Physical Security Audit And Assessment
Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat, a result-oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in the Pakistan Army. Managing international organizations and operations with proven success (From Imtiaz Ahmad Malik, CEO of Reichert Security) Security audit and assessment aim to check the security installations, security procedures, missing trails, compliance, desired impacts, and effectiveness of the existing security. It is evaluated keeping in view the associated risk levels. Security cannot be planned and glassed with a view “a size fits to all” as every facility, and every area would dictate different security demands about size, equipment, security gadgets, weapons, and even the security company to be selected. For example, Reichert Security and onyx security are known for superior guarding (best bodyguards and bouncers) in Pakistan while HLS, Phoenix, fearless, and ADT are famous for providing alarm systems. Some of the companies are renowned for the protection of cellular sites like Reman Security and Pacific Security. What is a Physical Security Audit? Perceptions and Misconceptions of Physical Security Audit and Site Security Audit There is a difference between Physical security audit and a site security audit. Physical security means only those features and procedures that need to be audited linked with the protection of people, property, and information. Site security audit shall cover all aspects of security including, general area threat assessment, security plan, security manual, security team, physical security, crisis management, emergency responses, training, reviews, and improvements. A security audit is a constant activity that must be done periodically. A size and one-size-fits-all both strategies do not work here. It can be feasible in the field of clothing or education and other fields or the industry. Installation of security systems or the quality of guards you hired last year not necessarily would work this year as well, they may not meet the current standards for protection and reliability. You don’t have to wait until a big disaster has taken place to carry out the security audit. For example, a fire took place in a renowned trade center in Lahore and 50 percent of the building was destroyed, and damage to millions had occurred. Fire alarm systems and other gadgets have been installed after considerable damage. So, need not wait, carry out the audit of existing security and eliminate the risks without fail. Very trained security professionals are available in the market and can be requested to carry out the security audit. Prepare a checklist with the security vendor company, identifying the naked security, gaps, and other weak links, reviewing the risk levels, and trying to mitigate the potential risks. Excellent and large organizations have dedicated compliance teams, Monitoring and Evaluation teams (M &E), or Monitoring-Evaluation-Accountability and Learning groups (MEAL sections) to perform such activities to keep things working in a befitting manner. Security experts carry out audits generally once a year however the interval can be reduced or increased keeping in view the change in the security environment. It is to be remembered that risk assessment is different as compared to security audit. In a security audit, experts see the naked security (security gaps) in existing physical security whereas risk assessment is an altogether different activity. In a security audit, work is done on existing and already complied parameters, documents, and SOPs. Threat Perceptions Threats prevail in the environment. Managers need to know the nature of business and associated risks. Threats could be many but it must be identified which type of risk could harm their business about physical security. After classifying the risk, mitigation measures should be worked out for physical security. We observe that the under-mentioned threats to different businesses are common. Burglary and destruction Break-in or robberies Data stealing Fire Target Killing IED Attacks Physical attacks Harassment Kidnapping Terror activities Corruption Misuse of equipment and vehicles Access control Access Control (AC) Systems have to be strong for superior protection. Just deploying the security guards on a gate or installing a walkthrough gate doesn’t mean that access control protocols have been completed. Access Control is a system that prevents every type of entry which can harm the business. Identification of the risks is not the responsibility of the security guard but this is the obligation that has to be performed by the management. Security breaches generally occur in conjunction with a physical breach of access control. AC starts with a simple security guard at the door and goes to ID badges, walkthrough gates, mobiles, laptops, and even your daily mail. Checking on AC authorization is imperative. The security audit will help the organization devise the SOPs to save all the employees and assets from a major disaster. The following may be checked critically. Mechanical and electronic measures (resistance time), Personnel measures (Security Guards), Psychological measures (martial deterrents), and Architectural measures (E.g. revolving door, etc.). Barriers and Access Hardening For hardening the access to the building there could be hurdles to deter the criminals. The same can be Natural and Man-made, for example, natural cover could be some rivers or marshes, etc. Man-made barriers can be fences, barbed wire, gates, doors, windows, locks, walls, etc. Barriers are generally planned to discourage illegitimate entries or access by incident, by force, or by design. Surveillance and detection of unauthorized entries Various implements help to keep the people under surveillance. One can detect unauthorized entries very easily even after hours. Organizations should install surveillance cameras at every entry point of the facility to have an extra eye on all unauthorized movements. The same will help in the performance of other security protocols. It is to be remembered that extra visibility to the management has paramount importance for the success of the business activity. Biometric machines and walk-through gates can be installed to check and deter unauthorized entries. To check weapons and other materials which can cause damage to human life can be checked through metal detectors. The use of an explosive detector is best to identify any entry with an explosive. Ecological Mechanisms
Physical Security Audit And Assessment Read More »
Articles