Ism Sec en
Ism Sec en
IATA has used reasonable efforts to ensure the Content of this Publication is accurate and reliable. We, however, do not warrant,
validate, or express any opinions whatsoever as to the accuracy, genuineness, origin, tracing, suitability, availability or reliability of
the sources, completeness, or timeliness of such Content. IATA makes no representations, warranties, or other assurances,
express or implied, about the accuracy, sufficiency, relevance, and validity of the Content. IATA’s observations are made on a
best efforts and non-binding basis, and shall not be deemed to replace, interpret, or amend, in whole or in part, your own
assessment and evaluation or independent expert advice. Nothing contained in this Publication constitutes a recommendation,
endorsement, opinion, or preference by IATA.
IATA has no obligation or responsibility for updating information previously furnished or for assuring that the most up-to-date
Content is furnished. IATA reserves the right to remove, add or change any Content at any time. Links to third-party websites or
information directories are offered as a courtesy. IATA expresses no opinion on the content of the websites of third parties and
does not accept any responsibility for third-party information. Opinions expressed in advertisements appearing in this publication
are the advertiser’s opinions and do not necessarily reflect those of IATA. The mention of specific companies or products in
advertisements does not imply that they are endorsed or recommended by IATA in preference to others of a similar nature which
are not mentioned or advertised.
This Publication is not intended to serve as the sole and exclusive basis for assessment and decision making and is only one of
many means of information gathering at your disposal. You are informed to make your own determination and make your own
inquiries as you may deem necessary and suitable. You shall independently and without solely relying on the information reported
in this Publication, perform your own analysis and evaluation regarding the nature and level of information you may require, based
upon such information, analyses, and expert advice as you may deem appropriate and sufficient, and make your own
determination and decisions pertaining to the subject matter under consideration.
TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, IATA DISCLAIMS ANY REPRESENTATION OR WARRANTY
(I) AS TO THE CONDITION, QUALITY, PERFORMANCE, SECURITY, NON-INFRINGEMENT, MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE OF THIS PUBLICATION AND CONTENT; OR (II) THAT THE ACCESS TO OR USE
OF THIS PUBLICATION (INCLUDING ANY AUTOMATED FEEDS OR OTHER DELIVERY MODES) OR ANY CONTENT
SUPPLIED OR CONTRIBUTED TO THIS PUBLICATION BY THIRD PARTIES, WILL BE UNINTERRUPTED, ACCURATE, THE
MOST UP TO DATE, COMPLETE OR ERROR-FREE. IATA EXCLUDES ALL LIABILITY (TO THE EXTENT PERMITTED BY
APPLICABLE LAW) FOR ANY COSTS, LOSSES, CLAIMS, DAMAGES, EXPENSES OR PROCEEDINGS OF WHATEVER
NATURE INCURRED OR SUFFERED BY YOU OR ANY OTHER PARTY ARISING DIRECTLY OR INDIRECTLY IN
CONNECTION WITH THE USE OF THIS PUBLICATION OR ANY CONTENT CONTAINED OR ACCESSED THEREFROM, OR
DUE TO ANY UNAVAILABILITY OF THIS PUBLICATION IN WHOLE OR IN PART.
2. COPYRIGHT OWNERSHIP AND USE. This Publication is the property of IATA and is protected under copyright. The Content of
this Publication is either owned by or reproduced with consent or under license to IATA. This Publication and its Content are made
available to you by permission by IATA, and may not be copied, published, shared, disassembled, reassembled, used in whole or
in part, or quoted without the prior written consent of IATA. You shall not without the prior written permission of IATA: re-sell or
otherwise commercialize, make mass, automated or systematic extractions from, or otherwise transfer to any other person or
organization, any part of this Publication and its Content in whole or in part; store any part of this Publication, or any Content, in
such a manner that enables such stored Content to be retrieved, manually, mechanically, electronically or systematically by any
subscriber, user or third-party; or include it within, or merge it with, or permit such inclusion in or merge with, another archival or
searchable system.
Do not begin with a conditional phrase are applicable to all operators unless determined otherwise by the
Auditor.
Begin with a conditional phrase (“If the Operator...”) are applicable if the operator meets the condition(s)
stated in the phrase.
Where operational security functions are outsourced to contracted external service providers, an operator retains
responsibility for the conduct of such functions and will have processes to monitor applicable external service
providers in accordance with SEC 1.11.2 to ensure requirements that affect the security of operations are being
fulfilled, among the other provisions of SEC 1.11
Note that security provisions applicable to operators, and their contracted external service providers, are not
limited to this Section 8 and the lists of interlinked ISARPs cross-referenced in different ISM sections are available in
the Tables and Mandatory Observations of the IOSA Audit Handbook (IAH).
General Guidance
Definitions of technical terms used in this ISM Section 8, as well as the meaning of abbreviations and acronyms,
are found in the IATA Reference Manual for Audit Programs (IRM).
Provided all the above elements are implemented, individual operators may group or break down the elements and
sub-elements in a manner that best suits their own structure.
An operator's SeMS is structured to ensure the most efficient and effective application of the AOSP.
The SeMS is typically documented in the form of an appropriate controlled medium, and includes detailed
descriptions of the structure, individual responsibilities, available resources and processes in place to effectively
manage security operations and ensure an operator is in compliance with the requirements of the National Civil
Aviation Security Program (NCASP) of the State(s).
An operator typically documents security procedures in a manual or, as applicable, more than one manual (e.g.
where operational security responsibilities are delegated to various departments or by geographic locations, each
with distinct security requirements). All documents comprising an operator's operational security manual (or
equivalent document) are considered controlled documents.
Where permissible, the AOSP, rather than being documented separately in a security manual or equivalent,
may be incorporated into the same other controlled medium and thus be documented as an integral part of the
SeMS.
An operator may differentiate between policy and procedure manuals. A policy manual typically states goals and
objectives while a procedural manual outlines detailed action-oriented steps that, when complied with, will meet
the policy.
Additional guidance may be found in the IATA Security Management System Manual
(http://www.iata.org/publications/store/Pages/security-management-system-manual.aspx).
SEC 1.1.2
The Operator shall have a senior management official designated as the head of security with direct access to the
highest level of management within the organization. Such senior management official, regardless of other
functions and reporting structure, shall:
SEC 1.1.3
The Operator shall have a corporate security policy that states the commitment of the organization to a culture that
has security as a fundamental operational priority. Such policy shall be communicated throughout the organization
and commit the organization to:
i. The provision of resources necessary for the successful implementation of the policy;
ii. Compliance with applicable regulations and standards of the Operator;
iii. The promotion of security awareness and the establishment of a security culture;
iv. The establishment of security objectives and security performance standards;
v. Continual improvement of the SeMS;
vi. Periodic review of the policy to ensure continuing relevance to the organization. (GM)
The adoption of industry best practices for security management where warranted;
Continual management review and improvement of the SeMS and security culture and encouraging
adoption by the Operator’s service providers;
The development of objectives for the measurement of security performance;
Imperatives for including operational security in the description of duties and responsibilities of senior and
frontline management;
The promotion of a reporting system that encourages the reporting of inadvertent human error and/or
intentional acts of non-compliance;
Communication processes that ensure a free flow of information throughout the organization.
In addition to a formal security policy document, an operator would typically have documented dissemination
channels that can contribute to awareness of the policy and its content among all employees and establish security
as a priority for everyone.
States and the Industry have developed different promotional tools for security incident awareness and reporting.
The use of IATA’s “See it Report it” training and certification tool is one method for an operator to demonstrate
conformity with this provision. (https://www.iata.org/whatwedo/security/Pages/security-management-system-
sems.aspx)
The organizational security policy typically expresses the operator’s focus on achieving an effective security
culture that protects the safety and security interests of its employees, customers, shareholders, assets and brand.
Such policy also ensures that obligations contained in domestic and international aviation security laws and
regulations are met.
The security policy usually specifies minimum security requirements and identifies applicable reference documents
(e.g. the AOSP). It also defines the roles and responsibilities of management and non-management employees,
and those with specific security accountabilities.
The security policy typically addresses the yearly establishment of KPIs for the head of security and for the
entire organization. Review of the KPIs provides the basis for the following year’s program objectives including the
allocation of resources to achieve such objectives. This review typically includes the impact of the security culture,
identification of non-compliances including associated corrective actions, reported incidents along and root cause
analysis. Trends identified are then used to define new security objectives.
Finally, the security policy will normally state the operator’s commitment to proactively managing risk, complying
with legislation and regulations, aligning security activity with assessed risk and implementing a ‘just culture’ to
encourage security-related reporting.
i. The requirements of the civil aviation security program of the State of the Operator (hereinafter, the
State);
ii. Supplementary Station Procedures (SSP) that meet the requirements of other states where operations
are conducted;
iii. The security standards of the Operator. (GM)
Protect customers, personnel, assets and customer goods from any act of unlawful interference;
Comply with regulatory requirements.
The name of an operator’s security program may vary based on the regulatory jurisdiction. Examples of typical
alternative names to AOSP include ACSP (Air Carrier Security Program) and ASP (Airline Security Program).
ICAO uses Aircraft Operator Security Programme (AOSP) in Annex 17.
With regard to Supplementary Station Procedures (SSPs), as this is a new concept recently introduced in ICAO
Annex 17 (Amendment 18, 2022) some states may still require air operators to develop “country-specific AOSPs”
(or local AOSPs) in order to operate into a third country. In such a scenario, the operator will typically have an
AOSP approved, reviewed, or verified by its State of Operator (or registry) and a number of “local AOSPs” that
should now be called SSPs approved, reviewed or verified by third country regulators (from the states of the
operations).
The Security Program may be structured in accordance with the template provided by the State.
The State may issue a standard security program with which all operators must comply (operators may apply for
exemptions or amendments, as applicable). In such cases, the standard security program of the State is typically
recognized as the AOSP of the operator. The AOSP typically also includes or refers to other company manuals
and procedures that provide operator-specific details.
A standard security program may be acceptable in meeting security requirements of other states, or the
operator may be required to submit supplementary station procedures (SSPs) tailored to meet requirements of
other states. An operator must satisfy the security requirements of all applicable states for the purpose of meeting
the intent of this provision. Typically, a state of operations will consider an AOSP letter of acknowledgment
(approval, review, verification) by the Operator’s State of Operator (or registry) along with the required
supplementary station procedures (SSPs) as an acceptable security program to operate within its borders.
The AOSP may be approved or accepted (i.e. no notice of deficiency or equivalent is issued) by the relevant
State of the Operator, when SSPs are approved, reviewed or verified by the relevant states of the operations.
The AOSP and SSPs may include security sensitive information (SSI) as required by the relevant States. In
such case, the AOSP and SSPs would normally include a description of dissemination of security sensitive
information in a way that ensures the required level of data protection.
Refer to Guidance associated with SEC 1.4.1 for additional information and in the ICAO Aviation Security
Manual (Doc 8973) Chapter 15 (public abstract on: https://www.icao.int/Security/SFP/Pages/AOSP-and-
SSP.aspx).
i. The levels of management with the authority to make decisions that affect operational security;
ii. Responsibilities for ensuring operational security functions are performed and procedures are
implemented in accordance with applicable regulations and standards of the Operator;
iii. Lines of accountability throughout the SeMS, including direct accountability for security on the part of
senior management;
iv. Responsibilities of members of management, irrespective of other functions, as well as of non-
management personnel, with respect to security performance of the SeMS. (GM)
SEC 1.3.2
The Operator shall have a process or procedure for delegation of duties and assignment of responsibilities within
the SeMS that ensures managerial continuity is maintained when managers with operational security
responsibilities are unable to carry out work duties. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed processes for delegation of duties when managers with operational security
responsibilities are absent (focus: processes maintain managerial continuity during periods when managers are
absent).
Interviewed designated security management representative(s).
Examined selected example(s) of delegation of duties due to absence.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Such plan addresses responsibilities associated with management positions (not individuals) under the AOSP and
ensures proper management of operational security functions is always in place.
For the purpose of this provision, the use of telecommuting technology and/or being on call and continually
contactable are acceptable means for operational managers to remain available and capable of carrying out
assigned work duties.
To achieve conformity with this provision, an operator would be expected to demonstrate how a delegate is
chosen, how and when (i.e. under what circumstances) a delegation is activated and how this is communicated to
those with a need to know. Such process can be activated manually when required or automatically under specific
conditions.
Procedures are also typically established to delegate the authority to address and take act in response to new and
emerging risks, threats as well as incidents taking place at any moment during the operation. Delegation of such
responsibilities will typically be given to a group of employees either designated to be on call or to be part of the
operator’s 24/7 operations center.
Refer to Guidance associated with ORG 1.3.2 located in ISM Section 1.
SEC 1.3.3
The Operator shall ensure a delegation of duties and assignment of responsibility for liaison with applicable
aviation security authorities and other relevant external entities. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified position(s) with authority for liaison with regulators and other external entities.
Interviewed designated management representative(s).
Interviewed manager(s) with authority for liaison with regulators and other external entities.
Examined job description for selected management positions (focus: authority/responsibility for liaison with
external entities).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Although motives might be different, all stakeholders share a similar interest in ensuring the security of the aviation
industry. However, the potential problem of gaps or overlap in responsibilities and/or coverage may exist when
more than one entity is handling security. It is crucial for state, airport and airline security officials to establish clear
jurisdictional boundaries to ensure all entities understand where their respective jurisdictions begin and end.
Whereas gaps in security create obvious problems and expose the entire aviation infrastructure to threats, the
presence of unnecessary overlap by different security groups can also lead to problems. Without proper
coordination, the presence of multiple entities providing security services could lead to inaccurate assumptions that
might, in fact, result in unintended gaps in the security web due to a reduction of services. Also, multiple groups
doing the same job could lead to conflicts of authority, which would detract from the required focus on aviation
security.
It is important that there is effective communication between airport security and airline security management. An
Airline Operators Committee typically offers a viable platform for airlines and an airport authority to express their
respective views on security and identify areas of deficiency. Such committee might also serve as a useful forum
for coordination between airlines and airports to develop and implement a seamless security system with no gaps
and appropriate overlap.
With regards to state involvement, the creation of an Airport Security Committee (ASC) might be suggested since
the group would focus solely on security and address only security issues.
It is recommended that operators participate in both the Airline Operators Committee and the ASC, either directly
or via representation by other carriers or stakeholders.
1.4 Communication
SEC 1.4.1
The Operator shall have a system that enables effective communication of security information throughout the
management system and all areas where operations are conducted. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed system(s) for communicating information relevant to security operations (focus: capability
for communicating information relevant to operations within the security organization).
Interviewed designated management representative(s).
Examined examples of information communication in security operations.
Interviewed selected non-management operational personnel in security operations.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
The intent of security communication is to foster a positive security culture in which all employees receive ongoing
information on security issues, security metrics, specific security risks existing in the workplace, and initiatives to
address known security issues. Such communication typically conveys security-critical information, explains why
particular actions are taken to improve security, and why security procedures are introduced or changed.
Security information that is sensitive is typically drafted and circulated in a manner that is in accordance with
applicable security information protocols. Communication of such information is normally limited only to those with
an operational need to know.
Any system would have to be able to address the varying degree of urgency with which security information needs
to be circulated.
Security Intranet Site
A corporate security department website is one method of disseminating security information to operational
personnel. Different levels of access might be required in order to control the access to restricted information to
those with a “need to know.” Corporate security awareness information and security incident reporting forms or
templates are typically made available on this website. However, where various management systems (e.g. QMS,
SMS, SeMS) are aligned or integrated, there may be one common form or template accessed from a central
location that is used for reporting incidents.
Corporate Manual System
An operator's manuals and regulations are the formal system of coordinating and communicating the policies,
procedures and significant guidance necessary to ensure the operator's mission is carried out in a consistent and
integrated manner.
Security Bulletins
Security bulletins, which are typically issued by the corporate security department or by operational departments
within the operator, might specify action and/or contain general information. Issuance of bulletins electronically
(e.g. email) is an efficient means of ensuring all personnel with a “need to know” are made aware of new or
amended security information in a timely manner.
Refer to Guidance associated with ORG 4.2.1 located in ISM Section 1.
SEC 1.5.3
If permitted by the State, the Operator shall ensure a process has been established that requires operational
security personnel in the organization of the Operator and, if applicable, service providers selected by the Operator
to conduct operational security functions, to be subjected to pre-employment and recurring background checks in
accordance with requirements of applicable aviation security authorities. The requirement for a background check
shall be applicable to personnel who:
National legislation on civil liberties and protection of personal information will greatly influence the limits placed on
an employer when performing pre-employment background checks. An employer is not permitted to deviate from
the laws of the country where the hiring process is taking place.
Escorted access may be provided to an individual that has yet to complete all aspects of the background checking
process.
An individual currently permitted unescorted access to a security restricted area, but who subsequently fails to
satisfy the criteria to continue to hold an airport identification card or for unescorted access to a security restricted
area, will typically have access to security restricted areas, as well as access to sensitive aviation security
information, revoked immediately.
The operator’s role in the background check process will be determined by the State. In some cases, the entire
process will be managed and/or conducted by the State.
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed system(s) for management/control of content/format of operational documentation/data
used in AOSP and its associated SSPs.
Interviewed responsible management representative(s).
Examined selected parts of the security manual (focus: legibility/accuracy/format; approval as applicable).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definitions of Documentation, Electronic Documentation and Paper Documentation. Refer
to ORG 2.5.1 and associated Guidance, and Table 1.1, located in ISM Section 1.
States may impose new protection measures on sensitive aviation security information.
The operator will typically have a central source of information for security procedures that is automatically
updated in case of approved changes. Old versions would be archived for historical purposes.
The current version or authorized version of AOSP and its associated SSPs documentation would typically be in
an electronic form and found in a specific/dedicated library. Printed versions are usually deemed to be uncontrolled
copies. Employees would have to know how to gain copies from the single information source and that a new copy
must be produced to ensure use of a current document version.
SEC 1.6.4
If the Operator has external service providers conduct outsourced operational security functions, the Operator shall
have a process to ensure such external service providers receive information regarding security directives and
instructions in a timely and secure manner that meets requirements of the AOSP and its associated SSPs. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed process(es) to circulate relevant security information to external service providers.
Interviewed responsible manager(s).
Examined selected examples of information provided to external service providers.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definitions of Outsourcing and Operational Security Function.
The operator would have a central source of information for security procedures that is automatically updated in
case of approved changes. Obsolete versions would only be accessible for archiving/historical purposes. The main
source of information would be electronic and found in a specific/dedicated library. Printouts of the procedures
would be considered as backup solutions. Personnel of a service provider with a need to know would have to know
how to obtain or access copies from the single information source and that a new copy must be produced to
ensure use of a current document version.
Refer to SEC 1.11.3
i. Identification;
ii. Legibility;
iii. Maintenance;
iv. Retrieval;
v. Protection, integrity and security;
vi. Disposal, deletion (electronic records) and archiving, including retention and storage as mandated by the
State. (GM) ◄
When not in the physical possession of an authorized person, paper or physical records are stored in a
secure container such as a locked file cabinet or drawer. Electronic records are stored in a file folder that
has restricted access and/or encryption;
A review is conducted periodically (typically once per year) to identify records that are no longer valid and
to ensure such records are destroyed in a manner that precludes recognition or reconstruction of the
information.
States may impose additional protection measures on sensitive aviation security information that could be
contained in security records.
The operator will typically have a central source of information for security procedures that is automatically
updated in case of approved changes. Obsolete versions of electronic records would be accessible for
archiving/historical purposes.
The current or authorized version of records would typically be filed electronically in a specific dedicated library.
Printed versions of records are usually deemed to be uncontrolled copies.
Access to security records will typically be limited to individuals with a need to know. These individuals would have
been provided guidance on how to properly access security records ensuring that the most recent and up to date
version is accessed.
Refer to Guidance associated with ORG 2.6.1 located in ISM Section 1.
SEC 1.8.2
If the Operator uses an electronic system for the management and control of records, the Operator shall ensure
the system provides for a scheduled generation of backup record files. (GM) ◄
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed management and control system for operational records in security operations (focus:
system defines schedule for periodic file backup).
Interviewed responsible management representative(s).
Examined selected record(s) of backup files for electronic records.
Other Action (Specify)
Guidance
Refer to Guidance associated with ORG 2.6.2 located in ISM Section 1.
operations, address security concerns, provide feedback and instructions to the operating units, and set priorities
for sub-teams. It may be useful to have more frequent meetings in the first year of establishment to create an
awareness of the committee throughout the organization.
SEC 1.9.2
The Operator shall have processes to monitor and assess its SeMS processes in order to maintain or continually
improve the overall effectiveness of the SeMS. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Observation)
Implemented not Documented (Observation)
Not Documented not Implemented (Observation)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed SeMS review process (focus: processes for monitoring and assessing SeMS to
maintain/improve security performance).
Interviewed AE and/or designated management representative(s).
Examined selected examples of output from SeMS review process (focus: changes implemented to
maintain/improve organizational security performance).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definition of Safety Management System (SMS) and Security Management System
(SeMS).
Monitoring and assessing the effectiveness of SeMS processes would typically be the function of a strategic
committee of senior management officials that are familiar with the workings and objectives of the SeMS.
Depending on the operator’s organizational structure, the effectiveness of SeMS may be monitored and assessed
by the same executive group that is responsible for the SMS or the security review committee.
Refer to guidance associated with ORG 4.1.1 located in ISM Section 1. Such guidance addresses continual
improvement of an SMS but could be adapted and applied for continual improvement of SeMS. Additional
guidance is also available in section 2.4 of the IATA SeMS Manual.
Quality Assurance
SEC 1.10.1
The Operator shall have a quality assurance program that provides for the auditing and evaluation of the
management system and operational security functions at a determined frequency following a regularly performed
risk assessment to ensure the organization is:
i. Complying with the AOSP and its associated SSPs and other applicable regulations and standards;
ii. Satisfying stated operational needs;
iii. Identifying areas requiring improvement;
iv. Identifying threats to operations;
v. Assessing the effectiveness of security risk management and controls. (GM)
To ensure operator personnel, handling agents and contractors are properly implementing the AOSP and
its associated SSPs;
To ensure the AOSP and its associated SSPs are achieving the set objectives.
Personnel involved in the performance of audits are normally trained and have the necessary qualifications
required by the State.
Audits may be complemented by quality control mechanisms, to include:
SEC 1.10.2
The Operator shall have a process for addressing findings resulting from audits of operational security functions
that ensures:
Auditors conducting quality assurance activities apply the internal audit procedure. This manual, IOSA ISARPS,
and the internal assessment tool form the basis for quality assurance activity.
Information and data taken from audit reports or an equivalent business tool are used to record all quality
assurance activity. Individual business units are responsible for identifying and assigning corrective actions to the
appropriate personnel for implementation, completion and follow-up monitoring for effectiveness.
Corrective actions are managed in accordance with internal quality assurance processes and procedures.
For each audit finding a root cause is identified and corrective action developed as appropriate to address the root
cause. Corrective action is then implemented in the appropriate operational security areas and evaluated to
determine effectiveness in addressing the root cause.
To ensure findings are corrected in a timely manner, it is important for the operator to have a process that clearly
identifies the owner of the deficient process and delegates responsibility to that owner to develop and implement
the appropriate corrective action(s).
It is also important to establish a clear timeline to implement the appropriate corrective action(s) as well as have a
process to escalate to senior management when deadlines are missed.
Refer to Guidance associated with ORG 2.1.7 located in ISM Section 1.
