top of page
Writer's pictureandrew6164

The Security Assessment Process (Physical Security Survey) - A Comprehensive and Holistic Approach

As part of our Security Consulting services, a key process is that we conduct a security assessment for our clients. Whether it be an assessment of at-risk personnel, businesses, physical locations of properties / multiple properties, it’s imperative to follow a unified holistic process to ensure consistency, accuracy, technical competence and align with industry standards.  The security assessment process is more than just following a checklist.  It’s imperative that a qualified security consultant / professional conducts the assessment. It adds to the credibility of the assessment, but more importantly a qualified security consultant / professional understands realistic threats and vulnerabilities as it pertains to the scope of the project and entire process.  The following information listed below will highlight our security assessment process that we developed at Secure Options Consulting, LLC.


Our Process at Secure Options Consulting, LLC:

STEP 1: Threat Assessment: This is conducted to prevent, forecast, and predict future incidents that may occur at your property’s location or threats relevant to the at-risk personnel. This entails a comprehensive open-source investigation into the local crime trends, hazards and other threats associated within the geographical area of your property or at-risk personnel.  It also examines any previous incidents that have occurred with any individual / suspects. This investigation at times yields helpful information on suspects or a group’s psychological mindset.  Our Threat Assessment also examines known threats regarding targeted violence and crime. In these circumstances we utilize our threat assessment and protective intelligence process known as Situational Threat Assessment Indicator Rating. (STAIR)©.  This is conducted to examine known suspects or groups potential for street crime, violence, and the likely course of action these bad actors may take in relation to the property or at-risk personnel. We also compare our findings with comparable incidents and the crimes associated with them to determine if any crime patterns or threats exist. Lastly, interviews are conducted with key personnel to determine any other concerns which you or your organization may have.


STEP 2: Vulnerability Assessment: This is an examination of your structure’s current security processes, function, practices, physical protections measures and technology that is currently in place as it pertains to security.  It closely identifies the key locations of any at risk personnel, critical assets, their level of protection and if any security shortcomings that an intruder can exploit and use to their advantage to conduct an attack, theft, sabotage or commit other hosts of crimes which may disrupt your normalcy of living. Any vulnerability identified will be noted, photographed and at times video will be taken of this shortcoming. Additionally, it provides recommended security solutions and countermeasures to properly protect your property or at-risk persons.  This process is conducted in two phases. Phase 1 will be conducted during daylight hours. Phase 2 will be conducted during darkness or at night to examine security lighting and pedestrian activity around the building or property in question.


 We utilize a light measuring device to ensure the property and area lights are producing the appropriate amount lumens and candela in relation to security industry lighting standards.


An optional step in this process is a penetration test.  This test is where the consultant just casually walks around the building looking to enter a vulnerable point or loiters for several minutes near a video surveillance camera hoping to elicit some type of action from your residents or any employees of your association. Lastly, the consultant will walk into the front main entrance, or look for an unlocked door, tailgate into other doors and try to walk past personnel or residents.

 


STEP 3: Security Risk Management and Analysis: All the above collected information and data will be examined by our qualified security consultant. A written report / PowerPoint presentation will be completed.  Security risk management alternatives and solutions will be recommended along with an overall security risk rating of low, medium or high risk of the requested locations and people. This risk rating is used to aid the client in choosing the best short-term and long-term security plan in protecting your organization coupled with the appropriate amount of risk you may choose to assume.


STEP 4: Security Products List: Upon completion of the security assessment, security countermeasures and solutions will be recommended, the consultant will establish a recommended security products list to include a security products vendor list.

 

Below is a sample security assessment outline our Consultants follow throughout our process.

 

Security Assessment Outline:

1.Building / Structure Information

2. Building Tenants / Clients / Occupants

3. Reason for Survey

a.  Intelligence / Information

b. Loss Event Profile / Threats Potential Courses of Action

 

4.   Undercover On-Site Evaluation

5.   Outer Perimeter

a.           Type of Neighborhood

b.          Identifiers of Structure

c.           Adjacent Buildings, Structures or Areas of Concern

d.          Detect, Delay, Respond Methodology

e.           Perimeter barriers

f.           Fence Applications

g.          Parking Lots / Garages

h.          Parking For Visitors

i.            Outer Perimeter Lighting

j.            Visibility of Perimeter / Building / Site

k.          Landscaping / Cover and Concealment

l.            Video Surveillance Systems

m.        Signage / Way Finding

n.           Ingress Routes

o.           Egress Routes

 

6. Inner Perimeter / Building Exterior

a.          Doors

b.          Windows

c.          Other Ports / Openings

d.          Driveway

e.          Loading Dock

f.           Roof

g.          Helicopter Landing Pads

h.          Building Ventilation Intake

i.           Emergency Power Sources

j.           Power / Utility Connections to Building

k.          Landscaping / Cover and Concealment

l.           Water Supply

m.        Sidewalk

n.         Underground Access to Facility

o.         Signage / Way Finding

p.         Inner Perimeter Lighting

 

7. Building Interior

a.          Doors

b.          Interior Windows

c.          Restrooms

d.          Break Rooms

e.          Offices / Misc. Rooms

f.           Hallways

g.          Fire Prevention

h.          Reception Area

i.           Video Surveillance Systems

j.           Ventilation System

k.          Elevators

l.           Stairwells

m.        Ceilings, floors and walls

n.          Safe Rooms / Locations / Area of Safe Refuse

o.          Mail Room

p.          Fire Escapes

q.          Interior Lighting

r.           Key control / accountability system

 

8. Computer Systems / Information Technology / Cyber Security

 

9. Intrusion Detection Systems (IDS)

a.       Intrusion Detection System

b.      Type of Intrusion Detection System

c.      Intrusion Detection System Considerations

d.      Design Criteria

e.      Installation Options: Outer Perimeter

f.       Installation Options: Inner Perimeter

g.      Building Interior

h.      Object or Proximity Alarms

i.       Alarm Procedures

 

 

10.  Security Personnel

11.  Personnel Accountability

12.  Hazardous Materials

13.  Recommendations and Findings

a.           Photographs / Diagrams

 




For questions regarding any of our Security Consulting services, you can contact us toll free at 866.850.6863 or email us at info@secureoptionsconsulting.com  .

 

 

8 views0 comments

Comentarios


bottom of page