SecureState begins Physical Security Assessments by executing an exhaustive search of open source intelligence on the target company. This research can reveal unexpected
information about the target location, including staff hierarchy, interior layouts, and even employee badges. Extensive imagery analysis of the target site is conducted
using tools like Google Earth to determine potential weaknesses in the perimeter or design. Finally, SecureState reviews company documents to identify gaps in physical
security-specific policies and procedures.
On site, SecureState will meet with client security and facility personnel to perform a guided walkthrough of the target facility. All physical security controls are
evaluated for existence and effectiveness. The physical security control subdomains evaluated by SecureState during the assessment process include, but are not limited
to, the following:
- Access Control Systems (including badges)
- Camera Type and Placement
- Document Management
- Lock and Key Management
- Perimeter and Gates
- Safety Systems (fire suppression, backup power)
- Visitor Entry and Verification Procedures
Finally, SecureState attempts to determine what physical vulnerabilities may be present within the controls themselves. This allows SecureState to determine if certain
controls need to be improved, or if a new technology can assist with the mitigation of specific threat agents.