actionable process steps and focused mitigation strategies 1
TRANSCRIPT
![Page 1: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/1.jpg)
Actionable Process Steps and Focused Mitigation Strategies
http://www.fda.gov/fsma
1
![Page 2: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/2.jpg)
Actionable Process Steps
• Defined as:– “a point, step, or procedure in a food process
at which food defense measures can be applied and are essential to prevent or eliminate a significant vulnerability or reduce such vulnerability to an acceptable level.”
2
![Page 3: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/3.jpg)
History of FDA Vulnerability Assessments
![Page 4: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/4.jpg)
Using Vulnerability Assessments to Identify Key Activity Types
• Distill individual processing steps down to the basic activity being conducted– Standardize diverse processing steps for
analysis
• Use information gathered in vulnerability assessments to target mitigation strategies to most vulnerable areas
4
![Page 5: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/5.jpg)
Using Vulnerability Assessments to Identify Key Activity Types
• Results of this analysis show:– Certain processing steps repeatedly ranked
high across vulnerability assessments, regardless of food
– Focus on the activity being conducted at high ranking processing steps
– Common vulnerabilities can be organized into broad activity groups = key activity types
5
![Page 6: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/6.jpg)
Proposed Requirements
6
![Page 7: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/7.jpg)
Key Activity Type I: Bulk Liquid Receiving and Loading
• Likelihood of uniform mixing (sloshing and turbulence)
• High volume of food is at risk• Activity where an “outsider” could gain
access (e.g. truck driver)
7
![Page 8: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/8.jpg)
Key Activity Type II:Liquid Storage and Handling
• Likelihood of uniform mixing – Tanks are frequently agitated
• High volume of food is at risk – Especially in bulk storage or ingredient
metered tanks• Frequently located in isolated areas,
increasing the likelihood an attacker could gain access without being observed
8
![Page 9: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/9.jpg)
Key Activity Type III:Secondary Ingredient Handling
• Likelihood of uniform mixing– ingredient handling is likely immediately prior
to a mixing step
• High volume of food is at risk• Ingredients are open and accessible
9
![Page 10: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/10.jpg)
Key Activity Type IV:Mixing and Similar Activities
• Likelihood of uniform mixing • High volume of food is at risk• Food is typically accessible• Extended mixing times may present
opportunity for the attacker to “choose the best moment” to introduce a contaminant
10
![Page 11: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/11.jpg)
Sample Processes not Considered Key Activity Types
• Conveyer belts, augers, flumes, etc.• Bulk storage of dry ingredients• Finished ingredient storage (containerized)• Packaging• Baking, frying, pasteurization, etc.• Dry ingredient receiving/loading• Frozen storage
![Page 12: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/12.jpg)
Perform a Facility-Specific Vulnerability Assessment
• Perform a vulnerability assessment using appropriate methods and qualified individual(s)
• Identify and prioritize points in food operation that are vulnerable to intentional adulteration
• Identify actionable process steps for significant vulnerabilities
12
![Page 13: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/13.jpg)
Elements of a Facility-Specific Vulnerability Assessment
• Evaluate agents of concern• Assemble vulnerability assessment team• Develop process flow diagram
13
![Page 14: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/14.jpg)
Elements of a Facility-Specific Vulnerability Assessment cont.
• Identify significant vulnerabilities, consider:– Public health impact– Downstream processing– Physical access to product– Ability of aggressor to contaminate product– Volume of product impacted
• Identify actionable process steps
14
![Page 15: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/15.jpg)
Actionable Process Steps
• Requirements:– Identified using key activity types, or– Identified by vulnerability assessment– Identification and assessment must be written
15
![Page 16: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/16.jpg)
Proposed Requirements
16
1. Actionable Process Steps
Option 1
Option 2
Assess whether your facility has one or more of these FDA-identified key activity types*:1. Bulk liquid receiving and loading2. Liquid storage and handling3. Secondary ingredient handling4. Mixing and similar activities
Identify actionable process steps for each applicable key activity type
Perform a vulnerability assessment using appropriate methods and qualified individual(s)
Identify actionable process steps for significant vulnerabilities
Identify and prioritize points in food operation that are vulnerable to intentional adulteration
2. Focused Mitigation Strategies• Identify and implement focused
mitigation strategies at actionable process steps
3. Monitoring• Establish and implement procedures
for monitoring focused mitigation strategies
4. Corrective Actions• Establish and implement procedures
for corrective actions if focused mitigation strategies are not properly implemented
5. Verification• Verify that monitoring is conducted• Verify that appropriate decisions
about corrective actions are made• Verify that focused mitigation
strategies are consistently implemented and are effective
• Conduct reanalysis of the food defense plan, as appropriate
*FDA identified these key activity types using findings of vulnerability assessments of over 50 food products and processes. These activity types commonly rank high in vulnerability based on various factors, including the ability to physically access the food or process and the potential to adulterate a sufficient quantity of product in order to cause massive public health harm.
