You are on page 1of 33

KINGDOM OF SAUDI ARABIA

MINISTRY OF INTERIOR

HIGH COMMISSION FOR INDUSTRIAL SECURITY

SECURITY DIRECTIVES

FOR INDUSTRIAL FACILITIES

SEC-OS

Integrated Security System

hos De12/6/14344 /26/0$2010



1
KINGDOM OF SAUDI ARABIA

MINISTRY OF INTERJOR
7 HIGH COMMISSION FOR INDUSTRIAL SECURITY

SECURITY DIRECTIVES
3 FOR INDUSTRIAL FACILITIES

3
SEC-05

Integrated Security System


3

7
.

Issue Date: 12/6/1431 /26/05/2010

RESTRICTED

AII Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

a
1

1
Kingdom of Saudi Arabia
r
Ministry of Interior
1 R' n.
?

High Com.mission for Industrial Security a)»h e,


s54

Secretariat General lr y

7 SEC-05 Integrated Security System

37

Table of Contents
7

1 1.0. ADMINISTRATION 3

1.1. ScoPE....... . 3

l 1.2. APPUCATION .. . 3

1.3. CONFLICTS & D E V I A T I O N S . . . . . . . . . . . . . . . . 8 0 0 . . . . 8 . 0 0 0 . . . . . . . . . . . . . 0 . . 0 . . . . . . .. 3

2.0. DEFINITIONS 4

1
3.0. REFERENCES . . . . . . . . . . . . . • . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S

7 4.0. GENERAL REQUIREMENTS . . . . . . . . . . . . . 8 + . . . . . 8 . . 0 0 . . . . . . . . . 0 0 0 . . . . 0 . 0 0 . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . 6

4.1. INTRODUCTION . . 6

4.2.
3 INTRUSION DETECTION &ASSESSMENT SYSTEM [ I D A S ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

4.3. ACCESS CONTROL S Y S T E M . . . . . . . . . . . + 8 . 8 8 8 0 . . . . 0 . . , 8 8 , 0 . 0 8 0 . . 0 . 0 0 0 0 . . 0 0 0 . . 0 . . . . . . . . . . . 13

4.4. VIDEO ASSESSMENT & SURVEILLANCE SYSTEM ( V A S S ) . . . . . . . . . . .. . . .. . .. . . . . . . . . . . .. 21

4.5. ID MANAGEMENT S Y S T E M ( I D M S ) . . . . . . . . . . . . . . . . s o s . . s o . o o o o o o
3 .26

4.6. COMPUTER INSTALLATION IN SECURITY SYSTEMS . . . . . . . . . . . » . . . 0 . . . . . . 0 . 0 0 0 0 0 . 0 . 0 0 0 0 . 0 0 . . 8 0 . . 0 . . . . . . . . . . . . . . . . ...27


4.7. SECURITY SYSTEMS I N T E G R A T I O N . . . . . . . . . . 8 . . 8 8 . . . . . . . . . . . . . . . . . . . . . . . . • 30

4.8. FACILITY DESIGN REQUIREMENTS FOR HOUSING SECURITY SYSTEMS . . . . . . . . . ... 31


3
4.9. PLANT CONTROL ROOM . .• 32

4.10. SECURITY CONTROL CENTER (SCC) . . . . . . . . . . . . » . . s o . o . . . . . . . . . o o o . . . . . . • 33

2.
5.0. APPLICATION OF REQUIREMENTS . . . . . . s o . o o o . . . . . . s o » w o o . . . - o o . . . . . 34

Issue Date: 12/6/1431H /26/05/2010

g
eJ RESTRICTED

All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 2 of34
I

1
5:z4Jg4 zzy
Kingdom of Saudi Arabia
-' T- $-le
uh5Sy

3 Ministry of Interior

High Commission for Industrial Security -=h e,

uh uy
Secretariat General
2 SEC-05 Integrated Security System

J.0. Administration
2
1.1. Scope

1
This Directive provides the minimum requirements for companies and establishments

that are subject to the supervision of the High Commission for Industrial Security
1 (HCIS), Ministry of Interior, for integrated security systems at industrial facilities.

3 1.2. Application

This Directive is applicable to all facilities, including new projects, the expansion of
3
existing facilities, and upgrades. For application to existing facilities, the Operator

shall assess his facilities against the requirements of these Directives and coordinate

with the General Secretariat of the High Commission for Industrial Security (HCIS) to

comply with the Security, Safety, and Fire Protection requirements according to these

Directives and add to or modify the existing facilities as required. Where the HCIS

has assessed deficiencies in existing facilities during a survey, comparing the current

state of the facilities to the requirements of these Directives, those identified

deficiencies shall be corrected by the Operator.

1.3. Conflicts & Deviations

Where implementation of a requirement is unsuitable or impractical, where other

3 equivalent company or industry Standards and Codes are followed, or where any

conflict exists between this Directive and other company standards and Codes, the

deviations shall be resolved by the HCIS. Deviation lower than the requirements of
3 this directive shall be listed and submitted in a report of compliance or non­

compliance, with justification and reason, for each applicable requirement of these

security directives, and approval shall be received from the HCIS prior to

implementation. Toe documents shall be retained by the company in its permanent

engineering files.

'
Issue Date: 12/6/1431H/26/05/2010

m
id RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 3 of 34

$
I

1
Kingdom of Saudi Arabia
CS.°
-a
Ministry of Interior .n5,y

el)uh .
High Commission for Industrial Security
L! uy
Secretariat General
3 SEC-05 Integrated Security System

7
2.0. Definitions

3
HCIS High Commission for Industrial Security. The HCIS is part of the

Ministry of the Interior. It is responsible for the development, and

1 implementation, of security, safety and fire protection strategies

Kingdom-wide.

1 Operator: Company or owner of a facility.

Shall: Indicates a mandatory requirement.

Should: Indicates a recommendation or that which is advised but not

required.

ACS
3 Access Control System: A system that permits, or denies, access to

a facility after evaluation of credentials.

Biometrics Biometrics is the study of methods for uniquely recognizing

humans based upon one or more intrinsic physical or behavioral

traits.

IDMS Identification Card Management System: A system to manage the

design, creation and retrieval of identification cards.

IOAS Intrusion Detection and Assessment System: Detects intrusion

attempt at perimeter, allows video surveillance and annunciates an

alarm.
2
ISS Integrated Security System

PIN Personal Identification Number


3
PTZ Pan-Tilt-Zoom: A method of mounting a surveillance camera that

allows it to pan, tilt and zoom while being controlled from a remote

location.

SED Single Entry Device: A physical device that allows entry to a

facility under the control of the ACS.

UPS Uninterruptible Power Supply

An uninterruptible power supply (UPS), also known as an uninterruptible

power source, is a device which maintains a continuous supply of electric

power to connected equipment by supplying power from batteries when

utility power is not available.

VASS Video Assessment & Surveillance System: A system using video

Issue Date: 12/6/1431H/26/05/2010

RESTRICTED
AII Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 4 of34

3
I

1
Kingdom of Saudi Arabia

l Ministry of Interior

High Commission for Industrial Security =! 8 h e.A

L y
Secretariat General
7
SEC-05 Integrated Security System

7
cameras to view a designated area.

7
3.0. References

This directive adopts the latest edition of the references listed.


1
The selection of material and equipment, and the design, construction, maintenance,

operation and repair of equipment and facilities covered by this Security Directive

7 shall comply with the latest edition of the references listed in each Security Directive,

unless otherwise noted.

IEC 60529 Degrees of protection provided by enclosures (IP Code)

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

Al Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 5 of34

3
I

l t. - v .1 :1. ,
i�:,,,,.....,.:,. .-.\
_ ' I 'E I : ad
Kingdom of Saudi Arabia
' t te

Ministry of Interior ti55


l
High Commission for Industrial Security +ah t,» e_

Secretariat General uh Ly

3 SEC-05 Integrated Security System

3 4.0. General Requirements

l
4.1. Introduction

3 4. I. I. Facilities shall be protected by an Integrated Security System (ISS) in

accordance with the requirements stated in this Security Directive.

37 4. 1 . 2 The integrated environment of the ISS may be placed locally, or

remotely, as needed due to operational requirements. The definition of

integration is described in section 4. 7 of this Security Directive.


37
4 . 1. 3 . This Security Directive defines procedures and technical requirements

for the ISS. The four primary systems in the ISS consist of the

3 Intrusion Detection & Assessment System (IDAS), Access Control

System (ACS), Identification Management System (IDMS) and Video

Assessment & Surveillance System (VASS).

4. 1 . 4 . The type of ISS used in a facility shall be based on the facility

classification.

4 . 1. 5 . The ISS shall be monitored 24 hours a day, seven days a week, in a

security control center by trained operators who will be familiar with



J the procedures, limitations and capabilities of managing the ISS.

4.1.6. All cameras used in the IDAS, ACS and VASS shall comply with the

requirements for type, image quality, housing, placement and field of


3
view specified in 4 .4 . l . through 4.4.5. of this directive.

4 . 1. 7 . All ISS components shall comply with the requirements of SEC-12,


3 section 4.6.7. for encryption when transiting public networks.

4.2. Intrusion Detection & Assessment System (IDAS

The IDAS consists of perimeter sensors and cameras connected to a computer system

that will analyze and localize the sensor data, trigger an alarm when an intrusion is

detected and display pre and post alarm and live video from the camera in the area

where the alarm was triggered, to security personnel tasked with monitoring the

system.

Issue Date: 12/6/1431 /26/05/2010

RESTRICTED
A Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 6 0f 34

3
I

1
Kingdom of Saudi Arabia
$#&#k<a
u5,,
1 Ministry of Interior

High Commission for Industrial Security

Secretariat General
3
SEC-05 Integrated Security System

7
The IDAS shall meet the following requirements:

3
4.2.1. Design

1 The IDAS design shall be based on a comprehensive evaluation of the site and

available technologies to determine the optimal design.

1
4.2.2. Architecture

7 The IDAS shall be designed to ensure continued operation despite the failure of a

single device. Systems shall be designed to so that no single component failure can

disable the system.


3
Failover between primary and backup devices shall be automatic and shall not require

any User intervention.

4.2.3. Camera Type:


3
The IDAS shall use fixed cameras that permit constant monitoring of the perimeter

being covered by the camera. PTZ cameras shall be used to augment the fixed

3 cameras and for use as assessment devices to view the surrounding terrain.

Cameras shall use automatic exposure control and be capable of outputting video at

full frame rate or sub-multiples of the full frame rate. An example of this is 30 frames

per second (fps) as full frame rate and 1 5 fps as ½ frame rate or 7.5fps as ¼ frame

rate.

3
Camera image quality and resolution shall be adequate so that the operator can

consistently distinguish between a human in any position or profile from an animal or

3 debris anywhere in the assessment zone.

The Operator shall implement procedures to ensure the safeguarding of alarm event

video and data when needed for further investigation.

4 .2 .4 . Detection Time:

Refers to a measurement o
f the time an intrusion attempt is initiated to the time the

system displays an alarm for that event.

Less than or equal to 1 second from intrusion initiation.

3
Issne Date: 12/6/1431H/26/05/2010

RESTRICTED
Al! Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 7 of34

%3l

3
I

l
Kingdom of Saudi Arabia

1 Ministry of Interior
ea!,ah ,
High Commission for Industrial Security
uy
Secretariat General
37 SEC-05 Integrated Security System

Localization Accuracy
7 4.2.5.

A measure o
f how closely the system can identify the specific location where the

intrusion attempt was detected.


l
±150 meters, or better, from where intrusion has been detected.

1 4.2.6. Camera Field of View

Refers to the area displayed for any fixed camera.

7 Camera field of view shall comply with the requirements of 4.4.5. of this

directive. Cameras shall be placed and aimed to eliminate any

interference from lights or other objects in the field of view.

3
4.2.7. Camera Focal Length

Refers to the capability o


f the camera lens to display details.

Camera focal length shall be adequate to display a person, at the furthest

limit of the area being covered. . They shall comply with the

requirements of 4.4.2. of this directive.

4.2.8. Perimeter Lighting

Refers to lighting deployed along the perimeter and adjacent areas.


3J Lighting shall be compliant with SEC-04 "Security Lighting" and

adequate for camera to display a clear image under all lighting conditions

within the ranges specified in SEC-04 "Security Lighting.


3

I 4.2.9. Probability of Detection

Refers to the probability that an intrusion attempt will be detected.

This includes movement, cutting, climbing, lifting or digging, or any combination of

these anywhere along the perimeter.

IDAS suppliers shall provide independent, third party evaluations & certifications, by

internationally recognized institutions, that verify compliance with this requirement.

Greater than or equal to 95% for the system

Issue Date: 12/6/1431H/26/05/2010

3 RESTRICTED
Al Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCS

Page 8 of34

3
I

l
Kingdom of Saudi Arabia

l Ministry of Interior

ahhe.
High Commission for Industrial Security
ul u)
Secretariat General
7
SEC-05 Integrated Security System

3 4. 2 . 1 0. Nuisance Alarms

Refers to an alarm generated by the sensor from a known cause that is not an

intrusion attempt. Examples would be wildlife, blowing debris, or high wind speed

triggering a sensor alarm. Sensors should be selected carefully so that they are

suitable for the anticipated environmental conductions o


f the site to reduce the

1 number o
f nuisance alarms generated. The total number o
f nuisance alarms may be

averaged over the number o


f zones over a 30-day period.

Less than or equal to 1 alarm per zone averaged over the number of zones
3
over a 30 day period.

3
4. 2. 1 1 . False Alarms

3 Refers to an alarm generated by the system for which there is no known cause. The

alarms may be unknown due to assessment concerns (e.g. poorlighting or camera

malfunction) or may be generated by the system. False alarms are often an indication
3 that the system requires maintenance. The total number offalse alarms may also be

averaged over the number of zones over a 30-day period.

J 1 false alarm per month / system maximum

3
4. 2 . 1 2 . Sensors

4.2.12.1. The IDAS shall use at least 2 independent types of sensors to detect

3 an intrusion attempt into the facility and shall have video capability

around the perimeter to assess the intrusion attempt.

4.2.12.2. Sensors shall be adjustable to set detection thresholds. Sensors shall

be installed as required by the individual fence configurations

specified in SEC-02 "Security Fencing". The IDAS shall use video


3 cameras for intrusion assessment.

4.2.12.3. At least one of the 2 independent sensor types shall be a volumetric

sensor system to detect an intrusion attempt. This shall detect any

motion, within the covered volume, of any man sized object. This

sensor shall be augmented with a second independent sensor, using


J different technology than the other sensor type that shall be selected

by the Operator to detect any intrusion attempt.

Issue Date: 12/6/1431 /26/05/2010

RESTRICTED
AI Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCS

Page 9 of34

%
i

1
Kingdom of Saudi Arabia

l Ministry of Interior
+6,,

High Commission for Industrial Security •


»iy
Secretariat General
3
SEC-05 Integrated Security System

7
4.2.12.4. The effective sensitivity of all sensors shall be unifonn in the entire

area/volume being monitored by the sensors. Where variable

sensitivity is employed, Operator shall ensure that the sensitivity is

adequate in all locations in the sensor volume, including the edges.

Sensor overlap shall be used to cover areas at the edge to ensure


7 elimination of any blind spots. Each sensor area/volume shall be

fully compliant with the requirements on its own,

4. 2. 1 3 . CCTV User Interface

1
The IDAS shall provide a full set of controls as generally used in CCTV systems.

This will allow the IDAS user to select cameras for display, use split screens, manage

1 PTZ cameras, etc.

The controls shall include a joystick for PTZ camera control.

4. 2 . 1 4 Displays

The IDAS shall provide the User with multiple displays that will allow easy visual

monitoring of!DAS camera outputs.

The multiple display setup shall include, as a minimum, the following:

Display 1 : Overview Map Display with all alarm location data.

­
J
-
Display 2: Split-screen display, preset or user selected, automatically

switches to alarm zone display when alarm is triggered.

7 Display 3: Index Display for cycling through a random, or user selected,

series of images from IDAS fixed and PTZ cameras. User shall

have the choice to create an index of selected cameras that are


3
displayed simultaneously and updated at user selectable or

preset intervals.

I Display 4: PTZ camera display

Camera imagery from PTZ cameras shall normally be displayed at any acceptable

sub-multiple of the full frame rate & resolution but in no event J ess than seven (7)

frames per second during non-alarm conditions.

J All displays shall be minimum 20 size flat screen displays. Displays shall be capable

of displaying video images consistent and compatible with the quality and resolution

required to distinguish between human crawlers and small animals.

Issue Date: 12/6/1431H/26/05/2010

RESTRICTED

AI Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page JO of34

3
I

l
Kingdom of Saudi Arabia
5:zjsti _z\
v s
,-le

i,
l Ministry of Interior

High Commission for Industrial Security ahu. •


uh uyr
Secretariat General
7
SEC-05 Integrated Security System

4. 2 . 1 5 . Alarm Annunciation

The IDAS shall annunciate the alarm locally and, if required by the Operator, at a

remote site. The remote site shall be capable ofreceiving the alarm data & video and
l
sending back an acknowledgement to the IDAS system as specified in the External

System Interface section below. Regardless of the existence of a remote site, the local

J users shall have the ability to interact with the system and manage all alarms. This

facility shall be configurable by the Operator.

The alarm displays shall display all alarm indications in all detection zones as well as

individual device status. All device or component failures shall be annunciated on

alarm displays at the facility where the system is installed. If the system uses remote

1 management then these alarms shall also be displayed at the remote location.

System shall incorporate alarms about faults within the system such as, but not limited

to, elevated temperatures in equipment rooms, device failures or communication


1
failures between system and sensors.

When an alarm occurs the IDAS shall immediately switch a designated display to

playback pre alarm video and live video from the alarmed zone cameras. A PTZ

camera shall be automatically slewed to the alarm zone to allow further assessment by

the operators. The recording system shall continue to record while the event that
iJ
initiated the alarm is displayed using the pre-alarm and post-alarm recording

specifications in 4 . 2 . 1 6.

The system shall allow alarms to be displayed in different colors depending on the

Operator assigned priority. Tamper/loss of signal shall be assigned a high priority.

The system shall annunciate an alarm when the video signal from a camera is lost.

3 't

4. 2 . 1 6 . Video Recording

Refers to a device that will digitally record a video of the perimeter when an alarm is
3 generated

Recording of IDAS camera imagery is only required during an alarm event and only

for the fixed and PTZ cameras associated with the alarm. The Operator shall have the

choice of manually recording the video when needed.

All video recorded for alarms from both the fixed and PTZ cameras associated with

the alarm shall be stored and available for viewing up to 30 days from the date the

video was taken.

Issue Date: 12/6/1431H / 26/05/2010

RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 1 1 of34

3
I

l
Kingdom of Saudi Arabia 55
Ii5,5
1 Ministry of Interior u» _

High Commission for Industrial Security


» up
Secretariat General
37 SEC-05 Integrated Security System

7
User shall size digital recording capacity to permit recording under all scenarios and

still maintain at least 50% spare storage capacity.

37 Alarm recording shall be at the pixel dimension and frame rate specified in 4.4.2.

Pre -Alarm recording - 5-20 seconds configurable

1 Post-Alarm recording- 5-20 seconds configurable

3
4.2. I 7. Power Supply

Power supplied for the system, including cameras, sensors and recording system, shall
3 be powered by an uninterruptible power source fully compliant with SEC-07 "Power

Supply" with the exception of UPS backup time in equipment shelters which shall be

a minimum of2 hours at its full rated capacity.


1

1 4.2.18. External System Interface

Refers to the interface required for the IDAS to transmit alarm data and video to an

external system & receive acknowledgement o


f alarms from the external system.

4. 2 . 1 8 . 1 . The Operator shall ensure that the IDAS supplier clearly documents

the ability of the IDAS to be remotely monitored and controlled.

4. 2 . 1 8. 2. The system shall have the ability, if required by the Operator, to

transmit all system data to an external system, including video, and

receive acknowledgements in a fully documented format and

protocol.

3 4 . 2 .1 8 . 3 . The Operator may elect to use any interface format as long as all

system data, including video, can be transparently sent to an

external system for display and alarm acknowledgement, the


z interface requirements are fully defined and the interface is installed

in the IDAS.

3 4 . 2 . 1 8 .4 . All data transmitted to an external system shall use encryption to

secure the data during transit over the network.

3
4.2.19. System Interface

The IDAS shall provide security personnel with a full range of controls for managing,

selecting, zooming and otherwise controlling all cameras, acknowledging alarms and

acquiring data from the system.

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 12 of 34

3
I

l
35;Z A N\y zzt
Kingdom of Saudi Arabia
- T-.±lk
A i5
1 Ministry of Interior

ahu,» e,
High Commission for Industrial Security
uJr Ly
Secretariat General
1 SEC-05 Integrated Security System

3
The IDAS shall provide a map display for displaying the overall system. The map

display shall permit the optional use of bilingual labels in Arabic and English. The

display shall use color icons to annunciate perimeter status.

1 4.2.20. Network

The IDAS shall operate on a dedicated local network. It shall use redundant networks
l for all IDAS systems including field devices such as cameras & sensor interfaces.

Failover between networks shall be automatic.

l Any field device failure shall not impact network performance.

7 4 .2 . 2 1. Tamper Protection

The IDAS shall incorporate elements that will annunciate an alarm if any attempt is

1 made to tamper with IDAS system elements such as cabling, computer equipment or

field computer facility access where active IDAS components are located.

3 All junction & pull boxes, mounted externally, shall use tamper-proof screws for all

fasteners on the case that are externally accessible.

All surface mounted cables shall be encased in steel conduit.

4.2.22. System Security

Access to the IDAS shall be protected by user ID ' s and passwords, at a minimum, and

7 an audit trail shall be maintained to log all User and user activities.

7 4.2.23. Environmental

All devices mounted externally shall be sealed to a minimum standard of IEC 60529

3 and shall meet the environmental conditions stated in SEC-0 I "Application of

Security Directives".

4.3. Access Control System

Issue Date: 12/6/1431H /26/05/2010

3 RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 13 of 34

3
1

I
Kingdom of Saudi Arabia
##£##kl
Ministry of Interior n»is,,

High Commission for Industrial Security a)'ts •

u y
Secretariat General

SEC-05 Integrated Security System

The Access Control System (ACS) comprises the hardware and software needed to

electronically authenticate a request by personnel to access a facility and to advise security

J personnel of any invalid attempts. The ACS shall operate on a dedicated local network.

The local ACS consists of card readers or biometric readers, computer systems to validate the

request and local displays to advise security personnel of system status and access request
l
status. This local ACS shall be connected to a central ACS for data storage of all local ACS

logs and access data. The central ACS shall be used for reporting and data management.

}
The ACS shall meet the following requirements:

1
4 . 3 . 1. Architecture

4 . 3 . 1. I. The ACS shall consist of a local ACS at each facility with a central

ACS that shall store and retain all ACS personnel and access data

online for at least 36 months.

3 4 . 3 . 1. 2 . Personnel data referring to card holder short leave, vacation, lost,

stolen, revoked shall automatically be updated in the ACS and

disseminated automatically to all sites.

4.3.1.3. The ACS shall be designed with full redundancy at all levels to

ensure continued operation despite the failure of a single device.

4.3.1.4. Failover, and restore, between primary and backup devices shall be

automatic and shall not require any User intervention.

3
-
·
4 .3 . 1. 5 . All local ACS operations & functions shall continue to operate with

no loss of capability when communication links to the central ACS

are disrupted.

4 .3 . 1. 6 . All access data shall be uploaded to central system at periodic

intervals not to exceed I O minutes.

E 4.3.2. Card Readers or Biometric Readers

Refers to devices that are used to initiate a request for access to the ACS, receive the

response and operate an associated single entry device. The readers may use cards

with PIN and'or biometrics as the access requesting mechanism.

• One reader minimum shall be installed per single entry device (SED) where

multiple single entry devices are installed.

Issue Date: 12/6/143111/ 26/05/2010

RESTRICTED

Al Rights reserved to HCIS. Copying or distibution prohibited without written permission from HCIS

Page 14 0f 34

3
I

l
sv1kg@a
' sl
Kingdom of Saudi Arabia ', i s l[

t t

l Ministry of Interior Gt Ai , ,

High Commission for Industrial Security ah - tal l ,

3
Secretariat General E
4 2Ll up

SEC-05 Integrated Security System

7
• Where the installation only has one SED, two card readers shall be installed at

both the entry and exit sides of the SED to allow continued operation if one of

3 the card readers fails.

• If reader controllers are used a minimum of two controllers shall be installed

1 with each alternate card reader connected to alternate controllers.

• The ACS shall have the ability to deploy readers in multiple zones with each

zone having independent security access levels.


1
• The readers shall allow or deny access based on the response from the ACS.

All access denied alarms shall be annunciated at the local gatehouse.


3

7 4.3.2.1. Card Readers

Card readers shall be able to read cards configured according to the

requirements of S E C - 1 1 .
3
Card readers shall incorporate PIN keypads. The ACS shall use card and 4

digit minimum PIN entry or card and biometric read to verify access rights

which shall be validated by the ACS.

PINS shall be machine generated using a random or pseudo random algorithm

­
±J and must be changed every 6 months. The Operator shall ensure that

procedures are in place to notify users of PIN changes.

4.3.2.2. Biometric Readers

7
• Biometric readers may use fingerprint, hand geometry, iris or any other

biometric measurement generally accepted within the security industry.

• Biometric readers shall validate data against a biometric template

either stored in a smart card or against a central database. Biometric

data retained in the smart card shall be encrypted.

• All biometric readers shall have the ability to verify that the

measurements are being taken from a live person and not a printed

copy or a copy made from some inanimate object.

Issue Date: 12/6/1431H / 26/05/2010

RESTRICTED
AI Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 1 5 of 34

I
I

1
Kingdom of Saudi Arabia

Ministry of Interior
l
ah ,
High Commission for Industrial Security

h Ly
Secretariat General

SEC-05 Integrated Security System

7 4.3.3. Reader User interface

Refers to the method the card or biometric reader uses to communicate access

decisions to the card holder after an access attempt.

4 . 3 .3 . 1. The device shall have indicators to inform the user that the device is

7 ready, access request is being processed, request approved and

request denied. This can be dedicated indicator lights, flashing

lights or alphanumeric display. If indicator lights are used they


I shall use different colors for request approval and denial.

4.3.3.2. Alphanumeric displays used in such devices shall have clearly

l visible displays in bright daylight conditions.

4.3.3.3. The system shall allow the use of a duress code on the card reader

keypad to inform security personnel about a forced access attempt.


1

J 4.3.4. Single Entry Device

Refers to the device used to control access to and from the facility. For personnel it is

generally a turnstile or door andfor vehicles it is a drop gate. The single entry device

shall be controlled by the ACS and shall normally be in closed or locked position

unless released by the A CS after a valid card or biometric read

All single entry devices shall be compliant with SEC-06 "Security Devices".

4.3.5. Alarm Annunciation

Refers to the displays and printers used to keep security personnel apprised of system

and access request status. All devices shall be mounted in local gatehouse with the

option to remotely annunciate the alarms at an external system.

The system shall require acknowledgement by security personnel of each alarm.

Devices used for alarm annunciation are as follows:


3
Status Display

Displays overall system map and status o


f each device using colors to denote

system status.

