ASSE: Analyzing the Vulnerability of Chemical and Process Facilities

June 24, 2003
A chemical facility is not just a huge petrochemical plant in Texas or a large chemical manufacturer in Delaware, says Michael J. Hazzan, PE, senior principle engineer at AcuTech Consulting Group in San Francisco, it is also "any facility that uses hazardous chemicals," he told attendees at the American Society of Safety Engineers (ASSE) Professional Development Conference and Exhibition in Denver.

"Chemical security has to be balanced with other objectives," said Hazzan, "and has to be commensurate with the threat and likelihood of occurrence. Consequently, the chemical security management process requires a systematic approach to analyzing risk of these issues."

Hazzan offered five premises:

  • The threat is credible. "Post 9/11, I don't think anyone would argue with this," said Hazzan.
  • The enemy is highly motivated and capable.
  • The attack upon, theft of, or misuse of chemical or asset degradation must be evaluated.
  • Vulnerabilities need to be identified and analyzed.
  • Countermeasures may need to be enhanced. "Assess whether current security measures effectively address these new and unforeseen threats," Hazzan suggested.

"Depending on the degree of exposure potential of the company or the public from an unintentional release, the attractiveness of the target and the ease of attack, companies may face entirely different risks than the facilities were designed to manage," said Hazzan. "It could require an entirely different mode of operation and security than is currently being employed."

He suggested safety and environmental managers ask these questions in a security vulnerability analysis:

  • What specific malevolent chemical security threats does the entire business enterprise or a given site face that might lead to catastrophic events such as a release of chemicals to the community or theft of hazardous materials with intent to weaponize them?
  • What factors are present that might lead an adversary to find a particular target more attractive than another?
  • What vulnerabilities in existing security countermeasures could be exploited to undertake an attack?
  • How significant could the effects of an attack become?
  • Are the countermeasures sufficient given the threat?
  • What enhanced countermeasures are justified?
  • At what point is supplemental security provided under federal or state auspices required?
About the Author

Sandy Smith

Sandy Smith is the former content director of EHS Today, and is currently the EHSQ content & community lead at Intelex Technologies Inc. She has written about occupational safety and health and environmental issues since 1990.

Sponsored Recommendations

Artificial Intelligence: What It Means for Safety and What's Next

Feb. 27, 2025
AI is changing the way many industries do business. Matt Law joins “The Case for Safety Podcast” to share how it’s impacting the safety profession.

10 Things Safety Professionals Should Know About Fire Sprinkler Systems

Feb. 27, 2025
From "The Incredibles" to "Changing Lanes," pop culture is full of myths about fire sprinkler systems. Expert Chris Butts helps set the record straight.

How to Improve Safety and Organizational Culture Through Risk Management

Feb. 27, 2025
By understanding and applying risk management concepts, you can improve safety and organizational culture — often with greater support from leadership.

Lithium-Ion Batteries: How to Overcome Current and Future Safety Challenges

Feb. 27, 2025
Lithium-ion batteries have helped usher in incredible technological advances from smartphones to electric vehicles — but they carry risks other batteries don't.

Voice your opinion!

To join the conversation, and become an exclusive member of EHS Today, create an account today!