2-1
DOMAIN 2 - TASK 1
This section teaches you how to design, specify, and measure security systems that effectively mitigate risk and align with organizational goals. You'll master the art of writing clear and actionable security requirements—from concept to performance verification—based on real-world risk analysis, compliance frameworks, and strategic metrics.
Whether you're a security consultant, systems designer, facility manager, or PSP candidate, this content bridges theory and practice with methods grounded in industry best practices and standards like NFPA 730/731, ISO 31000, and ASIS PAP.
Every security requirement should be traceable to a risk-based justification. This approach ensures that systems are built with a clear understanding of:
Once gathered, this data is used to define operational, functional, and performance requirements and establish a Basis of Design (BoD)
Before selecting technologies or writing RFPs, consider:
📜 Regulatory Requirements
💵 Budgetary Constraints
🧱 Material & Construction Constraints
🔄 System Interoperability
✅ Design must be informed by constraints to ensure feasibility, maintainability, and compliance.
The 4 Ds of Security—Deter, Detect, Delay, and Deny—are fundamental principles used in the design and evaluation of physical security systems. They provide a layered defense strategy that helps security professionals protect assets by managing adversary behavior at every stage of an attack.
🔵 1. Deter
Objective: Discourage the attacker from attempting an intrusion in the first place.
How it works:
📌 Example: Warning signs about surveillance or patrols at facility entrances.
🟠 2. Detect
Objective: Identify the presence of a threat or intrusion attempt early.
How it works:
📌 Example: Motion sensor triggers an alarm when someone enters a restricted zone.
🟡 3. Delay
Objective: Slow down the attacker’s progress to allow an effective response.
How it works:
📌 Example: Reinforced doors or anti-ram barriers that buy minutes during an intrusion attempt.
🔴 4. Deny
Objective: Prevent access to the protected asset altogether.
How it works:
📌 Example: High-security vault with biometric access and 24/7 surveillance.
🔐 Summary Table
Together, the 4 Ds form a comprehensive, layered defense strategy essential for effective physical security planning.
🧱 What Is Defense in Depth?
Definition:
Defense in Depth is a security approach that uses multiple, overlapping layers of protection to safeguard people, property, information, and operations. These layers span physical barriers, electronic systems, policies, and human interventions.
🎯 Purpose
🧩 Key Layers of Defense
🧭 How It Works – Example
An intruder tries to breach a high-security building:
Even if one control fails (e.g., tailgating past a gate), other layers compensate (e.g., camera analytics and mantraps).
📘 Benefits of Defense in Depth
In summary:
Defense in Depth is about creating a resilient, multi-layered security architecture that anticipates failures and protects what matters most. It's the physical security equivalent of having seatbelts, airbags, and lane assist—not just one safeguard but many working together.
1️⃣ Operational Requirement
These describe how the system will be used and maintained on a day-to-day basis. They must reflect actual organizational workflows and staffing levels.
📌 Examples:
🧠 Poorly documented operational requirements result in system misuse or underperformance.
2️⃣ Functional Requirements
These specify what the system must do. Think features, functions, and interoperability.
🔐 Access Control
🎥 Surveillance
🔁 Integration & Redundancy
✅ Functional requirements guide vendor evaluation and ensure system relevance.
3️⃣ Performance Requirements
These define how well the system must perform, especially under load or stress.
📈 Sample Metrics:
📘 Defined In:
✅ Use real performance data from pilots or lab testing to set realistic benchmarks.
🎯 Why Metrics Matter
🧪 SMART Metrics Framework
📐 Common KPIs
🧰 ASIS Security MET Tool
The ASIS Security Metrics Evaluation Tool (Security MET) provides a framework to evaluate any metric's reliability, validity, and relevance. It helps ensure metrics:
🛠️ Design Documentation
🔄 Ongoing Operations
✅ Metrics apply at all stages—from design through maintenance—to ensure long-term value.
You've learned how to:
✅ Translate risk into actionable security requirements
✅ Draft clear operational, functional, and performance specifications
✅ Select metrics that drive improvement and budget justification
✅ Apply compliance frameworks and use tools like ASIS Security MET
✅ Think strategically about system design from concept to lifecycle support
This task sets the standard for designing security systems that perform under pressure, prove their worth, and evolve with your organization.
Let me know if you'd like the content exported as a responsive HTML page or embedded into your training portal.
© Copyright. All rights reserved.
Legal Notice | Privacy Policy
We need your consent to load the translations
We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.