Kondwit

49 CFR 195.452: Integrity Management for Hazardous Liquid Pipelines

Matthew Brown, PE·11 min read·Updated 2026-04-01

49 CFR 195.452 requires operators of hazardous liquid pipelines to develop and implement integrity management programs for pipeline segments that could affect high consequence areas. The regulation establishes a continuous cycle of threat identification, integrity assessment, preventive and mitigative measures, and reassessment at defined intervals. It is the most extensively audited section in Part 195 and the one most frequently cited in PHMSA enforcement actions against liquid pipeline operators. Understanding both the letter of this regulation and the practical expectations behind it is essential for any operator maintaining a defensible compliance program.

What Is 49 CFR 195.452?

Section 195.452 is the integrity management rule for hazardous liquid pipelines regulated under 49 CFR Part 195. It applies to operators of pipelines that transport hazardous liquids or carbon dioxide and whose systems include segments that could affect a high consequence area — populated areas, unusually sensitive areas, or commercially navigable waterways.

The regulation does not prescribe a single method or checklist. Instead, it establishes a framework requiring operators to build and maintain a written integrity management program that addresses the full lifecycle of integrity work: identifying which segments need protection, evaluating what threatens those segments, selecting and performing appropriate assessments, acting on results, and demonstrating that the program evolves as conditions change.

The scope of 195.452 encompasses covered segment identification, baseline and periodic assessment, threat identification and risk evaluation, assessment method selection appropriate to identified threats, preventive and mitigative measure implementation, integration of assessment results into ongoing program decisions, and record-keeping sufficient to support audit review.

Why 195.452 Matters

This section drives more program structure, engineering work, and audit attention than any other regulation in Part 195. It is not a static compliance requirement — it is the operational framework that connects an operator's technical decisions to their regulatory obligations.

Programs built under 195.452 determine how operators allocate inspection resources, schedule assessment activities, justify reassessment intervals, and document the reasoning behind risk-based decisions. When a program is well-constructed, it creates a defensible record that links segment conditions, threat evaluations, and engineering decisions into a coherent narrative. When it is poorly constructed, it produces documentation that cannot withstand audit scrutiny.

PHMSA auditors evaluate 195.452 compliance not just by checking whether required activities were completed, but by examining whether the program logic is internally consistent and supported by actual data. A program that lists threats generically, sets reassessment intervals without technical justification, or fails to incorporate new information from assessments and operational changes will draw enforcement attention regardless of whether inspections were performed on schedule.

Key Requirements

Covered Segment Identification

Operators must identify all pipeline segments that could affect an HCA. This determination depends on the operator's analysis of potential release impacts, typically involving overland spill modeling, geographic analysis, and mapping of HCA boundaries. The "could affect" standard means that segments upstream of or adjacent to an HCA may qualify as covered segments even if not physically located within the HCA boundary.

A common gap in new and growing programs is the absence of a standardized specification governing how spill modeling variables are handled from project to project. Without that specification, models conducted by different vendors or at different points in time may use different assumptions for the same inputs — producing inconsistent coverage determinations for comparable pipeline segments. PHMSA auditors reviewing a portfolio of HCA analyses may identify that inconsistency as a program-level deficiency. The fix is developing a company-specific specification that governs variable handling and runs through the management of change process, with historical models re-analyzed on a phased schedule.

Read the detailed HCA identification guide

Baseline Assessment

All covered segments must receive a baseline integrity assessment. The regulation specifies acceptable assessment methods: in-line inspection, pressure testing, direct assessment, and other technology the operator can demonstrate provides an equivalent understanding of pipe condition. The baseline establishes the starting point for the integrity management program and the first data input into subsequent threat evaluations and interval decisions.

Reassessment Intervals

Covered segments must be reassessed at intervals not exceeding five years unless the operator justifies a different interval with documented technical analysis. The five-year maximum is the regulatory ceiling — not a default setting. In practice, interval justification is one of the most scrutinized elements in Part 195 audit programs.

