likelihood descriptors - safeguard aeo aeo template.docx · web viewthe threat & vulnerability...

29
Name of Site Security Threat Risk Assessment

Upload: others

Post on 13-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Name of Site

Security Threat Risk Assessment

Page 2: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Name of Site

Security Threat Risk Assessment(STRA)

V1.1

Date

2

Page 3: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

TABLE OF CONTENTS

LIMITATIONS OF DISCLOSURE & USE 4

DISTRIBUTION 4

COMMERCIAL IN CONFIDENCE 4

EXECUTIVE SUMMARY 5

AIM 6

STAKE HOLDER ENGAGEMENT 7

SITE DESCRIPTION 8

SECURITY THREAT RISK ASSESSMENT (STRA) 9

INTRODUCTIONPROCESSTHE THREATSCRIME STATISTICS (Southwark) 11INTENT AND CAPABILITY 12ASSOCIATED HAZARDS 13RISK 14LIKELIHOOD DESCRIPTORSIMPACT DESCRIPTORS 17MEASURING/SCORING RISK 20RISK SCORING Name of Site 21PROTECTIVE SECURITY INFLUENCES 25

KEY POINTS - PROTECTIVE SECURITY INFLUENCERS 26

AREAS OF VULNERABILITY 28

ANNEX A 33

3

Page 4: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

LIMITATIONS ON DISCLOSURE AND USE

This document contains information that is Confidential.  It may also be Client privileged and/or work product privileged.  It is for the exclusive use of the intended recipient(s).  If you are not the intended recipient(s), or the person responsible for delivering it to the intended recipient(s), please note that any form of dissemination, distribution or copying of this document is strictly prohibited and may be unlawful.

We recommend that special precautions be taken to protect the confidentiality of the information contained within this paper. We have securely retained a copy for future reference. All subsequent copies will be delivered if required to the appropriate representative.

DISTRIBUTION LIST

Version Recipient Date/MethodV1.1V1.1V1.1V1.1

COMMERCIAL IN CONFIDENCEThis report has been identified as ‘Commercial in Confidence’. The recipients of this document should hold all information presented within, as confidential and agree not to use or disclose, or allow to use or disclose any of the said information to unauthorised parties, directly or indirectly, irrespective of the acceptance or rejection of the presentation or at any time before, during or after an agreement has been reached, without prior written consent of the author.

4

Page 5: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

EXECUTIVE SUMMARY

Write a brief executive summary of the results of your STRA.

AIM

The aim of this STRA…

STAKE HOLDER ENGAGEMENT

Police, local business…

SITE DESCRIPTION

Provide a detailed description of your site, to include pedestrian and vehicle access and daily business functions.

5

Page 6: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

SECURITY, THREAT, RISK ASSESSMENT (STRA)This section enables you to have a better understanding of the treats you may face as a business.

Introduction

The information and guidance within this Security Needs Assessment (SNA) is based on the observations made of the business and the background analysis conducted as part of the process. A fundamental part of identifying security needs is to have a clarity of understanding relating to the threats and associated hazards and risks that have the potential to impact on any organisation, development, building or location. This section will provide information relating to the likely human threats and associated hazards and risks that can have a negative impact on the development at NAME OF SITE and provide an understanding of the measurement of the security related risks.

Process

The process used to achieve an understanding of the threats and risks to the security of the development and location is:

Once this has been achieved, a more informed decision can be made in identifying counter measures and methods of managing and controlling the risk and associated vulnerabilities.

Identifying the threat

6

Identify Threats

Identify Level of Risk

Identify Likelihood &

Impact

Identify Hazards

Identify Intent &

Capability

Identify Attraction

Page 7: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

The identification of the threats to security forms a key part of the overall assessment of the security needs or requirement and is based on:

● The historic and current Intelligence picture

● Analysis and ‘horizon’ scanning

● The local environment and crime trends and statistics

● The profile of the tenants, development and location

● Experience

The Threats

Listed below are the threats that have been identified that could have the intent and capability to impact on this development:

● International Terrorism

● Domestic Extremism

● Organised Crime

● Opportunist Crime

● Civil Unrest or Disorder

● Disturbed or Fixated individuals

● Force Majeure events

● Nuisance Attenders

Understanding each of the identified threats is an important aspect of being able to assess their intentions and capability relating to the tenants, development or location. Each threat type can be defined as:

TerrorismA threat or action from an individual or group designed to advance a political, ideological or religious cause that, through their actions, cause fear, harm to people, create significant disruption to our way of life and the damage or destruction of critical social and commercial infrastructure. The current UK terrorism threat level is ‘Severe’ An attack is highly likely.

Domestic ExtremismAn individual or group that may seek to change legislation or domestic policies outside of the democratic process, who may use criminal actions to raise awareness of their cause, create disruption to our way of life and cause damage or destruction of social and commercial infrastructure. They also have the ability to cause harm to people.

Organised Crime

7

Page 8: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Organised crime can be defined as serious crime planned, coordinated and conducted by people working together on a continuing basis. Their motivation is often, but not always, financial gain. Organised criminals working together for a particular criminal activity or activities are called an organised crime group.

Opportunist CrimeOpportunist crime can be defined as criminal activity conducted by individuals who either; spend their time seeking out opportunities to exploit or people who may make a decision to exploit an opportunity when presented with it.

Civil UnrestCivil unrest, also known as civil disorder, is a broad term that is typically used by law enforcement to describe unrest that is caused by a group of people that may gather to protest, complain or demonstrate against a significant issue, law or policy. This may then create A state of dissatisfaction, disturbance, and agitation, typically resulting in angry confrontation, violence, the disruption of services and the damage or destruction of property or infrastructure.

Disturbed or Fixated IndividualsA person who may act in an out of character, socially unacceptable or criminal manner due to mental health issues that could result in them causing fear through unwanted attention to an individual or group or potentially causing harm to people or the disruption of services or even the damaged and destruction of property.

Force MajeureForce Majeure covers a range of unplanned for events such as; civil or state war, large-scale environmental events (acts of god) and major changes to government policy that could trigger civil disorder or a Coup d'état.

Nuisance Attenders

People with no business there that may be drawn to your location because of the building design or landscaping features for recreational purposes or to make use of areas within the perimeter that offer shelter from the weather or from view. They may also use the location if it is a prominent feature that can be used as a meeting point.

Crime Statistics for NAME OF SITE and immediate area

(visit https://www.police.uk tp gather information on reported crime in your area. Simply type your postcode in the search field and the relevant crime data will be gathered. Below is an

8

Page 9: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

example of how to present those findings)

A search of police crime data for the immediate area around NAME OF SITE, as shown in the map here, indicates that the most prominent crimes are related to various forms of theft, anti-social behaviour and bicycle theft.

In comparison to many parts of central London, certain crimes are lower than average.

Anti-social behavior, as expected, was higher during July and August and whilst assumed, it is most likely the result of the warm summer and alcohol related.

Bicycle theft is the third highest crime; however, cycle storage is incorporated within the design of the new building.

A comparison has also been made using the same size search area, but on the northern bank of the River Thames (immediately opposite) which has resulted in 100 more crimes, a third more.

Crime statistics for NAME OF SITE and immediate area from October 2017 to September 2018. (218 reported crimes)

It

important to note that the above statistics have been obtained through the police open source website and there is high possibility that these figures are lower than the actual crime rate within the area. It is often common for a high volume of crime to go unreported or recorded incorrectly such as ‘Ram Raiding’ being recorded as ‘Other Theft’.

Any potential threat or risk to the occupants and visitors to NAME OF SITE would most likely materialise in the environment in the immediate area around the location. It is more likely that a tenant or visitor will experience a criminal act either on the way to or coming from the address. It would be prudent to regularly inform the occupants on NAME OF SITE of the current crime trends so that mitigation measures can be taken. As bicycle theft is prevalent, occupants should be encouraged to use the cycle store at all times. It is advised that the future security lead or head of security initiates and maintains regular liaison with the local

9

Page 10: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

police crime prevention officer and utilises the many business information networks available such as the Cross Sector and Safety Communication network.

Intent & CapabilityThis section will aide you in understanding what could be a threat and the form it may take.

In order to understand the threats that could be faced from a security perspective it is important to understand each of the threats intentions and overall capability based on historical and current intelligence, crime reports and experience. This allows for each identified threat to be accepted as a source of ‘credible’ risk to security.

