 Personal Security .......................................................................................... 21
4.4 Physical Security ........................................................................................... 29
4.5 Operational Security ...................................................................................... 34
4.6 Information Management and Electronic Security ......................................... 38
4.7 Incident Reporting and Recording ................................................................. 41
4.8 Privacy .......................................................................................................... 42
5 Security Exercises ...................................................................................................... 43
5.1 Rationale for Security Exercises .................................................................... 43
5.2 Progression of Exercise Program Development ............................................ 43
5.3 Categories of Exercises ................................................................................ 44
5.4 Steps in Process ........................................................................................... 45
6 Annexes ...................................................................................................................... 48
6.1 List of Annexes.............................................................................................. 48
Annexes
Annexe A Glossary of Security and Emergency Risk Management Terms .................... 49
Annexe B Example Security Risk Management Program Roles & Responsibilities Matrix52
Annexe C Example Security Threat Alert Level System ................................................. 53
1 Introduction
1.1 Background
It is an unfortunate fact today that our rail transport systems face challenges in protecting passengers,
staff, information, physical assets, and their reputations, from security related risks. There are also
regulatory obligations that introduce specific requirements with respect to security.
International tragedies involving rail have highlighted the potential scale of risks faced by the industry.
The country’s rail transportation systems are essential services, yet they are designed to be accessible,
and their very function is to concentrate passenger and/or freight flows in ways that can create
vulnerabilities for threats sources, such as criminals and terrorists to exploit. Prospects of defending
against each of these vulnerabilities through traditional means, such as guards, guns, and gates, are
dim. The rail transportation system is simply too large, and the threats faced too diverse and ever
changing for such blanket approaches to work. While the likelihood of a terrorist attack on rail
operations in Australia or New Zealand is much lower than the probability of being impacted by
localised threats, the rail industry considers that it has the responsibility to ensure that its operations
are as safe as possible. The industry agrees that while operations vary significantly, the identification
and management of security related risks should be undertaken in accordance with a consistent
framework.
Rail transport operators (RTOs) have an obligation to manage all safety and security risks so far as is
reasonably practicable (SFAIRP) in accordance with the Rail Safety National Law and Regulations.
Each accredited organisation is required to have a safety management system of which security
management forms a part.
The railway safety and security risk profile can best be achieved through security systems and programs
that integrate with all aspects of operations and are deliberately designed to deter security threat
sources, taking a risk-based approach.
This Handbook has been developed to support small to medium operators, whether they transport
people or freight or both, with meeting their regulatory and corporate objectives with respect to
security risk management. Larger RTOs have established and mature security systems which are
commensurate with their levels of risk. However, the underlying principles would apply across the rail
industry.
Notwithstanding regulatory, corporate, and moral obligations inherent within security risk
management, strategies that are introduced should be compatible with operational requirements. RTOs
may adapt the instructions and templates associated with this Handbook to suit their own local
operating conditions and risk profiles.
This Handbook does not replace specialist advice from external agencies, and operators should seek
additional support from competent persons as required.
1.3 Purpose
This Handbook provides a framework and methodology for managing safety and security related risks in
RTOs. It embraces the wide range of threats to which the rail transport systems are potentially exposed,
including those related to issue motivated groups (IMGs) and terrorism.
The objectives of this Handbook are to:
(a) encourage clear definition of security roles and responsibilities within RTOs;
(b) establish a framework for the consistent application of security risk management principles
that could be integrated with the rail industries safety and emergency risk management
systems;
(c) provide guidance for RTOs in developing a security risk management plan (SRMP) to
manage risks to so far as is reasonably practicable (SFAIRP).
1.4 Terminology
It is important to understand that some terms in common usage have special meaning within the
context of security risk management. For the purposes of this Handbook, terms will have the meaning
described in the Glossary of Security Terms at Annexe A, or as referenced in the following documents:
(a) ISO 31000:2018 Risk Management Guidelines.
(b) HB 167:2006 - Security risk management.
(c) Glossary of Terms (which can be viewed on the RISSB web site at www.rissb.com.au).
(a) Commitment.
(b) Organisational wide security and risk policies.
(c) Link strategy, planning and delivery.
(d) Establish and manage to agreed risk thresholds.
(e) People security.
(f) Physical and environmental security.
(g) Operational security management.
(h) Business continuity and resilience.
(i) Testing.
(j) Measure and review.
(k) Document control.
(l) Assurance.
From these, a number of important functions can be considered, such as:
(a) developing plans and policies;
(b) managing a structured program of safety and security risk assessments;
(c) developing and managing incident reporting systems;
(d) communicating and promoting the SRMP through awareness strategies, including the need
for exercising plans;
(e) referring security incidents for investigation;
(f) coordinating incident and emergency response; and
(g) periodically reviewing and auditing the SRMP.
In recognition of system-to-system variations in RTOs, this Handbook uses the term “security
coordinator” to refer to the person with delegated responsibility for the SRMP. It is, however,
acknowledged that no single staffing recommendation is adequate for all RTOs, as each RTO’s SRMP
should be developed and evolve to address local conditions, risks, and resources.
