Title Page
-
Conducted on:
-
Prepared by:
-
Building name:
-
Building address:
-
Building type:
Building Security Checklist
-
Conduct a risk assessment to identify the building's key security vulnerabilities.
-
Building's key security vulnerabilities:
Security Threat
-
Type:
-
Level:
-
Full description:
-
Deadline for completion:
-
Description of progress so far:
-
Remove large bushes and other hiding places outside of the building.
-
Add photos of the areas outside the building as evidence of task completion.
-
Deadline for completion:
-
Description of progress so far:
-
Establish a security perimeter using fences or walls.
-
Add a photo of the security perimeter as evidence of task completion.
-
Deadline for completion:
-
Description of progress so far:
-
Place physical barriers, such as turnstiles, at access points.
Access Point w/ Physical Barrier
-
Access point type:
-
Access point location:
-
Physical barrier type:
-
Photo of physical barrier:
-
Deadline for completion:
-
Description of progress so far:
-
Install weapon detection systems at major entry points.
Major Entry Point w/ Weapon Detection System
-
Major entry point location:
-
Description of weapon detection system:
-
Photo of weapon detection system:
-
Deadline for completion:
-
Description of progress so far:
-
Record the names of visitors and occupants, the times they entered/exited the building, and their signatures in daily logbooks.
-
Using a combination of both paper and digital logbooks?
-
Using only paper logbooks?
-
Search for the Entry/Exit Log Template in iAuditor's Public Library.
-
Download and use the Entry/Exit Log Template in your iAuditor account.
-
Deadline for completion:
-
Description of progress so far:
-
Using the Entry/Exit Log from iAuditor's Public Library?
-
Enforce a strict ID-wearing rule, with each ID having a recent photo of its owner.
-
Continue to monitor compliance with ID-wearing rule.
-
Deadline for completion:
-
Description of progress so far:
-
Are there blockers to the enforcing the ID-wearing rule?
-
Description of blockers:
-
Create actions to remove blockers.
-
Implement extra identity verification and confirmation procedures.
-
Describe extra identity verification and confirmation procedures:
-
Date of implementation:
-
Deadline for completion:
-
Description of progress so far:
-
Install a locking or keycode system to doors that lead to high-risk areas (containing extremely valuable assets, information, or equipment).
Locking/Keycode System
-
Description of system:
-
Location:
-
Individuals with access to the key/keycode:
-
High-risk area that access leads to:
-
Deadline for completion:
-
Description of progress so far:
-
Install CCTV cameras where possible and ensure that there are no blind spots.
CCTV Camera
-
Description of CCTV camera (type, brand, etc.):
-
CCTV camera location:
-
Area covered by CCTV camera:
-
Are there any possible blind spots?
-
Identify/list the blind spots:
-
Actions taken to mitigate the risks posed by the blind spots:
-
Deadline for completion:
-
Description of progress so far:
-
Keep all areas of the building well-lit and clear (free from large objects that could possibly obscure intruders).
-
Add photos of the areas of the building as evidence of task completion.
-
Deadline for completion:
-
Description of progress so far:
-
Install motion sensor devices with alarms that are triggered by unauthorized access and with the capability to automatically send intruder alerts once the alarm is triggered.
Motion Sensor Device
-
Description of motion sensor device:
-
Motion sensor device location:
-
Alarm trigger and notification system has been tested?
-
Alarm is triggered by simulated unauthorized access?
-
Alarm releases a warning sound and/or emits a bright light once triggered?
-
An intruder alert was sent by the motion sensor device once alarm was triggered?
-
Test alarm trigger and notification system.
-
Deadline for completion:
-
Description of progress so far:
-
Establish security violation protocols, including evacuation procedures and emergency response plans.
-
Add the security violations that protocols have been established for.
Security Violation
-
Security violation description:
-
Requires evacuation?
-
Evacuation procedures have been prepared?
-
Emergency response plan has been prepared?
-
Deadline for completion:
-
Description of progress so far:
-
Perform regular security testing to identify new vulnerabilities and/or prepare for emerging threats.
-
Date of most recent security testing:
-
Any new vulnerabilities identified in the most recent security testing?
-
What are these new vulnerabilities?
-
Most recent security testing included preparation for emerging threats?
-
What are these emerging threats?
-
Date of next security testing:
-
Discuss the implementation of security testing with your team.
-
Date of first security testing:
-
Why has security testing been irregular?
-
Date of last security testing:
-
Did the last security testing include identification of new vulnerabilities and/or preparation for emerging threats?
-
Date of next security testing:
-
Measures implemented to make security testing more regular:
Completion
-
Comments/recommendations:
-
Name and signature of security officer: