Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

CISA Guide to Pandemic Response: Critical Infrastructure Operations Centers and Control Rooms

Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers
April 27, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released a guide, Critical Infrastructure Operations Centers and Control Rooms Guide for Pandemic Response, geared towards all 16 critical infrastructure sectors. The guide provides considerations and mitigation measures for operation centers and control rooms, but can be applied further to any critical node that is required to continue functioning in a pandemic environment.

According to CISA, operations centers and control rooms often operate 24/7, depend on unique equipment, and require specially trained staff who are difficult to replace. As a result, specialized equipment and long lead times required to train personnel mean there is a higher risk to sustaining reliable operations, says the guide. Fortunately, operations centers and control rooms are generally isolated and physically secure, and may be more conducive to the sequestration of on-site staff if needed.

COORDINATION WITH FEDERAL, STATE, AND OTHER AUTHORITIES

  • Engage with relevant Federal, State, local, and/or industry authorities to develop appropriate solutions for operations center and control room personnel in your jurisdiction(s)
  • Prioritize testing for asymptomatic personnel by medical professionals
  • Develop a mechanism (e.g., badging, letter) to allow for identification and free movement of mission-essential
  • personnel when a quarantine/curfew or other travel restriction is in place
  • Consider temporarily waiving, relaxing, or suspending certification or other regulatory requirements
  • Authorize priority supply of sanitizing supplies and personal protective equipment (PPE)
  • Empower non-medical professionals (e.g., control center managers and supervisors) to administer health questionnaires and temperature checks using appropriate PPE while following the U.S. Equal Employment Opportunity Commission (EEOC) and Occupational Safety and Health Administration (OSHA) guidelines  

COMMUNICATION AND INFORMATION SHARING

  • Involve union leadership, if applicable, in discussions around possible mitigation strategies from the beginning to ensure transparency and collaboration
  • Develop compensation, attendance, reliability, and other related policies that will apply during these conditions
  • Reinforce importance of staying home when sick or symptomatic
  • Reinforce the importance of social distancing at work and on personal time and utility of cloth face masks
  • Provide clear symptom-reporting guidance to employees for at-home, self-administered wellness checks and/or observations while on-shift, thereby encouraging robust open, frequent, and rapid communications
  • Build the Centers for Disease Control and Prevention’s (CDC) current travel and self-quarantine advisories into event planning and travel arrangements, and introduce practices to increase awareness of employees’ personal travel plans to high-risk areas or where there are active advisories
  • Establish protocols for reporting cases and any resulting quarantine, facility shutdown, and cleaning actions

KEY MITIGATION MEASURES – PROTECTING PERSONNEL

  • Identify a dedicated, physically separated building entrance for mission-essential personnel where possible
  • Pre-Screen: measure the employee’s temperature and assess symptoms prior to them starting work, ideally before the individual enters the facility
  • Increase handwashing stations, sanitizing supplies and PPE; post CDC and state health department safetyhygiene information at the entrance to operations centers and control rooms
  • Increase cleaning frequency of common areas for critical personnel (e.g., kitchens, locker rooms, bathrooms)
  • Create greater physical separation of operations center and control room operator workstations, increase ventilation or utilize adjacent rooms where possible, and reduce or eliminate interactions across shifts
  • Limit non-essential personnel from entering the area of the operations center and control room (e.g., no outside visitors, non-essential meetings in rooms in near proximity)
  • Limit the hazard from essential personnel such as VIPs, field operators, and contractors/vendors and limit access to critical activities (e.g., health screening before being allowed onsite for visits, deliveries, repairs, etc.)

KEY MITIGATION MEASURES – PROTECTING EQUIPMENT

  • Provide individually assigned peripheral equipment (e.g., mice/keyboards/handsets/headsets/chairs)
  • Increase frequency and extent of cleaning and disinfecting surfaces and equipment that come into routine contact with multiple people (CDC Cleaning and Disinfection Guidance), and use a wipeable cover where possible
  • Anticipate and prepare for pandemic-themed opportunistic social engineering attacks and take steps to ensure continued visibility, patching, and maintenance of cyber assets in the event of staffing disruptions

KEY MITIGATION MEASURES – WORKFORCE PLANNING

  • Divide essential teams into shifts, cutting hours to ensure that no two groups of employees overlap
  • Segregate crews on shift work and split system operators (days/nights or split individual shifts) between primary, backup, and contingency (reserve) operations centers and control rooms. Operating shifts in different locations should provide a 12-hour window to sanitize equipment
  • Sequester and maintain a completely healthy shift or “reserve force” taken out of normal rotation who can step in when minimum staffing levels cannot be met
  • Develop a supplemental staffing plan for potential use of retirees, supervisors, managers, and engineers with the requisite skills to backfill operations center and control room personnel and support staff, as required
  • Request and provide mutual assistance and sharing of operators with other similar organizations
  • Make available employee assistance programs and other professional services

KEY MITIGATION MEASURES – IN THE EVENT OF EXPOSURE

Personnel: Consult Implementing Safety Practices for Critical Infrastructure Workers Who May Have Had Exposure to a Person with Suspected or Confirmed COVID-19

  • Quarantine staff on shift with impacted operator(s) – may require extending work hours of non-impacted shifts
  • Reduce operations where possible to decrease the workload of operations center and control room staff
  • Implement a supplemental staffing plan – may include refresher training and simulations offered for supervisors, managers, engineers, and retirees with the requisite skills to backfill control room staff
  • Temporarily sequester non-impacted shifts onsite and increase access to onsite medical services if available

Equipment

  • Clean porous (soft) surfaces near workstation(s) (e.g., cloth, leather, and faux leather seats within manufacturers guidelines)
  • Clean non-porous (hard) surfaces near work-stations (e.g., desk, communication devices, chairs, etc.) with disinfectant products expected to be effective against the virus that causes COVID-19 (SARS-CoV2) ensuring these products are compatible with surfaces/components and used according to instructions
  • Clean lavatories used by the symptomatic employee, including door handle, locking device, toilet seat(s), faucet(s), washbasin(s), adjacent walls, and counter(s)
KEYWORDS: CISA COVID-19 pandemic Security Operations Center (SOC)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cargo-ship.jpg

    CISA MTS Guide may enhance critical infrastructure resilience

    See More
  • G4S1

    G4S Sets up COVID-19 Testing Centers for Rapid Response to Pandemic

    See More
  • critical infrastructure bill would give more power to CISA over control on cyberattacks in the sector

    Bill introduced by lawmakers would give CISA more control over critical infrastructure attacks

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • September 19, 2012

    Oil & Gas Critical Infrastructure & Asset Security Forum 2012

    The Forum will cover security issues related to both offshore and onshore oil and gas arising out of civil unrest, terrorist activities, and a competitive global market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing