Cybersecurity and Infrastructure Security Agency Dams Sector Products

The following products were developed through collaboration with members of the Dams Sector Government Coordinating Council and the Sector Coordinating Council, which include representatives from the public and private sector. For more information about the Dams Sector please send an email to [email protected].

 

On this Page:

Dam Sector Overview and Fact Sheets

Technical Manuals, Flyers, and Tools


 

Dam Sector Overview and Fact Sheets

 

Dams Sector Profile_0.png

Dams Sector Profile
 

Dam Sector Overview.png

Dams Sector Overview
 

Dams Sector Specific Agency Fact Sheet - Screenshot.png

Dams Sector Specific Agency Fact Sheet
 

HSIN-CI Dams Portal Fact Sheet - Screenshot.png

HSIN-CI Dams Portal Fact Sheet

 

19_0502_cisa_dhs-cuas-legal-authorities-factsheet_Page_1.png

Dams Sector Counter Unmanned Aircraft Systems Legal Authorities

 

Dams Sector Web-Based Training Courses - Screenshot.png

Dams Sector Web-Based Training Courses
 

Dams Sector C2M2 FAQ - Screenshot.png

Dams Sector C2M2 FAQ
 

Dams Sector Security Awareness and Protective Measures Fact Sheet - Screenshot.png

Dams Sector Security Awareness and Protective Measures
 

called Dams Sector Cybersecurity Documents FactSheet_0.png

Dams Sector Cybersecurity Documents Fact Sheet


 

 

Technical Manuals, Flyers, and Tools

DHS Dam Sector Landscape
This handbook provides an overview of the five major focus areas for Dams Sector security and reslience risk management planning consideration. The areas are natural hazards, technological hazards, cybersecurity, criminal activities and terrorism, and crosscutting issues.
 

8. Dams Sector-Specific Plan_Page_01.jpg

DHS Dams Sector-Specific Plan
This handbook provides an overview to existing and emerging issues affecting the dams sector and provides information regarding partnerships with DHS/CISA for improving security and resilience.
 

DHS CrisisManagement_Handbook_0.jpg

DHS Crisis Management Handbook: A Guide for Owners and Operators
This handbook provides an introduction to crisis management measures for dam owners. It explains how such measures are an important component of an overall risk management program. In addition, it describes major components of crisis management and provides a template and guidelines that might be useful in developing these components for other dams.
 

Dams Sector Active and Passive Vehicle Barriers Guide.jpg

Dams Sector Active and Passive Vehicle Barriers
The Dams Sector Active and Passive Vehicle Barriers Guide is intended to assist dam owners and operators with understanding various types of active and passive vehicle barriers and how to incorporate those barriers into facility security plans. The guide also provides a cursory level of technical information regarding barriers and includes references to assist owners and operators in properly designing protective schemes and selecting vehicle barriers and their appurtenant safety and security systems.

This guide is an update to the version originally published in 2010. The need for the guide was identified by the Dams Sector Security Education Workgroup, which is composed of members from the Dams Sector Coordinating Council (SCC) and the Dams Sector Government Coordinating Council (GCC). The SCC and the GCC constitute an effective partnership mechanism for public-private collaboration with the Cybersecurity and Infrastructure Security Agency (CISA) as the SectorSpecific Agency for the Dams Sector.

 

DHS PersonnelScreening_Guide_0.jpg

Dams Sector Personnel Screening Guide for Owners and Operators
The purpose of this guide is to assist non-Federal owners and operators of dams, locks, and levees in developing and implementing personnel screening protocols appropriate for their facilities. An effective screening protocol for potential employees and contractor support can contribute to enhanced facility security by ensuring that untrustworthy individuals do not gain employment or access to sensitive facilities or information.
 

DamsSectorRoadmapToSecureControlSystems.jpg

Dams Sector Roadmap to Secure Control Systems
The Dams Sector Roadmap to Secure Control Systems describes a plan for voluntarily improving cybersecurity in the Dams Sector.
 

DHS SecurityAwareness_LeveeGuide.jpg

Physical Security Measures for Levees Fact Sheet
 

DHS EmergencyPreparednessGuidelinesForLevees.jpg

Emergency Preparedness Guidelines for Levees: A Guide for Owners and Operators
 

Dam Sectors Waterside Barriers Guide.png

Dams Sector Waterside Barriers Guide
This guide provides sector stakeholders with information pertaining to waterside barriers and their use, maintenance, and effectiveness.
 

Dam Sector - Estimating Economic Consequences for Dam Failure Scenarios.png

Estimating Economic Consequences for Dam Failure Scenarios
This report provides information on methodologies for estimating direct and indirect economic consequences resulting from dam failure or disruption. The objective is to assist in the development of consequence assessments that are consistent and can be systematically compared across multiple owners and different jurisdictions.
 

Dam Sector -  estimating LossofLife_0.png

Estimating Loss-of-Life for Dam Failure Scenarios
This report provides information on methodologies for estimating loss-of-life resulting from dam failure or disruption.


Dam Sector -  estimating LossofLife_0.png
Surveilland and Suspicious Activity Indicators Guide for Dams and Levees
This guidebook provides information on recognizing and reporting suspicious activity at or around dams and levees. It provides a list of individuals and agencies who should be notified of suspicious events or attacks, as well as recommended protocols for various types of events.

 

Dams Sector Suspicious Activity Reporting Fact Sheet.jpg

Dams Sector Suspicious Activity Reporting Fact Sheet
 

Dams_Sector_SAR_Flyer.jpg

Suspicious Activity Report Flyer
 

Dams Sector Cybersecurity Program Guidance - Screenshot.png

Dams Sector Cybersecurity Program Guidance

The Dams Sector Cybersecurity Program Guidance outlines various strategies and methods to develop or improve a basic cybersecurity program, enabling owners and operators to select cybersecurity activities and measures appropriate to their cyber assets and risk profiles. Its purpose is to promote the protection of Industrial Control Systems (ICS) and thereby improve public safety and public confidence.
 

Dam Sector C2m2 Screenshot.png

Dams Sector Cybersecurity Capability Maturity Model: (C2M2)

The Dams Sector C2M2 provides a mechanism that will help organizations evaluate, prioritize, and improve cybersecurity capabilities.  The model will be a common set of industry-vetted cybersecurity practices, grouped into domains and arranged according to maturity level.  For implementation guidance and templates please email [email protected] 
 

Dams Sector Cybersecurity Capability Maturity Model  C2M2  Implementation Guide_0.png

Dam Sector Cybersecurity Capability Maturity Model (C2M2) Implementation Guide

The Dams Cybersecurity Capability Maturity Model (Dams-C2M2) was developed by owners and operators and government stakeholders in the Dams Sector Cybersecurity Working Group at the direction of the Dams Sector Joint Council. The model aims to advance the practice of cybersecurity risk management by providing all Dams Sector organizations, regardless of size or type, with a flexible tool to help them evaluate, prioritize, and improve their own cybersecurity capabilities. This Dams Sector C2M2 Implementation Guide provides options for implementing the Dams-C2M2 in a systematic manner. Once implemented, the Dams-C2M2 can be used by an organization to evaluate its cybersecurity capabilities consistently, to communicate its capability levels in meaningful terms, and to inform the prioritization of its cybersecurity investments.
 

Dam Sector Security Guidelines - Screenshot.png

Dams Sector Security Guidelines

The Dams Sector Security Guidelines consolidates effective industry security practices into a framework to help owners and operators select and implement security activities and measures that reduce risk; improve the protection of personnel, public health, and public safety; and reinforce public confidence.

 

DamSectorCyberSecurityFramework.png

Cybersecurity Framework Implementation Guidance

The Framework offers a flexible way to address cybersecurity. It is applicable to organizations relying on technology, including information technology (IT), industrial control systems (ICS), cyber-physical systems (CPS), or connected devices including the Internet of Things (IoT). It complements, but does not replace, an organization’s risk management process, cybersecurity program, or related framework implementation; every organization must decide how to individually implement the Framework. 

Special thanks to our sustaining members