What is this – Perimeter controls are the security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Perimeter security involves the use of multiple layers of interdependent systems which include protective barriers such as fencing and barricades augmented by CCTV surveillance and security guards and other defensive measures.
Why do we need this – Outdoor perimeter security is an essential but often-overlooked area of physical security design. It can dramatically improve the effectiveness of a facility’s security system. Small investments in outdoor perimeters can provide significant protection to the building’s assets and reduce the need for other more costly measures. Outdoor perimeters add distance, time and scale to a physical security plan that cannot be achieved within the building itself. In all physical security designs outdoor perimeters should be included as a supportive element.
How does SDS plan this – SDS can provide security design for owners and architects based on the company’s security goals to balance security costs against risks. These designs take into account the costs of specifying, developing, testing, implementing and maintaining these controls. Other considerations include broader issues such as aesthetics, human rights, health and safety, and societal norms or conventions.
What is this – Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of a variety of sensors and CCTV analytics.
Why do we need this – After establishing a protected perimeter alarm systems are installed to alert security personnel when unauthorized access is attempted.
How does SDS plan this – Based on the perimeter controls established, SDS arranges the alarm system to provide a continuous sensor perimeter at all openings and inside selected spaces where high value personnel or equipment is located. The goal of the alarm system is to signal security personnel when unauthorized personnel are in sensitive areas.
What is this – Access control methods are used to control and monitor “who, goes where, when” inside a protected facility. This is done most often with electronic code systems that generally use identification credentials such as cards as authorization methods. The credentials and readers work in conjunction with a wide range of locks, barricades and related devices.
Why do we need this – Every perimeter requires openings through which normal work flow of personnel takes place. An effective security plan requires that only authorized personnel be admitted through these openings. An access control device such as a card reader or keypad works in conjunction with electro-mechanical door locks to allow access to only those authorized personnel. These devices can be programmed to admit only certain individuals at certain times of the day and days of the week and can automatically be reprogrammed en-mass during security events. An example of this would be to “lock down” the entire facility during a break in, permitting only a select group of people access to specific areas. This is always done in keeping with prevailing fire codes and other life safety considerations.
How does SDS plan this – SDS works with your management team to establish how authorized personnel uses a facility. Based on this use pattern, access control devices are planned for certain openings with specific authorization levels for those authorized personnel.
Some of the considerations for access control system design are:
- Credential style, such as photo ID
- Credential technology, which might be proximity, magnetic stripe or other applicable technologies
- Reader style, external, internal, spark proof etc.
- Network requirements, IP addressable, hard wired spoke, hard wired daisy chain
- Software controls, credential control, alarm monitoring and display and a wide range of other features
- Database features, including information about credential holders
- System integration with other systems, such as CCTV and fire systems
What is this – CCTV is the most common part of remote surveillance techniques. Surveillance cameras can be a deterrent when placed in highly visible locations, but are primarily used to investigate and classify security incidents. The second most widely used application for CCTV is evidentiary data. This is primarily used for verification and historical analysis. For example, if alarms are being generated and there is a camera in place, the camera could be viewed to verify the alarms. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed.
Why do we need this – Chiefly CCTV is used to reduce security costs. CCTV eliminates having to place guards at every sensitive area and instead allows the security force to view an incident remotely. Video monitoring does not necessarily guarantee that a human response is made to an intrusion. A human must be monitoring the situation in real time in order to respond in a timely manner. Video monitoring is also a means to gather a permanent record of evidence to be analyzed later.
Adequate lighting is necessary to view and capture images plus lighting deters crime.
How does SDS plan this – SDS will recommend camera placement based on openings in the security perimeter and the location of assets in controlled locations. It should be possible for the guard force to track a perpetrator throughout a facility and provide location information to roving patrols for investigations.
SDS will designate required light levels where necessary for usable CCTV images and reduce opportunities for criminal activity.
What is this – Employee identification is the means by which an individual is identified as an employee by other employees. Usually this takes the form of an ID credential worn outside the clothing. This credential is often unique, making it difficult to duplicate.
Why do we need this – Employee IDs are necessary to distinguish employees from other individuals. They are used in conjunction with employee training and orientation that requires an employee to notify security if they observe an unauthorized person in a secured area.
How does SDS plan this – SDS assists the client in developing a security policy that requires reporting unauthorized individuals and the wearing of a security credential during all times on company premises. SDS will identify the most applicable credential to use, in conjunction with the access control credential and the layout for the identification badge. This could include:
- Name
- Department
- Color coded backgrounds for high security areas
- Photographs
- Other relevant information
What is this – From time to time non-employees must be permitted to the company’s facility. These “visitors” must be identified and their access to selected spaces tightly controlled. Visitor control is the means by which these individuals are greeted, vetted, their permission to enter the facility verified and their access is properly granted.
Why do we need this – Visitor control is essential to ensure that only authorized personnel are in secured areas and that everyone entering the facility has legitimate business with the company and stays only in their assigned location.
How does SDS plan this – SDS assists the client in developing a security policy that requires greeting and vetting visitors and requiring that they wear a security credential during all times on company premises. The policy and procedure with also stipulate verification of their purpose and intended visit location. SDS will identify the most applicable system for gathering this information and equipping the security force or receptionist with all the tools necessary to ensure controlled visitor access.
What is this – Alarms and employee notification of unauthorized personnel is only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat.
Why do we need this – Security forces must respond quickly to a security breech. Loud audible alarms can act as a psychological deterrent, by notifying intruders that their presence has been detected. But the most effective response is a human either directly or remotely by an announcement over a loudspeaker.
How does SDS plan this – SDS will develop response protocols for your security force. If no security force is currently on-site we will also develop a profile for the type of officer needed for each post (guard station) and a job description to be used when interviewing and selecting personnel.