Skip to main content
An official website of the United States government
The .gov means it's official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you're on a federal government site.
The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Search:
Agenda
Reg Review
ICR
This script is used to control the display of information in this page.
Display additional information by clicking on the following:
All
Brief and OIRA conclusion
Abstract/Justification
Legal Statutes
Rulemaking
FR Notices/Comments
IC List
Burden
Misc.
Common Form Info.
Certification
View Information Collection (IC) List
View Supporting Statement and Other Documents
Please note that the OMB number and expiration date may not have been determined when this Information Collection Request and associated Information Collection forms were submitted to OMB. The approved OMB number and expiration date may be found by clicking on the Notice of Action link below.
View ICR - OIRA Conclusion
OMB Control No:
1652-0056
ICR Reference No:
202207-1652-001
Status:
Historical Active
Previous ICR Reference No:
202111-1652-001
Agency/Subagency:
DHS/TSA
Agency Tracking No:
Title:
Pipeline Corporate Security Review
Type of Information Collection:
Revision of a currently approved collection
Common Form ICR:
No
Type of Review Request:
Emergency
Approval Requested By:
07/27/2022
OIRA Conclusion Action:
Approved with change
Conclusion Date:
07/29/2022
Retrieve Notice of Action (NOA)
Date Received in OIRA:
07/27/2022
Terms of Clearance:
Given that this is an emergency approval that does not have the benefit of public input prior to implementation, the agency will brief OIRA on the comments it has received and lessons learned as it implemented this package when this package is resubmitted during the next six months following the normal notice and comment procedures. TSA will also work toward allowing as much time for comment as possible possible on its emergencies to avoid new aspects of its collections going into effect without the benefit of public input.
Inventory as of this Action
Requested
Previously Approved
Expiration Date
01/31/2023
6 Months From Approved
07/31/2023
Responses
440
0
331
Time Burden (Hours)
60,220
0
12,830
Cost Burden (Dollars)
0
0
0
Abstract:
Under the Aviation and Transportation Security Act (ATSA)and delegated authority from the Secretary of Homeland Security, TSA is tasked with developing policies, strategies, and plans for dealing with transportation security. TSA carries out this responsibility in the pipeline mode by assessing current industry security practices by way of its Pipeline Corporate Security Review (PCSR) program.
Emergency Justfication:
On May 8, 2021, the Colonial Pipeline Company announced that it had halted its pipeline operations due to a ransomware attack. This attack received national attention as it temporarily disrupted critical supplies of gasoline and other refined petroleum products throughout the East Coast. Such attacks pose significant threats to the country’s infrastructure and economic well-being. Since then the federal government has been working closely with industry partners to address the threat. The pipeline sector continues to face a significant cybersecurity threat. Recent Joint Cybersecurity Advisories from CISA, the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) highlight this threat: • February 7, 2022: The Office of the Director for National Intelligence released the Annual Threat Assessment of the U.S. Intelligence Community, which noted that “China almost certainly is capable of launching cyber-attacks that would disrupt critical infrastructure services within the United States, including against oil and gas pipelines and rail systems.” • March 24, 2022: CISA, FBI, and the Department of Energy (DOE) released Joint Cybersecurity Advisory (AA22-083A), Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector. • March 24, 2022: The FBI’s Cyber Division released a Private Industry Notification (PIN 20220324-001), Triton Malware Remains Threat to Global Critical Infrastructure Industrial Control Systems (ICS), which warned that Russian actors continue to conduct activity targeting the global energy sector. • April 13, 2022: CISA, FBI, NSA and DOE released Joint Cybersecurity Advisory (AA22-103A), APT Cyber Tools Targeting ICS/SCADA Devices, which warned that certain advanced persistent threat (APT) actors have exhibited the capability to gain full system access to multiple industrial control system (ICS)/supervisory control and data acquisition (SCADA) devices. • On April 20, 2022: CISA, FBI, NSA, and International Partners issued Joint Cybersecurity Advisory (AA 22-110A), Demonstrated Threats and Capabilities of Russian State-Sponsored and Cyber Criminal Actors. • June 7, 2022: CISA and NSA released Joint Cybersecurity Advisory (AA22-158A), People’s Republic of China (PRC) State-Sponsored Cyber Actors Exploit Network Providers and Devices, which identified the use of publicly known vulnerabilities in order to establish a broad network of compromised infrastructure. To protect against this escalating cybersecurity threat, TSA is preparing to issue SD Pipeline-2021-02C, which would cancel and supersede SD Pipeline-2021-02B. SD Pipeline-2021-02C contains several collections of information that require TSA to amend its currently approved OMB control number 1652-0056, Pipeline Corporate Security Review (PCSR). There is no change to the collection requirements regarding the voluntary Pipeline Corporate Security Review Program (PCSR). TSA is requesting emergency approval for a revision of OMB Control Number 1652-0056 to update the information collection requirements from SD Pipeline-2021-02C.
Authorizing Statute(s):
US Code:
6 USC 1207
Name of Law: 9/11 Commission Act
US Code:
49 USC 114(d)
Name of Law: US Code 49, Transportation
Citations for New Statutory Requirements:
None
Associated Rulemaking Information
RIN:
Stage of Rulemaking:
Federal Register Citation:
Date:
Not associated with rulemaking
Federal Register Notices & Comments
Did the Agency receive public comments on this ICR?
No
Number of Information Collection (IC) in this ICR:
6
IC Title
Form No.
Form Name
Annual Plan for Cybersecurity Assessment Program
Compliance Documentation
Cybersecurity Implementation Plan
Cybersecurity Incident Response Plan
PCSR Process
PCSR Re-interview
ICR Summary of Burden
Total Approved
Previously Approved
Change Due to New Statute
Change Due to Agency Discretion
Change Due to Adjustment in Estimate
Change Due to Potential Violation of the PRA
Annual Number of Responses
440
331
0
109
0
0
Annual Time Burden (Hours)
60,220
12,830
0
47,390
0
0
Annual Cost Burden (Dollars)
0
0
0
0
0
0
Burden increases because of Program Change due to Agency Discretion:
Yes
Burden Increase Due to:
Miscellaneous Actions
Burden decreases because of Program Change due to Agency Discretion:
No
Burden Reduction Due to:
Short Statement:
TSA is making program changes as a result of the collections to be implemented upon issuance of SD Pipeline 2021-01C.
Annual Cost to Federal Government:
$1,149,765
Does this IC contain surveys, censuses, or employ statistical methods?
No
Does this ICR request any personally identifiable information (see
OMB Circular No. A-130
for an explanation of this term)? Please consult with your agency's privacy program when making this determination.
Yes
Does this ICR include a form that requires a Privacy Act Statement (see
5 U.S.C. §552a(e)(3)
)? Please consult with your agency's privacy program when making this determination.
No
Is this ICR related to the Affordable Care Act [Pub. L. 111-148 & 111-152]?
No
Is this ICR related to the Dodd-Frank Wall Street Reform and Consumer Protection Act, [Pub. L. 111-203]?
No
Is this ICR related to the American Recovery and Reinvestment Act of 2009 (ARRA)?
No
Is this ICR related to the Pandemic Response?
No
Agency Contact:
Christina Walsh 571 227-2062 christina.walsh@tsa.dhs.gov
Common Form ICR:
No
On behalf of this Federal agency, I certify that the collection of information encompassed by this request complies with 5 CFR 1320.9 and the related provisions of 5 CFR 1320.8(b)(3).
The following is a summary of the topics, regarding the proposed collection of information, that the certification covers:
(a) It is necessary for the proper performance of agency functions;
(b) It avoids unnecessary duplication;
(c) It reduces burden on small entities;
(d) It uses plain, coherent, and unambiguous language that is understandable to respondents;
(e) Its implementation will be consistent and compatible with current reporting and recordkeeping practices;
(f) It indicates the retention periods for recordkeeping requirements;
(g) It informs respondents of the information called for under 5 CFR 1320.8 (b)(3) about:
(i) Why the information is being collected;
(ii) Use of information;
(iii) Burden estimate;
(iv) Nature of response (voluntary, required for a benefit, or mandatory);
(v) Nature and extent of confidentiality; and
(vi) Need to display currently valid OMB control number;
(h) It was developed by an office that has planned and allocated resources for the efficient and effective management and use of the information to be collected.
(i) It uses effective and efficient statistical survey methodology (if applicable); and
(j) It makes appropriate use of information technology.
If you are unable to certify compliance with any of these provisions, identify the item by leaving the box unchecked and explain the reason in the Supporting Statement.
Certification Date:
07/27/2022