Title Page

  • Conducted on:

  • Prepared by:

  • Building name:

  • Building address:
  • Building type:

Building Security Checklist

  • Conduct a risk assessment to identify the building's key security vulnerabilities.

  • Building's key security vulnerabilities:

  • Security Threat
  • Type:

  • Level:

  • Full description:

  • Deadline for completion:

  • Description of progress so far:

  • Remove large bushes and other hiding places outside of the building.

  • Add photos of the areas outside the building as evidence of task completion.

  • Deadline for completion:

  • Description of progress so far:

  • Establish a security perimeter using fences or walls.

  • Add a photo of the security perimeter as evidence of task completion.

  • Deadline for completion:

  • Description of progress so far:

  • Place physical barriers, such as turnstiles, at access points.

  • Access Point w/ Physical Barrier
  • Access point type:

  • Access point location:

  • Physical barrier type:

  • Photo of physical barrier:

  • Deadline for completion:

  • Description of progress so far:

  • Install weapon detection systems at major entry points.

  • Major Entry Point w/ Weapon Detection System
  • Major entry point location:

  • Description of weapon detection system:

  • Photo of weapon detection system:

  • Deadline for completion:

  • Description of progress so far:

  • Record the names of visitors and occupants, the times they entered/exited the building, and their signatures in daily logbooks.

  • Using a combination of both paper and digital logbooks?

  • Using only paper logbooks?

  • Search for the Entry/Exit Log Template in iAuditor's Public Library.

  • Download and use the Entry/Exit Log Template in your iAuditor account.

  • Deadline for completion:

  • Description of progress so far:

  • Using the Entry/Exit Log from iAuditor's Public Library?

  • Enforce a strict ID-wearing rule, with each ID having a recent photo of its owner.

  • Continue to monitor compliance with ID-wearing rule.

  • Deadline for completion:

  • Description of progress so far:

  • Are there blockers to the enforcing the ID-wearing rule?

  • Description of blockers:

  • Create actions to remove blockers.

  • Implement extra identity verification and confirmation procedures.

  • Describe extra identity verification and confirmation procedures:

  • Date of implementation:

  • Deadline for completion:

  • Description of progress so far:

  • Install a locking or keycode system to doors that lead to high-risk areas (containing extremely valuable assets, information, or equipment).

  • Locking/Keycode System
  • Description of system:

  • Location:

  • Individuals with access to the key/keycode:

  • High-risk area that access leads to:

  • Deadline for completion:

  • Description of progress so far:

  • Install CCTV cameras where possible and ensure that there are no blind spots.

  • CCTV Camera
  • Description of CCTV camera (type, brand, etc.):

  • CCTV camera location:

  • Area covered by CCTV camera:

  • Are there any possible blind spots?

  • Identify/list the blind spots:

  • Actions taken to mitigate the risks posed by the blind spots:

  • Deadline for completion:

  • Description of progress so far:

  • Keep all areas of the building well-lit and clear (free from large objects that could possibly obscure intruders).

  • Add photos of the areas of the building as evidence of task completion.

  • Deadline for completion:

  • Description of progress so far:

  • Install motion sensor devices with alarms that are triggered by unauthorized access and with the capability to automatically send intruder alerts once the alarm is triggered.

  • Motion Sensor Device
  • Description of motion sensor device:

  • Motion sensor device location:

  • Alarm trigger and notification system has been tested?

  • Alarm is triggered by simulated unauthorized access?

  • Alarm releases a warning sound and/or emits a bright light once triggered?

  • An intruder alert was sent by the motion sensor device once alarm was triggered?

  • Test alarm trigger and notification system.

  • Deadline for completion:

  • Description of progress so far:

  • Establish security violation protocols, including evacuation procedures and emergency response plans.

  • Add the security violations that protocols have been established for.

  • Security Violation
  • Security violation description:

  • Requires evacuation?

  • Evacuation procedures have been prepared?

  • Emergency response plan has been prepared?

  • Deadline for completion:

  • Description of progress so far:

  • Perform regular security testing to identify new vulnerabilities and/or prepare for emerging threats.

  • Date of most recent security testing:

  • Any new vulnerabilities identified in the most recent security testing?

  • What are these new vulnerabilities?

  • Most recent security testing included preparation for emerging threats?

  • What are these emerging threats?

  • Date of next security testing:

  • Discuss the implementation of security testing with your team.

  • Date of first security testing:

  • Why has security testing been irregular?

  • Date of last security testing:

  • Did the last security testing include identification of new vulnerabilities and/or preparation for emerging threats?

  • Date of next security testing:

  • Measures implemented to make security testing more regular:

Completion

  • Comments/recommendations:

  • Name and signature of security officer:

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.