Security management systems for the supply chain - Best practices for implementing supply chain security - Assessments and plans

ISO/PAS 28001:2006 provides requirements and guidance for organizations in international supply chains to develop and implement supply chain security processes; establish and document a minimum level of security within a supply chain(s) or segment of a supply chain; assist in meeting the applicable Authorized Economic Operators criteria set forth in the World Customs Organization Framework of Standards and conforming national supply chain security programmes. NOTE Only a participating National Customs Agency can designate organizations as Authorized Economic Operators in accordance with its supply chain security programme and its attendant certification and validation requirements. In addition, ISO/PAS 28001:2006 establishes certain documentation requirements that would permit verification. Users of ISO/PAS 28001:2006 will define the portion of an international supply chain within which they have established security (see 4.1); conduct security vulnerability assessments on that portion of the supply chain and develop adequate countermeasures; develop and implement a supply chain security plan; train security personnel in their security related duties.

Systèmes de management de la sûreté pour la chaîne d'approvisionnement — Meilleures pratiques pour la mise en application de la sûreté de la chaîne d'approvisionnement — Évaluations et plans

General Information

Status
Withdrawn
Publication Date
24-Aug-2006
Withdrawal Date
24-Aug-2006
Current Stage
9599 - Withdrawal of International Standard
Start Date
23-Oct-2007
Completion Date
13-Dec-2025
Ref Project

Relations

Technical specification
ISO/PAS 28001:2006 - Security management systems for the supply chain -- Best practices for implementing supply chain security -- Assessments and plans
English language
27 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/PAS 28001:2006 is a technical specification published by the International Organization for Standardization (ISO). Its full title is "Security management systems for the supply chain - Best practices for implementing supply chain security - Assessments and plans". This standard covers: ISO/PAS 28001:2006 provides requirements and guidance for organizations in international supply chains to develop and implement supply chain security processes; establish and document a minimum level of security within a supply chain(s) or segment of a supply chain; assist in meeting the applicable Authorized Economic Operators criteria set forth in the World Customs Organization Framework of Standards and conforming national supply chain security programmes. NOTE Only a participating National Customs Agency can designate organizations as Authorized Economic Operators in accordance with its supply chain security programme and its attendant certification and validation requirements. In addition, ISO/PAS 28001:2006 establishes certain documentation requirements that would permit verification. Users of ISO/PAS 28001:2006 will define the portion of an international supply chain within which they have established security (see 4.1); conduct security vulnerability assessments on that portion of the supply chain and develop adequate countermeasures; develop and implement a supply chain security plan; train security personnel in their security related duties.

ISO/PAS 28001:2006 provides requirements and guidance for organizations in international supply chains to develop and implement supply chain security processes; establish and document a minimum level of security within a supply chain(s) or segment of a supply chain; assist in meeting the applicable Authorized Economic Operators criteria set forth in the World Customs Organization Framework of Standards and conforming national supply chain security programmes. NOTE Only a participating National Customs Agency can designate organizations as Authorized Economic Operators in accordance with its supply chain security programme and its attendant certification and validation requirements. In addition, ISO/PAS 28001:2006 establishes certain documentation requirements that would permit verification. Users of ISO/PAS 28001:2006 will define the portion of an international supply chain within which they have established security (see 4.1); conduct security vulnerability assessments on that portion of the supply chain and develop adequate countermeasures; develop and implement a supply chain security plan; train security personnel in their security related duties.

ISO/PAS 28001:2006 is classified under the following ICS (International Classification for Standards) categories: 03.100.01 - Company organization and management in general; 03.100.70 - Management systems; 47.020.99 - Other standards related to shipbuilding and marine structures. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/PAS 28001:2006 has the following relationships with other standards: It is inter standard links to ISO 28001:2007. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO/PAS 28001:2006 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


PUBLICLY ISO/PAS
AVAILABLE 28001
SPECIFICATION
First edition
2006-09-01
Security management systems for
the supply chain — Best practices for
implementing supply chain security —
Assessments and plans
Systèmes de management de la sûreté pour la chaîne
d'approvisionnement — Meilleures pratiques pour la mise en application
de la sûreté de la chaîne d'approvisionnement — Évaluations et plans

Reference number
©
ISO 2006
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.

©  ISO 2006
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2006 – All rights reserved

Contents Page
Foreword. iv
Introduction . v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions. 2
4 Field of application . 5
4.1 Statement of application . 5
4.2 Business partners. 5
4.3 Internationally accepted certificates or approvals. 5
4.4 Business partners exempt from security declaration requirement. 6
4.5 Security reviews of business partners. 6
5 Supply chain security process. 6
5.1 General. 6
5.2 Identification of the scope of security assessment . 6
5.3 Conduction of the security assessment. 7
5.4 Development of the supply chain security plan . 8
5.5 Execution of the supply chain security plan .8
5.6 Documentation and monitoring of the supply chain security process. 8
5.7 Actions required after a security incident. 8
5.8 Protection of the security information. 8
Annex A (informative) Supply chain security process . 10
Annex B (informative) Methodology for security risk assessment and development
of countermeasures. 18
Annex C (informative) Guidance for obtaining advice and certification . 26
Bibliography . 27

Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
In other circumstances, particularly when there is an urgent market requirement for such documents, a
technical committee may decide to publish other types of normative document:
— an ISO Publicly Available Specification (ISO/PAS) represents an agreement between technical experts in
an ISO working group and is accepted for publication if it is approved by more than 50 % of the members
of the parent committee casting a vote;
— an ISO Technical Specification (ISO/TS) represents an agreement between the members of a technical
committee and is accepted for publication if it is approved by 2/3 of the members of the committee casting
a vote.
An ISO/PAS or ISO/TS is reviewed after three years in order to decide whether it will be confirmed for a
further three years, revised to become an International Standard, or withdrawn. If the ISO/PAS or ISO/TS is
confirmed, it is reviewed again after a further three years, at which time it must either be transformed into an
International Standard or be withdrawn.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/PAS 28001 was prepared by Technical Committee ISO/TC 8, Ships and marine technology,
Subcommittee SC 11, Intermodal and short sea shipping.

