Implementation
Asset Identification: Without an asset identification, you will be splurging for security regardless from the specifications if it really requires (Risk Analysis shall follow). In order to identify your assets it requires the thorough observation of your operations and meetings with your line managers and key staff. After the assets identified, it will be analyzed to discover what kind of adversarial threats they might be exploited, by easy risk analyzing methods and lately the counter measures will follow.
Risk Analysis (with solutions in line with ALARP Concept): The security risk analysis is not the exclusive domain of the security management professional. It is a collaborative and iterative methodology – involving all asset custodians – in which security risks are constantly reviewed and specific, appropriate, risk-commensurate security measures are built onto baseline standards.
Security Surveys: Security surveys may be carried out prior to constructing, leasing, acquiring, modifying, or occupying a facility, and at regular intervals thereafter. Such surveys can be carried out by structural analysis wit the basis of security. On the other hand, the security surveys on the people is considered as pre-employment screening. The surveys on the current employees is another one to identify the insiders.
Building Security Plans: Building security plan incorporates an emergency plan and coordinates the efforts of almost all business lines. It is critical to ensuring that security recommendations provide a reasonable and adequate assurance of facility security without unduly impacting the operation.
Natural & Physical Surveillance (Constructional & CCTV): Natural surveillance is to look around to the environment by employees, neighbors, or by people passing by. From the perspective of a criminal mind, adversary people would be cautious to be seen. Physical one is security specific and monitored by security professionals to detect and respond.
Planning of Security Workforce (Response Planning): Location of officer to observe the environment, to perform badge control, and of the responding units, Alarm Center etc. are very essential to points in planning the workforce to operate.
Structural Hardware Resistance Controls: Resistance of Doors, Windows, Locks etc. & Roof Access
Building Intrusion Detection Systems: Control of the effectiveness of the detectors installed throughout the building entrances if applicable.
Perimeter Intrusion Detection Systems: Control of the effectiveness of the detectors installed throughout the site perimeter, the ones on the fences.
Shell Protection: Specific detection systems around the building or a room with high value assets
Loss Prevention: Specific prevention methods to stop financial losses, generally by petty crimes in shoplifting (+ kleptomania). It requires sensitive verification especially in Retail & Logistics Sectors. For prevention, it requires internal/external designs, taking CPTED (Crime Prevention through Environmental Design) into consideration. Coordination with designers and architectures is needed.
Physical Security: Generally, it is misunderstood as guarding. In fact, Physical Security refers to implementation of electronic devices such as detectors, Cameras and also, CPTED implementations.
Procedural Security: All guarding and electronic systems would not be sufficient unless you prepare a procedure which is considered as a glue of all those efforts to strengthening them against criminality.
Confidential Compliance Hotline Service: A key element in identifying employees involved in dishonesty is the establishment of an anonymous reporting hotline. This is the best avenue to encourage employee reporting of other employees’ misdeeds, especially when operated by a third party.
Facility Counter Terrorism Inspections: In case the Risk Analysis shows that the enterprise may be a target of a terrorist attack, specific countermeasures should be implemented.
- Terrorist attacks can be against both hard (police, military, government) and soft (businesses, the public) targets. Generally, terrorist attack could conceivably happen anywhere and it would be unreasonable to expect government to provide protection for every business target.
- if you are in an area or sector under threat, you should act by taking certain actions and putting in place counter-terrorism protective security measures. İf the threat is raised, there is a tendency to rush towards the installation of special defenses and the procurement of special equipment. While there is no doubt that this is necessary in some circumstances, this must be built on a strong foundation to be effective.
And Further, Travel Security and Prevention Measures, Measures against Workplace Violence, Counter Measures for Armed Robberies and Expat Security are also other issues we can implement.