Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Resources & Tools
  3. Programs
  4. ChemLock
  5. ChemLock: Detection Security Goal
Share:

ChemLock: Detection Security Goal

Related topics:
Chemical Security, Critical Infrastructure Security and Resilience

The ChemLock program encourages facilities with dangerous chemicals to develop a holistic, customized, site-specific security plan that mitigates risk and enhances chemical security at the facility. To assist your facility in developing a security plan, the ChemLock program presents five security goals to consider as you evaluate and implement security measures tailored to your facility’s unique circumstances and business model. This is an overview of the detection security goal.

Detection Security Goal

ChemLock Detection Security Goal

Detection is the ability to identify potential attacks or precursors to an attack and to communicate that information as appropriate. This means that a nefarious act must be detected or observed early enough so that appropriate first responders can arrive to deter or delay the attack from taking place. Thus, layers of detection, deterrence, and delay measures are inherently linked and complement one another.

Examples of Detection Security Measures

Detection measures include intrusion detection systems (IDS), camera systems, employees or on-site security personnel, security lighting, and inventory controls. Activity at your facility can be monitored through a combination of human oversight and a variety of technical sensors interfaced with electronic entry-control devices, remote surveillance imaging, and alarm-reporting displays. Multiple detection measures can be used to create layers of security at your facility.

  1. Intrusion detection system (IDS). IDSs typically consist of various hardware and software elements and are used to detect an intrusion at an early stage. IDSs should be connected to a monitoring station to ensure prompt response by trained personnel or activation of cameras. Examples of IDS include infrared (IR) sensors, microwave sensors, fiber optic sensors, magnetic switches, and other motion sensors.
  2. Camera system. Cameras can provide multiple angles of observation so that your facility can monitor critical assets and detect an intruder.
  3. Employees or on-site security personnel. Employees and dedicated security personnel can be used to enhance facility security and provide a means of deterrence, detection, delay, and response. Employees should be trained to be vigilant and to know what to look for regarding suspicious activity. Security forces can be proprietary or contracted and can be armed or unarmed.
  4. Security lighting. Well-lit areas not only aid in detecting potential intrusions, but also deter would-be intruders from attempting to breach your facility.
  5. Inventory controls. A process for tracking, checking, and auditing chemical inventories, sales, transfers, and deliveries can provide early detection of nefarious actions.
    • Learn more about chemical product stewardship.

Considerations for Detection

When evaluating detection security measures, your facility should consider the chemicals on site and their associated security concerns. These factors will drive the type of detection measures your facility will need to implement. For example, a facility might consider different detection measures for a toxic chemical that would cause harm if deliberately released into the air than would be considered for an explosive precursor chemical that is being protected against theft or diversion.

When considering detection measures, be sure to account for different threats as well. Some detection measures may be highly effective against some attacks, but not against others. For example, inventory control measures can be effective at mitigating the risk of theft, but they may not be effective in detecting that a chemical has been deliberately released.

You will also want to consider how your facility’s operational processes may contribute to the type of detection measures implemented. For example, a smaller facility may find it feasible to use personnel that have been trained in security awareness to detect a nefarious actor, whereas a larger facility may need to rely on an alarm system or on-site security personnel. You should also consider whether the goal of the security plan is to protect a particular asset, the entire facility, or a combination of both.

Building on the ChemLock security goals, the ChemLock program also provides information to help facilities think through a variety of chemical security topics to ensure that your facility security plan is holistic and comprehensive.

List icon

Additional Chemical Security Considerations

The ChemLock program provides a variety of chemical security topics—from drones to no-notice events—that facilities with dangerous chemicals should consider as they develop and implement a facility security plan.

Next Steps

Here are some questions you can use to evaluate your facility’s detection security measures:

  • What are the threats that your facility should be most concerned about?
  • Do all access points at your facility have some kind of detection security measure?
  • Will detection security measures still function if your facility lost power?
  • Does your facility need dedicated on-site security personnel?
  • What training has been provided for all your personnel responsible for detection security measures?
  • Is the lighting at your facility sufficient to ensure that detection security measures can be effective?
  • Does your facility have sufficient inventory control processes in place to detect anomalies?
  • If suspicious activity or nefarious actions are detected, what is your facility’s reporting process?
  • What delay security measures are in place to allow appropriate response to a detected incident?
  • Has your facility conducted an exercise to test the effectiveness of existing detection security measures?

ChemLock Security Goals

Learn more about the other ChemLock security goals.

ChemLock icon in a hexagon

ChemLock Security Goals

CISA encourages facilities with dangerous chemicals to develop a holistic security plan based around five chemical security goals: detection, delay, response, cybersecurity, and policies, plans, and procedures. Learn more about these security goals.
ChemLock Delay Security Goal

ChemLock: Delay Security Goal

Delay includes limiting access to your facility or assets to reduce the likelihood of an adversary successfully breaching the perimeter or assets and allowing sufficient time to initiate a response to the attack. Learn more about the delay security goal.
ChemLock Response Security Goal

ChemLock: Response Security Goal

Response includes the capability to communicate, report, and manage the appropriate reaction(s) to potential attacks and/or adversary actions, and/or to reduce the effect of security-related events. Learn more about how response measures enhance your chemical security posture.
ChemLock Policies, Plans, and Procedures Security Goal

ChemLock: Policies, Plans, and Procedures Security Goal

Policies, plans, and procedures ensure you have the capability to manage your facility security plan, including the development of processes that support security plan implementation and oversight. Learn more about this security goal that enhances your chemical security posture.
Chemlock logo

ChemLock Security Plan

To help facilities use the ChemLock security goals to develop a security plan or evaluate an existing plan, CISA has a guidance document and security plan template that facilities can download and customize for their facility.

ChemLock Security Plan

ChemLock Services and Tools

Not sure where to start? CISA has security experts across the country that can come to your facility to help you evaluate whether your current security measures adequately address these security goals.

If you want to learn more about these security goals, ChemLock provides training that will walk you through them in greater detail so that you can build a facility security plan tailored for your facility.

To request any of these ChemLock services, please fill out the ChemLock Services Request Form.

Request ChemLock Services
On-Site Assessments and Assistance icon

ChemLock On-Site Assessments and Assistance

CISA's ChemLock program can provide on-site assistance and assessments that help facilities identify the security risks their on-site chemicals present and offer scalable, tailored suggestions for security measures that will best enhance their security posture.
ChemLock Training icon

ChemLock Training

The ChemLock program provides live, on-demand training to assist owners, operators, and facility personnel with understanding the threats that chemicals pose and what security measures can be put into place to reduce the risk of dangerous chemicals being weaponized.
Request ChemLock Services

Contact Information

For more information or questions, please email ChemLock@cisa.dhs.gov.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback