Risk Causes Controls Control Criticality Control Effectiveness
Inappropriate/unauthorised release of emergency warning to the public Lack of/ineffective training/familiarity with the system Training course provided to all employees on system 5 Assumed partially Effective
Competency testing of employees including scenario testing 5 Assumed partially Effective
Detailed change management plan, including familiarisation requirements, for any upgrades to the system 5 Assumed partially Effective
Self-explanatory/simple categorisation of drills 5 Assumed partially Effective
Inappropriate/confusing categorisation of actions within the system Categorisation chart maintained at each work station 3 Unsure of whether this is the case or not. If not, it may be a potential new control
Simplified Graphic User Interface 3 Assumed non-existent (opportunity for new control)
Explanatory notes available within the system when hovering over the link 3 Unsure of whether this is the case or not. If not, it may be a potential new control
Lack of/ineffective regular testing of the system Test program for internal systems testing 5 Assumed partially Effective
Test program for external/public systems 5 Assumed partially Effective
Test procedures and checklists for each type of test 5 Assumed partially Effective
Lack of/ineffective verification system prior to release of warning System design includes verification of selection from drop-down menu 5 Assumed mostly Effective
For initiation of public "non-drill" warning, additional verification required 5 Assumed non-existent (opportunity for new control)
Supervisor to release "non-drill" warning with verification code 5 Assumed non-existent (opportunity for new control)
Software failure Software maintenance program 5 Assumed Effective
Software testing 5 Assumed Effective
External cyber attack Firewalls 5 Assumed Effective
IT Security Policy 5 Assumed Effective
Penetration testing program 5 Assumed Effective
Disabling of external storage device capability 5 Assumed Effective
Regular training/updates/bulletins in relation to cyber-security threats 3 Assumed Effective
Lack of/ineffective warning protocols built into the system Audible alarm connected to "non-drill" initiation of warning system 5 Assumed non-existent (opportunity for new control)
Alarm initiated on Supervisor's computer as well as employee's 5 Assumed non-existent (opportunity for new control)
Supervisor to release "non-drill" warning with verification code 5 Assumed non-existent (opportunity for new control)
Deliberate action by an employee Background checking of employee upon hiring 5 Assumed Effective
For initiation of public "non-drill" warning, additional verification required 5 Assumed non-existent (opportunity for new control)
Supervisor to release "non-drill" warning with verification code 5 Assumed non-existent (opportunity for new control)
Lack of/ineffective supervision Policy requiring Supervisor "on the floor" at all times 4 Assumed partially Effective
For initiation of public "non-drill" warning, additional verification required 5 Assumed non-existent (opportunity for new control)
Supervisor to release "non-drill" warning with verification code 5 Assumed non-existent (opportunity for new control)
Lack of attentiveness by employee Rostering policy 4 Assumed Effective as fatigue does not appear to have played a part in this incident
Fatigue Management Plan 4 Assumed Effective as fatigue does not appear to have played a part in this incident
System designed for one person to be able to release warning For initiation of public "non-drill" warning, additional verification required 5 Assumed non-existent (opportunity for new control)
Supervisor to release "non-drill" warning with verification code 5 Assumed non-existent (opportunity for new control)
Audible alarm connected to "non-drill" initiation of warning system 5 Assumed non-existent (opportunity for new control)
Alarm initiated on Supervisor's computer as well as employee's 5 Assumed non-existent (opportunity for new control)
Lack of/ineffective handover on shift change Handover procedure 4 Assumed Effective as fatigue does not appear to have played a part in this incident
Lack of verification of source of information prior to warning being issued Source verification policy 5 Assumed Effective
Source verification procedure 5 Assumed Effective
For initiation of public "non-drill" warning, additional verification required 5 Assumed non-existent (opportunity for new control)
Supervisor to release "non-drill" warning with verification code 5 Assumed non-existent (opportunity for new control)