Vulnerabilities are opportunities, opportunities for crime, opportunities for rule breaking violations, opportunities for loss. By definition, a vulnerability is a weakness or gap in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerabilities include structural, procedural, electronic, human and other elements which provide opportunities to attack assets.1 While healthcare security professionals continue to update and expand their threat assessments with events such as natural disasters, avian flu, and terrorism, the primary threats that continue to impact hospital assets include ordinary crimes, workplace violence, unauthorized access, and patient abduction. For all of these threats and others, the vulnerability assessment's objectives are to maximize life safety, protect assets, and maintain continuity of operations. To meet these objectives, a comprehensive and robust security program must be in place to address the known and unknown threats that exist both outside the hospital's facilities, and also inside. The Joint Commission's standards2 require that hospitals identify and manage security risks. A key component of that identification process is a vulnerability assessment.
Vulnerability assessments identify security weaknesses that can be exploited by an adversary to gain access to the healthcare organization's assets. For example, a vulnerability assessment may reveal an egress path that could be exploited by an infant abductor or it may identify a lack of patrols by security personnel in sensitive areas of the hospital. The goal of vulnerability assessments is to ensure life safety, protect assets, and the continuity of operations. The driving forces behind vulnerability assessments include new legislation or regulatory requirements, Joint Commission guidelines, revised threat assessments with new or emerging threats, increased criticality of assets, and the construction of new facilities on a hospital campus. For example, the recent infant abduction from a Lubbock, Texas hospital or the sexual assault of a patient in a California hospital prompted other hospitals to perform a vulnerability assessment of their own hospital to ensure adequate security in these areas.
The vulnerability of an asset is determined by the potential weaknesses in operational processes and procedures, physical security weaknesses, and technical gaps which can be exploited to attack an asset. Vulnerability assessments are used to identify these weaknesses by way of a security survey. A security survey is a fact-finding process whereby the assessment team gathers data that reflects the who, what, how, where, when, and why of a hospital's existing security operations3. The purpose of a security survey is to measure the vulnerabilities at a facility or to specific assets by determining what opportunities exist to exploit current security policies and procedures, physical security equipment, and security personnel.
Security surveys are simply questions and checklists that must be completed by the assessment team during off-site preparations and on-site inspections of the facility. Surveys may range from a few basic questions to highly detailed lists comprising thousands of questions. A typical security survey contains general information about a site and evaluates the geographic characteristics of the hospital's facilities, physical layout of each facility and it's unique characteristics, security personnel and deployment schedules, operational requirements, security equipment capability, and other items that impact security. Security surveys are designed to meet the unique needs of a facility or type of facility. Even within similar types of hospitals, unique characteristics must be considered and included in the security survey. General information normally captured in a security survey includes:
Office area security and loading docks are also at the forefront of most security directors and managers. Administrative offices are likely to experience wandering people, purse thefts, and loss of business equipment. In this regard, it is important to consider the culture and practices of administrative personnel. Are doors locked when an office is unoccupied? Are purses stores in locked drawers? Recurring security awareness training is often an effective and inexpensive solution for office area security problems.
Loading docks serve as a primary gateway for would-be offenders as they are often left open and unattended. Valuable assets, such as computers, are sometimes stored on the dock for extended periods of time. The problem is compounded when dock personnel are short staffed or inattentive. Worse yet, dock personnel may be complicit in theft of hospital property. Penetration tests of loading docks often yield surprising results about the vulnerability of hospital assets. Properly securing the loading docks is a critical element of an effective security program.
Notable security survey areas to consider for each building include:
Asset-based vulnerability assessments are broad evaluations of assets and the threats that impact those assets. For example, an asset-based assessment at a hospital's research lab will focus on the information developed by the researchers, both from a physical security and information security perspective. In this instance, the primary asset in need of protection is the information in both its physical form (computers, paper, etc) and its electronic form (software, files, etc). Asset-based assessments assume that every scenario cannot be imagined or those that are, are too speculative toconsider. By in large, asset-based scenarios are the most common type of assessment utilized by security practitioners today.
Threat-based vulnerability assessments, on the other hand, focus on the various types of threats that challenge hospital security practitioners. More often than not, the threats considered are those that are low frequency, high impact, such as infant abduction, patient sexual assaults, and city- and region-wide emergencies such as hurricanes or terrorist acts. The threat-based assessment evaluates vulnerability by asking how a patient may be abducted, how prepared the hospital if supply chains are cut off for an extended period of time, or how the loss of utilities will impact patient care. This type of assessment requires a knowledgeable assessment team who has an understanding of historical events at hospitals and has the ability to foresee future events, especially conceptual threats. While history is a primary indicator, not all future threats can be anticipated based on the past attack modes. Conceptual threats should not be underestimated. Scenario-based assessments are advantageous in that they are better suited for assessing high value assets and high consequence threats. Unfortunately, this advantage also creates a problem whereby lesser threats may be ignored and security measures not implemented.
While the vulnerability assessment team's goal is to select a low frequency threat for the assessment, the scenario must be sufficiently realistic. A fair assessment of the asset's attractiveness, from the adversary's (threat) perspective, is critical to accurately evaluate the strengths and weaknesses of each asset and the security program. The next step is to evaluate the ability of the existing security program to deter, detect, and delay an attack. Typically, an outside - in approach is used whereby the vulnerability assessment team identifies the outer most layer of protection and works their way inside toward the assets, passing thru each security layer in the same order that an adversary would do so. The training, skills, and equipment of the theoretical adversary should be considered as each protection layer is breached. Finally, the assessment team analyzes the consequences of the threat reaching its target and assigns a vulnerability rating.
An example of a scenario-based vulnerability assessment is where the assessment team selects a low grade explosion outside a patient care building as an attack scenario. They postulate that the explosion occurs immediately outside the building during daytime hours. What are the characteristics of the building and its assets (patients, families, employees) that may contribute to the loss, damage, or destruction. How would an attacker detonate a bomb in close proximity to the building? Would any element of the current security system be able to deter, detect or delay the attack? Would the closed circuit television (CCTV) system detect the adversaries? Is the CCTV system monitored with direct communications to the security response force? Would the building survive a low grade explosive attack?
As seen in this example, a downside to scenario-based assessments is evident, in that these types of assessments force the team to focus on protecting against particular threats and potentially ignoring other threats. Nevertheless, both asset-based and threat-based vulnerability assessments are beneficial exercises that should be undertaken on a regular basis. The results often yield relevant solutions and also identify opportunities for training emergency responders and security personnel.
The initial review of the risk assessment report is critical. The security management team must thoroughly review the risk assessment report and validate the findings and recommendations. This procedure focuses on actual observations, data, and other available material to clearly understand the intent and magnitude of each finding and recommendation. During the process, the modification of a finding or recommendation could possibly reveal other opportunities. Adding or deleting certain information helps to clarify the specific problem and strengthen the recommendation. The intent is not to hide or delude the finding but to ensure that the identified measure, process, or program receives appropriate attention and implementation if required. For example, a particular finding might address inadequate staffing at a point entry after hours. The subsequent recommendation states that the post requires a security officer at the entry pointbetween the hours of 7:00 p.m. and 6:00 a.m. seven days per week. Subsequent analysis discloses the door is secure during those hours and observed by a camera. However, while analyzing the problem further management recognizes a need for an officer during normal business hours. Consequently, the modification of the finding and recommendation better identifies and addresses the actual security shortcoming. This example is more elaborate than most modifications, which generally entails wordsmithing or adding more detail to the finding and recommendation. It is imperative that weaknesses are clarified and validated in order to appropriately apply solutions for the short- and long-term. Further, weaknesses need to be categorized, prioritized, and analyzed to determine criticality, economic considerations, implementation timelines, and to what extent.
Following the review process, security management should coordinate with risk management, safety, and possibly with emergency management, providing them a copy of the risk assessment report. A thorough review and discussion of the findings and recommendations with these departments is not only appropriate, but will prove to be extremely beneficial. The security risk assessment is a process that examines the health care organization from a holistic perspective and the findings and recommendations have a broad application throughout the organization. Sharing the security risk assessment with risk management, safety, and emergency management actually puts security management in the driver's seat when presenting the findings and recommendations to senior management. The support of these departments is critical should funding be required to implement some of the recommendations. Risk management coordination assists in alleviating legal issues associated with some of the recommendations, which is prudent and crucial for the maintaining a viable security program. Safety, on the other hand, assists with recommendations requiring special knowledge of sophisticated medical applications and procedures that are associated with one or more of the security recommendations. The emergency management coordination and review offers valuable insight into how emergency incidents and events might require a different approach to one or more recommendations. Coordination with the aforementioned departments may be obvious. However, there are many others to coordinate with, such as Information Services (IS). Recommendations that require the implementation of sophisticated technology hardware and software definitely requires IS coordination. Another example, is nursing operations. The impact on patient care areas, resulting from a risk assessment, such as waiting areas, surgery areas, pharmacies, and specialized clinics, is common. Coordination with the nursing leadership assists in a assuring a smooth implementation process. The examples given are just a few of the considerations that must take place while preparing to implement the recommendations. Nonetheless, once the security risk assessment review and analysis process is complete, briefing senior management is the next challenge.
Coordination with business services immediately following approval is paramount to acquiring capital funding in a timely manner. The organization's financial services group assists with preparing the capital funding request and the method of presentation to the Capital Projects Committee (CPC).
The security risk assessment is an extremely valuable process. The security manager can use the assessment to leverage support for the security program, acquire crucial funding, and have the ability to implement timely improvements to bolster the organization's security posture. Furthermore, the security manager has a perfect opportunity to emphasize the strengths of the security department and promote the risk assessment as a proactive approach to enhance the organization's security posture.
1 Vellani, Karim H. (2006). Strategic Security Management: A Risk Assessment Guide for Decision Makers. Woburn: Butterworth-Heinemann.
2 Joint Commission on Accreditation of Healthcare Organizations (2005). Environment of Care Standard 2.10.
3 Sennewald, Charles A. (2003). Effective Security Management, 4th Edition. Woburn: Butterworth-Heinemann.
Robert E. Owles, Jr. has over 40 years of experience in Security Management, which started with a diversified law enforcement career. As a security director and internal consultant for large commercial and health care organizations, he has developed a keen sense for organizational management and security strategies. He has extensive experience in conducting Risk Assessments in diverse environments, such as Healthcare Institutions, Colleges & Universities, and Industrial & Governmental facilities. See Mr. Owles' Listing on Experts.com.
Karim H. Vellani, CPP, CSC is the President of Threat Analysis Group, LLC, an independent security consulting firm. He is Board Certified in Security Management and a Certified Independent Security Consultant. Karim is a member of the International Association for Healthcare Security & Safety, the American Society for Industrial Security (ASIS-International), and the International Association of Professional Security Consultants, serving currently as the Vice President. As an independent security consultant, Karim has extensive experience in risk and security management in the healthcare industry and has written extensively on the subject. He has also authored two books, Applied Crime Analysis and Strategic Security Management. Karim can be reached via email at email@example.com or via phone at (281) 494-1515.
©Copyright - All Rights Reserved
DO NOT REPRODUCE WITHOUT WRITTEN PERMISSION BY AUTHOR.