Display shall include status of local computers, communication links (if any),

UPS, access request status. All titles shall be bi-lingual in Arabic & English.
J
Alarm Display

Issue Date: 12/6/1431H/ 26/05/2010

RESTRICTED

AII Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 16 of 34

i
I

1
Kingdom of Saudi Arabia 5sky#;3l

1 Ministry of Interior
Ir·5,

eh _ u»! ,
High Commission for Industrial Security
uhr y
Secretariat General
1
SEC-05 Integrated Security System

1
Displays status o
f access request with configurable option to display selected

events.
J Display shall include critical access denied messages in color. All messages

shall be bi-lingual in Arabic & English.

1 Printer

Prints hardcopy, line by line, o


f all messages on Alarm Display.

Operator shall have option to use, or not use, the printer but the function shall
1 be provided.

Printer shall continue to operate, and print required messages, regardless of

3 communication link status.

Audio Annunciation

All alarm messages shall be accompanied by an audio tone that shall be


3
audible above ambient noise in the gatehouse.

A distinct audio tone shall be used when an alarm is generated due to an

access attempt by a card that is marked lost, stolen, revoked, on vacation or

expired.

Response Time

The alarm annunciation system shall respond to a valid/invalid access attempt

in less than 0.5 seconds and display any alarm condition.

Operation

All displays shall continue to operate, and display complete system

3 information, regardless of communication link status.

3
4 .3 .6. Emergency Release

Refers to a physical emergency switch that will allow security personnel to initiate an

emergency release o
f selected single entry devices when required

4 .3 . 6 . 1. Emergency Release switch shall be protected against accidental

7 activation.

4.3.6.2. Only selected single entry devices shall be released.

4 . 3 . 6 .3 . Emergency switch activation shall be logged in ACS.

4.3.6.4. Emergency switch shall function independently of the ACS.

4.3.6.5. In the event of an emergency gate personnel shall be able to allow

entry and exit of emergency vehicles.

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 17 of34

3
I

1
Kingdom of Saudi Arabia
ea4kN~al
'_ _ _ I t 3 : s)

se t

1 Ministry oflnterior
b y

ahh e
High Commission for Industrial Security
L! Y
Secretariat General
7
SEC-05 Integrated Security System

37
4.3.6.6. The ACS shall permit gate personnel to initiate emergency

procedures to allow the free exit of facility personnel under

3 emergency conditions. As part of these procedures the ACS shall

provide the facility to update personnel access status as the actual

data is collected during an emergency.


1

1 4.3.7. Cameras

Refers to cameras that provide gate area surveillance ability and user surveillance

cameras.
7
Area Surveillance: I PTZ color camera for entry side and 1 PTZ color

camera for exit side.

User Surveillance: The user surveillance cameras shall have the ability to

record ACS users either at the card reader or after passing through the single
3 entry device.

• The Area surveillance camera shall provide imagery at 320x240, or higher,

1 pixel dimensions with a minimum frame rate o f 7 . 5 frames per second.

• The User surveillance camera shall provide imagery at 640x480, or higher,

pixel dimensions and I 5 frames per second, or higher, frame rate to ensure
.:la
""" clear images of ACS users.

7 • User surveillance cameras shall have adequate wide angle ability to display a
E
recognizable image of the user of the card reader, for a height range (of the

user) of 1.3-2.2 m.

• The operator shall place the camera to obstruct keypad view while maintaining

the ability to see faces of personnel entering the facility.

3 • The system shall have the ability to display cameras imagery locally and/or

remotely as required by the Operator.

3 • All camera imagery shall be recorded in digital format as defined under Video

Recording in 4 . 3 . 8 .

• The system shall annunciate an alarm when the video signal from the camera

is lost.

4.3.8. Video Recording

Issue Date: 12/6/1431H / 26/05/2010

RESTRICTED

All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCS

Page 18 of 34

a
I

1
Kingdom of Saudi Arabia
i
% I=a4

1 Ministry of Interior 6t ui,

High Commission for Industrial Security


eh» ,A»he.»

Secretariat General 8 uh»uyr

1
SEC-05 Integrated Security System

B
Refers to a device that will digitally record the video output from the area and user

surveillance cameras.

1 All images from Area surveillance cameras (as defined in 4.3.7.) shall be recorded

and retained for a 30 day period, from the date the date the video was recorded, before

the data can be overwritten. The resolution and frame rate shall be as specified in
7
4.3.7.

3
All images of ACS users from the User surveillance cameras (as defined in 4. 3. 7 . )

shall be stored and available for viewing, locally and across the network, up to 90

3 days from the date the image was taken. The resolution and frame rate shall be as

specified in 4.3.7.

4.3.9 . Date/Time Synchronization

All devices co nnected to the local & central ACS shall have their date/time

synchronized to each ot her. In g eneral, time synchronization shall be bas ed on the

date/time setting at the central AC S.

)
4.3.10. P ower Supp y l

4.3.10.1. Power supplied for the system, inclu ding computers, car d readers,

cam eras an d recording systems, shall be powered by an

u ninterruptible p ower s ource backed up by an emergency power

generator as required by SEC-07 "Power Supply".

7
4.3.10.2. In the event of a p ower failure to the g atehouse, turns tiles or drop

gat es, p ower shall e


b automatically supplied from an emergency

power generator as spe cified in SEC-0 7 "P ower Supply".

4 .3 . 1 0 .3 . Up on estoral
r of th e m ain power supply the p ower shall revert to the

m ain source w ith n o Us er intervention.

4 . 3 .1 0 .4 . P ower supply to th e ACS shall be fu lly compliant with SEC-07

"Power Supply.

4 .3 . 1 1. External System Interface

Refers to the interface required for the ACS to transmit alarm data and video to an

external system & receive acknowledgement of alarms from the external system.

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

Al Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 19 of 34

I
a

1
Kingdom of Saudi Arabia

1 Ministry of Interior

High Commission for Industrial Security ) 8 ,» .

«
. u u.yr

7 Secretariat General

SEC-05 Integrated Security System

7
4. 3 . 1 1 . 1 . The Operator shall ensure that the ACS supplier clearly documents

the ability of the ACS to be remotely monitored.


3
4.3.11.2. The system shall provide the ability to transmit all system data to an

external system, including video, and receive acknowledgements in

l a fully documented format and protocol.

4 . 3 . 1 1 .3 . The Operator may elect to use any interface format as long as all

1 system data, including video, can be transparently sent to an

external system for display and alarm acknowledgement, the

interface requirements are fully defined and the interface is installed

3 in the ACS.

4 . 3 . 1 1. 4 . All data transmitted to an external system shall use encryption to

3 secure the data during transit over the network.

3 4.3.12. Reporting Requirements

The ACS shall provide a set of reporting tools that shall allow authorized system

operators and gate personnel to generate reports from data stored in the ACS database.

The following pre-formatted reports shall be available for ACS personnel to generate

at any time:

4.3.12.1. On-Site Report: Lists all personnel on site with details of last

access point used. This report shall include contact numbers for

J each person.

4. 3.12. 2. Visitor Report: Lists all visitors to site. This report shall

3 include, at a minimum, visitor name, organization being visited,

contact person, exit/ entry dates, gates used.

