COVID-19 Update: We are currently shipping orders daily. However, due to transit disruptions in some geographies, deliveries may be delayed. To provide all customers with timely access to content, we are offering 50% off Science and Technology Print & eBook bundle options. Terms & conditions.
Physical Security Strategy and Process Playbook - 1st Edition - ISBN: 9780124172272, 9780124172371

Physical Security Strategy and Process Playbook

1st Edition

Editor: John Kingsley-Hefty
Paperback ISBN: 9780124172272
eBook ISBN: 9780124172371
Imprint: Elsevier
Published Date: 23rd September 2013
Page Count: 160
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST

Institutional Subscription

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning.

This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources.

The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom.

The Physical Security Strategy and Process Playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

Key Features

  • Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures
  • Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved
  • Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each
  • Covers the selection, implementation, and evaluation of a robust security system


Mid- to upper-level security managers; any employee who makes security-related decisions, such as security coordinators; security managers; facility, department, and unit managers; managers responsible for choosing security solutions; information technology (IT) managers; engineering specialists; information security coordinators; auditors; and corporate real estate professionals.

Table of Contents

Executive Summary

What Is a Playbook?


Chapter 1. Physical Security Concepts

1.1 Before you Begin

1.2 Assessing the Needs of your Business

1.3 Zones of Protection

1.4 Security Components

1.5 Integrating Systems

Chapter 2. Functional Areas and Security Risks

2.1 Introduction

2.2 Assessment Review

2.3 Risks by Area

Chapter 3. Security Performance Guidelines and Options

3.1 Introduction

3.2 Functional Areas: Guidelines and Options

Chapter 4. Performance Specifications

4.1 Introduction

4.2 Access Control

4.3 Access Logs

4.4 Access Panels and Hatch Coverings

4.5 Alarm Systems

4.6 Access Control and Alarm Systems: Integration for Business Operations

4.7 Attendants

4.8 Audit Trail

4.9 Authorizer Lists

4.10 CCTV Systems

4.11 Communications

4.12 Designated Employee

4.13 Doors

4.14 Electronic Access Systems

4.15 Escort Policy

4.16 False Alarms

4.17 Fencing

4.18 Fire Files

4.19 Gates

4.20 Human Intervention

4.21 Intrusion Detection System

4.22 Landscaping

4.23 Lighting

4.24 Lock Systems

4.25 Material Passes

4.26 Natural Barriers

4.27 Patrols and Rounds

4.28 Receptionists

4.29 Restricted Areas

4.30 Roof Access

4.31 Safes

4.32 Seals

4.33 Security Desks

4.34 Security Officers

4.35 Security Patrol Systems

4.36 Signs

4.37 Visitor Verification and Authorization

4.38 Walls

4.39 Windows

Chapter 5. Systems Implementation and Evaluation

5.1 Introduction

5.2 Selecting a Security System

5.3 Selecting a Vendor or Supplier

5.4 System Installation

5.5 Turn-On Period

5.6 System Testing, Evaluation, and Validation

5.7 Policies and Procedures

Chapter 6. Physical Security Resources

6.1 Introduction

6.2 Internal Resources

6.3 External Resources

6.4 Educational Resources

6.5 Publications

6.6 Professional Organizations

6.7 Professional Certification

About the Contributing Editor

About Elsevier’s Security Executive Council Risk Management Portfolio


No. of pages:
© Elsevier 2013
23rd September 2013
Paperback ISBN:
eBook ISBN:

About the Editor

John Kingsley-Hefty

John Kingsley-Hefty

John Kingsley-Hefty is an experienced security consultant whose leadership, accountability, communication skills, and project management experience in security, facility design, building types, operations, programs, and products has spearheaded team success stories for clients' critical corporate initiatives to advance growth and competitive advantage.

As a registered architect, John's strategic vision and planning reduces security costs by advancing security into the preliminary building design process. For over 35 years John has been successfully providing security and design services to diverse organizations such as 3M, Chicago Tribune Companies, and St. Jude Medical, Inc.

John’s area of expertise is physical security architecture.

Affiliations and Expertise

Subject matter expert faculty, Security Executive Council


"The editor is a registered architect and brings design suggestions to the recommendations. Executive offices and spaces should be located away from public access and direct employee access. The space should use smart locking hardware and key control." --Security Letter

Ratings and Reviews