iv © ISO 2006 – All rights reserved

Introduction
Security incidents against international supply chains are threats to international trade and the economic
growth of trading nations. People, goods, infrastructure and equipment, including means of transport, should
be protected against security incidents and their potentially devastating effects. Such protection benefits the
economy and society as a whole.
International supply chains are highly dynamic and consist of many entities and business partners. This
Publicly Available Specification recognizes this complexity. It has been developed to allow an individual
organization in the supply chain to apply its requirements in conformance with the organization’s particular
business model and its role and function in the international supply chain.
This Publicly Available Specification is an option for organizations to establish and document reasonable
levels of security within international supply chains and their components. It will enable such organizations to
make better risk based decisions concerning the security in those international supply chains.
This Publicly Available Specification is multimodal and is intended to be in concert with and to complement the
World Customs Organization’s Framework of Standards to secure and facilitate global trade (Framework). It
does not attempt to cover, replace or supersede individual customs agencies’ supply chain security
programmes and their certification and validation requirements.
This Publicly Available Specification is a voluntary specification to help organizations to establish adequate
levels of security within those part(s) of an international supply chain which they control. It is also a basis for
determining or validating the level of existing security within such organizations’ supply chain(s) by internal or
external auditors or by those government agencies that choose to use compliance with this Publicly Available
Specification as the baseline for acceptance into their supply chain security programmes. Customers,
business partners, government agencies and others may request organizations which claim compliance with
this Publicly Available Specification to undergo an audit or a validation to confirm such compliance.
Government agencies may find it mutually agreeable to accept validations conducted by other governments’
agencies. If a third party organization audit is to be conducted, then the organization should consider
employing a third party certification body accredited by a competent body, which is a member of the
International Accreditation Forum (see Annex C).
It is not the intention of this Publicly Available Specification to duplicate governmental requirements and
standards regarding supply chain security in compliance with the WCO Framework. Organizations that have
already been certified or validated by mutually recognizing governments are compliant with this Publicly
Available Specification.
Outputs resulting from this document will be the following.
• A Statement of Coverage that defines the boundaries of the supply chain that is covered by the security
plan.
• A Security Assessment that documents the vulnerabilities of the supply chain to defined security
scenarios. It also describes the impacts expected from each of the potential threat scenarios.
• A Security Plan that describes security measures in place to manage the security threats identified by the
Security assessment.
• A training programme setting out how security personnel will be trained to meet their assigned security
related duties.
To undertake the security assessment needed to produce the security plan, an organization using this Publicly
Available Specification will
• identify the threats posed (security scenarios);
• determine how likely persons could carry out each of the security scenarios identified by the Security
Assessment.
This determination is made by reviewing the current state of security in the supply chain and, based on the
findings of that review, professional judgment is used to identify how vulnerable the supply chain is to each
security scenario.
If the supply chain is considered unacceptably vulnerable to a security scenario, the organization will develop
additional procedures or operational changes to lower likelihood, consequence or both. These are called
countermeasures. Based upon a system of priorities, countermeasures should be incorporated into the
security plan to reduce the threat to an acceptable level.
Annexes A and B are illustrative examples of risk management based security processes for protecting people,
assets and international supply chain missions. They facilitate both a macro approach for complex supply
chains and/or more discrete approaches for portions thereof.
These annexes are also intended to
• facilitate understanding, adoption, and implementation of methodologies, which can be customized by
organizations;
• provide guidance for baseline security risk management for continual improvement;
• assist organizations to manage resources to address existing and emerging security risks;
• describe possible means for assessment of risk and mitigation of security threats in the supply chain from
raw materiel allocation through storage, manufacturing, and transportation of finished goods to the market
place.
Annex C provides guidance for obtaining advice and certification for ISO/PAS 28001 if an organization using
this Publicly Available Specification chooses to exercise this option.

vi © ISO 2006 – All rights reserved

PUBLICLY AVAILABLE SPECIFICATION ISO/PAS 28001:2006(E)

Security management systems for the supply chain — Best
practices for implementing supply chain security —
Assessments and plans
1 Scope
This Publicly Available Specification provides requirements and guidance for organizations in international
supply chains to
• develop and implement supply chain security processes;
• establish and document a minimum level of security within a supply chain(s) or segment of a supply chain;
• assist in meeting the applicable Authorized Economic Operators criteria set forth in the World Customs
Organization Framework of Standards and conforming national supply chain security programmes.
NOTE Only a participating National Customs Agency can designate organizations as Authorized Economic Operators
in accordance with its supply chain security programme and its attendant certification and validation requirements.
In addition, this Publicly Available Specification establishes certain documentation requirements that would
permit verification.
Users of this Publicly Available Specification will
• define the portion of an international supply chain they have established security within (see 4.1);
• conduct security vulnerability assessments on that portion of the supply chain and develop adequate
countermeasures;
• develop and implement a supply chain security plan;
• train security personnel in their security related duties.
2 Normative references
The following referenced documents may be required for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO/PAS 20858, Ships and marine technology — Maritime port facility security assessments and security plan
development
International Convention for the Safety of Life at Sea (SOLAS), 1974, as amended, International Maritime
Organization
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
appropriate law enforcement and other government officials
those government and law enforcement personnel that have specific legal jurisdiction over the international
supply chain or portions of it
3.2
asset(s)
plant, machinery, property, buildings, vehicles, ships, aircraft, conveyances and other items of infrastructure or
plant and related systems that have a distinct and quantifiable business function or service
NOTE This definition includes any information system that is integral to the delivery of security and the application of
security management.
3.3
authorized economic operator
party involved in the international movement of goods in whatever function that has been approved by or on
behalf of a national customs administration as complying with WCO or equivalent supply chain security
standards
NOTE 1 Authorized Economic Operator is a term defined in the World Customs Organization Framework of Standards.
NOTE 2 Authorized Economic Operators include inter alia manufacturers, importers, exporters, brokers, carriers,
consolidators, intermediaries, ports, airports, terminal operators, integrated operators, warehouses, and distributors.
3.4
business partner
contractor, supplier or service provider that an organization contracts with to assist the organization in its
function as an organization in the supply chain
3.5
cargo transport unit
road freight vehicle, railway freight wagon, freight container, road tank vehicle, railway tank wagon or portable
tank
3.6
consequence
likely loss of life, damage to property or economic disruption, including disruption to transport systems, caused
by an attack on an organization in the supply chain or by the use of the supply chain as a weapon
3.7
conveyance
physical instrument of international trade that transports goods from one location to another
EXAMPLES Box, pallet, cargo transport unit, cargo handling equipment, truck, ship, aircraft and railcar.
3.8
countermeasure
action taken to lower the likelihood of a security threat scenario succeeding in its objectives, or to reduce the
likely consequences of a security threat scenario
3.9
custody
period of time an organization in the supply chain is directly controlling the manufacturing, processing,
handling and transportation of goods and their related shipping information within the supply chain
2 © ISO 2006 – All rights reserved

3.10
downstream
handling, processes and movements of goods when they no longer are in the custody of the organization in
the supply chain
3.11
goods
those things that upon the placement of a purchase order are manufactured, processed, handled and
transported within the supply chain for usage or consumption by the purchaser
3.12
international supply chain
supply chain that at some point crosses an international or economy border
NOTE All portions of this chain are considered international from the time a purchase order is concluded to the point
where the goods are released from customs control in the destination country or economy. If treaties or regional
agreements have eliminated customs clearance of goods from specified countries or economies, the end of the
international supply chain is the port of entry into the destination country or economy where the goods would have cleared
customs if the agreements or treaties had not been in place.
3.13
likelihood
ease or difficulty with which a security threat scenario could progress to become a security incident
NOTE Likelihood is evaluated based on the resistance the security processes in place pose to a security incident
involving the threat scenario being examined and is expressed either qualitatively or quantitatively.
3.14
management system
organization's structure for managing its processes or activities that transform inputs of resources into a
product or service, which meet the organization's objectives
NOTE It is not the intent of this Publicly Available Specification to require either a specific management system
and/or the creation of a separate security management system. ISO 9001 (Quality Management Systems), ISO 14001
(Environmental Management Systems), ISO/PAS 28000 (Security management systems for the supply chain), and the
International Maritime Organization’s International Safety Management (ISM) Code are examples of management systems.
3.15
organization in the supply chain
any entity that
• manufactures, handles, processes, loads, consolidates, unloads or receives goods upon placement of a
purchase order that at some point cross an international or economy border;
• transports goods by any mode in the international supply chain regardless of whether their particular
segment of the supply chain crosses national (or economy) boundaries; or
• provides, manages or conducts the generation, distribution or flow of shipping information used by
customs agencies or in business practices.
3.16
risk management
process of making management decisions based on an analysis of possible threats, their consequences, and
their probability or likelihood of success
NOTE A risk management process is normally initiated for the purposes of optimizing the organization’s resource
allocation necessary to operate in a particular environment.
3.17
scope of service
function(s) that an organization in the supply chain performs, and where it performs this/these functions
3.18
security declaration
documented commitment by a business partner, which specifies security measures implemented by that
business partner, including, at a minimum, how goods and physical instruments of international trade are
safeguarded, associated information is protected and security measures are demonstrated and verified
NOTE It will be used by the organization in the supply chain to evaluate the adequacy of security measures related to
the security of goods.
3.19
security plan
planned arrangements for ensuring that security is adequately managed
NOTE 1 It is designed to ensure the application of measures that protect the organization from a security incident.
NOTE 2 The plan can be incorporated into other operational plans.
3.20
security
resistance to intentional acts designed to cause harm or damage to or by the supply chain
3.21
security incident
any act or circumstance that threatens the security of a target
3.22
security personnel
people in the organization in the supply chain that have been assigned security related duties
NOTE These people may or may not be employees of the organization.
3.23
security sensitive information; security sensitive materials
information or materials, produced by or incorporated into the supply chain security process, that contain
information about the security processes, shipments or government directives that would not be readily
available to the public and would be useful to someone wishing to initiate a security incident
3.24
security management
systematic and coordinated activities and practices through which an organization in the supply chain
manages its risks and the associated potential threats and impacts
3.25
supply chain
linked set of resources and processes that upon placement of a purchase order begins with the sourcing of
raw material and extends through the manufacturing, processing, handling and delivery of goods and related
services to the purchaser
NOTE The supply chain may include vendors, manufacturing facilities, logistics providers, internal distribution centres,
distributors, wholesalers and other entities involved in the manufacturing, processing, handling and delivery of the goods
and their related services.
3.26
target
personnel, means of transport, goods, physical assets, manufacturing processes and handling, control or
documentation systems within an organization in the supply chain
4 © ISO 2006 – All rights reserved

3.27
threat scenario
means by which a potential security incident might occur
3.28
upstream
handling, processes and movements of goods that occur before the organization in the supply chain takes
custody of the goods
3.29
World Customs Organization
WCO
independent intergovernmental body whose mission is to enhance the effectiveness and efficiency of customs
administrations
NOTE It is the only intergovernmental worldwide organization competent in customs matters.
4 Field of application
4.1 Statement of application
The organization in the supply chain shall describe the portion of the international supply chain that it claims to
be in compliance with this Publicly Available Specification in a Statement of Application. The Statement of
Application shall at least include the following information.
• Details of the organization.
• Scope of service.
• Names and contact information of all business partners within the defined scope of service.
• Date the security assessment was completed and period of validity of the security assessment.
• Signature of an individual authorized to sign on behalf of that organization.
Organizations in the supply chain may extend the Statement of Application to include other parts of the supply
chain, e.g. including final destination.
4.2 Business partners
If the organization in the supply chain is using business partners within the portion of the international supply
chain, the organization shall, subject to 4.3 and 4.4, require such business partners to provide a security
declaration. The organization shall consider this security declaration in its security assessment and may
require specific countermeasures to be enacted.
4.3 Internationally accepted certificates or approvals
Transportation companies and facilities, which hold internationally accepted certificates or approvals, issued
pursuant to mandatory international conventions governing the security of the various transportation sectors,
will have in place security practices, plans and processes that meet the applicable requirements of this
Publicly Available Specification and are not required to be audited to confirm such compliance. For shipping
companies, ships and port facilities, the certificates or approvals shall be issued in accordance with SOLAS
XI-2/4 or SOLAS XI-2/10, as applicable.
In conformance with Clause 1, national customs agencies may, in addition to possession of internationally
accepted security certificates or approvals, require additional security measures and practices to be
implemented by transportation companies and facilities as a condition for designation as an Authorized
Economic Operator (AEO).
4.4 Business partners exempt from security declaration requirement
Those business partners that confirm to the organization that they
1) are verified compliant with this Publicly Available Specification or ISO/PAS 20858, or
2) are covered by 4.3, or
3) have been designated as AEOs in accordance with a national customs agency’s supply chain
security programme which has been determined to be in accordance with the WCO Framework,
shall be listed on the Statement of Application. However, the organization does not need to conduct additional
security assessments for such business partners or require them to provide security declarations.
4.5 Security reviews of business partners
Except for business partners covered by 4.3 or 4.4, the organization in the supply chain shall conduct reviews
of their business partners’ processes and facilities to ascertain the validity of their declarations of security.
Such reviews and the frequency of these reviews shall be conducted taking account of the organization’s risk
analysis of these business partners. The organization shall maintain results of these reviews.
NOTE To provide for ease of reading the organization claiming compliance, including those parts of its supply chain
operated by business partners, whether compliant with this Publicly Available Specification or not, is in the ensuing
paragraphs referred to as the “organization” unless clarity demands otherwise.
5 Supply chain security process
5.1 General
Organizations in international supply chains that have adopted this Publicly Available Specification are
required both to manage security throughout their portion of the supply chain and to have a management
system in place in support of that objective. This Publicly Available Specification requires security practices
and/or processes to be established and implemented in order to reduce the risk to the international supply
chain from activities that could lead to a security incident.
Organizations in the supply chain claiming compliance with this Publicly Available Specification shall have a
security plan based on the output from the security assessment that documents existing security measures
and procedures and incorporates countermeasures as applicable for the portion of the international supply
chain that they have included in their Statement of Application.
5.2 Identification of the scope of security assessment
The scope of the security assessment shall include all activities performed by the organization as described in
its Statement of Application (see 4.1). The assessment shall be periodically performed and the security plan
shall be revised as appropriate. The results of the assessment shall be documented and retained.
The security assessment shall also cover information systems, documents and networks pertaining to the
handling and movement of the goods while in the custody of the organization. Existing security arrangements
shall, subject to 4.3 and 4.4, be assessed at all locations and for business partners where there are potential
security vulnerabilities.
6 © ISO 2006 – All rights reserved

