1-3
Understanding and evaluating threats and hazards is foundational in physical security risk management. This task involves identifying the types of threats, assessing their likelihood and severity, and analyzing the broader operational and environmental context in which these threats may manifest. The ultimate goal is to develop a risk profile that informs the development and prioritization of mitigation strategies.
DOMAIN 1 - TASK 3
Severity reflects the magnitude of potential harm, while likelihood addresses the probability of occurrence. Various models exist:
Sources of Data:
Analyzing the Operating Environment
Understanding the operating environment is critical to accurate threat modeling.
A. Physical Environment
B. Logical Environment
C. Nonphysical (Organizational) Environment
These environmental variables directly influence an organization's exposure and vulnerability to specific threats.
A facility's security is affected by adjacent or related organizations' operations and security posture.
Neighboring Entities
Competitors
Supply Chain Partners
Example: A contractor using a default password on a networked HVAC system could allow cybercriminals to pivot into a secure facility zone.
Risk isn’t only driven by physical or cyber threats. Broader organizational risks play a role:
Risk is the result of a threat exploiting a vulnerability. Two key questions to assess:
This concept aligns with the Four Ds of security: Deter, Detect, Delay, and Deny, which form the foundation of all countermeasure planning
A common model for evaluating risk incorporates the following:
Risk = Threat × Vulnerability × Impact
Each component is rated or scored to calculate an overall risk value. Using tools such as heat maps or risk matrices can help visualize risk levels and assist in prioritizing mitigation strategies.
Risk assessment should be tightly integrated with the design and management of the physical protection system (PPS). This includes:
PSP candidates must articulate not just the threats but how they interact with vulnerabilities and environmental factors to produce risk and how these risks shape protection strategies. Remember, a threat without a vulnerability does not constitute a risk, and a well-defended asset may render even a high-threat actor ineffective.
© Copyright. All rights reserved.
Legal Notice | Privacy Policy
We need your consent to load the translations
We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.