Home' RTCA Documents for Review : DO-230H FRAC Contents 206
© 2017, RTCA, Inc.
What do we need in order to accomplish those goals?
Do those need fit with the existing and planned infrastructure, the operational constraints, and the
An appropriately designed and information-rich SOC is necessary to bring about accurate and timely
situational awareness that informs the decisions being made about the conditions and locations reported by
the various sensors installed throughout the integrated airport security system. Considering the operational
security functions of each airport and what constitutes a clear, complete operational picture from moment
to moment can also inform your decisions about what information needs to flow into the SOC, and how it
can be processed and distributed. Where the information comes from, how much of it is manually and/or
automatically fed to and from security systems and personnel will also help to determine the necessary
information system architecture and will help understand what additional training the SOC staff will need.
Clearly, SOC design must be closely mirror the requirements that evolve from each of the other chapters in
this document – perimeter sensors, access control, CCTV/surveillance, communications, and the manner in
which the IT infrastructure is integrated to bring all that diverse data into the SOC for analysis and response.
For purposes of this chapter, we will focus primarily on those areas of concern that occur within the SOC
once the data has arrived by a variety of means; each such data flow is described in significant detail in the
other chapters. Once the data has arrived in the SOC, it is necessary to know what information is likely to
be received (or not), what it informs, where it came from, what it means, how it may relate to other data
(trends, thresholds, multiple simultaneous events), and what tools are necessary to manage the abundance
of information that comes in and goes out.
The SOC and its operator has become, in effect, a “first responder” in determining what to do with all that
information. The operator may compare and analyze data, accept or reject its relevance in their dynamic
situational awareness environment, but data is not being created or modified in the SOC. The operator is a
user of all the tools in the SOC to decode and correlate inbound data to make things happen (or stop them
from happening), and communicate those action items to relevant parties for response. Note that there is a
continuing need for constant SOC operations (communications of changing conditions as events evolve,
etc.), for which the SOC should have an Operators Manual and complete training available to fully
understand all the possible variations of incoming data, and the capabilities and limitations of the tools and
resources available to respond.
The Physical Access Control System (PACS) is the primary system that determines permissions
for persons seeking unescorted access to security- related areas throughout the airport. This
includes airport and air carrier employee access, certain contractor permissions, controls at
perimeter vehicle and pedestrian gates, and access through various tenant facilities. When a
violation of those permissions is perceived by the system, a notification is sent to the SOC to
determine what, if any, response is appropriate. For purposes of coordination with other chapters,
credentials and biometrics are deemed to be integral subsets of access control, and are not dealt
with separately in the SOC; only referentially as “contributors” to an appropriate PACS input to
The Perimeter Intrusion Detection System (PIDS) is typically a combination of many types of
sensors located around the perimeter of an airport, including visual surveillance, motion detectors,
vibration sensors, certain types of radar and other evolving technologies, all of which are capable
of sending signals through the IT system to the SOC. It is useful to note that the term “perimeter”
is not necessarily limited to remote fence lines, water barriers, or other natural boundaries; it often
includes lines of demarcation within terminals, hangars, tenant facilities, general aviation areas,
etc. The boundaries of security related areas are generally outlined in TSA regulations and are
specifically delineated in each Airport Security Program.
Links Archive Navigation Previous Page Next Page