Critical Infrastructure Risk Management:
December 13, 2021
Securing the Oil and Gas Supply Chain
Brian E. Humphreys
Supply-chain disruptions caused by critical infrastructure failures, targeted attacks, or pandemic
Analyst in Science and
disease have sparked broad congressional interest in assuring availability of essential supplies at
Technology Policy
affordable prices. Congressional deliberations have highlighted risks that these and other hazards

may pose to critical supply functions, including supply of essential fuels and industrial feedstock.
Disruptions to the oil and gas subsector may propagate across the entire economy, beginning with

the petrochemical manufacturing and electricity generation—subsectors with key systems and
assets that are often physically linked to oil and gas processing and refining facilit ies via an extensive pipeline network—and
extend to agriculture, manufacturing, water, transportation systems, and other critical infrastructure sectors.
The Department of Energy (DOE), in partnership with the Department of Homeland Security (DHS), leads public-private
partnerships for risk management and supply assurance in the energy sector, including the oil and gas subsector. The
Department of Transportation (DOT) and the Transportation Security Agency (TSA), a DHS agency, lead analogous
programs for pipeline safety and security. Although various components of the oil and gas subsector are subject to federal
regulation in differing degrees, the federal critical infrastructure security and resilience (CISR) policy framework affords
significant autonomy to private-sector stakeholders and generally favors voluntary collaboration. Federal agencies rely upon
private-sector partners in the subsector to develop and implement voluntary consensus standards and best practices, and to
engage in voluntary public-private partnerships for CISR-related policy coordination and information sharing.
Development of these partnerships to manage relevant categories of risk across the entire oil and gas supply chain has been
uneven within the subsector. The most developed partnerships are generally found in those segments with a history of federal
regulatory oversight or interest, such as offshore production facilities, long-distance pipeline transmission networks, and oil
refineries. Similarly, this general pattern is observed in specific risk categories, such as process safety—and, to a lesser
extent, cybersecurity. Physical security and supply-chain risk, also covered in this report, are both less regulated and less
developed as consensus-driven voluntary activities within the oil and gas subsector. Federal regulatory regimes, public-
private coordination programs and activities, and voluntary consensus standards within the subsector are often developed in
conjunction with each other, via both formal and informal processes. Therefore, both compulsory and voluntary elements of
the CISR enterprise coexist in the oil and gas subsector.
In some cases, this dynamic has spurred private-sector engagement in voluntary public-private CISR initiatives. For example,
private-sector entities in the offshore exploration and drilling segment have worked with relevant federal regulatory agencies
in the wake of the 2010 Deepwater Horizon oil rig explosion and spill in the Gulf of Mexico to develop coordination and
information-sharing activities through industry and federal channels. In other cases—particularly in industry segments not
subject to federal regulatory oversight such as onshore exploration and production—there is less substantive engagement
between government and industry and shared risk information is generally less available. With few exceptions, federal
voluntary information-sharing initiatives do not appear to have consistently elicited widespread interest and engagement from
the oil and gas subsector, or the CISR enterprise as a whole.
The February 2021 cold weather event which disrupted power supplies across Texas, and the May 2021 ransomware attack
against the Colonial Pipeline Company which disrupted fuel supplies along the East Coast, galvanized concerns in Congress
regarding the CISR enterprise and its emphasis on voluntary public-private partnerships. Legislative proposals in the 117th
Congress would create new authorities and oversight functions for federal agencies, new incident reporting requirements for
industry, new federal capabilities for critical infrastructure risk modeling and data collection and analysis, and —in some
cases—provide direct grant funding to private-sector critical infrastructure owner-operators for cybersecurity investments.
Taken together, these measures presuppose a significant increase in the scope and extent of regulatory oversight within the
CISR enterprise, as well as more centralized federal role in management of critical infrastructure risks.
Regarding oil and gas sector risk management, Congress may consider several issues: the role of federal agencies in industry-
led standards development processes, and reliance on industry associations to provide standards used for regulatory purposes;
information sharing and incident-disclosure requirements, and the structure and governance of information-sharing bodies;
and optimization of regulatory, nonregulatory, or hybrid frameworks that combine voluntary guidance and public-private
coordination with risk-management mandates.
Congressional Research Service


link to page 5 link to page 5 link to page 7 link to page 7 link to page 8 link to page 9 link to page 11 link to page 12 link to page 13 link to page 14 link to page 14 link to page 15 link to page 16 link to page 16 link to page 17 link to page 17 link to page 18 link to page 20 link to page 21 link to page 22 link to page 23 link to page 23 link to page 25 link to page 25 link to page 26 link to page 27 link to page 28 link to page 28 link to page 32 link to page 32 link to page 34 link to page 39 link to page 42 link to page 43 link to page 43 link to page 44 link to page 44 link to page 45 link to page 6 link to page 9 link to page 28 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Contents
Introduction ................................................................................................................... 1
Organization, Methods, and Scope of Report ................................................................. 1
Policy Background .......................................................................................................... 3
Risk Management Overview ....................................................................................... 3
Risk Management and the Standards Development Process.............................................. 4
Federal Nonregulatory Authorities................................................................................ 5
Federal Regulatory Authorities .................................................................................... 7
Balancing Coordination and Regulatory Authorities ........................................................ 8
Oil and Gas Subsector Overview ....................................................................................... 9
Exploration and Extraction of Fuels............................................................................ 10
Fuel Refining and Processing of Fuels ........................................................................ 10
Pipeline Transport.................................................................................................... 11
Fuel Storage and Reserves ........................................................................................ 12
Risk in the Oil and Gas Subsector .................................................................................... 12
Complex Interdependencies of Oil and Gas Infrastructure and Supply-Chain Risk ............. 13
Limited Redundancy or Spare Capacity ...................................................................... 13
Ownership and Responsibility Structures in the Oil and Gas Subsector ............................ 14
Geographic Concentration of Critical Systems and Assets .............................................. 16
Integration of Information and Communications Technology.......................................... 17
Risk Management in the Oil and Gas Subsector ................................................................. 18
Federal Regulatory Regimes...................................................................................... 19
Regulation of Exploration and Production of Oil and Gas ......................................... 19
Regulation of Fuel Refining and Processing of Fuels ............................................... 21
Regulation of Fuel Storage and Reserves ............................................................... 21
Regulation of Pipeline Transport........................................................................... 22
Voluntary Consensus Standards, Public-Private Partnerships, and Information Sharing....... 23
Voluntary Consensus Standards and Recommended Practices in the Oil and Gas
Subsector ....................................................................................................... 24
Organization of Public-Private Partnerships for Coordination and Information
Sharing in the Oil and Gas Subsector .................................................................. 28
Coordination and Information-Sharing Activities..................................................... 30
Discussion and Analysis ................................................................................................. 35
117th Congress Legislation ........................................................................................ 38
116th Congress Legislation ........................................................................................ 39
Issues for Congress .................................................................................................. 39

The Voluntary Critical Infrastructure Security and Resilience Framework ................... 40
Information Sharing, Data Gaps, and Incident Reporting Requirements ...................... 40
Regulatory Authorities and Oversight of Pipeline Security ........................................ 41

Figures
Figure 1. The Oil and Gas Subsector .................................................................................. 2
Figure 2. Hierarchy of Standards ....................................................................................... 5
Figure 3. BSEE Standards Development Process................................................................ 24
Congressional Research Service


link to page 46 link to page 47 link to page 12 link to page 23 link to page 30 link to page 46 link to page 48 link to page 49 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain


Figure A-1. Hydrocarbon Liquids (Oil) Supply Chain ......................................................... 42
Figure A-2. The Natural Gas and Natural Gas Liquids Supply Chain ..................................... 43

Tables
Table 1. Selected Regulations with Risk-Management Requirements ...................................... 8
Table 2. Oil and Gas Subsector Regulation by Risk Type and Critical Function....................... 19
Table 3. API Standards Documents by Risk Type and Critical Function ................................. 26

Appendixes
Appendix A. Oil and Gas Subsector Supply-Chain Diagrams ............................................... 42
Appendix B. The National Standards System: Federal Roles, Authorities, and Policies ............ 44

Contacts
Author Information ....................................................................................................... 45

Congressional Research Service

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Introduction
Supply-chain disruptions caused by critical infrastructure failures, targeted attacks, or pandemic
disease have sparked broad congressional interest in assuring availability of essential supplies at
affordable prices. Subsequent congressional hearings and legislative proposals have highlighted
risks that these and other hazards may pose to critical supply functions, including supply of
essential fuels and industrial feedstock. These congressional activities have raised questions about
how the federal government and private-sector stakeholders manage risk in order to safeguard
critical infrastructure and prevent supply disruptions that may affect national security, economic
security, or public health and safety.
This report provides an overview of risk and risk management in the oil and gas subsector—part
of the energy critical infrastructure sector—considering interdependencies between its various
segments and a wide range of other critical supply functions.1 Effects from disruptions to the oil
and gas subsector may propagate across the entire economy, beginning with the petrochemical
manufacturing and electricity generation subsectors. These subsectors have key systems and
assets that are often physical y linked to oil and gas processing and refining facilities via an
extensive pipeline network. Disruption effects may subsequently extend to agriculture,
manufacturing, water, transportation systems, and other critical infrastructure sectors.
In addition, this report analyzes the complex interdependencies between development of
voluntary consensus standards, public-private partnerships, and regulatory regimes within the oil
and gas subsector, and how these influence government and industry risk-management activities.
This analysis may inform congressional assessments of both the overal security and resilience of
the oil and gas subsector specifical y, and critical supply functions more general y. Additional y,
the report may provide deeper understanding of the structure and function of the national critical
infrastructure security and resilience (CISR) enterprise as a whole.
Organization, Methods, and Scope of Report
The Cybersecurity and Infrastructure Security Agency (CISA), a Department of Homeland
Security (DHS) agency, has established a set of 55 national critical functions as a means to
improve risk management across multiple critical infrastructure sectors. CISA defines national
critical functions as critical infrastructure enabled functions “so vital to the United States that
their disruption, corruption, or dysfunction would have a debilitating effect on security, national
economic security, national public health or safety, or any combination thereof.”2 CISA organizes
these functions within four broad areas: connect, distribute, manage, and supply.

1 T he Department of Homeland Security recognizes 16 critical infrastructure sectors, and numerous associated
subsectors. T he Energy sector has two subsectors: oil and gas; and electricity. See Cybersecurity and Infrastructure
Security Agency (CISA), “Critical Infrastructure Sectors,” https://www.cisa.gov/critical-infrastructure-sectors.
2 In 2019, CISA promulgated the National Critical Function (NCF) set to improve methods for infrastructure risk
assessment and enable better collaboration across multiple CI sectors. See CISA, “ National Critical Functions Set,”
https://www.cisa.gov/national-critical-functions-set. The definition of national critical functions parallels the statutory
definition of critical infrastructure given in the Uniting and Strengthening America by Providing Appropriate T ools
Required to Intercept and Obstruct T errorism (USA PAT RIOT ACT ) Act of 2001 (P.L. 107-56). It defines critical
infrastructure as “ systems and assets, whether physical or virtual, so vital to the United States that the incapacity or
destruction of such systems and assets would have a debilitating impact on security, national economic security,
national public health or safety, or any combination of those matters. ”

Congressional Research Service

1

link to page 6 link to page 46
Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

This report focuses on management of risk to certain critical national functions in the “distribute,”
“manage,” and “supply” areas that form the foundations of the oil and gas subsector: exploration
and extraction of fuels; fuel refining and processing fuels; storage of fuel and maintenance of
reserves; and transport of materials by pipeline. Together, these four national critical functions
constitute a production, distribution, and supply system that provides necessary energy and
chemical inputs for other national critical functions of supply outside the oil and gas subsector.
These relationships are depicted below in Figure 1.3
Figure 1. The Oil and Gas Subsector
Providing Basic Inputs for National Critical Supply Functions

Source: CRS, adapted from CISA National Critical Functions Set.
Notes: See Appendix A for detailed graphic of connections between oil and gas supply chains and other
industries and critical infrastructure.
The report begins with a policy background section that provides an overview of risk
management, federal coordination and regulatory authorities for CISR-related programs and
activities relevant to the oil and gas subsector, and the standards development process. This is
followed by an overview of subsector risks incorporating both industry and government
perspectives. Next, the report describes risk-management programs and activities in the subsector
as these relate to regulatory and nonregulatory aspects of the national CISR risk-management
enterprise. These programs and activities address four risk categories of particular concern in the
oil and gas industry: process safety; physical security; cybersecurity; and third-party or supply-
chain risk.
In this context, process safety relates to the design and safe operation of heavy industrial
machinery. Physical security relates to protection of physical infrastructure systems and assets
against deliberate attack, theft of materials, sabotage, or malicious use. Cybersecurity relates to
protection from malicious exploitation of information and communications technology (ICT)
used in information management, automated sensing, and industrial control systems. Supply
chain risk management (SCRM) relates to an emerging area of risk management concerned with

3 T he Research and Development (R&D) supply function is omitted from the graphic.
Congressional Research Service

2

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

external or third-party risks affecting the production and supply process as a whole, from the
extraction of raw materials to manufacturing and distribution of finished products to end users.
In general, the nature, scope, and extent of coordinated risk-management programs and
activities—both regulatory and nonregulatory—vary across the several segments of the oil and
gas industry, from upstream production sites, to midstream storage and processing facilities, and
final y to downstream refineries and marketing. The analysis in this report provides insight about
this variation across oil and gas industry segments, focusing on the question of mutual influence
between regulatory and nonregulatory programs and activities.
The report concludes with a discussion of potential issues for Congress.
Certain related issues are outside the scope of this report: federal authorities to directly manage
and mobilize the productive resources (including energy production) of the United States for
defense purposes under the Defense Production Act of 1950 (P.L. 81-774, 50 U.S.C. §§4501 et
seq.); stockpiling programs such as the Strategic Petroleum Reserve; rate-setting and
environmental policies that may affect industry decisions on infrastructure investments; and trade
policies to encourage domestic production of strategic materials and commodities. Likewise, this
report does not cover environmental protection regulations focused on prevention of spil s and
other impacts external to a given production or processing facility, and not directly related to
national supply assurance issues. This report provides information on operational risks related to
spread of pandemic disease, such as il ness of key personnel or closure of facilities, but does not
cover second-order effects on essential supplies caused by pandemic-related supply and demand
imbalances or shocks.
Policy Background
The current federal critical infrastructure policy framework emphasizes the use of voluntary
public-private partnerships for risk management. This is particularly the case in the oil and gas
subsector given its unique ownership structure. In most countries, state ownership predominates
in the oil and gas industry, including ownership of mineral rights. The U.S. oil and gas industry is
distinctive in that both industrial enterprises and mineral rights are privately owned, and therefore
development of what may be considered national resources is in private hands. However,
mandatory and enforceable standards in subsector industries also play a role in the CISR risk-
management enterprise. Balancing voluntary public-private partnerships for risk management and
regulatory policy is an ongoing concern within the oil and gas subsector. The first section below
provides a brief description of risk-management definitions and principles widely recognized by
federal agencies and industry stakeholders. Sections on nonregulatory authorities, regulatory
authorities, and the standards development process fol ow.
Risk Management Overview
CISA and other federal agencies typical y assess risk as “a measure of potential harm from an
undesirable event that encompasses threat, vulnerability, and consequence.”4 In Congress and
federal agencies, broad-based risk assessments may be used to inform planning and resource
al ocation decisions related to congressional appropriations and agency budgets, as wel as
emergency preparedness, regulatory oversight of certain industries, grant funding, and voluntary
public-private partnerships. Private-sector stakeholders may use risk assessments to inform

4 CISA, Interagency Security Committee, The Risk-Management Process: An Interagency Security Committee
Standard
, Washington, DC, 2021, p. 49, https://www.cisa.gov/sites/default/files/publications/
T he%20Risk%20Management%20Process%20 -%202021%20Edition_1.pdf.
Congressional Research Service

3

link to page 9 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

prioritization of capital investments, system design, and operational practices, in order to reduce
the likelihood of adverse events, such as costly accidents, physical and cybersecurity breaches,
and supply-chain disruptions.
Public and private-sector critical infrastructure risk managers general y seek to reduce risk to
vulnerable systems, assets, and networks, rather than eliminate risk entirely, given limited
resources of time, organizational capacity, and funding. Risk managers may also choose to accept
certain risks or transfer them to other organizations. From this perspective, effective risk
management is efficient—i.e., it achieves acceptable levels of risk at the lowest possible cost, and
al ows organizations to prioritize mitigation of the most serious risks to their most vital systems,
assets, and networks. In practice, it may be difficult for diverse stakeholders in government,
industry, and society to establish consensus on risk-management priorities when potential
consequences are not confined to a single stakeholder or category of stakeholders. Potential
chal enges include:
 defining acceptable risk in specific contexts,
 defining acceptable criteria for transferring risk to other stakeholders,
 setting specific performance standards and goals for risk reduction,
 barriers to information sharing between key stakeholders, and
 gaps in data for assessing effectiveness of risk-management programs.
Risk Management and the Standards Development Process
Stakeholders may engage in established standards development processes to resolve chal enges
described above and establish consensus on risk-management standards and practices. In the
United States, the standards development process encompasses both voluntary and regulatory
aspects of the CISR risk-management enterprise. In theory, owner-operators mitigate risks to
critical infrastructure by adopting and implementing risk-management standards that have
achieved wide recognition and acceptance among diverse stakeholders—oftentimes provided by
accredited standards developing organizations (SDOs). Owner-operators may adopt consensus
standards for purposes of regulatory compliance or on a voluntary basis. Voluntary reasons may
include:
 ensuring national and global systems compatibility and interoperability,
 improving security and resilience of critical systems, assets, and networks to
assure business continuity and improve overal sector security,
 providing conformity assurance to business partners and to U.S. and foreign
government entities for business and legal reasons,5
 mitigating or avoid litigation risk, and
 forestal ing or influencing increased government regulation.
Figure 2 provides a hierarchy of standards and the relationship between government regulations
and industry standards. Standards regimes may combine multiple elements from one or more
tiers.

5 For example, CACI, “ CACI Organization Achieves ISO® 28000 Certification for Supply Chain Security: First U.S.
Company to Obtain T his International Credential,” https://www.businesswire.com/news/home/20130403005272/en/
CACI-Organization-Achieves-ISO%C2%AE-28000-Certification-for-Supply-Chain-Security.
Congressional Research Service

4

link to page 48
Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Figure 2. Hierarchy of Standards
The Relationship Between Regulatory and Industry Standards

Source: CRS, adapted from International Association of Oil and Gas Producers, Regulators’ Use of Standards,
2010, p. 3.
Notes: Standards regimes may combine multiple elements from one or more tiers.
Oil and gas industries covered in this report develop and incorporate voluntary consensus
standards into their operations to varying degree depending upon specific business imperatives,
risk considerations, and the regulatory environment. In addition, regulatory agencies frequently
incorporate voluntary consensus standards into federal regulations by reference. Many industry
advocates argue that this al ows private-sector stakeholders with relevant technical expertise and
experience to develop detailed implementation guidance for regulations, relieving resource-
constrained federal agencies of the burden of developing such guidance on their own.6 Some
critics, on the other hand, believe incorporation of voluntary consensus standards into the Code of
Federal Regulations by reference may cede important technical aspects of federal oversight to
regulated entities and thus weaken affected regulatory regimes.7 Incorporation of voluntary
consensus standards by reference into the Code of Federal Regulations gives them the legal effect
of regulatory standards. For more detail on federal roles, authorities, and policies in the national
standards system, see Appendix B.
Federal Nonregulatory Authorities
Key federal nonregulatory authorities for voluntary CISR programs date to the late 1990s.8 After
the September 11, 2001, terrorist attacks, Congress enacted the Homeland Security Act (HSA) of

6 For example, Letter from Frank Macchiarola, Vice President, Downstream and Industry Operations, American
Petroleum Institute, Christina Sames, Vice President, Operations and Engineering, American Gas Association, Dave
Schryver, Executive Vice President, American Public Gas Association, et al., to Office of Electricity, U.S. Department
of Energy, August 23, 2019, https://www.ingaa.org/File.aspx?id=36893.
7 See the Bureau of Safety and Environmental Enforcement (BSEE), “Oil and Gas and Sulphur Operations on the Outer
Continental Shelf—Oil and Gas Production Safety Systems,” 83 Federal Register 49222, September 28, 2018. BSEE
summarized public comments made during the rulemaking process that criticized the agency’s incorporation by
reference of API voluntary consensus standards.
8 For example, see Presidential Decision Directive 63 (PDD-63), “Critical Infrastructure Protection,” May 22, 1998,
https://clinton.presidentiallibraries.us/items/show/12762.
Congressional Research Service

5

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

2002 (P.L. 107-296), which expanded certain coordination authorities first established under the
Clinton Administration and added others. HSA created DHS as the lead agency for
implementation of the new CISR coordination authorities. HSA authorizes the Secretary of
Homeland Security to create and manage private-sector advisory councils, develop public-private
partnerships, provide security-related services, and assist the private-sector in the development
and promotion of best practices to secure critical infrastructure.
Presidential Policy Directive 21 (PPD-21), “Critical Infrastructure Security and Resilience,”
signed in 2013, directs the Secretary of Homeland Security to “provide strategic guidance,
promote a national unity of effort, and coordinate the overal Federal effort to promote the
security and resilience of the Nation’s critical infrastructure” in consultation with a wide range of
governmental and private-sector stakeholders.9 DHS created an organizational framework under
the 2013 National Infrastructure Protection Plan (NIPP) to implement this guidance.10 The
various NIPP partnership councils may organize certain deliberations under the auspices of the
Critical Infrastructure Partnership Advisory Council (CIPAC), which was first established in
2006. The CIPAC Charter has been renewed several times since then, most recently in 2020.11
Under certain circumstances, CIPAC provides coordinating councils organized under the NIPP
framework and member organizations legal exemption from Federal Advisory Committee Act
(FACA; P.L. 92-463) provisions for open meetings, chartering, public involvement, and reporting
in order to facilitate discussion between critical infrastructure stakeholders on sensitive topics
relating to infrastructure security.12 The NIPP framework includes several different types of
coordination and advisory bodies—organized under the CIPAC charter—to serve each of the 16
critical infrastructure sectors and numerous other subsectors recognized under PPD-21:
 Government Coordinating Councils (GCC). These enable interagency,
intergovernmental, and cross-jurisdictional coordination on infrastructure issues
of common concern to sector stakeholders. GCCs are comprised of federal, state,
local, tribal, and territorial government agency representatives.
 Sector Coordinating Councils (SCC). These are organized and administered by
private-sector stakeholders, and maintain an advisory relationship with the
federal government, facilitating coordination and information sharing between
industry and government.
 Information Sharing and Analysis Centers (ISAC). These independently
organized organizations serve their members by providing information about
common threats (including cybersecurity) and sharing best practices for
mitigation.
 Multi-state and multi-sector coordination councils.

9 Presidential Policy Directive 21 (PPD-21), “Critical Infrastructure Security and Resilience,” February 12, 2013, at
https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-
security-and-resil.
10 U.S. Department of Homeland Security, NIPP 2013: Partnering for Critical Infrastructure Security and Resilience,
Executive Summary, 2013, p. 1. NIPP 2013 supersedes previous plans published in 2009 and 2006, and remains current
policy as of this writing.
11 See CISA, “Critical Infrastructure Partnership Advisory Council,” https://www.cisa.gov/publication/cipac-charter.
12 Exemptions from FACA are made by the DHS Secretary under authority of section 87l(a) of the Homeland Security
Act, 6 U.S.C. §451(a). For more information on FACA regulations, see CRS Report R44253, Federal Advisory
Com m ittees: An Introduction and Overview
, by Meghan M. Stuessy.
Congressional Research Service

6

link to page 12 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

In addition, the Secretary and certain other department or agency heads may organize federal
advisory councils—subject to FACA requirements—that provide expertise from relevant
stakeholders and specialists on a range of specific policy areas.
Overal government responsibility for sector coordination belongs to designated federal agencies
with sector-relevant responsibilities and expertise, known as Sector Risk-Management Agencies
(SRMAs). SRMAs provide sector coordination via leadership of the sector GCCs. The
Department of Energy (DOE) is the SRMA for the Energy Sector. DHS and the Department of
Transportation (DOT) are the SRMAs for the Transportation Systems Sector. The Transportation
Security Administration (TSA), a DHS agency, is the SRMA for the Oil, Gas, and Hazardous
Materials Pipeline subsector of the Transportation Systems Sector.
In 2013, following publication of the NIPP, SRMAs led development of sector-specific
implementation plans. CISA announced an initiative in late 2020 for SRMAs to refresh these
plans in response to a congressional mandate to refresh PPD-21 guidance and the NIPP in the
Wil iam M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (P.L. 116-
283; FY2021 NDAA).13 The FY2021 NDAA also established statutory SRMA responsibilities.14
Federal Regulatory Authorities
Congress has established certain regulatory authorities for the oil and gas industry. Some federal
regulatory programs are based on prescriptive approaches, which mandate compliance with
technical standards for equipment, testing protocols, and operating procedures. These programs
may also include requirements for the reporting of known vulnerabilities and incidents. Other
regulatory programs mandate adoption of risk-management programs for covered critical
infrastructure owner-operators. In some cases, federal regulators mandate standards. In others,
voluntary consensus standards are incorporated by reference and become mandatory. Programs
may include some or al of the following: risk assessments, submission of risk-management
plans, mitigation of high-priority hazards, analysis of risk events, and reporting requirements.
Although specific authorities, policies, and programs vary, this latter category of regulation
general y relies more heavily on the expertise, judgment, and buy-in of private-sector
stakeholders in assessing and mitigating risk. As such, it frequently operates in conjunction with
public-private partnership structures described in the preceding section.
Table 1 below summarizes the latter category of regulatory authorities—i.e., those that include
risk-management requirements as a means of achieving CISR-related policy objectives in the oil
and gas subsector. Federal regulatory programs may also adopt hybrid approaches, which include
both prescriptive mandates and risk-based performance standards.15 For example, 30 C.F.R. §250,
which covers process safety of offshore oil and gas operations, includes both prescriptive and
risk-based performance standards. Subpart H, “Oil and Gas Production Safety Systems,” covers
design, instal ation, use, maintenance, and testing of safety equipment, while Subpart S, “Safety
and Environmental Management Systems,” covers requirements for offshore owner-operators’
risk-management programs.

13 See Sec. 9002, “Sector Risk-Management Agencies.”
14 Ibid.
15 T he Occupational Safety and Health Administration (OSHA) has previously discussed benefits and drawbacks of
these various approaches with oil and gas industry stakeholders. See OSHA, “ Performance-based Regulatory Models in
the U.S. Oil and Gas Industry, Offshore and Onshore,” https://www.osha.gov/oil-and-gas-extraction/resources/
performance-based-models.
Congressional Research Service

7

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Table 1. Selected Regulations with Risk-Management Requirements
CI Sector (subsector)
Selected Authorities
Implementation
Energy (Oil and Gas)
Maritime Transportation Security
Regulated maritime extraction and
Act (MTSA; P.L. 107-295); 33 C.F.R. handling facilities incorporate
§§105, 106
security assessments into a
comprehensive facility security plan.
Energy (Oil and Gas)
Outer Continental Shelf Lands Act
Regulated offshore dril ing
(OCSLA; 43 U.S.C. §§1331 et seq);
instal ations must develop a Safety
30 C.F.R. §250
and Environmental Management
System program that includes
specified API recommended
practices incorporated by
reference.
Energy (Oil and Gas)
29 C.F.R. §1910
Regulated facilities must implement
process safety management
program using “applicable”
voluntary consensus standards.
Onshore oil and gas exploration
and production operations exempt.
Energy (Oil and Gas)
Protecting and Securing Chemical
Regulated facilities must meet risk-
Facilities from Terrorist Attacks
based performance standards for
Act of 2014 (P.L. 113-254).
physical security and cybersecurity.
Chemical Facility Antiterrorism
In oil and gas subsector applies
Standards (CFATS), 6 C.F.R.
primarily to certain storage
§27.230
facilities, gas processing, and
petroleum refineries in midstream
and downstream segments meeting
high risk criteria.
Transportation Systems (Pipelines)
TSA Security Directive Pipeline-
Regulated facilities must report
2021-01114 under 49 C.F.R. §114
cybersecurity incidents, designate a
Cybersecurity Coordinator to
coordinate with federal agencies,
and report results of risk
assessments to TSA and CISA.
Transportation Systems (Pipelines)
49 C.F.R. §192 Transportation of
Regulated pipeline operators must
natural and other gas by onshore
implement a process safety risk-
pipeline systems
management program under ASME
voluntary consensus standard
incorporated by reference.
Transportation Systems (Pipelines)
Protecting Our Infrastructure of
Regulated underground gas storage
Pipelines and Enhancing Safety
facilities must implement risk-
(PIPES) Act of 2016 (P.L. 114-183);
management program under API
49 C.F.R. §60141
recommended practices
incorporated by reference.
Source: CRS analysis of applicable statutes and regulations.
Notes: API=American Petroleum Institute; ASME=American Society of Mechanical Engineers.
Balancing Coordination and Regulatory Authorities
Policymakers have general y sought to limit the regulatory reach of government within the
broader CISR risk-management enterprise. For example, the Clinton-era directive that established
the foundations of the current PPD-21 policy framework stated, “we should, to the extent
feasible, seek to avoid outcomes that increase government regulation or expand unfunded
Congressional Research Service

8

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

government mandates to the private sector.”16 The Homeland Security Act subsequently created
an organization—DHS—with wide-ranging responsibilities, but relatively narrow regulatory
authorities.
DHS infrastructure security programs established under PPD-21 focus on enhancing voluntary
collaboration with infrastructure security partners at al levels of government and the private
sector through information sharing, analysis, training, and coordination, as wel as provision of
certain services upon request, such as voluntary on-site vulnerability assessments or cybersecurity
intrusion detection. DHS and other SRMAs with dual responsibilities for regulation and
coordination typical y separate the two roles. Nonetheless, federal regulatory and coordination
regimes often overlap and mutual y influence each other.17 For example:
 Federal regulatory agencies participate in industry-led initiatives to develop
voluntary standards for critical infrastructure security and resilience.
 Federal agencies incorporate voluntary consensus standards for risk management
into the U.S. Code of Federal Regulations (C.F.R.) by reference.18
 Federal agencies accept accredited third-party verification of private-sector firms’
compliance with consensus standards as evidence of compliance with federal
regulations in some cases.19
 Federal agencies may choose to delegate certain regulatory authorities to
industry-led reliability organizations, which develop, promulgate, and enforce
mandatory industry standards under federal oversight.
 Federal agencies may choose to defer or limit formal regulation of private-sector
risk management in favor of coordination with, or support of, industry-led
initiatives, which broadly align with national CISR policy goals.
Oil and Gas Subsector Overview
This section describes risk and risk-management issues affecting the physical and cyber systems
and assets that constitute the critical infrastructure of the oil and gas subsector. The subsections
below provide a summary overview of the oil and gas subsector characteristics most relevant to
critical infrastructure risk management. Readers interested in a broader overview of the energy
sector and relevant market and regulatory trends may reference CRS Report R46723, U.S. Energy
in the 21st Century: A Primer, coordinated by Melissa N. Diaz.
Industry observers frequently describe the U.S. oil and gas industry as having three primary
segments—an upstream segment (exploration and extraction); a midstream segment (supply of
crude oil and raw gas to refineries and processing plants, and long-distance transmission
pipelines); and a downstream segment (petroleum refining and fuel distribution to end users).
These correspond approximately with national critical functions outlined above that are specific
to the oil and gas, and pipeline subsectors: exploration and extraction of fuels; fuel refining and

16 PDD-63, op. cit., p. 3.
17 See ANSI, “How Do Government Agencies Incorporate Sector Standards?” https://www.standardsportal.org/usa_en/
standards_system/standards_system_faq.aspx#privatesector.
18 See 1 C.F.R. §51, “Incorporation by Reference.”
19 For example, see Center for Offshore Safety, “Find a COS-Accredited ASP,”
https://www.centerforoffshoresafety.org/SEMS-Audit-Providers/Find%20a%20COS%20Accredited%20ASP .
Congressional Research Service

9

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

processing fuels; storage of fuel and maintenance of reserves; and transport of materials by
pipeline.
Infrastructure of the oil and gas subsector consists of oil and gas wel s, refineries, processing
plants, and storage terminals, al of which are highly integrated with pipeline and ICT networks.
Over 2.8 mil ion miles of domestic pipeline infrastructure—along with terrestrial and maritime
transport systems spanning the globe—links the three segments of the oil and gas supply chain
together.20 The critical functions of the oil and gas subsector therefore rely upon highly
interconnected systems, assets, and networks for production and distribution.
Exploration and Extraction of Fuels
Many U.S. oil and gas companies have a global footprint. However, in recent years domestic
producers have increased exploration and production in the United States through use of
hydraulic fracturing and horizontal dril ing, unlocking oil and natural gas resources from
“unconventional” formations, especial y shale. According to the U.S. Energy Information
Administration (EIA), the United States was a net annual petroleum exporter in 2020.21
Approximately 71% of domestical y produced crude oil comes from five states, led by Texas with
a 43.0% share of the national total, followed by North Dakota (10.4%), New Mexico (9.2%),
Oklahoma (4.1%), and Colorado (4.0%). Offshore oil production in the Gulf of Mexico accounts
for an additional 14.6% of the national total.22
Natural gas extraction is similarly concentrated among top producing states, with about 69%
coming from five states: Texas (23.9%); Pennsylvania (21.1%); Louisiana (9.5%); Oklahoma
(7.6%); and West Virginia (7.1%). Although there is significant geographic overlap with major oil
production centers, there are notable differences. Offshore dril ing in the Gulf of Mexico is less
dominant in the gas sector, providing 2% of total domestic production.23
Fuel Refining and Processing of Fuels
The primary products of crude oil refineries are fuels for transportation, constituting roughly 85%
of output.24 They also provide necessary feedstock for petrochemical manufacturing, lubricants,
and other products. Refining capacity is concentrated near Gulf of Mexico seaports, accounting
for nearly half of national production of refined fuels. Texas alone accounts for nearly a quarter of
this production, with much of its capacity concentrated in the Houston area.25 Major refineries
also exist on the West Coast and in the Midwest to serve regional markets. Between 2000 and
2018, the number of operable domestic refineries decreased from 158 to 129—an 18% drop—
while total refining capacity increased by about 9%.26 Higher utilization of fewer refining assets

20 PHMSA, “PHMSA by the Numbers,” https://www.phmsa.dot.gov/.
21 Energy Information Administration (EIA), “Oil and Petroleum Products Explained: Oil Imports and Exports,”
https://www.eia.gov/energyexplained/oil-and-petroleum-products/imports-and-exports.php, accessed October 19, 2021.
22 EIA, “Oil and Petroleum Products Explained: Where Our Oil Comes From,” https://www.eia.gov/energyexplained/
oil-and-petroleum-products/where-our-oil-comes-from.php, accessed October 19, 2021.
23 EIA, “Natural Gas Explained: Where Our Natural Gas Comes From,” https://www.eia.gov/energyexplained/natural-
gas/where-our-natural-gas-comes-from.php.
24 American Geosciences Institute, “Oil Refining and Gas Processing: Products of Oil Refining,”
https://www.americangeosciences.org/geoscience-currents/oil-refining-and-gas-processing.
25 Greater Houston Partnership, “Data, Insight & Analysis: Gulf Coast Refining Capacity,” https://www.houston.org/
houston-data/gulf-coast -refining-capacity.
26 Based on time series data from EIA, “Number and Capacity of Petroleum Refineries,” https://www.eia.gov/dnav/pet/
Congressional Research Service

10

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

decreases reserve capacity, while increasing the likelihood of supply disruptions, according to
experts.
Natural gas usual y undergoes field processing to remove associated oil and condensate near the
extraction site before being transported via pipeline to gas processing plants. Processing capacity
is concentrated in the Gulf Coast region (states with Gulf of Mexico shoreline), accounting for
51% of national capacity.27 Natural gas has a variety of uses, including for electric power
generation, industrial and commercial enterprises, and residential customers. Commercial y
valuable by-products of this process include natural gas liquids such as ethane, propane, and
butane, which can be used for fuel, plastics, or petrochemical feedstock, among other uses.28
Pipeline Transport
The Pipeline and Hazardous Materials Safety Administration (PHMSA), a Department of
Transportation (DOT) agency, regulates 2.8 mil ion miles of pipelines.29 Approximately 2.6
mil ion miles of this total consists of natural gas pipelines, with the remainder used for petroleum,
refined fuels, and other hazardous liquids. The U.S. natural gas industry uses thousands of miles
of largely unregulated (and therefore uncounted) gathering pipelines to transport gas to gas
processing plants nationwide.30 Gathering pipelines typical y have lower diameters and operate at
lower pressures than long-distance transmission pipelines. After processing, a transmission
pipeline network totaling nearly 300 thousand miles is used to transport gas across long distances
to regional distribution nodes.31 A distribution network totaling 2.3 million miles supplies gas to
end users.
The rapid growth of U.S. natural gas and crude oil production from shale in the mid-2000s has
led to a corresponding realignment and expansion of the nation’s pipeline system. Between 2004
and 2019, developers added over 58 thousand miles of hazardous liquids transmission pipeline in
the United States, an increase of about 35% in total reported mileage, not counting the expansion
of capacity on existing pipelines. Much of this expansion was used to connect major new
production regions, such as the Marcel us (Pennsylvania) for natural gas and the Bakken (North
Dakota) for oil shale basins, to traditional oil and gas markets, fundamental y reconfiguring oil
and natural gas flows throughout North America. During the same period, total mileage for U.S.
natural gas transmission remained flat.32 Oil production from the Bakken increased much faster

PET _PNP_CAP1_DCU_NUS_A.htm.
27 EIA, “Gulf of Mexico Fact Sheet,” https://www.eia.gov/special/gulf_of_mexico/, accessed October 19, 2021.
28 EIA, “What Are Natural Gas Liquids and How Are T hey Used?” https://www.eia.gov/todayinenergy/detail.php?id=
5930, April 20, 2012. Also see CRS Report R45398, Natural Gas Liquids: The Unknown Hydrocarbons, by Michael
Ratner.
29 PHMSA, “PHMSA By the Numbers,” https://www.phmsa.dot.gov/.
30 On November 15, 2021, PHMSA announced it was issuing a final rule, effective May 16, 2022, to require pipeline
operators to report safety information for all gas gathering lines—a total of 425 thousand additional miles of pipeline.
See PHMSA, “New Federal Regulations Add More T han 400,000 Miles of “Gas Gathering” Pipelines Under Federal
Oversight,” press release, November 15, 2021, https://www.phmsa.dot.gov/news/new-federal-regulations-add-more-
400000-miles-gas-gathering-pipelines-under-federal-oversight ; and PHMSA, “ Pipeline Safety: Safety of Gas Gathering
Pipelines,” 86 Federal Register 63266, September 14, 2021.
31 PHMSA, “Annual Report Mileage Summary Statistics,” web tables, September 1, 2020, accessible at
https://www.phmsa.dot.gov/data-and-statistics/pipeline/annual-report-mileage-summary-statistics; and “ Gathering
Pipelines FAQs,” web page, https://www.phmsa.dot.gov/faqs/gathering-pipelines-faqs.
32 For more information, see “ Pipeline Network Expansion from the Shale Boom,” in CRS Report R46723, U.S. Energy
in the 21st Century: A Prim er
, coordinated by Melissa N. Diaz.
Congressional Research Service

11

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

than pipeline infrastructure could be developed, so rail and trucking also have been used for some
time to move significant volumes of oil to market. Natural gas from the Bakken was flared at the
production site in significant quantities due to lack of infrastructure to transport it and process it
economical y.33
Fuel Storage and Reserves
Storage facilities are critical to the operation of pipeline networks, and help moderate imbalances
between supply and demand in the marketplace.34 Much of U.S. storage capacity is located in the
Gulf Coast and adjacent Midwest states.35 The United States’ largest onshore oil storage and
energy market hub is located in Cushing, OK, which has a working capacity of over 75 mil ion
barrels—about 13% of national storage capacity.36 Cushing is a major pipeline terminal that
connects North American oil fields with Gulf Coast refineries, and is the physical delivery point
for widely-referenced West Texas Intermediate oil futures contracts.37
Risk in the Oil and Gas Subsector
Oil and gas production networks are potential y susceptible to a wide range of failures, such as
operator error, mechanical breakdowns, design errors, sensor error or malfunction, and
mismanagement of critical data. In addition, deliberate attacks or natural events may target or
otherwise affect key vulnerabilities of cyber or physical infrastructure. This section describes
several characteristics of the oil and gas subsector that may create structural vulnerabilities
affecting process safety, physical security, cybersecurity, and supply-chain risk to varying
degrees. These include:
 Complex interdependencies of oil and gas infrastructure and supply-chain (third
party) risk, and prevalence of hazardous industrial processes throughout the
subsector.
 Limited redundancy or spare capacity of production, storage, or transmission
assets.
 Decentralized ownership and responsibility structures.
 Geographic concentration of critical systems and assets.
 Increased integration of information and communications technology (ICT) and
operational technology (OT).
Exposure of industry production, processing, and distribution systems to specific intentional
threats, such as cyberattacks, or generalized hazard phenomena, such as extreme weather and sea-
level rise caused by climate change, or pandemic disease, may lead to supply disruptions. The

33 Production site flaring refers to controlled combustion using flare stacks to burn off excess gas.
34 T he National Petroleum Council, Dynamic Delivery: America’s Evolving Oil and Natural Gas Transportation
Infrastructure
, Chapter 2, “ Infrastructure Resiliency, Mapping, and Analysis,” January 25, 2021, p. 29,
https://dynamicdelivery.npc.org/downloads.php.
35 Regional designations for oil and gas infrastructure follow Petroleum Administration for Defense Districts (PADD)
conventions. See EIA, “PADD Regions Enable Regional Analysis of Petroleum Product Supply and Movements,”
February 7, 2012, https://www.eia.gov/todayinenergy/detail.php?id=4890.
36 Irina Slav, “T he Most Critical Oil Storage in the United States,” Oilprice.com , May 2, 2020, https://oilprice.com/
Energy/Crude-Oil/T he-Most -Critical-Oil-Storage-In-The-United-States.html.
37 Ibid.
Congressional Research Service

12

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

following subsections summarize the characteristics listed above and highlight potential
vulnerabilities to relevant threats and hazards.
Complex Interdependencies of Oil and Gas Infrastructure and
Supply-Chain Risk
The networked structures of oil and gas infrastructure may increase the probability that the local
effects of accidents, attacks, and other process disruptions wil affect elements of the production
and distribution systems, creating supply disruptions. The nation’s vast pipeline network connects
many key production nodes that process corrosive and flammable hydrocarbons under high
temperature and pressure and that are subject to wide variability in operating conditions. These
networks are increasingly automated and rely on ICT that may be vulnerable to malicious
exploitation. Likewise, in many cases the global shipping network relies upon passage of large
vessels through canals and natural chokepoints, which present other hazards. Disruptions,
whether intentional, accidental, or from natural causes, may propagate through the global supply
chain creating instability in oil and gas markets and disrupting provision of critical inputs to other
CI sectors (see text box below).
Limited Redundancy or Spare Capacity
Accidents and other disruptions are relatively commonplace in the oil and gas industry.38 In many
cases, these events affect oil and gas wel s, processing plants, and refineries, and may lead to
disruptions of proximate upstream or downstream infrastructure. In such cases, the networked
character of oil and gas infrastructure may provide some redundancies and resilience. However,
some industry observers have questioned whether levels of redundancy and resilience are truly
adequate.
A 2018 aviation industry report noted that major airports had been “dangerously close to running
out of fuel” after recent pipeline explosions, and that storage scarcity at product terminals had
placed airports in a “precarious fuel shortage situation.”39 Independent analyses covering the
subsector also identified capacity limitations as a risk factor. A 2017 analysis of 10-K filings by
the largest U.S. publicly traded oil and gas companies echoed these concerns, finding that that
89% of respondents reported “insufficient refining, pipeline, storage or trucking capacity” as a

38 According to congressional testimony by a systems safety expert in response to the Deepwater Horizon incident,
“Referring to accidents as ‘low probability, high consequence’” is common in the industry, despite a record that
indicates otherwise. See U.S. Congress, Senate Committee on Energy and Natural Resources, Oil and Gas
Development, Hearing on domestic oil and gas production, safety, and environmental protection, 112 th Cong., 1st sess.,
May 17, 2011, S. Hrg. 112-51 (Washington: GPO, 2011), p. 54. For a searchable database of major oil and gas industry
incidents investigated or under investigation by the U.S. Chemical Safety Board (CSB), see CSB, “Investigations,”
https://www.csb.gov/investigations/. Additionally, many law firms specialize in oil and gas personal injury cases,
claiming to have won billions in damages. For example, Zehl & Associates claims over $1 billion recovered for clients
in connection with the Deepwater Horizon explosion and a ho st of lesser known incidents. “ Oil Rig Accident and
Platform Explosion Lawyers,” https://www.zehllaw.com/practice-areas/offshore-injuries/oil-rig-explosions/.
39 Airlines for America, Jet Fuel: From Well to Wing, April 2018, p. 9, https://airlines.org/wp-content/uploads/2018/01/
jet-fuel_spreads.pdf. T his is an apparent reference to an October 2016 blast in Alabama that affected Colonial Pipeline
facilities. See Devika Krishna Kumar, “Colonial May Open Key U.S. Gasoline Line by Saturday After Fatal Blast,”
Reuters, October 31, 2016, https://www.reuters.com/article/us-pipeline-blast-alabama/colonial-may-open-key-u-s-
gasoline-line-by-saturday-after-fatal-blast-idUSKBN12V2FC. According to Reuters, a gasoline spill from the pipeline
the previous month caused a 12-day interruption to supplies. According to NPC, Washington/Baltimore airports “ came
within hours of a stock out” as a result of the spill. See NPC, op. cit., p.40.
Congressional Research Service

13

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

risk.40 Likewise, the 2017 analysis found that 85% of respondents reported reliance on third party
owned processing facilities and transportation as a concern.41
The National Petroleum Council (NPC), a federal y chartered and privately funded advisory
committee, noted in a 2021 report that there had been an increase of U.S. refinery utilization
between 2009 and 2019 from 83% to 93% capacity.42 “High utilization is preferred for
operational and economic efficiency, but high utilization can be seen as a concern when viewed
from the perspective of energy resiliency,” it said. “With minimal slack in the system, loss of
capacity can be significant and create cascading constraints on upstream production.”43
Incidents affecting fuel delivery to electricity generation plants and gas stations have highlighted
this vulnerability. A severe cold weather event in February 2021 disrupted natural gas supplies to
electric power plants in Texas—one of several factors that caused extended statewide blackouts
leading to loss of life. The May 2021 ransomware attack on Colonial Pipeline Company and
subsequent fuel shortages highlighted the lack of spare capacity to transport fuel from the Gulf
Coast states to East Coast markets.
Pandemic disease may place additional stresses on limited industry production, processing, and
distribution capacity for extended periods. During the early months of the Coronavirus Disease
2019 (COVID-19) pandemic in the United States, public officials issued numerous emergency
directives closing nonessential businesses and facilities, limiting travel, and instructing
nonessential workers to stay home. These orders frequently exempted oil, gas, and pipeline
facilities, as essential businesses. Nonetheless, countermeasures introduced to slow the spread of
COVID-19 and protect the health of essential workers, as wel as the unpredictable nature of
serious outbreaks, presented chal enges to the subsector as a whole in staffing existing essential
facilities and constructing new ones.44
Ownership and Responsibility Structures in the Oil and Gas
Subsector
According to observers, the general y fragmented ownership and responsibility structure of the oil
and gas industry may present risk—particularly as global supply-chain relationships knit together
a wide array of suppliers, contractors, and asset owners in a web of complex interdependencies.45
Upstream dril ing operations require as many as 45 different services, ranging from seismic
surveys to facilities engineering and economic analysis.46 Additional y, upstream operations

40 BDO, 2017 BDO Oil and Gas Riskfactor Report, 2017, p. 1, https://www.bdo.com/getattachment/a1bf67be-1beb-
42b1-8f0c-f3db2446c6ed/attachment.aspx?2017-Oil-Gas-Riskfactor-Report-Brochure_WEB.pdf; 10-K refers to annual
reports filed by publicly traded companies to the U.S. Securities and Exchange Commission, which contain information
on company performance and risk factors, among other parameters.
41 Ibid.
42 T he National Petroleum Council (NPC), Dynamic Delivery: America’s Evolving Oil and Natural Gas Transportation
Infrastructure
, Chapter 2, “ Infrastructure Resiliency, Mapping, and Analysis,” January 25, 2021, p. 2-24,
https://dynamicdelivery.npc.org/downloads.php.
43 Ibid.
44 CRS In Focus IF11476, COVID-19: Response of the Oil and Gas Pipelines Sector, by Paul W. Parfomak.
45 For example Elizabeth Paranhos, T racy G. Kozak, and William Boyd, Highly Reliable Organizations in the Onshore
Natural Gas Sector: An Assessm ent of Current Practices, Regulatory Fram eworks, and Select Case Studies
, Joint
Institute for Strategic Energy Analysis, NREL/SR-6A50-67941, July 2017, p. ix.
46 Christopher M. Chima, “Supply-Chain Management Issues In the Oil and Gas Industry,” Journal of Business &
Econom ics Research
, vol. 5, no. 6 (June 2007), p. 28.
Congressional Research Service

14

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

depend upon transport of heavy industrial
Unmanaged Risk and Disruption of
equipment, chemicals, concrete, and other supplies
Critical Supply Functions
across sometimes remote and chal enging
A series of explosions and fires at the Enterprise
geographies.47 Separate companies—each
Products Midstream Gas Plant in Pascagoula, MS,
competing within the broader sector—provide
on June 27, 2016, caused extensive damage and
many of these services.
took the facility offline for six months. Upstream
production from offshore dril ing platforms was
rerouted via pipeline to other processing
According to one academic analysis of supply-
facilities, but capacity restrictions forced
chain risk in the oil and gas industry, competitive
curtailment of offshore gas production during this
business pressures may complicate collective
period from 400 mil ion cubic feet per day to 330
mil ion cubic feet per day—an 18% reduction.48
efforts to improve security within the oil and gas
sector as a whole. “One of the weaknesses of a
A report by the U.S. Chemical Safety Board
(CSB), a nonregulatory accident investigation
supply-chain is that each company is likely to act
agency, determined that the proximate cause of
in its best interests to optimize its profit,” with no
the incident was failure of industrial equipment
single entity responsible for management of the
due to thermal stress after an unplanned
supply-chain as a whole.49 Additional y, the
production halt. The production halt itself was
caused by a lightning strike downstream of the
prevalence of separate information systems may
plant that disabled pipeline operations, leaving the
present management chal enges and complicate
plant unable to offload its production of natural
information sharing. “Difficulties can arise when
gas liquids and fuel.
oil and gas companies make technology decisions
The investigation also highlighted systemic risk-
independently along their supply-chains,” the study
management issues that may have increased the
states. “Thus, their information systems are neither
facility’s vulnerability to contingent events, such
as unplanned shutdowns. Although the plant
coordinated nor compatible, and information is not
operators were required to administer a process
readily shared back and forth along the supply-
safety management program under 29 C.F.R.
chain.”50
§1910, the regulation gave them discretion to
apply “appropriate” industry standards.
Development and deployment of new ICT
Several relevant technical standards developed by
technology may help mitigate some of these risks.
different SDOs were “not ful y consistent with
For example, ICT OT are increasingly integrated
each other and lacking in clarity.” Additional y,
throughout the oil and gas subsector, which may
CSB found that many oil and gas companies had
enable better communication and coordination
systematical y withheld relevant process safety
data from each other in order to safeguard
between multiple owners, managers, operators,
proprietary information and avoid potential
contractors, and subcontractors managing complex
regulatory consequences. Plant operators
projects. According to one analyst, “oil and gas
therefore failed to ful y understand equipment
companies are creating a stronger and more
vulnerabilities or their overal risk exposure.
comprehensive connection between field
operations staff and remote experts” by using
“digital oilfield” technologies based on use of real-time production data and automated workflow
and data management tools.51 However, such technologies may create cybersecurity
vulnerabilities, even as they may increase supply-chain transparency and coordination.
Additional y, some analysts have suggested that risks associated with fragmented ownership and
responsibility structures are mitigated to a degree by vertical integration within the oil and gas

