Electronic Physical Security Toolbox, Missoula Technology and Development Center MTDC Home

Contact
skip to main page contenttransparent spacer image Physical
Security Basics
Threat &
Vulnerability
Assessment
Facility
Planning
Deterrents Alarm
Systems &
Sensors
Video & Access
Control Systems
transparent spacer image decorative graphic
Physical Security Home
Facility Planning
Physical Security
Planning
right arrow graphic right arrow graphic
Security Considerations When Selecting an Office Site
Facility Design Considerations
The Public Reception Area
Vehicle Access and Parking Lots

Physical Security Planning

Physical security planning includes the vulnerability assessment in which you observe conditions that could be exploited by an attacker. Before beginning the vulnerability assessment, plan exactly how you will systematically observe and note information of interest. Proceeding without a plan ensures that something will be overlooked.

Many agencies use checklists to organize this assessment, often called the physical security survey. Remember that the checklist is just a guideline. You cannot assume that you have done a complete and adequate physical security survey simply because you have filled in all the blanks or checked off all the boxes on a multipage form. Aircraft pilots use checklists, but they already know how to fly the plane. You need to know how to structure, complete, and report the survey before you can write the checklist. The checklist is a tool, not the product.

It is recommended that you review physical security survey checklists and procedures already used by several agencies. Rather than adopting any one of them in particular, design your own survey checklist by picking the best points from each of the checklists you review. An important element of any survey is the knowledge you have gained during your career.

Regardless of how you proceed, prepare your survey systematically and thoroughly. Approach the survey as if you are preparing to attack your facility, not defend it. Look for structural weaknesses, maintenance failures, human shortcomings, and shortcuts that compromise security.


Top


Back | Next

Physical Security Toolbox Home

T&D Home