Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity ManagementInfrastructure:Electric,Gas & Water

Developing Effective Contractor Identity Lifecycle Management for Refineries

By Don Campbell
refinery
August 23, 2016

In the wake of ever-present terrorist threats and potentially large-scale disasters, security and safety have become major concerns that also pose greater challenges for refineries. One main challenge is managing the identity of the independent contractors who have become increasingly important for refineries, which routinely undertake turnarounds (TARs) or scheduled shutdowns or outages.

During a TAR, for example, the entire process unit of a refinery is taken offline for inspection and testing, de-bottlenecking projects, revamps, catalyst regeneration or other necessary projects. In terms of lost production and direct costs such as labor, tools, equipment and materials, these projects are very expensive. Because they can be hired for a specific project or period of time and are paid only for the work they do within those parameters, contractors are a more flexible, budget-friendly alternative to full-time employees. Therefore, refineries bring in contractors – sometimes numbering in the thousands – to assist with the execution of a TAR.

However, these contractors also introduce potential risks that could create a breach in physical security that compromises other elements of a security program as well as overall operations. A contractor is by definition an outsider, but access to people, locations and assets can quickly transform an outsider into an insider. Simply by providing access to a facility, refineries may be exposed to property loss, vandalism, damage to equipment (intentional and unintentional) and more.

Effective identity management ensures that each ID is associated with a specific person to prevent them from being loaned to or stolen by another person. Physical access entitlements tied to an individual’s ID must correspond with the specific areas of a refinery to which he or she requires access. Finally, contractors must be removed from security and access control systems as soon as their contract expires or when they are terminated. The sheer size of refineries, amount of traffic entering and exiting, and the number of dangerous or sensitive materials handled within refinery facilities certainly compound the potential risk and makes contractor identity management even more critical.

Unfortunately, many refineries lack an adequate mechanism for vetting individuals prior to issuing temporary identities that enable access to the necessary critical areas for only the required amount of time. Just as critical is the need to off-board identities immediately at the completion of their temporary employment.

Without effective vetting, onboarding and off-boarding processes, refineries face the significant risks of providing access to temporary identities before they can be authenticated and potentially allowing access beyond the required timeframe, both of which violate strict compliance regulations governing refineries. The manual, paper-based processes and in-house technologies many organizations currently employ are disjointed, inefficient, error-prone and incapable of performing these critical tasks effectively.

End-to-end identity management software brings together identity vetting, smart card technology and automation to solve the challenges of managing contractor identities and ensuring compliance with Chemical Facility Anti-Terrorism Standards (CFATS) and other regulations that govern refineries’ security and identity management policies and processes. These solutions provide an automated, policy-based approach that accurately captures and verifies identities within physical security, human resources and other appropriate systems. With an end-to-end management system, access to a refinery or specific areas within will not be provisioned unless contractors have met all prerequisite criteria.

The centralized data, identity and access authority management capabilities of these solutions ensure contractors can only access areas necessary to their specific job function and which they have been approved to enter. Automated identity management software also segregates data across multiple contract companies to provide refineries with clear, concise audit reports for each contractor.

The greatest benefit of these solutions may be their ability to automatically activate, deactivate, upgrade, renew and reactivate identities. For example, a number of refineries currently employ inefficient identity proofing and vetting processes and rely on paper-based manual sign-in sheets for visitor management, limited-functionality systems developed in-house and/or limited lobby-based systems. These pose significant difficulties for enforcing global and local policies and limited insight into visitor lifecycles. Undoubtedly, refineries that deploy identity management solutions benefit from far greater efficiency and effectiveness in addressing security risks associated with managing the contractor identity lifecycle.

While representing a cost-effective alternative to full-time employees, there is no question that refineries’ increased reliance on outside contractors as part of their operational strategy also increases these organizations’ potential risk, underscoring the critical need for effective and efficient identity lifecycle management. Because manual, paper-based systems are highly inefficient and error-prone, they simply cannot adequately address these risks. If departments are segregated and operate autonomously, the significant amount of time and energy required for identity management makes it impossible for security teams to properly perform their job, exposing refineries to even greater risk. The best tool for increasing efficiency and effectiveness of these processes is an automated end-to-end identity management solution that brings together multiple systems to centrally manage information. A number of refineries and other critical infrastructure organizations have successfully implemented this solution to provide contractors with the proper level of access for only the proper amount of time – reducing contractor risks to ensure a higher level of both security and compliance. 

KEYWORDS: contractor security identity (ID) management refinery security security systems visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Don Campbell is the Director of Product Management for Quantum Secure.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Choice Concept With Doors

    Why Visitor and Contractor Management is Critical in Busy Facilities

    See More
  • Todd Peterson

    A Recipe for Identity and Access Management Success

    See More
  • prints-enews

    Biometrics and the Case for True Identity Management

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!