47 Chima, ibid.
48 Jeff Amy, “Pascagoula Natural Gas Plant Still Closed After June 27 Fire,” Tuscaloosa News, July 8, 2016,
https://www.tuscaloosanews.com/business/20160708/pascagoula-natural-gas-plant -still-closed-after-june-27-fire.
49 Chima, ibid, p. 34.
50 Ibid.
51 Roberta Bigliani, Reducing Risk in Oil and Gas Operations, White Paper, May 2013, p. 9.
Congressional Research Service

15

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

industry across industry segments, which may facilitate standardization and institution of
centralized risk-management.52 Sometimes referred to as oil majors, these companies own assets
in al segments of the value chain linking oil and gas fields with end markets. However, other
observers question whether corporate ownership of diverse assets across industry segments
necessarily translates into increased operational integration of those assets.53 Furthermore, some
analyses indicate that current trends in the industry indicate increased specialization across
segments, rather than integration—in part because specialization may be more economical y
efficient at the company level and provide higher returns to investors.54
According to the Natural Gas Council, an industry group, several operational capabilities lower
supply risk due to failures of any given system, asset, or network. These include extensive
networked interconnections that al ow rerouting of deliveries; paral el pipelines to al ow bypass if
needed; “line packing” to compress excess gas in pipelines, and geographical y dispersed
production and storage.55
Geographic Concentration of Critical Systems and Assets
The concentration of oil and gas extraction, processing, and transport facilities in the Gulf Coast
region raises concerns among many about exposure to increasingly frequent extreme weather
events and persistent coastal flooding, which most scientists attribute to sea level rise and long-
term weather patterns caused by climate change. Large-scale removal of offshore underground
hydrocarbons by oil and gas dril ing also increases risk of coastal flooding.56 Hurricanes may
force preemptive closure of offshore dril ing assets. In addition, they may directly damage
dril ing platforms, refineries, and pipeline infrastructure, or indirectly affect their operations by
damage to the electric grid or disruptions to local communities that provide essential workers and
services. Post-storm impacts may potential y persist for weeks or months afterwards, causing fuel
shortages and price spikes, prompting the industry to develop financial risk-management tools.57

52 For an early example of this analysis, see Mead, David E. “Effect of Vertical Integration on Risk in the Petroleum
Industry,” The Quarterly Review of Econom ics and Business, 18, no. 1 (1978).
53 T yler Crowe, “Integrated Oil and Gas Isn’t Really T hat Integrated Anymore,” The Motley Fool, September 1, 2014,
https://www.fool.com/investing/general/2014/09/01/integrated-oil-gas-isnt-really-that-integrated-any.aspx.
54 See Kearney, Challenging the Integrated Oil and Gas Model, https://www.kearney.com/energy/article/?/a/
challenging-the-integrated-oil-and-gas-model; and Fernando Barrera-Rey, The Effects of Vertical Integration on Oil
Com pany Perform ance
, T he Oxford Institute for Energy Studies, WPM 21, October 1995,
https://www.oxfordenergy.org/wpcms/wp-content/uploads/2010/11/WPM21-
T heEffectsofVerticalIntegrationonOilCompanyPerformance-FBarreraRey-1995.pdf.
55 American Petroleum Institute, American Gas Association, and Interstate Natural Gas Association of America,
Natural Gas: Reliable and Resilient, August 2018, p. 2, http://ongsubsector.com/documents/NaturalGasResilience-
Whitepaper.pdf, also NPC, op. cit., p. 60.
56 Council on Foreign Relations, Climate Risk Impacts on the Energy System , June 14, 2019, https://www.cfr.org/
report/climat e-risk-impacts-energy-system; also T he National Petroleum Council, Dynam ic Delivery: Am erica’s
Evolving Oil and Natural Gas Transportation Infrastructure
, Chapter 2-Infrastructure Resiliency, Mapping, and
Analysis, January 25, 2021, https://dynamicdelivery.npc.org/downloads.php. T he report outlines infrastructure
hardening efforts, but states “the fact remains that geographic concentration of refineries is a vulnerability and threat to
resiliency,” p.28. See p.78, ibid, for a description of similar vulnerabilities of Gulf Coast natural gas processing plants
and natural gas liquids fractionators to hurricanes and seismic events.
57 See Negar Dahitaleghani, “Analysis of Disruptions in the Gulf of Mexico Oil and Gas Industry Supply Chain and
Related Economic Impacts,” (Ph.D. Dissertation, Louisiana State University and Agricultural and Mechanical College,
2016), pp. 11-19, https://digitalcommons.lsu.edu/cgi/viewcontent.cgi?article=4966&context=gradschool_dissertations.
For a recent example, see EIA, “T oday in Energy: Hurricane Ida Disrupted Oil Production and Refining Activity,”
September 16, 2021, https://www.eia.gov/todayinenergy/detail.php?id=49576.
Congressional Research Service

16

link to page 16 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Weather-related disruptions may also affect the supply of petrochemicals used in the chemical
and critical manufacturing sectors.58
Seismic events may affect infrastructure assets located wel inland, but connected to the Gulf
Coast refineries. A 2015 study funded through the U.S. Geological Survey’s National Earthquake
Hazards Reduction Program highlighted risks from man-made earthquakes to the major oil
storage complex and pipeline hub in Cushing, OK, which supplies many Gulf Coast refineries
(see “Fuel Storage and Reserves” section). According to the study, wastewater injection from
local oil and gas production operations in Oklahoma might produce significant seismic hazards
that could cause “moderate to heavy damage to storage tanks in the Cushing facility” in the event
of a moderate-magnitude earthquake.59 Significant damage or other disruptions to the complex
may upset oil markets, given the role it plays in setting prices. In 2020, reports that storage
facilities in Cushing, OK, were approaching capacity led to an oil price collapse during the
economic downturn caused by the COVID-19 pandemic.60
Integration of Information and Communications Technology
As in other sectors, increased integration of electronic sensing, automation, and connectivity, may
create potential attack surfaces for malicious actors.61 A 2018 report by the Oil and Natural Gas
(ONG) SCC states, “The natural gas and oil industry faces the threat of cyberattacks from a
variety of malicious actors including nation states, criminal organizations and unaffiliated bad-
actors seeking to steal intel ectual property and/or compromise industrial control systems (ICS),
among many other nefarious goals.”62 According to the report, threats include automated
cyberattacks, insider attacks, cyber supply-chain tampering or disruption, and counterfeit devices
with embedded malware.63

58 For example, Rebecca T rager, “Polar Storm Paralyses U.S. Gulf Coast Petrochemical Sector,” Chemistry World,
February 24, 2021, https://www.chemistryworld.com/news/polar-storm-paralyses-us-gulf-coast -petrochemical-sector/
4013306.article.
59 D.E. McNamara, G.P. Hayes, and H.M. Benz, et al., “Reactivated Faulting Near Cushing, Oklahoma: Increased
Potential for a T riggered Earthquake in an Area of United States Strategic Infrastructure,” Geophysical Research
Letters
, vol. 42, no. 20 (October 8, 2015).
60 “Oil Prices Collapse Again,” New York Times, April 28, 2020, https://www.nytimes.com/2020/04/27/business/
coronavirus-stock-market -tracker.html; and CRS Insight IN11354, Crude Oil Futures Prices Turn Negative, by
Michael Ratner and Heather L. Greenley.
61 See Lawrence Livermore National Laboratory (LLNL), Dragonstone Strategy—State of Cybersecurity in the Oil &
Natural Gas Sector
, LLNL-T R-805864, February 5, 2020, pp. 10 and 14 (hereinafter, LLNL Report). The Oil and
Natural Gas (ONG) ISAC shared a 2017 cybersecurity analysis with its members that highlighted an attack, which
targeted industrial control systems (ICS) and was designed to cause physical damage and shutdown operations. T he
sophistication of the attack indicated state sponsorship. According to the analysis, increasing integration of autonomous
sensing and controls with process control and information system networks that allow remote operation of industrial
processes is increasing risk. See Blake Johnson, Dan Caban, and Marina Krotofil, et al., Attackers Deploy New ICS
Attack Framework ‘Triton’ and Cause Operational Disruption to Critical Infrastructure
, Mandiant, December 14,
2017, https://www.mandiant.com/resources/attackers-deploy-new-ics-attack-framework-triton.
62 Oil and Natural Gas Sector Coordinating Council (ONG SCC), Defense in Depth: Cybersecurity in the Natural Gas
and Oil Industry
, 2018, p. 8, https://www.api.org/-/media/Files/Policy/Cybersecurity/2018/Defense-in-Depth-
Cybersecurity-in-the-Natural-Gas-and-Oil-Industry.pdf.
63 Ibid, p. 8.
Congressional Research Service

17

link to page 12 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

A 2020 report submitted by the Lawrence Livermore National Laboratory (LLNL) to DHS on the
state of cybersecurity in the oil and gas sector noted several subsector-specific characteristics of
the oil and gas industry that may increase vulnerability to cyber-related threats:64
 Wide geographic distribution, including offshore and other hard-to-access
locations, heightening reliance on potential y vulnerable remote-access process
monitoring and controls;
 Data networks between on and offshore facilities, and insufficient segmentation
of data networks—breaches in one network may compromise others;
 Interconnected assets at al stages of production process (upstream, midstream,
downstream);
 Large quantity of legacy assets lacking cybersecurity features, and widespread
reliance on consumer-grade operating systems and software with known
vulnerabilities;
 Use of computer technology focusing on productivity; cybersecurity is “an
afterthought”;
 Underdeveloped capacity to find or track malware, al owing adversaries to
maintain presence in systems “for months or years to collect data and identify
weaknesses”;65
 Poor physical security of data storage facilities; and
 Limited “cybersecurity culture.”66
Risk Management in the Oil and Gas Subsector
Coordinated risk-management programs based on voluntary consensus standards and practices in
the oil and gas industry vary within critical functional areas (exploration and extraction; fuel
refining and processing; storage and reserves; and pipeline transit), and risk-management
category (process safety; physical security; cybersecurity; and supply-chain security and
resilience). Programs and practices in each critical functional area may also be informed by
formal and informal information sharing—or in some cases mandatory disclosure requirements—
which also vary by segment and domain.
Federal regulation in some form is present in nearly every functional area of the subsector, but
varies in how and where it is applied. (See Table 1 above for summary of regulatory authorities.)
In general, prescriptive regulatory mandates are favored across industries where incident impacts
are potential y catastrophic and elicit broad public concern.67 By contrast, industry-led efforts
may apply more broadly “as risks become more privatized” and “harms are more divisible and
isolated with respect to their impacts.”68

64 LLNL Report, p. 12.
65 Ibid.
66 Ibid.
67 See P. W. Huber, “T he Bhopalization of U.S. T ort Law,” Issues in Science and Technology, 2/1, 1985, pp. 73–82;
David Demeritt, Henry Rothstein, Anne-Laure Beaussier, and Michael Howard, “ Mobilizing Risk: Explaining Policy
T ransfer in Food and Occupational Safety Regulation in the UK,” Environm ent and Planning, A 47, no. 2, 2015, pp.
373-391.
68 May, Peter J., and Chris Koski, “Addressing Public Risks: Extreme Events and Critical Infrastructures,” Review of
Policy Research
, vol. 30, no. 2, 2013, p. 156.
Congressional Research Service

18

link to page 23 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Development of specific regulatory regimes in the oil and gas industry follow this general rule,
with new regulations often mandated in the wake of widely publicized incidents that cause
multiple fatalities or wide scale economic disruption. Examples include the catastrophic loss of
the Deepwater Horizon offshore dril ing rig in 2010, and more recently, the 2021 ransomware
attack on the Colonial Pipeline that disrupted fuel supplies on the East Coast. Conversely,
increased regulation has not occurred in the wake of less publicized incidents in more remote
locations—particularly in onshore dril ing and exploration.
Federal Regulatory Regimes
This section provides an overview of regulation-based risk-management programs within each of
the functional areas of the oil and gas industry summarized in Table 2 below.69 Not al areas are
subject to regulation, and the scope, organization, and extent of regulatory programs varies across
areas.
Table 2. Oil and Gas Subsector Regulation by Risk Type and Critical Function
Lead federal regulatory agencies

Process Safety
Physical Security
Cybersecurity
Supply Chain
Exploration and
BSEE
USCG
USCG

Production
(offshore)

Exploration and




Production
(onshore)

Fuel Refining and
OSHA
CISA
CISA

Processing
Storage and
OSHA
CISA
CISA

Reserves
Pipeline
PHMSA
TSA
TSA

Transport
Source: CRS analysis of federal agency sources and relevant sections of C.F.R.
Notes: Blank cel s indicate no federal regulatory oversight of risk-management plans or practices. CISA
oversight applies only to designated high risk facilities subject to CFATS requirements for facility security plans.
TSA has not issued physical security regulations for pipelines. Abbreviations: BSEE=Bureau of Safety and
Environmental Enforcement, Interior; CISA=Cybersecurity and Infrastructure Security Agency, Homeland
Security; OSHA=Occupational Safety and Health Administration, Labor; PHMSA=Pipeline and Hazardous
Materials Safety Administration, Transportation; TSA=Transportation Security Administration, Homeland
Security; and USCG=U.S. Coast Guard, Homeland Security.
As described in the four subsections below, regulatory regimes vary in their scope and extent.
Regulation of Exploration and Production of Oil and Gas
The U.S. Coast Guard (USCG) implements regulations codified under the Maritime
Transportation Security Act (MTSA). Regulations cover physical security and cybersecurity for
offshore instal ations and related onshore (or maritime facing) facilities. USCG requires regulated
entities to conduct a security assessment and submit a facility security plan every five years,

69 Onshore and offshore exploration and production—a single function in the CISA National Critical Function Set —are
shown separately here for clarity.
Congressional Research Service

19

link to page 11 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

which covers a wide range of physical security requirements. Examples include layout and access
points of the covered facility; number, reliability, and security duties of facility personnel; and
procedures for controlling keys and other access prevention systems. Specific cybersecurity
guidance is limited to two provisions requiring regulated entities to describe measures to protect
“radio and telecommunication systems, including computer systems and networks” as part of the
assessment that informs the facility security plan.70 A subsequent USCG Navigation and Vessel
Inspection Circular provided voluntary guidelines to describe how general security provisions
might be specifical y applied to cybersecurity.71
The Bureau of Safety and Environmental Enforcement (BSEE), a Department of the Interior
agency, implements regulations codified under the Outer Continental Shelf Lands Act (OCSLA)
that cover safety of production systems.72 BSEE provides detailed regulatory guidance on process
safety and incident reporting for offshore dril ing instal ations, including industry-developed
voluntary consensus standards incorporated by reference into the Code of Federal Regulations,
which include both prescriptive specifications for equipment, testing, and operational protocols,
and risk-based performance standards. Although both are mandatory, the Safety and
Environmental Management System (SEMS) framework codified in subpart S of 30 C.F.R. §250
(see the “Federal Regulatory Authorities” section) aligns more closely with risk-management
approaches promoted via the voluntary CISR framework outlined in PPD-21 and the 2013 NIPP.
In recent years, regulations for Oil and Gas Production Safety Systems under subpart H of 30
CFR §250, which mandates compliance with regulations, codes, and standards for process safety,
have been subject to repeated rulemakings. They have general y faced greater industry resistance
than subpart S, which describes risk-management mandates. BSEE characterized the most recent
rulemaking in 2017—which revised an earlier 2016 rule—as necessary to simplify requirements
and relieve industry of unnecessary compliance burdens.73 Some environmental groups and
industrial safety advocates raised concerns over certain revisions relaxing third-party certification
requirements, incident reporting, and BSEE acceptance of revised voluntary consensus standards
developed by the American Petroleum Institute (API)—which acts both as an industry advocacy
group and ANSI-certified SDO.74
No industry-specific federal regulations for physical or cybersecurity, process safety, or supply
chain risk management exist for onshore production facilities—which tend to be regulated by
state agencies. However, state regulations do not necessarily address the risk categories listed
above.75 Furthermore, the onshore dril ing industry is exempt from OSHA’s Process Safety
Management (PSM) Standard, which regulates handling of hazardous chemicals in a wide range
of covered industries.76

70 33 C.F.R. 105.305.
71 Admiral Karl L. Schultz, Commandant, Navigation and Vessel Inspection Circular, U.S. Coast Guard, No. 01-20,
Washington, DC, February 26, 2020, https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/5ps/NVIC/2020/
NVIC_01-20_CyberRisk_dtd_2020-02-26.pdf?ver=2020-03-19-071814-023.
72 30 C.F.R. §250.
73 Bureau of Safety and Environmental Enforcement (BSEE), “Oil and Gas and Sulphur Operations on the Outer
Continental Shelf—Oil and Gas P roduction Safety Systems,” 83 Federal Register 49216, September 28, 2018.
74 BSEE, ibid, “General Comments on Incorporation by Reference of Industry Standards,” p. 49223.
75 See U.S. Chemical Safety and Hazard Investigation Board (CSB), Investigation Report, “Gas Well Blowout and Fire
at Pryor T rust Well 1H-9,” June 12, 2019, p. 107, https://www.csb.gov/pryor-trust-fatal-gas-well-blowout -and-fire/.
76 For discussion of regulatory history for process safety in the onshore upstream segment, see CSB, ibid., pp. 101 -107,
https://www.csb.gov/pryor-trust-fatal-gas-well-blowout -and-fire/.
Congressional Research Service

20

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Regulation of Fuel Refining and Processing of Fuels
OSHA requires covered entities such as oil refineries and natural gas processing facilities to
develop a process safety management plan under 29 C.F.R. §1910, to be updated every five years.
The plan must include process hazard analysis, employee training, incident investigation, and
reporting, among other components. Physical systems covered include pressure vessels and
storage tanks; piping systems and valves; relief and vent systems and devices; emergency
shutdown systems; controls (including monitoring devices and sensors, alarms, and interlocks);
and pumps. The regulation contains prescriptive elements, but also requires implementation of
risk-management programs for process safety. It grants covered entities wide discretion in
applying available standards to risk-management activities. Published implementation guidance
names several industry SDOs as possible sources for standards, but does not incorporate specific
standards into the regulation by reference.77
CISA administers the Chemical Facility Antiterrorism Standards (CFATS) program under 6
C.F.R. §27. Under the program, al facilities that store or process threshold amounts of certain
“chemicals of interest” must notify CISA. CISA may designate certain facilities as high-risk,
using an agency risk assessment methodology. Depending on risk tier (1-4), facility owner-
operators must submit a vulnerability assessment and site security plan that meets the CISA risk-
based performance standards for physical security and cybersecurity. CISA conducts inspections
of regulated facilities to ensure compliance. CISA does not publicly disclose vulnerability or
threat information provided by covered facilities.78 In the oil and gas subsector, CFATS applies
primarily to certain storage facilities, gas processing, and petroleum refineries in midstream and
downstream segments meeting high risk criteria.79
Regulation of Fuel Storage and Reserves
PHMSA, a Department of Transportation (DOT) agency under 49 C.F.R. §192,80 regulates large
underground natural gas storage facilities under the Protecting Our Infrastructure of Pipelines
Enhancing Safety (PIPES) Act of 2016 (P.L. 114-183). Among other provisions in the PIPES Act,
Congress mandated new regulations in response to the 2015 Aliso Canyon incident in
California—a large natural gas leak from an underground salt cavern being used as a storage
facility that caused health hazards and “serious energy-supply chal enges for the region.”81
PHMSA issued a final rule on February 12, 2020, that modified an earlier interim final rule issued
on December 19, 2016.82 Both rules incorporated by reference two API recommended practices
already in wide use.83 The interim rule required that recommended practices in the API

77 See 29 C.F.R. §1910.119, “Appendix C.”
78 See CISA, “CFAT S Process”, https://www.cisa.gov/cfats-process.
79 Letter from Frank Macchiarola, Vice President, Downstream and Industry Operations, American Petroleum Institute;
Christina Sames, Vice President, Operations and Engineering, American Gas Association ; and Dave Schryver,
Executive Vice President, American Public Gas Association, et al., op. cit., p. 3.
80 CRS Insight IN11162, PHMSA’s Pipeline Safety Reauthorization: Funding Issues, by Paul W. Parfomak.
81 Pipeline and Hazardous Materials Safety Administration, “Pipeline Safety: Safety of Underground Natural Gas
Storage Facilities,” 85 Federal Register 8107, February 12, 2020, https://www.federalregister.gov/documents/2020/02/
12/2020-00565/pipeline-safety-safety-of-underground-natural-gas-storage-facilities.
82 Ibid, “Summary of the Major Provisions,” pp. 8104-8127.
83 See API RP 1170, “Design and Operation of Solution-Mined Salt Caverns Used for Natural Gas Storage” (First
Edition, July 2015); and API RP 1171, “Functional Integrity of Natural Gas Storage in Depleted Hydrocarbon
Reservoirs and Aquifer Reservoirs” (First Edition, September 2015).
Congressional Research Service

21

link to page 5 link to page 15 link to page 15 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

documents be applied as mandatory. However, the final rule relaxed this provision, making
recommended practices voluntary. PHMSA also relaxed deadlines for operators to develop
integrity management programs and conduct baseline risk assessments, among other changes.84
Regulation of Pipeline Transport
Gathering pipelines—considered part of the midstream segment—are used to transport oil and
gas from extraction sites to central collection points for processing. These are not currently
regulated outside of populated areas or defined “unusual y sensitive” areas that include a drinking
water source or ecological resource.85
PHMSA regulates long-distance transmission and regional distribution pipelines, with a focus on
enforcing mandatory safety standards. This regulatory mission correlates most closely with the
process safety risk category (see the “Organization, Methods, and Scope of Report” section).
Readers interested in further information on pipeline safety regulations may refer to CRS Report
R44201, DOT’s Federal Pipeline Safety Program: Background and Key Issues for Congress, by
Paul W. Parfomak.
The Transportation Security Administration (TSA) within DHS administers the federal program
for pipeline security—both physical and cyber. (Additional y, pipelines connected to certain
facilities covered by CFATS are considered part of those facilities and therefore are subject to
CISA regulation under 6 C.F.R. §27.)
The Aviation and Transportation Security Act of 2001 (P.L. 107-71), which established TSA,
authorized the agency “to issue, rescind, and revise such regulations as are necessary” to carry out
its functions (§101). The Implementing Recommendations of the 9/11 Commission Act of 2007
(P.L. 110-53) directs TSA to promulgate pipeline security regulations and carry out necessary
inspection and enforcement if the agency determines that regulations are appropriate (§1557(d)).
TSA in the past favored industry compliance with voluntary guidelines for pipeline physical
security and cybersecurity.86 Both TSA and the pipeline industry maintained that regulations were
unnecessary because pipeline operators voluntarily implemented security programs.87 For more
information on the historical and current federal role in pipeline cybersecurity, see CRS Report
R46903, Pipeline Cybersecurity: Federal Programs, by Paul W. Parfomak and Chris Jaikaran.
The May 2021 ransomware attack against the Colonial Pipeline Company spurred panic buying
and fuel shortages along the Eastern Seaboard. Although the attack did not appear to target
pipeline control systems, it forced the temporary suspension of fuel shipments via a major
pipeline network, according to a company statement.88 In the wake of this incident, the Biden
Administration announced Executive Order (E.O.) 14028, “Improving the Nation’s
Cybersecurity,” on May 12, 2021, which created cybersecurity and information-sharing

84 Ibid, pp. 8104-8105. On November 15, 2021, PHMSA announced new regulation s. See footnote 31 for details.
85 See PHMSA, “Fact Sheet: Gathering Pipelines,” https://primis.phmsa.dot.gov/comm/factsheets/
fsgatheringpipelines.htm. On November 15, 2021, PHMSA announced it was issuing a final rule, effective May 16,
2022, to increase regulations on gathering pipelines. See footnote 31 for details.
86 T ransportation Security Administration (T SA), Pipeline Security Guidelines, March 2018, p. 1, https://www.tsa.gov/
sites/default/files/pipeline_security_guidelines.pdf.
87 See CRS Insight IN11667, Colonial Pipeline: The DarkSide Strikes, by Paul W. Parfomak and Chris Jaikaran, for
more info.
88 See, Colonial Pipeline Company, “Media Statement Update: Colonial Pipeline System Disruption,” press release,
May 17, 2021, https://www.colpipe.com/news/press-releases/media-statement -colonial-pipeline-system-disruption. An
earlier statement released on May 7, 2021, announcing the disruption is no longer on the company website.
Congressional Research Service

22

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

requirements applicable to federal agencies and government contractors. Administration officials
voiced hopes that the E.O. 14028 would compel private-sector owner-operators of pipelines and
other infrastructure to improve risk-management and information-sharing practices in these areas
as a condition of doing business with the federal government.89
Additional y, TSA issued an emergency security directive—which has the effect of a regulation—
for pipeline cybersecurity in May 2021 following the Colonial Pipeline ransomware attack. TSA
Security Directive Pipeline-2021-01, issued under authorities provided by 49 C.F.R. §114,
required regulated pipeline operators to report cybersecurity incidents, provide a cybersecurity
coordinator to liaise with TSA and CISA as needed “to coordinate cybersecurity practices and
address any incidents that arise,” and to review current activities against TSA voluntary
guidelines and to implement mitigation measures, and report results to TSA and CISA.90 A second
directive in July 2021 elaborated on requirements in the first directive.91 Although existing
authorities also cover physical security, TSA has not similarly exercised those authorities to date.
Voluntary Consensus Standards, Public-Private Partnerships, and
Information Sharing
In recent decades, a variety of public-private partnerships for risk management and information
sharing have developed in the oil and gas subsector. These programs and activities include
development of voluntary consensus standards, public-private partnerships for policy or
operational coordination, and information-sharing programs. These programs and activities may
encompass one or more risk categories covered in this report (i.e., process safety; physical
security; cybersecurity; supply-chain security and resilience), and may likewise apply to a
specific critical functional area of the oil and gas subsector, the oil and gas subsector as a whole,
or critical infrastructure in general.

89 T he White House, “Background Press Call by Senior Administration Officials on Executive Order Charting a New
Course to Improve the Nation’s Cybersecurity and Protect Federal Government Networks,” press release, May 12,
2021, https://www.whitehouse.gov/briefing-room/press-briefings/2021/05/12/background-press-call-by-senior-
administration-officials-on-executive-order-charting-a-new-course-to-improve-the-nations-cybersecurity-and-protect-
federal-government -networks/; also CRS Insight IN11683, Critical Infrastructure Policy: Inform ation Sharing and
Disclosure Requirem ents After the Colonial Pipeline Attack
, by Brian E. Humphreys.
90 T ransportation Security Administration, Security Directive Pipeline 2021-01, Enhancing Pipeline Security,
Springfield, VA, May 28, 2021, p. 1.
91 See T ransportation Security Administration, Security Directive Pipeline 2021-02, Pipeline Cybersecurity Mitigation
Actions, Contingency Planning, and T est ing, Springfield, VA, May 28, 2021. T he directive is not officially available to
the public. For a summary, see U.S. Government Accountability Office, Critical Infrastructure Protection: TSA Is
Taking Steps to Address Som e Pipeline Security Program Weaknesses
, GAO-21-105263, July 27, 2021, p. 1,
https://www.dwt.com/-/media/files/blogs/privacy-and-security-blog/2021/08/gao-critical-infrastructure-protection-july-
2021.pdf.
Congressional Research Service

23

link to page 28 link to page 48
Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Voluntary Consensus Standards and Recommended Practices in the Oil and
Gas Subsector

Voluntary consensus standards and
recommended practices for infrastructure risk
Figure 3. BSEE Standards Development
management in the oil and gas subsector have
Process
developed unevenly across industry segments
Agency and Private-Sector Col aboration
over time, focusing primarily on those
segments with a history of federal regulatory
oversight or interest, such as offshore
production facilities, refineries, and pipeline
networks. Federal regulatory regimes, public-
private coordination programs and activities,
and voluntary consensus standards within the
subsector often develop in conjunction with
each other, via both formal and informal
processes.
In some cases, industry standards and
recommended practices are developed with
participation of regulatory agencies in
accordance with standing federal policy
guidance promulgated under authority of the
National Technology Transfer and

Advancement Act (NTTAA) of 1995 (P.L.
Source: Adapted from BSEE Standards Development
104-113), and may either be incorporated into
Section, https://www.bsee.gov/what-we-do/offshore-
the C.F.R. by reference, or else left for
regulatory-programs/the-standards-development-
private-sector entities to adopt on a voluntary
section-sds.
basis.92
For example, BSEE maintains an office for joint standards development with private-sector
stakeholders, known as the Standards Development Section (SDS). According to an agency
website, “BSEE has a long history of using industry standards to supplement and enhance its
regulatory program.” Further, “As of December 2020, BSEE has incorporated by reference 125
industry standards in its regulations”93 Figure 3 (above) il ustrates the BSEE standards
development process.94

92 According to OMB Circular 119, “ Agencies must consult with voluntary consensus standards bodies, both domestic
and international, and must participate with such bodies in the development of voluntary consensus standards when
consultation and participation is in the public interest and is compatible with their missions, authorities, priorities, and
budget resources,” Office of Management and Budget, Executive Office of the President, OMB-119: Federal
Participation in the Developm ent and Use of Voluntary Consensus Standards and in Conform ity Assessm ent Activities
,
Washington, DC, January 2016, p. 27, https://www.nist.gov/system/files/revised_circular_a-119_as_of_01-22-
2016.pdf. See Appe ndix B in this report for further detail.
93 BSEE Standards Development Section, “Standards, Safety, and Industry Cooperation,” https://www.bsee.gov/what-
we-do/offshore-regulatory-programs/the-standards-development-section-sds.
94 Other relevant agencies similarly report participation in standards development. See USCG,
http://www.dco.uscg.mil/Our-Organization/Assistant -Commandant -for-Prevention-Policy-CG-5P/Commercial-
Regulations-standards-CG-5PS/; DOT , “ Standards Incorporated by Reference,” https://www.phmsa.dot.gov/standards-
rulemaking/pipeline/standards-incorporated-reference.
Congressional Research Service

24

link to page 30 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

In other cases, voluntary consensus standards and recommended practices are not formal y
incorporated into a regulatory framework. For example, a 2021 revised edition of API Standard
1164,“Pipeline Control Systems Cybersecurity,” intended for regulated pipeline operators, was
based on nonmandatory guidance from TSA Pipeline Security Guidelines (March 2018) and the
National Institute of Standards and Technology (NIST) Framework for Improving Critical
Infrastructure Cybersecurity.95 Even though TSA has long had the authority to regulate pipeline
physical security and cybersecurity, it relied on voluntary industry adoption of its cybersec urity
guidelines through the consensus process as the preferred means to advance CISR goals until
2021.96 Industry groups have argued that incorporation of federal voluntary guidelines into
voluntary consensus standards is preferable to regulation.97 However, the Colonial Pipeline
ransomware attack appeared to contradict this argument, prompting TSA to revise its stance on
regulatory restraint and issue its mandatory cybersecurity directives.98
API standards and recommended practices for risk management across national critical functions
in the oil and gas industry largely align with existing regulatory oversight programs.99 A CRS
review of relevant API documents il ustrates the general pattern of alignment between industry-
led standards development and regulatory requirements for risk management. Table 3
summarizes voluntary consensus standards and recommended practices for risk management
developed by API.100

95 See API Publications Store, Pipeline Control Systems Cybersecurity; T hird Edition, August 2021,
https://www.apiwebstore.org/publications/item.cgi?49847b7d-0a43-4d96-b0e2-b56d9acb6f2e.
96 CRS Insight IN11060, Pipeline Security: Homeland Security Issues in the 116th Congress, by Paul W. Parfomak.
97 For example, see Interstate National Gas Association of America, Pipeline Cyber & Physical Security, 2021,
https://www.ingaa.org/File.aspx?id=34999&v=5c0904b.
98 Some Senate Members have since expressed concerns that T SA may have exercised its authorities improperly by not
fully engaging in established consultative and collaborative processes with pipeline industry stakeholders. See Letter
from Hon. Rob Portman, Ranking Member, Committee on Homeland Security and Government Affairs, Hon. James
Lankford, Ranking Member, Subcommittee on Government Operations and Border Management, Committee on
Homeland Security and Governmental Affairs, and Hon. M. Michael Rounds, U.S. Senator, to Hon. Joseph V. Cufari,
Inspector General, Department of Homeland Security, October 28, 2021, https://www.hsgac.senate.gov/imo/media/doc/
2021-10-28%20RP%20Lankford%20Rounds%20to%20Cuffari%20re%20TSA%20Security%20Directives.pdf .
99 In its investigation of a 2018 oil rig explosion in Oklahoma, CSB noted that the well operator did not use API
Bulletin 97, Well Construction Interface Guidelines, a potentially applicable process safety document, because, “ API
Bulletin 97 implies it applies solely to the offshore drilling industry, not the onshore drilling industry. Application and
implementation of AP I Bulletin 97 guidance could have helped to prevent the incident. T here is also no regulatory
requirement for developing a Well Construction Interface Document for land drilling operations. Such a requirement
could improve the safety of U.S. land drilling operations.” See CSB, Investigation Report, Gas Well Blowout and Fire
at Pryor T rust Well 1H-9, Washington, D.C., June 12, 2019, p. 100, https://www.csb.gov/pryor-trust-fatal-gas-well-
blowout -and-fire/.
100 Analysis of performance-based risk-management standards and recommended practices from API standards catalog.
CRS reviewed the following catalog sections: “Exploration and Production”; “Marketing”; “T ransportation”;
“Refining”; and “Safety and Fire Protection.” See API, “Purchase API Standards and Software,” https://www.api.org/
products-and-services/standards/purchase?.
Congressional Research Service

25

link to page 31 link to page 31 link to page 31 link to page 31 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Table 3. API Standards Documents by Risk Type and Critical Function
Voluntary Consensus Standards for Risk Management in the Oil and Gas Subsector

Process Safety
Physical Security
Cybersecurity
Supply Chain
Exploration and
API RP 14J,
RP 70, Security for


Extraction of
Recommended
Offshore Oil and
Fuels (Offshore)
Practice for Design
Natural Gas
and Hazards
Operations (33
Analysis for
C.F.R. §105)a
Offshore
Production Facilities
(30 C.F.R. §250)a

