Rings of Security
Effective Protection-in-depth requires progressive layers of detection and protection.
Site/Facility/Outside Air Intake
- Physical Protection
- CBR Agent Detection/Explosives Detection
- Video Surveillance
- Intrusion Detection
Building Perimeter Access
- Physical Protection/Electronic Security Systems
- CBR Agent Detection
- Explosives Detection
- Access Control
- Visitor Management System
- Video Surveillance/Intrusion Detection
- X-Ray/Mag. Security Screening
Controlled Area (Limited Access Areas)
- Physical Protection/Electronic Security Systems
- Access Control/Biometric Authentication
- Video Surveillance/Intrusion Detection
Protected Area (Exclusion Areas)
- Physical Protection/Electronic Security Systems
- CBR Agent Detection
- CBR Agent Collective Protection (ColPro)
- Enhanced Biometric Authentication
- Video Surveillance/Intrusion Detection
Protection-in-depth Strategy
- CBR agent detection/explosives detection: detect-to-protect versus detect-to-treat methodologies
- Active monitoring and control of differential pressurization utilizing highly effective CBR agent filtration, where applicable
- Protected area/building over-pressurization and differential pressurization control with respect to adjacent potentially contaminated areas
- Proper systems integration with the fire alarm, life-safety, public address, building automation, electronic security, AT/FP, infrastructure support and emergency response systems
- Emergency response/continuity of operations plans
- Emergency response and damage mitigation plans
- Contamination avoidance and decontamination plans
- Periodic documented performance testing of the systems
Keys to Effective Protection-in-depth
Evaluate all site, operations, maintenance, processing, storage and destruction areas from a risk-based threat and vulnerability protection assessment perspective to categorize the areas into the following design categories / protection levels:
- Property protection areas
- Limited access areas
- Exclusion areas
- Special exclusion areas
- Effectively build and layer all protection strategies, engineered systems and operating procedures around these design categories / protection levels, to include:
- Physical security, electronic security, intrusion detection, and IT security systems
- Scientific research and material control and accountability systems
- Process control, infrastructure protection and facility support systems
- Personnel reliability and visitor management programs
- Document use, storage and retention policies