Intent and capability fall within the influence and control of each threat type. The tenants or building owners or management team can influence the opportunities present and in so doing, reduce or negate these.

Attractiveness as a Target

It is important to understand what could make NAME OF SITE more attractive as a potential target from any threat source. Each human threat type will consider the environment and location as part of their targeting and attack planning cycle. This will include considerations such as:

● Likely benefits or rewards

● Reward verses effort

● Ease of access and escape

● The existing protective security profile

● Police response times

● Monitoring, challenges, awareness and security culture

Listed below is an example of some of the key aspects that could make your business an attractive option for a threat:

10

Page 11: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

✔ Located in central London

✔ Multiple approaches and escape routes

✔ Likely source of reward or gain

Associated Hazards

Any assessment of a threat must also include an understanding of the types of dangers or hazards that may be aligned to each human threat source. Listed below are the types of hazards that each of the identified threats could deliver:

Type of threat Example of hazards Type of threat Example of hazards

International Terrorism

• Threats• IED• Shooting• Blades• Kidnap• Hostile Vehicle• Fire• Damage to functionality

Civil Unrest or Disorder

• Threats• Assault• Damage of property• Fire• Theft• Damage to functionality

Domestic Extremism

• Threats• Assault• IED• Blades• Rioting• Destruction of property• Fire• Damage to functionality

Disturbed or Fixated person

• Threats• Assault• Fire• Blades• Kidnap• Damage to property

Organised & opportunist Crime

• Threats• Theft• Robbery• Extortion• Assault

Force Majeure • Damage to property• Damage to functionality• A variety of

11

Page 12: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

• Damage of property• Kidnap• Fire• Damage to functionality

dangers to staff• Fear

Nuisance Attenders

• Damage to property• Damage to functionality• Confrontation• Violence

The identified hazards provide a window that we can use to understand the types of dangers that could be encountered should any of the threats target and interact with the development, buildings or people. This is a useful guide rather than an exhaustive list.

RISK – Establishing Likelihood & Impact

This section will help you understand the identified threats to security and provides an understanding of their intentions and capability in targeting and possibly attacking your business. This allows you to use this information to guide your business when assessing the risks, you may have to counter, reduce or control.

Security risks are measured by identifying the overall likelihood and potential impact of an interaction with any of the sources of threat. Listed below are the LIKELIHOOD and IMPACT descriptor tables that provide us with a better understanding of each of these dynamics that influence the level of risk for each threat:

Likelihood Descriptors

Likelihood Descriptor – HIGHLY LIKELY

A HIGHLY LIKELY scoring of likelihood is based on intent, capability and exploitable opportunities alongside an assessment all of the following influencing factors:

12

Page 13: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Credible Intelligence

The existence of intelligence from a credible source, identifying NAME OF SITE as a potential future target based on the threat’s intentions and capability.

Recent Events

Actions or activities within recent months that can be directly linked to the threat source targeting this or partner organisations, developments, buildings or locations within the UK or central European cities or towns.

Threats or Warnings

The existence of threats or warnings emanating from the threat source aligned to their intent and capability that are linked directly to NAME OF SITE.

The Absence of Security Measures

An identifiable and exploitable absence of key integrated security measures including people, equipment, infrastructure and procedures linked to the protection of NAME OF SITE.

The presence of Vulnerabilities

The presence of a range of key identifiable and exploitable vulnerabilities relating to people, infrastructure and procedures that are directly linked to the effectiveness of the protective security of NAME OF SITE.

Profile Your organisation or location are considered High gain or yield by the threat source and are currently being targeted within the UK and central European cities and towns.

Likelihood Descriptor – LIKELY

A LIKELY scoring of likelihood is based on intent, capability and exploitable opportunities alongside an assessment all of the following influencing factors:

Credible Intelligence

The existence of intelligence from a credible source, identifying NAME OF SITE or location of a similar nature as a potential future target based on the threat’s intentions and capability.

Recent Events

Actions or activities within recent months that can be directly linked to the threat source targeting similar organisations, developments, buildings or locations within the UK or central European cities or towns.

Threats or Warnings

The existence of threats or warnings emanating from the threat source aligned to their intent and capability that are linked to similar locations to NAME OF SITE.

The Absence of Security Measures

An identifiable and exploitable absence of effective integrated security measures including people, equipment, infrastructure and procedures linked to the protection of NAME OF SITE.

The presence of Vulnerabilities

The presence of a range of identifiable and exploitable vulnerabilities relating to people, infrastructure and procedures that are directly linked to the effectiveness of the protective security of NAME OF SITE.

13

Page 14: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Profile Organisation or location profile meets the criteria associated with target selection from the threat and is considered a High gain or yield target.

Likelihood Descriptor – LIKELY

A POTENTIAL scoring of likelihood is based on intent, capability and exploitable opportunities alongside an assessment all of the following influencing factors:

Credible Intelligence

The existence of intelligence from a credible source, identifying NAME OF SITE as a potential future target based on the threat intentions and capability.

Recent Events

Actions or activities within recent months that can be directly linked to the threat source targeting organisations, developments, buildings or locations within the UK or central European cities or towns.

Threats or Warnings

The existence of threats or warnings emanating from the threat source aligned to their intent and capability that are linked to NAME OF SITE.

The Absence of Security Measures

An identifiable absence of integrated security measures including people, equipment, infrastructure and procedures linked to the protection of NAME OF SITE.

The presence of Vulnerabilities

The presence of a range of vulnerabilities relating to people, infrastructure and procedures that are directly linked to the effectiveness of the protective security of NAME OF SITE.

Profile Organisation or location profile meets some of the criteria associated with target selection from the threat and is considered a potential gain or yield target.

Likelihood Descriptor – UNLIKELY

A UNLIKELY scoring of likelihood is based on intent, capability and exploitable opportunities alongside an assessment all of the following influencing factors:

Credible Intelligence

General intelligence from a credible source, identifying NAME OF SITE as a potential future target based on the threat’s intentions and capability.

Recent Events

Actions or activities within recent months that can be linked to the threat source seeking to target organisations, developments, buildings or locations within the UK or central European cities or towns.

Threats or Warnings

An awareness of a general threat and warning associated with the threat source aligned to an intent to target NAME OF SITE, as part of their respective modus operandi.

The Absence of Security

No definable areas of weakness associated with the integrated security measures that includes people, equipment, infrastructure and procedures linked to the protection of NAME

14

Page 15: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Measures OF SITE.

The presence of Vulnerabilities

No definable presence of vulnerabilities relating to people, infrastructure and procedures that are directly linked to the effectiveness of the protective security of NAME OF SITE.

Profile Organisation or location profile does not currently suggest you would be considered a high gain or yield target for the threat source.

Likelihood Descriptor – HIGHLY UNLIKELY

A HIGHLY UNLIKELY scoring of likelihood is based on intent, capability and exploitable opportunities alongside an assessment all of the following influencing factors:

Credible Intelligence

General intelligence from a credible source, identifying NAME OF SITE as a potential future target based on the threat’s intentions and capability.

Recent Events

Actions or activities within recent months that can be linked to the threat source seeking to target organisations, developments, buildings or locations within the UK or central European cities or towns.

Threats or Warnings

An awareness of a general threat and warning associated with the threat source aligned to an intent to target NAME OF SITEs, as part of their respective modus operandi.

The Absence of Security Measures

No definable areas of weakness associated with the integrated security measures that includes people, equipment, infrastructure and procedures linked to the protection of NAME OF SITE.

The presence of Vulnerabilities

No definable presence of vulnerabilities relating to people, infrastructure and procedures that are directly linked to the effectiveness of the protective security of NAME OF SITE.

Profile Your organisational or location profile does not currently suggest you would be considered a high gain or yield target for the threat source.

Impact Descriptors

Impact Descriptor – VERY HIGH

The VERY HIGH risk scoring relating to the threat is based on the assessment of the significant absence of crucial elements of credible protective security arrangements alongside the assessment of the acknowledged intentions, capability and opportunities likely to result in:

15

Page 16: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

People The creation of fear, serious injuries and/or multiple fatalities of people within or near to NAME OF SITE.

Infrastructure The destruction or damage to organisational or site infrastructure that will require the relocation of people and core and support functions aligned to NAME OF SITE.

Functionality The serious long-term disruption, damage or destruction of NAME OF SITE ability to conduct or deliver core and support functions.

Other key assets

The damage, destruction or loss of a range of assets such as equipment and core and supporting data.

