2-3
Design Physical Security Systems and Project Documentation
This module equips participants with essential skills in physical security design, including understanding its phases and applying technical documentation standards such as CSI and AIA MasterSpec. Participants will learn to integrate security systems into broader building and network ecosystems while managing design deliverables within budget and schedule constraints. The module also emphasizes the use of project management tools and cost-benefit analysis for making informed, value-driven decisions.
🧭 Security Design Phases
DOMAIN 2 - TASK 3
The physical security design process mirrors traditional architecture and engineering workflows. Each phase refines the project toward clear, testable outcomes.
📌 Pre-Design / Planning Phase
- Goals: Define needs, scope, and objectives.
- Inputs: Risk assessments, regulatory requirements, infrastructure surveys, and stakeholder input.
- Outputs:
- Basis of Design (BOD): Documents the security intent, system performance criteria, and high-level scope.
- Risk profile summaries and preliminary cost/time estimates.
- Stakeholder sign-offs.
✏️ Schematic Design Phase
- Deliverables: Conceptual layouts, narrative descriptions, device counts, early camera field-of-view layouts.
- Tools:
- Block diagrams and subsystem flowcharts
- Value Engineering (VE) options to reconcile budget and scope
🛠️ Design Development (DD)
- Details: Transition from conceptual to technical.
- Includes:
- Floor plans with device-by-device layout
- Conduit and cabling pathways
- Elevation diagrams and mounting heights
- Coordination with electrical, mechanical, and architectural teams
- 📐 Construction Documents (CD): This phase is crucial as it provides the final deliverables for bidding and construction, ensuring that all necessary information is available for the successful execution of the project.Final deliverables for bidding and construction:
- Plans, elevations, risers, one-lines, and schematics
- Installation specifications
- Submittal requirements
- Testing protocols
🏗️ Bidding and Construction
- Packages issued as part of the RFP.
- Proposals are evaluated on price, compliance, qualifications, and past performance.
- Construction phase includes:
- Site inspections
- Change control process
- Installation verification and commissioning
🧾 Design Elements
🗺️ Drawings
- Floor Plans: Device locations, cabling paths, conduit runs
- Risers: Vertical connectivity between floors
- Elevations: Mounting specs and angles
- Network Diagrams: IP assignments, switch configurations, VLAN topologies
All must follow CADD/BIM standards with proper layering and symbology for each system.
🧮 Calculations
- Voltage drops across long cable runs
- Power draw on PoE and UPS circuits
- Storage capacity for video systems (based on resolution, FPS, retention)
- Sizing for cable trays, conduits, and raceways
📑 Specifications
- Acceptable products and performance criteria
- Environmental ratings (e.g., NEMA, UL, IP)
- Integration standards (e.g., ONVIF, OSDP, BACnet)
- Quality expectations and coordination with other disciplines
📂 Technical Data
- Manufacturer cut sheets
- Installation manuals
- Product certifications (FCC, NDAA, CE)
- ADA and OSHA compliance references
🧰 Specification Standards
Standardized formats ensure legal and technical clarity across trades.
📚 CSI MasterFormat (Division 28 – Electronic Safety and Security)
- 28 05 00: Common Requirements
- 28 13 00: Access Control
- 28 23 00: Video Surveillance
- 28 31 00: Intrusion Detection
🏛️ AIA MasterSpec
- Maintained by the American Institute of Architects
- Used for writing project manuals and design deliverables
🏢 Owner/Enterprise Standards
- Some organizations mandate:
- Specific platforms or integrators
- Format templates and drawing symbology
- Proprietary system requirements
These must be identified during pre-design to avoid conflicts.
🔗 Systems Integration
💡 Why It Matters
Modern security systems operate best when they share intelligence, automate responses, and reduce operational silos.
🔄 Common Integrations
- ACS ↔ Video: Video verification of badge reads or alarms
- IDS ↔ PA: Audio alerts triggered by motion or door breaches
- Analytics ↔ VMS: AI-based loitering detection or object classification
- Fire ↔ Security: Unlock doors automatically during fire alarm activation
🔌 Integration Methods
- Software-Level: APIs, SDKs, PSIM platforms for user interface unification
- Hardware-Level: Relays, dry contacts, and GPIOs for signal automation
⚠️ Integration Challenges
- Time synchronization
- Compatibility between proprietary protocols
- Firmware and licensing mismatches
- Network segmentation and cybersecurity
🔍 Commissioning and testing are essential before the final handoff.
