Scroll to top
Security for the Oil, Gas, and Energy Sector: An Operational Guide

Security Intelligence

Security for the Oil, Gas, and Energy Sector: An Operational Guide

Security planning for oil, gas, and energy sector executives and operations. Nigeria, Angola, Kazakhstan, UAE, FIFO operations, offshore platforms, and armed escort requirements.

30 Apr 2026

Written by James Whitfield — Senior Security Consultant

The oil, gas, and energy sector has a security footprint unlike almost any other industry. Operations span some of the world’s highest-risk environments, from Nigeria’s Niger Delta to Iraqi Kurdistan, from Kazakhstan’s remote steppe to offshore platforms in the Gulf of Guinea. The workforce is international, rotational, and highly predictable in its movement patterns. The infrastructure is both economically critical and politically significant. And the sector’s wealth profile makes its executives a defined target for kidnapping and extortion in markets where those methodologies are active.

This guide covers the security planning requirements across the primary energy sector operating environments.

Nigeria: the Niger Delta

Nigeria’s Niger Delta remains the most studied and highest-risk onshore oil and gas operating environment globally. The threat picture has multiple layers:

Kidnap for ransom. Expatriate oil workers have been a consistent kidnapping target since the mid-2000s. The methodology involves surveillance of known oil company personnel in Port Harcourt, boat-based interdiction on creek routes, and in some cases insider facilitation. Ransom negotiations in Nigeria’s Delta typically involve sums in the range of USD 100,000 to 500,000. Many cases are not reported to protect ransom negotiation and insurance positions.

Militant group activity. The Movement for the Emancipation of the Niger Delta (MEND) and its successor organisations, including the Niger Delta Avengers (NDA), have demonstrated sustained capability to attack production infrastructure, including pipelines and flow stations. Production disruption is both an economic and a safety risk. Security planning for any Delta operation must account for the possibility that a security incident is connected to a broader production disruption operation rather than a standalone criminal act.

Local community relations. Operations without a functioning community engagement programme face a higher targeted security risk. Communities that perceive oil operations as extractive without local benefit have provided intelligence to militant groups and facilitated access in documented cases. Community relations is a component of the security programme, not a separate CSR function.

Source: OSAC Nigeria Country Security Report 2024. Control Risks: Nigeria Security Outlook 2025. Council on Foreign Relations: Nigeria’s Niger Delta Security.

Angola, Mozambique, and Southern African offshore

Angola’s offshore sector (Block 0, Block 15, Block 32 – Cabinda, Luanda offshore) operates at a materially lower kidnap risk than Nigeria’s Delta. Port Harcourt’s urban kidnap environment is more dangerous than Luanda for expatriate workers on the ground, but Luanda itself has an elevated opportunistic crime risk.

Mozambique’s LNG development (Cabo Delgado province) has been severely disrupted since 2017 by the Ansar al-Sunna insurgency (locally referred to as Al-Shabaab, distinct from the Somali organisation). In 2021, the attack on Palma – a Total-supported LNG project town – resulted in multiple deaths and the temporary suspension of TotalEnergies’ operations. The insurgency remains active. Any operational planning for Cabo Delgado requires specific, current intelligence rather than a general Mozambique risk assessment.

Kazakhstan and Central Asia

Kazakhstan’s oil sector (Tengizchevroil’s Tengiz field, the Kashagan field consortium) operates in a geographically remote environment with a different threat profile from West Africa. The primary risks are:

FIFO workforce management. Tengiz and Kashagan operate large rotating workforces with predictable arrival/departure schedules. The predictability of these rotations creates a potential surveillance exploitation window that a security programme must address.

Labour relations and industrial action. Kazakhstan’s oil sector has documented history of labour unrest, including the 2011 Zhanaozen oil strike that resulted in significant violence. Industrial relations risk should be a component of the security assessment for any major Kazakhstan operation.

Cross-border context. Kazakhstan borders Russia, China, Uzbekistan, Kyrgyzstan, and Turkmenistan. The geopolitical context post-2022 (sanctions, rerouted supply chains, the repositioning of the Caspian Pipeline Consortium) affects the regulatory and security environment for international operators.

Middle East energy security

The Gulf states present a relatively stable operating environment for oil and gas operations compared to West and East Africa or Central Asia. The specific considerations:

UAE and Saudi Arabia have well-resourced security services and relatively low crime rates. The primary security considerations for energy executives are: compliance with the local security licensing framework (SIRA in UAE, Ministry of Interior in Saudi Arabia), communications security for sensitive business discussions (the UAE Cybercrime Law imposes significant restrictions), and awareness of the political and commercial intelligence environment.

Iraq presents a far more complex picture. The Kurdistan Region of Iraq (KRI) hosts significant energy investment (oil exports, gas flaring reduction projects) and has a markedly lower security risk than southern Iraq and Baghdad. However, the KRI is not without risk: Iranian military strikes have targeted Erbil in 2022 and 2024, and the political relationship between the KRI and Baghdad creates regulatory uncertainty. Any operational presence in Iraq outside the KRI requires specialist security planning.

For the Middle East close protection operating framework including UAE and Saudi Arabia specific requirements, see our close protection Middle East guide.

Offshore platforms and duty of care

Offshore platforms create a specific duty of care challenge: in the event of a medical emergency, trauma incident, or security incident on an offshore installation, evacuation to definitive medical care takes time that can be measured in hours, not minutes.

A platform-based security and emergency response programme must account for:

On-platform medical capability. The platform’s medical team and equipment must be capable of managing the most likely serious medical emergencies for the time it takes to evacuate to shore. For platforms more than an hour from a definitive trauma centre, this standard is higher than for nearshore operations.

Evacuation planning. Helicopter evacuation, lifeboat deployment, and standby vessel protocols should all be tested, not just documented. The personnel responsible for executing evacuation procedures should have practised them.

ISPS Code compliance. International Ship and Port Facility Security Code compliance is the baseline for covered installations. It is not a complete security framework – it establishes minimum requirements for physical security and access control – but compliance is mandatory and inspected.

Armed response. In high-risk offshore environments (Gulf of Guinea, Red Sea transit), armed protection is deployed under the IMO’s guidance on privately contracted armed security personnel (PCASP). For the maritime security framework, see our maritime security guide.

Energy conference security

Major energy sector conferences – CERAWeek (Houston), ADIPEC (Abu Dhabi), Gastech, ONS (Stavanger) – concentrate high-profile executives from politically sensitive markets in a predictable, publicly announced environment. Corporate espionage targeting at these events is documented: the concentration of decision-makers in a hotel environment, with informal networking over several days, creates opportunities for social engineering, room-entry technical surveillance, and targeted information collection.

Security planning for conference attendance should include: hotel room sweep capability for senior delegates, communications security discipline for sensitive discussions, awareness of who else from competitor companies or politically exposed organisations is attending, and a social engineering awareness briefing for all delegates attending.

For the technical surveillance countermeasures applicable in hotel environments, see our TSCM guide. For the digital security disciplines relevant to international conference attendance, see our executive digital security guide. For security planning across the full lifecycle of major energy and infrastructure construction projects in high-risk environments, see our guide to security for construction and infrastructure projects. For the specific security requirements of remote and off-grid exploration or production operations – mine awareness, MEDEVAC planning, satellite communications, and community conflict management – see our remote operations security guide. For the security operating environment in Kazakhstan’s major energy markets – including KNB surveillance, FIFO predictability risk at TCO and Kashagan, the January 2022 civil unrest, and the legal and commercial risk framework – see our close protection in Central Asia guide. For the specific security challenges of the mining and extractive industries – community conflict, the Voluntary Principles framework, artisanal mining dynamics, junior explorer risk, and the Marikana labour security lessons – see our mining and extractive industries security guide. For the distinct security framework applicable to renewable energy infrastructure – wind and solar construction phase security, cable and copper theft protection, environmental protest and direct action management, IP theft of energy technology, and grid CNI regulatory requirements – see our renewable energy infrastructure security guide. For the specific security challenges of offshore oil and gas platforms – Gulf of Guinea piracy and crew abduction risk, North Sea drone and infrastructure targeting threat, ISPS Code and OIM authority framework, helicopter transfer manifest security, contractor vetting gaps, and MEDEVAC from beyond SAR helicopter range – see our offshore oil and gas platform security guide.

Source: OSAC Nigeria Country Security Report 2024. Control Risks: Africa Risk Outlook 2025. TotalEnergies Palma incident report and Control Risks assessment (2021). IMO: ISPS Code (2003, as amended). IMO MSC-FAL.1/Circ.3: Privately Contracted Armed Security Personnel (PCASP) Guidelines 2020. Kazakhstan Oil and Gas Security Assessment, OSAC 2024.

