top of page

SECURITY IN DEPTH

​

 

Improving security starts with a good assessment program where you identify threats and vulnerabilities. Our program guides you through this assessment process where you'll gain a better understanding of the way your House of Worship (HoW) operates. While answering the assessment questions, you'll start identifying possible vulnerabilities and threats. Then you'll consider the different countermeasures to diminish the threats and ultimately reduce or even eliminate vulnerability. To do this your security plan may be designed with the "Security in Depth" concept.

The Concept of Security in Depth

Looking at the image above, you can better understand the concept of “Security in Depth”. A security plan could be designed in layers or rings of protection surrounding the things needing protection.

​

Each ring represents a certain feature within your security plan:

​

  1. For example, an outer ring (Layer 1) could be the perimeter fence or the building wall of the house of worship.

  2. The next ring (Layer 2) could then be the external  doors and windows and hardware and locking devices.

  3. A third ring (Layer 3) could be the internal walls, ceilings, doos, etc.

  4. The fourth ring (Layer 4) could be technology (Access Control / ID system for controlled or restricted areas internally and externally, with CCTV systems to monitor sensitive/critical function areas where you may have computers and storage devices with sensitive data or a safe, personnel, and other high valuable assets.

  5. The fifth ring (Layer 5) could be the internal safes, cabinets, desk and drawers, that secure documents, and other important information and assets. 

 

These layers are then integrated into a security program that includes qualified people who formulate and enforce policies and procedures - to make it work. People can provide protection as well as monitor and enforce the rules which guide these different rings of security to function in a compatible manner. Each element is to work in harmony with the others.

​

Before you consider these layers, it is essential to conduct a comprehensive security survey / vulnerability assessment:

​

  1. Determine where your valuable / critical assets are

  2. Brainstorm to identify different events that could create loss (loss events). (historical information should be gathered and reviewed)

  3. The rate of occurrence / recurrence of those events

  4. The impact or consequence on the House of Worship, if the loss events occurred

  5. Consider options available to diminish the probability of the loss events from occurring and pick the best option(s) to implement

  6. Start making estimates on the cost (if any) to budget for improvements

  7. Review the different policies and procedures currently practiced and update accordingly 

  8. If you haven't conducted a security/vulnerability assessment on you house of worship, now is the time to start.

​​

Questions? Contact us @support@surveyessentials.com

bottom of page