Title Page

  • Conducted on

  • Site Name / Location

  • Prepared by

  • Personnel supporting audit

  • Document No.

  • THE INFORMATION CONTAINED IN THIS DOCUMENT IS CONFIDENTIAL AND IS NOT TO BE COMMUNICATED TO ANY PERSON OTHER THAN AUTHORISED EMPLOYEES.

Executive Summary

  • A physical site security risk assessment was conducted using a Comparative Risk Assessments process. The Risk Assessment looks at the facility attractiveness, known threats, and vulnerabilities to enable recommendations to be implemented to mitigate risk. The Security Vulnerability Assessment highlighted areas of risk which are likely to affect the overall security of the site, based on these findings the current vulnerability of this site to known threats is classified as: -

  • Consideration should be made to the vulnerability findings listed in this report to help improve the overall security of the site to known threats.

    This Security Vulnerability Assessment [SVA] forms a vital part of identifying any potential vulnerabilities in physical security measures, security systems, policies, processes, procedures, and personnel, that may cause risk to the business.

    The information gained to compile this security vulnerability assessment was gathered through conducting an in-depth site inspection of current existing and/or natural mitigation security measures.

  • RISK TOLERANCE - Currently the risk tolerance is purely for example only. Tolerances to be decided when risk appetite is agreed.

  • Very High - Business feels most concerned about this risk. Disastrous impact on business activities and clients. Comprehensive and immediate action is required.

  • High - Business feels concerned about carrying this risk. The consequences of the risk materialising would be severe but not disastrous. Some immediate action is required plus the development of a comprehensive action plan.

  • Medium - Business is uneasy about this risk. Consequences of the risk on the business are not severe and can be managed via contingency plans. Action plans developed later, and budget bids mobilised. Status of risk should be monitored regularly.

  • Low - Business is content to accept this risk. Consequences of risk relatively unimportant to the business. Status of risk should be reviewed periodically

Key Assets / Locations

Key Assets

  • Staff, Visitors, Contractors & other individuals present on the site.

  • Intellectual property inclusive of high value, sensitive information and data concerning clients business interests either on computer, servers or files.

  • Intangibles; clients image, reputation, financial strength and future profitability

  • Site property inclusive of the buildings, technical and IT equipment

  • Controlled Drugs

  • Products

  • Manufacturing Equipment / Plant

Key Locations

  • Select Key Asset Locations

  • Rationale

Threat Assessment

  • Assessment of the threat against the following categories will be based on and supported by credible intelligence sources or events that have taken place in the past 5 years.

    Threat Criteria.JPG
  • Theft - Internal

  • Rationale

  • Theft - External

  • Rationale

  • Public Order Protest

  • Rationale

  • Site Penetration

  • Rationale

  • Major Disaster

  • Rationale

  • Direct Protest Activity

  • Rationale

  • Workplace Violence

  • Rationale

  • Low Level Crime

  • Rationale

  • Violation of Policy

  • Rationale

  • Terrorism

  • Rationale

  • Inside Threats

  • Rationale

Vulnerability Findings / Recommendations

  • Vulnerabilities are then assessed against resistant to perceived threats that have been highlighted and given a severity / risk level rating according to the following vulnerability criteria to enable informed decision on highlighted findings / recommendations to be made.

    Capture.PNG

  • Finding #
  • Location

  • Severity / Risk Level

Summary / Comments

Disclaimer

  • All information contained in this document is confidential and is not to be used for any other purpose or disclosed wholly or in part to any other party without prior permission in writing being granted by the author.

    This restriction does not cover information published or information that can be demonstrated was publicly available on the date of this document.

    Copyright and intellectual property rights in all documents and drawings supplied by the author are vested in the author of the report. The recipient accepts this proposal on the basis that this document may not be copied unless agreed in writing by the author.

    We reserves the right at any time to request that all copies of this document be returned. The recipient agrees to return all copies of this document forthwith upon receipt of such request.
    All details were correct at the time of writing the report however some of these items may be have been rectified.

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.