It is true that with time and developments we sometimes need to be reminded of the basics, a refresh to continue to build on and improve our processes, writes Letitia Emeana, ASIS UK Chapter Chair.
So when I had an opportunity to undertake a handover, I needed to consider how I might add more value to this process and enhance the sites’ overall security posture. Remember, a secure environment is not just about having the right technology; it’s also about awareness and preparedness.
Key takeaways
Understanding and implementing a comprehensive physical security checklist is vital. Regular risk assessments and effective security measures like access control systems and cameras are the backbone of a robust security strategy.
Components for building a security checklist
1. Securing Entry and Exit Points
Entry and exit points are critical vulnerabilities in the building security layers. Securing them involves more than just locks. Consider material of the door and what it may be protecting, door security measures like alarm systems, smart cameras, and access control systems. These measures ensure that only authorised colleagues gain access, reduce common security threats, and help monitor any unusual activities.
2. Access Control Systems
The access control system is a vital security technology in regulating who enters and exits your site. They can range from card readers to more advanced biometric scanners and mobile credential in your phone wallet. These systems restrict access and maintain access logs of entries and exits, providing valuable insights in case of security incidents or breaches. Combine that system with surveillance and this will improve the effectiveness of investigations.
3. Effective Video Surveillance
Video surveillance is a cornerstone of site security. It may deter potential intruders and helps capture incidents, which can be crucial for risk assessment and investigations. Choosing the right video security systems and placing cameras at key entry points and strategic locations enhance overall surveillance effectiveness. Building in analytics to the system can then also be a proactive enhancement to support earlier detection of issues that the human eye may miss in complex scenes.
4. Importance of Adequate Lighting
Good lighting is essential for security. It deters potential security threats and aids smart cameras in capturing clear footage. Adequate lighting, especially at emergency exits and external doors, ensures a safer environment and can prevent accidents.
5. Protecting Communications and IT Systems
Securing IT rooms, infrastructure and communication systems is vital to protect sensitive data from breaches. It involves regular security audits of the room physical layers, cable protections, lockable server cabinets as well as layers from the server, employing robust firewalls, and ensuring security protocols are in place to protect against data breaches and unauthorised access.
6. Secure Disposal of Documents and Technology
Good awareness of the disposal of sensitive documents and outdated technology is critical in preventing data leaks. Shredding sensitive documents and following secure e-waste disposal protocols can protect the site from potential information theft and security breaches. Incorporating these elements into your physical security checklist can significantly enhance the safety of your business.
7. People Security Measures
Training and awareness are vital for all colleagues and those with a security remit. Regular security practice drills, scenario testing and awareness programs help employees recognise potential threats and follow security protocols effectively.
8. Conducting a Physical Security Risk Assessment
The annual physical site security risk assessment involves identifying vulnerabilities at your site and implementing measures to mitigate these risks. It is crucial for maintaining a secure environment.
9. Frequency & Process of Risk Assessments
Risk assessments should be conducted regularly, annually, or after significant site or business operations changes. The process includes inspecting physical security systems, past incidents, reviewing policies, and identifying potential security threats.
10. Office specifics
A detailed office security checklist should include:
• Inspection of all entry / exit points.
• Testing of alarm systems and security cameras (day and night scenarios).
• Evaluating emergency exits and lighting systems.
• Reviewing access control protocols.
11. Employee Interviews for Security Assessments
Employee feedback can provide valuable insights into the effectiveness of security measures and help identify areas for improvement. Engaging colleagues in security discussions can also raise awareness and reinforce security policies. Remember, a comprehensive approach to physical security, including regular assessments and employee training, is essential for protecting people, assets and brands.
Preparing for Natural Disasters and Security Threats
Safeguarding against natural disasters and security threats involves a comprehensive building physical security checklist. It includes ensuring robust emergency plans, sufficient lighting and emergency exits, accessible emergency supplies like fire extinguishers and emergency supply kits, and robust security systems to handle potential intrusions. Regularly checking and maintaining emergency power sources, back up provisions, emergency lighting, and sprinkler systems is also crucial.
Why do I need a physical security audit?
Regular security audits are essential to maintain a secure environment. They help identify potential vulnerabilities and ensure all security measures are up to date. Audits typically involve:
• Reviewing access controls.
• Inspecting security systems like smart cameras and intrusion detection mechanisms.
• Ensuring compliance with security policies.
Regular audits provide valuable insights into the effectiveness of your security measures and help you adapt to evolving security threats.
Physical Security Audit Checklist: Preparing for the Audit
☐ Assemble a diverse audit team from different departments to offer perspectives.
☐ Define the scope and objectives of the audit.
☐ Gather necessary tools and resources.
Perimeter Security
☐ Evaluate fences and barriers.
☐ Inspect security lighting.
☐ Check landscaping and vegetation.
☐ Review external signage and visibility.
☐ Signage.
Building Exteriors
☐ Assess entry and exit points.
☐ Examine window security.
☐ Check roof and ventilation access.
☐ Analyse external surveillance systems.
☐ Signage.
Building Interiors
☐ Review door security features.
☐ Inspect internal cameras, sensors and monitoring systems.
☐ Inspect safes and vaults.
☐ Evaluate elevator and stairwell security.
Access Control Systems
☐ Conduct entry and access log reviews.
☐ Evaluate badge and access control systems.
☐ Inspect biometric access systems.
☐ Review guest and visitor access protocols.
Parking & Vehicle Access
☐ Assess parking areas and garage lighting.
☐ Evaluate vehicle access control points.
☐ Inspect security in loading and unloading zones.
☐ Review surveillance in parking areas.
Employee Security Awareness
☐ Establish employee training and awareness programs.
☐ Implement security badge and ID protocols.
☐ Train on reporting suspicious activities and breaches.
☐ Signage.
Visitor Management
☐ Implement a visitor log and tracking system.
☐ Provide visitor badges and ensure compliance.
☐ Guide visitor access in restricted areas.
Emergency Response Preparedness
☐ Evaluate evacuation routes.
☐ Test emergency communication systems.
☐ Check the availability and integrity of safe zones.
Security Officers/Reception/Post room
☐ Review training and qualifications of security team.
☐ Assess patrol routes and schedules. (Inc. Camera patrols)
☐ Ensure effective communication systems for security team.
Utility and Infrastructure Security
☐ Secure power supply units.
☐ Check UPS and timings of any generators.
☐ Ensure water supply and plumbing security controls.
☐ Assess controls to HVAC system.
Alarm systems
☐ Test alarm placement and functionality.
☐ Review alarm response protocols.
☐ Check backup power for alarm systems.
Communication systems
☐ Review intercom systems.
☐ Evaluate emergency communication tools.
☐ Ensure redundancy and backup communication measures.
Maintenance & Upkeep of Security Systems
☐ Implement regular system testing protocols.
☐ Maintain repair and maintenance schedules.
☐ Review vendors and service providers.
Post-Audit Activities
☐ Compile and review the audit report.
☐ Discuss findings with stakeholders.
☐ Set priorities for action items.
☐ Identifying Potential Security Threats
Physical security assessments are crucial in identifying and addressing potential security vulnerabilities. These physical security audits thoroughly examine a facility’s existing security measures, including access control systems, camera technology, and emergency procedures. By conducting these assessments, weak areas are identified in the security infrastructure and assist with implementation of necessary improvements to enhance overall safety.
FAQs
What is a physical site security risk assessment?
It examines a site’s security measures to identify vulnerabilities and ensure that all security protocols are effective and up to date.
What are the types of physical security?
They include access control systems, camera systems, intrusion detection systems, physical barriers, security officers, training, awareness and emergency response plans.




