Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings



Similar documents
How to Solve the Most Persistent Problem in Perimeter Security Systems

Physical Security for Drinking Water Facilities

Select Agent Program Workshop November 16, Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)

Security at San Onofre

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

Security Systems Surveillance Policy

U.S. DoD Physical Security Market

Conducting Security System Site Surveys

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

Introduction. Industry Changes

How To Ensure Security At A Site Security Site

Protecting your Home Business Future

3.0 Nonsystem Based Design Descriptions and ITAAC

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

GUIDE TO SPECIFYING A CCTV SYSTEM

State of Vermont. Physical Security for Computer Protection Policy

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Remote Monitoring offers a comprehensive range of services, which are continually

2015 Cybersecurity Awareness

a l A a l l i e v r l o r t a l l i e v r G e t a r a l g r u d i V e v i s s a l a u t r i V s s c c d i V e v i t c A l a u t r i V

Physical Security to mitigate Social Engineering Risks

Site Security Standards and Strategy

Physical Security Assessment Form

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

Chapter 1 Introduction

AIO Remote Site Security Solution

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities

Science/Safeguards and Security. Funding Profile by Subprogram

APEC Private Sector. Supply Chain Security Guidelines

Physical Security Reliability Standard Implementation

Does a fence or other type physical barrier define the perimeter of the facility?

WEBFIL LIMITED. Your Security Partner

C-TPAT Importer Security Criteria

Court Security Guidelines

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II

Intermec Security Letter of Agreement

Security Technology. Virtual

Security for Railways and Metros

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

Winning Initiatives and Best Practices for Physical Security

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

Appendix G. Security management plan

Palm Beach State College Security Plan

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

Think Remote Monitoring Think Concept Pro Think VXM4B

Nuclear Plant Security Systems

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

Middleborough Police Electronic Security Narrative

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Security Criteria for C-TPAT Foreign Manufacturers in English

The remote CCTV monitoring specialists CCTV Monitoring

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

V ID E O A N A LYT ICS

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

Understanding Security Basics: A Tutorial on Security Concepts and Technology

Security Systems. Dr. Sam C. M. Hui Department of Mechanical Engineering The University of Hong Kong

Surveillance and Security Technologies for Bridges and Tunnels

Newton Public Schools Security Audits Executive Summary

03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements

GUIDELINES ON ACCESS CONTROL, SCREENING & MONITORING

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Integrated Physical Security and Incident Management

A Human Factor Interface for SIEM

C-TPAT Self-Assessment - Manufacturing & Warehousing

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION

Why All Data Centers are Not Created Equal

SITECATALYST SECURITY

PHYSICAL SECURITY PROGRAM. April 9, Incorporating Change 1, May 27, 2009 UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE (USD(I))

School Security: What are you missing?

Surveillance Equipment

Frankfurt Data Centre Overview

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

Appropriate response: A guide to security system integration, monitoring and verification

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Crime Prevention through Environmental Design (CPTED) - Checklist

A Risk Assessment Methodology (RAM) for Physical Security

Security Alarm Monitoring Protocol

View. Select View Managed Video Services ADT

Building Integration System Selection Guide for V4.0

Transcription:

Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over 20 years of experience in Law Enforcement and Security Operations Worked as a DoD Contractor for Defense Threat Reduction Agency as onsite Program Manger for Access Control Served as a Supervisory Physical Security Specialist with Pentagon Force Protection Agency DCO Meeting Room Navigation Notes box for audio information and other announcements Use Full Screen (upper right corner) to maximize view of the presentation. Click Full Screen again to switch back. You will need to be out of Full Screen view to respond to poll questions. 1

DCO Meeting Room Navigation Q&A box for entering questions/feedback File share box to download material for today s presentation Example of a Poll Question Chat Question #1 Consider one asset at your Installation/Facility; how do you employ security-in-depth to protect that asset? Enter your responses in the chat box 2