The justification must be segment-specific and account for threat severity, prior assessment results, operational history, and current pipe condition data. Boilerplate language reused across segments without regard to segment-specific conditions is a predictable enforcement trigger. Intervals that do not account for known threats or prior assessment findings suggest the justification process is a compliance formality rather than a technical analysis.

Threat Identification and Risk Evaluation

Operators must identify and evaluate all potential threats to each covered segment. This includes time-dependent threats (corrosion, stress corrosion cracking), stable threats (manufacturing and construction defects), and time-independent threats (third-party damage, incorrect operations, weather-related forces). The evaluation must be segment-specific and supported by available data.

Threat identification under 195.452 requires the same analytical rigor as under 192.917 for gas pipelines: each threat must be evaluated with documented reasoning, data gaps must be acknowledged and addressed, and threat interactions must be considered. Generic threat lists applied uniformly across segments without segment-specific differentiation are the most common enforcement target in this area.

When building a reassessment interval justification, the process should start with threat categories, not defects. For ILI programs, this means cycling through threat populations — corrosion, cracking, dents, manufacturing defects, girth weld and long seam weld populations — and running failure pressure analysis on each category. Anomalies that approach target thresholds are identified for integrity excavation; where findings are inconsistent with the predicted data, that inconsistency triggers reanalysis of the threat picture.

Preventive and Mitigative Measures

The regulation requires operators to implement measures that prevent threats from causing failures and mitigate consequences if failures occur. These measures must be tailored to the specific threats and conditions identified for each covered segment. Measures listed in the program but not demonstrably implemented — or measures that are generic across the system rather than tied to segment-specific conditions — are among the most common 195.452 enforcement findings.

Record-Keeping

Operators must maintain records documenting each element of the integrity management program, including the basis for covered segment determinations, assessment results, threat evaluations, interval justifications, and preventive and mitigative measure implementation. The records must be sufficient for an auditor to reconstruct the operator's decision-making process end to end.

Record-keeping quality is not just a matter of completeness — it is a matter of structure and accessibility. An operator who can produce pre-organized digital links to documents organized by audit question is in a fundamentally different position than one who must search through unstructured records under the time pressure of an active audit. Pre-organized, digitally accessible record sets are a genuine audit preparation advantage.

Practical Implementation

Building a 195.452 program that holds up under audit requires more than checking regulatory boxes. Several program elements consistently separate defensible programs from ones that generate findings.

The threat identification must visibly drive assessment choices. An auditor should be able to trace a direct line from the threats identified for each segment to the assessment method selected for that segment. Where that connection is not apparent — where assessment schedules appear to be driven by interval timing rather than threat priority — the program logic is incomplete.

Assessment results must flow back into program decisions. Performing an assessment is not the end of the obligation — it is the beginning of a program update. ILI results that go into a report but do not visibly influence threat evaluations, risk rankings, or interval decisions suggest a disconnected compliance process. Operators who perform assessments but do not demonstrably integrate the results into program decisions face increasing enforcement risk.

The program must reflect current conditions. Written programs that have not been updated to reflect recent assessments, operational changes, or shifts in HCA boundaries are consistently cited in PHMSA enforcement actions. The program revision history should track material changes in the system and demonstrate that the program is actively maintained as an operational tool.

Data quality determines program quality. The entire analytical chain — threat evaluation, interval justification, risk ranking — is only as reliable as the data underneath it. Operators should actively assess data quality and document how gaps or uncertainties were handled. The mode of data storage matters as well: programs that maintain integrity data in structured, queryable formats are far better positioned for both program management and audit response than those relying on static document repositories.

Enforcement and Audit Focus

These violation patterns appear with notable frequency in PHMSA 195.452 enforcement actions:

Incomplete threat documentation. Threat evaluations that exist on paper but lack segment-specific substance — generic lists, ratings without supporting data citations, dismissals without reasoning.

Unsupported reassessment intervals. Interval decisions set at the regulatory maximum without documented technical justification, or justifications reused uniformly across segments without differentiation.

Stale program materials. Written programs that have not been revised despite new assessment results, operational changes, or updated HCA data.

Weak alignment between written procedures and actual execution. This is the most consequential category: the written program describes a methodology the records do not show was followed. The gap between the program on the shelf and the program in practice is what drives the most serious enforcement outcomes.

Operators preparing for a PHMSA audit under 195.452 should be able to trace a clear path from each covered segment through its threat evaluation, assessment history, interval justification, and preventive measures — all supported by documentation that an independent reviewer can follow without additional explanation.

Frequently Asked Questions

What pipelines must comply with 49 CFR 195.452?

Hazardous liquid and carbon dioxide pipelines regulated under Part 195 that include segments which could affect a high consequence area must comply with 195.452. The "could affect" determination is based on the operator's analysis of potential release impacts relative to HCA locations. Operators uncertain about applicability for specific system configurations should review the HCA definitions and consult qualified compliance professionals.

What is a covered segment under 195.452?

A covered segment is a portion of pipeline that the operator has determined could affect a high consequence area based on release impact analysis. Covered segments are subject to the full integrity management requirements, including baseline assessment, periodic reassessment, threat evaluation, and preventive measures. The determination must be documented, current, and reviewable.

How often must integrity reassessments occur under 195.452?

The regulation requires reassessment at intervals not exceeding five years. Operators may use shorter intervals based on risk factors. Any interval selection must be supported by documented technical analysis that accounts for the specific threats, conditions, and assessment history of each covered segment. Interval justification is one of the most common areas of PHMSA enforcement scrutiny under this section.

What assessment methods are acceptable under 195.452?

The regulation permits in-line inspection, pressure testing, direct assessment, and other technologies an operator can demonstrate provide equivalent understanding of pipe condition. The assessment method must be appropriate for the threats identified on each covered segment — an operator cannot use a method that does not address the primary threats present.

What does PHMSA look for during a 195.452 integrity management audit?

PHMSA auditors evaluate whether the integrity management program is internally consistent, supported by data, and actually executed as written. Primary focus areas include the adequacy of covered segment identification, the quality and specificity of threat evaluations, technical justification for reassessment intervals, implementation evidence for preventive and mitigative measures, and alignment between the written program and the operator's records. Auditors also assess whether the program has been updated to reflect new information.


Need a better way to navigate regulation context? Kondwit connects enforcement cases to the specific 195.452 requirements most frequently cited — so you can see exactly where auditor focus lands. Learn more


See how Kondwit connects regulatory sections, enforcement history, and inspection questions. Request a demo


Matthew Brown, PE Licensed Professional Engineer | 15+ years pipeline integrity and compliance experience

Matthew Brown is a pipeline integrity engineer specializing in integrity management program development, regulatory compliance, threat assessment, and audit preparation. He has supported operators across transmission, distribution, and hazardous liquid systems with program development, documentation review, and PHMSA audit support.

This content is for informational and educational purposes only. It does not constitute engineering services, legal advice, or a professional engineering opinion. Operators should consult qualified professionals for system-specific compliance decisions.

Need a better way to navigate regulation context?

Kondwit organizes PHMSA regulations, enforcement data, and inspection guidance in one structured platform — connecting regulatory sections to the context that matters.

Learn more

Get regulation updates

New enforcement analysis, regulation guides, and compliance insights. No spam.

MB

Matthew Brown

PE

Licensed Professional Engineer

Pipeline integrity engineer with 15+ years of experience in integrity management program development, regulatory compliance, threat assessment, and audit preparation. Supporting operators across transmission, distribution, and hazardous liquid systems.

This content is for informational and educational purposes only. It does not constitute engineering services, legal advice, or a professional engineering opinion. Operators should consult qualified professionals for system-specific compliance decisions.