2-3

Design Physical Security Systems and Project Documentation

This module equips participants with essential skills in physical security design, including understanding its phases and applying technical documentation standards such as CSI and AIA MasterSpec. Participants will learn to integrate security systems into broader building and network ecosystems while managing design deliverables within budget and schedule constraints. The module also emphasizes the use of project management tools and cost-benefit analysis for making informed, value-driven decisions.

🧭 Security Design Phases

DOMAIN 2 - TASK 3

The physical security design process mirrors traditional architecture and engineering workflows. Each phase refines the project toward clear, testable outcomes.

📌 Pre-Design / Planning Phase

  • Goals: Define needs, scope, and objectives.
  • Inputs: Risk assessments, regulatory requirements, infrastructure surveys, and stakeholder input.
  • Outputs:
    • Basis of Design (BOD): Documents the security intent, system performance criteria, and high-level scope.
    • Risk profile summaries and preliminary cost/time estimates.
    • Stakeholder sign-offs.

✏️ Schematic Design Phase

  • Deliverables: Conceptual layouts, narrative descriptions, device counts, early camera field-of-view layouts.
  • Tools:
    • Block diagrams and subsystem flowcharts
    • Value Engineering (VE) options to reconcile budget and scope

🛠️ Design Development (DD)

  • Details: Transition from conceptual to technical.
  • Includes:
    • Floor plans with device-by-device layout
    • Conduit and cabling pathways
    • Elevation diagrams and mounting heights
    • Coordination with electrical, mechanical, and architectural teams
  • 📐 Construction Documents (CD): This phase is crucial as it provides the final deliverables for bidding and construction, ensuring that all necessary information is available for the successful execution of the project.Final deliverables for bidding and construction:
    • Plans, elevations, risers, one-lines, and schematics
    • Installation specifications
    • Submittal requirements
    • Testing protocols

🏗️ Bidding and Construction

  • Packages issued as part of the RFP.
  • Proposals are evaluated on price, compliance, qualifications, and past performance.
  • Construction phase includes:
    • Site inspections
    • Change control process
    • Installation verification and commissioning

🧾 Design Elements

🗺️ Drawings

  • Floor Plans: Device locations, cabling paths, conduit runs
  • Risers: Vertical connectivity between floors
  • Elevations: Mounting specs and angles
  • Network Diagrams: IP assignments, switch configurations, VLAN topologies

All must follow CADD/BIM standards with proper layering and symbology for each system.

🧮 Calculations

  • Voltage drops across long cable runs
  • Power draw on PoE and UPS circuits
  • Storage capacity for video systems (based on resolution, FPS, retention)
  • Sizing for cable trays, conduits, and raceways

📑 Specifications

  • Acceptable products and performance criteria
  • Environmental ratings (e.g., NEMA, UL, IP)
  • Integration standards (e.g., ONVIF, OSDP, BACnet)
  • Quality expectations and coordination with other disciplines

📂 Technical Data

  • Manufacturer cut sheets
  • Installation manuals
  • Product certifications (FCC, NDAA, CE)
  • ADA and OSHA compliance references

🧰 Specification Standards

Standardized formats ensure legal and technical clarity across trades.

📚 CSI MasterFormat (Division 28 – Electronic Safety and Security)

  • 28 05 00: Common Requirements
  • 28 13 00: Access Control
  • 28 23 00: Video Surveillance
  • 28 31 00: Intrusion Detection

🏛️ AIA MasterSpec

  • Maintained by the American Institute of Architects
  • Used for writing project manuals and design deliverables

🏢 Owner/Enterprise Standards

  • Some organizations mandate:
    • Specific platforms or integrators
    • Format templates and drawing symbology
    • Proprietary system requirements

These must be identified during pre-design to avoid conflicts.

🔗 Systems Integration

💡 Why It Matters

Modern security systems operate best when they share intelligence, automate responses, and reduce operational silos.

🔄 Common Integrations

  • ACS ↔ Video: Video verification of badge reads or alarms
  • IDS ↔ PA: Audio alerts triggered by motion or door breaches
  • Analytics ↔ VMS: AI-based loitering detection or object classification
  • Fire ↔ Security: Unlock doors automatically during fire alarm activation

🔌 Integration Methods

  • Software-Level: APIs, SDKs, PSIM platforms for user interface unification
  • Hardware-Level: Relays, dry contacts, and GPIOs for signal automation

⚠️ Integration Challenges

  • Time synchronization
  • Compatibility between proprietary protocols
  • Firmware and licensing mismatches
  • Network segmentation and cybersecurity

🔍 Commissioning and testing are essential before the final handoff.

🧑‍💼 Project Management Concepts

Project success depends on precise planning, documentation, and communication.

🧱 Core Concepts

  • Scope Definition: Outlines boundaries of work
  • WBS (Work Breakdown Structure): Breaks project into manageable units
  • Change Control: Formal approval of modifications
  • Communication Plan: Stakeholder updates, decision logs, and meeting cadences

👥 Stakeholders

  • Security
  • IT
  • Facilities
  • Procurement
  • Human Resources
  • Consultants
  • Integrators

Successful projects require balancing technical needs with stakeholder priorities.

📅 Scheduling Tools

Project timelines should align with construction sequencing and resource availability.

📊 Gantt Charts

  • Task-based timelines showing dependencies and durations
  • Used to track milestones (30%, 60%, 90%, 100% design submissions)

🧠 PERT Charts

  • Graph-based flowcharts to model dependencies and critical paths
  • Helpful in visualizing risk and contingency planning

🚦 Key Milestones

  • Permit applications
  • Power and infrastructure readiness
  • Material delivery and staging
  • Functional testing and system acceptance

💰 Cost Estimation & Value Engineering

Security must be cost-justified, not just functional.

🧮 Components of Cost Estimation

  • Equipment (devices, servers, accessories)
  • Licensing and software
  • Labor (engineering, installation, programming, training)
  • Documentation and closeout packages
  • Maintenance and service plans

⚖️ Value Engineering

  • Swap multiple fixed cameras for a single panoramic model.
  • Use IP-based access readers to eliminate panel wiring.
  • Migrate DVRs to hybrid cloud VMS to reduce on-site storage costs.

📈 Cost-Benefit Tools

  • TCO (Total Cost of Ownership) over 5–10 years
  • ROI Formula:
  • Risk Scoring: Assigns numeric values to threat reductions achieved by proposed solutions

✅ This empowers clients to make data-driven investment decisions.

✅ Summary: What You Should Know

You now understand how to:

  • Navigate all phases of physical security system design
  • Use CSI and AIA standards to create professional documentation
  • Plan for system integration, testing, and stakeholder engagement
  • Leverage Gantt/PERT charts for effective scheduling
  • Present cost-effective options with TCO, ROI, and VE analyses

🎓 This task prepares you to design secure, scalable, budget-conscious systems that are aligned with real-world operational needs.

© Copyright. All rights reserved.
Legal Notice | Privacy Policy 

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.