🧑💼 Project Management Concepts
Project success depends on precise planning, documentation, and communication.
🧱 Core Concepts
- Scope Definition: Outlines boundaries of work
- WBS (Work Breakdown Structure): Breaks project into manageable units
- Change Control: Formal approval of modifications
- Communication Plan: Stakeholder updates, decision logs, and meeting cadences
👥 Stakeholders
- Security
- IT
- Facilities
- Procurement
- Human Resources
- Consultants
- Integrators
Successful projects require balancing technical needs with stakeholder priorities.
📅 Scheduling Tools
Project timelines should align with construction sequencing and resource availability.
📊 Gantt Charts
- Task-based timelines showing dependencies and durations
- Used to track milestones (30%, 60%, 90%, 100% design submissions)
🧠 PERT Charts
- Graph-based flowcharts to model dependencies and critical paths
- Helpful in visualizing risk and contingency planning
🚦 Key Milestones
- Permit applications
- Power and infrastructure readiness
- Material delivery and staging
- Functional testing and system acceptance
💰 Cost Estimation & Value Engineering
Security must be cost-justified, not just functional.
🧮 Components of Cost Estimation
- Equipment (devices, servers, accessories)
- Licensing and software
- Labor (engineering, installation, programming, training)
- Documentation and closeout packages
- Maintenance and service plans
⚖️ Value Engineering
- Swap multiple fixed cameras for a single panoramic model.
- Use IP-based access readers to eliminate panel wiring.
- Migrate DVRs to hybrid cloud VMS to reduce on-site storage costs.
📈 Cost-Benefit Tools
- TCO (Total Cost of Ownership) over 5–10 years
- ROI Formula:
- Risk Scoring: Assigns numeric values to threat reductions achieved by proposed solutions
✅ This empowers clients to make data-driven investment decisions.
✅ Summary: What You Should Know
You now understand how to:
- Navigate all phases of physical security system design
- Use CSI and AIA standards to create professional documentation
- Plan for system integration, testing, and stakeholder engagement
- Leverage Gantt/PERT charts for effective scheduling
- Present cost-effective options with TCO, ROI, and VE analyses
🎓 This task prepares you to design secure, scalable, budget-conscious systems that are aligned with real-world operational needs.
Domain 2 Task 3: System Design Principles
📐 Unlocking PSP – Domain 2, Task 3: System Design Principles
Welcome to this high-impact session of the Unlocking PSP study group! In this episode, we shift from selecting individual components to designing integrated, effective, and scalable physical security systems—a core competency for any PSP-certified professional.
Aligned with Domain 2, Task 3 of the ASIS Physical Security Professional (PSP) certification exam, this session explores how to translate security goals into functional designs and procurement-ready documents.
🧱 In This Session, You Will Learn:
✅ The phases of system design: Pre-design, schematic, development, construction, and documentation
✅ Key design elements: drawings, calculations, specifications, reviews, and technical data
✅ How to incorporate Construction Specifications Institute (CSI) standards and AIA MasterSpec guidelines
✅ Best practices in systems integration across electronic, structural, and human components
✅ Core project management principles: scope, milestones, deliverables, and risk controls
✅ Scheduling tools such as Gantt and PERT charts
✅ Cost estimation techniques and value engineering to maximize ROI
✅ How to align security designs with stakeholder needs, regulations, and future scalability
📖 This session is rooted in the ASIS PoA Manual, ensuring you’re building exam-aligned knowledge with real-world relevance.
🎯 Who Should Watch:
✅ PSP candidates preparing for Domain 2
✅ Security consultants and system designers
✅ Project managers, integrators, and engineers working in physical security
✅ Anyone responsible for turning a risk assessment into a fully documented system design
💡 This is where theory meets practice—and where physical security becomes an engineered solution.
🔔 Like, subscribe, and share this episode with colleagues pursuing PSP or involved in system design.