Depending on the size and resources of the RTO, the “security coordinator” may be the
director/manager of safety, with support from in-house or competent external specialists.
For smaller operations, the CEO, director of safety, the safety risk manager, or the facilities manager
may incorporate these activities into their duties, supported by a committee comprised of management
and operating personnel, and coordinated with local emergency services representatives.
Whatever organisational structure is established by the RTO it is recommended that the security
coordinator:
(a) reports directly to the RTO’s CEO or equivalent position;
(b) receives an appropriately resourced budget for security activities;
(c) ensures that the governing body have to up to date information regarding security
activities;
(d) has clear and unambiguous terms of reference and level of authority.
The ABC Railway Company, through its Safety, Security and Emergency
Management Systems, will continually plan to reduce or eliminate safety and
Intention
security risks. This will lead to the creation and maintenance of a safer
Statement environment by identifying, analysing, assessing risks and recommending
treatment options.
This process will be guided by the application of integrated safety, security and
emergency risk management strategies –
• Prevention (Safety and Security Incident Mitigation);
Reference • Preparedness (Plans, Policies, Procedures & System Review);
Response (Emergency Planning) and Recovery (Welfare and Continuity of
Operations.)
The ABC Railway Company use a consultative and multi- disciplinary approach to
most efficiently utilise the skills, expertise and local know ledge of all
participants involved.
Specialists may be co-opted by management if their knowledge, experience and
skills are required at any stage. Communication with all stakeholders will be
Process enhanced through regular meetings, the distribution of minutes and information
and awareness forums.
The process will employ Handbooks described in ISO 31000 – Risk Management
and any other legislated requirements, Codes of Practice and company
directives.
The ABC Railway Company s Safety & Security Coordinator recognises that this
process may lead to suggested risk treatments that may affect or be affected by
Impact social, political, economic and/or the environment aspects of the rail
transportation system. All risk treatment options will be considered irrespective
of the perceived constraints.
The integrated safety, security and emergency risk management plans and their
Revision
accompanying procedures will be continually monitored and reviewed. Results
Statement will be recorded, and actions implemented as necessary.
Figure 1 – Example context statement (Integrated safety, security & emergency risk management plan)
Security planning used to identify and manage risks and assist decision making by:
(a) applying appropriate controls effectively and consistently as part of the entity’s existing risk
management arrangements;
(b) adapting to change while safeguarding the delivery of business and services;
(c) improving resilience to threats, vulnerabilities, and challenges;
(d) driving protective security performance improvements.
Requirements:
(a) Security goals and strategic objectives of the entity, including how security risk
management intersects with and supports broader business objectives and priorities.
(b) Threats, risks, and vulnerabilities that impact the protection of an entity’s people,
information, and assets.
(c) Organisation’s tolerance to security risks.
(d) Maturity of the entity’s capability to manage security risks.
(e) Organisation’s strategies to implement risk management, maintain a positive risk and
safety culture.
When considering risk management, RTOs should ensure that they are working towards the
demonstration of managing risk so far as is reasonably practicable.
Notwithstanding the ISO 31000 model, the assessment process in simple terms seeks to determine the
following five elements:
v. Step 5. Prioritise assets based upon their criticality scores. RTO executive/officials
review rankings to determine their reasonableness and to establish a threshold for
the assets considered most critical.
(b) Minimum standards. Establish if there are any minimum standards of protection detailed in
Legislation, Australian Standards, Codes of Practice, etc and use these requirements in your
context for assessment. Other resources are listed at the rear of this Handbook.
(c) Other resources. RTOs should monitor and maintain an understanding of the full range of
contexts within which security related risks need to be managed within their operations. It
should be noted that while there will be some overlaps there will most likely be contextual
variations between the various aspects of RO operations, even for a small operator.
3.3.2 Who or What Threat Sources Do I Need to Protect the Critical Assets
From?
This is where we identify the potential risks from sources of threat and hazards.
(a) Step 1. Develop a list of threats and hazards (i.e. bomb threat, explosion, arson, fire, theft
of information, sabotage, CBR incident, etc) that might be used by a threat source (e.g.,
terrorist, criminal, disgruntle employee).
(b) Step 2. Evaluate the potential that a particular threat or hazard would be used against the
RO assets (against the National Terrorism Threat System (NTTS):
(c) Step 3. Evaluate the attractiveness of asset targets based on the potential for casualties,
potential for economic disruption, or symbolic importance.
(d) Step 4. Define risk event scenarios (based on target asset, type of threat or hazard, and
mode of delivery); the information will be used in subsequent assessment components.
3.3.3 What Makes It Likely that a Threat Source or Hazard May Succeed in
Causing Harm?
This is where we determine the RTOs vulnerabilities (that is those factors that exist that a threat source
could exploit to cause harm, e.g., asset exposure, ineffective countermeasures, etc).
(a) Step 1. Develop a six-point rating scale to determine the probability of a successful attack
(refer Security Handbook Volume 2). Using the rating scale to provide an evaluation score
against the following three elements:
i. Pre-impact planning.
3.3.4 What Will Be the Impact to the Assets if the Threat Source Is
Successful with An Attack?
This is where we determine the consequences.
(a) Step 1. Use the critical asset factors identified earlier to rate the effect of the threat (risk
event) on each assets mission.
(b) Step 2. Once each asset has been rated, calculate a total overall impact level – how each
asset’s mission is affected based upon the extent to which it would be destroyed, damaged,
or rendered unavailable. Consider the impact on people, property, information, operations,
reputation, environment and litigation, and the criticality of these. This could also include
industrial relations or other employee relations issues.
i. Notwithstanding regulatory obligations, RTOs should consider ISO 31000 and HB167
when considering selecting the most appropriate option [to treat risks] involves
balancing the costs of implementing each option against the benefits derived from it.
In general, the cost of managing risks needs to be commensurate with the benefits
obtained. When making such cost versus benefit judgements the context should be
taken into account. It is important to consider all direct and indirect costs and
benefits whether tangible or intangible, are measured in financial or other terms.
ii. In determining the most appropriate treatments, RTOs should have regard to the
layered Security-in-Depth principle, ensuring that protection of any potential target
is not reliant on only one security strategy. Rail transportation security can best be
achieved through coherent security systems that are well integrated with rail system
operations and are deliberately designed to deter a threat source even as they
selectively guard against and prepare for an attack on the system. Layered security
systems in particular, characterised by an interleaved and concentric set of security
features, have the greatest potential to deter and protect. Layered systems cannot
be breached by the defeat of a single security feature – such as a gate or guard; as
each layer provides backup for others, so that impermeability of individual layers is
not required. Moreover, the interleaved layers can confound the would-be attacker.
Calculating the odds of breaching a multi-tiered system of defence is far more
difficult than calculating the odds of defeating a single, perimeter protection. Figure
6 illustrates an example of featured layered security systems in a passenger rail
environment.
iii. Security threat alert system. RTOs should principally implement security controls that
are commensurate with the level of threat. Therefore, RTOs should establish a
“security alert system” that employs “incremental levels” of security controls, which
allow the escalation or de-escalation of the level of security in response to changes in
the level of threat. The decision to change to a higher or lower security alert level
should have regard to the National Counter-Terrorism Alert Levels, as well as
industry and locally applicable threat assessments. hyper provides an example of a
security alert level system, with suggested actions against each designated level.
(d) Step 4. Obtain authority and funding for the treatment plan, and then implement the plan.
1
Australia’s Strategy for Protecting Crowded Places
Figure 8 illustrates the concept of a layered security-in-depth principle. The principle of ‘Defence in
Depth’ is fundamental to facilities. The concept places the most critical asset(s) in the centre of
concentric levels of increasingly stringent security measures. For example, a rail transport facility’s
operations control room should not be placed next to the building’s reception area. Instead, where
feasible, it should be located deeper within the building so that to reach the control room, an intruder
would have to penetrate numerous rings of protection, such as a fence at the property line, a locked
interior door, an alert receptionist, an elevator with a control key floor button, and a locked door to the
control room itself.
Each ‘ring’ represents a change in one or more of the security controls outlined with the Security
Philosophy, such as a security management process (e.g. visitor access), a physical barrier (e.g. door,
wall) or a technical solution (e.g. access control, CCTV through which an intruder must pass prior to
achieving their goal).
This can also be known as the ‘onion’ skin principle in which multiple layers of security must be peeled
back in order to breach the security of the protected asset. Each layer provides a further protective
barrier or delay, adding to the overall protection afforded to the asset contained within the centre. Each
layer performs a function in supporting the overall protective security strategy and are therefore
dependent on one another.
Figure 8 illustrates an alternate security-in-depth approach that also encompasses a layered approach
to not only the prevention and preparedness elements, but to the response and recovery elements also.
Core Assets
Alert, Well trained employees, Pre and post trip vehicle inspection procedures,
Interior Locks/ sensors for carriages, Emergency Communication (Help point, Radio),
GPS, Onboard CCTV, Incident response procedures.
RTOs should ensure that a layered approach is adopted when implementing protective security
measures of their assets.
indictable offence, MAY in the opinion of an employer, make the person unsuitable to
occupy a POT. This process can also be carried out through a private provider.
(f) Driver’s licence check. Verification of valid license, class/type, issue/expiration date,
personal identifying information.
(g) Professional accreditation/licence check. Will confirm whether an applicant has the
required credentials or licences, types of licence, whether valid, dates issued, state and
licensing/registration authority, restrictions on the licence, etc.
(h) Medical assessment. Ensures compliance with medical requirements of certain jobs.
(i) Immigration and naturalisation check. Verifies proof or Australian permanent residency.
Candidates will be required to provide:
i. an Australian birth certificate; or
ii. a certificate of Australian citizenship; or
iii. evidence of resident status from Australian Immigration authorities.
iv. if you are from New Zealand (NZ), you are required to supply a copy of your NZ
passport and a copy of the visa page clearly showing the Immigration Australia stamp
with the date of arrival in Australia certified by an acceptable referee.
Authority to work check.
If the candidate for employment is not an Australian citizen or permanent resident, a copy of applicants
current passport, certified by an acceptable referee, can check the applicants migration status, duration
of visa and entitlement to work in Australia with the Department of Home Affairs VIVO Check online.