For cargo theft patterns in energy sector supply chains – TAPA FSR/TSR standards, GPS jamming and spoofing countermeasures, organised retail crime in distribution, and pharmaceutical cold chain integrity – see our security for supply chain and logistics operations guide.

Summary

Key takeaways

1
1
The Niger Delta is the highest-risk onshore oil and gas operating environment globally

Nigeria's Niger Delta requires a formal security programme for any operational presence. Expatriate kidnapping, production infrastructure attacks, and oil theft all operate simultaneously. Local community engagement is a necessary component of the security approach -- a purely physical security response without community relations is inadequate.

2
2
FIFO roster predictability is a primary vulnerability in remote operations security

Published or discoverable FIFO schedules tell a surveillance team exactly when workers will arrive and depart. Roster information should be distributed on a need-to-know basis. Arrival and departure times should be varied where operational constraints allow.

3
3
Offshore platforms create duty of care challenges that differ from onshore operations

Emergency evacuation from an offshore platform is slow and constrained by weather and vessel availability. Medical response capability on the platform itself must account for the time to shore. Operators have a documented duty of care to provide adequate medical and emergency response capability for offshore workers.

4
4
Kazakhstan and Central Asian markets require specific local intelligence

Kazakhstan's oil sector (Tengizchevroil, Kashagan) operates in a politically stable but geographically remote environment. Cross-border worker movements (Uzbekistan, Kyrgyzstan) and the proximity to regional instability require ongoing assessment rather than a static baseline.

5
5
Energy sector conference security is often under-resourced relative to the actual threat

ADIPEC, CERAWeek, and major energy conferences attract high-profile executives from politically sensitive markets, creating a concentrated, predictable target environment. Corporate espionage targeting at these events is documented. Security planning should include communications security and social engineering awareness alongside physical protection.

FAQ

Frequently Asked Questions

Nigeria’s Niger Delta is the most documented oil and gas security environment globally. The primary threats are: kidnapping for ransom (both of expatriate workers and local staff); militant group disruption of production infrastructure (Movement for the Emancipation of the Niger Delta successor organisations); oil theft and bunkering operations that operate alongside security incidents; and express kidnapping in urban areas (Lagos, Port Harcourt) targeting oil sector expatriates who can be identified by their employer affiliation or location pattern. Angola’s offshore sector has a lower kidnapping risk than Nigeria’s Delta, but Port Harcourt and the Delta itself require formal security programmes for any operational presence. OSAC Nigeria and Control Risks’ RiskMap both rate the Niger Delta as a Very High security risk environment.

The International Ship and Port Facility Security (ISPS) Code, implemented under SOLAS by the International Maritime Organization (IMO), sets mandatory security requirements for vessels and port facilities that interact with international shipping. For offshore installations that fall under its scope, the ISPS Code requires a Ship Security Plan (SSP) or Offshore Installation Security Plan, a certified Ship Security Officer (SSO) or equivalent, and security assessments at defined intervals. Compliance is not optional for covered installations – Port State Control inspections enforce it. Many oil and gas operators treat ISPS compliance as a minimum floor rather than a complete security standard.

Fly-In Fly-Out (FIFO) operations involve rotating workforces travelling to remote or high-risk locations on defined schedules. The security differences are: the arrival and departure pattern is highly predictable (known roster schedules create a surveillance opportunity), the workforce includes technical personnel who may not have corporate travel security training, and the operational locations are often in remote areas with limited emergency response capability. A FIFO security programme requires predictability management (not publishing roster details beyond need-to-know), site security that is not dependent on police response capability, and medical evacuation planning that accounts for the distance from definitive medical care.

Energy sector conferences – CERAWeek, ADIPEC, Gastech, ONS – attract high-profile executives from politically sensitive markets and create predictable target environments. Delegates from major energy companies are known to be present at a specific time and location. Conference security for energy executives should include: hotel security review for the venue, advance survey of the conference centre, knowledge of who else from your organisation or sector is attending (social engineering and corporate espionage targeting at conferences is documented), communications security for any sensitive discussions, and specific awareness of the country context for international conferences (ADIPEC in Abu Dhabi carries different considerations from a European location).
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.