You are on page 1of 48

The Layered Approach

Beverly Roach
Associate Faculty
Security Risk Assessment Process
Context Analysis
What do we do?

Follow up & Review Threat Assessment

Is the risk level Vulnerability


acceptable? Assessment

Implement Measures Risk Assessment

Mitigation Measures
Today’s discussions
• Protection in Depth - the layered approach to security

• Perimeter Protection - the elements used to provide perimeter protection

• :Introduction to Crime Prevention Through Environmental Design


Layers
Security in Depth
“By designing security measures that combine to support and
complement each other, you will make it difficult for an
external intruder or an employee to gain unauthorised
access. This method is called ‘security in depth’.”

(PSR, Physical Security, 2019)


Perimeter: vehicle access, walls, gates

First Layer: Reception, Pass control, Parking

Second Layer: Public areas, cafeteria, conference areas

Third Layer: Work spaces, meeting rooms

Secure areas: VIP areas, IT, Facilities,


Security, Finance, Human Resources
\

Restricted access, additional guards, CCTV


coverage, motion detectors, safe, alarms

Visitors escorted, office doors locked

Passes required, CCTV cameras, guard patrols

Isolated, CCTV cameras, parking


restrictions, guards

Access Control procedures/measures, scanners,


searches, guards, CCTV cameras, motion detectors
Goals of
Physical Security

• Deter
Goals of
Physical Security

• Detect
Goals of
Physical Security

• Delay
Goals of
Physical Security

• Respond
Protection Plans
• Prevent threats from occurring • Technology helps with:
• Mitigate the impact
ü access control
• Based on Security Risk Assessment ü surveillance
• People, Equipment, Procedures ü surveillance detection
ü intrusion detection
• Plans – develop, test, revise cycle ü fortification
• Considers organizational culture ü staff accountability, and
ü response.
• Why Plan?
• Types of Plans?

Response ü
ü
Disaster Preparedness
Incident Response
Plans ü
ü
Communications
Mass Notification
ü Evacuation/Shelter in Place
ü Fire
ü Mass Casualty
Drills
• Prepares and tests Stakeholders:
• Ensures efficient response ü Security
• Adrenaline inoculation ü IT
ü Facilities
• Identify gaps ü Medical
• Make improvements ü Others?
• Tailored to your threat environment
Case Study
What recommendations you would make in the
Drill After Action Report?
• Your facility is near a major fault line. You conduct earthquake response drills.
• The drills test staff response and the response teams including security, facilities,
medical and IT.
• Until now drills had been based on the need evacuation.
• Some systems are outdated, with the Public Address system installed in an
inconvenient location.
• The protocols are that during an earthquake, staff should drop, cover and hold until
given advice to do otherwise.
• During a recent earthquake it became apparent that not all of the 5000 staff and
consultants understood the response. Many staff tried to evacuate.
• Guards reported that staff were disgruntled because they were not told what to do at
their assembly points.
• Some guards did not know what to do.
Drill After Action Report
• Drill evacuations during fire drills. Drill shelter in place
during earthquakes.
• Staff need information. This needs announcements and a
functioning PA system
• Responders need training but that means development of
clear and cohesive SOPs
• Who is in charge?
• Who gives the all clear?
Perimeter Protection

Design

• Eliminate or mitigate risk


• Achieve functionality of the building
• Deliver aesthetic and architectural intent
Perimeter Protection

The First Layer


Perimeter Protection
Standoff Distance

• UFC 4-010-01 DoD Minimum Antiterrorism Standards for


Buildings

• “Minimize mass casualties in buildings or portions of


buildings … in the event of a terrorist attack”
Perimeter Protection
Perimeter Protection
Perimeter Protection
• Barrier
Perimeter Protection
Perimeter Protection
Perimeter Protection
Vehicle and Pedestrian Entrances
Perimeter Protection
Perimeter Protection
Lighting
Perimeter Protection-
Lighting
• Location of perimeter lights
• Placement of lights for glare
• Overlapping illumination
• Protect your system
• Motion-activated
• Don’t bother your neighbours
• Back up power
• Local cooperation
Crime Prevention Through
Environmental Design
• A multi-disciplinary approach for reducing crime through urban and
environmental design and the management and use of built
environments.
• Strategies aim to reduce victimisation, deter offender decisions that
precede criminal acts, and build a sense of community among
inhabitants so they can gain territorial control of areas and reduce
opportunities for crime and fear of crime.
• It is known around the world as Designing Out Crime, defensible
space, and other similar terms.”
CPTED
Crime Prevention Through
Environmental Design
There are four basic strategies:

• Surveillance
• access control
• territorial reinforcement
• maintenance
Natural Surveillance
• Doors and windows that look out onto streets and parking
areas.
• Sidewalks and streets that are open and inviting to
pedestrians.
• Unobstructed sight lines. Open design concepts (e.g., that
do not create hidden spaces).
• Front porches/activity areas in front of buildings to
encourage a visual connection with the street.
• Adequate nighttime lighting.
Natural Access Control
• Access should be limited
• Streets should be designed to discourage speeding and nonlocal
traffic.
• Paving treatments, plantings, and architectural design features,
such as a columnar gateway, guide visitors away from private
areas.
• Walkways should be easy to identify, located in such a way as to
direct pedestrian traffic, and visible from the street, homes, or
parking areas.
Territorial Reinforcement
• Promote ownership of the area
• Community spaces
• Well-kept, inspire pride
• Measures to clearly segregate the area
• Signage, low fences, landscaping
Maintenance
• The areas that are “owned” by the residents
• Gardens and gathering areas should be well-maintained
• No trash or graffiti
• Equipment is operational
• Play ground safe
• Help to reduce opportunities for vandalism and other crimes
Planning and Design
Strategies
• Enable clear lines of sight
• Adequate lighting
• Minimize concealed/isolated routes
• Avoid entrapment
• Reduce isolation
• Mix land use
• Activity generators
• Sense of ownership
• Signage
Conclusion
Protection in Depth - the layered approach to security

Perimeter Protection - the elements used to provide perimeter protection

Crime Prevention Through Environmental Design


Supplementary
Material
Singapore Police Force. Guide for Responsible Person Annex B
https://www.police.gov.sg/-/media/Guide-for-Responsible-Person-
Annex-BDec2018.pdf

You might also like