Determine Appropriate Physical Security Countermeasures
2-2
DOMAIN 2 - TASK 2
In this module, learners will explore the full spectrum of physical security countermeasures—from structural and electronic protections to advanced data, network, and power resilience. Mastering this task will prepare you to design, recommend, and implement the most appropriate defenses for diverse facilities and risk profiles.
🧱 Structural Security Measures: The Foundation of Physical Protection
In the realm of physical security, structure is strategy. While access control systems and surveillance technology dominate modern discussions, structural security measures remain the backbone of any truly resilient protection plan.
This section explores the essential elements of structural security—barriers, containers, locks, and lighting—based on ASIS International’s Protection of Assets (PoA) and provides practical insights for physical security professionals preparing for the PSP® certification or involved in critical infrastructure protection.
🛡️ What Is Structural Security?
Structural security encompasses the built environment and physical barriers designed to deter, delay, and deny unauthorized access to assets, people, and information. These include:
- Walls, doors, and windows
- Fences and barriers
- Safes and vaults
- Locking mechanisms
- Security lighting
These elements work in harmony with electronic security systems and human response forces to form a layered defense strategy.
🚧 Barriers: The First Line of Defense
🔲 General Principles
Barriers, whether natural (terrain) or man-made (walls, doors, fences), serve as obstacles to movement. In security design, the effectiveness of a barrier system is only as strong as its weakest link. Understanding the structural resistance of each component is vital.
🧱 Walls
Reinforced concrete remains the gold standard for delaying forced entry and blast effects. Security enhancements include:
- Increased wall thickness
- Closely spaced rebar (e.g., No. 5–No. 8 bars)
- Multiple layers of concrete walls for extended delay
Common wall types include concrete block, precast concrete panels, sheet metal, and wood-frame structures.
🚪 Doors
Doors often represent the most vulnerable barrier point due to functional demands. A balanced design requires door assemblies (frame, hinges, lock) to match the wall’s delay characteristics.
Door enhancements may include:
- Steel plating and high-security locks
- Grouting frames with concrete
- Removal of unnecessary external hardware
- Panic bars with delay egress (30–45 seconds), which comply with life safety codes
🪟 Windows and Other Openings
Without enhancements, windows provide minimal delay to intruders. Security glass options include:
Window films, bars, and security shutters enhance protection. Other critical openings—vents, ducts, and tunnels—should be minimized or protected with sensors and barriers.
🏦 Containers and Vaults: Securing High-Value Assets
🔐 Safes
Selecting the correct safe depends on whether the goal is fire protection, theft resistance, or both.
🧾 UL Ratings for Burglary Protection:
- TL-15 / TL-30 / TL-30X6: Indicates resistance time in minutes with standardized tools
- TRTL60X6: Highest rating—resists torch, explosives, and tools on all six sides
🔥 UL Ratings for Fire Protection:
- Class 350: Paper protection
- Class 150: Magnetic media (tapes, disks)
- Class 125: Digital data (hard drives, flash media)
Note: Magnetic media can be destroyed above 150°F; digital media at 125°F.
Net Working Time is the measured time a safe resists a skilled attack, but real-world breach time may vary significantly.
🧱 Vaults
Vaults are engineered spaces designed to provide a higher level of protection. They fall into two categories:
- Fire-Resistive Vaults: Built to NFPA 232 standards
- Forced Entry Vaults: Reinforced concrete with steel rebar, equal resistance on all six sides
Design Considerations:
- Avoid placing vaults in exterior walls or below grade
- Use internal surveillance and alarm systems to monitor breach attempts
- Apply the “safe within a safe” concept for storing sensitive data
Standards for media storage include UL 72, NFPA 75, and ANSI IT9.11.
🧷 Locks and Locking Mechanisms
Locks are essential to securing movable portions of barriers (doors, gates, containers). They must be selected based on application and resistance level.
🛠️ Mechanical Locks
Common vulnerabilities include picking, impression attacks, and manipulation.
⚡ Electrified Locks
Electromechanical locks allow remote control and integration with access control systems.
- Fail Safe: Unlocks on power failure (used on emergency exits)
- Fail Secure: Remains locked when power is lost (used for secured areas)
Locks must meet fire code compliance, especially for egress routes. Electrified hardware must be fire-rated when used on rated doors.
💡 Lighting: Visibility Is Security
Lighting serves both deterrent and detection functions. It aids surveillance systems and human observers.
💡 Lamp Types
💡 Lamp Types - Pros & Cons
💡 Lighting Equipment Types
💡Challenges and Issues:
- Ineffective Lighting:
- Severe contrasts between light and shadow can disorient surveillance (human or electronic).
- Poor lighting can facilitate intruders' attempts to hide or evade detection.
- Inappropriate lighting can make security officers or other response forces more visible and vulnerable.
- Too Much Lighting:
- Glare caused by excess lighting can blind security officers or response forces.
- Imbalance between exterior and interior lighting can permit undesired visibility into a facility from the outside.
- Over lighting can create blind spots or "white out" for security cameras.
- Increased contrast between light and shadow can impede effective observation
- Contrast is a critical concept; a well-lit complex in a remote area might appear dim if adjacent to an extremely brightly lit neighbor (e.g., a car dealership). Therefore, lower lighting levels might be suitable for remote areas.
- Glare Management:
- Intentional glare can be used to inhibit an intruder's vision by aiming luminaires away from the property.
- Care must be taken to ensure intentional glare does not inhibit cameras or security personnel or disrupt legitimate activity.
- Unwanted glare can be minimized by increasing fixture mounting heights and using steeper aiming angles.
- Light Pollution and Light Trespass:
- Light spillage: Light that overshoots its intended area.
- Light trespass: Light spillage that extends onto a neighbor's property, interfering with activities and potentially leading to hostility or lawsuits.
- Beam Direction (shape and coverage):
- Affected by lamp type, luminaire design, mounting technique, location, and environmental conditions.
- Poor beam direction (e.g., lighting straight down) may only illuminate a small area, leaving larger spaces dark.
- Appropriate beam overlap and avoiding coverage gaps are crucial for both pole-mounted and wall-pack lighting units.
- A rule of thumb recommends a spacing between poles of twice the mast height for proper overlap, though this can vary.
💡Characteristics of Light and Lighting:
The quantity of light refers to the overall amount of light a fixture produces. In contrast, light level (or illuminance) describes how much of that light actually reaches and illuminates a target surface. For adequate security, it's not just about brightness—it's about delivering the right amount of light to the right place.
Foot-candles (fc) and lux are both units used to measure illuminance, which is the concentration of light over a particular area. The primary difference lies in the measurement system they belong to:
- Foot-candles (fc) are English units.
- They represent the number of lumens per square foot.
- Lux are metric units.
- They represent the number of lumens per square meter.
To provide a conversion, one foot-candle is equal to 10.76 lux, though this is often approximated to a ratio of 1:10.
- Reflectance
- The ratio of light falling on an object to the light being reflected from it, expressed as a percentage.
When evaluating the amount of light needed for a video surveillance camera or the human eye to perceive a scene, the illuminance (measured in fc or lux) over the area of the lens iris is critical.
- Corrected Color Temperature (CCT):
- A measure of the warmth or coolness of a light, measured in degrees Kelvin (°K).
- ~2,700°K is red hot (perceived as warm); ~4,100°K is white hot (neutral); ~5,000°K is blue hot (cool/daylight).
- Has a considerable impact on mood and ambiance.
- Color Rendition Index (CRI):
- Measures a lamp's ability to discriminate, grade, and faithfully reproduce colors.
- Scale from 0 to 100: 70-80 is good, >80 is excellent, 100 is daylight.
- Low CRI lamps (e.g., high- and low-pressure sodium, mercury vapor) should not be used with color cameras or where color identification is critical, as they can distort colors.
- High CRI increases visual clarity, morale, and productivity, and makes pedestrians feel safer outdoors at night.
- Brightness: The perception of the amount of light that reaches a person's eyes.
🎥 Illumination for Surveillance
Cameras require specific light levels:
- Color Cameras: Need 2x more light than monochrome
- Infrared (IR): Useful for covert monitoring, monochrome imaging
- CRI & CCT: Essential for image clarity and color accuracy
Recommended Light Levels (Foot-candles):
- Lighting standards vary by agency (IES, NRC, DOAFM)
- Perimeter: 0.2–0.5 fc
- Open lots: 0.2–2.0 fc
- Entrances: 5–10 fc
- Interiors: 10–70 fc
- ATMs, teller counters: up to 50–70 fc
Always consult reliable references, such as IES and NRC, as well as industry vendors like GE, Philips, and Sylvania, for guidance.
💡Lighting System Components
A lighting system consists of several essential components:
- Lamp (Light Bulb):
- The manufactured light source, including the filament/arc tube, glass casing, and electrical connectors.
- Types (e.g., incandescent, mercury vapor) describe the technologies used to create light.
- Luminaire (Fixture):
- The complete lighting unit, comprising the lamp, its holder, and reflectors/diffusers to distribute and focus light.
- A fixture contains means of connecting to the power source and may include ballasts (for correct voltage/current) and photosensors (for light control based on ambient conditions).
- Selection depends on both performance characteristics and aesthetics.
- In industrial settings, luminaires should include a secondary restraint (e.g., metal cable) if vibration is a concern, for safety.
- Mounting Hardware:
- Examples include wall brackets or light poles, used to fix the luminaire at the correct height and location.
- Electrical Power:
- Operates the lamp, ballasts, and photocells.
- Some lamp technologies, particularly high-intensity discharge (HID) lamps, are sensitive to reduced voltages, as they rely on an arc discharge.
- If the supply voltage is sufficiently reduced, the arc can be extinguished, and restart times can be lengthy (up to 20 minutes).
- Backup batteries, generators, and uninterruptible power supply (UPS) systems should be considered for high-security and high-safety areas (e.g., vaults, cash registers, emergency egress paths) to ensure continuous lighting.
💡Economic Considerations
Cost is a significant factor in determining the level of security lighting.
While codes or regulations mandate some lighting, elective security lighting needs to be justified by identifiable savings or quantifiable risk reduction.
- Typical Lighting Operating Costs:
- Energy: Approximately 88% of the total operating cost.
- Capital items (lamps and ballasts): Approximately 8%.
- Maintenance: Approximately 4%.
- Energy Efficiency (Efficacy):
- The most critical cost factor.
- Measured by a lamp's output in lumens divided by its power draw in watts.
- Replacement Lamps:
- The next highest cost, varying by lamp technology and quality.
- Maintenance Costs:
- Includes labor to replace lamps and clean them.
- Lumen output declines due to dirt accumulation (3-4% annually in clean environments, up to 20% in dirty environments after one year).
- Regular cleaning is essential to maintain the designed light output, as power consumption remains the same regardless of dirt.
- Lamp performance generally declines with age, producing only 80% of designed output by the end of their rated life, even when clean.
- Planned Replacement:
- More economical to perform a planned replacement of all or a group of lamps rather than waiting for individual failures.
- Ensures there are no dark areas, even for a short time, due to individual failures.
- Economically sensible to time re-lamping with cleaning cycles (e.g., replace all lamps every three cleaning cycles if average life is six years and cleaning is every two).
- Number of Luminaires Required:
- A function of the area to be covered, required light levels, luminaire height and design, and lighting technology used.
- Uniformity of Light Distribution:
- Achieving uniform light distribution, especially outdoors, can be expensive.
- Measured as the ratio between the average light level and the minimum light level.
- Typical ratios: 1:0.7 for working environments, 4:1 on a pedestrian walkway, and 10:1 on a roadway.
- Higher uniformity provides better depth perception and a greater perception of security
⚡Lighting Relighting & Startup
🧠 Electronic Security Systems
🌳 Crime Prevention Through Environmental Design (CPTED)
🔒 Cybersecurity & Network Considerations
Because ESS operate over IP networks, they require robust cyber hygiene:
- VLAN separation from the business network
- Encryption of stored/transmitted data
- Firewalls and endpoint protections
- Password policies and user audits
- Firmware updates and patch management
📘 Standard: NIST Cybersecurity Framework, UL 2900, IEC 62443
🧾 Compliance & Regulatory Considerations
- HIPAA: Healthcare video and access logs
- PCI-DSS: Surveillance for cardholder data zones
- FISMA/NERC/CIP: Critical infrastructure protection
- GDPR/CCPA: Video storage and data subject rights
👮♂️ Security Staffing
🧑✈️ Roles
- Officers: Patrol, enforce policies, and respond to incidents.
- Technicians: Install and maintain hardware and software.
- Supervisors: Coordinate shift operations, reporting, and SOP adherence.
🧭 Best Practices
- Train staff in ethics, use of force, emergency response, and incident documentation.
- Use guard tour systems and mobile apps to validate patrol patterns.
Crime Prevention Through Environmental Design (CPTED) is a multidisciplinary approach to deterring criminal behavior. It involves designing the physical environment to encourage natural surveillance, controlled access, and a sense of ownership.
CPTED is based on the idea that the design, maintenance, and use of space can influence how people behave and how safe they feel—both of which affect the likelihood of crime.
🧩 Core Principles of CPTED (1st Generation)
👁️ 1. Natural Surveillance
Encourages visibility of public and private spaces to increase the risk perception for offenders.
Examples:
- Strategic lighting
- Unobstructed windows and sightlines
- Placement of walkways near buildings
- Avoidance of blind spots and dark alleys
🚧 2. Natural Access Control
Controls how people enter and move through a space using structural elements and cues.
Examples:
- Fences, gates, and curbs
- Defined entrances and exits
- Pathways that guide foot traffic
- Landscaping that channels movement
🏷️ 3. Territorial Reinforcement
Establishes a sense of ownership, clarifying who controls the space and discouraging illegitimate use.
Examples:
- Signage (e.g., "Private Property," "Monitored by CCTV")
- Decorative fences, pavement changes, or hedges
- Community murals or maintained gardens
🧹 4. Maintenance (Image)
Well-maintained environments signal that people care and are watching, which deters criminal activity (related to the Broken Windows Theory).
Examples:
- Removing graffiti quickly
- Keeping lighting functional
- Landscaping upkeep
- Prompt repair of damaged structures
🧠 Advanced CPTED Principles
2nd Generation CPTED
Adds social cohesion as a crime prevention factor:
- Community engagement
- Trust-building
- Social programming and activities
3rd Generation CPTED
Focuses on sustainability, resilience, and public health in urban planning:
- Mixed-use developments
- Green spaces and wellness design
- Climate-conscious architecture
🏙️ Where CPTED Is Used
- Schools and universities
- Retail centers and corporate campuses
- Urban design and municipal planning
- Healthcare facilities
- Critical infrastructure
📘 Relevant Standards and Guidelines
- ASIS Guidelines on CPTED
- NFPA 730: Premises Security
- National Institute of Crime Prevention (NICP) best practices
- ISO 22341: Security and resilience — CPTED
✅ Benefits of CPTED
🔑 Summary
CPTED turns passive design choices into powerful security tools. Shaping how people move, interact, and observe one another in a space creates natural, cost-effective crime deterrence.
It works best when implemented early in the design process but can also enhance existing environments through thoughtful retrofits.
Electronic Security Systems (ESS) are technology-based solutions that detect, monitor, control, and respond to real-time security events. These systems complement structural and procedural security measures by automating detection, improving situational awareness, and enabling rapid response.
🔌 What Are Electronic Security Systems?
Electronic Security Systems are integrated technological components designed to protect people, property, and information through detection, access control, surveillance, communication, and alarm notification.
They are central to modern risk mitigation strategies and essential for compliance with security regulations and industry best practices.
📦 Core Components of Electronic Security Systems
🔐 Access Control Systems (ACS)
Control who is allowed to enter or exit a facility or specific area.
🧰 Common Components:
- Credentials: Cards, PINs, mobile devices, biometrics
- Readers: Card readers, fingerprint scanners, facial recognition
- Controllers: Manage door logic, schedules, and permissions
- Locks: Electromagnetic, electric strike, electrified mortise/cylindrical
🔗 Advanced Features:
- Multi-factor authentication
- Integration with HR or visitor systems
- Tailgating Detection
- Temporary or time-restricted access
📘 Standard: SIA OSDP for secure device communication
🎥 Video Surveillance Systems (VSS)
Provide visual monitoring of critical areas for detection, investigation, and deterrence.
🧰 Common Components:
- Cameras: Fixed, PTZ, 360°, thermal, panoramic
- Video Management System (VMS): Software for live viewing, recording, and playback
- Storage: NVR/DVRs or cloud-based retention
- Analytics: Object tracking, license plate recognition (LPR), facial recognition
🔗 Applications:
- Perimeter monitoring
- Evidence collection
- Integration with alarms or access events
- Real-time alerts for loitering, motion, or intrusion
📘 Standard: ONVIF for interoperability
🚨 Intrusion Detection Systems (IDS)
Detect unauthorized access or movement within or around a facility.
🧰 Sensor Types:
- Passive Infrared (PIR)
- Magnetic door/window contacts
- Glass-break detectors
- Motion detection via radar, microwave, or LIDAR
- Fiber optic or taut wire sensors for fence detection
🔗 Features:
- Zoning and partitioning
- Silent alarms for duress
- Integration with monitoring stations or SOCs
- Redundant signaling (IP + cellular)
📡 Communications Systems
Enable security personnel to coordinate, alert, and respond.
📞 Types:
- Two-way Radios: Encrypted with GPS tracking
- Intercoms: Audio or video-based for access points
- Mass Notification Systems (MNS): For emergencies via SMS, PA, sirens
- IP Audio Systems: Network-based paging or alert systems
🔗 Applications:
- Evacuation announcements
- Situational updates to guards
- Public information delivery
🖥️ Command and Control Interfaces
Centralize monitoring, response, and system health visibility.
🧠 Features:
- Security Operation Centers (SOC) with video walls
- Unified dashboards with ACS, IDS, and VSS data
- Event correlation and automated workflows
- Mobile access for real-time decisions
📘 Compliance: UL 827 for central station monitoring
🔁 Integration Capabilities
Modern ESS is designed to integrate seamlessly:
✅ Benefits of Electronic Security Systems
🔑 Summary
Electronic Security Systems are essential for:
- Automating protection and reducing human error
- Responding quickly and intelligently to threats
- Documenting security activity and proving compliance
- Integrating with broader enterprise security architecture
They form the active backbone of a comprehensive security strategy—especially when combined with structural and procedural controls.
🚚 Personnel, Package, and Vehicle Screening
🧍 Personnel
- Includes metal detectors, biometric checks, and ID validation.
- Incidents of denial must trigger response protocols.
📦 Packages
- Screened with X-rays, ETD (explosive trace detection), or manual inspection.
🚗 Vehicles
- Leverage UVIS, barriers, mirrors, and LPRs to inspect and log entry.
📢 Emergency Notification Systems
- Mass Notification Systems (MNS): Push SMS, app, and email alerts.
- PA Systems: Deliver real-time instructions.
- Two-Way Intercoms: Allow user-initiated distress signals from elevators or garages.
🔗 Integration
- Tied into fire panels, access control, and VMS for synchronized response.
💾 Principles of Data Storage and Management
☁️ Storage Models
- Cloud-based: Scalable with off-site redundancy, requires encryption and access policies.
- On-premises: NVRs/DVRs offer local control but require UPS and RAID systems.
🔐 Compliance
- Adhere to HIPAA, GDPR, CCPA, TSA, or industry-specific rules.
- Protect PII with encryption, access logs, and tiered permissions.
🌐 Network Infrastructure and Physical Network Security
- LAN/WAN/VPN configurations support site interconnectivity and secure access.
- Use VLANs and firewalls to segment security networks from business traffic.
- Protect patch panels and IDFs with locked enclosures.
🧰 Best Practices
- Use static IPs for servers/NVRs, encrypt data in transit and at rest, and apply multigigabit architecture where high bandwidth is required.
🎙️ Security Audio Communications
- Radios: Digital, encrypted with GPS or PTT over cellular.
- Intercoms: Audio/video-enabled, integrated with access control.
- PA & IP Audio: Deliver zoned announcements integrated with emergency systems.
🔄 Resilience
- Include redundant lines, encrypted channels, and compliance with FCC if applicable.
🖥️ Systems Monitoring and Display
- Security Operation Centers (SOCs) feature VMS, IDS, and ACS integrations with ergonomic workstations and 24/7 monitoring.
- Central Monitoring Stations (CMS) provide off-site support for multi-location security with UL 827 compliance.
⚡ Power Systems (Primary and Backup)
- UPS for short-term outages; generators for extended runtimes.
- Solar/wind for remote sites must still integrate with surge protection and maintenance SOPs.
- Calculate runtime needs and establish load prioritization.
📡 Signal and Data Transmission
- Use fiber optics for high-security or long distances.
- Wireless options (Wi-Fi, RF, microwave) are flexible but must be encrypted (WPA3+).
- Redundancy with dual-path (IP + LTE) is critical for reliability.
🧾 Visitor and Vendor Management
- Enforce pre-registration, ID checks, and access level assignments.
- Escort policies, badge printing, and electronic logs ensure accountability.
- Integrate VMS with access control and HR systems.