Monday, October 1, 2012

Essentials of Physical Security



Essential of Physical Security
By Melencio S. Faustino

Introduction                                                                                                                          
Paradise is now shut and locked, barred by angels, so now we must go forward, around the world and see if somehow, somewhere, there is a backway in.
-Henrich von Kleist

This paper introduces the fundamental principles of physical security. The concept of security in physical layers is introduced and addressed the external barriers-such as fences, walls, gates, buildings, and lobbies-and internal barriers like the access control system. The importance of internal controls and intrusion detection system as applied with current technology, such as biometrics are also included.

Definition of Physical Security
            No business is without security problems and assets protection risks. These risks and problems take many forms. Effectively mitigating them is not a happenstance occurrence. Problem elimination and risk mitigation require both planning and an understanding of security needs, conditions, threats, and vulnerabilities. Assessing security conditions and planning for appropriate levels of assets protection should begin with basics: risk management.
            Physical control is the most fundamental aspect of protection. The use of physical control is to protect the premises, site, facility, building, or other physical assets of the company. The application of physical security is the process of using layers of physical protective measures to prevent unauthorized access, harm, or destruction of property. In essence, physical security protects a property, plant, facility, building, office, and any or all of their contents from loss or harm.
           Physical security also contributes to protection of people and information. Sophisticated protection measures, other than physical, are also employed to protect people and information. Nevertheless, physical security measures are part of the overall protective package. They are the baseline security measure, or foundation, from which all other security measures and functions are built.
            Both in public and private companies, physical security measures are necessary to ensure that only authorized persons have access to facilities and property. The measures employed must be appropriate for each separate operating environment. Manufacturing facilities will require physical security measures and functions and controls that may differ from those utilized in sales offices. Also, manufacturing facilities in different parts of the country or in different countries generally require varying physical security measures because each system is customized and individualized depending on the needs and specifications of the facilities. All other security measures will be integrated with physical security measures, thereby developing a protection profile of assets protection within layers. In short, physical security measures are the baseline of protection for different companies.
            It is the responsibility of the security managers to determine the kind of physical security controls necessary to provide for an adequate level of protection. To accomplish this, the security manager must know the totality of the facility or site layout. The security manager must understand the operating requirements and operation of the enterprise and must conduct an initial physical security survey and management survey program. This will also allow a thorough understanding of threats, vulnerabilities and strengths as it will enable the development and implementation of sufficient controls.

Effective Physical Security
  • People: Will always be the number one factors. Their training and motivation make them work effectively and efficiently.
  • Policy/procedure: Allows easy enforcement.
  • Hardware: Must be state of the art and highly reliable.
  • Facilities: May look different in shape and design but the principle and concepts are the same.
  • Information: Proactive responses and proper documentation.
  • Human Resources Department: A critical area, especially when the termination of an employee is to take place. Access cards to be punched out, badges returned/recovered along with the keys.
Security in layers
            Physical security measures protection of company assets depend greatly on what assets need to be protected, where they are located, and what threats, vulnerabilities, and risks pertain to them. Applying an appropriate level of protection for each environment requires an specific understanding of the environment. To best accomplish this, security manager should start at the beginning – the planning design stage of each facility.
            Physical security measures should be included during the facility design phase and incorporated into the facility during the construction phase.
            Ideally, architects and security professionals would work together taking into consideration all aspects of assets protection requirements applicable to the proposed operating environment. This type of planning would help create optimum security at the lowest possible cost. If done properly, the security problems created by so many buildings being designed without any consideration given to security controls would no longer be the issue that it usually is these days.
            As to security managers not working with new construction and are occupying an existing building, designing the architectural security may not be possible. If retrofitting or renovation of the site or facility is necessary to accommodate the business operating environment, then security issues should at least be addressed prior to occupancy or operation. Security problem resulting from a failure to make security part of the design and construction phase will probably be of a structural nature and too expensive to undo or fix. The only solution in this case will be the application of protective measures that otherwise might not have been needed, thus adding costs. In case where security manager knows that the facilities will be moved, it is important to coordinate the move to facilities that meet company’s assets protection of physical security criteria, or arrange to locate to another facility or modify the existing facility before company move takes place.
            The application of physical security controls should be approached in layers. There is no single physical control that will fulfill all of the company’s security needs. Layering controls from the outer boundaries of each of the company facilities to the inner boundaries will allow security manager to build a security profile to meet company’s specific security needs.

Outer Layer of Protection
            The outer layers of protection for a facility will depend on the type of facility and its location. For example, an office building located within a city may only have as its outer layer or perimeter, the walls of the building, whereas a manufacturing facility located in an industrial district may be on large parcel of land with parking lots, storage areas, and grounds surrounding the building or buildings. On a facility of the second type, the perimeter is usually a barrier, such as wall or fence, located at or near the edge of the property line.
            The perimeter of the facility may take many forms. For an office building, it may be the building walls. For a factory, it may be a fence line or a wall at the property edge. The outermost layer of protection could also be a highway; a natural physical barrier, such as river, lake, or other body of water; or other man-made barriers. Whatever the barrier, it is the first layer of physical security. It may be at the perimeter’s edge or inside the perimeter. Regardless of where it is situated, it is the layer of first control. Inside the outer layer, the use of other layers of physical may be necessary.
A barrier is a system of barricades place between the potential intruders and the assets to be protected. It delay, deter intrusion to the company property, and complement the on-site security personnel needs. It is deem to control vehicle and pedestrian traffic, enable identification of people arriving and departing and provide a buffer zone for more sensitive areas of the company. There are two types of barriers used for perimeter protection: natural barriers and structural barriers.
  • Examples of natural barriers include rivers, lakes, and other types of terrain that are difficult to traverse; and areas dense with certain types of plant life (e.g. blackberry bushes that are very thorny and dense).
  • Examples of structural barriers include highway, fences, walls, gates, or other types of construction that prohibit or inhibit access.
None of these barriers completely prevent access. They do, however, make it much more difficult for unauthorized persons to gain access. When used with other layers of physical control, they can be very effective.

            Grounds
            Not all facilities have grounds. Grounds may serve many purposes. It may be purely decorative to create a pleasant environment for customers and employees. It may be functional and serve as a place to locate storage areas and warehousing facilities. They may also serve as a buffer or barrier between the perimeter of the facility and the buildings where work is done and people, physical assets, and information are housed. If kept clear, the grounds may serve as a clear zone, allowing for unobstructed observation of the area. If used for storage or other purposes, they should be kept organized and maintained. In this way, disruptions are easier to identify and the risk of hazards is reduced.
           
            Roads
            Roads are both necessary and problematic. They allow for employees and customers to have easy access to the facility. However, they may also allow unauthorized personnel to have easy access to the facility. The degree of control necessary on all roads leading to company facility will vary. Any controls used will depend on the type of the road and its use. Is it a public road or a private road? Public roads do not allow for additional controls. They belong to the municipality, city, or state and exist to facilitate movement of vehicles and people. If a facility is adjacent to a public road, controls can begin only where the road ends and the company property begins. Private roads allow for much greater control. Owners of private roads may install controls that allow for restricted passage. Owners of private roads may make the determination as to who has access and under what conditions. Ideally, controls on any road should begin as close to the outer perimeter as possible.
            In an office–building environment, public roads generally lead to parking lots that are often adjacent to the buildings. This means perimeter controls begin at the parking area or at the walls of the building.

Fences
            The most commonly used form of barrier, other than walls of a building is the fence. Fences vary in type, size, use, and effectiveness. They can be erected quickly for a reasonably low cost, as is the case with the basic chain link fence. They may also be made more complicated and effective by adding barbed wire or concertina wire, alarm systems, or double fencing with alarmed clear zones between. The type of fence selected and used should be determined by the specific needs. Again, balance the costs versus the risks.
            In many companies around the world, perimeter does not have the advantage of a natural barrier, so fencing was necessary. The fencing used is very typical. It is 7-feet high, made with 9 gauge wire. It rests no more that 2 inches above the ground and in areas where the soil is loose, a concrete trough/border lies at the base to prevent gaps from erosion or human intrusion. At the top of the fence is a “guard” of four strands of barbed wire placed at a 45-degree overhang that faces away from the property. This actually extends the height of the fence by 1 foot and provides added difficulty for anyone attempting to scale the fence. Naturally, buildings, structures and trees are sufficiently away from the fence line as to not offer assistance to those who would attempt unauthorized entry. In enhancing the physical security of the facility, the security manager should consider the facility’s “good neighbor” policy. This policy states that the local city planning and beautification commission must also approve any changes made by the facility that affect the beauty of the surrounding area.
           
            Fence Design Criteria
            Four types of fence authorized for use in protecting restricted areas are: Chain link, barbed wire, concertina, and barbed tape. Choice of type depends primarily upon the degree of permanence of the installation, availability of materials, and time available for construction. Generally, chain link fencing will be used for protection of permanent and exclusion areas. All four types of fencing may be used to augment or increase the security of existing fences that protect restricted areas. Examples would be to create an additional barrier line, increase existing fence height, or provide other methods that add effectively to physical security.
            Chain link fence. Chain link fence, including gates, must be constructed of seven foot (approximately 2.13 m) material (6 foot or 1.83 m for controlled areas), excluding top guard. Chain link fences must be of 9-gauge or heavier wire galvanized with mesh openings not larger than two inches (approximately 5.1 cm) per side, and a twisted and bared selvage at the top and bottom. It must be taut and securely fastened to rigid metal or reinforced concrete posts. It must reach within two inches (5.1 cm) of hard ground or paving. On soft ground, it must reach below surface deeply enough to compensate for shifting soil or sand.
            For added resistant to climbing, optional top rail or taut wire may be omitted. Fencing may be painted with non-reflective substance to reduce glare to security forces. Weaknesses in the chain link fence occur as a result of weather (rusting) and failure to keep fencing fastened to the post, which affects the desired tightness.
            Barb wire fence. Standard barbed wire is twisted, double-strands, 12-gauge wire, with four point barbs spaced on equal distance apart. Barbed wire fences, including gates, intended to prevent human trespassing should not be less than seven feet high, excluding the top guard, and must be firmly affixed to posts not more than six feet apart. The distance between strands will not exceed six inches and at least one wire will be interlaced vertically and midway between posts.
            Concertina wire. Standard concertina wire is commercially manufactured wire coil of high-strength steel barbed wire, clipped together at intervals to form a cylinder. Opened, it is 50 feet long and 3 feet in diameter. When used as perimeter barrier for restricted area, concertina must be laid between poles with one roll on top of another or in a pyramid arrangement (minimum of three rolls). The ends must be staggered or fastened together and the base wire picketed to the ground.
            Barbed tape fence. The barbed tape system is composed of three items: barbed tape, barbed tape dispenser, and concertina tape. These items were type classified “standard A type.”
            Barbed tape is fabricated from a steel strip (0.020 inches thick nominal) with a minimum breaking strength of 500 pounds. The overall width is ½ an inch. The tape has 7/16 inch barb spaced at ½ inch intervals along each side. Fifty yards of tape are wound on a plastic reel 8 ½ inches in diameter and 1 inch thick. The finish is electro-galvanized at 0.0001 inch thick on each side.
            Barbed type concertina consists of single strand of spring steel wire and a single strand of barbed tape. The sections between barbs of the bared tape are securely clinched around the wire. Each coil is approximately 37 ½ inches in diameter and consists of 55 spiral turns connected by steel clips forming a cylindrical diamond pattern when extended to a coil length of 50 feet. One end turn is fitted with four bundling wires for securing the coil when closed, and each end turn is fitted with two steel carrying loops. The concertina extends to 50 feet without permanent distortion and when released can be retracted into a closed coil.
            Top guard. A top guard must be constructed in all perimeter fences and may be added on interior enclosures for additional protection. A top guard is an overhang of barbed wire or barbed tape along the top of a fence, facing outward and upward at approximately 45-degree angle. Top guard supporting arms will be permanently affixed to the top of fence posts to increase the overall height of the fence by at least one foot. Three strands of barbed wire, spaced six inches apart, must be installed on the supporting arms. The number of strands wire or tape may be increased when required. The top guard of fencing adjoining gates may range from a vertical height of 18 inches to the normal 45-degree outward protection, but only for sufficient distance along the fence to open the gate(s) adequately. Top fence rails should not be specified where protection is of utmost importance. Top rails will assist a climber. A bottom and top wire reinforcement should be used as a substitute.

            Walls
            Walls served the same purpose as fences. They are man-made barriers but generally are more expensive to install than fences. Common types are block, masonry, brick, and stone. Walls tend to have a greater aesthetic value, appealing to those who prefer a more gentle and subtle look. Regardless of the type of walls used, its purpose as a barrier is the same as the fence.
            Walls also present a disadvantage. It obstructs the view of an area. Chain link and wire fences allow for visual access on both sides. Walls do not. This obstacle can be overcome by keeping clear zones for several feet on each side of the wall and by using video cameras for observation. Use of roving patrols also increases visibility. When the walls of a building serve as a perimeter barrier in lieu of fencing, the issues are different. Scaling the wall to get to the other side is not an issue but access to the roof is. Furthermore, controlling access to other openings in the building becomes more critical when the walls to the building are the only outer barrier separating the outside world from the assets requiring protection.
           
            Natural Barriers
            The effectiveness of natural barrier will depend on the barrier itself and how it is. A body of water may be very effective in keeping pedestrian traffic away from the company property but not very effective at keeping boat traffic. In this case a natural barrier may need to be augmented with man-made barrier. In any case, natural barriers, as with man-made barriers, need also to be monitored. Cliff sides can be scaled, water can be crossed, and difficult terrain can be overcome.

            Gates
           Gate exists to both facilitate and control access. The most secure perimeter allows no one through. However, that is not practical or desirable; people must come and go. Employees, customers, and other visitors need to have easy access to the facility. Gates allow for this purpose.
            Gates need to be controlled to ensure that only authorized persons and vehicles pass through. A variety of controls can be used. Guards, electronic interactive access control system such as card key or password access, or remote control access with video camera observation can all be useful. Selection will depend on the specific needs and conditions of the facility (e.g. acceptable level of risk). The number of gates to a facility should be kept to the minimum necessary, not the minimum desired. Controlling gates requires using resources. The more gates used the more resources it will take and more potential problems will be created, because any opening is always a potential vulnerability.
            Gates not used should be locked or eliminated. Having the flexibility to open an additional gate when traffic demands are high is useful. Eliminating a potential vulnerability may be more useful. If a periodic need for an additional gate does exist, gate must be closed, locked, and monitored when it is not in use. Monitoring can be done by video camera, roving patrols, or through the use of an alarm system. Periodically, even monitored gates require physical inspection to ensure they are operable and secure.

Other Openings
            Openings not design for personnel or vehicle traffic are also a concern and must be secured. Sewage pipes, drains, utility tunnels, large conduits and heating, ventilation, and air conditioning ducts must be controlled. Where it is appropriate to lock them, they should be locked. Those that cannot be locked should be monitored. Monitoring may be in the form of an alarm system or a physical inspection. Any opening larger than 96 square inches should have doors, bars, or grills work in place to prevent human access. These can be installed as permanent or removable, with locking devices. For example, to prevent access through heating, ventilating, and air conditioning ducts, man bars can be installed inside the ducting. This is not ideal for openings requiring access by maintenance personnel, where the use of removable grills or doors may be more practical. In any configuration, all openings must be assessed for vulnerabilities so that appropriate protective measures can be implemented. Regular inspection or monitoring is essential to ensure that tampering has not occurred.

            Buildings and Doors
            For many facilities, buildings and doors define the outer layer of security and the inner layers of security begin. Within a site, buildings are the separation point between the outer and inner layers of security controls. In the area between buildings and outer perimeter (usually a fence line) of the facility lie a variety of security control that make up the entire layer of security.  In this configuration, it is better to keep the area adjacent to building and door exteriors clear. In essence create a clear zone of 10 to 15 feet where no storage, parking or regular activity is authorized. Maintaining a clear zone, allows for unobstructed observation by surveillance cameras and guards. Visual access to the clear zone becomes the first line of defense.   
            All exterior doors of commercial buildings shall meet the requirements as set for the residential buildings. Should glass door be installed, it must be of the laminated safety glass or poly-carbonated sheeting. 
            Rolling overhead or cargo doors. Doors not controlled or locked by electronic power operation shall be equipped with locking bars that pass through guide rails on each side. The locking bars shall have holes drilled in each end and a padlock placed in each end once the bar is in the locked position. The padlocked shall have the case hardened shackle with locking lugs on the heel and toe of the shackle and a minimum of four-pin tumbler operation.
More about doors. Fire safety doors required by safety regulations are generally undesirable to security. The usual method of opening fire doors is by pushing against a panic bar installed at the mid-rail position on the secure side of the door. Security should be enhanced at fire doors by the use of audible alarms. Unusually long warehouse doors should be padlocked inside at both ends. Hinge pins exposed to the outside must be protected by either spot welding, or hinge bolts set into the door frame.

            Parking
            Providing parking space for employees, customers, and visitors is necessary. Unless the business is small and located on a street with public parking access, parking needs to be provided. Parking should not be allowed within the inner perimeter. Vehicles inside the perimeter make it easier for theft to occur. Employees with immediate access to vehicles inside the perimeter have a ready place to conceal stolen items. Furthermore, unless all vehicles are inspected, it will not be known what items of contraband or weapons are brought into the facility. If for lack of space, parking must be permitted within the inner perimeter, additional fencing should be added to separate the parking area from the remainder of the facility.
            Parking can be very sensitive subject. It can be difficult to manage and police. It is recommended that parking rules be established by the management with security manager’s input. Parking enforcement should be handled by the security.
            Company owned vehicles are the only exception to parking within the perimeter. As an asset of the company, these vehicles need protection. Protection is particularly important if the vehicles are loaded with merchandize, supplies or raw materials. They should be parked in a secure well-lighted area and locked. However, they should not be parked in the same area as privately owned vehicles.

            Lighting
            Lighting serves several purposes. Adequate lighting reduces the possibility of accidents and injury. It also serves as a deterrent to would-be intruders. With adequate lighting, the company grounds, fences, walls, and buildings can be clearly observed. Guidance for specific levels of illumination may be obtained through government sources or from any company that sells or installs exterior and parking lot lighting. Perhaps the best determination for assessing adequate lighting is to conduct an actual test. Is the existing lighting sufficient as assessed under controlled and practical conditions? If not, the facility needs more lighting.
            Adequate lighting serves as a deterrent. Intruders are less likely to enter well-illuminated areas, fearing they will be observed. Lighting should be sufficiently protected to prevent tampering and destruction. It should be kept within the perimeter to reduce the possibility of damage. Lights should be placed high enough to reduce the possibility of damage and to ensure that deliberate tampering can be difficult. When used as a deterrent, lighting should have a backup power supply in the event of power disruption. Lighting requires little attention, it can be programmed to turn on and off at specific times. It can be light-movement, or heat sensitive. It can be linked to alarm systems and supports CCTV. After installation, it does require frequent inspection to ensure that all systems are operational.
            Specific lighting needs will vary with each site or facility. As part of a site physical security survey, lighting should be considered. The areas that require direct protection should have lighting that does not only illuminates the area but also does not interfere with security’s ability to effectively monitor. Too much lighting can create a problem by producing bright spots that blind people and cameras. Doors, gates, and other entrances should be well lighted. This allows for safe passage and for better observation by guards and cameras. Areas with heavy personnel and vehicle traffic also require good lighting. It will reduce hazards and increase visibility. Large open areas with little traffic can use less lighting, but lighting must be sufficient to allow for general security observation and a safe environment.
             
            Surveillance
            Surveillance is an important tool in its effort to protect assets. Generally, surveillance is accomplished by using security guards or by using surveillance cameras. Most frequently, a combination of both is used to achieve maximum observation and effectiveness for any facility. As part of a site physical security survey, the need for surveillance should be identified. This need should be assessed against the existing practice and capability. With this information, a plan for site or facility surveillance should be developed. The plan should consider the following:
  • Purpose of surveillance: deterrence/observation
  • Identify critical or high risk areas
  • Camera and guard mix
  • Location of cameras
  • Recording capability needed
  • Need for hidden cameras
  • Type of cameras needed: wide or narrow angle of view, low or high level of light; availability of solar powered cameras should be considered

Table 9-1 below outlines the strengths and weaknesses of CCTV and guards when used in the surveillance process.

Strengths
Weaknesses
CCTV
Camera with Recording Capability
Serves as a deterrent
Flexibility of recording
Permanent Record
Reduced insurance rates
Deterrent for crime
Multiple angels for view
Night view: works in low light

Cannot respond to incident
Cost of initial installation
Maintenance cost
Employees perception of being watched
Guards
or Security
Professionals
Can act on observation
Deterrent
Mobility
Apply immediate judgment
Can’t watch everything
Human error
No permanent record of observation
Limited angles of observation
Table 9-1. Strength and weaknesses of CCTV and Guards

Alarm
            Alarms are one of the layers used in the many layers of protection for a facility. How they are used and to what extent should be determined in the planning process. The site physical security survey should identify vulnerabilities, current and potential, and the layers of protection in use. When assessed against known or suspected threats, the need for alarms to augment physical protections should become apparent.
            Alarms augment barriers and guards. They call attention to problems not stopped or prevented by barriers and not observed by guards. In essence, they enhance the detection process. However, they also serve a deterrent function. Since most physical security controls include the use of alarm systems, intruders can assume they are part of the protection profile.
            Alarm systems are used to call attention to an immediate problem. Unlike physical barriers, such as walls, fences, or gates, alarms are not a physical obstacle used to slow down or stop an intruder. Alarm systems are an alert mechanism used to call attention in the presence of an intruder or problem. Audible alarm systems may serve as an obstacle much more than silent alarm systems, since everyone in the general area know when there is alarm activation.
            There are many types of alarm systems. Within the physical security, intrusion detection and fire detection is used to indicate penetration in or between the various layers of protection. Different types of alarm systems are available for fences, gates, and walls, and all provide an alert if they are compromised.
            Alarm system can be used as part of the protection profile for both inner and outer layers of physical security. When used as part of the outer layer of protection, they served as an advanced warning notice that an outer layer has been compromised, thereby making the inner layers more vulnerable. They serve to protect property and assets stored within the outer layer by providing an indicator that an intruder is tampering with, or in the area of the property being protected.
            In any case, alarm is only effective if there is a response. Someone must react to an alarm. An alarm system without timely response is not effective. Responding to an alarm is essential, or the alarm becomes nothing more than an expensive annoyance (e.g., car alarms in public areas are generally ignored). Perpetrators often test alarm systems by causing their activation and watching for response. No response lets perpetrators know that they have plenty of time to work with. Response to alarms by security guards or other must be periodically tested and the response of the security guards or others timed. These of course must be no-notice-test. It is ridiculous to test security guard response if they know a test is to be conducted.
            Alarm system provides balance for the overall physical security profile in both protection capabilities and costs. Alarm can reduced the need for a large, stationary guard force. They allow for a configuration of alarm monitors, respondents, and some form of patrol. They reduce or even eliminate the need for stationary force. If alarm systems are not used, the function they serve must be fulfilled by using a larger guard force or through the use of greater surveillance capability. Or, the security manager can just assume a greater level of risk. Remember that it is not up to security manager to assume a greater level of risk by choosing not to install alarms in an effort to save money. Actually alarms saved money by replacing people in many instances. Before assuming additional risks caused by the lack of alarms, security manager must consult with executive management and have them accept that additional level of risk.
            Alarm system cost more to install than to maintain. The cost of alarm system is greatest in the acquisition and installation phase. Once installed, maintenance and monitoring costs are generally much less than people costs. A return of investment can be calculated and used as a selling point on the value of alarm systems. Using alarm systems offsets the need for some guards. The saving in recurring guard costs can be compared to the cost of acquisition and installation of alarm systems. Over several years, it is usually more cost effective to use alarm systems to augment security than to rely on a larger guard force.
            If you were the security manager, would you want a silent alarm that was only audible in the manned security command center or an alarm audible in the area that is alarmed and also at the security guard’s console? The correct answer is, “it all depends.” It depends on the area alarmed. The value of the assets located therein, the risk to those assets, and so forth. The key is to base the choice on a risk assessment or physical security survey of each particular environment.
            There are varieties of commercially manufactured devices available. Some of these systems are suitable only for external protection while others are better utilized inside a structure. Since any alarm system can be neutralized or circumvented by resourceful individuals, consultation with a reputable expert in the field will help in the selection and installation of the most appropriate system for a particular situation. The standard alarm system consists of the following:
  • Sensor/detector or trigger
  • Circuit which transmit the change of condition
  • Signaling device, called the Enunciator

Inner Layers of Protection
            In the previous section discussed are the elements that generally considered part of the outer perimeter. These outer layers of physical security, for the most part, are layers of physical protection that lead up to the building walls. Also indicated is that depending on the environment of outer perimeter, the security manager might actually begin security at the building walls. In this situation, the first layer of security is made up of the walls, doors, and windows of a building. Office building in urban environments represents a good example of this situation. Outside these buildings are conditions that are not controlled by the building occupants. There is a single layer of outer physical security controls protecting the inner layers, which don’t leave much room for error. In this case, penetration of a single layer allows access to the inner layers of the facility. This condition should lead to a greater emphasis on the types of inner controls applied.
           
            Buildings, Doors, Windows, and Glass
            Buildings serve as perimeter. In urban areas, the walls, doors, and windows of office building may be the outermost perimeter and the only outer layer of security control for the entire facility. In other settings, buildings may serve as part of the outer perimeter or as the first layer of the inner perimeter. This will depend on the individual facility configuration. Whatever layer of protection it provides, full consideration must be given to all aspects of building protection. All openings must be addressed, and buildings generally have many of them. Doors, windows and passageways for ducting and conduits all need to be controlled. Power communications, and heating, ventilating, and air conditioning system require entry points from the exterior of the building into the interior of the building. To ensure they are not used for unauthorized purposes, control should be in place. Any openings that serve no useful function should be permanently closed.
            Functional openings larger than 96 square inches should be modified to prevent human access. Windows should be locked and alarmed. Alarms should detect entry or tampering. In some cases, man bars or screening may be necessary. Screens and man bars allow for the passage of air and visual inspection but do not allow for human access.
            The type of glass used in windows will vary depending on the location or use of the window. Windows at ground level on perimeter wall clearly require a stronger glass than those windows located on higher floors or inside the outer perimeter. In some areas they may need to be bulletproof. Furthermore, special glass may be required, for example, in earthquake areas. Should such glass be shatterproof or shatter inwardly or outwardly? The answer is that it all depends. Using a risk assessment approach that includes personnel safety factors (e.g. flying glass) will assist the security manager in making a cost-effective decision.
            Doors should be locked when not in use and controlled when in use. Controls range from guards at the door controlling entry and exit to mechanical or electronic access control systems requiring cards and card readers or access codes. Exterior or perimeter doors must be hardened, and are generally built to be stronger than interior doors. It may be necessary to have interior doors of a similar strength and quality as exterior doors if those interior doors are part of an area used to provide specific protection to high value assets. All associated materials for doors must be consistent with the strength of the doors themselves. For example, a high-security door is of little use if weak latching devices or cheap locks are used to hold it in place.

            Locks, Keys, and Combinations
            Locks are an essential part of physical security protection. They are a cost-effective and simple means of denying access to unauthorized persons. The largest expenses for locks are the initial purchase, installation, and control of their use. Depending on usage, little maintenance is required. Although any lock can be overcome, the higher the quality of the lock the longer it will take. Simple locks can be picked or easily damaged. More sophisticated locks will buy more time against any attempt to bypass them. Locks vary in quality and type. A wide variety of locking devices are available. Determining the appropriate lock for any door, window, or other opening is based on planned usage, specific needs, and the assets requiring protection.
            Perhaps the most vulnerable aspect of locks is the failure to properly protect locks, keys, and combinations. Effective lock, key, or combination control is critical. Poor key control can render any locking device useless. Issuance of master keys must be severely limited, particularly the issuance of grand master keys. All locks, keys, and combinations should be accounted for. Keys and combinations should be issued in accordance with employees’ need to perform their job. If there is no specific need, locks, keys, and combinations should not be issued. A permanent record of personnel issued or assigned keys or lock combinations must be kept. When keys are lost or stolen, the locks should be re-keyed. When a master key is lost, all affected locks should be re-keyed. There are many times when this is not necessary, such as if a key were inadvertently destroyed and its recovery or use poses no risk.
            Keys should never be issued on a permanent basis. An annual assessment of locks, keys, and combination needs and requirements should be made. This assessment will also assist in identifying lost or stolen keys or combinations that were not reported to security.
            Locks, keys, and combinations should be issued to individual rather than groups if individual accountability is a requirement. The sharing of locks, keys, and combinations is a risk in that a theft or misappropriations of an asset protected by the lock cannot then easily be attributed to a specific individual. It is no different from sharing computer passwords.

            Roofs
            It is important to remember that roofs may be part of the outer or inner perimeter. Roofs generally have openings for maintenance, power, heating, ventilation, air conditioning, and other conduit. The same principle applicable to barriers and walls are applicable to roofs. Openings must be controlled. Since routine access to roofs is generally not an issue, locking devices and barriers such as screens and bars are used. Moreover, ladders or stairs leading to roofs should be controlled. Access to the roof should be made difficult for unauthorized personnel.

            Areas, Rooms, Containers, and safes
            Inside buildings there are open work areas, individual offices and rooms, storage containers, and safes. How they are protected should depend on how they will be used and also on the value of the assets in them. Open work areas such as large bullpen areas, where many employees sit at work stations performing their daily duties, may not require additional controls. Once inside the building, employees and visitors may need to move freely in these areas. Since access authorization has already been verified at either the outermost layer of security control (outer perimeter gate leading into the facility) or the first control of the inner perimeter (door or lobby allowing entry into the building), additional checks for general access may not be necessary-again, based on risk management. Moreover, access to general office areas and rooms such as conference rooms, cafeterias, or rooms housing other employee services may not need additional controls. Employees in these areas must understand that they also have a responsibility for controlling access in that all individuals not known to them, or not wearing a current, corporate badge, should be challenge as to their need to be in the area.
            Areas or rooms where more sensitive work is done or sensitive information and materials are located require additional controls. The simplest means for applying these controls is through the use of locking devices or access control systems on each entryway. From simple locking devices on doors to the use of electronic card readers or electronic personal recognition systems, varying degrees of physical control can, and should, be used to limit access to sensitive work areas. The methods used depend on the application of a cost-risk philosophy.
            Safes can be used for the most sensitive information or material. Safes are available in various sizes and strengths. Depending on the sensitivity of the information or material protected, simple combination lock or key lock safes may be sufficient. These safes can be obtained from a variety of manufacturers. For the most sensitive information and material, high-security safes and vaults may be necessary. For example, working with government classified material requires the use of government approved storage containers. The higher the classification of government material, the more stringent the requirement for storage containers becomes. The same philosophy should be applied for protecting sensitive company information.

Access Controls
            Controlling access is a critical component of security in layers to protect company assets. Ensuring that only authorized personnel and vehicle enter and exit the company facilities reduce the risk of loss or damage to all assets. Effective access control requires the integration of different security functions that serve as individual layers of protection. Used as part of an integrated system, the following are useful access control tools.
  • Guards
  • Locks: combination, code, or key
  • Card reader systems: magnetic stripe, optical bar code, proximity cards, biometric system (fingerprints, signatures, face or hand geometry, voice recognition, and retina recognition)
Part of the site physical security survey should focus on identifying access control vulnerabilities and existing access control practices. When vulnerabilities and existing practices are compared with what is actually needed, an access control profile that best fits company site can be developed and implemented. The access control profile must address who should have authorized access to the facility and under what conditions (e.g. weekdays but not weekends, normal business hours but not after business hours). It should also identify the individual security process and tools needed to effectively design and implement proper access controls.

What Should Be Controlled?
Vehicles
All vehicles entering and exiting the facility must be controlled. Only authorized vehicles should be allowed on site. Procedures establishing traffic flow and parking need to be written and communicated. Violations of these procedures must be enforced. Not enforcing traffic and parking rules and regulations will quickly lead to a breakdown and abuse of controls. At the very least, consideration should be given to random inbound and outbound searches of vehicles to ensure that anything entering the facility or leaving the facility has proper authorization.

Employees
Employees need easy access to their work areas, and access control procedures should be designed to facilitate their prompt and efficient movement in and out of the facility. Access control procedures should be the same for all employees, thereby creating a culture of respect and adherence to the process and practice, requiring employees to use some form of identification to be authorized access to a site is a standard practice. Badges, access identification cards, and other forms of physical controls can be used to validate that a person is actually an employee and quickly allows him or her entry into or exit from the facility. If the site employee population is large (e.g. exceeds 50 people), do not rely only on personal recognition for access authorization. Personnel changes take place regularly, and keeping up with employee changes and turnover is better accomplished with automated system than with the memories of security personnel. Furthermore, all employees should be subject to random entry and exit searches as determined necessary by the degree of assts protection required. To this practice there should be no exemptions.
Often the CEO and executive management set the tone. Their support or lack thereof is quickly seen and adopted by the employees. That is why the CEO and executive management must also wear badges, even if “everyone should know who they are.” As with all asset protection requirements, they must set the example.

Vendors, Suppliers, Customers, and Visitors
Very few people who are not employees should be allowed free and complete access to the facilities. If vendors or suppliers are assigned to a company site on full-time basis and do require unrestricted site access to perform their work, they are to be provided with identification that indicates that they are not employees. Moreover, this status should be subjected to scheduled periodic review to revalidate the need. Any identification provided to allow access should have an established expiration date. As with employees, all must be subject to random entry and exit searches. For contract employees, the expiration date of the badge should not exceed their contract expiration date.

How to Control Them
Vehicle and Personnel Gates
The first line of protection for access to a facility is at the vehicle and pedestrian gates. Through these gates, employees and visitors will enter the facility. Control must begin there. Processes should be in place to allow employees through and to properly process all visitors according to established procedures or parameters. The use of employee identification badges coupled with an electronic card identification system is one of the most common tools used for this purpose.

Building Lobbies and Doors
The same controls used for gates are generally effective for lobbies and doors. Some lobbies have guards who are also receptionists, or receptionists who double as guards. In either case, it is important that those people understand that their priority is access control and being a guard rather than a receptionist. If there is a conflict in the dual role, the security manager should ensure the separation of those functions by having two individuals perform the separate functions, for example, a receptionist as part of the human resources budget and a guard as part of the security budget. Executive management’s idea is almost always to have the lobby personnel appear very friendly and helpful. However, in some lobbies or access control areas they may want to provide the appearance of a no-nonsense security presence.

Interior Area and Rooms
Inside a building, access is generally controlled by three effective mechanisms, two of which were discussed earlier. They are the following:
  • Lock and key devices
  • Card key access system
  • Other employees
Employees play an important role in controlling access to internal areas and rooms. When they encounter an unauthorized person inside an area or room, they should be trained to challenge that person and report the incident to security. This conditioning does not occur naturally, and will require employee awareness training to be conducted for all employees. Moreover, this type of behavior is best encouraged through positive recognition and reward.

Badges
The primary use of badges is employee identification. Badges can also be coupled with access control systems, expanding their use and effectiveness. Magnetic codes, bar codes, and proximity cards, which activate electronic locking devices, can be linked to the identification of badge, making it a multi-functional identification and access tool. This tool can contain information pertaining to the specific characteristics of an employee. Identifying each individual by name and other specific personal information, such as photographs, encoded access authorizations, and pin numbers, is easily accomplished and makes badge a very reliable authentication device. Sophisticated badge and access control systems are available from a variety of manufactures. Computer technology advancements in general have made the process of making badges more efficient, effective and reliable.
To ensure reliability and effectiveness, the process of using a badge for employee identification must be controlled. Specific parameters for use must be established and maintained for the badge process to maintain its integrity. Rules governing the following aspects of a badge process will help ensure a very reliable system.
  • Determine who is authorized to have a badge
  • Identify on what data is needed on each badge
  • Security must control production, issuance, and accountability of badges
  • Badges must be recovered from employees who leave the company
  • Lost or stolen badges are reported and removed from the system
  • Worn or damaged badges are exchanged for new badges
  • A tracking system is used to ensure internal accountability of unused badge stock
  • A periodic review of the badge issuing process is conducted
  • Badges made but not in use must be controlled or destroyed
  • Tamper-resistant features such as holography should be used to make counterfeiting more difficult
  • Employees must understand the need or the badge process and adhere to proper usage
At small facilities such as satellite offices, personal recognition is usually the best form of identification-as long as the process is in place to also identify those who have left the company. For larger facilities, generally with 50 or more employees, personal recognition is no longer practical. Use a more reliable employee identification system is needed. Badge systems generally fulfill this need. Again, the security manager must consider the risk of each option.
It may also be necessary to control the access and movement of visitors, suppliers, and customers. For this, a badge process for non-employees should be used. It should be similar to that of the employees badge process but more restrictive in the sense that it clearly identifies the visitor as someone who is not an employee and has obvious indicators on the badge calling our appropriate restrictions. Escort requirement, badge expiration dates, and specific areas authorized to visit are some of the useful data necessary for the visitor badge.
Employees must be familiar with the badge process. They should receive guidance and training as to how the process for employees and non-employees works. Employees should be able to recognize authorized badges and react to unauthorized badges. Persons not wearing an appropriate badge or violating the parameters of the badge process should be challenged. Without the active participation of all employees, any badge process will be rendered ineffective.

Guards
Guards or plant protection officers can be an integral part of a physical security profile. Depending on specific needs and the type of facility, their use will vary.
Guards add a human element to the physical security profile. They are used situations where observation, training, and judgment are required to apply effective asset protection controls.  For example, guards are often used for vehicle access control functions. They not only check proper identification of the vehicle and driver, but they also provide greater flexibility for vehicle inspection on a variety of cars and trucks that may have a need to react instantly to the situation by reporting or challenging those with questionable identification. Moreover, they can make an assessment of a situation and determine if additional assistance is needed (e.g., responding to an alarm and determining whether an intrusion occurred or if the alarm was false).
Guards also provide the capability of patrolling a site or facility, making observation and taking not of changes or irregularities, all of which can be further investigated. The mobility of guards makes them particularly valuable, because their services can be quickly applied to a particular need or situation.
One of the most common security functions to be outsourced is the guard force, since it obviously is human intensive and thus is one of the more costly aspects of an assets protection program. Furthermore, high technology devices are replacing some of the security guard posts. The trend now is outsourcing  contract guard force in lieu of maintaining company guard force. The security manager has decided that this function will be the first security function that will be evaluated for outsourcing as soon as the initial assets protection baseline is established for the company that includes the initial implementation of company assets protection program.
Another factor that must be considered is the use of armed guards. Executive management usually does not want an armed guard presence, and some laws may prohibit their use. However, if you want to create a presence of serious security, there is nothing like an armed guard at the corporate lobby to give that impression. There are many pros and cons of the use of armed guards. Because of the high value of some corporate assets, it may be deemed appropriate to have armed guards at some locations but not others. That presents the problem of who is placed in what guard positions and decreases the effective and efficient use of guards to fill any guard job within the corporation. In addition, the armed guards are more highly trained and may also press for higher pay for being armed. The reasoning is that if they are armed, they are more trusted than those who are not armed, their job is more dangerous, and they are more highly skilled.
The use of armed guards is a serious issue that each security manager must address. At various companies, none of the guards is armed and an armed response from the local police has been deemed sufficient for the company assets protection needs. This was based on a meeting between the security manager and local law enforcement personnel where the response needs of company and the response time that the security manager could generally expect from patrol car officers and a SWAT team were discussed.

Alarm and Surveillance within the Inner Layer
            The application of alarms and surveillance within the inner layer of security requires the same considerations as the application to the outer layer. The extent to which they are used or not used depends on threats, vulnerabilities, risks, and the criticality of assets within.
            Most common alarm devices uses in inner layers are: Photoelectric beam, ultrasonic wave, microwave, and infrared.

Conclusion
            The cost of physical security is always a concern. Reaching an appropriate balance between adequate levels of protection and the cost of that physical protection can be difficult. Too little security leaves vulnerabilities in place, increasing risks. Too much security may mitigate threats and vulnerabilities and reduce risks, but leads to unnecessary expenditures. Inefficient application of security controls (spending more than you need for a physical security service or product) may use scarce resources that otherwise would be available for additional protective measures. Furthermore, objectively demonstrating to management the effectiveness of security controls can be problematic. It is difficult to quantify the value of deterrence achieved through the application of physical protective measures.
            A common security axiom is: The more doors and openings a building has, the more difficult it will be to control access. There is a trade-off here: the cost of security weighed against the convenience of employees and others. It all comes down to costs and what executive management considers acceptable level of risk.
            It is important that the security manager knows the fundamental to developing effective physical security profile as part of the company assets protection program. Understanding various threats to company assets and the likelihood of an actual occurrence and recognizing threats allow for cost-effective implementation of security measures. Implementing security measures that have little or no relationship to the type of threat associated with the company assets may very well be inefficient use of resources. Moreover, implementing redundant protective measures may not improve assets protection but will certainly consume resources that can better spent elsewhere. 
            Assessing the physical threats after identifying vulnerabilities is not easy. It requires an understanding of the business environment. One way to better assist the security manager in the effort to understand the physical threats to company assets is through benchmarking. Identify business similar to your company and discuss to them about their perceive threats. Try to find out what protective measures they implemented to mitigate physical threats. There are no other means of threat assessment. Consider the following:
  • Consult expert in your line of business
  • Seek the guidance of security professionals in similar situations
  • Consult with your insurance provider
  • Talk to risk managers
  • Talk to the local police about crime in the company facilities/areas

Risk assessment is the product of determining the threats and understanding their consequences. If the consequences are significant, protective measures should be implemented. If the consequences are not significant, implementing additional protective measures may be an inefficient use of resources, and not adding value. Implementing physical security measures to the extent that all threats are eliminated is an action of risk avoidance. For some business, risks avoidance is appropriate. For most business, it is not.

Recommendation
            The physical security function is the foundation of the companies’ basic assets protection measures. To this foundation, or baseline, additional controls for protection of company assets are added, creating a complete protection profile. No single physical security control can satisfy all of the assets protection needs. Physical security is built in layers. Each layer of security control serves a specific purpose by providing specific protections. Many controls used in conjunction with each other help to create a secure environment.
            To this end, conducting an on-site physical security survey should enable the gathering of all information necessary to make an intelligent and informed risk assessment of the sites or facilities and create a physical security profile. From this point, additional controls can be developed and implemented to provide the most cost-effective security profile tailored to the specific needs of the enterprise.

References

1. http://wwww.dss.mil/isec/nispom.htm. The National Industrial Security Program Operating Manual (DoD 5220.22-M), dated January 1995, is published by the United States Department of Defense. It was issued in accordance with the National Industrial Security Program as authorized by Executive Order 12829.
2. Gerald L. Kovacich & Edward P. Halibozek. The Manager’s Handbook for Corporate Security. Butterworth-Heinemann, 2003: (Elsevier Science 200 Wheeler Road, Burlington, MA 01803)
3. Gion Green & Robert J. Fisher. Introduction to Security. Butterworth Publisher, 1987: (80 Monvale Avenue Stoneham, MA 02180)
4. Keith Hearnden & Alec Moore. The Handbook of Business Security, 2nd Ed. Kogan Page Limited, 1999: (Pentonville Road, London N1 9JN, UK)
5. Louis A. Tyska & Lawrence Fennely. Physical Security: 150 Things You Should Know. Butterworth-Heinemann, 2000: (225 Wildwood Avenue. Woburn, MA 01801-1341)
6. Mary Lyn Garcia. The Design and Evaluation of Physical Protection System. Butterworth-Heinemann, 2001: (Elsevier Science 200 Wheeler Road, Burlington, MA 01803)
7. Russe L. Bintliff. The Complete Manual and Corporate and Industrial Security. Prentice Hall, Inc., 1992: (Englewood Cliffs, NJ)
8. Timothy Walsh & Richard J. Healy. Protection of Assets Manual: Vol. III, Meritt Company, 1982: (1661 Ninth Street/ P.O. Box 955).

ms8_faustino@hotmail.comhttp://www.facebook.com/

No comments:

Post a Comment