The process of developing a Master Security Plan begins with and has its foundation in the information, outcomes and recommendations of the assessment activities. Creating an integrated security plan to guide a security program is rooted in the existing organization, policies and procedures, culture and characteristics of the population. Each of these is surveyed and determined during the security survey/vulnerability analysis phase of the project. In plain words, the observer discovers what is ‘right’ as well as what may be ‘wrong’ or inadequate. The recommendations that arise from these analyses should build upon and utilize what is right, enhance or improve what may be marginal, and provide a guide for creating what is needed but does not exist.
The concept or paradigm of integrated security provides latitude useful in creating or improving a security posture for an individual organization or site, and avoids the inadequacies and disappointments involved with forcing “one size fits all” solutions upon unique and sophisticated activities and facilities. The ability to devise the right combination of policy, procedure, physical security, electronic security, and police/security officer assets is a critical factor in creating a practical, workable and sustainable program.
A master security plan defines the structure and procedure for the security program. A security posture is the degree of adequacy of a security plans and the degree of compliance with the security program as defines in the plan. The components of the physical security plan should include all of the following components to some degree:
- Perimeter: A physical definition of the facility setting it apart from the surrounding area.
- Barriers: Perceived barriers – Signage and suggested obstacles that do not physically prevent intrusion, but advise and suggest to the population where they can and cannot go. Physical barriers – Fences, gates moats and other substantial obstacles that actually prevent or significantly delay penetration.
- Access control: Devices or personnel that control entry through barriers and perimeters by authorizing admission.
- Identification: Procedures and devices that vet and authorize legitimate people for entry and provide a means of determining by electronic means or appearance that those authorized are who and what they represent themselves to be.
- Surveillance: The watching and monitoring of people and places to detect unauthorized or undesired behavior, and unusual or dangerous conditions and circumstances. This is accomplished by use of security officers on post of patrol, CCTV systems and alarms.
The components of the operational security plan are intended to provide for the command, control, training and operational guidance for personnel who administer the physical security program and respond to conditions and incidents that threaten the welfare of the population, the peace of the environment, or the security of property. Operational plans should consist of those directives and requirements that apply to the conduct of the population, procedures for security operations and the conduct of law enforcement and security personnel, guidelines for responding to foreseeable events, and criteria for dealing with unusual or emergency conditions.
A master security plan should contain components that specify policies and procedures for operation of a law enforcement/security force, specifications for the location and use of physical security devices; communications and command and control criteria for these operations; and requirements and codes for the population.
RMA consultants have developed and written security plans, security and emergency policy and procedures, detailed post orders and security response and operation plans for a number of large corporate and government clients, including a federal intelligence center and a major federal agency headquarters. Our recommendations are not based on theory but are the application of over 20 years of experience in seeing these recommendations put into place by our clients.
Plan. Protect. Prosper.
Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome.