Scroll to top
Oil and Gas Upstream Security: Onshore and Offshore Operations | CloseProtectionHire

Security Intelligence

Oil and Gas Upstream Security: Onshore and Offshore Operations | CloseProtectionHire

Security management for oil and gas upstream operations: PFEER Regulations, ASIS guidelines, kidnap risk in high-threat regions, contractor vetting, and emergency response. Enquire today.

12 May 2026

Written by James Whitfield, Senior Security Consultant

The security risks facing upstream oil and gas operations – exploration, drilling, and production – are more varied, more persistent, and more potentially severe than those facing most other commercial sectors. The combination of remote location, high-value assets, critical infrastructure status, expatriate workforce, and operations in some of the world’s most challenging political environments produces a threat picture that demands a security programme built specifically for the context, not a generic corporate security framework with oil-field language added.

The Threat Environment by Region

West Africa: Niger Delta and Gulf of Guinea

The Movement for the Emancipation of the Niger Delta (MEND) was the dominant non-state actor affecting oil operations in Nigeria between 2006 and 2016, responsible for pipeline attacks, facility sabotage, and kidnap of expatriate workers. The political negotiated settlement and amnesty programme of 2009 reduced but did not eliminate the threat. Successor armed groups and criminal networks in the Delta continue to carry out pipeline vandalism (often to enable oil theft through illegal bunkering rather than for political purposes), kidnap for ransom, and attacks on logistics vessels.

The Gulf of Guinea more broadly – including operations in Ghana, Equatorial Guinea, Gabon, Cameroon, and the waters offshore – records the highest incidence of seafarer kidnapping globally. The ICC International Maritime Bureau’s 2023 report recorded that the Gulf of Guinea accounted for a disproportionate share of maritime kidnap incidents globally, with victims typically held for ransom for periods of days to weeks.

Iraq and Kurdistan Region

Iraq’s oil industry – the world’s third-largest proven reserves – operates in an environment that has never fully stabilised following the 2003 invasion and the subsequent insurgency cycles. The Kurdistan Region of Iraq (KRI) offers a significantly more permissive operating environment than central and southern Iraq, but is not without risk: the area saw Iranian ballistic missile attacks on Erbil in early 2022.

For operators in Basra and the southern fields, threat actors include Iranian-aligned militia groups whose posture towards Western energy companies fluctuates with the political cycle, criminal networks involved in oil theft and extortion, and the residual presence of ISIS-affiliated cells in disputed territories. Convoy movement from Basra airport to field facilities requires armoured vehicles, route planning updated against current threat intelligence, and military or armed private security escort depending on the specific route and period.

Colombia

Colombia’s security environment for oil operations has improved markedly since the 2016 FARC peace agreement, but the dissidents of FARC (FARC-EP), ELN (National Liberation Army), and criminal successor networks continue to operate in oil-producing departments including Arauca, Putumayo, and Meta. The primary threat modalities are pipeline bombing (used as a political and extortion instrument), extortion of contractors and local employees, and selective targeting of security and management personnel.

Regulatory Framework for Offshore Security

PFEER Regulations 1995

The Prevention of Fire and Explosion and Emergency Response Regulations 1995 (SI 1995/743) apply to offshore installations. They require the duty holder to take appropriate measures to protect persons on the installation from the effects of fire and explosion, to secure effective evacuation, escape, and rescue, and to establish emergency response procedures. Security incidents that could produce fire, explosion, or mass casualty outcomes fall within the scope of PFEER emergency planning obligations.

Offshore Installations (Safety Case) Regulations 2015

The Offshore Installations (Safety Case) Regulations 2015 (SI 2015/398) require operators to produce a safety case accepted by the Health and Safety Executive before an installation begins production. The safety case must identify all major accident hazards and demonstrate that the management system is adequate to control them. HSE’s guidance confirms that security events with major accident potential are within scope.

ISPS Code and Mobile Offshore Drilling Units

The International Ship and Port Facility Security (ISPS) Code, which entered force in 2004 following the SOLAS amendments of 2002, applies to offshore installations that are classified as ships – including mobile offshore drilling units (MODUs) and floating production storage and offloading vessels (FPSOs). IMO Circular 1387 clarifies the application of ISPS to these vessel types. The code requires a vessel security plan, a company security officer, and a vessel security officer with defined responsibilities.

The ASIS Guideline and the UN Voluntary Principles

The ASIS International Guideline for the Management of Privately Contracted Armed Security Personnel in Upstream Oil and Gas Operations (2012) is the primary industry-specific standard for armed security contractor management. It requires operators to:

  • Assess the security risk environment before deploying armed contractors
  • Define rules of engagement (ROE) that are proportionate to the threat, legal under the jurisdiction’s law, and consistent with international human rights standards
  • Ensure armed contractors are vetted, trained, and competent to the required standard
  • Monitor contractor performance against the ROE and investigate all use-of-force incidents
  • Maintain records demonstrating the above

The UN Voluntary Principles on Security and Human Rights (2000) extend the framework to public security forces (military and police) contracted or relied upon for facility protection. Operators are expected to communicate their human rights standards to public security forces, investigate alleged abuses, and not make payments to forces credibly linked to human rights violations.

IFC Performance Standard 4, applied to companies seeking International Finance Corporation funding, incorporates both the ASIS guideline and the Voluntary Principles as due diligence requirements.

Close Protection in the Upstream Environment

Close protection for expatriate senior personnel in upstream environments involves different operational planning from the corporate executive protection model:

Duration: An upstream CP programme typically covers a posting of weeks to months, not a visit of hours or days. The team needs logistics, relief cover, and operational security for extended periods.

