Please Wait...

Rings of Security

Effective Protection-in-depth requires progressive layers of detection and protection.

Site/Facility/Outside Air Intake

  • Physical Protection
  • CBR Agent Detection/Explosives Detection
  • Video Surveillance
  • Intrusion Detection

Building Perimeter Access

  • Physical Protection/Electronic Security Systems
  • CBR Agent Detection
  • Explosives Detection
  • Access Control
  • Visitor Management System
  • Video Surveillance/Intrusion Detection
  • X-Ray/Mag. Security Screening

Controlled Area (Limited Access Areas)

  • Physical Protection/Electronic Security Systems
  • Access Control/Biometric Authentication
  • Video Surveillance/Intrusion Detection

Protected Area (Exclusion Areas)

  • Physical Protection/Electronic Security Systems
  • CBR Agent Detection
  • CBR Agent Collective Protection (ColPro)
  • Enhanced Biometric Authentication
  • Video Surveillance/Intrusion Detection

Protection-in-depth Strategy

  • CBR agent detection/explosives detection: detect-to-protect versus detect-to-treat methodologies
  • Active monitoring and control of differential pressurization utilizing highly effective CBR agent filtration, where applicable
  • Protected area/building over-pressurization and differential pressurization control with respect to adjacent potentially contaminated areas
  • Proper systems integration with the fire alarm, life-safety, public address, building automation, electronic security, AT/FP, infrastructure support and emergency response systems
  • Emergency response/continuity of operations plans
  • Emergency response and damage mitigation plans
  • Contamination avoidance and decontamination plans
  • Periodic documented performance testing of the systems

Keys to Effective Protection-in-depth

Evaluate all site, operations, maintenance, processing, storage and destruction areas from a risk-based threat and vulnerability protection assessment perspective to categorize the areas into the following design categories / protection levels:

  • Property protection areas
  • Limited access areas
  • Exclusion areas
  • Special exclusion areas
  • Effectively build and layer all protection strategies, engineered systems and operating procedures around these design categories / protection levels, to include:
    • Physical security, electronic security, intrusion detection, and IT security systems
    • Scientific research and material control and accountability systems
    • Process control, infrastructure protection and facility support systems
    • Personnel reliability and visitor management programs
    • Document use, storage and retention policies
© 2016 KD Analytical Consulting, LLC by Federal Resources | Site Map | Contact Us