Webinar Objectives Definition and Purpose of Security-in-Depth (SID) Identify Physical Security Measures Incorporating Security Measures-in-Depth Definition Security-in-Depth is a determination by the senior agency official that a facility s security program consists of layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility. Purpose P.I.E.F.A.O. P People F Facilities I Information A Activities E Equipment O Operations 3

Purpose (cont.) Safeguard personnel Prevent unauthorized access to equipment, installations, material, and documents Safeguard assets against espionage, sabotage, damage, and theft Control movement within a facility Through the integration of countermeasures! Chat Question #2 What are some examples of integrated countermeasures? Enter your responses in the chat box Concept Integrated countermeasures are security measures employed to deter, delay, detect, deny, or prevent aggression or attacks on identified critical assets. 4

SID: Multilayered approach employing human and other physical security measures... to create a layered defense against potential threats Asset Concept (cont.) Facility Layout and Construction Visitor Entry Areas IDS and Alarms Surveillance Cameras Perimeter Entry Checkpoints Fencing Signage Site Lighting Barriers Concept (cont.) Employs active and passive complementary physical security measures to ensure protection of DoD assets. Active Barrier System AA&E Storage Area Perimeter Fence Enclaving SID Concept Deter Prevention through fear of consequences Detect Alerts, assesses, and provides evidence of unauthorized intrusions Delay Active and passive measures to slow or encumber the potential adversary; initial response Asset Deny The combination of all security measures brought to bear to arrest enemy action; final response 5

Physical Security Measures Barriers Fencing Clear zones Signage Lighting Man-passable openings (secured) Video surveillance systems Intrusion detection systems (IDS) IDS sensors and detectors Access control systems Access control procedures Screening equipment Two-way radios Locks Security containers Security forces Doors Windows Walls Forms 0-16 Poll Question #1 Security Personnel Security forces provide the enforcement element of physical security program. Security forces may consist of: Military police Federal Government police (job series 0083) Security guards (job series 0085) Contract security guards K-9 teams 6

Access Control Systems Access Control Systems consist of: Electronic locks Card readers Biometric readers Alarms Computer systems to monitor/control access Individual s credential compared against a database; once approved, system sends output signals allowing authorized personnel to pass through controlled portals. Closed Circuit Television System CCTV System = integration of cameras, recorders, switches, keyboards, and monitors to allow viewing and recording of security events, utilized for: Alarm-assessment Surveillance Physical Barriers Physical barriers: Define perimeter Establish physical and psychological deterrent to adversaries Delay and disrupt an attack Channel flow of personnel and vehicles through designated areas Can be natural or manmade 7

Signs Signs should be positioned to assist in: Controlling authorized entry Deterring unauthorized entry Precluding accidental entry Signs should be clearly displayed and legible (bilingual for areas where multiple languages are spoken) from any approach to the perimeter from a reasonable distance. Security Lighting Security lighting should: Discourage/deter entry attempts Make detection likely Prevent glare for guards Not impede CCTV or other automated monitoring systems Chat Question #3 What physical security measures could be used to safeguard this facility? Active Physical Security Measures + Passive Physical Security Measures = Security-in-Depth 8

SID Review Solution Security Personnel Access Control System Video Surveillance System Fencing Signage Barriers Site Lighting Coordination with Other Programs Integrated and Coherent Effort Summary Definition and Purpose of Security-in-Depth (SID) Identify Physical Security Measures Incorporating Security Measures-in-Depth 9

elearning Want to Learn More? Introduction to Physical Security Physical Security Measures Physical Security Planning and Implementation Physical Security Virtual Environment Assessment Instructor-led training Applying Physical Security Concepts Course August 5-9, 2013 Linthicum, MD Questions? PhysicalSecurity.Training@dss.mil Contact Information Handouts and frequently asked questions from this webinar will be posted at: http://www.cdse.edu/catalog/webinars/physicalsecurity/physical-security-postures.html You may also email Physical Security training related questions to DSS at PhysicalSecurity.Training@dss.mil. Thank you for attending the CDSE Security-in-Depth webinar. 10