
Physical Security Strategy and Process Playbook
Description
Key Features
- Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures
- Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved
- Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each
- Covers the selection, implementation, and evaluation of a robust security system
Readership
Mid- to upper-level security managers; any employee who makes security-related decisions, such as security coordinators; security managers; facility, department, and unit managers; managers responsible for choosing security solutions; information technology (IT) managers; engineering specialists; information security coordinators; auditors; and corporate real estate professionals.
Table of Contents
Executive Summary
What Is a Playbook?
Introduction
Chapter 1. Physical Security Concepts
1.1 Before you Begin
1.2 Assessing the Needs of your Business
1.3 Zones of Protection
1.4 Security Components
1.5 Integrating Systems
Chapter 2. Functional Areas and Security Risks
2.1 Introduction
2.2 Assessment Review
2.3 Risks by Area
Chapter 3. Security Performance Guidelines and Options
3.1 Introduction
3.2 Functional Areas: Guidelines and Options
Chapter 4. Performance Specifications
4.1 Introduction
4.2 Access Control
4.3 Access Logs
4.4 Access Panels and Hatch Coverings
4.5 Alarm Systems
4.6 Access Control and Alarm Systems: Integration for Business Operations
4.7 Attendants
4.8 Audit Trail
4.9 Authorizer Lists
4.10 CCTV Systems
4.11 Communications
4.12 Designated Employee
4.13 Doors
4.14 Electronic Access Systems
4.15 Escort Policy
4.16 False Alarms
4.17 Fencing
4.18 Fire Files
4.19 Gates
4.20 Human Intervention
4.21 Intrusion Detection System
4.22 Landscaping
4.23 Lighting
4.24 Lock Systems
4.25 Material Passes
4.26 Natural Barriers
4.27 Patrols and Rounds
4.28 Receptionists
4.29 Restricted Areas
4.30 Roof Access
4.31 Safes
4.32 Seals
4.33 Security Desks
4.34 Security Officers
4.35 Security Patrol Systems
4.36 Signs
4.37 Visitor Verification and Authorization
4.38 Walls
4.39 Windows
Chapter 5. Systems Implementation and Evaluation
5.1 Introduction
5.2 Selecting a Security System
5.3 Selecting a Vendor or Supplier
5.4 System Installation
5.5 Turn-On Period
5.6 System Testing, Evaluation, and Validation
5.7 Policies and Procedures
Chapter 6. Physical Security Resources
6.1 Introduction
6.2 Internal Resources
6.3 External Resources
6.4 Educational Resources
6.5 Publications
6.6 Professional Organizations
6.7 Professional Certification
About the Contributing Editor
About Elsevier’s Security Executive Council Risk Management Portfolio
Product details
- No. of pages: 160
- Language: English
- Copyright: © Elsevier 2013
- Published: September 23, 2013
- Imprint: Elsevier
- eBook ISBN: 9780124172371
- Paperback ISBN: 9780124172272
About the Editor
John Kingsley-Hefty

As a registered architect, John's strategic vision and planning reduces security costs by advancing security into the preliminary building design process. For over 35 years John has been successfully providing security and design services to diverse organizations such as 3M, Chicago Tribune Companies, and St. Jude Medical, Inc.
John’s area of expertise is physical security architecture.
Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "Physical Security Strategy and Process Playbook"