RP 75, Safety and
RP 70I, Security for


Environmental
Worldwide
Management
Offshore Oil and
System (SEMS) for
Natural Gas
Offshore
Operations
Operations and
Assets (30 C.F.R.
§250)a

Bul 97, Wel



Construction
Interface Document
Guidelines
Exploration and
Bul 75L Guidance



Extraction of
Document for
Fuels (Onshore)
SEMS for Onshore
ONG Production
Fuel Refining and
RP 580, Risk-Based



Processing of
Inspection
Fuels
(Refineries)

RP 752,



Management of
Hazards Associated
with Location of
Process Plant

RP 754, Process



Safety Performance
Indicators for
Refining and
Petrochemical
Industries
Fuel Storage and
Std 2350, Overfil



Reserves
Protection for
Storage Tanks in
Petroleum Facilities

RP 1170, Design



and Operation of
Solution-Mined Salt
Caverns Used for
Natural Gas
Storage (49 C.F.R.
§60141)a
Congressional Research Service

26

link to page 31 link to page 15 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain


Process Safety
Physical Security
Cybersecurity
Supply Chain

RP 1171, Functional



Integrity of Natural
Gas Storage in
Depleted
Hydrocarbon
Reservoirs and
Aquifer Reservoirs
(49 C.F.R. § 60141)a
Pipeline
RP 1173, Pipeline

Std 1164, Pipeline

Transport
Safety Management
Control Systems
Systems
Cybersecurity

RP 1160, Managing



System Integrity for
Hazardous Liquid
Pipelines
Source: CRS analysis of performance-based risk-management standards and recommended practices from API
standards catalog. See API, “Purchase API Standards and Software,” https://www.api.org/products-and-services/
standards/purchase?. CRS reviewed the fol owing catalog sections: “Exploration and Production ,” “Marketing,”
“Transportation,” “Refining,” and “Safety and Fire Protection.”
Notes: Does not include ANSI/API Standard 780, “Security Risk Assessment Methodology for the Petroleum
and Petrochemical Industries,” a generic security risk assessment methodology applicable to physical and cyber
systems and assets. The document focuses on threats and hazards to maritime-facing distribution facilities, oil
refineries, pipelines, and truck and rail transportation. Abbreviations: Std=standard; RP=recommended practice,
Bul =bul etin.
a. C.F.R. references in parentheses denote incorporation of voluntary consensus standard by reference.
This general relationship between regulatory regimes and development of recommended practices
and voluntary consensus standards depicted above is reflected across the risk categories covered
in this report:
 12 of 15 standards or recommended practices focus on process safety, the most heavily
regulated risk category across industry segments.
 API recommended practices for management of physical security risks apply to offshore
production and maritime-facing facilities—which are subject to USCG regulatory
oversight under MTSA—but not to other oil and gas industry segments where physical
security is not regulated.
 The API generic standard for security risk assessments focuses on regulated maritime
facilities, refineries, and pipeline networks.
 General API recommended practices for risk management in the industry focus on
process safety in regulated offshore facilities, refineries, storage facilities, and pipeline
networks.
 The API cybersecurity standard applies exclusively to pipelines, which are increasingly
subject to regulatory oversight from PHMSA and TSA in the w ake of the Colonial
Pipeline incident.101

101 See CRS Insight IN11683, Critical Infrastructure Policy: Information Sharing and Disclosure Requirements After
the Colonial Pipeline Attack
, by Brian E. Humphreys. Also see footnote 31 for description of expanded PHMSA
oversight.
Congressional Research Service

27

link to page 9 link to page 9 link to page 9 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Other nonindustry-specific SDOs have produced relevant standards and recommended practices
that have been widely adopted across the oil and gas subsector, according to industry sources.102
The International Electrotechnical Commission (IEC) publishes generic standards for industrial
control systems security, which draw upon risk-based approaches.103 Additional y, the
International Standards Organization (ISO) has jointly published generic standards with IEC for
information security management systems, as wel as standards for SCRM specific to the oil and
gas industry.104
Organization of Public-Private Partnerships for Coordination and Information
Sharing in the Oil and Gas Subsector

DHS is the lead federal agency for coordinating CISR partnerships with the private-sector (see
the “Federal Nonregulatory Authorities” section). Several coordination and information-sharing
bodies organized under the PPD-21 framework provide a nexus for public-private collaboration
for CISR in the oil and gas, and transportation systems (pipelines) critical infrastructure
subsectors.
Sector Coordinating Councils
SCCs in the oil and natural gas subsector and pipeline subsector are self-organized by
nongovernmental stakeholders as the counterpart to GCCs (see “Federal Nonregulatory
Authorities”
). The Energy GCC—co-chaired by the DOE and DHS—is the government
counterpart to both recognized energy subsectors’ coordinating councils. The Oil and Gas
Subsector Coordinating Council (ONG SCC), organized under the NIPP framework and CIPAC
charter, the government counterpart to ONG SCC. According to its charter, ONG SCC provides
“a private forum for effective coordination of oil and natural gas security strategies and activities,
policy, and communication across the sector to support the nation’s homeland security
mission.”105
The ONG SCC also includes the Pipeline Working Group (PLWG), which serves as the subject
matter advisory group to the ONG SCC for security matters and information sharing, including
intel igence. (As the Pipeline Sector Coordinating Council (PSCC), the same group serves as the
industry counterpart to the Transportation Systems—Pipeline Modal GCC, which is organized
under Transportation Systems GCC auspices.)106 Additional y, the ONG SCC maintains working
groups for cybersecurity, information sharing, cross-sector coordination, regulatory engagement,
and emergency management.107 Membership of the ONG SCC and PLWG is comprised primarily
of industry trade groups for policy advocacy and standards setting, as wel as other industry
representatives from major oil and gas companies.

102 ONG SCC, Defense-in-Depth, op. cit., p. 16.
103 International Electrotechnical Commission IEC 62433. See IEC, “IEC Webstore”, https://webstore.iec.ch/.
104 For example, ISO 29001-2020 and ISO/IEC 27000 family.
105 ONG SCC, Governance Principles and Operating Procedures, August 2020, p. 1, http://ongsubsector.com/
documents/ONG-SCC-Charter-082020a.pdf.
106 Pipeline Working Group, Pipeline Sector Coordinating Council, Charter, November 2014, https://www.cisa.gov/
sites/default/files/publications/Pipeline-SCC-Charter-508.pdf; and ONG SCC Governance Principles, op. cit., p. 6,
which reads “ Due to the dual coverage of pipelines under the NIPP within both the Energy and T ransportation Sectors,
a standing Pipeline Working Group has been established as a working group under the ONG SCC. T he Pipeline
Working Group under the ONG SCC also serves as the Pipeline SCC for the T ransportation Sector.”
107 See ONG SCC, “About the ONG SCC: Working Groups,” http://ongsubsector.com/.
Congressional Research Service

28

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Information Sharing and Analysis Centers
The Oil and Natural Gas (ONG) ISAC is an industry owned and operated nonprofit, which serves
as “a central point of coordination and communication” across industry segments for sharing
cyber threat information among member organizations and government partners.108 A
membership committee adjudicates applications according to organizational bylaws governing
eligibility. Eligible entities include public and private oil and natural gas companies; certain ICT
service providers, technology integrators, control systems service providers, and security
providers; and certain trade or industry associations, other ISACs and information-sharing
organizations, academic institutions, and research organizations.
Access to shared information is restricted by membership category using the Traffic Light
Protocol (TLP).109 Information labeled “red,” the most restricted category, is shared only “in the
room” with smal defined groups—apparently representatives of large oil and gas firms with
upper-tier memberships. “Amber,” or confidential information, is available on a limited basis to
other members at lower tiers, such as ICT service providers and nonprofit groups, but is not
shared outside the ISAC membership. “Green” information may be shared with members,
relevant government entities, and “strategic partners.” “White” information may be shared with
the general public subject to copyright rules.110
Membership dues vary by service tier and member type. Large for-profit firms with annual
revenue greater than $15 bil ion pay $50,000 annual y for the “platinum” package, while
nonprofits pay $2,000 for the “nonprofit plus” package or $0 for a basic package.111 Platinum
members have full access to shared information. Information sharing with nongovernmental
entities at lower membership tiers and government agencies is restricted to varying degrees. This
tiered membership structure based on pricing and organization type potential y creates
information asymmetries among ISAC members in favor of large for-profit firms.
The Cybersecurity Information Sharing Act of 2015 (P.L. 114-113) contains several relevant
provisions that govern exchange of information on cyber threats between private-sector
organizations—such as the ONG SCC—and government agencies at the federal, state, and local
levels.112 The legislation requires federal agencies to provide classified cyber threat information
to private-sector partners with appropriate security clearances. Additional y, it exempts any
information provided by private-sector entities under the statute from disclosure under the
Freedom of Information Act (FOIA; P.L. 89-487) and other statutes governing public access to
government records, as wel as from any use in litigation, antitrust actions, or regulatory
enforcement.

108 See Oil and Natural Gas Information Sharing and Analysis Center (ONG ISAC), “Protecting Critical Infrastructure:
ONG-ISAC Mission,” https://ongisac.org/.
109 For information on T LP, see CISA, “T raffic Light Protocol (TLP) Definitions and Usage,” https://www.cisa.gov/tlp.
110 See ONG-ISAC, “Protecting Critical Infrastructure: T raffic Light Protocol,” https://ongisac.org/.
111 See ONG-ISAC, “Industry Membership,” https://ongisac.org/membership/industry-membership/#.
112 ONG SCC states, “In 2015, the natural gas and oil industry was a leading supporter of the first -ever legal
framework to govern cybersecurity information sharing. T he Cybersecurity Act of 2015 enabled cybersecurity threat
indicators to be shared between and among companies and the U.S. Government, established the legal requirements
and protections for such sharing, and established DHS as the hub for government and private -sector cybersecurity
information sharing.” See ONG SCC and Natural Gas Council, Defense-in-Depth: Cybersecurity in the Natural Gas &
Oil Industry
, 2018, p. 18, http://naturalgascouncil.org/wp-content/uploads/2018/10/Defense-in-Depth-Cybersecurity-in-
the-Natural-Gas-and-Oil-Industry.pdf.
Congressional Research Service

29

link to page 23 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

The Critical Infrastructure Information Act of 2002 (P.L. 107-296) provides similar protections
for confidentiality, as wel as limitations on use of protected information in legal or regulatory
proceedings. Information may relate to systems, assets, and networks in any designated
infrastructure sector. Under this authority, DHS created the Protected Critical Infrastructure
Information (PCII) program, which is currently administered by CISA.
In addition to the ONG ISAC, the Downstream Natural Gas (DNG) ISAC serves natural gas
utility (distribution) companies in coordination with the Electricity ISAC, “facilitating
communications between participants, the federal government and other critical
infrastructures.”113 For more information on federal agency pipeline cybersecurity activities, see
CRS Report R46903, Pipeline Cybersecurity: Federal Programs, by Paul W. Parfomak and Chris
Jaikaran. For more information on E-ISAC and federal agency electric grid cybersecurity
activities, see CRS Report R45312, Electric Grid Cybersecurity, by Richard J. Campbel .
Federal Advisory Committees
As of December 2021, DOE—the SRMA for the energy sector—manages 22 federal advisory
committees in accordance with FACA provisions. Advisory committee members typical y
represent a variety of stakeholder groups, consisting of “the users, industries, and organizations in
the public and private sectors that could be directly affected by the work of the committee.”114
The National Petroleum Council (NPC) is the Oil and Natural Gas Advisory Committee to the
Secretary of Energy. According to NPC, “The sole purpose of the Council is, at the Secretary of
Energy’s request, to advise, inform, and make recommendations to the Secretary, and through the
Secretary, to the Executive Branch, on matters pertaining to oil and natural gas or to the oil and
gas industries.”115
DHS manages the National Offshore Safety Advisory Committee (NOSAC). According to its
charter, NOSAC provides “advice to the Secretary of the Department of Homeland Security on
matters relating to activities directly involved with, or in support of, the exploration of offshore
mineral and energy resources, to the extent that such matters are within the jurisdiction of the
Coast Guard.”116 The Coast Guard regulates offshore exploration and extraction safety and
security under MTSA (see the “Regulation of Exploration and Production of Oil and Natural Gas”
section).
Coordination and Information-Sharing Activities
Standards development, public-private coordination, and information-sharing activities take place
under the federal CISR voluntary framework, both across the oil and gas subsector and with
relevant government agencies. Some are specific to the oil and gas subsector, while others apply
general y across critical infrastructure sectors, but have been adopted by some oil and gas
subsector stakeholders.

113 See “Downstream Natural Gas ISAC,” https://www.isao.org/information-sharing-group/sector/downstream-natural-
gas-isac/.
114 See DOE, “Federal Advisory Committee Management,” https://www.energy.gov/management/office-management/
operational-management/federal-advisory-committee-management.
115 National Petroleum Council, “Department of Energy Calls Industry Pandemic Performance Invaluable,” press
release, December 15, 2020, https://www.npc.org/NPC-postmtg-121520.pdf.
116 DHS and USCG, National Offshore Safety Advisory Committee Charter, July 1, 2021, p. 1, https://www.dhs.gov/
sites/default/files/publications/2021_nosac_charter.pdf.
Congressional Research Service

30

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Examples of Public-Private Coordination
In 2011, API and other industry stakeholders founded the Center for Offshore Safety (COS) to
provide “tools, peer learning opportunities, good practices, and support for companies on the U.S.
Outer Continental Shelf” and to help industry “meet its safety and sustainability objectives” under
the SEMS process.117 In May 13, 2021, testimony to the Senate Committee on Energy and
Natural Resources, the COS Director—a former USCG officer and lead regulator for offshore oil
and gas safety, security, and environmental compliance—described integration of COS
information-sharing initiatives with regulatory requirements, saying: “The COS is playing a
central role in both advancing a culture of safety in offshore operations and providing an
important interface with government regulators,”118 Activities include collection and analysis of
SEMS third-party audit data, incident data, and safety performance data, which in turn have been
posted on the COS public website and shared with regulators.119
In the onshore segment, API works with other SDOs and maintains an active membership in the
National Service, Transmission, Explorations and Production Safety (nSTEPS) Network,
“founded in 2003 in South Texas by OSHA and industry to reduce injuries and fatalities.”
According to API, it meets regularly with other stakeholders to share information and best
practices related to workplace safety.120 Additional y, API has sponsored the OSHA Oil and Gas
Safety Conference.121
In 2014, NIST published a widely-referenced cybersecurity framework (“the NIST framework”)
for critical infrastructure in fulfilment of White House Executive Order (E.O.) 13636, “Improving
Critical Infrastructure Cybersecurity.”122 The NIST framework cal s for development of industry-
specific profiles, which it describes as “an organization’s unique alignment of their organizational
requirements and objectives, risk appetite, and resources against the desired outcomes of the
Framework Core.” Further, “Profiles can be used to identify opportunities for improving
cybersecurity posture by comparing a ‘Current’ Profile with a ‘Target’ Profile.”123 As described
below, the NIST framework has been widely used to inform development of cyber risk-

117 See Center for Offshore Safety (COS), “Who We Are,” https://www.centerforoffshoresafety.org/About-COS/Who-
We-Are; also API, “ API: Board of Directors Approves Industry Center for Offshore Safety,” press release, March 17,
2011, https://www.prnewswire.com/news-releases/api-board-of-directors-approves-industry-center-for-offshore-safety-
118198374.html.
118 U.S. Congress, Senate Committee on Energy and Natural Resources, Testimony of Russell Holmes, Director, Center
for Offshore Safety
, Full Committee Hearing to Examine Offshore Energy Development, 117 th Cong., 1st sess., May 13,
2021, pp. 4-5, https://www.energy.senate.gov/services/files/16817187-8CDB-4806-BC57-28062DF95AF5.
119 Ibid, p.4.
120 API, API Commitment to Safety: Onshore Oil and Gas Extraction, 2016, pp. 1-2, https://www.api.org/-/media/Files/
Policy/Safety/14-Industry-commitment-to-onshore-safety.pdf.
121 API is listed as the “Pinnacle Sponsor” of the 2021 Oil and Gas Safety and Health Conference. According to the
event website, the conference “ will focus on two regulated segments in the oil and gas industry: safety and health and
environmental. As always, the conference will provide a platform to exchange new ideas and concepts related to the oil
and gas industry, all with the overriding goal of achieving better safety and environmental operations and regulatory
com pliance
[emphases added].” See University of T exas, Arlington, “ Oil & Gas Safety and Health Conference 2021
OSHA Exploration & Production,” https://web.cvent.com/event/026fff5e-30a0-47af-bed6-32487a092a4a/summary?rt=
NR4KMwT QrEC83OCoRg_T JA.
122 Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” Public Papers of the Presidents of the
United States:
Barack H. Obam a (Washington: GPO, 2013), https://obamawhitehouse.archives.gov/the-press-office/
2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity.
123 See NIST , “Cybersecurity Framework: An Introduction to the Components of the Network,” https://www.nist.gov/
cyberframework/online-learning/components-framework.
Congressional Research Service

