Security Survey and Inspection: Group 4 CDI-2
Security Survey and Inspection: Group 4 CDI-2
Security Survey and Inspection: Group 4 CDI-2
FOLLOW UP SURVEY
SUPPLEMENTAL SURVEY
SPECIAL SURVEY
INITIAL SURVEY
• The initial security survey is conducted prior to constructing, leasing,
acquiring, modifying, or occupying a facility or area
FOLLOW UP SURVEY
• It is conducted to ensure the completion and modification
SUPPLEMENTAL SURVEY
• This is conducted when changes in the organization, mission, facility or
the threat level of the area
SPECIAL SURVEY
• This is conducted to examine or resolve a specific issue
How to conduct a security survey
Observing the facility functioning at all hours and shifts.
Interviewing representative of local law enforcement and other relevant
agencies
Reviewing relevant materials
Meeting and touring with security officers
Evaluating existing and planned procedural and physical security
countermeasures.
Policies, plans and procedure
Employee awareness, involvement and ownership
Video
Lighting
Signage
Lock and Key Control
Alarm System
Access Control
Visitor control and management
Security Staff
Executive protection
Material Receiving, shipping and inventory controls
Barrier
Background screening
Investigate procedure
Vendor screening
Identification processes
Threat assessment and management
Training
Communication and alert system
Contraband detection
Mail and package controls
Emergency and crisis planning
Work place violence policies
Counter terrorism planning and response
Determining relevant security related threat
Benchmarking the security program against comparable industry standards
Distributing questioners
Testing security systems
Research
B. Security Inspection
• A process of checking your asset against set of criteria and the evaluation
of all security systems and access controls.
Inspection
Types of inspection
• Evaluation
• Compliance
• Follow up
• After an our room check
• Self Inspection
• Closeout
• Frequency of inspection
Security Inspection might be conducted
because;
• There is a need to understand the real risk, threat, vulnerabilities and to evaluate the effectiveness of the
existing security measures
• A security loss incident or breach, violence, theft, attack or other compromise has occurred and there is a
need to prevent recurrence
• There is a desire to confirm that the security program is a cause effective as it can be.
• A significant change is occurring, such as a new building
• There is a heightened concern for threats
• There is a industry or government driven requirement to perform assessment
• The organization wishes to validate security programs
• The organization wishes to develop new assessment
THANK YOU