5.3 Conduction of the security assessment
5.3.1 Assessment personnel
The person or team conducting the security assessment shall collectively have skills and knowledge which
include, but are not limited to, the following.
• Risk management techniques applicable to all aspects of the international supply chain from the point
where the organization in the supply chain takes custody of the goods in to the point where the goods are
no longer in the organization’s custody or leaves the international supply chain.
• Applying appropriate measures to avoid unauthorized disclosure of, or access to, security sensitive
material.
• Operations and procedures involved in the manufacturing, handling, processing, movement and/or
documentation of goods as appropriate.
• Security measures related to consignment, conveyance, personnel, premises, and information systems in
that applicable portion of the supply chain.
• An understanding of security threats and mitigation methodologies.
• Understanding of this Publicly Available Specification.
The name(s) of the person or team members conducting the assessment as well as their qualifications shall
be documented.
5.3.2 Assessment process
The organization in the supply chain shall establish, implement and maintain a procedure(s) to identify existing
countermeasures intended to mitigate security threats. The organization shall list applicable threat scenarios,
including those deemed necessary by appropriate government officials. If government officials have not
participated, this shall be documented in the security assessment.
For each threat scenario, the organization shall evaluate the existing countermeasures and determine the
consequence and likelihood of each threat scenario occurring and evaluate if any additional measures are
required. If the measures are not adequate, additional measures shall be identified to reduce the threats to an
acceptable level. This process shall be repeated for each threat scenario.
The organization shall review the security declaration(s) provided by each business partner, defined in 4.2,
and apply professional judgment, knowledge of the entity(ies) and/or requirements of regulatory agencies. It
shall also obtain and use any other available information, in determining the acceptance of the security
declaration.
Organizations shall consider both the detail and validity of each security declaration when conducting the
security assessment and determining the overall vulnerability of the supply chain described in its Statement of
Application.
Business partners that are covered by 4.3 or 4.4 should not need to be assessed further.
The following information shall be documented.
• All threat scenarios considered.
• Processes used in evaluating those threats.
• All countermeasures identified and prioritized.
5.4 Development of the supply chain security plan
Organizations shall develop and maintain a security plan for the entire portion of the supply chain described in
their Statements of Application. The plan may be separated into annexes in which each describes the security
in place for a particular segment of the supply chain, including security measures that the organizations’
business partners, subject to 4.3 or 4.4, will maintain according to their security declarations. The
plan/annexes shall also specify how the organization would monitor or periodically review such security
declarations.
Organizations shall review and consider the use of the guidance in informative Annexes A and B when
developing their security plans.
5.5 Execution of the supply chain security plan
The organization shall establish a management system to enable its specific supply chain security processes
to be implemented.
5.6 Documentation and monitoring of the supply chain security process
5.6.1 General
The organization shall establish and maintain procedures to document, monitor and measure the performance
of its management system referred to above. The organization shall carry out audits of the management
system at planned intervals to ensure it has been properly implemented and maintained. The results of audits
shall be documented and retained.
5.6.2 Continuous improvement
The organization shall assess opportunities for improving its security arrangements as a means of enhancing
the security of its portion of the supply chain.
5.7 Actions required after a security incident
The organization shall carry out a review of its security plan after any security incident that relates to any
portion of the international supply chain the organization controls. This review shall
• determine the cause of the incident and the corrective action;
• determine the effectiveness of measures and procedures for security recovery; and
• based on such determinations, identify revisions and improvements to prevent the recurrence of such
incident and implement any improvements needed to enhance security recovery.
In the event of a security breach, the organization shall follow reporting procedures to Customs and/or
appropriate law enforcement agencies as appropriate, and as specified in the security plan and contractual
relationships.
The organization shall retain consignment and other required supply chain data within the time limits
prescribed in applicable laws and regulations.
5.8 Protection of the security information
Security plans, measures, processes, procedures and records of the organization shall be considered
sensitive security information and protected from unauthorized access or disclosure. Such information shall
only be disclosed to individuals who have a “need to know”. In addition to appropriate law enforcement
officials or their nominees, an individual has a “need to know” when
8 © ISO 2006 – All rights reserved

