0% found this document useful (0 votes)
78 views7 pages

IATA Security

The document outlines the essential elements of aviation security management, emphasizing the importance of a Security Management System (SeMS) for organizations in the aviation sector. It highlights the need for a proactive approach to security, detailing the responsibilities of operators and the evolving nature of security threats. Additionally, it provides guidance on implementing SeMS, evaluating security risks, and ensuring compliance with international standards to enhance overall safety in aviation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
78 views7 pages

IATA Security

The document outlines the essential elements of aviation security management, emphasizing the importance of a Security Management System (SeMS) for organizations in the aviation sector. It highlights the need for a proactive approach to security, detailing the responsibilities of operators and the evolving nature of security threats. Additionally, it provides guidance on implementing SeMS, evaluating security risks, and ensuring compliance with international standards to enhance overall safety in aviation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
SECURITY 25 May 2028, What You Need to Know About Aviation Security How do you manage your organization's security’ ‘Where to start? Tha basis for aviation secur s Annas 17 of he Cicana Convention fie tsnational Cul Avon Ocanzatin (AO), Ths wide-ranging document provides the stancad procedures and guidance othe cl avation ndusty on how to safeguard the industry against acts of unlawful rtrferercs. Annet 17's amendes regula to adcress the evolving teat andi’ composed ove ay ection, which a Detatone General pancpes + Organization 4 Prevontve security measures Managemont of reponse to acts of unawlitsterence ‘though annex 7 the msin CAO Ano eting scary stance andreconmended prectices, hare are a number of atherAMetes thatnnenc he sacurty operational nite or aipor. Mary ar cal with by hose responibefor safety the ervrorment ard he faction ofthe mowerant of passangert from ont to point. The Annex to sexs to coordinate the activins of those invlvedinsacurty roars. ‘Simplified Aviation Security Legal Framework Nationa Git Avaton] | National Cit Aviaton Ps senimncca|| |sciurmauneeieed earner ‘Source: IATA Whois responsible for aviation security? ‘vera ts recognize that tne operators havea primary responsi for protecting thor passenger, ase and revenues States need to ensure that anes. ‘develo and inlement complementary programs compatible wth tose of the States out of whch hey operate Batts important to remeber that securtys nat only the responsibly of top-level management or the Head of Security Security mols everyone and postive suri culture is esental in promoting and mantaning a secre erronment Positive enforcement of correct security ations send the message ttroughout an erganization tat management balewes secur to bea rin. “The tina goals to enhance global ecu by implementing urfoem sacurty measures around the worl 2 goal hat cannot be achieved without sls _coritmont by alleonee ned ‘What are security risks and threats to civil aviation? ‘Nation sacuy risks ana teats evolve rapily and maniesthemsehes in cert forms, Some ofthe key rats can include: ‘0 “insider tests" /anown sides, presenting poten temas to ates ‘© Civlunrastinpacting arew during hr byoversaway from thelrnome base © Fights operating athe vent a arspace wth conte zones an © Lonel anatacorem inedents compromising sxcurty © Human rtfeking nadoquetely documented passengurs contaband amuggng at olher couse for cancern lu tothe various dagrees fk Inlscharrks cannot be totaly avoided or eliminates, However.the goalist reduce. 3s for as practicable andreasonable the possibilty of something gong \wrongandto reduce the potently negative consequences that may arse a aresul. There wl alaays be factors beyond cu controler beyond ou knowledge such ae ne terri tack metnedologas, Aba result everyone aces tne nevtable challange of balancing ane ak manageman erable ta rake maxnurh use oid ine, resources, personnel an turdng What is a Security Management System (SeMS}? ’A Securty Management System [eM] proves an entity witha framework of operating principles and guance which enable to anhance security performance by proactively managing risks, treats. and ares where there are gop and wuherabies whch may have anegatve impact on that performance. Seuss: © Based onarisk-rven framework designed to