![Page 17: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/17.jpg)
Focused Mitigation Strategies
• Defined as:– “those risk-based, reasonably appropriate measures
that a person knowledgeable about food defense would employ to significantly minimize or prevent significant vulnerabilities identified at actionable process steps, and that are consistent with the current scientific understanding of food defense at the time of the analysis”
17
![Page 18: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/18.jpg)
Focused Mitigation Strategies
• Applied in response to an identified significant vulnerability– Customized to the actionable processing step– Tailored to the facility– Depend on an evaluation of vulnerabilities
18
![Page 19: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/19.jpg)
Types of Mitigation Strategies
• FDA categorizes mitigation strategies into two buckets: – Broad mitigation strategies: general facility-
level measures not necessarily specific to the product or process, for example:
– Exterior fencing, periodic employee drug testing, visitor sign-in procedures, cyber-security, contractor or supplier audits
19
![Page 20: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/20.jpg)
Types of Mitigation Strategies cont.
– Focused mitigation strategies: • Specific and customized to the actionable
processing step where they are applied.• More effective at countering an attacker
who has legitimate access to the facility
20
![Page 21: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/21.jpg)
Mitigation Strategies
Broad• Facility or company
level measures• Broadly applied• Almost universally
applicable• Not required, though
still recommended
Focused• Specific measures
applied at an actionable process step
• Tailored to address an identified significant vulnerability
• Required under Proposed §121
21
![Page 22: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/22.jpg)
Focused Mitigation Strategies
• FDA giving facilities flexibility to determine appropriate focused mitigation strategies
• Preamble to Proposed §121 provides:– Examples of focused mitigation strategies for
reference and context for each key activity type– A series of hypothetical scenarios to illustrate the
decision-making process of identifying and determining appropriate focused mitigation strategies
22
![Page 23: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/23.jpg)
Focused Mitigation Strategies
• Designed to minimize chances of intentional adulteration at the specific process step by:– Minimizing the accessibility of an attacker to
the product– Reducing the opportunity for the attacker to
successfully contaminate the product– Or both
23
![Page 24: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/24.jpg)
Focused Mitigation Strategies Examples
• Control access to the actionable processing step and related equipment– Limit staff access, lock access hatches,
physical barriers
• Ensure the area is free of unrelated materials– Prohibit and monitor employees for personal
items in work areas
24
![Page 25: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/25.jpg)
Focused Mitigation Strategies Examples cont.
• Maximize visibility around actionable process step– Improve lighting or install cameras intended to
prevent an attacker from adding a contaminant
• Peer-monitoring or “buddy system” procedures– Prevents an attacker from operating in
isolation
25
![Page 26: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/26.jpg)
Focused Mitigation Strategies Examples cont.
• Make engineering enhancements to equipment– Install lids or other barriers to prevent
introduction of a contaminant• Reduce time products and ingredients are
accessible– Reduce the opportunity for an attacker to
introduce a contaminant
26
![Page 27: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/27.jpg)
Focused Mitigation Strategies Examples cont.
– Conduct inspections of equipment immediately prior to use• Inspections increase chances of detecting a
contaminant in tanks, hoses, and other equipment
– Use automated, self-contained, enclosed equipment• Prevents introduction of a contaminant into
the system
27
![Page 28: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/28.jpg)
Focused Mitigation Strategies
• Facilities will need to evaluate their situation to understand why and how their actionable process steps are significantly vulnerable– May be different in every facility
28
![Page 29: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/29.jpg)
Focused Mitigation Strategies
• Facilities would then need to identify and implement the appropriate focused mitigation strategies to reduce the significant vulnerabilities
• Document this decision and provide justification for how the strategy significantly reduces or eliminates the risk of intentional adulteration at the actionable process step
29
![Page 30: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/30.jpg)
Focused Mitigation Strategies
• Focused mitigation strategies must be:– Documented in the food defense plan with
justification– Monitored for consistent application, with
corrective actions as necessary• Monitoring procedures must be documented
– Verified to confirm they are implemented as planned through a review of records and periodic re-analysis of the food defense plan
30
![Page 31: Actionable Process Steps and Focused Mitigation Strategies 1](https://reader035.vdocuments.net/reader035/viewer/2022062308/56649d9f5503460f94a8a002/html5/thumbnails/31.jpg)
Focused Mitigation Strategies
• When identifying and implementing focused mitigation strategies, consider:– Do you already have a procedure in place that
protects this process step? – Modify or improve an existing practice?
• FDA tools and guidance to assist in identifying suitable and appropriate focused mitigation strategies: http://www.fda.gov/food/fooddefense/
31