31

link to page 28 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

management guidance for the critical infrastructure enterprise general y, and the oil and gas
subsector specifical y.
USCG—consulting with ONG SCC and other industry partners—used the NIST framework to
develop a profile for the Maritime Bulk Liquids Transfer (MBLT) and Offshore Facilities mission
areas regulated under MTSA authorities.124 The profile was intended as “nonmandatory guidance”
for industry partners to aid compliance with 33 C.F.R. 154-156, which regulates a range of MBLT
and offshore facilities’ systems and operations related to handling of oil and other hazardous
materials.125 The profiles identified potential cybersecurity vulnerabilities relating to regulated
systems and operations, and provided users with guidance on making risk assessments and
implementing cybersecurity plans.
Since 2012, DOE has developed the Cybersecurity Capability Maturity Model (C2M2) for
industry partners in the energy critical infrastructure sector, including the oil and gas subsector.
C2M2 is developed in reference to the NIST Framework. The 2021 update to C2M2 lists ONG
SCC and the Electricity SCC as the primary private-sector sponsors of the document, and lists
dozens of oil and gas industry representatives from al segments as contributors.126 Unlike the
USCG cybersecurity profiles described above, C2M2 does not refer to a regulatory framework
and is not intended to facilitate regulatory compliance.127 DOE and its private-sector partners
designed C2M2 to be used by relevant industries in conjunction with an online self-evaluation
tool to benchmark current capabilities or “maturity” of cybersecurity programs and practices, and
plan for future improvements.128 It covers several related domains, such as risk management,
third-party (or supply-chain) risk management, and threat and vulnerability management.129
As noted above (see “Voluntary Consensus Standards and Recommended Practices”), TSA has
issued a series of voluntary Pipeline Security Guidelines (“the guidelines”), most recently in
2018. TSA developed the guidelines in collaboration with industry representatives and the
Pipeline GCC and SCC.130 These guidelines were developed to inform voluntary TSA
consultations with pipeline sector stakeholders, and were intended to be advisory rather than
regulatory in nature.131 The guidelines recommend that pipeline operators should “consider the
approach outlined in the NIST Framework and the guidance issued by DHS and the Department
of Energy along with industry-specific or other established methodologies, standards, and best
practices.”132
Members of the Interstate Natural Gas Association of America, which represent the majority of
interstate natural gas pipeline operators in the United States, have committed to following the

124 USCG, Maritime Bulk Liquids Transfer, Offshore Operations, and Passenger Vessel Cybersecurity Framework
Profiles
, Version 3, Washington, D.C., December 2017, https://www.dco.uscg.mil/Portals/9/CG-FAC/Documents/
Cyber%20Profiles%20Overview.docx.
125 Ibid, p. vi.
126 DOE, Cybersecurity Capability Maturity Model (C2M2), Version 2.0, Washington, DC, July 2021, p. iii,
https://www.energy.gov/sites/default/files/2021-07/C2M2%20Version%202.0%20July%202021_508.pdf .
127 Ibid, p. vi.
128 Ibid, p. 5.
129 See DOE, Office of Cybersecurity, Energy Security, and Emergency Response, “Components of the C2M2,”
https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2.
130 T ransportation Security Administration (T SA), Pipeline Security Guidelines, March 2018, p. 1, https://www.tsa.gov/
sites/default/files/pipeline_security_guidelines.pdf.
131 Ibid.
132 Ibid, p. 22.
Congressional Research Service

32

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

guidelines and the NIST Framework.133 Voluntary commitments have since been superseded in
part by the first of two TSA security directives issued in the wake of the Colonial Pipeline
incident. The May 2021 directive requires covered pipeline operators to:134
 review Section 7 of the guidelines;
 assess whether current practices and activities to address cyber risks to
Owner/Operators Information and Operational Technology systems align with
the guidelines;
 identify any gaps; and
 identify remediation measures that wil be taken to fil those gaps and a timeline
for implementing these remediation measures.
Examples of Information Sharing
A table in a 2018 report, titled “Defense in Depth: Cybersecurity in the Natural Gas & Oil
Industry,” ONG SCC lists several examples of “information sharing with industry partners”—two
of which were facilitated by ONG-ISAC.135 In the first case, an oil and natural gas company
shared information via the ONG-ISAC about a phishing campaign. The ONG-ISAC used the
information to identify and notify other companies being targeted. In the second case, an oil and
natural gas company analyst researched “known personalities, their associates and supporters
involved in il egal activities during global natural gas and oil protests”—apparently a reference to
anti-industry protestors that target oil and gas infrastructure with disruptive and potential y il egal
tactics. The company shared a “threat information package” via DNG-ISAC, which included
examples of “successful legal mitigations used by Federal, State, Local, Tribal and Territorial
partners.”136
The overal nature and scope of information sharing between ONG-ISAC and its governmental
and private-sector partners is unclear from these two examples. However, the report states:
Industry works closely with the government agencies responsible for cybersecurity
throughout each of these segments—from Coast Guard regulatory oversight in maritime
and maritime-facing facilities to Transportation Security Administration (TSA) regulatory
oversight of pipelines, as well as bi-directional sharing with the U.S. intelligence
community via the Department of Homeland Security (DHS)/NIST’s National
Cybersecurity & Communications Integration Center (NCCIC), DOE, FBI and others—
ensuring collaboration and communication at every point.137
Broader federal efforts to increase sharing of cyber threat indicators and defensive measures
between the private sector and federal agencies on a larger scale via automated means have
produced modest results, according to a 2019 interagency report to Congress in compliance with
the Cybersecurity Information Sharing Act of 2015.138 According to the report, “as of June 2019,

133 ONG SCC, Defense in Depth, op. cit., p. 23; and Interstate Natural Gas Association of America, “Commitments to
Pipeline Security,” https://www.ingaa.org/File.aspx?id=34310&v=836b69e4.
134 See T ransportation Security Administration, Security Directive Pipeline 2021-01, Enhancing Pipeline Security,
Springfield, VA, May 28, 2021, p. 4.
135 Ibid, p. 21. T he report lists a total of five examples. T wo involve ONG ISAC, two involv e other peer-to-peer
sharing, and one involves E-ISAC. It is unclear from the examples in the ONG SCC report what additional information
may have been shared by ONG-ISAC with private-sector or public-sector partners.
136 Ibid.
137 Ibid, p. 7.
138 See Office of the Inspector General of the Intelligence Community (OIGIC), Unclassified Joint Report on the
Congressional Research Service

33

link to page 33 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

only four Federal and six non-Federal entities used AIS to share cyber threat information.” (AIS
refers to the Automated Indicator System—the automated capability mandated by the act, which
is provided by CISA.)139 The report identified several obstacles to greater information sharing,
including restrictive classification processes; limited interoperability of relevant ICT systems;
industry liability concerns; and perceived quality and relevance of information shared via
automated means.140 In response to these concerns, CISA began adding context to AIS data and
has developed an industry engagement plan, according to the report.141
The PCII program (see the “Information Sharing and Analysis Centers” section) has also faced
obstacles to widespread adoption by private-sector stakeholders, according to a 2006 Government
Accountability Office (GAO) report.142 More recently, DHS initiated a rulemaking process in
2016 to update PCII program regulations codified under 6 C.F.R. Part 29. (An updated rule has
not been published as of December 2021.) DHS received a total of 11 responses during the
comment period from corporate entities and individuals.143 The response from Berkshire
Hathaway Energy—the only energy company to submit comments—offered both praise and
criticism for the PCII program.144
Berkshire Hathaway Energy organizations have used the PCII protections as key
confidence-building measure in engagements involving numerous Department of
Homeland Security offices as well as other related partners including the Federal Energy
Regulatory Commission, Department of Energy, Department of Defense, Federal Bureau
of Investigation and numerous state law enforcement agencies. PCII provides a common
framework across multiple political and administrative boundaries for establishing a key
baseline set of reasonable protections.
Berkshire Hathaway Energy stated that it had participated “in more than a dozen” PCII
engagements. However, the company also expressed concerns about persistent obstacles to
information sharing.
The most significant concern is that regulatory discretion by the Department of Homeland
Security PCII authorities could expose sensitive information that was offered in good faith
and with the expectation of PCII protections submitted in the future .... The U.S.
government’s track record of protecting both classified and non-classified information
leaves room for improvement.

Im plem entation of the Cybersecurity Inform ation Sharing Act of 2015 , AUD-2019-005-U, Washington, DC, December
19, 2019, p. 11, https://www.oversight.gov/report/icig/unclassified-joint -report-implementation-cybersecurity-
information-sharing-act-2015.
139 See CISA, “Automated Indicator Sharing,” https://www.cisa.gov/ais.
140 OIGIC, op. cit., pp. 3 and 11.
141 Ibid, p. 11.
142 U.S. Government Accountability Office, Information Sharing: DHS Should Take Steps to Encourage More
Widespread Use of Its Program to Protect and Share Critical Infrastructure Inform ation
, GAO-06-383, April 2006,
https://www.gao.gov/assets/gao-06-383.pdf.
143 See Regulations.gov, “Proposed Rule: Updates to Protected Critical Infrastructure Program,”
https://www.regulations.gov/document/DHS-2016-0032-0001, posted by DHS on April 21, 2016; and Regulations.gov,
“Proposed Rule: Updates to Protected Critical Infrastructure Program,” https://www.regulations.gov/document/DHS-
2016-0032-0003, posted by DHS on May 13, 2016.
144 Berkshire Hathaway Energy, Comments on Proposed Updates to Protected Critical Infrastructure Program , July
18, 2016, pp. 1-2.
Congressional Research Service

34

link to page 12 link to page 34 link to page 28 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Discussion and Analysis
The federal CISR policy framework affords significant autonomy to the private sector, which
owns and operates much of the nation’s critical infrastructure. In many instances relevant federal
agencies rely upon private-sector partners to develop and implement voluntary consensus
standards and recommended practices to manage risk across each of the 16 official y recognized
critical infrastructure sectors, and to engage in voluntary public-private partnerships.
In public communications, oil and gas subsector stakeholders frequently present the compulsory
and voluntary aspects of the federal CISR enterprise in binary terms, wherein more of one
necessarily means less of the other. For example, the ONG SCC states in its 2018 cybersecurity
report, “The reliance upon voluntary mechanisms, including ... proven frameworks and public-
private collaboration, rather than compulsory standards or regulations, is the most effective and
robust way to bolster the cybersecurity of industry companies and the critical infrastructure they
operate.”145
Such statements echo those made by successive presidential administrations since the creation of
the modern CISR enterprise in the late 1990s. These have general y advocated for voluntary
public-private collaboration and coordination as the preferred and most efficient means to
leverage industry expertise in highly complex and dynamic critical infrastructure sectors (see the
“Balancing Coordination and Regulatory Authorities” section). Relevant executive orders,
strategy documents, and agency programs in recent decades have therefore general y sought to
preempt potential regulatory burdens through collaborative development of risk-based standards,
best practices, and information sharing with private-sector partners.
The apparent alignment of voluntary public-private partnerships with emerging or evolving
regulatory regimes in the oil and gas subsector as described in this report suggests that—in actual
practice—private-sector participation in voluntary CISR programs and activities is significantly
conditioned by the structure of federal regulatory authorities and oversight. Voluntary best
practices and information-sharing initiatives and regulatory regimes are frequently co-constituted
as elements of a common enterprise, and coexist within specific functional areas of the oil and
gas subsector (see the “Coordination and Information-Sharing Activities” section).146
Federal participation in the voluntary consensus standards development process in the oil and gas
subsector occurs most among agencies such as PHSMA, USCG, and BSEE that have significant
regulatory roles (see “Voluntary Consensus Standards and Recommended Practices” section).147
For example, USCG—the DHS agency that enforces security regulations under MTSA—states in
the 2018 annual DHS agency report to NIST required under NTTAA that participation in
voluntary consensus standards processes “helps the Coast Guard fulfil its regulatory functions
more efficiently, develop the Government/industry partnerships crucial to stewardship, and gain
valuable public feedback necessary for effective policy development.”148 CISA and TSA—DHS

145 ONG SCC, Defense-in-Depth, op. cit., p. 26.
146 For a theoretical discussion of this process, see Rebecca Slayton and Aaron Clark -Ginsberg, “Beyond Regulatory
Capture: Coproducing Expertise for Critical Infrastructure Protection,” Regulation & Governance, vol. 12, no. 1
(March 2018).
147 See NIST , “NT T AA Reports,” https://standards.gov/NT TAA/Report/viewAgencyReport.aspx, for access to
congressionally-mandated annual federal agency reports to NIST .
148 See “Department of Homeland Security Fiscal Year 2018 Agency Report ,” https://standards.gov/NT TAA/Report/
viewAgencyReport.aspx. By contrast, the report indicates that other DHS agencies (CISA and T SA) focus on IT ICT
cybersecurity standards and aviation security technology respectively.
Congressional Research Service

35

link to page 28 link to page 28 link to page 35 link to page 35 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

agencies with lesser regulatory footprints in the oil and gas subsector—used the report to
highlight activities in other critical infrastructure sectors.
Major industry SDOs have general y developed risk-management standards in critical functional
areas and risk categories where regulatory concerns exist (see the “Voluntary Consensus
Standards and Recommended Practices
” section), either to pursue incorporation of voluntary
consensus standards documents by reference into existing regulatory regimes or preemption of
regulation in the first place. There may be less impetus for voluntary consensus standards
development in unregulated or lightly regulated areas of the subsector.
The record indicates that API and other industry organizations have been most active in
developing risk-management standards and investing in voluntary public-private partnerships in
heavily regulated industry segments, such as offshore fuel exploration and extraction. For
example, the Center for Offshore Safety (COS) industry safety group provides aggregated
incident data to industry regulators. BSEE claims to have used this data to inform regulatory
oversight, and many regulatory filings cite examples of public-private coordination and
collaboration under COS auspices.149 By contrast, safety programs for the onshore exploration
and extraction segment, such as the nSTEPS Network described in the “Examples of Public-
Private Coordination” section, do not appear to have produced comparable public-private
partnerships, or publicly available safety and security data.
Private-sector stakeholders in the oil and gas subsector often claim that—regardless of regulatory
requirements—applicable standards for process safety, security (both physical and cyber), and
SCRM enjoy wide adoption throughout the industry. For example, in its 2018 cybersecurity
report, ONG SCC states that, “Cybersecurity in the natural gas and oil industry applies
throughout the value chain, extending from wel heads to pipelines and through to the supply of
natural gas to an electric power generation facility or gas utility, or the supply of oil to a refinery
and through to a gasoline station.”150
Assessing the accuracy of such statements is beyond the scope of this report. However, the
limited availability of relevant information that could potential y be used for an assessment of
cybersecurity or other CISR risk profiles in the oil and gas subsector is a source of concern for
some observers. For example, the LLNL report states:
Strict cybersecurity regulations govern power, chemical and nuclear facilities, but no
federal laws impose such standards in the ONG industry.151 When ONG companies have
been compromised, they aren’t required to report the cyber incident. Even when they turn
to federal authorities for help, the specifics are typically kept secret because companies
disclose information in exchange for anonymity and discretion. The Department of
Homeland Security (DHS) publishes aggregated data on cyber-attacks within the ONG
sector, but with no mandatory reporting requirements for asset owners, the data may be
representative of only a small share of the cyberattacks against the energy industry.152
Information sharing among competing entities within the private sector, and between private-
sector owner-operators of critical infrastructure and federal security agencies, were among the

149 See BSEE, “Oil and Gas and Sulphur Operations in the Outer Con tinental Shelf: Safety and Environmental
Management Systems Revisions,” 78 Federal Register 20427, April 5, 2013.
150 ONG SCC, Defense in Depth, op. cit., p. 17.
151 For overview of electric grid cybersecurity enforceable standards, see CRS Report R45312, Electric Grid
Cybersecurity
, by Richard J. Campbell; CRS In Focus IF10853, Chem ical Facility Anti-Terrorism Standards, by Frank
Gottron; and CRS Report R42853, Nuclear Energy: Overview of Congressional Issues, by Mark Holt .
152 LLNL Report, op. cit. p. 13.
Congressional Research Service

36

link to page 33 link to page 33 link to page 28 link to page 28 link to page 37 link to page 37 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

core policy concerns that gave impetus to the CISR enterprise from its earliest days. Key
legislation, such as the Critical Infrastructure Information Act of 2002 and the Cybersecurity
Information Act of 2015, have sought to elicit sharing of sensitive information by limiting federal
oversight authorities and providing assurances of confidentiality and certain immunities to owner-
operators of critical infrastructure. However, results appear to be modest (see “Information
Sharing and Analysis Centers”
). As seen in the 2016 plant explosion in Pascagoula, MS,
information secrecy can have catastrophic consequences (see text box, “Unmanaged Risk and
Disruption of Critical Supply Functions”).153
Information and data gaps may affect risk-management activities in several ways, according to
experts. First, such gaps may hinder public and private-sector stakeholders from developing a
consensus understanding of relevant risks based on accurate assessments of hazards and
vulnerabilities affecting critical systems, assets, and networks. Second, such gaps may obscure
understanding of both the technical content of risk-management programs, and the manner and
extent of their implementation across the oil and gas subsector. This in turn may hinder
assessment of the appropriateness and effectiveness of voluntary consensus standards,
recommended practices, and guidelines as applied in practice, especial y when multiple standards
may be applicable and stakeholder consensus is weak (see the “Voluntary Consensus Standards
and Recommended Practices” section).154
The structure of voluntary guidance, and its relationship to relevant regulatory frameworks, may
affect information sharing. Again, comparison of offshore and onshore exploration and extraction
segments may be il ustrative. The offshore segment, regulated under OCSLA and MTSA
authorities, provides a notable contrast with other segments. For example, the USCG
cybersecurity profiles for operators of offshore and MBLT facilities are intended as
nonmandatory guidance to aid compliance with 33 C.F.R. 154-156, which covers safety standards
for maritime oil and gas transfer facilities. However, they are structured in such a way that
private-sector entities using them would necessarily provide information about cybersecurity
vulnerabilities and mitigations to USCG regulators under the reporting requirements of 33 C.F.R.
105-106. Additional y, SEMS requirements have apparently led to industry development of a
robust community of interest for information sharing and analysis under COS auspices (see
“Examples of Information Sharing”).
By contrast, the DOE C2M2 model is designed primarily to facilitate information sharing within
organizations using the self-assessment tool (see “Examples of Information Sharing”). Although
the model applies to al critical infrastructure within the energy sector with cyber-interfaces—
including the various critical functional areas of the oil and gas subsector—it specifical y
excludes integration with regulatory compliance regimes that would facilitate sharing information
about cybersecurity vulnerabilities or mitigations with external entities, including federal
agencies.
The appropriate purpose, scope, extent, and content of regulation in the oil and gas subsector, and
its implications for development of CISR communities of interest, remain salient concerns for oil
and gas subsector stakeholders. Many subsector stakeholders view increased regulatory burdens
as its own category of risk.155 For such stakeholders, ensuring that critical infrastructure risk-
management continues to be largely based on voluntary public-private collaboration, rather than
regulation, is likely to be a priority. Advocates for this approach frequently claim that owner-