embod securty within your operations and cure © Sutable or any entity win te avation sector egarcles fst or operation © An enabler forthe CAA aroun the globe to develop flexbl rk-based oversight ‘© An enabler frente requved to moot qulty contol provslons ofthe loeatautortis How do you manage your organization's security | SoM ao contributes to making seurty practices proactive rather then rehing on mere tational resctve wn prserntie procedures. offers quantitative nl quattatve Benois hat ean improve overall performance and communication wihina company. at wll with Site regdators enhanc # company's secur culture requbtory colaberaion and resource utzon ‘robust SoM wil ow your organization to: © Seamlessly engage wth te ferent departments of ou organization © Consistent and efficent assess teats andisks © factvelycalaborateandrapert when secur and threat neidents occur el QG©OOOD © © OOD) ‘Sources IATA ‘Youcan oan more abou ATS Sol cram and SeMS Competoncy Test by visting the progranis wsinane, What are the benefits of a Security Management System (SeMS}? _ASsounty Managament Systm (SeMS) enables atowty operators to straamline and optimize rine securty and emergency preparedness, Rwlliprove an organization's etetency and, wh ime, you wilao often see cost eduction. Overal ve benefits youcan expect ater implementing aSe€S ar Emancadriskawraness and response 2 Develop secur euture and human capability + nprovetecmologies resources andinnovation «Improve oversight and quaty assurance Irerease cooperation and support What are the key elements of a Security Management System (SeMS}? ‘he performance ofan organization's SeMS i evaluated against ve core components for nective secuity culture. You can find them below with few subtons. Tova the flit along ith the measures that shouldbe taken teach stop ofan inpbmenttion snd conformance phase lass view Chapter 6 of WI Senurity Maragenent Sysom Manual Senior management and corporate commitment ‘Governance strategy and structure > Lenders commitment an planning » ecourtabity and responses Resource management Coordinatontaw enforcement agencies 2 SeeuityYaning and awareness campaigns Management of crange “Trea eansament and rak management Ineiene reporting Ireidene management Meragement of emergencies andincdents Role of security in emergency response procedures Commancaton gucelnes (Quaty assurance ana quay conta anagement of service providers Performance mortring procesuresandrepertng Continous improvernent ‘oucan nar te sasentas of ATAS SeMS tative arahow it can mske your organization IDSA compen by aking an ATA Ting Se course Te course rovdeea structured approachte sect processimplerentation n aocordance with MTA personal Safety Aust (OSA| requirements, Tanks tothe daly ‘lase-oom excises, yulbe able to begin bulking a performance-basad SeMS thet prodices measurable and autable ress How to implement Security Management System (SeMS)? Nemater the sz typeorcomploity the top executives an senor management playa majr role in determining a company's commitment security When an ‘organization cocias hat t ilimplement a SeNS nits operation tis essomtl at plan be erawn up. Animsomanttin' complexand iwoWos sveral lentes within ad autside the erganzation In general ter are thee stages fovls] of SeMS develoomen: ‘The fest oval ans to stsots wn organiationsrescness to implement SeMS by dentitying ts csrentcapabitie. This assessment wl sun substan ‘rang and communication improvement. rvew an reissuanceoferganizatioal pelle an alocaton of necessary resources The second eves the setualimplementation of th SeMS. Thi wil cover elment auch a the comment ftom seni leadeshi, creased communication of te new approach develapmant end adjustment of standard operating procedure, madison f cooperation standards and development of performance nleators amongst other elrets The tir lve canbe ached once the xpanzatons SNS becomes mature, Ah stage orgenizatons focus an development ta ana and quality ‘A model SeMS implementation plan included ln Section 6.2 of AIA Sesuty Management System Manual Threat and security risk management Securty management sal about preventing wedens and Keeping people and property sat. To do hs we need toundarstand he stsocatd sks and what ‘Therefor, ark sessment helps organizations todently ra and vest, als alps to understand which are tema xgticant andy being able to How to evaluate security residualrisk? ekintally stems rom tho resulofathrest rele perceve. ands ypcally a combination of two factors: Intent the ces someone may have to mount an attack ‘The threat when combined win a wuherablty that foriatance a weakness that an altackr maybe abe to exploit such a= 2 poor sacurty perimeter, cules woh reasanaole consequences that may esl shoul successfuatackoceur equals to isk, From ts caultion cnetsrequredtofatorin the degree of existing mitigation curendyin place in terms Poly: The degree to which secutty acts and requirements are documented Practce: The degre to which security actos an functions are operational delivered in ine with the documented requremants or standards Having accounted or esting metgntion the lament of sk hat romain after migainfectore are akon ino secount a kaown residuals. Thus, he 57 ‘Security Residual Risk Formula ety oe reat canis at HQ SS See mm tation ont en atin) ees Mens ana ley aan) —_ = Source: IATA Tools suoh asthe AT'S vent assessment orm and other guideline matte can be foundin Chapter 5 of A's Sscurty Wanagament System Manual For Instance, the able below provides an example of vex evluatin soclg chart ‘Suggested Threat Scoring Chart Overall Threat Levels and Likelihood ‘Source: IATA Monitor and document to evaluate security residual risk Montoring nd periodic oven shouldbe a planned part of herak management process withthe an af monitoring the kane he progess of igang setions. nadonto regu review» changeinthe envronment or organization might warantan adhe redew of te rks. ‘Theratore, whatever actin taken to contol eke wl equ tobe monitored 2 tat we can make cue thet ts working an affective. racking events can also help your securty performance monitoring proces asta aboutearing rom you past experiences By prouiding high-qualy, nly ans dete reports sd sssnssmants, eeack can then be easy shred to al relevant personal to signal mprows secur across you rgpization and industry Risk Management Framework secover = ioowners itRepor ‘eal RISK MANAGEMENT FRAMEWORK see Contain ee RESPOND Somes ‘Source: IATA Recent evans have caused e paradign ettomardsntegrated ak management thal consider eset, secur an ually menogement ina cohasve manne. qual need to haw processes and procedures nthe scope of emergency response plaming Seems nspensable ‘The tet ein of te tegrated ie ad Resience Management Manusl (REM merges the previous Emergency Response Handbook ERP rd the negro Rak Management Guide Maral RGM, rouding comprehensive guidance to sry ent who pling to fulyntograte the sk management components nd improwe thei emergency eapabites Risk Management ‘he [ATA Inteatecfskandfsllance Manapsmantmarual provide a step-bpstep guide onhow to manage exposure toriskina smart and comorehensive rmannat ana’ secticaly designer the avaton dusty However, oven nor-avaton enties may conser the model and aocesses presented Begin wba quck assessment of you eurert situation the handbook wl shew you howto deslon a practical plan tated to henaeds of you organization Curt of hi methodology have pracoced extromelyposive feodback rom rine and aviation companies araund the globe you woud Ikea orehands- ‘on approach, you can take the Ent isk Managnman: or Avation cours offered by ATA Tang. Over days. youlle about the ITA RM methodcogy and obtain the tots to implementa sk management process wehin your organization from corporat rks to operational lated ks Emergency response planning (ERP) Passengers each yearly onthe ane indus to getto the destination stey Ther ste passages dueto the tress efforts of nausty stakerolrs. Working together, the industry has made aviation the safest frm of travel Home clear hatraks cannot be ttl avoided o eins. and tha this impressive safety record til abject to unikey events When an acre is verted Garptedo let. there i strong need for mechaniems to death the Securty Management System (SelS however tia crea lementin a orgariaton' structure and procedures. ‘nis guidance materi provides organizations wih a west of cial norman onthe core response to an nid I's designed to gveyouthe naceasry What is the IATA Security Management System (SeMS) Manual? The Secu Management Syatem SeMS| Manuals a-encompassing guidance airing to help all ents focus on essential aspects of securty managemnt The aviation inusty das nt stand sil and nether snoulé you, tive fran eicintsacurty management system ang ensure the atest bestpractcas are Implemented in your ergantzation. ‘The Manual coversa range of topes Including securtyraortng, change mangement accourabiltis and responsoltis assignment ick assessment an ual surance, Youica lax mare nee, uw

You might also like