SEC 1.10.3A
The Operator shall have a process to ensure significant issues arising from quality assurance audits of operational
security functions are subject to a regular review by senior security management. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
SEC 1.10.3B
The Operator shall have an audit planning process and sufficient resources, including auditors as specified in ORG
2.1.8, to ensure audits are:
i. Scheduled in accordance with a security risk assessment at intervals to meet regulatory and
management system requirements;
ii. Conducted within the scheduled interval (subject to a change in risk). (GM)
A desktop risk assessment using risk-based evaluation tools aligned with internal standards is usually undertaken
to determine the associated frequency for audits. An annual audit plan based on the assessment results is then
produced.
These audit plans are then provided to the management for consolidation of all audit requirements into a financial
year audit plan. Audit plans identify frequency, auditee, audit function and location. Management will identify and
confirm sufficient resources to acquit the plan and submit the consolidated audit plan back to the business units for
approval.
To achieve conformity with this provision, tracking/monitoring progress against the audit plan will be demonstrated
by the operator.
Refer to Guidance associated with ORG 2.1.5 located in ISM Section 1.
Quality Control
SEC 1.10.5
If required and/or authorized by the aviation security authority, the Operator shall have a process for conducting
security tests that assess the effectiveness and proper implementation of security controls of which the Operator is
in direct control. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed process for conducting security tests required and/or authorized by the aviation security
authority.
Interviewed responsible manager(s).
Examined selected security test result reports, other evidence of evaluation of effectiveness.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
A security test is a simulated act of unlawful interference against existing security measures, carried out covertly
by persons using an approved test object concealed in their baggage or on their person. Similar tests are also
sometimes performed on cargo shipments and in aircraft. Tests may be used for ensuring alertness of security
personnel, which might be considered with caution because the results of testing could degrade the motivation of
such personnel.
An effective testing program ensures the administration of tests:
Are only conducted where permitted by the laws of the state(s) where such tests are conducted;
Do not jeopardize the safety of persons;
Do not jeopardize the safety of aircraft or airport facilities;
Do not damage property;
Do not alarm or inconvenience the public and persons or organizations not being tested;
If required, includes notification of applicable police authorities and other security agencies.
SEC 1.10.6
If required and/or authorized by the aviation security authority, the Operator shall have a process to perform or
participate in periodic operational security exercises in order to:
i. Security-relevant selection criteria are established, such as, for example, SeMS key elements;
ii. Service providers are evaluated against these criteria prior to selection. (GM) ◄
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed selection process for external service providers.
Interviewed responsible manager(s).
Examined selected records/documents that demonstrate application of the selection process.
Coordinated to verify implementation of selection process in all operational areas.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
The intent of this provision is for an operator to define relevant safety and security criteria for use in the evaluation
and potential selection of aviation security service providers. This is the first step in the management of external
service providers and would take place prior to the operator signing an agreement with a provider. The process
need be applied only once leading up to the selection of an individual service provider.
Refer to the guidance associated with ORG 1.6.1 and SEC 1.11.3.
Additional Guidance can be found in Airport Handling Manual (AHM) 621 and 803, IATA SeMS Manual and
ISAGO Standards Manual (GOSM).
SEC 1.11.1B
If the Operator has external service providers conduct outsourced operational security functions, the Operator shall
have a process to ensure a contract or agreement is executed with such external service providers. Such contract
or agreement shall identify the application of specific documented requirements that can be monitored by the
Operator to ensure requirements that affect the security of its operations are being fulfilled by the service provider.
(GM) ◄
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed process to execute contracts or agreements with external security service providers.
Interviewed responsible manager(s).
Examined selected contracts/agreements used for external security service providers.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
The contract or agreement typically includes the measures required and associated performance measures
(perhaps in a supplemental service level agreement) to be met by the service provider.
To satisfy the monitoring specification of this provision, service providers (or contractors) that provide security
services required under the AOSP and its associated SSPs would typically receive planned inspections and/or
audits by the operator.
Normally, an operator obtains a written undertaking that ensures service providers are familiar and comply with
standards of the operator and local regulatory requirements.
An important aspect to be monitored by the operator would be the security training provided to personnel of the
service provider(s).
The use of the Standard Ground Handling Agreement (SGHA) and Service Level Agreement (SLA) contained
in the IATA Airport Handling Manual (AHM) 810/811 and 803 typically signifies that the provider is in conformity
with this provision.
The use of a registered ISAGO provider typically signifies that the provider is in conformity with basic industry
security requirements.
Refer to Guidance associated with ORG 1.6.2 located in ISM Section 1.
SEC 1.11.2
If the Operator has external service providers conducting outsourced operational security functions, the Operator
shall have processes to monitor such external service providers to ensure requirements that affect the security of
operations are being fulfilled. (GM) ◄
Note:
IOSA or ISAGO registration as the only means to monitor is acceptable provided the Operator obtains the latest of
the applicable audit report(s) through official program channels and considers the content of such report(s).
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed processes used for monitoring external service providers (focus: monitoring process
ensures provider fulfils applicable safety/security requirements).
Interviewed responsible manager(s).
Examined selected records/reports of monitoring of external service providers.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
The contract and/or agreement may contain those aspects of the Security Program and/or regulatory requirements
to be undertaken by the external service provider. In most cases only one or two aspects of the AOSP may be
involved, which would negate the requirement to provide or monitor compliance with the entire AOSP.
Examples of activities that might be used to verify such compliance include:
Periodic quality assurance audits of providers conducted by the operator using either corporate or local
resources;
Reports submitted to the operator by the provider detailing self-audit schedules and results;
Quality control functions (e.g. security surveys/tests) conducted jointly by the operator and provider.
The use of a registered ISAGO provider typically signifies that the provider is in conformity with basic industry
security requirements and meets SEC 1.11.3 criteria.
Refer to Guidance associated with ORG 2.2.1 located in ISM Section 1.
SEC 1.11.3
If the Operator has external service providers conducting outsourced security operational functions, the Operator
should ensure the security service providers have a security management system (SeMS) that includes, at a
minimum, the following key elements:
use currently available threat assessment and risk management tools for their own operations,
share, on a timely basis, all security incidents and security occurrences following internationally
recognized security incidents and occurrences reporting taxonomies with the Operators they represent,
adapt their own Security procedures according to the adjustments required by the Operator following the
analysis of the above-mentioned internal security reporting or internal risk assessments.
Refer to the guidance associated with SEC 1.1.1, SEC 1.11.1A, SEC 1.11.1B, SEC 1.11.2, SEC 1.2.1, Sections
GRH 3.7, Section CGO 3.7, ORG 1.6, and ORG 2.2.
Refer to additional guidance with the ICAO Aviation Security Manual (Doc 8973 - Section 9.3 on SeMS) for any
additional requirements that may be imposed by local authorities.
Refer to Annex 6 Standard 15.1 and the need for “specific safety risk assessments of the supply chain for items to
be transported” that could be performed jointly with the security risk assessments for the cargo supply chain as
mandated in the Chapter 4.6 of the Annex 17.
Refer to publicly available ICAO guidance material on AOSP and SSP
(https://www.icao.int/Security/SFP/Pages/AOSP-and-SSP.aspx) and on Security Incident Reporting Guidance and
Taxonomy (https://www.icao.int/Security/SFP/Pages/Incident-Reporting-Guidance-and-Taxonomy.aspx)
Refer to IATA public SeMS webpage for additional information on SeMS-related products
(https://www.iata.org/en/programs/security/security-management-system-sems/)
SEC 1.11.4
If the Operator has operational security functions conducted by external organizations not under the control of the
Operator, the Operator shall have methods, as permitted by the applicable civil aviation security authority, for the
monitoring of such functions to ensure, as permitted, implementation of outsourced security measures is in
compliance with its AOSP. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Observation)
Implemented not Documented (Observation)
Not Documented not Implemented (Observation)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified operational security functions conducted by external organizations not under the control of the
operator.
Identified/Assessed methods used by the operator for monitoring functions to ensure that security controls are
implemented.
Interviewed responsible manager(s).
Examined selected records of monitoring the external organizations that conduct security functions.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Security procedures may be performed by law enforcement agencies, civil aviation authorities, airport authorities
or other organizations not under the control of or under contract to the operator. When the operator has no direct
authority over the organization performing the security measures, oversight and verification functions could be
performed via inspections and reporting in case of incidents or deviation from the standard operating procedures.
If permitted by law or the applicable civil aviation security authority, the operator might assess the quality of such
security procedures through the use of tests, surveys and/or exercises.
This standard is applicable to all security procedures required under the security program of the State, state of
operation or the operator.
i. Encourages and facilitates personnel to report security incidents and security occurrences pertaining to
the Operator;
ii. Ensures mandatory reporting in accordance with applicable regulations;
iii. Includes analysis and management action as necessary to address security issues identified through the
reporting system. (GM)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed system for operational personnel to report security incidents and security occurrences
(focus: system urges/facilitates reporting of security/safety concerns; includes analysis/action to validate/address
reported security/safety concerns).
Interviewed responsible manager(s).
Examined selected reports submitted by operational personnel.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definitions of Just Culture, Security Incident, Security Occurrence, Security Vulnerability
and Security Threat.
Frontline personnel, such as flight or cabin crew members, maintenance technicians and ground handling
personnel, are in the best position to note abnormalities that could indicate real or potential security threats, or any
other security concerns, so they may be brought to the attention of the head of security and other relevant
managers.
Applicable aviation security authorities would be notified in accordance with SEC 4.3.2 when a legitimate security
incident or security occurrence has been identified through the operational security reporting system.
The effectiveness of a reporting system is determined by a basic requirement for safeguarding information.
Typically, individuals will continue to provide information only when there is confidence that such information will
be used only for the purpose of improving operational security and will never be compromised or used against
them.
A system that encourages and promotes reporting from personnel might include:
An operational reporting system is implemented as permitted by law or as restricted by other specified obligations
placed on an operator.
A security reporting system, regardless if developed separately or in conjunction with other operational reporting
system(s), is normally designed in a way that enables analysis and the undertaking of necessary actions.
Typically, an operator’s reporting system includes its own staff and, as applicable, that of service providers as
reporting is a service provider’s obligation under the IATA Standard Ground Handling Agreement provisions.
Qualitative and quantitative analysis of security data would be facilitated if the operator uses a harmonized
taxonomy for the classification of reports. In this regard, an operator might refer to the IATA Safety Incidents
Taxonomy (ISIT), which includes security taxonomy. Expanding harmonized taxonomy to service providers would
benefit security threat, vulnerability and event analysis by allowing for more consistency, benchmarking and
security performance measurement.
IATA has established a database system called the Incident Data Exchange (IDX). IDX permits operators to
report security incidents and security occurrences for uploading into the IDX safety management database for
subsequent analysis by users. The IDX submission process requires submission of security incident and security
occurrence reports using a common taxonomy (ISIT) that is aligned with the IDX security taxonomy. See SEC
4.3.3, which addresses the reporting of security incidents and security occurrences to IATA for inclusion in the IDX.
Refer to ORG 3.1.2 and ORG 3.1.3 located in ISM Section 1 for information that addresses an operational safety
reporting systems.
SEC 1.12.2
The Operator shall have a process to ensure security information, security incidents, security occurrences and acts
of unlawful interference that have been reported by personnel in accordance with SEC 1.12.1 or are derived from
states or other relevant sources are reviewed by operational and security management to ensure:
applicable requirements of other states. Such program shall consist of initial, recurrent and, where applicable,
requalification training that comprises, as appropriate, theoretical training, practical training and an assessment of
competencies to ensure:
i. Personnel, employed by or under the control of the Operator who implement security controls understand
security awareness and reporting, and have the competence to perform their duties;
ii. Flight and cabin crew members, as well as frontline aircraft ground handling and cargo handling
personnel, are able to act in the most appropriate manner to minimize the consequences of acts of
unlawful interference and disruptive passenger behavior. (GM)
Note:
If permitted by the State, the program shall ensure applicable personnel have completed appropriate security
background checks in accordance with SEC 1.5.3 prior to attending any training that contains sensitive or
restricted security information.
Note:
Applicable personnel shall complete initial security training prior to being assigned to operational duties.
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed security training program (focus: approval/acceptance by State; meets applicable
requirements of other states; background checks required prior to personnel attending training).
Interviewed responsible manager(s).
Examined selected security training program curricula (focus: contain theoretical and practical training
elements).
Examined selected ground/cargo handling personnel training records (focus: completion of initial/recurrent
security training).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Training may be sub-divided for line managers/supervisors, aircrew, ramp workers, cargo personnel and other
personnel who are directly involved in the implementation of security measures and thereby require an awareness
of obligations to the AOSP. Where applicable, SeMS elements contained in SEC 1.1.1 can be included in the
training and assessment of competencies.
The security training program is typically integrated into the normal training curriculum for operational personnel
and need not be stand-alone training.
The proportion of theoretical and practical training is typically based on requirements of the State. For certain
functions or duties there may not be a practical component.
The scope of recurrent security training, as well as the specific subject matter included, may vary in accordance
with requirements of the applicable authorities and the security policy of the operator.
The assessment of competencies to ensure the objectives of the training have been met is typically done via
testing, on the job assessment or a combination of both. The passing mark and required elements in the
assessment of competencies are usually determined by the State.
An existing background check from a previous employer may be acceptable if still time valid.
Different training tools for security awareness and security incident reporting have been developed by states and
the Industry. The use of IATA’s “See it Report it” training and certification tool is one method for the operator to
demonstrate conformity with the relevant specification in this provision.
(https://www.iata.org/whatwedo/security/Pages/security-management-system-sems.aspx)
SEC 2.1.2
If the Operator has operational security functions conducted by external service providers selected by the Operator
(outsourcing), the Operator shall have a process to ensure such external service providers have a security training
program that:
SEC 2.1.4
The Operator shall ensure personnel who perform operational security functions, crew members and appropriate
operational personnel, as specified in SEC 2.1.1, complete recurrent security training on a frequency in
accordance with requirements of the security program of the State and, if applicable, other states where operations
are conducted or, if there is no regulatory mandate, not less than once every 36 months. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
SEC 2.1.5
If the Operator manages a security screening system, the Operator shall ensure personnel who manage or
operate the screening system:
i. Are approved and/or certified in accordance with requirements of the applicable aviation security
authority;
ii. Complete initial and recurrent training that includes training in the identification of explosives, weapons or
other dangerous items or devices. (GM)
Screeners undertaking cargo screening duties are typically not looking for weapons. Such personnel are normally
trained to detect and identify improvised explosive devices, including individual components, and unauthorized
dangerous goods.
SEC 2.1.6
The security training program of the Operator shall include a process for reviewing and updating or revising
security training courses to ensure:
i. Continual improvement of curriculum, including content and applicability to the operational environment;
ii. Incorporation of regulatory amendments or operational changes. (GM)
SEC 2.1.7
The Operator shall ensure the completion of required security training by operational personnel is documented and
retained in a records system in accordance with SEC 1.8.1.
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed security training record keeping process(es) (focus: security training for all operational
personnel documented/recorded).
Interviewed responsible management manager(s).
Examined selected security training records (focus: retention in accordance with SEC 1.8.1).
Other Actions (Specify)
Click or tap here to enter text.
SEC 2.1.8
The Operator shall ensure all personnel complete security awareness training that focuses on raising awareness
of security threats and preventative measures and techniques, and permits such personnel to contribute to the
prevention and reporting of security occurrences and security incidents. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed requirement to complete security awareness training for operational personnel.
Examined security awareness training program contents and selected training records.
Interviewed responsible manager(s).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Typically, security awareness training program contents may include:
Security awareness training revolves around ensuring all personnel have an awareness of, and positive attitude
about security.
The Operator will not always be able to ensure this requirement is fulfilled by staff working for Authorities. In
some countries, it will not be possible (for legal, confidentiality and other reasons) to get information regarding
training of National and Local Agencies (Customs, Police, etc.), not to get these individuals through the Operator’s
security awareness training program(s).
The focus of training to achieve such awareness will vary by region or company and may be influenced by
cultural, religious and other factors.
Some operators, depending on the individual organizational structure, may find it more appropriate to have
multiple security awareness training courses developed specifically for each operating area (for example for
specific functional areas such as engineering, aircrew, technical, corporate).
Security awareness training may be integrated into other job-related training courses (as opposed to a standalone
course).
Typically, operational personnel that complete security awareness training are crew members, frontline ground
handling personnel and all personnel that implement security controls irrespective of whether such personnel are
directly employed by the operator or employed by external service providers.
Different training tools for security awareness and security incident reporting have been developed by states
and the Industry. The use of IATA’s “See it Report it” training and certification tool is one method for the operator to
demonstrate conformity with the reporting specification in this provision.
(https://www.iata.org/whatwedo/security/Pages/security-management-system-sems.aspx).
(https://www.icao.int/Security/SFP/Pages/Incident-Reporting-Guidance-and-Taxonomy.aspx).
Responsible managers should be able to demonstrate the importance of adopting a positive security culture
and the link with security awareness and discharging security responsibilities.
Responsible managers should be aware of security culture programs and their implementation.
Security culture is also strongly promoted by ICAO. One of the deliverables of the Year of Security Culture
(2020-2021) initiative is the Security Culture platform where materials are freely available.
(https://www.icao.int/Security/Security-Culture/Pages/default.aspx)
Typically, security awareness training programs will include an assessment of competencies. The assessment
of competencies to ensure that the objectives of the training have been met is typically done via testing, The
passing mark and required elements in the assessment of competencies are usually determined by the State or
defined by the Operator.
3 Security Operations
SEC 3.1.2
The Operator shall ensure measures are in place to control and supervise personnel and vehicles moving to and
from the aircraft in security restricted areas to prevent unauthorized access to the aircraft. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed measure(s) to control and supervise the movement of personnel and vehicle to and from
the aircraft in the security restricted area(s)
Interviewed responsible manager(s).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Procedures are in place to ensure airline personnel intercept any person identified as having no need to be on
board or near the aircraft.
In some environments, it would be prudent not to leave an in-service aircraft unattended. Precautions may be
taken to prevent unauthorized access to aircraft that are not in service and are parked and unattended. For
example, all external doors may be locked, all stairs and loading bridges are removed (or locked) and any steps
left near the aircraft are immobilized.
Passengers boarding or disembarking from flights using the apron are to be supervised when passing from the
terminal building to the aircraft. Such measures are applied whether the passengers are walking or are being
transported in vehicles.
Particular care is taken to ensure only crew members, authorized representatives and officials, and bona fide
passengers are permitted access to the aircraft.
SEC 3.1.3
The Operator shall ensure access control measures are in place to prevent the introduction of unauthorized
weapons, explosives or other dangerous devices or items on board an aircraft by persons other than passengers.
(GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed process(es) to prevent the introduction of unauthorized weapons, explosives or other
dangerous devices on board an aircraft.
Examined records of the capture and prevention of unauthorized weapons, explosives or other dangerous
devices on board an aircraft.
Interviewed responsible manager(s).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definition of Supernumerary.
Typically, access control and security screening measures will apply to personnel of the operator and service
providers, including supernumeraries that are authorized to travel on an aircraft to perform specific duties.
Measures that apply to access control and screening of personnel are documented in the AOSP and/or other
operational manual(s) such as Supplementary Station Procedures (SSPs). The baseline for such measures
typically would be that a person:
Holds a valid authorization to enter a security-restricted area (based on, as a minimum, a background
check, operational needs and completion of security awareness training);
Is subjected to screening (combination of equipment and procedures aimed at identifying and/or detecting
all potentially dangerous items, substances, and devices that could be used to commit an attack).
As a reference, ICAO Annex 17 requires states to establish measures to ensure applicable personnel are
screened prior to entry airport security restricted area, including use of appropriate screening methods capable of
detecting explosives either continuously or in an unpredictable manner.
An effective method to deter or detect illegal access to aircraft is the implementation of frequent but irregularly
timed patrols by security personnel. This is particularly important when operations are at their lowest levels and
aprons and hangar areas are least frequented. Such patrols are normally conducted by airport personnel.
Additional measures to prevent unauthorized access to passenger aircraft may include:
Each Contracting State ensures that the carriage of weapons on board aircraft by law enforcement officers and
other authorized persons acting in the performance of their duties requires special authorization in accordance with
the laws of the States involved.
SEC 3.3.3
If the carriage of weapons in hold baggage on board an aircraft for a passenger flight is approved by the Operator,
the Operator shall have procedures for the carriage of such weapons to ensure:
i. If the weapon is a firearm or capable of discharging a projectile, the passenger or an authorized and duly
qualified person has declared the weapon to be not loaded;
ii. The weapon is stowed in a place that is inaccessible to any unauthorized person during flight;
iii. The carriage of a weapon is legally permitted by all state(s) involved, including the State and state(s) of
flight departure, transit and arrival. (GM)
Prior to acceptance, the passenger or other authorized and duly qualified person determines that the
weapon is not loaded. A declaration may be used to confirm the status of the weapon;
The weapon is transported in a sturdy container to prevent any possible damage during the flight;
Ammunition is securely boxed and carried separately from the weapon, and is handled in accordance
with applicable dangerous goods regulations;
Weapons and ammunition are stowed in an area that inhibits access by any unauthorized person while
the aircraft is in flight; such weapons are not to be carried on the flight deck or retained by any crew
member;
If available, a lockable tamper-proof container located in the aircraft hold is used for this purpose;
Transit and transfer stations are advised and ensure the integrity of such items;
At the final destination, when required by the State of Flight Arrival, security procedures are implemented
to return the weapons and/or ammunition to the passenger;
Where the weapon is stowed in a baggage compartment (or hold) that is accessible to persons during
flight:
o The compartment door(s) remain closed and are monitored during the flight;
o The weapon is packed separately from any ammunition;
o The weapon is stowed in the compartment in a manner that access is obstructed (or impeded)
by other baggage.
i. An international flight;
ii. As required by the applicable aviation security authority, a domestic flight. (GM)
Note:
Supernumeraries that require a flight reservation or passenger name record for transport on the aircraft shall be
subjected to the requirements of this provision unless exempted by the State.
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed process(es) to ensure all passengers (including supernumeraries, if applicable) and their
cabin baggage are screened prior to boarding a passenger aircraft for international flights.
Identified/Assessed process(es) for the screening of originating passengers (including supernumeraries, if
applicable) and their cabin baggage for domestic flights (if required by the applicable aviation security authority).
Interviewed responsible manager(s).
Observed passenger/baggage handling operations (focus: originating passengers/cabin baggage are subjected
to screening prior to aircraft boarding).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definition of Domestic Flight.
The effective screening of all passengers and their cabin baggage is recognized as an essential element in
achieving a safe and secure operation, and forms part of the passenger handling procedures contained in the
AOSP and its associated SSPs.
Technical equipment used for the screening of persons and baggage has certain limitations. Archway metal
detectors and hand-held metal detectors, for example, cannot detect non-metallic weapons and explosives. Even
conventional X-ray equipment does not always image or define explosive material effectively. To compensate for
such limitations, or to introduce a random element into the selection process, it may be advisable to conduct an
additional search of passengers and cabin baggage after they have been screened. The additional screening can
be performed by hand or by technical means, such as explosive trace detection (ETD), full-body X-ray, explosive
particle or vapor detection portals and/or other approved advanced technological methods.
It is recommended that screening equipment used to assist screening personnel is capable of detecting
explosive materials and/or explosive devices that might be carried by passengers either on their person or in cabin
baggage.