Reputation Potentially catastrophic damage to the reputation of the lead organisation or development owners due to an identified link to a lack of credible security measures.

Impact Descriptor – HIGH

The HIGH risk scoring relating to the threat is based on the assessment of the absence of crucial elements of credible protective security arrangements alongside the assessment of the acknowledged intentions, capability and opportunities likely to result in:

People The creation of fear, serious injuries and potential fatalities of people within the organisation or near to NAME OF SITE.

Infrastructure The potential destruction or damage to organisational or site infrastructure that could lead to the relocation of people and core and support functions aligned to NAME OF SITE.

Functionality The potential long-term disruption, damage or destruction of NAME OF SITE ability to conduct or deliver core and support functions.

Other key assets

The damage, destruction or loss of a range of assets such as equipment and core and supporting data.

Reputation Significant damage to the reputation of the lead organisation or development owners due to an identified link to a lack of credible security measures.

Impact Descriptor – MODERATE

16

Page 17: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

The MODERATE risk scoring relating to the threat is based on the assessment of the absence of important elements of credible protective security arrangements alongside the assessment of the acknowledged intentions, capability and opportunities likely to result in:

People The creation of fear and potentially serious injuries to people within or near to NAME OF SITE.

Infrastructure The likely damage to organisational or site infrastructure that could lead to the relocation of people and core and support functions aligned to the NAME OF SITE.

Functionality The potential disruption or damage of NAME OF SITE ability to conduct or deliver core and support functions.

Other key assets

The potential damage or short-term loss of a range of assets such as equipment and core and supporting data.

Reputation Likely damage to the reputation of the lead organisation or development owners due to an identified link to a lack of credible security measures.

Impact Descriptor – LOW

The LOW risk scoring relating to the threat is based on the assessment of the presence of key elements of credible protective security arrangements alongside the assessment of the acknowledged intentions, capability and opportunities that is unlikely to result in:

People Any significant or detrimental effects on people within NAME OF SITE.

Infrastructure Any significant damage to organisational or site infrastructure that could lead to the relocation of people and core and support functions aligned to NAME OF SITE.

Functionality Likely disruption or damage of NAME OF SITE ability to conduct or deliver core and support functions.

Other key assets

Likely damage or short-term loss of a range of assets such as equipment and core and supporting data.

Reputation Likely damage to the reputation of the lead organisation or development owners due to an identified link to a lack of credible security measures.

Impact Descriptor – VERY LOW

The VERY LOW risk scoring relating to the threat is based on the assessment of the presence of key elements of credible protective security arrangements alongside the assessment of the acknowledged intentions, capability and opportunities that is unlikely to result in:

People Any detrimental effects on people within or near to NAME OF SITE.

Infrastructure Any damage to organisational or site infrastructure that could lead to the relocation of people and core and support functions aligned to NAME OF SITE.

Functionality Disruption or damage of NAME OF SITE ability to conduct or deliver core and support functions.

Other key assets

Damage or short-term loss of a range of assets such as equipment and core and supporting data.

17

Page 18: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Reputation Damage to the reputation of the lead organisation or development owners due to an identified link to a lack of credible security measures.

Measuring/Scoring the RISK

This section looks at how to score each treat using the Likelihood Vs ImpactOnce all of the information relating to the threats has been assessed and the likelihood and impact of each has been considered, each threat is passed through the RISK Matrix. This is a simple but effective process that will produce a risk measurement or ‘Score’ that can assist in the identification of the security needs or requirement for NAME OF SITE.

As an example, if the likelihood of a threat was potential and the impact was moderate, it would score a green 9. You will need to repeat tis for every threat mentioned previously and the information gained from https://www.police.uk will help you understand the criminal threats you may face. To get a better understanding of the terrorism threat visit https://www.mi5.gov.uk/threat-levels . Remember the terrorism treat level are set nationally and may or may not affect you directly.

18

Page 19: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Risk Scoring – NAME OF SITE Use the scores from the previous table to populate the risk scoring below.

After assessing each of the identified threats through the risk matrix, the risk scores for each can be seen within the threat and risk table below:

Threat Likelihood Impact Risk Matrix Score

Terrorism Unlikely Very High Low10

Domestic Extremism Unlikely High Low8

Organised Crime Unlikely High Low8

Opportunist Crime Unlikely Low Very Low4

Civil Unrest or Disorder Unlikely Moderate Low6

Disturbed or Fixated Individuals

Unlikely Low Very Low4

Force Majeure events Unlikely High Low8

Nuisance Attenders Unlikely Low Very Low4

19

Page 20: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Once you have entered every score, total it then divide by the number of threats. In this example the total score is 52 divided by 8 (threats) equals 6.5. Use the previous chart to see were in the range of risk scores your results is. In this case it falls between the category 6-10 for LOW.

All of the identified security threats to NAME OF SITE fall within the LOW or VERY LOW categories.

Based on the scoring of all eight (8) of the identified threats, the average risk score for NAME OF SITE is 6.5 giving an overall risk scoring relating to security threats of LOW.

Risk Score Recommended Adjustment of Security

The below sections detail what actions are required for each risk rating. In keeping with the example on the previous page, the LOW section is applicable here.

The following protective security guidance relates to the threat profile and risk scoring within this STRA and focuses on the requirement to conduct a review of protective security arrangements within NAME OF SITE. The relevant guidance has been highlighted for your attention.

VERY HIGH

The threat & vulnerability based security risk assessment score indicates significant areas of concern within your protective security capability. You are advised to conduct an urgent review of all protective security arrangements assisted by a security specialist. The review should include:

● The security framework or strategy

● Management plans and procedures

● Access control measures

● Monitoring and detection methods

● Emergency response plans (Evacuation, In-vacuation & Dynamic Lockdown)

● Security awareness, incident reporting and security culture

It is also advisable to maintain a register of all security related occurrences (in the similar vein of a health and safety near miss or incident log) as this will give you information to assist you shape the development of your security regime and capability. Ultimately, it is important to conduct regular reviews of capability alongside regular updates on your threat profile. Adjusting action should be carried out immediately and a timely re assessment conducted to confirm risk reduction and the enhancement of the protective security arrangement proportionate to the threat and risk profile.

20

Page 21: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

HIGH

The threat & vulnerability based security risk assessment score indicates substantial areas of concern within your protective security capability. You are advised to conduct a timely review of all protective security arrangements assisted by a security specialist. The review should include:

● The security framework or strategy

● Management plans and procedures

● Access control measures

● Monitoring and detection methods

● Emergency response plans (Evacuation, In-vacuation & Dynamic Lockdown)

● Security awareness, incident reporting and security culture

It is also advisable to maintain a register of all security related occurrences (in the similar vein of a health and safety near miss or incident log) as this will give you information to assist you shape the development of your security regime and capability. Ultimately, it is important to conduct regular reviews of capability alongside regular updates on your threat profile. Adjusting action should be carried out in the short term and a timely re assessment conducted to confirm risk reduction and the enhancement of the protective security arrangement proportionate to the threat and risk profile.

MODERATE

The threat & vulnerability security based risk assessment score indicates several areas of concern within your protective security capability. You are advised to have your facilities or security manager conduct a review of all protective security arrangements that should include:

● The security framework or strategy

● Management plans and procedures

● Access control measures

● Monitoring and detection methods

● Emergency response plans (Evacuation, In-vacuation & Dynamic Lockdown)

● Security awareness, incident reporting and security culture

21

Page 22: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

It is also advisable to maintain a register of all security related occurrences (in the similar vein of a health and safety near miss or incident log) as this will give you information to assist you shape the development of your security regime and capability. Ultimately, it is important to conduct regular reviews of capability alongside regular updates on your threat profile. Adjusting action should be carried out by management within a 6-month period and a timely re assessment conducted to confirm risk reduction and the enhancement of the protective security arrangement proportionate to the threat and risk profile.

LOW

The threat & vulnerability based security risk assessment score indicates that, whilst there are some areas of vulnerability, your protective security measures and organisational profile, alongside the assessment of you as a likely target are considered to be LOW. Whilst this is

positive, it is advised that you conduct an annual review of your protective security arrangements, which should include:

● The security framework or strategy

● Management plans and procedures

● Access control measures

● Monitoring and detection methods

● Emergency response plans (Evacuation, In-vacuation & Dynamic Lockdown)

● Security awareness, incident reporting and security culture

It is also advisable to maintain a register of all security related occurrences (in the similar vein of a health and safety near miss or incident log) as this will give you information to assist you shape the development of your security regime and capability. Ultimately, it is important to conduct regular reviews of capability alongside regular updates on your threat profile. Adjusting action should be carried out by management when convenient and a timely re assessment conducted to confirm risk reduction and the enhancement of the protective security arrangement proportionate to the threat and risk profile.