153 CSB, Case Study: Loss of Containment, Fires, and Explosions at Enterprise Products Midstream Gas Plant, No.
2016-02-I-MS, February 13, 2019, p. 38. https://www.csb.gov/assets/1/6/final_case_study_-_enterprise.pdf.
154 Ibid, pp. 31, 38-39.
155 BDO 2017, op. cit., p.6.
Congressional Research Service

37

link to page 35 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

operators are best positioned to assess and manage risks to their critical systems, assets, and
networks. Overly prescriptive approaches, they say, may make risk management less efficient—
i.e., expending more resources for less overal risk mitigation.
Others question whether the existing emphasis on voluntary industry participation and consensus
is achieving necessary levels of risk reduction or mitigation in a high-risk critical infrastructure
subsector. Among federal agencies, CSB in particular has often exercised its advisory authorities
to highlight regulatory gaps and to advocate setting and enforcing specific risk reduction goals for
oil and gas infrastructure operators.156 The 2021 incidents affecting electricity supply in Texas and
fuel supplies on the East Coast, described above, focused congressional attention on perceived
failures of the voluntary CISR framework. Numerous hearings and legislative proposals raised
the issue of new regulatory authorities and functions to protect critical infrastructure.157 However,
significant congressional support stil exists for the voluntary public-private partnership model.158
117th Congress Legislation
Congress enacted a number of provisions to improve cybersecurity of the bulk power system
under Subtitle B, “Cybersecurity,” of the Infrastructure Investment and Jobs Act (P.L. 117-58),
focusing on voluntary assessments, information sharing, investment incentives, grants, and
technical assistance from DOE, DHS, and other federal agencies. One provision specifical y
includes elements of the oil and gas subsector. “Modeling and Assessing Energy Infrastructure
Risk,” directs the Secretary of Energy, in coordination with other federal agencies, to develop a
$50 mil ion program to improve vulnerability assessments and modeling capabilities, research
infrastructure and hardening solutions, conduct exercises, and update the DOE C2M2 model to
include physical security (see “Examples of Public-Private Coordination”). The purpose of the
program is to secure electric, natural gas, and oil exploration, transmission, and delivery networks
“in the face of natural and human-made threats and hazards, including electric magnetic pulse and
geomagnetic disturbances.”
The Ransom Disclosure Act (S. 2943) would require certain entities to disclose ransom payments
to DHS. Specifical y, within 48 hours of paying a ransom, disclosure must be made to DHS by
any entity that (1) is engaged in interstate commerce, (2) is engaged in an activity affecting
interstate commerce, or (3) receives federal funds. DHS must annual y publish information
disclosed, including the total dollar amount paid, without revealing identifying information.
Although not specific to the oil and gas subsector, this legislation would affect Colonial Pipeline
Company and other subsector companies subjected to ransomware attacks.
The Cyber Incident Reporting for Critical Infrastructure Act of 2021 (H.R. 5440) would establish
a new CISA Cyber Incident Review Office responsible for collecting and reviewing incident data
from covered critical infrastructure entities, as wel as facilitating bidirectional information
sharing between relevant private-sector stakeholders and government intel igence agencies.

156 For example, U.S. Chemical Safety and Hazard Investigation Board, Drilling Rig Explosion and Fire at the
Macondo Well
, vol. 4, Washington, DC, April 20, 2017.
157 For example, U.S. Congress, Senate Committee on Homeland Security and Governmental Affairs, National
Cybersecurity Strategy: Protection of Federal and Critical Infrastructure System s
, 117th Cong., 1st sess., September 23,
2021, and U.S. Congress, House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure
Protection, and Innovation, Stakeholder Perspectives on the Cyber Incident Reporting for Critical Infrastructure Act of
2021
, 117th Cong., 1st sess., September 1, 2021.
158 See Portman et al., op. cit., p. 1. T he letter to the DHS Inspector General in response to T SA directives f or pipeline
security in 2021 reads in part, “Our critical infrastructure must be secured and protected against cyberattacks. However,
securing critical infrastructure requires a collaborative approach with the experts in these industries—the people who
operate this critical infrastructure and who are charged with implementing these directives.”
Congressional Research Service

38

link to page 43 link to page 43 Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Covered critical infrastructure entities would be subject to certain requirements (subject to agency
rulemaking) for reporting cybersecurity incidents to the Cyber Incident Review Office.
The Defense of United States Infrastructure Act of 2021 (S. 2491) would establish a National
Cyber Resilience Assistance Fund, “to improve the ability of the Federal Government to assist in
enhancing critical infrastructure cyber resilience, to improve security in the national cyber
ecosystem, to address Systemical y Important Critical Infrastructure, and for other purposes.” The
proposed grant program would al ow DHS to award cybersecurity resilience improvement grants
to eligible private-sector entities under three conditions:
 presence of “clearly defined cybersecurity risk” affecting critical infrastructure
 insufficient private-sector incentives to mitigate risk
 clear need for federal responsibility to mitigate identified risks
The proposed legislation also contains provisions for cloud based information sharing across
federal agencies, a product certification program for designated “critical information and
communications technology” based on to-be-developed consensus standards, and establishment
of a Bureau of Cybersecurity Statistics with DHS to track and analyze cyber incident data.
Several bil s in the 117th Congress would affect federal pipeline cybersecurity programs,
including the Pipeline Security Act (H.R. 3243), the Pipeline and LNG Facility Cybersecurity
Preparedness Act (H.R. 3078), the Promoting Interagency Coordination for Review of Natural
Gas Pipelines Act (H.R. 1616), and the Energy Product Reliability Act (H.R. 6084). These bil s
primarily deal with federal agency roles and responsibilities in the pipeline sector, and
interagency coordination. For discussion of these bil s and related issues, see the “Issues for
Congress” section in this report.159
116th Congress Legislation
The Consolidated Appropriations Act, 2021 (P.L. 116-260), enacted under the 116th Congress,
contains the Leonel Rondon Pipeline Safety Act (the Act), named after a Massachusetts resident
kil ed in a residential natural gas explosion. The Act directed the Secretary of Transportation to
promulgate regulations to require new standards for downstream gas distribution operators’
integrity management plans for low-pressure pipelines. Among other provisions, it required
operators to assess hazards of cast iron pipes and mains (if present) and system pressure
anomalies, and to consider factors other than past anomalies when making assessments.
Additional y, it specifical y prohibited operators from determining that there are no consequences
associated with low-probability events without appropriate engineering or other justification.
Issues for Congress
With respect to critical infrastructure risk management in the oil and gas sector, Congress may
consider several specific issues of potential interest: the role of federal agencies in industry-led
standards development processes and reliance on industry associations to provide standards used
for regulatory purposes; information sharing and incident disclosure requirements and the
structure and governance of information-sharing bodies; and optimization of regulatory,
nonregulatory, or hybrid frameworks that combine voluntary guidance and public -private
coordination with risk-management mandates.

159 For additional information (except H.R. 6084), see CRS Report R46903, Pipeline Cybersecurity: Federal
Program s
, by Paul W. Parfomak and Chris Jaikaran.
Congressional Research Service

39

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Legislation introduced or enacted in the 116th and 117th Congresses may have implications for al
of these issues, both within the oil and gas subsector (including pipelines) and among other
critical infrastructure sectors and subsectors. Taken together, this legislation indic ates
congressional focus on several key areas:
 directly supporting private-sector risk mitigation investments, particularly in
cybersecurity;
 closing data gaps through creation of new agency functions and regulatory
requirements for cybersecurity incident reporting;
 revised agency roles and responsibilities for critical infrastructure security and
resilience; and
 expanded scope of mandatory physical and cybersecurity standards.
The Voluntary Critical Infrastructure Security and Resilience Framework
Some legislation suggests a fundamental y altered approach to critical infrastructure security and
resilience risk management as a national enterprise. For example, the current framework places
primary responsibility for risk management for privately owned systems, assets, and networks on
owner-operators—including the costs of risk mitigation. S. 2491 identifies market failures as
having potential to discourage necessary infrastructure security and resilience investments by the
private sector, and proposes a government funding mechanism—i.e., a new series of homeland
security grants—to address identified gaps. It is perhaps a tacit acknowledgement that private-
sector business imperatives may not necessarily align with national risk-management goals in al
or most cases—a key assumption of the existing framework. In any case, federal funding for
private-sector risk mitigation would represent a new direction for the critical infrastructure
enterprise, placing increased responsibility on the federal government to support private-sector
investment in critical infrastructure security and resilience.
H.R. 3078 would elevate the role of DOE in voluntary risk-management programs “through
councils or other entities in sharing, analysis, or sector coordinating, to ensure the security,
resiliency, and survivability of natural gas pipelines (including natural gas transmission and
distribution pipelines), hazardous liquid pipelines, and liquefied natural gas facilities.” Similar
functions are currently carried out by TSA and DOT in the Transportation Systems Sector, which
includes the Pipeline Modal Subsector. The bil contains a savings clause which preserves
existing agency authorities while modifying DOE authorities and mandates in the subsector. In
the FY2020 NDAA, Congress mandated DHS updates to critical infrastructure sectors and
SRMAs. As of this writing, no updates have been publicly released that would indicate revised
roles and responsibilities of SRMAs.
Information Sharing, Data Gaps, and Incident Reporting Requirements
Congress continues to show interest in information sharing as a key component of efforts to make
relevant data for risk management more widely available to critical infrastructure sector
stakeholders. Existing programs described in this report are predicated upon industry wil ingness
to share critical information if the federal government eliminates or mitigates certain barriers to
information sharing by providing assurances of anonymity and discretion. The comparatively
modest results of these programs have increased congressional interest in mandates to compel
disclosure of critical infrastructure vulnerabilities or incidents, such as those proposed in S. 2943
and H.R. 5440, described above.
Congressional Research Service

40

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

In recent years, Congress has enacted a number of strategy development and risk assessment
requirements for federal agencies entrusted with critical infrastructure security and resilience.
Congress has likewise created agencies and offices to exercise necessary analytical functions to
fulfil these requirements—the Cybersecurity and Infrastructure Security Agency Act of 2018 that
created CISA is one such example. The Bureau of Cybersecurity Statistics proposed under S.
2491 would further centralize federal functions for critical infrastructure risk analyses and
assessments, while also creating a new demand signal for critical infrastructure data.
Regulatory Authorities and Oversight of Pipeline Security
Pipeline security continues to elicit congressional attention, particularly in the wake of the 2021
Colonial Pipeline Company ransomware attack and other widely publicized failures. Issues of
agency jurisdiction, mission, and coordination with other agencies were raised in legislation
introduced in the 117th Congress. H.R. 3243 revises TSA duties, requiring it to enhance pipeline
security operations in coordination with CISA, and creating a pipeline security section with TSA.
This mandate presupposes a more assertive regulatory role and capability for TSA. Prior to the
Colonial Pipeline incident, TSA general y focused on cultivating public-private partnerships with
pipeline operators and promulgating voluntary guidelines.
H.R. 6084 would fundamental y restructure the regulatory framework for pipeline infrastructure
security and resilience, proposing a framework that closely paral els the one currently in force in
the electricity subsector. It would give the Federal Energy Regulatory Commission (FERC), an
independent agency within DOE, authority to create an independent industry reliability
organization (the “Energy Product Reliability Organization”) responsible for developing and
implementing mandatory pipeline reliability standards for cybersecurity, physical security, and
supply coordination (for electricity generation facilities), under agency regulatory oversight.
FERC’s current regulatory role in the pipeline subsector focuses on siting and rate-setting issues.
However, FERC already oversees an industry reliability organization (the “Electricity Reliability
Organization”) in the electricity subsector which performs a function similar to that proposed in
H.R. 6084.



Congressional Research Service

41


Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Appendix A. Oil and Gas Subsector Supply-Chain
Diagrams

Figure A-1. Hydrocarbon Liquids (Oil) Supply Chain

Source: National Petroleum Council
Notes: See National Petroleum Council, Enhancing Emergency Preparedness: Government and Oil & Natural Gas
Industry Actions to Prepare, Respond, and Recover
, p. H-2, Washington, DC, 2014.

Congressional Research Service

42


Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Figure A-2. The Natural Gas and Natural Gas Liquids Supply Chain

Source: National Petroleum Council.
Notes: See National Petroleum Council, Enhancing Emergency Preparedness: Government and Oil and Natural Gas
Industry Actions to Prepare, Respond, and Recover
, p. G-2, Washington, DC, 2014.



Congressional Research Service

43

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain

Appendix B. The National Standards System:
Federal Roles, Authorities, and Policies
The origins of the national standards development process date back more than a century. Public
and private-sector stakeholders developed the system to facilitate increased industrial efficiency
and expansion of domestic and global markets for U.S. goods.160 Stakeholder categories include
individual enterprises; industry groups; accredited standards developing organizations (SDOs);
public-private coordinating bodies; and regulatory agencies.
The federal government supports, but does not directly administer, the national standards system.
The American National Standards Institute (ANSI), a private nonprofit organization, coordinates
private-sector standards development through its accreditation process. Industry participation is
voluntary. However, only ANSI-accredited SDOs may seek recognition of proposals as American
National Standards. Private-sector entities may use the ANSI process to develop American
National Standards to facilitate recognition and acceptance by federal and international regulatory
bodies. According to ANSI, American National Standards are based on several factors, including
industry consensus; an open and transparent development process; balance among stakeholders;
and due process. (SDOs may also publish recommended practices that may meet some, but not
al , requirements for ANSI standards.) The national standards system is both decentralized and
competitive—i.e., private-sector SDOs seek wide recognition and acceptance for proprietary
voluntary consensus standards offered for sale to interested stakeholders.
The National Institute of Standards and Technology (NIST), a Department of Commerce agency,
provides technical support to private-sector accreditation bodies and domestic SDOs, but does not
set voluntary consensus standards in most cases, except for cybersecurity. Under the
Cybersecurity Enhancement Act of 2014 (P.L. 113-274), Congress directed NIST to “on an
ongoing basis, facilitate and support the development of a voluntary, consensus-based, industry-
led set of standards, guidelines, best practices, methodologies, procedures, and processes to cost-
effectively reduce cyber risks to critical infrastructure ... to coordinate closely and regularly with
relevant private-sector personnel and entities, critical infrastructure owners and operators, and
other relevant industry organizations, including Sector Coordinating Councils and Information
Sharing and Analysis Centers, and incorporate industry expertise.” [emphasis added]
The National Technology Transfer and Advancement Act (NTTAA) of 1995 (P.L. 104-113) and
OMB Circular A-119 together provide legislative and national standards policy guidance to
federal agencies. Specifical y, federal agencies are required to participate in the deliberations of
standards-setting bodies and to use voluntary consensus standards developed under the national
system “whenever practicable and appropriate.” The OMB circular does not directly reference
critical infrastructure security and resilience. It focuses on reducing burdens to private-sector
contractors caused by competing federal agency and private-sector standards. Nonetheless,
relevant regulatory agencies have cited it when developing risk-based performance standards in
partnership with regulated entities. Many of the largest oil and gas industry associations that
exercise both standards development and policy advocacy functions are members of relevant
PPD-21 coordination bodies.



160 Maureen A. Breitenberg, The ABC’s of Standards Activities, National Institute of Standards and T echnology
(NIST ), NIST IR 7614, Gaithersburg, MD, August 2009.
Congressional Research Service

44

Critical Infrastructure Risk Management: Securing the Oil and Gas Supply Chain


Author Information

Brian E. Humphreys

Analyst in Science and Technology Policy



Disclaimer
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan
shared staff to congressional committees and Members of Congress. It operates solely at the behest of and
under the direction of Congress. Information in a CRS Report should n ot be relied upon for purposes other
than public understanding of information that has been provided by CRS to Members of Congress in
connection with CRS’s institutional role. CRS Reports, as a work of the United States Government, are not
subject to copyright protection in the United States. Any CRS Report may be reproduced and distributed in
its entirety without permission from CRS. However, as a CRS Report may include copyrighted images or
material from a third party, you may need to obtain the permission of the copyright holder if you wish to
copy or otherwise use copyrighted material.

Congressional Research Service
R46987 · VERSION 1 · NEW
45