Information
-
Document No.
-
Audit Title
-
Client / Site
-
Conducted on
-
Prepared by
-
Location
-
Personnel
-
Picture of facility entrance
-
By default a text box appears whenever "no" is selected. If the answer requires further explanation, but the answer is "yes" select the "no" to display the text box, enter the text and then select "yes".
General facility impressions and security posture
-
Is the facility in an area that is generally visible from the street ?
-
Have there been security problems in the past? (if so, describe in comments section)
-
Comments
-
Have all required incidents been reported to Police?
-
Are incident reports used?
-
Do staff know how to report security incidents?
-
If incident reporting is used, is there a particular software or system that is used?
-
Photos of forms, software, or relevant items related to incident management
-
Are they being properly reviewed?
-
Do they provide appropriate information?
-
Are they reaching the appropriate people?
-
Comment
-
Recommendations for improvements:
-
What assets need to be protected?
-
What are the most important areas of this facility as relates to safety and security?
-
Incident Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Security Program Organization
-
Who is responsible for the management and oversight of the security program?
-
Fixed Post 1st shift
-
Fixed Post 2nd shift
-
Incident Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
-
Fixed Post 3rd Shift
- 0
- 8
- 16
- 24
- 36
- other
-
Patrol / inspection 1st Shift
- 0
- 8
- 16
- 24
- 36
- other
-
Patrol / inspection 2nd Shift
- 0
- 8
- 16
- 24
- 36
- other
-
Patrol / inspection 3rd Shift
- 0
- 8
- 16
- 24
- 36
- other
-
Vehicle Patrol 1st Shift
- 0
- 8
- 16
- 24
- 36
- other
-
Vehicle Patrol 2nd Shift
- 0
- 8
- 16
- 24
- 36
- other
-
Vehicle Patrol 3rd Shift
- 0
- 8
- 16
- 24
- 36
- other
-
Security control center monitoring 1st shift
- 0
- 8
- 16
- 24
- 36
- other
-
Security control center monitoring 2nd shift
- 0
- 8
- 16
- 24
- 36
- other
-
Security control center monitoring 3rd shift
- 0
- 8
- 16
- 24
- 36
- other
-
Foot Patrol 1st shift
- 0
- 8
- 16
- 24
- 36
- other
-
Foot Patrol 2nd shift
- 0
- 8
- 16
- 24
- 36
- other
-
Foot Patrol 3rd shift
- 0
- 8
- 16
- 24
- 36
- other
-
Other
- 0
- 8
- 16
- 24
- 36
- other
-
Is the officer staff fixed to a post or do they rotate?
-
Are shifts arranged to provide client employee shift change coverage?
-
Comment
Communications
-
Are intercoms used?
-
Photograph of Intercom
-
Is there a sufficient quantity of them?
-
Are the intercoms functioning properly?
Camera Program Details
-
Are cameras installed
-
Are faulty components replaced in a timely manner?
-
Photo of camera monitoring system
-
How many days are archived?
-
Which VMS system is used?
-
Are monitors clear?
-
Comments on camera system or management
-
CCTV Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Fence
-
Fencing photos
-
Is there a fence around the facility?
-
Type of Fence
-
Are there any areas which are left un-fenced?
-
Is the bottom of the fence within two inches of solid ground?
-
Do any terrain features allow access under/over fence?
-
Is the fence in good condition?
-
Do security personnel inspect fences regularly?
-
Are there alarm sensors on the fence?
-
Is the fenceline properly lit?
-
is the fence supported by other security equipment?
-
Fence Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Windows
-
Are windows locked?
-
Photos of windows
-
Are windows sealed?
-
Are windows protected by bars?
-
Are there obstructions that limit outside vision?
-
Is there somebody responsible for ensuring that they are opened/closed/locked?
-
Comment/ details
Perimeter doors
-
Are perimeter doors alarmed?
-
Is the alarm centrally managed/controlled?