VERY LOW

The threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas of vulnerability to attend to, your protective security measures and organisational profile, alongside the assessment of you as a likely target are considered to be VERY LOW. Whilst this is positive, it is advised to conduct an annual review of protective security that should include:

● The security framework or strategy

● Management plans and procedures

● Access control measures

22

Page 23: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

● Monitoring and detection methods

● Emergency response plans (Evacuation, In-vacuation & Dynamic Lockdown)

● Security awareness, incident reporting and security culture

It is also advisable to maintain a register of all security related occurrences (in the similar vein of a health and safety near miss or incident log) as this will give you information to assist you shape the development of your security regime and capability. Ultimately, it is important to conduct regular reviews of capability alongside regular updates on your threat profile. Adjusting action should be carried out by management when convenient and a timely re assessment conducted to confirm risk reduction and the enhancement of the protective security arrangement proportionate to the threat and risk profile.

23

Page 24: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

Protective Security InfluencesThis section will help you understand other influencing factors that may impact your business. A key part of assessing the security requirement for any business or location is to understand what may have a potentially negative influence on the safety and security of the development, the people within and other key assets.

Environmental influences can assist in the identification of what security focused measures or features may be required to be designed and implement or installed in order to counter the effect they may have on security.

The four leading environmental influences we have employed to assist in the overall assessment of security needs within this development area as follows:

Influence

Description

Geographical supporting infrastructure that includes:

● The roads, pathways and routes to and around NAME OF SITE, Public transportation facilities and joint exit points that provide the ability for people to move to and from the site.

● The physical architecture and landscaping of the surrounding areas and any neighboring buildings and other developments such as schools, colleges, night time economy venues; restaurants, theatres, cinemas, bars, pubs and clubs etc, and areas attracting large crowds of people

● Security specific equipment and services such as; lighting, CCTV,

24

INFRASTRUCTURE

Page 25: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

access control and capable guardians aligned to patrolling and/or response such as manned guarding and the local Police.

●Are there core and supporting functions, activities or services within NAME OF SITE that:

● Could be considered controversial within public opinion or challenge religious, cultural or common values within communities?

● May require high levels of public access within the shell of the building at various periods of time?

● Are directly linked to the nighttime economy sector?

● Are linked to the storage, provision or displaying of high value assets or products and services?

Is NAME OF SITE located near:

● Areas of predominant residency such as housing estates, industrial parks or University campuses?

● To areas considered to be affected by high levels of social deprivation or high crime profiles?

● A predominant religious or cultural group or facility (Club, Mosque, Church or centre) within any adjoining or neighboring residential areas that may have issue with the developments owners, tenants or the functions performed or conducted within the development?

Residential areas where people will naturally transit through on route to other facilities such as retail parks, schools, colleges, hospitals or entertainment centres?

Is there an intention to ensure NAME OF SITE:

● Effective security awareness aligned to a robust and effective strategy and supporting plans and procedures?

25

CULTURE

COMMUNITY

FUNCTIONSNS

Page 26: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

● Effective lines of communication throughout the development (all stakeholders) for the reporting of vulnerabilities and other security related activities?

● A culture of compliance and challenge throughout the building’s occupants and users?

An effective and bespoke Emergency Response plan and capability to ensure all staff and visitors can react in a proportionate and timely manner in the event of a serious security/safety related incident?

Key Points

Protective Security Influences & the NAME OF SITE DevelopmentDescribe your protective security influences here.

Infrastructure | Functions | Community | Culture

Example Text - NAME OF SITE, whilst not directly affected, is located close to busy and vibrant parts of central London and is surrounded by residential properties and buildings that provide a host of services that include; retail, commercial and entertainment. The closest concentration of entertainment venues and night-time economy is located within Borough Market approximately 5 minutes’ walk away. Within the immediate area around NAME OF SITE there are internationally known iconic locations such as the Tate Modern and Shakespears Globe Theatre.

