{"id":373535,"date":"2024-10-20T02:34:34","date_gmt":"2024-10-20T02:34:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/awwa-g430-2014-r2020\/"},"modified":"2024-10-26T04:31:52","modified_gmt":"2024-10-26T04:31:52","slug":"awwa-g430-2014-r2020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/awwa\/awwa-g430-2014-r2020\/","title":{"rendered":"AWWA G430 2014 R2020"},"content":{"rendered":"
This standard covers the minimum requirements for a protective security program for a water, wastewater, or reuse utility.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
11<\/td>\n | SECTION 1: GENERAL Sec. 1.1 Scope Sec. 1.2 Purpose Sec. 1.3 Application SECTION 2: REFERENCES <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | SECTION 3: DEFINITIONS <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | SECTION 4: REQUIREMENTS Sec. 4.1 Explicit Commitment to Security Sec. 4.2 Security Culture <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Sec. 4.3 Defined Security Roles and Employee Expectations <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Sec. 4.4 Up-to-Date Assessment of Risk Sec. 4.5 Resources Dedicated to Security and Security Implementation Priorities <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Sec. 4.6 Access Control and Intrusion Detection <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Sec. 4.7 Contamination Detection, Monitoring, and Surveillance <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Sec. 4.8 Information Protection and Continuity <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Sec. 4.9 Design and Construction Sec. 4.10 Threat-Level\u2013Based Protocols <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Sec. 4.11 Emergency Response and Recovery Plans and Business Continuity Plan <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Sec. 4.12 Internal and External Communications <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Sec. 4.13 Partnerships SECTION 5: VERIFICATION Sec. 5.1 Documentation Required <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Sec. 5.2 Human Resources <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Sec. 5.3 Equipment SECTION 6: DELIVERY <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | APPENDIX A SECTION A.1: US DEPARTMENT OF HOMELAND SECURITY: INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM (ICS-CERT) SECTION A.2: WATER SECURITY INITIATIVE (WSI) <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | SECTION A.3: HOMELAND SECURITY INFORMATION NETWORK (HSIN) <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | SECTION A.4: GUIDELINES FOR THE PHYSICAL SECURITY OF WATER UTILITIES (ANSI\/ ASCE\/EWRI 56-10) AND GUIDELINES FOR THE PHYSICAL SEC <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | SECTION A.5: RESPONSE PROTOCOL TOOLBOX (RPTB): PLANNING FOR AND RESPONDING TO DRINKING WATER CONTAMINATION THREATS AND INCIDENTS SECTION A.6: RPTB RESPONSE GUIDELINES <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | SECTION A.7: AMERICAN WATER WORKS ASSOCIATION (AWWA): PROCESS CONTROL SYSTEM SECURITY GUIDANCE FOR THE WATER SECTOR SECTION A.8: CYBER SECURITY EVALUATION TOOL (CSET) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" AWWA G430-14(R20) Security Practices for Operation and Management<\/b><\/p>\n |