Creating a Model Security Facility - Part 2
As we alluded to in our earlier post, a model security facility is one where all critical assets have been identified, the threats to them identified and prioritized, and effective security measures put in place to mitigate them. Additionally, this should be done in consultation with all outside stakeholders, including first responders, and in compliance with local, state and federal regulations. And above all, a customized security plan should be implemented with management and employee buy-in, to budget, and on time with minimum ongoing disruption to the facility's day-to-day operations.
Of course, this is the ideal situation, but in order to strive for these security objectives, these are the six steps you should follow: 1) Deterrence, 2) Detection, 3) Delay, 4) Response, 5) Recovery and 6) Re-assessment.
Deterrence - provides countermeasures such as policies, procedures and technical devices and controls to defend against attacks on the assets being protected. This can include security guards, and patrols, burglar alarms like the Snitch Security System, business security systems like CCTV systems, etc., or any combination of these services.
Detection - monitors for potential breakdowns in protective mechanisms that could result in security breaches.
Delay - provides measures that in the event of a breach, intruders will be delayed long enough to allow a security team to apprehend them before they achieve their objective.
Response - procedures and actions for responding to a breach.
Note: Because total protection is usually very hard to achieve on a specific budget, a security program that does not also incorporate detection and delay is incomplete. To be effective, the three concepts of detection, delay and response must be elements of a cycle that work together continuously.
Recovery - your plan to continue business and operations as normally as possible following an incident. Mitigation planning is part of your response and recovery elements, with the aim of minimizing the effects of any incident.
Re-assessment - crucial and ongoing process. Before implementing any changes, you need to revisit your strategic security plan to ensure that goals and objectives will be met. Whenever there are changed circumstances, or when new threats are identified, revisit your strategic plan and conduct a re-assessment to see what additional measures, if any, are needed.
Once you have gained a better understanding of the best practices needed to create a model security facility, work with your security consultant and/or vendor to develop a customized plan that meets your site's unique needs.
The team of security professionals at CSC is highly trained at developing strategic and customized security plans for our clients. We understand the importance of striving toward creating a model security facility and we believe our broad and diverse set of innovative and creative security consulting and solutions can help you achieve this goal.
We offer a comprehensive "Security By Design" approach that allows us to create a tailored security solution to satisfy our clients' security requirements whatever they might be. By taking this approach, we can effectively reduce your total cost of security and, at the same time, minimize your overall risk. And by taking this approach, we believe we can provide you with a substantially higher level of service and protection than anyone else.