The development benefits from good routes to and from the site for motorized vehicles, bicycles and pedestrians and is served by regular and effective public transport facilities, with Southwark tube station being the nearest.

Currently, some neighbouring buildings on Emerson and Park Street have eternal CCTV coverage however the consultant has not been able to ascertain the effectiveness of these systems. There also appears to be a regular Police (vehicle) patrols.

NAME OF SITE and its future tenants are highly unlikely to incorporate or conduct any functions or activities that could be construed as ‘controversial’ or that would fall within any areas of recent public interest that could result in complaint, protest or targeting by persons or groups aligned to these types of anti-social activities. It is however advised that a risk profile is conducted to ensure that all existing and future tenants do not inherently attract a 3rd party risk to NAME OF SITE.

The central court yard of NAME OF SITE has been designed so that pedestrian access can be gained from Sumner and Park Street during the hours of business. Owing to its design this

26

Page 27: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

court yard ‘could’ be an attractive option and used for activities such as skateboarding or owing to the enclosed space it provides a night shelter for homeless people.

As previously mentioned, the area around NAME OF SITE is close to a vibrant and busy part of central London that provides many retail and entertainment venues. This can also influence the levels of opportunist crime, reported as ‘Other Crime’ that is conducted within the area. Indeed, the crime profile for this area, see page 13, indicates a lean-to high levels of theft related opportunist crime. This may also guide the owners and stakeholders/tenants to consider a suite of integrated security measures designed to deter, detect and deny would be criminals from targeting and attacking people and facilities within the development area.

Clearly, there will be a requirement to ensure that NAME OF SITE benefits from an over-arching security strategy that will include security plans and procedures and adequate guidance and awareness for managers and staff alike. Owing to the close proximity of iconic venues there will be a requirement to have a bespoke and focused emergency response plan that includes evacuation, in-vacuation and dynamic lockdown procedures in line with the threats and associated hazards identified within the threat and risk profile of this report. These strategies and plans are essential in order to ensure the continued safety, security and protection of tenants and customers alike.

The strategy, associated plans and emergency response capability alongside supporting awareness training should be designed and delivered by a protective security specialist.

Areas of Vulnerability

27

Page 28: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

You will now need to look at your business, having identified the threat and risks, and identify areas of your business that are vulnerable and need further enhancement. Use this section to detail the areas of vulnerability you have identified and what mitigation measures you will need to undertake.

Example.

A) Vehicle & Pedestrian Access to site.

The main vehicle and pedestrian access point for the site is midway along the southern perimeter fence line off High Beach Road. The secondary access point is not congruent with the main sites’ vehicle and pedestrian access points at the corner of High Beach Road.

Again, this presents a point of vulnerability that could be targeted and exploited by would be intruders in order to move unauthorised people and vehicles inside the site perimeter. The options to reduce and manage this area of vulnerability include:

● Closing the secondary access point to the site and using the main vehicle and

pedestrian access points located at the apex corner of High Beach Road

B)

C)

D)

9. Operational Requirements

It is strongly advised that all security measures, physical and technical, are defined and established utilising the recognised Operational Requirement (OR) procedure which is a statement of need based upon a thorough and systematic assessment of the problem to be

28

Page 29: LIKELIHOOD DESCRIPTORS - Safeguard AEO AEO Template.docx · Web viewThe threat & vulnerability based security risk assessment score indicates that, whilst there are some minor areas

Commercial in Confidence

solved (security application) and the hoped-for solutions (users requirement and functionality).

The initial phase requires a Level 1 (OR) to produce a statement of the overall security need and includes the asset description, the perceived threat, the consequence of compromise, the perceived vulnerabilities, and success criteria. For example, organised crime targeting the development or tenants and the requirement for security measures to reduce the risk of such an occurrence.

The second phase is the Level 2 (OR), which follows on from the completed Level 1 OR and address individual security measures (fences, CCTV, control of access etc.) in a similar fashion to the Level 1 procedure, but which together provide the basis for a fully integrated security solution. The OR can then be issued to an installer so that the exact requirement is met in any subsequent tender proses and installed against the OR. If the installer fails to meet the OR then the responsibility falls on the installer to cover the financial aspects of correcting the installation.

For further information visit https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/378443/28_09_CCTV_OR_Manual2835.pdf

29