0% found this document useful (0 votes)
45 views

Benz

This document discusses the importance of physical security considerations in facility design and provides guidance on various design phases and technical security elements. It emphasizes conducting a security assessment to identify vulnerabilities and threats, performing a risk analysis to determine appropriate countermeasures, and selecting integrated physical security measures that address the requirements. The implementation process includes procuring systems, implementing recommended solutions, and providing ongoing monitoring and evaluation procedures.

Uploaded by

tytytytyty
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Benz

This document discusses the importance of physical security considerations in facility design and provides guidance on various design phases and technical security elements. It emphasizes conducting a security assessment to identify vulnerabilities and threats, performing a risk analysis to determine appropriate countermeasures, and selecting integrated physical security measures that address the requirements. The implementation process includes procuring systems, implementing recommended solutions, and providing ongoing monitoring and evaluation procedures.

Uploaded by

tytytytyty
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

This manual provides guidance to ensure that appropriate physical security

considerations are included in the design of facilities. The pre-design


phase, including physical security threats, are discussed initially,
followed by an overview of the design phase. Specific technical sections
include exterior site physical security, building physical security,
ballistic attack hardening, standoff weapon hardening, and bomb blast
hardening.

A security design consultant has the expertise in evaluating the security needs of
your facility and determines the best electronic security options to meet those needs.
Additionally, the consultant has an understanding of how those options will integrate
with all the other elements of your security program. The consultant can determine
optimal device placement, deal with regulatory and code issues with the devices
(especially with access control systems) and prioritize the importance of system
functions and capabilities to make sure the ultimate equipment chosen matches the
security needs. Finally, the consultant can provide realistic cost estimates so
budgets can be set and no surprises come up during system procurement. All of
these evaluations and recommendations from a needs assessment report that can
be used to support your claim that a security need exists and should be addressed,
ultimately helping you do your job even better.

System Design Now that you know what types of electronic security devices should
go where and what their functions and capabilities should be, the necessary system
needs to be designed. Let’s say you have a complete and correct electronic security
needs assessment showing all the correct device types, locations and functions. Do
you have the expertise to know which products in the marketplace are the best fit for
your needs? Do you know the correct things to look for in a product to determine if
it fits your need? Do you know what things to avoid? Do you know how competitive
the bidding would be based on those product choices? Probably not. This is no
slight on you, the industry is just so complicated and fast changing that it would be
impossible for you to keep up on all those issues and still do your job. What do you
do as the security manager handling this project?

What if, instead of having an installation firm write the specifications, you invite
several reputable firms into your facility, explain to them what exactly you are looking
for based on your needs assessment, and ask them to give you a proposal with
products that will meet those needs and associated costs. Sound better? While it
probably is better, it is still inherently flawed. Installation firms usually have certain
manufacturers that they use the majority of the time either because they have a
comfort level with that manufacturer or they have an actual agreement with that
manufacturer to sell a certain amount of its equipment per month. What happens is
the equipment is made to fit the needs even if it is not close to the best fit or the most
cost effective option. Additionally, do you have the expertise to sift through the
proposals to determine which equipment is the best fit for your needs?
A security design consultant is independent of any manufacturer or installation firm.
Their product choices are based solely on the needs of the client. They match the
product to the need rather than the need to the product. The consultant can prepare
design specifications in two specific ways: for a Request for Proposal (RFP) or
Invitation to Bid (ITB). A Request for Proposal describes in detail the system and
equipment requirements as determined by the needs assessment and gives general
criteria that the bidder must fulfill for their bid to be acceptable. The installation firm
will then propose equipment to meet those needs and give a cost for the installation.
The consultant will then evaluate all the proposals and make a recommendation as
to which proposal best meets the needs of the client. An Invitation to Bid actually
spells out the exact equipment that will be bid. The consultant will have already
made those determinations based on expertise and industry best practices. The
installation firm merely bids a cost for what is specified. In either case the product
decisions are based solely on the needs of the facility and client rather than any
other factors.

Physical Security Assessment

 Identifying assets to determine their value and criticality  Assessing the nature of the threats so
that the scope of the problem can be determined  Conducting a physical security survey in order to
identify the vulnerabilities of the
organisation  Performing a risk analysis so that appropriate countermeasures can be developed
Selection of Integrated Physical Security Measures
 Identifying measures/components to match the requirements of the appropriate
solution/recommendation
 Performing cost analysis of the proposed integrated measures to ensure efficiency of
implementation/operation
 Outlining/documenting recommendations with relevant reasons for presentation to facility so that
appropriate choices can be made
Implementation of Physical Security Measures

 Outlining criteria for pre-bid meetings to ensure comprehensiveness and appropriateness of


implementations
 Procuring systems and implementing recommended solutions to solve identified problems 
Conducting final acceptance testing and implementing/providing procedures for ongoing
monitoring and evaluation of the measures

You might also like