Credit history check.
Will show the applicant’s ability to manage their finances responsibly.
Each RTO should establish screening policies that specify the level and frequency of screening required
of each position and employment circumstance. Figure 10 illustrates a sample of a screening matrix that
includes types of screening and the positions for which the screening could apply. RTOs should consider
whether the investigations will be done in-house or by a third-party vendor.
In developing the screening policies, RTOs should consider whether it is mandatory to require
contractors and suppliers of temporary staff to certify that their personnel meet defined probity
requirements (e.g. employment of private security).
Criminal history
Drivers License
Credit history
Identification
accreditation
Employment
Immigration
Professional
Authority to
Education
Character
/Licence
Medical
work
New employees X X X X X X X X X
(Non-designated)
New employees X X X X X X X X X
(POT)
Periodic (POT) X X X X X X X X X X
Contractors & X X X X X
vendors
Figure 10 - Example Pre-Employment Background Screening Matrix
Residential history check A residential history check helps to substantiate the person's identity in the community.
All personnel need to provide supporting evidence of their current permanent
residential address.
The Attorney-General's Department recommends checking residential history for all
new personnel for a period of at least 5 years. It is recommended that entities make an
assessment of whether the person's explanation about periods of residency for which
they cannot provide supporting documents is reasonable.
Referee checks A referee check helps entities engage people of the appropriate quality, suitability, and
integrity.
The Attorney-General's Department recommends conducting professional referee
checks covering a period of at least the last 3 months.
A referee check may address:
2
Protective Security Policy Framework - Personnel (Table 2)
National police check A national police check, commonly referred to as a criminal history or police records
check, involves processing an individual's biographic details (such as name and date of
birth) to determine if the name of that individual matches any others who may have
previous criminal convictions. It is important that entities conducting a national police
check are clear about what convictions would preclude a person from employment.
The Spent Convictions Scheme outlined in Part VIIC of the Crimes Act 1914,requires that
entities request a 'no exclusion' national police check, unless the entity is covered by an
exclusion under the Act.
A Commonwealth 'no exclusion' national police check provides a record of
Commonwealth convictions for the preceding 10 years, or until there is a gap of 10
years between convictions, whichever is the longer. However, convictions reported by
each state or territory will depend on their relevant spent convictions schemes.
For information, see the Australian Federal Police (AFP) website National Police Checks
and the Office of the Australian Information Commissioner Spent Conviction Scheme
Fact Sheet.
Credit history check A credit history check establishes whether the person has a history of financial defaults,
is in a difficult financial situation, or if there are concerns about the person's finances.
The Attorney-General's Department recommends checking a person's credit history. A
credit history check may be requested from an accredited financial credit check
organisation. A number of private organizations can provide credit history checks on a
fee-for-service basis.
Qualification check A qualification check verifies a person's qualifications with the issuing authority.
The Attorney-General's Department recommends verifying declared academic
qualifications with the issuing authorities, including universities, technical colleges or
schools, as well as any professional associations or memberships that are required.
Additional tools available include the 4C’s – Confirm, Clear, Cordon and Control. Figure 12 shows the
approach to be taken.
In planning security awareness and training, RTOs should consider the need for programs to be run for
staff at the following times:
(a) Pre-employment.
(b) Induction.
(c) Arrival in a new work area.
(d) Routinely at appropriate intervals.
(e) Policy / procedure changes.
(f) Changes to risk profile.
(g) Post-incident.
(h) Exit interview (e.g. Reinforcing confidentiality that extends post-termination).
Public awareness. RTOs operating in the mass transit environment should also initiate public awareness
programs through the use of signage and announcements to encourage users of the rail transportation
system to alert rail transport staff or police, if they observe suspicious packages, persons, or behaviour.
As at 20 current threat priorities have been identified as:
(a) IED, (including placed IED;
(b) PBIED and VBIED;
(c) active armed offender;
(d) hostile vehicle;
(e) hostile reconnaissance;
(f) sabotage;
(g) bomb threat;
(h) chemical, biological, or radiological (CBR).
Safety culture. It is important that RTOs develop a positive safety culture across all aspects of the
business with demonstration of a set of security values, shared by everyone in an organisation, that
determine how people are expected to think about and approach security. Getting security culture right
will help develop a “security” conscious workforce and promote the desired security behaviours you
want from staff.
minimum and take place under constant key control supervision by the KCO. The following
requirements should apply:
(a) Keys, coded cards, and mechanical code (combination) locks should only be accessible
to those persons whose official duties require access to them.
(b) Combinations to mechanical code locks should be changed following the discharge,
suspension, or reassignment of any person having knowledge of the combinations or at
least every six months.
(c) Keys that are not issued should be stored in a locked container that has been approved
by the Security Coordinator.
(d) Access lists for persons authorised to draw keys should be maintained in the key
storage container.
(e) Key containers should be checked periodically, and all keys accounted for by
documented bi-annual inventories.
(f) Keys should be retrieved from personnel who are transferred, discharged, suspended,
or retire, and the employees’ security codes should be immediately removed from
electronic access systems. Depending on the circumstances, it may also be necessary
to consider additional measures, such as changing locks when a disgruntled employee
leaves.