• the individual requires access to specific sensitive security information to carry out security activities
covered by the security plan;
• the individual is in training to carry out activities covered by the security plan;
• the information is necessary for the individual to supervise others carrying out security activities covered
in the security plan; or
• the individual is, or is acting on behalf of a party, who according to a contractual relationship with the
organization has been granted access to security sensitive information controlled by the organization in
accordance with agreed terms and conditions.
NOTE If the organization is certified compliant with ISO/PAS 28001 by a third party certification body accredited by a
competent accreditation body or has been certified or validated compliant with ISO/PAS 28001 by mutually recognizing
governments, such contractually agreed access to the organization's security sensitive information may not be deemed
necessary, and would in any event be dependent on the organization's explicit concurrence. The fact that its sensitive
security information is protected from unauthorized access or disclosure does not prevent the organization from briefing
business partners and others about its supply chain security arrangements and systems.

Annex A
(informative)
Supply chain security process
A.1 General
This annex provides guidance on the development of a supply chain security process that can be
implemented in an organization with an existing management system. Figure A.1 provides a graphical
description of such a process.

Identify Scope of Security Assessment
Conduct Security Assessment Select a threat scenario
Identify existing security measures Evaluate security measures
List applicable threat scenarios Determine consequence
Continual
Determine likelihood
Improvement
No
Assessed?
Yes
Yes Adequate?
No
Develop Security Plan
Execute Supply Chain Security Plan Develop counter measures
Document & Monitor Supply Chain Yes
Adequate?
Security Process
No
Figure A.1
10 © ISO 2006 – All rights reserved

A.2 Identification of the scope of the security assessment
A security assessment is an attempt to identify security risks present in that part of the supply chain the
organization, in accordance with its Statement of Application, desires to bring into compliance with this
Publicly Available Specification. To accomplish this assessment the boundaries of the scope of coverage
(both physically and virtually) need to be established.
A.3 Conduction of the security assessment
A.3.1 General
Using qualified personnel the existing security arrangements at all locations has to be assessed where there
are potential security vulnerabilities, which should include but not limited to the following.
• Where goods are being manufactured, processed or handled prior to being loaded in a transport unit,
palletized, or otherwise prepared for shipment.
• Where goods prepared for shipment are stored or consolidated prior to transportation.
• Where goods are being transported.
• Where goods are loaded into or unloaded from a conveyance.
• Where custody of the goods changes hands.
• Where documentation or information pertaining to goods being shipped is handled, generated or
accessible.
• Inland transportation routes and means of conveyance used by the various modes of transportation.
• Other.
A.3.2 Performance review list
The following performance review list provides an example of a systematic approach for reviewing existing
security arrangements.
Those portions of the performance review list that pertain to business partners, who have confirmed to the
organization that they
• are verified compliant with this Publicly Available Specification or with ISO/PAS 20858, or
• are covered by 4.3, or
• have been designated as AEOs in accordance with a national customs agency’s supply chain security
programme which has been determined to be in accordance with the WCO Framework,
should contain a comment indicating how the factor has been addressed, e.g. compliant with this Publicly
Available Specification, ISO/PAS 20858, or the ISPS Code.
A.3.3 Performance review
The following performance review list can be completed and considered when conducting a security
assessment for an organization in the supply chain. This list is not all-inclusive, and can be tailored to reflect
the risk assessment and business model of the organization. If the factor indicated is already implemented by
the organization in the supply chain the “Yes” block should be checked. If the factor is not already implemented
or is partially met the “No” block should be checked and, where applicable, an explanation added to the
comment column describing other alternative measures utilized, or that the risk is very low. If the factor is not
applicable or is outside the organization’s statement of coverage, Not Applicable (NA) should be noted in the
“Comments” block. Items on the performance review list that cannot be performed due to applicable
laws/regulations should be marked as prohibited in the comment column.
Factor YesNo Comments
Management of Supply Chain Security

• Does the organization have a management system that addresses
supply chain security?
• Does the organization have a person designated as responsible for
supply chain security?
Security Plan
• Does the organization have (a) current security plan(s)?

• Does the plan address the organization’s security expectations of
upstream and downstream business partners?

• Does the organization have a crisis management, business continuity,
and security recovery plan?
Asset Security
• Does the organization have in place measures that addresses
• the physical security of buildings,
• monitoring and controlling of exterior and interior perimeters,
• application of access controls that prohibit unauthorized access to
facilities, conveyances, loading docks and cargo areas, and managerial
control over the issuance of identification (employee, visitor, vendor,
etc.) and other access devices?
• Are there operational security technologies which significantly enhance
asset protection? For example, intrusion detection, or recorded
CCTV/DVS cameras that cover areas of importance to the supply chain
activity, with the recordings maintained for a long enough period of time
to be of use in an incident investigation.

• Are there protocols in place to contact internal security personnel or
external law enforcement in case of security breach?

• Are procedures in place to restrict, detect, and report unauthorized
access to all cargo and conveyance storage areas?

• Are persons delivering or receiving cargo identified before cargo is
received or released?
12 © ISO 2006 – All rights reserved

Factor Yes No Comments
Personnel Security
• Does the organization have procedures to evaluate the integrity of
employees prior to employment and periodically relative to their security
duties?
• Does the organization conduct specific job appropriate training to assist
employees in performing their security duties for example: maintaining
cargo integrity, recognizing potential internal threats to security and
protecting access controls?
• Does the organization make employees aware of the procedures the
company has in place to report suspicious incidents?

• Does the access control system incorporate immediate removal of a
terminated employee’s company-issued identification and access to
sensitive areas and information systems?

Information Security
• Are procedures employed to ensure that all information used for cargo
processing, both electronic and manual, is legible, timely, accurate, and
protected against alteration, loss or introduction of erroneous data?

• Does an organization shipping or receiving cargo reconcile the cargo
with the appropriate shipping documentation?

• Does the organization ensure that cargo information received from
business partners is reported accurately and in a timely manne
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...