Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

CISA Guide to Pandemic Response: Critical Infrastructure Operations Centers and Control Rooms

Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers
April 27, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released a guide, Critical Infrastructure Operations Centers and Control Rooms Guide for Pandemic Response, geared towards all 16 critical infrastructure sectors. The guide provides considerations and mitigation measures for operation centers and control rooms, but can be applied further to any critical node that is required to continue functioning in a pandemic environment.

According to CISA, operations centers and control rooms often operate 24/7, depend on unique equipment, and require specially trained staff who are difficult to replace. As a result, specialized equipment and long lead times required to train personnel mean there is a higher risk to sustaining reliable operations, says the guide. Fortunately, operations centers and control rooms are generally isolated and physically secure, and may be more conducive to the sequestration of on-site staff if needed.

COORDINATION WITH FEDERAL, STATE, AND OTHER AUTHORITIES

  • Engage with relevant Federal, State, local, and/or industry authorities to develop appropriate solutions for operations center and control room personnel in your jurisdiction(s)
  • Prioritize testing for asymptomatic personnel by medical professionals
  • Develop a mechanism (e.g., badging, letter) to allow for identification and free movement of mission-essential
  • personnel when a quarantine/curfew or other travel restriction is in place
  • Consider temporarily waiving, relaxing, or suspending certification or other regulatory requirements
  • Authorize priority supply of sanitizing supplies and personal protective equipment (PPE)
  • Empower non-medical professionals (e.g., control center managers and supervisors) to administer health questionnaires and temperature checks using appropriate PPE while following the U.S. Equal Employment Opportunity Commission (EEOC) and Occupational Safety and Health Administration (OSHA) guidelines  

COMMUNICATION AND INFORMATION SHARING

  • Involve union leadership, if applicable, in discussions around possible mitigation strategies from the beginning to ensure transparency and collaboration
  • Develop compensation, attendance, reliability, and other related policies that will apply during these conditions
  • Reinforce importance of staying home when sick or symptomatic
  • Reinforce the importance of social distancing at work and on personal time and utility of cloth face masks
  • Provide clear symptom-reporting guidance to employees for at-home, self-administered wellness checks and/or observations while on-shift, thereby encouraging robust open, frequent, and rapid communications
  • Build the Centers for Disease Control and Prevention’s (CDC) current travel and self-quarantine advisories into event planning and travel arrangements, and introduce practices to increase awareness of employees’ personal travel plans to high-risk areas or where there are active advisories
  • Establish protocols for reporting cases and any resulting quarantine, facility shutdown, and cleaning actions

KEY MITIGATION MEASURES – PROTECTING PERSONNEL

  • Identify a dedicated, physically separated building entrance for mission-essential personnel where possible
  • Pre-Screen: measure the employee’s temperature and assess symptoms prior to them starting work, ideally before the individual enters the facility
  • Increase handwashing stations, sanitizing supplies and PPE; post CDC and state health department safetyhygiene information at the entrance to operations centers and control rooms
  • Increase cleaning frequency of common areas for critical personnel (e.g., kitchens, locker rooms, bathrooms)
  • Create greater physical separation of operations center and control room operator workstations, increase ventilation or utilize adjacent rooms where possible, and reduce or eliminate interactions across shifts
  • Limit non-essential personnel from entering the area of the operations center and control room (e.g., no outside visitors, non-essential meetings in rooms in near proximity)
  • Limit the hazard from essential personnel such as VIPs, field operators, and contractors/vendors and limit access to critical activities (e.g., health screening before being allowed onsite for visits, deliveries, repairs, etc.)

KEY MITIGATION MEASURES – PROTECTING EQUIPMENT

  • Provide individually assigned peripheral equipment (e.g., mice/keyboards/handsets/headsets/chairs)
  • Increase frequency and extent of cleaning and disinfecting surfaces and equipment that come into routine contact with multiple people (CDC Cleaning and Disinfection Guidance), and use a wipeable cover where possible
  • Anticipate and prepare for pandemic-themed opportunistic social engineering attacks and take steps to ensure continued visibility, patching, and maintenance of cyber assets in the event of staffing disruptions

KEY MITIGATION MEASURES – WORKFORCE PLANNING

  • Divide essential teams into shifts, cutting hours to ensure that no two groups of employees overlap
  • Segregate crews on shift work and split system operators (days/nights or split individual shifts) between primary, backup, and contingency (reserve) operations centers and control rooms. Operating shifts in different locations should provide a 12-hour window to sanitize equipment
  • Sequester and maintain a completely healthy shift or “reserve force” taken out of normal rotation who can step in when minimum staffing levels cannot be met
  • Develop a supplemental staffing plan for potential use of retirees, supervisors, managers, and engineers with the requisite skills to backfill operations center and control room personnel and support staff, as required
  • Request and provide mutual assistance and sharing of operators with other similar organizations
  • Make available employee assistance programs and other professional services

KEY MITIGATION MEASURES – IN THE EVENT OF EXPOSURE

Personnel: Consult Implementing Safety Practices for Critical Infrastructure Workers Who May Have Had Exposure to a Person with Suspected or Confirmed COVID-19

  • Quarantine staff on shift with impacted operator(s) – may require extending work hours of non-impacted shifts
  • Reduce operations where possible to decrease the workload of operations center and control room staff
  • Implement a supplemental staffing plan – may include refresher training and simulations offered for supervisors, managers, engineers, and retirees with the requisite skills to backfill control room staff
  • Temporarily sequester non-impacted shifts onsite and increase access to onsite medical services if available

Equipment

  • Clean porous (soft) surfaces near workstation(s) (e.g., cloth, leather, and faux leather seats within manufacturers guidelines)
  • Clean non-porous (hard) surfaces near work-stations (e.g., desk, communication devices, chairs, etc.) with disinfectant products expected to be effective against the virus that causes COVID-19 (SARS-CoV2) ensuring these products are compatible with surfaces/components and used according to instructions
  • Clean lavatories used by the symptomatic employee, including door handle, locking device, toilet seat(s), faucet(s), washbasin(s), adjacent walls, and counter(s)
KEYWORDS: CISA COVID-19 pandemic Security Operations Center (SOC)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cargo-ship.jpg

    CISA MTS Guide may enhance critical infrastructure resilience

    See More
  • G4S1

    G4S Sets up COVID-19 Testing Centers for Rapid Response to Pandemic

    See More
  • critical infrastructure bill would give more power to CISA over control on cyberattacks in the sector

    Bill introduced by lawmakers would give CISA more control over critical infrastructure attacks

    See More

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!