(g) Periodic re-keying of locks to secure areas should be considered to address key
attrition problems.
(h) Key control systems should be inspected regularly, and malfunctioning equipment
repaired or replaced.
At the time of installation of any new locks, or the re-keying of any cylinder, the RTO is to ensure that
any keys delivered at that time correctly operate the relevant locks. The RTO is to also:
(a) verify the number and markings on the keys received match the requirements;
(b) update the key register;
(c) verify that any existing master keys applicable to the locks operate them correctly.
Where the RTO maintains its own key cutting facilities, the RTO is to ensure that all key cutting codes
and blanks are stored in a suitable secure enclosure (e.g. safe). Special consideration should be given to
the protective security requirements on the room housing the key cutting equipment.
Lost and unaccounted-for keys and electronic access cards
When the results of the key inventories and inspections reveal that there are lost keys or access cards,
the KCO will:
(a) report the loss of unaccounted-for keys/access cards to the security coordinator,
together with a list of the areas to which the keys provide access. Codes for lost access
cards will be removed from the facility’s access control system;
(b) in coordination with the security coordinator and the facility’s manager, determine the
extent to which locks should be recoded, changed, or otherwise modified to prevent
compromise of existing safeguards.
It may be appropriate to create a range of areas that reflect the differing requirements applicable to the
RTO. These spaces or areas may be used to define public and private space, i.e. where certain people
may or may not enter. (e.g. Highly restricted area – operational staff only; Restricted area – authorised
staff and escorted visitors; Operational area – staff and authorised visitors; Common area – staff and
visitors; Public area.)
Notwithstanding the range of areas as may be defined in the access management policy and
procedures, RTOs should ensure clearly defined transitions from public to semi-public to private space
by using signage, landscaping or other operationally appropriate border definition strategies, as well as
using appropriate protective security measures to support the requirements. Where appropriate,
signage should be used to reinforce the areas, and transition points between the areas.
An intruder detection and alarm system (IDAS) is a combination of integrated electronic components,
including sensors, control units, transmission lines, and monitoring units, that detect one or more types
of intrusion into an area protected by the IDAS.
IDASs can be useful throughout rail transportation system operations, allowing security personnel to
monitor the movements of authorised people in restricted-access areas and to alert security personnel
of potential breaches by unauthorised persons. Pairing IDAS with remote surveillance technology
enables event-triggered surveillance.
The determination of IDAS requirements may require specialist advice, and must always include
consideration of:
(a) the objectives for the IDAS (e.g. detect attempted intrusion; detect changes at a given
point; detect changes near a given point; detect movement within a given space;
confirm movement within a given space; warn intruder; repel intruder; annunciate
remotely);
(b) remoteness of the location;
(c) interface requirements (e.g. electronic access control);
(d) weather and environmental conditions (e.g. Electromagnetic or radio frequency
interference);
(e) communication options (e.g. PSTN telephone line, network, radio, mobile telephone
network);
(f) the nature of the likely threat source (e.g. sophistication, resources, knowledge).
Where the IDAS is to be deployed in a critical or sensitive area, consideration should be given to using
parallel or redundant communications paths for the alarm signal, e.g. PSTN telephone line and cellular
telephone network).
Duress and assistance call alarms should be installed in a manner that makes them easy to activate, but
immune from accidental activation.
All staff and contractors that may be required to operate alarms should receive appropriate training and
should be encouraged to participate in regular testing of the alarm.
All staff and contractors that may be required to respond to alarms should receive specialist training in
relation to performing alarm response duties.
Where the RTO contracts off-site monitoring and alarm response, the Security Coordinator is to ensure
that clearly defined contracts for the relevant services are in place and reviewed annually.
4.4.4 Lighting
Lighting increases visibility in and around rail transportation systems, facilities, installations, and makes
it more difficult for intruders to enter a facility undetected. It is beneficial in almost all environments,
especially those that receive little natural light or are used at night.
RTOs should consider lighting requirements when installing and updating other security risk
management sub- systems, particularly those that utilise surveillance and intrusion detection. In
accordance with crime prevention through environmental design (CPTED) principles, lighting can also be
used to create greater levels of comfort for customers and staff present in rail transportation facilities.
Types of lighting should also be considered – fluorescent, LED, or sodium, taking into account the
desired outcome for each environment.
(d) recovery
Mitigation
This is about maintaining sustained and often permanent actions that reduces exposure to, probability
of, or potential loss of assets from threatening or hazardous events. They tend to focus on where and
how to design built environment and also include staff education and community awareness programs.
Preparedness
Preparedness includes those arrangements that will ensure the full and effective utilisation of all
resources and services for response and recovery. It is simply and activity of preparing for an emergency
before it occurs. It encompasses those actions taken before an adverse incident occurs, namely planning
and organising, equipping and training personnel, and setting up exercises to deal with those
emergencies that cannot be avoided or mitigated entirely. Obviously, it is important to not just plan, but
to prepare as well. The key to effective emergency management is being ready to provide a rapid
emergency response. Being ready includes:
(a) the implementation of a structured emergency management planning and response
system and resources, including clear and unambiguous lines of command, control and
communication;
(b) training for the emergency planning committee (EPC) and emergency control
organisation (ECO) personnel;
(c) conduct of exercises and drills to test response and recovery procedures;
(d) logistics to provide suitable resources for supporting the emergency management
system.
Response
Response planning includes the actions taken to minimise the effects of impeding or actual
emergencies. It involves saving lives, reducing injury and suffering, and preventing further damage.
Trained and equipped personnel will be required to deal with any emergency situation. This part of the
plan deals with the implementation of the short-term effects of the event. Response can include, but is
not limited to:
(a) incident identification;
(b) emergency notifications;
(c) activation and deployment of the ECO; and
(d) the evacuation of personnel.
Recovery
Recovery planning is the enabling and supporting process that allows individuals, groups and the
communities of groups to attain a proper level functioning, through the provision of information,
specialist services and resources. It is also the physical process of reconstruction. It encompasses both
near-term and long-term actions taken to return the organisation to a pre-emergency level of
operations or, in some cases, to a new level of operation during recovery. It can include, but is not
limited to:
(a) activating continuity of operations or business continuity plans (resumption of mission,
provision of personnel services such as welfare, health and counselling, etc);
(b) setting up emergency relocation sites; and
The all-hazards approach to emergency planning recognises that the requirements in various response
plans will be similar regardless of whether the plan deals with a natural, human or accidental threat
incident. For example, an evacuation plan is necessary despite whether the need for the plan is
prompted by a fire, bomb threat, or HAZMAT spill.
All agencies approach
An emergency in a rail transportation environment will likely have the potential to effect broader
elements of the local environment by impacting the surrounding community, and in extreme cases,
impact upon the RTO enterprise strategically or on the community as a whole at both State and
National levels, as would be the case in the event of a terrorist incident. Hence, the implementation
of an emergency management system should take into account all affected stakeholders in both the
RTO and other sectors through the implementation of mutually agreed arrangements.
As a guide, two primary elements that should be the foundation for any information management policy
are:
(a) how to identify sensitive information that must be protected; and
(b) how to control access to sensitive information responsibly.
By establishing appropriate policies in each of these two areas, RTOs can improve rail transportation
security, while minimising administrative burden and maintaining appropriate accountability to the
organisation, and in some cases, the public.
Identifying sensitive information
RTOs generate an enormous number of electronic and paper documents every year. Most of this
information requires no specific protection. For example, project-related documents for a simple
installation or track modification project would likely not require any sort of special management. RTOs
should be aware that arbitrary and unnecessary restrictions on non-sensitive information increase
bureaucracy and may jeopardise legitimate efforts to protect sensitive information. A sub-set of RTOs
documents, however, can potentially be misused by someone intending to cause harm. Access to this
information should be controlled.
For most RTOs, information likely to be considered sensitive if it is useful for:
(a) selecting a target for a threat; and/or
(b) planning and executing an attack.
Information likely to be found in an RTO that meet these criteria includes the following:
(a) Risk assessment reports. This type of data provides detailed information about the RO’s
security vulnerabilities. Such data is used in planning for the protection against associated
security risks and potential threats.
(b) Emergency response plans. These materials provide detailed information about a RTO’s
protocols for responding to and recovering from a range of safety and security incidents.
These plans contain sensitive information that could be used by a threat source in planning
their attacks that injure emergency responders or disrupt their efforts.
(c) Other sensitive information. Visual and textual architectural and engineering data are vital
to understanding the core operations and structural components of rail transportation
infrastructure. This information may include building or structural plans, schematic
drawings and diagrams, security system plans, and threat analysis related to design or
security of critical infrastructure – all of which may be of interest to a threat source and
could be dangerously misused by someone intending to cause harm. Such information is
created and retained for many reasons, including use as emergency reference during the
construction and reconstruction of rail transportation infrastructure. As part of these
processes, design documents are often copied and distributed for use by architects,
contractors, inspectors, third party reviewers, and others – all of whom need access to
blueprints, engineering schematics, and other technical documents to be able to safely and
effectively fulfil their responsibilities.
When considering information management, RTOs should also consider the impacts of
Cyber Security, both for documentation and for any relevant technology (or safety critical)
systems.
RTOs should also be aware of additional reporting obligations such as data breach. The incident
reporting policy and procedures should require that all defined incidents be reported in a timely
manner.
Where the RO has regulatory obligations with respect to incident reporting, the RO is to ensure that
those obligations are able to be fully satisfied through the incident reporting policy and procedures.
Freedom of information and privacy related legislation should be considered when developing policies
and procedures.
The RTO should use a standardised system of incident classifications.
4.8 Privacy
RTO should develop and implement any additional policies and procedures that may be required to
ensure that security related information (including video recordings) is stored and handled in
accordance with relevant privacy principles. In satisfying its obligations under privacy principles, the RTO
is obliged to communicate certain aspects of its approaches to protecting information. The RTO is to
ensure that appropriate communication strategies are developed and implemented. Such strategies
may, for example, include signage, notations on forms, statements on security related web sites, or
specific emails to staff.
In preparing communications in relation to privacy provisions, the RTO should have regard to exclusion
provisions within the privacy principles with respect to a person accessing information about
themselves where such access to that information may affect the privacy of another person, or impact
on an investigation or prosecution.
5 Security Exercises
5.1 Rationale for Security Exercises
Rail transportation systems are vulnerable to a range of security events that may result in an emergency
situation. The conduct of security exercises allows RTOs to practice and test their developed security
and emergency response plans. In turn, a well conducted and evaluated exercise will reveal
inconsistencies, highlight deficiencies in resources, determine the organisations ability to coordinate
their response capabilities with other agencies, and emphasise the need for any additional training.
RTOs may wish to refer to the Australian Disaster Resilience Handbook 3 - Managing Exercises.
Going directly into a real emergency operation without practicing in exercise involves substantial risks.
For example, many participants may not know or thoroughly understand what their emergency
responsibilities are or how these responsibilities relate to activities performed for other elements of the
response. Equipment may not function as expected, and procedures may not be as effective as
anticipated. Such risks, when thoughtfully considered, will be unacceptable to most RTOs.
Accordingly, RTOs should develop a broad spectrum of exercise activity, so that functional emergency
response and recovery capability to security incidents can be realistically assessed and improved. If well
designed and executed, security and emergency exercises are an effective means of:
(a) testing and validating policies, plans, procedures, training, equipment, and interagency
agreements;
(b) clarifying and training personnel in roles and responsibilities;
(c) demonstrating mastery of standard operating procedures, communications, equipment,
and public information dissemination;
(d) improving interoperability with other agencies in command, control, and coordination;
(e) identifying gaps in resources;
(f) improving individual performance; and
(g) identifying specific actions that should be taken to improve the response capability.
Many RTOs are providers of mass public transit services, hence, conducting exercises demonstrates the
RTOs responsibility and commitment to:
(a) ensure customer and employee safety and security at all times;
(b) train employees so that they know what to do when an emergency occurs;
(c) recognise that they are part of the emergency response effort; and
(d) correct gaps and vulnerabilities in the system.
Some State and Territories mandate annual exercise programs.
RTOs should make every effort in coordinating their exercise programs with local emergency services
and seek guidance and involvement, including lessons learned.
into the incident command system established by local responders, and the performance of specific
types of activities in the rail transportation environment (e.g., station, terminal, and rolling stock
evacuations, procedures for train hijackings, and procedures for managing suspicious packages in
stations, terminals, installations and rolling stock).
Developmen
t
Improvemen
t
Exercis
es
Figure 14 – Exercise development cycle
Next, response plans, policies, procedures, immediate actions, and job aids are developed, or existing
documents are reviewed, in these focus areas. Training is then provided, or the quality of existing
training assessed. Then, over the course of the cycle, increasingly complex types of exercises are
conducted to assess and reinforce critical activities within the target areas of focus. Each exercise is
evaluated, and results are incorporated into the planning development cycle.
Following this, RTOs should then conduct drills, functional exercises and full-scale exercises with
emergency response agencies.
(a) Exercise program. The company’s exercise organisation should formalise its program and
receive endorsement and approval from the organisation’s executive.
(b) Need assessment and focus area. The exercise coordinator, supported by the RTOs
personnel, consultants, and members of local emergency response agencies, should
conduct a careful review of the threat assessments conducted by the RO; existing
emergency response plans, training, and emergency response experience. Based on this
review, the coordinator should identify focus areas that will guide the RTOs exercise
program.
Create realistic expectations
Table 3 illustrates and example exercise program for a large RTO. However, this type of progressive
exercise program can only be implemented with considerable commitment from the RTOs senior
executive management. The “Number of Participants” and “Cost” columns have been left blank in this
example due to the significant scope of variation that would exist between large organisations and
smaller organisations with less ambitious programs.
Whatever the size of the RTO, if the executive leadership recognise the associated costs with
implementing a progressive exercise program, and supports them, then the program will have a strong
foundation for accomplishing its objectives. Where management supports the participation of
exercises programs developed in cooperation with local emergency response agencies, there may be
scope to piggy-back on the resources expended by these agencies (risk sharing).
If the senior management does not have the resources to commit to the program, with full access to the
costs and activity information, informed decisions cannot be made regarding ways in which to cut
expenses and remove exercise activities.
Legend:
RTO Rail transport operator POL Police FB Fire brigade
AS Ambulance service DHS Department of Human Services HAZ HAZMAT response
ME Media PW Public works (utilities companies) Other Contractors, vendors, shared facility tenants, volunteer organisations (e.g. SES)
* Participants
6 Annexes
6.1 List of Annexes
Annexe A Glossary of Security and Emergency Risk Management Terms
Annexe B Activity Matrix
Annexe C Example Security Threat Alert Level System
Compromise (or The full range of means by which harm could be caused to official information, PSPF
misuse) especially loss, damage, corruption or disclosure, whether deliberate or accidental
Community A group of people with a commonality of association, generally defined by Attorney Generals
location, shared experience, or function. Department (Cwth)
– ERM Handbook
Consequence Outcome of an event affecting objectives ISO 31000:2018
Critical A service, facility, or a group of services or facilities, the loss of which will have Attorney Generals
infrastructure severe adverse effects on the physical, social, economic or environmental well- Department (Cwth)
being or safety of the community – ERM Handbook
Delphi technique The use of a group of knowledgeable individuals to arrive independently at an Attorney Generals
estimate of the outcome of an uncertain situation. Department
(Cwth)– ERM
Handbook
Emergency An event, actual or imminent, which endangers or threatens to endanger life, Attorney Generals
property, or the environment, and which requires a significant and coordinated Department (Cwth)
response. In the ERM context for critical infrastructure, it is an event that extends – ERM Handbook
an organisation beyond routine processes.
Emergency risk A systematic process that produces a range of risk treatments that reduce the Attorney Generals
management (ERM) likelihood or consequences of events. Department (Cwth)
– ERM Handbook
Enabling resource Expertise, staff, finance or other support or aid that makes risk treatments Attorney Generals
possible. Department (Cwth)
– ERM Handbook
Environment Conditions or influences comprising built, natural, and social elements, which Attorney Generals
surround or interact with stakeholders and communities Department (Cwth)
– ERM Handbook
Essential service An indispensable supply or activity. The various Australian jurisdictions have a Attorney Generals
range of legislative instruments in place to either define or constitute essential Department (Cwth)
services, their roles, and responsibilities.
Event Occurrence of a particular set of circumstances ISO 31000:2018
Exposure The degree to which a resource is open to, or attracts, harm PSPF
Hazard A source of potential harm – a hazard might include a threat PSPF
Incident reporting A scheme whereby security incidents are reported to a central point in the PSPF
agency, usually the agency security adviser – this enables the agency to collect
statistics on its security vulnerabilities.
Information The term “information” within this context refers to the protection of any form of
security information, including:
• documents and papers;
• data;
• software or systems and networks on which information;
• is stored, processed; or communicated;
• intellectual information (knowledge) acquired by individuals;
• physical items from which information.
Likelihood Change of something happening ISO 31000:2018
Item Task
Executive management
Human resources
Safety & security
Maintenance
Engineering
Operations
Training
Security risk management program A A C P C C C
Organisational structure A A C P C C S
Human resources A C C P C C C
Operating environment A A C P C C C
Current security threat level condition A S C P C C C
Capabilities and practices A A C P C C C
Management of the security management A A S P S S S
plan
Division of security responsibilities A A C P C C C
Job-specific security responsibilities C A S P S S S
Protective measures S S S P S S S
Training S S S P S S S
Day-to-day activities S S S P S S S
Security risk assessment C P P P C P S
Security review, testing, and audit C P C S S S S
Reports A P S S S S S
Security information flow A P S S S S S
etc
There is no specific threat to the rail transportation system from terrorist or IMGs. RTOs should operate in
accordance with their relevant state or territory railway safety management regulations, workplace health and
safety duty of care legislation, and responsible levels of protective security.
Measure 1 – Security planning Develop and implement protective security and emergency response plans for
each Safer Railways security level. Identify continuity of rail system operations
and recovery measures for essential services such as power, gas, water, HVAC,
etc. The security planning process should include annual risk assessments
followed by refining and exercising as appropriate pre-planned measures. Seek
technical expertise where necessary.
Inspect existing security measures to ensure that they are functioning as intended
– lighting, fences, locks, CCTV, intruder alarm systems, access control, key
control, monitoring stations and response systems, security guards, signposting,
etc. Ensure that all emergency equipment, such as firefighting, and
communications and warning systems are well maintained, and evacuation drills
are practiced. Ensure that HVAC plant rooms, PABX, sub-stations, computer
rooms, workshops, control rooms, are secured or have controlled access.
Establish local and regional partnerships with police, emergency response
authorities and other agencies to ensure expedient dissemination and
communication of relevant threat information.
Measure 2 – Maintenance Ensure preventative maintenance and inspections are maintained to all critical
systems.
Perform regular check of power supplies and back-up systems.
Measure 3 – Information Identify all paper and electronic documents essential for recovery actions
management and continuity of rail system operations – then list and make backups to hold
Measure 4 – Brief and train off-site.
Managers and supervisors are to ensure that all employees are briefed and
personnel familiar with local safety, security, and emergency plans. This is to occur at
recruitment, induction and annually, or when changes to plans occur. ARTOs are
to ensure that contractors and any licensed tenants/vendors are included in the
awareness training process. Train staff to be alert and vigilant in identifying
unattended items, suspicious persons, and vehicles, and how to report such
incidents.
Ensure contract security guards have well defined assignment
instructions in accordance with AS 4421 as a minimum.
Measure 5 - Movement/storage No restriction on movement. Managed in accordance with railway safety
of dangerous goods or management systems and defined legislation and regulations.
prescribed chemicals
Brisbane Office
Level 4, 15 Astor Terrace
Brisbane, QLD, 4000
Melbourne Office
Level 4, 580 Collins Street,
Melbourne, Vic 3000
PO Box 518
Spring Hill, QLD, 4004