-
Are alarms active during day? or are areas shut off? how is perimeter access controlled through various doors?
-
Is there a regular lock-up routine?
-
Is the routine effective/efficient/sufficient?
-
Is shrubbery near access points well maintained?
-
Shrubbery or other visual distractions
-
Is lighting appropriate and sufficient?
-
Are perimeter doors supported by lights?
-
Are perimeter doors supported by cameras?
-
Fence Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Exterior lighting
-
Are lights vandal resistant?
-
Do burnt out lights get replaced quickly?
-
Are lights on timers?
-
Photos of lighting fixtures
-
Are sensitive areas provided with additional coverage?
-
Comments / Details
-
Are roof hatches properly secured?
-
Fence Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Intrusion Alarm Systems
-
Alarm system observations
-
Is an intrusion alarm system used in facility?
-
Are all doors and windows secured?
-
Alarm system
-
Are false alarms common?
-
Are all contacts properly secured
-
Are all contacts operational?
-
Are faulty parts replaced quickly?
-
Does your alarms panel allow you to isolate areas and/or groups?
-
Are the alarms monitored at all times?
-
Does the alarm system have a power back-up
-
Alarm Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Access Control Systems
-
System and pass photos
-
Does the facility use an automated access control system?
-
What system is used?
-
Who is responsible for issuing access cards?
-
Are card readers utilized at all access points that are not monitored by security/reception?
-
Are card readers securely fastend and in good working order?
-
Comments on access control system
Access Control Policies and Procedures
-
Observations related to access control procedures
-
Is there a current access control policy in effect?
-
Is it effective/efficient?
-
Are employees issued badges?
-
Photos of badges or passes
-
Are the badges restricted access?
-
Comment/ Describe system
-
Are visitors logged?
-
Are visitors issued badges?
-
Are the badges collected at exit?
-
Is that process working well?
-
Are visitors escorted through the facility?
-
Is there a culture of access control within the facility? (do employees question unbadged or unescorted visitors)
-
Is there a regular audit of badges?
-
Do contractors have different processes?
-
Describe the contractor process
-
Are temporary employees issued temp badges?
-
Describe the process
-
Access Control Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Lock and Key Control
-
Are keys to the building controlled?
-
Who is responsible for issuance of keys?<br>
-
Is there a master list of key holders?
-
Is there a clear process for issuing keys
-
Describe
-
Are spare / unused keys locked in a cabinet?
-
If keys are locked in a cabinet, is the cabinet controlled through time/access control, alarm or camera?
-
Are locks/keys changed regularly?
-
Are all locks working properly?
-
List any inoperable locks/doors
-
Lock/Key Control Risk Rating
- A1
- A2
- A3
- A4
- A5
- B1
- B2
- B3
- B4
- B5
- C1
- C2
- C3
- C4
- C5
- D1
- D2
- D3
- D4
- D5
- E1
- E2
- E3
- E4
- E5
Emergency procedures
-
Is there a fire plan in place?
-
Is there an emergency bomb threat plan in place?
-
Is there an evacuation plan in place?
-
Is there an intercom warning system in place?
-
Is there a medical emergency plan in place
-
Is there a fire detection system (and alarm)?
-
Describe (does it cover all of facility, partial, what type of system is it, etc)
-
Are fire/emergency doors secured?
computer security
-
This section relates to the physical control of computers and servers
-
Is there a physical security access control system limiting access to server areas?
-
Describe
-
Are the areas monitored?
-
Describe
-
Is after-hours access to server rooms monitored/controlled?
Security Patrol
-
Are security patrol tours performed at the facility?
-
Do the tours include internal and external patrols?
-
Are the patrol routes efficient?
-
Are important checkpoints covered?
-
Should the tours be reviewed?
-
Describe the tour
-
Do the tours result in meaningful data?
-
Is a touring system used?
-
Is gps used?
-
Describe the system