Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

How to Combine Compliance and Common Sense for CFATS

By John Romanowich
September 9, 2012

 

The U.S. Department of Homeland Security's Chemical Facility Anti-Terrorism Standards (CFATS) were designed to provide guidance for any site involved in manufacturing, storing and/or transporting chemicals. Notwithstanding recent challenges within the organization tasked with implementing the CFATS program, the underlying concepts and principles as outlined in the Risk-Based Performance Standards still have merit. In fact, the CFATS performance standards actually echo what even non-regulated industries would agree is sound and effective security practice.

CFATS does not prescribe specific technologies; instead, the rules specify that facilities meet 18 Risk-Based Performance Standards covering a range of vulnerabilities such as perimeter security, access control, theft, internal sabotage and cyber security. By emphasizing “standards,” CFATS leaves open the question of how an end user can attain the prescribed level of security. For facilities seeking answers to achieving CFATS compliance, technology plays an important role, supplying tools to detect intrusions at the perimeter and internally around chemicals of interest (COIs). To this end, intelligent video systems can enhance perimeter protection and also help to avert internal or external theft or sabotage, as specified by CFATS performance standards.

CFATS reflects security best practices and strategies that are already embraced by many chemical facilities and other critical infrastructure sites for practical reasons. For organizations that need to align themselves with these standards, technology tools including intelligent video and thermal cameras can help them meet and achieve best practices.

  • Early detection.CFATS standards call for creating sufficient time between detection of an attack and possible danger to site assets. Early and accurate detection is essential to achieve a high level of vigilance. Numerous technologies can provide early detection of a perimeter security breach, but only intelligent cameras provide the visual evidence of a breach without need for additional verification systems, saving valuable response time.
  • Dependability of alerts. Intelligent thermal video, using cameras with on-board processing power, enables accurate detection of the presence of unauthorized persons anywhere across site perimeters and outdoor areas, during bright sunlight or in complete darkness. Smart cameras with sufficient processing can provide accurate detection over large areas, regardless of wind, weather or the movement of small animals, trees or blowing trash. Better accuracy ensures no nuisance or false alarms, providing a system that operators can depend upon for their security.
  • Details on location and type of alarm. Achieving security awareness depends on knowing the precise location and nature of an intrusion. Intelligent video cameras with GPS-based analytics can determine the size, speed and bearing of detected objects according to their precise location. GPS can also be used to steer pan-tilt-zoom cameras to zoom in and follow detected objects for close-up identification once an intrusion has been detected.
  • Clear thermal images 24 hours a day.  In light or darkness and despite a range of environmental challenges, clear thermal images of events unfolding along the perimeter of a chemical facility are an essential component of overall security and can contribute to CFATS compliance. Thermal cameras can provide clear views of perimeters and large outdoor areas despite variable lighting conditions. Recent developments in image processing related to thermal imaging increase the accuracy and image quality of thermal cameras, while bringing costs dramatically lower.
  • Protection of perimeter and internal assets. Compliance with CFATS requires securing and monitoring restricted areas where COIs are manufactured and stored. Intelligent video is a good tool to protect internal assets, where physical or man-made boundaries are unlikely to exist. Adding infrastructure around chemical storage tanks would be costly and likely impede the flow of business operations. Intelligent video can be used to create a surveillance “buffer zone” around areas of special concern to control access based on time of day or other criteria, mitigating possible sabotage or theft from insiders.
  • Assurance of ongoing system operation. CFATS requires that systems monitor their health and provide alerts should they cease to function, a capability built into many smart video solutions.
  • Affordability.While CFATS does not directly address system costs, the reality of business operations makes doing so a requirement. Using long-range thermal cameras that cover greater distances reduces the number of cameras needed, along with infrastructure and associated costs. Project costs can be dramatically lowered, in some cases by as much as 50 percent, even as security performance increases.

A key to effective implementation of CFATS is to identify real-world solutions that enable chemical facilities to achieve the 18 Risk-Based Standards. This is a challenge for end-users tasked with meeting the standards, for integrators who will likely specify and install the technology to achieve the standards, and for supplier companies who develop the various systems and components. Intelligent video and thermal cameras can help to meet these challenges.

KEYWORDS: nuclear security petro-chem security security compliance video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Romanowich is CEO of SightLogix, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • It’s Common Sense for Chemical Sector Security, Says DHS Secretary Napolitano

    See More
  • MFA for HIPAA Compliance

    Multi-factor authentication for HIPAA compliance: What it is, common objections, and why to insist on it

    See More
  • The Starbucks and Gun Debate: One Workplace Violence Expert Advocates for Common Sense

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing