- Identify a team of internal employees and/or external consultants who will build the physical security program through the following steps.
- Carry out a risk analysis to identify the vulnerabilities and threats and to calculate the business impact of each threat.
- Identify regulatory and legal requirements that the organization must meet and maintain.
- Work with management to define and acceptable risk level for the physical security program.
- Derive the required performance baseline from the acceptable risk level.
- Create countermeasure performance baseline from the acceptable rick level.
- Create countermeasure performance metrics.
- Develop criteria from the results of the analysis, outlining the level of protection and performance required for the following categories of the security program:
- Deterrence
- Delaying
- Detection
- Assessment
- Response
- Identify and implement countermeasures for each program category
- Continuously evaluate countermeasures against the set baselines to ensure the acceptable risk level is not exceeded.
Tuesday, September 23, 2014
Chapter 5: Steps to take before a physical security program can be rolled out
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment