Physical Security Assessment

Working with a third party to walkthrough your physical efforts in action can give you immediate feedback on how to strengthen your program.

Physical Security Assessments are a holistic comprehensive examination of the physical security of a particular location, be it a high rise, manufacturing plant, or residence. The Physical Security Assessment is a non-invasive, comprehensive walkthrough guided by your organization’s security personnel . Our experts evaluate perimeter defenses, access control systems, video surveillance, and other control domains essential to any effective physical security program.

Benefits

Many organizations spend thousands of dollars to implement physical security controls, but do not evaluate them to ensure they are functioning as intended. Controls are often applied in an inconsistent manner leaving security gaps (for instance, some areas may lacklacking camera coverage or adequate lighting). Alternatively, controls may be implemented to satisfy internal policies or external regulations without providing the intended security benefits (for example, a heavy- duty lock might be installed on a door with exposed, unpinned hinges).

For organizations truly concerned about the effectiveness of their physical security controls, SecureState can identify gaps and weak points that expose an organization to risk. From casual trespassers to committed criminals, SecureState is familiar with the tools and techniques leveraged by those seeking to bypass your organization’s physical defenses, as well as the different means to prevent, deter, and detect such threats.

Expertise

SecureState’s physical security team is comprised of highly qualified individuals with a range of backgrounds. Our team members have held positions in military intelligence, financial services security, security auditing, community emergency response, and beyond. Our professional experience and expertise includes threat intelligence, policy development, tactical operations planning, and national security policy.

This diverse team is brought together by its shared passion for security and desire to find solutions to our clients’ most pressing security challenges. Together, the team has leveraged its talents to build, implement, and test complex physical security programs for organizations across a range of industries and a multitude of environments. Some of the largest organizations within their respective industries have trusted the advice and recommendations of SecureState professionals in the design, implementation, management, and testing of their security architectures.

Our capabilities, along with our comprehensive knowledge of our clients’ missions, enable SecureState to build productive long-term relationships with our clients while crafting solutions appropriate to their needs.

Approach and Methodology

Our approach follows industry accepted testing methodologies such as ASIS, PTES, NIST 800-115, and OSSTMM. SecureState begins Physical Security Assessments by performing an exhaustive search of open source intelligence on the target company. This research can reveal detailed information about the target location, including staff hierarchy, interior layouts, and even employee badges and access control systems. Extensive imagery analysis of the target site is conducted using tools like Google Earth to determine potential weaknesses in the perimeter or design as well as likely avenues of approach.

On site, SecureState meets with your organization’s security and facilities personnel to perform a guided walkthrough of the target facilities. In recognition of the varied security needs of different types of facilities and environments, SecureState has developed comprehensive control sets for facilities of all types. These control sets serve as a framework for evaluating your organization’s physical security controls to determine what controls are what controls are in place and their effectiveness. The physical security control subdomains evaluated by SecureState during the assessment process include, but are not limited to, the following:

  • Access Control Systems
  • Alarm Systems
  • Video Surveillance Systems
  • Lock and Key Management
  • Perimeter Systems
  • Safety Systems
  • Visitor Entry, Verification, and Management Procedures

Finally, SecureState attempts to determine what physical vulnerabilities may be present within the controls themselves. This allows SecureState to determine if certain controls need to be improved, or if a new technology can assist with the mitigation of specific threats agents. The deliverable is a detailed report that assesses the maturity of the facility’s current physical security controls, pointing out areas of strength and providing specific recommendations for means to improve physical security in the short and long term.

physical_security

Get Started!