If the use of explosive detection screening equipment is not continuous, then it is recommended that such
equipment be used on a random basis to ensure non-predictability by passengers and others.
Specific guidelines and procedures are developed and training is given to personnel for addressing persons with
special needs.
SEC 3.4.3
If the Operator conducts passenger flights, the Operator shall have a process to ensure transfer and transit
passengers and their cabin baggage either:
SEC 3.4.4
If the Operator conducts passenger flights, the Operator shall have a process to ensure passengers and their
cabin baggage are subjected to additional security controls in accordance with requirements of the applicable
aviation security authority when flights are under an increased security threat. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed process(es) for ensuring additional security controls for flights under increased security
threat.
Observed additional passenger and cabin baggage security measures implemented based on the various
levels of increased security threats.
Interviewed responsible manager(s).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
In the case of a general (i.e. non-specific) intermediate threat level, in addition to the baseline passenger and
carry-on screening procedures, the following additional measures may be implemented:
Continuous random searching of passengers by hand (or by approved technological methods) either at
the departure gate (where airport facilities permit) or other suitable location(s).
Continuous random searching of cabin baggage by hand (or by approved technological means) either at
the departure gate (where airport facilities permit) or other suitable location(s).
In the case of a general (i.e. non-specific) high threat level, additional measures such as the following may be
introduced:
All departing passengers are searched again by hand or screened with metal detection equipment at the
departure gate before being permitted to board the aircraft;
All cabin baggage is subjected to an additional search by hand or by X-ray equipment, either at the
departure gate (where airport facilities permit) or other suitable location(s), before being permitted to be
carried on board the aircraft.
If a threat is specific to a certain object (e.g. liquid explosives), then more specific countermeasures than above
would need to be implemented.
To facilitate additional screening, earlier close-out of passenger check-in operations is a consideration.
SEC 3.4.5
If the Operator conducts passenger flights, the Operator shall have a process to ensure passengers and their
cabin baggage, which have already been subjected to screening, are:
i. Protected from unauthorized interference from the point of screening until they board a passenger
aircraft;
ii. Subjected to re-screening if the potential for unauthorized interference has been determined to exist.
(GM)
If physical means to avoid contact between departing and arriving passengers is not possible, passenger mix may
be prevented by restricting access to the departure lounge until all arriving passengers have cleared the area. This
solution may not be possible in large airport terminals with many gates close to each other.
The major concern regarding the sterility of arriving passengers will most likely be associated with flights that have
originated in states where screening requirements are considered to be inadequate by the State of Flight Arrival. In
order to limit the disruption of passenger flow within a terminal, consideration might be given to assigning the
disembarkation of all such flights to a common sector or area of the airport or terminal that can be cordoned off
and/or monitored by security personnel. Where passengers are arriving from a state where screening is
considered by the State of Flight Arrival to be equal or better, arriving and departing passengers can mix.
In order to limit the disruption of passenger flow within a terminal, consideration might be given to assigning the
disembarkation of all such flights to a common sector or area of the airport or terminal that can be cordoned off
and/or monitored by security personnel.
SEC 3.4.6
The Operator should ensure security practices and/or procedures for operational security personnel that have
contact with passengers include behavior detection methods designed to identify persons who may pose a threat
to civil aviation and require additional security measures. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Observation)
Implemented not Documented (Observation)
Not Documented not Implemented (Observation)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed practices/procedures for behavior detection (focus: recognition of characteristics that
indicate anomalous behavior, criteria for resolution and application of additional security measures).
Interviewed responsible manager(s).
Observed implementation of appropriate behavior detection practices/procedures.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definition of Behavior Detection.
An operator will typically only include behavior detection methods when it has the responsibility for implementing
certain security screening and risk assessment measures to identify passengers that might pose a security threat.
The use of behavior detection methods will typically only be used for regular public transport and open charter
passenger flights. Behavior detection is not normally used for government and/or closed charter passenger flights.
In accordance with SEC1.11.4 when behavior detection functions are a government responsibility, an operator will
typically have methods, as permitted by the applicable civil aviation security authority, for the monitoring of such
functions to ensure, as permitted, implementation is in compliance with its AOSP.
In the framework of a risk-based approach to aviation security, behavioral detection is used to identify persons who
may pose a threat to civil aviation and should be subjected to additional security measures. This technique
involves the recognition of behavioral characteristics, including but not limited to, physiological or gestural signs
indicative of anomalous behavior.
Behavioral detection programs are based on the premise that people attempting to evade security measures
typically display signs of anomalous behavior, as compared to the behaviors of the legitimate travelling population.
Such programs pinpoint individuals on the sole basis of their behavior and never according to their nationality,
ethnicity, race, gender or religion.
A review of existing behavioral detection programs shows that choosing persons for additional security controls on
the basis of anomalous behavior can be more effective than selecting persons randomly.
Behavior detection programs in various jurisdictions might vary in terms of methodology and processes. However,
typically, such programs employ a four-stage process as follows:
An environmental baseline is established at a given time and location, within which the anomalous
behavior of persons would be identified.
Persons are observed at pre-determined locations to identify those exhibiting anomalous behaviors which
are above the environmental baseline established.
Anomalous behaviors are resolved through targeted conversation with persons and/or through additional
screening.
If anomalous behaviors cannot be resolved, persons are referred to enhanced security measure or
appropriate authorities.
SEC 3.4.7
The Operator shall have a policy and procedures to refuse transportation to any person that does not consent to a
search of his or her person or property in accordance with the AOSP. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed the policy and procedures used to deny boarding of a passenger or supernumerary that
refuses to consent to security searching or other security control.
Examined selected documents used when right to deny boarding is communicated to passengers.
Interviewed responsible manager(s).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Persons who refuse to undergo screening before boarding or entering an aircraft are denied boarding and not
allowed to pass the point of search. Additionally, such persons, or others who might be denied passage for other
security reasons, are referred to policing authority officials, if required by law.
Name and gender of the person identified as the deportee; reason for deportation (nature of crime);
Willingness or unwillingness to travel by air;
Whether the person has attempted to escape custody;
Whether the person has any history of violence;
Whether the person has a history of self-harm;
Whether members of the person's family are booked on the same flight;
Whether the person is likely to be the target of harm during the transportation;
Identity of escorts (if required);
The mental and/or physical state of the person;
Wanted status of the person (by any other authority);
Other information that would allow an operator to assess the risk of endangering the security of the flight;
Special conditions and precautions for transport of the person, if any.
To ensure the safety of the aircraft during a flight, an operator typically has a process to assess the information
(see above) associated with the transport of passengers that require special attention. For example, a decision
might be needed as to whether a passenger will be denied boarding, or whether a passenger might require an
escort.
Accordingly, there is usually a well-defined escort policy that is provided to the appropriate immigration authorities.
Females travelling under the provisions of a judicial order may require a female escorting officer as a member of
the escort team.
Special provisions may exist for flights where transportation of multiple inadmissible passengers is required.
Although a person is involved in travel in response to a judicial or custodial order, while in flight, such passenger is
always under the control of the PIC and crew of the aircraft.
i. Subjected to screening capable of detecting explosives and explosive devices prior to being loaded into
an aircraft for an international passenger flight;
ii. Protected from unauthorized interference from the moment of acceptance until loaded on board the
aircraft. (GM)
Where the State delegates screening to the operator, or where the foreign host government does not perform
screening to the standard required, the operator is responsible for ensuring all checked baggage is screened to the
appropriate level and meets the requirements of the Operator.
In the event of an increased threat, the operator, based on risk assessment, may direct supplementary screening
procedures as appropriate to counter the threat.
Courier service is an operation whereby shipments tendered by one or more shippers are transported as the
baggage of a courier passenger on board a scheduled airline flight under normal passenger hold baggage
documentation.
This provision also refers to a person who is employed by a courier service operator and travels as a passenger or
crew member, and who checks a courier shipment in as hold baggage. Such baggage is then screened under the
same requirements that apply to all hold baggage.
Refer to GRH 3.7.