4 .3 . 1 2 .3 . Card holder photographs and access records shall be available on

the local system for review by gate and SCC personnel.

3
4.3.13. Functional Requirements

The ACS shall have the following installed and operational capabilities:

4 . 3 . 13 . I . Biometric readers installed at locations where biometric based


$

systems are deployed.


J
4.3.13.2. System shall protect against tail gating.

Issue Date: 12/6/1431H /26/05/2010

I RESTRICTED
AI Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 20 of 34

3
I

1
l;=d
Kingdom of Saudi Arabia os,-gal

bu·1,
1 Ministry of Interior

ahA» ,
High Commission for Industrial Security

u Luy
Secretariat General
3 SEC-05 Integrated Security System

7
4 . 3 . 13 . 3 . Local anti-pass back shall be enforced by the system. This shall

prevent a card holder from making an entry unless an exit has

already been recorded in the system.

4. 3 . 1 3 .4. Local system shall continue to function with no degradation even

when communication links to the central ACS are disrupted.


1
4 . 3 . 1 3 .5 . All User and access activities shall be stored in the system and be

available for review by system personnel.


1

1 4. 3 . 1 4 . Environmental

All devices mounted externally shall be sealed to a minimum standard of IEC 60529

and shall meet the environmental conditions stated in SEC-01 "Application of


3
Security Directives".

4.4. Video Assessment & Surveillance System (VASS)

The integrated security system shall include Closed Circuit Television System (CCTV)

abilities to monitor main gates and critical buildings and areas of the facility. The system
2
shall annunciate an alarm when the video signal from the camera is lost. It shall operate on a

dedicated, local network.

The VASS shall meet the following requirements:

4 . 4 . 1. Camera Type

All cameras shall be color cameras. The Operator may optionally augment this with a

separate camera capable of multi-spectral operation such as day/night or thermal /

infra-red. In all cases the color camera shall be installed as the primary device.

Cameras shall use either fixed type or Pan-Tilt-Zoom (PTZ) type camera mounts.

Fixed cameras shall be used for surveillance and for alarm detection while PTZ

cameras shall be used for assessment.

J
'

4.4.2. Camera Image Quality

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

AI! Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 21 of 34

3
I

1
Kingdom of Saudi Arabia :Ng#ka
• '

i
R

t
I l . _t

Jui,,
1 Ministry of Interior
=h ; A»}e.
High Commission for Industrial Security

uh' u
Secretariat General
7
SEC-05 Integrated Security System

7
Camera image quality and resolution shall be adequate so that the operator can

consistently distinguish between a human in any position or profile from an animal or

3 debris anywhere in the assessment zone.

A minimum of 6 horizontal TV lines resolution subtending a 30 cm object are required

1 for distinguishing a human crawler from animals.

Cameras used for alarm detection shall have a fixed frame rate of 30 frames per
1 second and pixel dimensions of 640x480 or greater. Cameras used for assessment

may have variable frame rates and pixel dimensions but must automatically switch to

full frame rate of 30 frames per second and 640x480 pixel dimensions minimum
1
when an alarm is activated.

73
4.4.3. Camera Housings

3 4 .4 . 3 . 1 . All cameras shall be installed in housings designed to protect them

from the ambient environmental conditions listed in SEC-01

7a "Application of Security Directives".


24
4.4.3.2. The camera and its housing shall be fully certified for operation in

the environmental conditions stated in SEC-O1 "Application of


.

3 Security Directives". No additional cooling or fans are permitted.

4.4.3.3. Housings shall be certified to an internationally recognized standard

J such as IP-66 or better.

4.4.3.4. Power and data cables from the camera shall be installed in armored

conduit to prevent tampering. Boxes used for camera power and

data connections shall use tamperproof screws externally on the box

and shall be placed out of easy reach. No cabling from the camera

shall be visible externally and all openings into the camera housing
3
shall be sealed.

4 .4 . 3 . 5 . Explosive - proof camera housings shall be used when dictated by

operational requirements.

4.4.4. Camera Placement

4 .4 .4 . l. Cameras shall be placed based on local topography, camera type

and lens type.

Issue Date: 12/6/1431H /26/05/2010

I RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 22 0f 34

2
I

1
Kingdom of Saudi Arabia s % 38 k~
y_ . [

ta
3

l
I I, :' J

1 Ministry of Interior
( u·y

ahA» .

3
High Commission for Industrial Security

Secretariat General n
SEC-05 Integrated Security System

7
4.4.4.2. The Operator shall develop a study that defines the actual field of

view of each camera/lens combination used and identifies blind

3 spots. The study shall consider the actual focal length of the camera

lens, pole height, local topography and obstructions in the camera

field of view.

7
4.4.4.3. The study shall identify all areas visible to the camera to at least

llan past the outer perimeter (IDAS) and 5-10km for long range

1 cameras while ACS cameras shall allow clear view of the

designated gate area.

4.4.4.4. Local terrain shall be used to determine the optimal camera


3
mounting po le height that will meet the requirements of this

Security Directive.

4.4.5. Camera Field of View


7
Refers to the area displayed for any specific camera.

The camera field of view shall cover the entire width of the detection zone at the near

field and have adequate resolution at the far field to distinguish between a person and a

nuisance alarm. The smallest profile size of a human (i.e. standing, crouching, belly

crawling, etc.) shall be discernible in all areas of the detection zone.


32

Clear zone width and length, camera resolution and sensitivity, camera location and

1 smallest human profile shall all be considered when determining lens focal length. All

camera views shall overlap the views from adjacent cameras in the detection zone so

that there are no blind spots along the detection zone.

4.4.6. Camera Frame Rate

Camera frame rate shall be selectable from 1 - 30 frames per second during non­

alarm conditions with the option to provide up to 30 frames per second if selected by

the User. During alarms the frame rate from the camera in the alarmed zone shall

automatically be increased to a minimum of 1 5 frames per second at the resolution

specified in 4 . 4.2.

3 4.4.7. Lighting

Compliant with SEC-04 "Security Lighting" and adequate for camera to display a

clear image under all ambient conditions.

Issue Date: 12/6/14311 / 26/05/2010

RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCS

Page 23 of34
I

1
Kingdom of Saudi Arabia
f
Ah » 5
1 Ministry of Interior

High Commission for Industrial Security


R' el4 'n ea#»Al •

uh» Ly
Secretariat General
3 SEC-05 Integrated Security System


)
5

4.4.8. Video Recording


3
Refers to a device th.at will record a video o
f the cameras.

1 4.4.8. I . All video data shall be recorded in digital format.

4.4.8.2. User shall be able to select any camera for full time recording if

required.
1
4.4.8.3. Operator shall select frame rate and pixel dimensions in compliance

with the requirements of 4.4.2.


3
4 .4 . 8 .4 . All video from cameras shall be stored and available for viewing,

across the network, up to 30 days from the date the video was taken.

3 4.4.8.5. All recorded camera imagery shall have location & time/date

displayed on the video.

4.4.9. Power Supply

Power supplied for the cameras, and recording system, shall be powered by an

uninterruptible power source fully compliant with SEC-07 "Power Supply.

4.4.10. External System Interface


3
Refers to the technical details required to transmit video to an external system. The

Operator shall ensure that the CCTV supplier clearly documents this requirement and
3 demonstrates its viability.

4.4. I 0 .1 . The system shall provide the ability to transmit all video to an

3 external system if so required by the Operator.

4.4. I 0.2. The Operator may elect to use alternate interface formats and that

are acceptable as Jong as all video can be transparently sent to an


I
external system for disp I ay.

4.4. I 0 . 3 . The interface shall permit the external system to select and monitor

any cameras or group of cameras.

4.4. 10.4. All data transmitted to an external system shall use encryption to

secure the data during transit over the network.

a
Issue Date: 12/6/1431H/ 26/05/2010

2 RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 24 of 34

3
I

1
Kingdom of Saudi Arabia

+,,
1
(
Ministry of Interior

High Commission for Industrial Security ea+ i !


Luy
Secretariat General
7
SEC-05 Integrated Security System

4 .4 . 1 1. Imagery Processing
3
4.4.11.1. The VASS shall process incoming video imagery from

IDAS/ACS/VASS cameras to assist the operator in rapidly locating


1 and determining the cause of the sensor alarms by identifying

motion in the camera scene and where potential risk exists in the

area being monitored.

4.4.11.2. The processing shall allow the detection of abnormal behavior such

as, but not limited to, activity at a time when no activity is expected,
1 packages left behind, entry into a restricted area or approach to a

restricted area.

3 4.4. I 1 .3 . The system analyzing the video imagery shall have the ability for

the Operator to add new rules as required by local topography.

3 4 .4 . l 1 .4 . The system shall be designed to permit the incorporation of future

analysis rules using a plug-in type architecture where new rules can

be readily incorporated by the Operator.

4 .4 . 1 1. 5 . It shall have the ability to accept and integrate sensor inputs from

other systems into its video processing algorithms.

4.4.12. Geo-Spatial Processing


1
4.4.12.1. The VASS shall be geo-spatially aware and have the ability to

overlay, and relate, camera imagery to Geographical Information

3 System (GIS) maps of the area under surveillance.

4.4.12.2. This shall require that all camera installations have geo-spatial

3 coordinates for each location.

3
4.4.13. Long-Range Surveillance

4 .4 .1 3 . 1 . VASS systems shall have the ability to monitor the area contiguous

to the facility perimeter to evaluate situations as they are

developing. While facilities in developed areas will require short

range monitoring, facilities in isolated areas will require longer

range monitoring.

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

AII Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 25 0f 34
A

1
Kingdom of Saudi Arabia

Ministry of Interior
1
High Commission for Industrial Security eh x•
Lr uh
Secretariat General
1 SEC-05 Integrated Security System

7
4 . 4 . 13 . 2 . In general, facilities in open areas shall have the ability to monitor

surrounding areas. While facilities in built-up areas shall have the

3 ability to monitor areas up to 1km from the facility.

4 .4 . 13 . 3 . Facilities in open areas shall base the camera monitoring range on

the time required to deploy a response from the nearest security


1
post. In no event shall this be less then 1 km .

4 . 4 .1 3 .4 . Facilities shall use either radar (facilities in open areas only),

l thermal sensors or night vision sensors to detect activity in the

monitored area. These sensors, after their output has been

processed, as specified in the Imagery Processing section, shall be


7
used by the system to automatically slew a camera to the area of

interest and annunciate an alarm.

3 4 . 4 . 1 3 . 5 . Radar shall be opt im z i ed to detect personnel an d vehicle si ed


z

ta rge ts . T he adar be
r am s ha ll aut om at
ic a y be bl
ll ank ed or tu rn ed

7 o ff when the be am emission points towards t e h facil t i y bein g

3J
p ro tected.

4.4.13.6. Th is VASS abilit y shall be used t o compl ement the !DA S which

monitors ac al in
tu tr usion a tt emp ts at or inside the p eri m ete r.

4.4.14. VASS L ocati ns o

AI ma facilities shall have compli t su e ce camer


1
4.4.14.1. in VASS an rv illan as

at m a ni g ates, fa cility e tr
n an ces, p er im eter fences and criti al c

bui dings and areas of


l the facility.

3 4.4.14.2. These ca m era s sha ll be m o ni tored re mo tely if so re ui ed by the


q r

Operator.

4. 5. ID Man age m e n t Sy tems (JDMS)

Th e i te
n gra ted secur ity s stem
y shall include a n identi fication car d m an ageme n t

s ste
y m to p intr an d issu e m achine r ea dable ID c ards fo r all p rso e nnel re q ui ri n g acce ss

to comp an y facilities.

T e gener l re
h a q uireme ts n fo r the IDMS are as follows :

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

Al Rights reserved to HCIS. Copying or distributuon prohibited without written permission from HCIS

Page 26 of 34
I

1
Kingdom of Saudi Arabia
s = N Z 'al
\ : I » J I _

' l b

+!i,
l Ministry of Interior

=h» »! e,A
High Commission for Industrial Security
Lit u
Secretariat General
3
SEC-05 Integrated Security System

7
4.5. I. The IDMS shall produce, track and manage ID cards for issue to

eligible personnel including both employees and contractors.

7 4.5.2. The IDMS shall consist of local IDMS workstations at each facility

with a central IDMS that shall store and retain all IDMS access data

online for at least 5 years.


I
4 . 5. 2 . 1 . The central IDMS shall be designed with full redundancy at all

levels to ensure continued operation despite the failure of a single

device.

4.5.2.2. Failover, and restore, between primary and backup devices shall be

3 automatic and shall not require any User intervention.

4.5.2.3. All local IDMS workstation operations shall function with no loss

1 of capability when communication links to the central IDMS are

disrupted.

4.5 .2.4. All card data shall be sent to the central IDMS at regular intervals of
3
1 5 minutes or less.

7 4.5.3. A minimum of two IDMS workstations shall be deployed at each local


23
facility.

4.5.4. Operator shall ensure that IDMS workstations are available in

reasonable proximity to each plant using these identification cards.

4.5.5. The IDMS shall provide data online to the ACS and other systems that

use identification cards.

4.5.6. ID cards and ID card management shall be fully compliant with the ID

card requirements stated in this Security Directive & SEC-11


3
"Identification Cards".

4.6. Computer Installation in Security Systems

All computers installed in security systems shall follow specific guidelines in order to

ensure reliable operation.

The requirements are as follows:

4.6.1. Redundancy

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

Al Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCS

Page 27 of 34

a
I

1
2 A ; 7 t i zz
Kingdom of Saudi Arabia @s;ls~kl

!i,,
1 Ministry of Interior

High Commission for Industrial Security ahu»N e

uh uy
Secretariat General
3
SEC-OS Integrated Security System

3
All computers shall be installed in a redundant configuration with automatic failover

from the active system to the backup system with no loss of data.

4.6.2. Single Point of Failure


1
Systems shall be designed to so that no single component failure can disable the

system.
1

7 4.6.3. Hardware

Computer hardware and software used for security systems shall be of the latest

generation available at the time of the design completion.


7

3 4.6.4. Communications

When configured for connectivity to an external system, Systems shall employ

redundant communications links, in compliance with SEC-08 "Communications", and


7
employ route diversity in the physical link installation to the nearest communication

central office.

4.6.5. Database

All system data pertaining to the security system shall be stored in a relational data

base management system. The system storage shall be designed to ensure that all

system data is available online for a minimum 24 month period, or greater.

Specific periods for various systems are specified in each section.

4.6.6. Backup
3
All security system data shall be backed up on a regular cycle.

4.6.7. Storage

All computer systems shall be configured with at least 50% spare disc storage beyond

expected system requirements.

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED

AI! Rights reserved to HCIS. Copying or distibution prohibited without written permission from HCIS

Page 28 of 34

a
I

l
4 5 : Z ; \ g .z
Kingdom of Saudi Arabia
-· 7 '-k

1 -5,
Ministry of Interior

High Commission for Industrial Security


M _.,As
L vu
Secretariat General
7
SEC-05 Integrated Security System

2 4.6.8. External Systems Interface

All security systems shall have a clearly defined, and documented, procedure for

providing all system data, including video, to an external system for display and
1
acknowledgement if required by Operator or operational requirements.

This data shall be made available to the external system after full compliance with
1 security authentication protocols. This capability shall be implemented if dictated by

operational requirements.

7 All data transmitted to an external system shall use encryption, in accordance with the

requirements of SEC-12, to secure the data during transit over the network.

4.6.9. Security

3 All computer systems shall apply a robust array of current security tools to protect the

system against unauthorized access attempts.


7,)

2#

4.6.10. Power Supply

Security systems shall be powered by a uninterruptible power supply, backed up by an

emergency power generator, fully compliant with SEC-07 "Power Supply".

37

4.6. I I. Environmental

All security system components shall be rated for the environmental conditions they

are used in as specified in SEC-01 "Application of Security Directives".

27

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED
Al Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCS

Page 29 of34

a
I

1
Kingdom of Saudi Arabia

l Ministry of Interior

ah y e
High Commission for Industrial Security
uh uy
Secretariat General
3
SEC-OS Integrated Security System

1
J
4.7. Security Systems Integration

Security systems shall present an integrated view to security personnel. This does not

preclude individual system installation on physically discrete computers as technology

limitations may preclude the optimal solution of a single, common hardware platform for all

systems.
1
All security systems deployed in facilities shall meet the following requirements:

l
4.7.1. All installations shall have the ability to present security personnel

with a single interface and user environment for all installed security
3
systems.

This will allow security personnel to manage the system from this
7 environment without regard to the physical system distribution on

different platforms.

3 4.7.2. Provision of this ability requires that all such systems transparently

share data across secured links and permit the integration of security

data with imagery from cameras and sensor activations.

This integrated environment shall be presented to security personnel

across multiple displays that share common design and management

techniques.

4 . 7. 3 . Integration at a data level, as specified in this requirement, allows

I individual specialized management in each system's own specialized

environment.

4.7.4. All IDAS and ACS installations can continue to install specialized
3
system monitoring equipment as dictated by individual system

requirements.

3 This translates to a local monitoring facility for the IDAS and local

displays for ACS while maintaining full external system connectivity

to the integrated environment which may be at a different location or

could be co-located at the same location.

4.7.5. ISS components installed in the field shall have tamper sensors

connected to the ISS that will annunciate an alarm when any attempt is

made to access the component.

4.7.6. Site Acceptance Tests (SAT) for new installations shall be conducted

to verify ISS operation prior to acceptance by the Operator. The SAT

procedures and documentation shall be filed and available for review.

Issue Date: 12/6/1431H /26/05/2010

RESTRICTED
Al Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 30 of34

3
I

-,
Kingdom of Saudi Arabia
te e

1 Ministry of Interior
=!tu»e_
High Commission for Industrial Security
uh Luy
Secretariat General
7 SEC-05 Integrated Security System

4.8. Facility Design Requirements for housing security systems

1
Security systems shall be housed in secured facilities that have adequate structural, electrical

and environmental safeguards.

These facilities shall be classified by location as follows:

··1
TYPE A: Located within company administrative office areas.

T YP E B : Installed at a local facility close to a gate house or other security

facility.

TYPE C: Installed in the field to contain interface equipment to security system

field components.

Each one of these installations shall comply with the requirements stated below.

4.8. I. All structures housing security system components shall be of concrete

or Concrete Masonry Unit (CMU) construction with steel rebar

reinforcements. Structure may be an independent structure or located

within a building. Buildings constructed of CMU shall use rebar and

grout in each core.

4.8.2. Type A: Structures in office buildings can be located as needed as

long as they comply with the remaining requirements in this section.

Type B: Structures at facilities shall be located within 50m of the local

gate house on the inside of the facility perimeter fence.

Type C: Field structures can be placed as required by system

installation requirements but shall be inside the facility perimeter

fence.

4 . 8 .3 . Ingress into this structure shall be via a steel door fully compliant with

the requirements stated in SEC-09 Doors" and use a Jocking system

compliant with SEC-10 "Locks". Access to these locations shall be


-w
J restricted to authorized personnel.

4.8.4. Independent structures (Type B) shall have their front door in direct

line of sight to the gatehouse.

Issue Date: 12/6/1431H / 26/05/2010

RESTRICTED

All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 31 of34
I

7
Kingdom of Saudi Arabia 4;/I5IN=z\
-· T '-k
A-i),
1 Ministry of Interior

High Commission for Industrial Security =! h ie,

uh5y
Secretariat General
3
SEC-05 Integrated Security System

All data required for the SCC function shall be provided to the operator

at this console.

7 4.10.13. Personnel data and imagery shall be available to the SCC operator.

4.10.14. All voice communications into and out of the SCC shall be recorded

7 and maintained for 12 months.

4.10.15. Large Screen Displays shall be used to provide a continuous overview

1 of the status of all areas under the SCC' s control.

5.0. Application of Requirements


7

This section lists how the elements of this security directive apply to facilities depending on their classification

using the criteria stated in section 4.2 of SEC-01.

A P P L I C A T I O N

E L E M E N T ' Class 1 I Class 2 Class 3 Class 4

Intrusion Detection & Assessment System


p,·
✓ ✓ t

IDAS

✓ -

Access Control System
f
Video Assessment & Surveillance System
✓ ✓ ✓
VASS

ID Management System ✓ ✓ ✓

Computer Installation in Security Systems ✓ ✓ ✓

7 Facility Design requirements for Housing


✓ ✓ ✓
Securit S stems

Security Conlrol Center ✓ ✓ ✓

a
lssue Date: 12/6/1431 /26/05/2010

RESTRICTED

Al! Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS

Page 34 of34

You might also like