Isolation: Operating at a remote field site or offshore platform means the team cannot rely on police response, hospital facilities within useful range, or the infrastructure of a city environment. Medical capability, communications redundancy, and self-sufficiency are baseline requirements.

Vehicle movement: Most casualty-producing security incidents in upstream environments involve vehicles in transit between the secure site and the nearest transport hub. Route planning, vehicle specification, convoy protocols, and the use of armed escort require specific operational planning – not adaptation of a generic vehicle movement protocol.

Handover to local security: At the field site perimeter, the close protection team interfaces with local security contractors. Clarity about roles, handover procedures, communication protocols, and the allocation of authority in an emergency is essential and must be established during the site security planning process, not improvised at the gate.

For the vehicle security principles that apply to movement in high-threat upstream environments, see our hostile vehicle mitigation guide. For the kidnap prevention and personal security measures that should accompany all high-risk upstream postings, see our kidnap prevention and personal security guide.

Summary

Key takeaways

1
1
The security plan must match the specific threat environment

An upstream security plan exported from a low-risk operating environment and applied without modification to a high-threat region will fail. The threat picture in the Niger Delta is structurally different from the threat picture in Iraqi Kurdistan, which is different again from the challenge in Colombia's oil-producing regions. Security consultants and operators who generalise across these environments without region-specific analysis produce plans that look coherent on paper and do not perform in the field.

2
2
Community relations are a security instrument

In most upstream operating regions, the quality of the operator's relationship with the host community directly affects the security environment. Operations that are perceived by local communities as exploitative, that have failed on their social investment commitments, or that have caused environmental harm without adequate remediation consistently face higher levels of sabotage, theft, and community-level opposition to security measures. The security team and the community relations function must be coordinated, not siloed.

3
3
Contractor management is a primary risk

The majority of personnel on an upstream oil and gas site are contractors rather than direct employees of the operator. Local security contractors, drilling crews, logistics providers, and catering staff all represent potential insider threat vectors. The ASIS 2012 guideline requires that private armed security contractors be vetted, trained, and managed against defined rules of engagement. But vetting obligations extend beyond armed guards -- any contractor with unsupervised access to sensitive areas, IT systems, or personnel requires a commensurate screening programme.

4
4
Emergency response planning must include security scenarios

PFEER Regulations require effective emergency response planning for offshore installations. The Offshore Installations (Safety Case) Regulations 2015 require the safety case to address all major accident hazards. Both frameworks are relevant to security-originated emergencies. An emergency response plan that covers fire, blowout, and man overboard but does not address armed attack, hostage-taking, or vessel boarding is incomplete as a risk management instrument.

5
5
K&R insurance and response retainer are not optional in high-threat regions

Kidnap and ransom insurance, with a specialist response retainer giving access to a qualified negotiator and crisis response team, is a standard element of risk management for upstream operators with personnel in regions where kidnap for ransom is a live threat. The insurance product and the response capability are distinct -- the insurer funds the response; the specialist firm provides it. Operators should confirm their response retainer arrangement before personnel are deployed, not after the first incident.

FAQ

Frequently Asked Questions

The threat picture varies significantly by region and asset type. In West Africa (particularly the Niger Delta and Gulf of Guinea), kidnap for ransom targeting expatriate personnel is the historically dominant threat, alongside equipment theft, sabotage, and vessel piracy. In Iraq and the wider Gulf region, the threat profile includes IED attack on convoys, targeted assassination of local staff, and state-sponsored interference with operations. In Colombia and other Latin American producer states, extortion by non-state armed groups, FARC and ELN successor organisations, and local criminal networks represents the primary threat. Across all regions, insider threat – from local staff recruited or coerced by hostile actors – is a persistent and underestimated risk.

The Prevention of Fire and Explosion and Emergency Response (PFEER) Regulations 1995 require duty holders on offshore installations to take appropriate measures to protect persons from the effects of fire and explosion and to secure effective evacuation. They are primarily health and safety instruments, not security regulations. However, the emergency response planning required under PFEER creates a framework that is directly relevant to hostile-actor scenarios: the duty holder must plan for and be capable of mounting an effective response to any emergency. Security incidents are not excluded. The Offshore Installations (Safety Case) Regulations 2015 require the safety case to address all major accident hazards, which HSE interprets to include security events with the potential for mass casualty outcomes.

ASIS International published the Guideline for the Management of Privately Contracted Armed Security Personnel in Upstream Oil and Gas Operations in 2012. The guideline addresses use-of-force standards, rules of engagement development, vetting and training requirements for private armed security contractors, and human rights obligations under the UN Voluntary Principles on Security and Human Rights. It is not a legally binding standard in any jurisdiction but is widely used by major operators as the baseline for their armed security management systems and is referenced in IFC Performance Standard 4 compliance assessments.

The UN Voluntary Principles on Security and Human Rights, established in 2000, are a set of principles developed by governments, extractive companies, and civil society organisations to guide companies in maintaining the safety of their operations while respecting human rights. They establish expectations for risk assessment, engagement with public security forces, engagement with private security, and community relations. Adherence is voluntary, but a number of major oil and gas companies have made public commitments to compliance, and IFC Performance Standard 4 (Community Health, Safety and Security) incorporates Voluntary Principles requirements for companies seeking IFC financing.

Expatriate close protection in upstream environments differs from corporate close protection in several important respects. The operational environment is typically more hostile, the timeline is extended (weeks or months at the asset rather than hours or days of travel), and the support infrastructure available to a close protection team is significantly more limited. Effective programmes typically involve: site hardening (perimeter, access control, CCTV, accommodation security), vehicle movement protocols with armoured vehicles and route planning, armed local security contractors managed against defined rules of engagement, clear kidnap response procedures agreed in advance with a specialist K&R insurer, and regular threat assessment updates from in-country intelligence resources.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.