SEC 3.6.2
If the Operator conducts domestic passenger flights, the Operator should have a process to ensure originating
hold baggage is:
i. Subjected to screening capable of detecting explosives and explosive devices prior to being loaded into
an aircraft for a domestic passenger flight;
ii. Protected from unauthorized interference from the moment of acceptance until they are loaded on board
the aircraft.
SEC 3.6.6
If the Operator conducts international passenger flights, the Operator shall have a process to ensure procedures
are in place to prevent items of hold baggage from being transported on such flights unless such items have been:
to re-board a flight at a transit stop. In an effort to reduce the risk, the aviation industry initially introduced a system
where passengers identified their bags before loading. That system can still be invoked at remote locations if no
other procedure exists.
The intent of this provision is for an operator to have a process to verify and confirm, before a flight departs,
that only baggage that has been properly identified, as accompanied or unaccompanied, screened to the
appropriate standard and accepted for carriage on that flight by the operator has been uplifted.
Refer to the definition of Baggage Reconciliation in the IATA Reference Manual (IRM)
Identified/Assessed process(es) to ensure all in-flight, catering and other supplies are protected from
unauthorized access once security controls have been implemented.
Observed in-flight, catering and other security controls.
Interviewed responsible manager(s).
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Catering supplies are frequently prepared by an external service provider at an off-airport location.
Critical systems, information, assets and data (CSIAD) relative to the aircraft are identified;
Cyber threats relevant to the identified CSIAD are analyzed to determine corresponding risks to aircraft
operations;
Cyber risks are assessed to determine the requirement for risk mitigation action(s).
Risk mitigation actions are an output of the risk assessment process and are implemented in operations. In
addition, any risks and vulnerabilities discovered during the process would be reported to the applicable OEMs and
other relevant external providers.
An operator typically identifies one senior management official that is accountable for the risk management of
cybersecurity operations and has the authority to plan and allocate the resources necessary to manage
cybersecurity risks.
Risk management framework preparation step
The aircraft cyber risk assessment is typically established at the aircraft life-cycle operations level. A first
preparation step would be consistent with the latest revision of the NIST SP800-37, which ties back to ISO/IEC
27001:2013 and based on (Information Technology Infrastructure Library) ITIL or ISO/IEC 31000 principles. The
following would be defined within the operator’s risk management framework:
How to identify the risks that could cause the loss of confidentiality, integrity, and/or availability of your
information.
Note:
Risk Assessment is normally conducted on a regular basis.
Identification and categorization of CSIAD step
The identification and categorization of the aircraft CSIAD and interconnected CSIAD, and the information
processed, stored, and transmitted, would normally be based on an impact analysis. The categorization via an
impact analysis would follow the latest guidance version of FIPS 199 and NIST Special Publications SP 800-30,
800-59, 800-60.
Evaluation of threats against CSID element step
Once the above step is completed, each identified CSIAD element would go through the evaluation of threats
against it, the development of the security requirements and the selection of security controls that will protect the
element. The security requirements would normally follow the latest guidance version of the NIST Special
Publications SP-800-171.
Protection of CSIAD via Security Controls step
The selection of security controls, which support technical, operational and management security performance
requirements and are within the confidentiality, integrity and availability (CIA) context, would follow the latest
guidance version of FIPS 199 and 200 for minimum security requirements and NIST Special Publications SP 800-
30, 800-53 for security control selection guidance for non-national security system. CNSS instruction 1253 can
also help support this step for national security systems. Implementation would follow the latest guidance version
of the NIST SP 800-53, 800-53A, 800-53B.
Assessment of effectiveness of the selected Security Controls step
After implementation of the selected security controls, the operator would continue to assess cyber threats relative
to the CSIAD, determine any residual risks to aircraft operations and determine the need for additional mitigating
actions to supplement or replace existing security controls. The assessment activity would typically follow the latest
guidance version of NIST SP 800-53A, 800-53B and SP 800-70.
SEC 4.1.2
The Operator shall have a process to ensure the implementation of appropriate security measures in response to:
Guidance
The contingency plan for response to an increased threat to operations is included in the AOSP.
An assessment of increased threat could come from the authorities or from an operator's own threat assessment
process.
Procedures typically set out the increase in security measures appropriate to counter a situation of increased
threat, as well as methods used to communicate any changes in threat level to the flight crew, operational
personnel, management and overseas stations. There is also normally a verification process to ensure required
measures have been implemented without delay.
SEC 4.1.3
The Operator shall have procedures for sharing, as appropriate, with the State, relevant operators, airport
authority, air traffic service and external service providers, in a practical and timely manner, relevant information to
assist in the implementation of an effective security risk assessment process. (GM)
Note:
This provision is applicable to the Operator only if procedures for sharing the specified relevant information are
approved by the State.
Documented and Implemented (Conformity)
Documented not Implemented (Observation)
Implemented not Documented (Observation)
Not Documented not Implemented (Observation)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified/Assessed procedures for sharing relevant security information with the specified entities.
Observed implementation of appropriate security measures in response to security threats and threat levels
issued by aviation security.
Interviewed responsible manager(s).
Examined selected records of security information sharing.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
The information shared typically would include, but not be limited to, geopolitical information at the national and
airport level as well as potential flight paths, identified security deficiencies, security inspection and audit results,
and security measures implemented.
It is important that the procedures for sharing information are approved by the State and developed according to
guidelines established by the State.
SEC 4.3.2
The Operator shall have a process that ensures notification to the applicable aviation security authorities when an
act of unlawful interference against the Operator, a reportable security incident and/or a reportable security
occurrence has been identified. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Finding)
Implemented not Documented (Finding)
Not Documented not Implemented (Finding)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified process(es) used to notify applicable aviation security authorities when an act of unlawful
interference against the Operator has occurred.
Interviewed responsible manager(s).
Examined selected notifications of acts of unlawful interference.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
The intent of this provision is for an operator to have procedures in place to immediately notify local security and
civil aviation authorities and to provide information relevant to credible threats and acts of unlawful interference. An
operator would typically have contact information and checklists readily available for this purpose.
Procedures typically specify an initial verbal notification followed by a written notification.
SEC 4.3.3
The Operator should have a process to ensure security incidents and/or security occurrences are reported to IATA
for inclusion in the Incident Data Exchange (IDX) Security Dashboard. Such reports should be submitted in
accordance with the formal IDX reporting process. (GM)
Documented and Implemented (Conformity)
Documented not Implemented (Observation)
Implemented not Documented (Observation)
Not Documented not Implemented (Observation)
N/A
Auditor Comments
Click or tap here to enter text.
Auditor Actions
Identified process for submission of security information to IATA for the IDX Security Dashboard.
Interviewed responsible manager(s).
Examined selected records of information submission.
Other Actions (Specify)
Click or tap here to enter text.
Guidance
Refer to the IRM for the definition of IATA Incident Data Exchange (IDX).
IDX has replaced the IATA Safety Trend Evaluation, Analysis and Data Exchange System (STEADES). IDX
permits operators to report security incidents and security occurrences for uploading into the IDX security
management database and subsequent analysis by users.
To facilitate the reporting of security incidents and security occurrences to IDX, an operator’s reporting process
could use a taxonomy that is aligned with the IDX security taxonomy, which is called the IATA Safety Incidents
Taxonomy (ISIT). Accordingly, an operator would be encouraged to select applicable parent descriptors from the
full IDX list and use its own subcategories depending on the operator’s scope of operations or specific business
requirements. In such case, some descriptors may be applicable whereas others may not.
The specifications in SEC 1.12.1 require an operator to establish a security reporting system covering acts of
unlawful interference, security incidents and security occurrences. In the absence of a globally recognized
definition, the operator, depending on its scope of operations, is encouraged to identify descriptors that are related
to acts of unlawful interference, security incidents and security occurrences.
Reports should be submitted to IATA on a regular basis and include the date and location of security incidents and
occurrences (for flight-related reports, this would be a departure airport) as well as a title, a summary and related
security descriptors as per the IDX Data Submission Guidelines.