Kondwit

Pipeline Integrity Management: What It Is and Why It Matters

Matthew Brown, PE·11 min read·Updated 2026-04-01

Pipeline integrity management is a structured, ongoing process for ensuring pipeline systems operate safely, reliably, and in compliance with federal regulations. It is not a single inspection or a one-time assessment — it is a continuous cycle of identifying threats, evaluating risk, performing integrity assessments, taking preventive and mitigative action, reassessing at defined intervals, and documenting every step so the program is defensible under audit. For pipeline operators subject to 49 CFR Part 192 or Part 195, integrity management is both a regulatory requirement and the operational framework that connects engineering decisions to compliance obligations.

What Is Pipeline Integrity Management?

Integrity management is a program-level discipline, not a single activity. It encompasses the full cycle of work required to understand, maintain, and demonstrate the fitness of a pipeline system over time.

The core objective is straightforward: operators must know what threats their pipelines face, assess whether those threats have caused or could cause integrity problems, take action to prevent or mitigate failures, and then repeat the process at intervals that reflect actual risk. Every step must be documented well enough that an independent reviewer — whether an internal auditor or a PHMSA inspector — can reconstruct the operator's reasoning.

In practice, an integrity management program integrates several interconnected technical disciplines: data management, threat identification, risk assessment, integrity assessment, response and remediation, preventive measures, reassessment planning, and documentation. These disciplines do not operate independently — the quality of each one affects every other.

Why Pipeline Integrity Management Matters

It is a regulatory requirement

Federal pipeline safety regulations require integrity management programs for pipeline segments that could affect high consequence areas. For hazardous liquid pipelines, the requirements are in 49 CFR 195.452. For gas transmission pipelines, the requirements are in 49 CFR Part 192, Subpart O (sections 192.901 through 192.951), with threat identification governed by 192.917.

These are not optional programs. Operators who fail to maintain compliant integrity management programs face enforcement actions, civil penalties, and corrective action orders.

It is the primary mechanism for preventing failures

Beyond the regulatory requirement, integrity management is how operators systematically identify and address integrity threats before they result in failures. Pipelines operate for decades across changing environments, and the threats they face evolve over time. Just because product is in the pipe today does not mean the operator is successfully managing the damage mechanisms that will matter tomorrow. Without a structured program for evaluating and responding to those threats, operators are left reacting to failures rather than preventing them.

It determines audit outcomes

PHMSA evaluates integrity management programs not just by checking whether required activities were completed, but by examining whether the program logic is coherent, supported by data, and actually executed as documented. The quality of the integrity management program — particularly the documentation supporting threat evaluations, interval decisions, and measure implementation — is the primary focus of most PHMSA integrity management audits.

What Distinguishes a Real Program from a Compliance Artifact

There is a meaningful difference between a program built to manage risk and a program built to satisfy an auditor. Both may have the required sections, the required records, and the required activities. What separates them is whether the program actually drives decisions.

The first signal is visible before reviewing a single document. An operator's public data — reported infrastructure mileage, incident history, annual reports — reveals whether assessment activity aligns with the known threat profile. A pipeline with a documented corrosion history and a sustained ILI program is telling a different story than one with the same threat profile and years of deferred assessment.

Inside the program, the indicators are: Does the IMP manual show signs of active maintenance, or does it read as a static file? Do the risk assessment methodology and tool selection reflect genuine analytical thought, or do they apply the same approach uniformly regardless of segment conditions? Do the records document actual decision-making, or do they document that required activities occurred?

The most revealing question is how data is stored. A program that captures records as static document forms is fundamentally different from one that stores data in structured, queryable formats. The data capture practices tell you how the program actually functions as a management tool, as opposed to how it appears in policy.

Core Components of an Integrity Management Program

Covered Segment Identification

The first step is determining which pipeline segments fall under integrity management requirements. This depends on high consequence area identification — mapping where HCAs exist along the pipeline corridor and modeling which segments "could affect" those areas based on consequence analysis.

Threat Assessment

Operators must identify all potential threats to each covered segment. Under Part 192, this follows the threat categories in ASME B31.8S. Under Part 195, operators must consider time-dependent threats (corrosion, stress corrosion cracking), stable threats (manufacturing and construction defects), and time-independent threats (third-party damage, incorrect operations, outside forces). The assessment must be segment-specific and grounded in available data — not a generic threat list applied uniformly across the system.

Assessment Method Selection

Based on the threats identified, operators select appropriate assessment methods. The primary methods are in-line inspection, pressure testing, and direct assessment protocols (ECDA, ICDA, SCCDA). The selected method must be technically appropriate for the primary threats present on each segment. Using an assessment method that cannot detect the primary identified threat does not satisfy the regulatory requirement and creates a structural program weakness that does not surface until a failure occurs.

Reassessment Planning

Operators must reassess covered segments at intervals that reflect actual risk. Part 195 requires reassessment within five years; Part 192 requires reassessment within seven years. These are maximum intervals — not default settings. Any interval must be supported by documented technical analysis. In practice, the technical justification for reassessment intervals is one of the most scrutinized elements in PHMSA integrity audits.

Preventive and Mitigative Measures

Operators must implement measures to prevent the threats identified from causing failures and to mitigate consequences if failures occur. These measures must be tailored to the specific threats and conditions identified for each covered segment — not drawn from a generic program-level list that does not differentiate between segments.

Documentation

Integrity management documentation is not just a record-keeping obligation — it is the structural foundation of the program's defensibility. Records must support end-to-end traceability: from the data inputs that informed threat evaluations, through the assessment method selections, to the interval justifications, through the preventive measure implementations. When that chain is complete, the program can withstand audit review. When it has gaps, the gaps define the program's vulnerability.

