Professional Documents
Culture Documents
Security Thread and Vulnerability Assessment Form
Security Thread and Vulnerability Assessment Form
Form 19-1
Revision: 000
Date: 12 Nov 2020
Security Thread and Vulnerability Assessment Form
Access Control – Unauthorized Attempted Moderate 1. Restrict access to all employee data so that it cannot be
Entry Vulnerability used by other parties.
1
2. Using Asset, no to control company data and only the
owner can access
Access Control – Unauthorized Actual Moderate 1. Restrict access to all employee data so that it cannot be
Entry Vulnerability used by other parties.
2
2. Using Asset, no to control company data and only the
owner can access
Access Control – Badge stolen / missing Moderate 1. Restrict access to all employee data so that it cannot be
Vulnerability used by other parties.
3
2. Using Asset, no to control company data and only the
owner can access
Access Control – Loan of identification data Moderate 1. Restrict access to all employee data so that it cannot be
Vulnerability used by other parties.
4
2. Using Asset, no to control company data and only the
owner can access
Access Control – Disclosure of access Moderate 1. Restrict access to all employee data so that it cannot be
codes Vulnerability used by other parties.
5
2. Using Asset, no to control company data and only the
owner can access
Alarms – Security Low Monitor key business areas to manage potential future
6 business and workforce disruptions.
Vulnerability
Alarms – Fire Low Monitor key business areas to manage potential future
7 business and workforce disruptions.
Vulnerability
Alarms – Environmental Low Monitor key business areas to manage potential future
8 business and workforce disruptions.
Vulnerability
9 Alarms – Process Control Low Monitor key business areas to manage potential future
Form 19-1
Revision: 000
Date: 12 Nov 2020
Security Thread and Vulnerability Assessment Form
Form 19-1
Revision: 000
Date: 12 Nov 2020
Security Thread and Vulnerability Assessment Form
hazardous event
3. Setting up the security team for more detail in
receiving guests during working hours
Burglary – Forced Entry Low Monitor key business areas to manage potential future
16 business and workforce disruptions.
Vulnerability
Fire Access – Blocked Low Monitor key business areas to manage potential future
17 business and workforce disruptions.
Vulnerability
Product Contamination Low Monitor key business areas to manage potential future
18 business and workforce disruptions.
Vulnerability
Property Damage Low Monitor key business areas to manage potential future
19 business and workforce disruptions.
Vulnerability
Robbery Low Monitor key business areas to manage potential future
20 business and workforce disruptions.
Vulnerability
Sabotage – Product Tampering Low Monitor key business areas to manage potential future
21 business and workforce disruptions.
Vulnerability
Sabotage – Site Facilities Low Monitor key business areas to manage potential future
22 business and workforce disruptions.
Vulnerability
Sabotage – Suspected Low Monitor key business areas to manage potential future
23 business and workforce disruptions.
Vulnerability
Theft – Auto Low Monitor key business areas to manage potential future
24 business and workforce disruptions.
Vulnerability
Theft – From Auto Low Monitor key business areas to manage potential future
25 business and workforce disruptions.
Vulnerability
Theft – Funds Low Monitor key business areas to manage potential future
26 business and workforce disruptions.
Vulnerability
Theft – Product Low Monitor key business areas to manage potential future
27 business and workforce disruptions.
Vulnerability
Theft – Diversion Low Monitor key business areas to manage potential future
28 business and workforce disruptions.
Vulnerability
Form 19-1
Revision: 000
Date: 12 Nov 2020
Security Thread and Vulnerability Assessment Form
Theft – Misappropriation Low Monitor key business areas to manage potential future
29 business and workforce disruptions.
Vulnerability
Theft – Raw materials Moderate 1. Checking Every Worker When it's time to go home.
Vulnerability 2. Provision of CCTV in areas that are vulnerable to being
30
seen by the eye and difficult to monitor.
3. Install government regulations for material theft sanctions.
Theft – Precious Commodities Low Monitor key business areas to manage potential future
31 business and workforce disruptions.
Vulnerability
Theft – Personal Items Low Monitor key business areas to manage potential future
32 business and workforce disruptions.
Vulnerability
Vandalism – Malicious Mischief Low Monitor key business areas to manage potential future
33 business and workforce disruptions.
Vulnerability
Vandalism - Vehicles Low Monitor key business areas to manage potential future
34 business and workforce disruptions.
Vulnerability
Form 19-1
Revision: 000
Date: 12 Nov 2020