Security Draft Asset Management Strategy - BPA.gov

2y ago
17 Views
3 Downloads
1.04 MB
25 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Jenson Heredia
Transcription

BONNEVILLEPOWERADMINISTSECURITY ASSET MANAGEMENT STRATEGYFY2017 - 2030R. ALTOMAREAPRIL 2017RATION

BONNEVILLEPOWERADMINISTRATIONTABLE OF CONTENTSExecutive Summary . 3Security Asset Management . 9Overarching Strategy . 91.Asset Management Goals, Objectives, Initiatives and Risks. 101.1Goals . 101.2Objectives . 101.3Strategic Initiatives . 111.4Strategic Challenges. 121.5Strategic Constraint . 122.Asset Category Overview . 132.1Definition. 132.2Primary Asset Types and Groupings. 132.3Service Provided . 142.4Criticality Rating. 142.5Roles and Responsibilities . 162.6Metrics . 173.Investment Recommendations - Capital . 173.1NERC CIP Version 5 Compliance Enhancements Completion . 183.2Protection of Tier 1 Sites . 183.3Protection of Tier 2 Sites . 183.4Protection of Tier 3 Sites . 193.5Protection of Tier 4 Sites . 193.6Proposed Capital Plan for FY2017 – FY2030 . 204.Investment Recommendations - Expense . 205.Summary of Recommended Investments . 21Appendix A - Risk Reduction . 22Security Asset Management Strategy2

BONNEVILLEPOWERADMINISTRATIONEXECUTIVE SUMMARYThe Office of Security and Continuity of Operation (OSCO) is accountable for supporting Bonneville PowerAdministration’s (BPA) mission and stakeholder interests by protecting BPA’s people, facilities, criticalsystems and information. The program scope covers more than 300 facilities, over 5,000 employees andcontractors, as well as thousands of visitors each year. Security system designs and standards ensure BPAis compliant with regulatory requirements, guidelines, provisions and principles prescribed by the NorthAmerican Electric Reliability Corporation (NERC), Federal Energy Regulatory Commission (FERC), U.S.Department of Energy (DOE), and U.S. Department of Homeland Security (DHS) as outlined in PresidentialDecision Directives.There are two significant changes from the previous strategy:1. the implementation and adherence to the NERC CIP 14 Security Enhancement Plan and2. the initiation of security enhancement initiatives to provide sustainable and increased levels ofsecurity for BPA.Due to the unpredictable nature of threat activity and resulting security conditions, the prioritizationscheme must allow for flexibility to maneuver in an environment where security conditions can changewith little advance warning while also ensuring an adequate baseline level of security commensurate withcriticality.The NERC CIP 14 plan adherence comprises the lion’s share of effort for the next decade and as such hasgreatly informed the prioritization of scheduled security enhancement efforts reflected in this document.Objectives of this StrategyOSCO’s strategic goals of security and compliance will be achieved by meeting the following strategicobjectives: Prioritize and fund security gaps in protection standards set by BPA’s Critical Asset Security Plan(CASP).Document the need to research, develop, scope and implement a technology refresh of agingsecurity infrastructure in the near term.Forecast, prioritize and fund system maintenance activities which are economical, sustainable, riskinformed and ensure reliable system performance.Outside the scope of this strategy are: Cyber security systemsIT infrastructure (networks, servers, etc.) used to operate the digital security componentsAdministration, maintenance, and cyber security used to carry the video and alarm data feedOngoing security fence maintenance (supported by Facilities Asset Management)Facilities upgrades and new builds with security enhancements are not reflected in this plan but thesame security standards will apply to Facilities new builds/upgrades. Costs for the securitymeasures for new builds/upgrades by Facilities will be incorporated into the costs for thoseupgrade/new build projects individually.OSCO coordinates with Information Technology and Facilities to ensure that these, and relatedrequirements, are addressed in the appropriate asset management plans.Security Asset Management Strategy3

BONNEVILLEPOWERADMINISTRATIONProfile of AssetsThe purpose of security assets is to implement BPA requirements for protection and compliance. BPAdefines a security asset as material, equipment, software or hardware that is used for the primary purposeof providing protection. Individual assets or components make up security systems that collectivelyprovide various levels of physical security protection depending on the asset being protected. Table “A”outlines the systems, their purpose, and provides examples of the types of components included in eachsystem.Table A - Systems and Component OverviewSystem or FunctionProtective BarrierSurveillanceIntrusionDetectionAccess ControlPurposeProvide a physical barrier between adversary andtarget. Protective barriers delay an adversary’sattempts to gain entry or cause damage to criticalcomponents.Video systems support assessment of alarms and allowfor review of incidents within the field of view of thevarious cameras.Provides warning of pending intrusion and notificationof an intrusion. Provides depth to regulatory drivensecurity systems that support NERC CIP compliance.Intrusion detection supports faster and more effectivelaw enforcement response- Provide records of access to a facility.-Decreasing the number of hard keys-Decreases vulnerability of locks; card key locks are lessprone to forced entry-Reduces vulnerability by immediately deactivatingcard keys that are lost or stolen and reduces therequirement to change locks after hard keys are lost.Used to specifically address a security needLightingEarly IntrusionDetectionIT Support SystemScreeningProvides the ability to detect activity outside theperimeter of the facility and provide early warning.IT infrastructure supports the access control andmonitoring systems.Ensures contraband is not brought into BPA facilities.Asset Types Include FenceGatePadlockBarbed wireBullet resistant glassWindow protectionVehicle BarriersFixed/PTZ camerasDVR/NVRhardware, wiring, and circuitryThermal imaging devicesMotion detectorsAll “access control” componentsFence detection systemsMotion sensing camerasMotion activated lightsTamper alarmsDoor contactElectronic locksMagnetic lockRequest to exit sensorsAssociated wiring, circuitry, andpower supplies Camera lightsPerimeter lightsSpecial area lightsMotion/Thermal detectionsurveillance devicesServers, Dbase and BackupNetwork (LAN/WAN)Applications (ProWatch, etc.)X ray machinesMetal detectors Security Asset Management Strategy4

BONNEVILLEPOWERADMINISTRATIONStrategic ChallengesThere are two main challenges which must be overcome for successful implementation of this strategy:Rapidly evolving regulatory requirementsNERC CIP 14 is accepted as the latest NERC requirement to implement increased security at criticallocations within BPA’s footprint. As such, this Security Asset Management Strategy is crafted to respond toand implement the NERC CIP 14 security enhancement requirement. If a new security standard is deployedthat BPA must comply with, this strategy may need to be revisited and revised.Aging and technologically obsolete systemsLarge numbers of systems (primarily cameras) are projected to fail in the coming years due to exceedingmanufacturer-recommended Mean Time to Failure (MTTF). If not managed, this may impact securitysystem effectiveness, cause a spike in maintenance fees and drain limited resources.BPA’s OSCO proposes a technology refresh to leverage new technology that can be sustained over the longterm. In accordance with policy, the technology refresh initiative will not be executed with capital, butrather expense, funds. The need for this initiative, while not captured in this strategy document’s capitalplan, is necessary nonetheless.Major Constraint of this StrategyOSCO has re-prioritized its capital expenditures and extended its timeline for capital project completion inresponse to external, downward budgetary pressures which has resulted in a less-than-optimal schedule.Relative priorities for addressing security vulnerabilities at BPA substations were also forced to be ignoredin some instances (but maintained as much as possible) to respond to the downward pressures placedupon OSCO.Major Elements of the StrategyPrioritizationWhen prioritizing, several factors are considered: Real-time security threat information, including increased rates of security-related incidentsRegulatory mandatesThe criticality of the facilityCriticality of a system or componentsEfficiencies to be gainedStrategic initiativesThree categories have been identified for meeting OSCO’s strategic objectives and reducing a variety ofsecurity and operational risks. Table “B” summarizes each category and estimates the risk exposure fromforgoing or delaying implementation.Security Asset Management Strategy5

BONNEVILLEPOWERADMINISTRATIONTable B - Strategic Initiatives, Risks and CostsRisks of Forgoing ImplementationNERC CIP 14 more closely linkssecurity and compliance resultingin a single total; a difference fromthe previous IPR.Financial and Reputational Risk Due to RegulatoryNon-Compliance: Findings by regulatory entitieswithin one year leading to; a) possible financialsanctions, b) mandated policy changes and, c) publiccriticism.Ensure compliance with securityregulation by applying mandatorysecurity enhancements asrequired by NERC, DHS, DOE, etc.2. Critical InfrastructureProtectionInstallation of security systemsdesignedtoprovidetheappropriate level of protection forcritical infrastructure designatedTier 1, Tier 2, Tier 3 or Tier 4.Immediate ThreatMitigationImmediate Threat Mitigation:Preventative MaintenanceProgramFY17-30Initiatives1. Compliance (NERC CIP v5)( Tiers I, II, III, IV)Tiered Security Enhancements (DOE & CIP 14-driven)DriversProvides agility to respond toemerging threat vectors orrespond in a timely andexpeditious manner to previouslyunknown security gaps at BPAfacilities, with appropriate capitalinvestments.5. Replacement & RenewalProgramTimely replacement of failedcomponents commensurate withcriticality of system to maintaincomplianceandprovideprotection. Strategic phase-out ofcomponentsnolongertechnological viable.Capital / ExpenseFinancial and Operational Risk Due toTerrorist/Criminal Activity: Continual exposure tothe “medium risk” of terrorist attack or collateraldamage from criminal activity which could result inthe loss of critical transmission facilities with; a) anextreme consequence to the bulk electric system, b)major economic impact to regional customers andeconomy and, c) severe observable impact andorders for substantial corrective action, includingsome mandatory changes in BPA operation oradministration. 84.4MThis includes Capital Projects currently scheduledfor the years FY17-FY30.This strategy allows BPA to confront theunpredictable nature of threats and resulting securityconditions. Not programming funds toward this endremoves the flexibility to maneuver in anenvironment where security conditions can changewith little advance warning. This ensures adequatebaseline level of security commensurate withcriticality to include avoidance of financial,reputational, and/or operational risks to noncompliance, terrorist, or criminal activities. 7.0MOperational and Reputational Risk Due toInadequate Maintenance: Failing or faulty securitysystems and equipment leading to; a) compromisedprotection of critical infrastructure, b) strain onlimited resources to support O&M activity and, c)criticism by regulatory entities due to unplannedoutages of critical security systems.Total 11.9M 91.4M 11.9MSecurity Asset Management Strategy6

BONNEVILLEPOWERADMINISTRATIONResults to be AchievedBPA and its stakeholders can expect ongoing compliance with requirements, improved critical siteprotection and reliable security system performance.ComplianceSuccess in maintaining security compliance will be measured by BPA having zero violations of a NERCrequirement as a result of lacking security systems or underperformance of existing systems. Violationscount only when not previously self-reported and assigned a low to moderate Violation Risk Factor (VRF)and Violation Security Level (VSL) as identified by a regulatory audit or investigation.ProtectionBy the end of 2017 five additional Tier 2 critical substations will have security enhancements installed,which will result in a notable reduction in risk. Table “C” shows the estimated risk reduction to be gainedas a result of the proposed implementation.Table C - Estimated Security Risk Impact - Tier 2 ProtectionBefore Tier 2 TreatmentThreatAfter Tier 2 TreatmentRiskNumericalRisk RangeRiskNumericalRisk Range% RiskReductionInternational Terrorist0.49Medium0.42Medium7%Eco Terrorist / Special Interest0.45Medium0.36Medium9%Criminal 2%Insider0.13Low0.13Low0%Note: A complete explanation of the risk analysis is provided in Appendix ASpending LevelsProposed capital plan for FY 2017 - FY 2030Note:This strategy document reflects a modified schedule and timeline per external budgetary constraints.Internal budgeting decisions and processes (Integrated Program Review, etc.) have mandated a modifiedfunding plan with particular attention paid to the FY17-19 horizon which has affected capital projectprioritization and an extension of an optimal 10-year timeline to a 15-year timeline. Out-year fundinglevels for FYs beyond FY19 will be revisited during subsequent CIR processes.Table D - Proposed Capital Plan ( 000s)Security Asset Management Strategy7

BONNEVILLEPOWERADMINISTRATIONBPA’s OSCO is proposing a capital model which funds: Immediate Threat Mitigation providing agility and contingency in the event of immediate need forcapital expenditures in response to immediate threats posed to BPA.NERC CIP v5 required protection place holder funding at 500,000 for FY17Graded security and critical infrastructure protection at Tier 1, 2, 3 and 4 sitesProposed expense plan for FY 2017 - FY 2030Security systems at transmission sites are funded by Transmission Field (TF) budget, while systems installedat headquarters building are paid for out of the Corporate cost center. The proposed spending level foreach category is outlined in Table “E.”Transmission System Maintenance funding as depicted in Table E provides estimates for FY17 and appliesinflation to years beyond FY17. These amounts do not reflect any increased workload as new sitestransition from warranty-covered maintenance to internally covered maintenance efforts.Table E - Expense Plan for Security System Maintenance from FY 2017–FY 2030 ( 000s)InitiativePrev Mx and InventoryBreak Fix MaintenanceTRANS - SUB .9487.9656.72020172.4498.1670.5Prev Mx and InventoryBreak Fix MaintenanceCORP - SUB 9.4682.0700.1719.4739.9TOTALTRANSMISSION FUNDS2022 2023 2024179.7 183.5 187.4519.2 530.2 541.3699.0 713.7 728.7CORPORATE FUNDS42.951.962.876.034.835.536.337.077.787.499.1 .5994.81,046.41,105.711,924.2SummaryThis Security Asset Management Strategy seeks to balance compliance and security enhancement /modernization initiatives to provide BPA with the most risk appropriate security while applying sound assetmanagement principles and efficiencies to maximize the use of ratepayer dollars.Security Asset Management Strategy8

BONNEVILLEPOWERADMINISTRATIONSECURITY ASSET MANAGEMENTOVERARCHING STRATEGYSecurity Asset Management Strategy9

BONNEVILLEPOWERADMINISTRATION1. ASSET MANAGEMENT GOALS, OBJECTIVES, INITIATIVES AND RISKS1.1GoalsThe goal of the Security Infrastructure Asset Management Strategy is to establish a prioritization strategyfor both initial security system deployment and subsequent life-cycle maintenance to address the everchanging security threats and compliance requirements, while balancing sound business and assetmanagement principles, ensuring the following long-term outcomes: Compliance – BPA is in compliance with all security requirements (e.g., NERC CIP, HSPD-12, DOE’sGraded Security Policy (GSP)). Risk Informed Protection – Protection strategies consider risks as measured by existing threat andpotential consequence of impact to BPA’s people, mission, and fiscal health while also consideringmitigating strategies such as security systems, policy and employee awareness training.1.2ObjectivesOSCO’s strategic goals of compliance and protection will be achieved by meeting the following strategicobjectives:1. Prioritize and fund security enhancements in accordance with OSCO’s NERC CIP 14 compliance planand standards set by BPA’s Critical Asset Security Plan (CASP).2. Forecast, prioritize and fund system maintenance activities which are economical, sustainable, riskinformed and ensure reliable system performance in accordance with DOE O 473.3.Methodologies used to deploy NERC CIP 14 security enhancements, subsequent maintenance activities anda technology refresh seek to: Leverage new technologies to sustain or enhance current system effectiveness Improve security system reliability Reduce maintenance overheadThese objectives align with BPA’s strategic direction in the following ways: Strategic Objective S1 – Policy and Regional Actions: Protecting BPA's critical transmission assetssupports system reliability Strategic Objective S9 – Stakeholder Satisfaction: Customers expect BPA to protect its criticaltransmission infrastructure Strategic Objective I4 – Asset Management: BPA's valued assets and property are protected fromloss or damage Strategic Initiative I7 – Risk-Informed Decision Making and Transparency: This protection strategyutilizes a risk-informed process to prioritize the protection of critical assets Strategic Initiative P4 – Positive Work Environment: Protection of employees supports safety in theworkplaceOutside the scope of this strategy are cyber security systems and the underlying IT infrastructure(networks, servers, etc.) used to operate the digital and remaining analog security components.Administration, maintenance, and security of the software solutions used to support the video and alarmdata are covered by IT as well. Security fence maintenance is covered by Facilities Asset Management.OSCO coordinates with IT and Facilities to ensure that out-of-scope requirements are covered in theappropriate asset management plans.Security Asset Management Strategy10

BO1.3NNEVILLEPOWERADMINISTRATIONStrategic InitiativesStrategic initiatives to meet the asset management objectives are identified in Table 1. It describes eachinitiative and identifies risks being mitigated by implementation.Table 1. Strategic Initiatives, Risks Addressed and CostsRisks of Forgoing ImplementationNERC CIP 14 more closely linkssecurity and compliance resultingin a single total; a difference fromthe previous IPR.Financial and Reputational Risk Due to RegulatoryNon-Compliance: Findings by regulatory entitieswithin one year leading to; a) possible financialsanctions, b) mandated policy changes and, c) publiccriticism.Ensure compliance with securityregulation by applying mandatorysecurity enhancements asrequired by NERC, DHS, DOE, etc.2. Critical InfrastructureProtectionInstallation of security systemsdesignedtoprovidetheappropriate level of protection forcritical infrastructure designatedTier 1, Tier 2, Tier 3 or Tier 4.Immediate ThreatMitigationImmediate Threat Mitigation:Preventative MaintenanceProgram15-Year CostInitiatives1. Compliance (NERC CIP v5)( Tiers I, II, III, IV)Tiered Security Enhancements (DOE/CIP 14-driven)DriversProvides agility to respond toemerging threat vectors orrespond in a timely andexpeditious manner to previouslyunknown security gaps at BPAfacilities, with appropriate capitalinvestments.5. Replacement & RenewalProgramTimely replacement of failedcomponents commensurate withcriticality of system to maintaincomplianceandprovideprotection. Strategic phase-out ofcomponentsnolongertechnological viable.Capital / ExpenseFinancial and Operational Risk Due toTerrorist/Criminal Activity: Continual exposure tothe “medium risk” of terrorist attack or collateraldamage from criminal activity which could result inthe loss of critical transmission facilities with; a) anextreme consequence to the bulk electric system, b)major economic impact to regional customers andeconomy and, c) severe observable impact andorders for substantial corrective action, includingsome mandatory changes in BPA operation oradministration. 84.4MThis includes Capital Projects currently scheduledfor the years FY17-FY30 only.This strategy allows BPA to confront theunpredictable nature of threats and resulting securityconditions. Not programming funds toward this endremoves the flexibility to maneuver in anenvironment where security conditions can changewith little advance warning. This ensures adequatebaseline level of security commensurate withcriticality to include avoidance of financial,reputational, and/or operational risks to noncompliance, terrorist, or criminal activities. 7.0MOperational and Reputational Risk Due toInadequate Maintenance: Failing or faulty securitysystems and equipment leading to; a) compromisedprotection of critical infrastructure, b) strain onlimited resources to support O&M activity and, c)criticism by regulatory entities due to unplannedoutages of critical security systems.Total 11.9M 91.4M 11.9MSecurity Asset Management Strategy11

B1.4ONNEVILLEPOWERADMINISTRATIONStrategic ChallengesTwo main challenges, which are outlined below, must be overcome for successful implementation of thisstrategy.Rapidly evolving regulatory requirementsCritical Infrastructure Protection (CIP) requirements issued by NERC CIP have had a major impact on BPA’ssecurity program, both in terms of resourcing as well as developing processes for successfulimplementation. NERC requirements emerge every one to two years requiring implementation within 12to 18 months. It is difficult to anticipate the scope and budget for NERC projects in advance. Standard BPAprocesses for capital projects require at least a two- to three-year planning window, which does notaccommodate NERC timelines. Furthermore, NERC CIP impacts several BPA organizations with complexinterdependencies and upstream/downstream impacts.Aging and technologically obsolete systemsLarge numbers of systems (primarily cameras) are projected to fail in the coming years due to exceedingmanufacturer recommended Mean Time to Failure (MTTF). If not managed, this may impact securitysystem effectiveness, cause a spike in maintenance fees and drain limited resources.BPA’s OSCO is proposes a technology refresh to leverage new technology that can be sustained over thelong term. In accordance with policy, the technology refresh initiative will not be executed with capital, butrather expense, funds. The need for this initiative, while not captured in this strategy document’s capitalplan, is necessary nonetheless. The benefits to this approach are: Immediate reduction in costs associated with video surveillance maintenance Reduction in information technology band width and licensing costs Ability to redirect resources to more sustainable security system’s development andimplementation Maintaining “security in depth” and multi-layered alarm assessment capabilityBPA implements a layered security approach that includes all aspects of the physical security, personnelsecurity, information security and operations security disciplines. Video surveillance is almost exclusivelyused to assess alarm activity after the fact. This has traditionally been one of two primary assessment toolsto determine the nature of an alarm. The proposed strategy leverages increased technological capabilitieswhich allows for fewer deployed camera systems but still provides assessment capability in depth.Therefore, the decommissioning of targeted video surveillance assets at substations is expected to havevery minimal to no impact on security system effectiveness or assessment capability.1.5 Strategic ConstraintMajor Constraint of this StrategyOSCO has re-prioritized its capital expenditures and extended its timeline for capital project completion inresponse to external, downward budgetary pressures which has resulted in a less-than-optimal schedule.Relative priorities for addressing security vulnerabilities at BPA substations were also forced to be ignoredin some instances (but maintained as much as possible) to respond to the downward pressures placedupon OSCO.Security Asset Management Strategy12

BONNEVILLEPOWERADMINISTRATION2. ASSET CATEGORY OVERVIEW2.1 DefinitionA security asset is defined as material, equipment, software or hardware that is used for the primarypurpose of providing security. The assets collectively make up security systems and overarching securityinfrastructure. OSCO defines the standards and requirements for the use of these systems based oninterpreting and applying regulatory requirements and risk mitigation techniques. OSCO is ultimatelyaccountable for the security infrastructure performance and its strategic deployment to provide the mosteffective protection for BPA assets.2.2Primary Asset Types and GroupingsSecurity assets are grouped by system or function. Protection strategies leverage several systems in unisonfor maximum benefit. Table 3 describes typical systems and components within those systems:Table 3. Summary of Asset Groupings and SystemsSystem tectionAccess ControlLightingPurposeAsset Types IncludeO&M CharacteristicsAssetsOwnerFAM FenceGatePadlockBarbed wireBullet resistant glassWindow protectionVehicle BarriersFixed/PTZ camerasDVR/NVRhardware, wiring, andcircuitry Thermal imaging devices Low maintenance Long life-cycle Usually repairs andupkeep involve smallsections of fence, gaterepair, etc. O&M is low High maintenance Short/Medium life-cycle High replacement costsProvides warning of pending intrusionand notification of an intrusion to carryout a crime or attack or improperaccess. Provides depth to regulatorydriven security systems that supportNERC CIP compliance. Intrusiondetection supports faster and moreeffective law enforcement response- Provide records of access to a facility.-Decreasing the number of hard keys-Decreases vulnerability of locks; cardkey locks are less prone to forced entry-Reduces vulnerability by immediatelydeactivating card keys that are lost orstolen and reduces the requirement tochange locks after hard keys are lost. Motion detectors All “access control”components Fence detection systems Motion sensing cameras Motion activated lights Tamper alarms Maintenance varies bycomponent Medium lifecycle Low costs with theexception of a few selectcameras and fencedetection systemsIT-JS Medium maintenanceLong life cycleLow replacement costsElectro mechanical lockingmechanisms require mostfrequent service visitsdependent of frequency ofuseIT-JSUsed to specifically address a securityneed Camera lights Perimeter lights Special area lights Medium maint

Jan 15, 2016 · NERC CIP 14 is accepted as the latest NERC requirement to implement increased security at critical locations within PA’s footprint. As such, this Security Asset Management Strategy is crafted to respond to and implement the NERC CIP 14 security enhanc

Related Documents:

Page 3 - Draft For Discussion Revision No: R1.9 Draft Asset Management Strategy Asset Management Strategy 1. Executive Summary Asset Management is a key part of business planning, which connects, at a strategic level, decisions about an organisation’s business needs, the d

Management Structure of NBF NBF's asset management is entrusted to the asset management company. The asset management company conducts asset management of NBF based on the Asset Management Entrustment Agreement concluded with NBF. (i) Organizational Structure for Operation of Duties of the Asset Management Company

asset management (AM) building blocks that underpin a well-governed asset management system: An asset management policy An asset management strategy, including a framework An asset management governance structure These AM building blocks help strengthen infrastructure planning and

Asset Keeper Pro - Fixed Asset Cycle Asset Keeper Pro - Fixed Asset Cycle Page 5. Fixed Asset Cycle: Building your own Fixed Asset Cycle If you would prefer to add your own steps to the Fixed Asset Cycle because you are unsure of the procedure that you currently use, you can use the Add Step button. This provides a very quick method

Risk management program Risk Management Framework Security management program Security Risk Management System (SRMS) Security Department - Analysis Asset management financial planning Agency Asset Management Plan Nine (9) Facility AMPs Fleet AMP Randall's Island Campus AMP Asset systems architecture Infor EAM .

The Asset Management Strategy supports our strategic priority to: To provide quality, well maintained homes that are fit for the future . Page 5 of 10 Asset Management Strategy 2018 The strategy supports our growth aspirations and development strategy. A key principle is that any development decision will complement and enhance our current asset portfolio. Our aim is that: We invest in our .

Use and Maintenance of asset risk information Legal and other requirements Audit Corrective and Preventative Action Continual Improvement Records Management Review 1.6 General Requirements Asset Management Policy Asset Management Strategy Asset Management Objectives Asset Managemen

4.9.2 Gaps against current strategy targets and asset management objectives . (AMP) 5. the scope and boundaries of the Asset Management Framework, the asset management and . 7. outline of organisational governance arrangements, including the agency’s Asset Management Policy and the rol