How Operator Size Affects What Good Looks Like

The organizational context in which an integrity management program operates shapes both its strengths and its failure modes.

Small operators — typically under 1,000 miles of pipe — generally have compact teams where individuals carry broad responsibilities. The advantage is intimacy with each asset. Every pipeline has its own story, and a small team develops firsthand knowledge of the system that no program document can fully capture. The challenge is bandwidth. These teams are typically viewed as a cost center, which limits investment in the documentation infrastructure needed to sustain program quality as the organization grows. Teams that excel at doing the work often underinvest in documenting it.

The growth phase from small to mid-size organization is where programs are most vulnerable. The system becomes too large to manage through individual context alone. Once an additional layer of personnel is added, consistency across people and projects requires formal procedures, templates, minimum requirements, and training. The documentation infrastructure that the program needs has to be built before the organization grows past the person who holds all the context — but it almost never is.

Larger operators face a different set of challenges. At pipeline systems of 10,000 miles or more, programs develop organizational silos where entire career paths exist within narrow specializations. ILI data analysis, construction records review, cathodic protection program management — these may be entirely separate groups with no natural mechanism for comparing findings across threat categories. The result is that interacting threats, which require integrating information from multiple domains, are systematically underevaluated. The knowledge that would identify the interaction is distributed across silos that do not communicate.

Third-party consultants with long-term program engagement provide a structural stability that neither organizational model sustains on its own. The consultant who works across multiple operators and maintains continuity of knowledge through personnel transitions carries program context that the operator's internal organization cannot always preserve.

Where Programs Most Commonly Break Down

The financial gravity of pipeline programs pulls toward field execution. Inspection projects, dig programs, facility work — these activities have clear cost, clear scope, and yes/no completion criteria. The data management, threat analysis, and risk assessment work that supports them rarely has the same clarity. The analysis evolves continuously as new data arrives and new methods are developed. There is no obvious stopping point, and success is measured by outcomes that are inherently difficult to attribute: product that stayed in the pipe, failures that did not occur.

This creates a predictable underinvestment pattern. The parts of the program that produce tangible deliverables attract budget. The analytical and documentation infrastructure that makes those deliverables defensible does not.

The consequence shows up in audits. Programs that have performed the required work but cannot demonstrate defensible reasoning behind the decisions driving that work are structurally vulnerable. A complete inspection record that is not connected to a documented threat evaluation and interval justification is just a completed activity — it is not a program.

Frequently Asked Questions

Is pipeline integrity management the same as pipeline inspection?

No. Pipeline inspection is one component of integrity management, but the program encompasses much more: threat identification, risk assessment, preventive and mitigative measures, reassessment planning, and documentation. An operator who performs inspections but does not maintain the broader program framework is not in compliance with the integrity management regulations, and the inspection results themselves may not be defensibly connected to the program's analytical decisions.

Do all pipelines require integrity management programs?

The federal integrity management requirements apply specifically to pipeline segments that could affect high consequence areas. However, many operators extend integrity management practices beyond covered segments as a matter of sound engineering practice and risk management. The regulatory minimum defines what is required; best practice often requires more.

What is the biggest risk in a PHMSA integrity management audit?

The gap between the written program and actual execution. PHMSA auditors compare what the program document says the operator will do against what the records show the operator actually did. When those two things do not align — when the program describes a methodology that the records do not show was followed — the program loses credibility regardless of the technical quality of individual assessments.

How does integrity management differ between Part 192 and Part 195?

The structural framework is similar: both require threat identification, assessment, preventive measures, and documentation. The key differences are in reassessment intervals (five years for Part 195, seven years for Part 192), HCA definitions and modeling approaches, the role of ASME B31.8S as a technical reference under Part 192, and the specific section structure where requirements are located. Operators with both gas and liquid systems must maintain compliant programs under both frameworks simultaneously.

What are the most common documentation failures that draw enforcement attention?

Generic threat evaluations applied uniformly across segments without segment-specific analysis, reassessment intervals set at the regulatory maximum without supporting technical justification, and written programs that describe activities not reflected in actual records are the most consistent enforcement patterns. Each represents the same underlying failure: a program maintained as a compliance document rather than as an operational management tool.


Need a better way to navigate regulation context? Kondwit organizes PHMSA regulations, enforcement data, and inspection guidance in one structured platform. Learn more


See how Kondwit connects regulatory sections, enforcement history, and inspection questions. Request a demo


Matthew Brown, PE Licensed Professional Engineer | 15+ years pipeline integrity and compliance experience

Matthew Brown is a pipeline integrity engineer specializing in integrity management program development, regulatory compliance, threat assessment, and audit preparation. He has supported operators across transmission, distribution, and hazardous liquid systems with program development, documentation review, and PHMSA audit support.

This content is for informational and educational purposes only. It does not constitute engineering services, legal advice, or a professional engineering opinion. Operators should consult qualified professionals for system-specific compliance decisions.

Need a better way to navigate regulation context?

Kondwit organizes PHMSA regulations, enforcement data, and inspection guidance in one structured platform — connecting regulatory sections to the context that matters.

Learn more

Get regulation updates

New enforcement analysis, regulation guides, and compliance insights. No spam.

MB

Matthew Brown

PE

Licensed Professional Engineer

Pipeline integrity engineer with 15+ years of experience in integrity management program development, regulatory compliance, threat assessment, and audit preparation. Supporting operators across transmission, distribution, and hazardous liquid systems.

This content is for informational and educational purposes only. It does not constitute engineering services, legal advice, or a professional engineering opinion. Operators should consult qualified professionals for system-specific compliance decisions.