{"id":72994,"date":"2024-10-17T16:27:39","date_gmt":"2024-10-17T16:27:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/awwa-g430-2009\/"},"modified":"2024-10-24T19:08:43","modified_gmt":"2024-10-24T19:08:43","slug":"awwa-g430-2009","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/awwa\/awwa-g430-2009\/","title":{"rendered":"AWWA G430 2009"},"content":{"rendered":"
This standard covers the minimum requirements for a protective security program for a water or wastewater utility.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | AWWA G430-09 <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Committee Personnel <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword I. Introduction. <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | II. Special Issues. III. Use of This Standard. <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | IV. Major Revisions. V. Comments. <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | AWWA Standard SECTION 1: GENERAL Sec. 1.1 Scope Sec. 1.2 Purpose Sec. 1.3 Application SECTION 2: REFERENCES <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | SECTION 3: DEFINITIONS <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | SECTION 4: REQUIREMENTS Sec. 4.1 Explicit Commitment to Security <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Sec. 4.2 Security Culture Sec. 4.3 Defined Security Roles and Employee Expectations <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Sec. 4.4 Up-to-Date Assessment of Risk (Vulnerability) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Sec. 4.5 Resources Dedicated to Security and Security Implementation Priorities Sec. 4.6 Access Control and Intrusion Detection <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Sec. 4.7 Contamination Detection, Monitoring, and Surveillance <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Sec. 4.8 Information Protection and Continuity <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Sec. 4.9 Design and Construction Sec. 4.10 Threat Level\u2013Based Protocols <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Sec. 4.11 Emergency Response and Recovery Plans and Business Continuity Plans <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Sec. 4.12 Internal and External Communications <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Sec. 4.13 Partnerships SECTION 5: VERIFICATION Sec. 5.1 Documentation Required <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Sec. 5.2 Human Resources Sec. 5.3 Equipment SECTION 6: DELIVERY <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | APPENDIX A \nResources Sec. A.1 National Drinking Water Advisory Council (NDWAC) Recommendations Sec. A.2 Response Protocol Toolbox (RPTB): Planning for and Responding to \nDrinking Water Contamination Threats and Incidents Sec. A.3 RPTB Response Guidelines <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Sec. A.4 Voluntary Water Infrastructure Security Enhancements (WISE) Initiative <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Sec. A.5 RAM-W\u2122 Sec. A.6 VSAT <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Sec. A.7 Roadmap to Secure Control Systems in the Water Sector \n(Cyber Roadmap) \n Sec. A.8 Water Security Initiative <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" AWWA G430-09: Security Practices For Operation And Management<\/b><\/p>\n |