Title Page
-
Conducted on
-
Client / Site
-
Location
-
Prepared by
-
Personnel supporting audit
-
Document No.
-
THE INFORMATION CONTAINED IN THIS DOCUMENT IS CONFIDENTIAL AND IS NOT TO BE COMMUNICATED TO ANY PERSON OTHER THAN AUTHORISED EMPLOYEES.
Content Page
-
1. Executive Summary
2. Key Assets & Locations
3. Threat Assessment
4. Vulnerability Findings / Recommendations
5. Summary / Comments
5. Disclaimer
Executive Summary
-
A physical site security risk assessment was conducted using a Comparative Risk Assessments process. The Risk Assessment looks at the facility attractiveness, known threats, and vulnerabilities to enable recommendations to be implemented to mitigate risk. <br><br>The Security Vulnerability Assessment highlighted areas of risk which are likely to affect the overall security of the site, based on these findings the current vulnerability of this site to known threats is classified as: -<br>
-
Consideration should be made to the vulnerability findings listed in this report to help improve the overall security of the site to known threats.
This Security Vulnerability Assessment [SVA] forms a vital part of identifying any potential vulnerabilities in physical security measures, security systems, policies, processes, procedures, and personnel, that may cause risk to the business.
The information gained to compile this security vulnerability assessment was gathered through conducting an in-depth site inspection of current existing and/or natural mitigation security measures. -
Risk Tolerance
NOTE - Currently the risk tolerance shading is purely for example only. Tolerances to be decided when risk appetite agreed upon.
Key Assets / Locations
Key Assets
-
Staff, Visitors, Contractors & other individuals present on the site.
-
Intellectual property inclusive of high value, sensitive information and data concerning clients business interests either on computer, servers or files.
-
Intangibles; clients image, reputation, financial strength and future profitability
-
Site property inclusive of the buildings, technical and IT equipment
-
Controlled Drugs
-
Products
-
Manufacturing Equipment / Plant
Key Locations
-
Select Key Asset Locations
- Warehouse
- Office
- Production
- Data Centre
- High Value Store
- Controlled Drug Store
- Animal Unit
- Goods In / Out
- Waste Destruction
- Energy Unit
-
Rationale
Threat Assessment
-
Assessment of the threat against the following categories will be based on and supported by credible intelligence sources or events that have taken place in the past 5 years.
-
Theft - Internal
-
Rationale
-
Theft - External
-
Rationale
-
Public Order Protest
-
Rationale
-
Site Penetration
-
Rationale
-
Major Disaster
-
Rationale
-
Direct Protest Activity
-
Rationale
-
Workplace Violence
-
Rationale
-
Low Level Crime
-
Rationale
-
Violation of Policy
-
Rationale
-
Terrorism
-
Rationale
-
Inside Threats
-
Rationale
Vulnerability Findings / Recommendations
-
Vulnerabilities are then assessed against resistant to perceived threats that have been highlighted and given a severity / risk level rating according to the following vulnerability criteria to enable informed decision on highlighted findings / recommendations to be made.
-
Finding / Risk
Finding #
-
Location
-
Finding Description
-
Severity / Risk Level
-
Add media
Recommendation #
-
Category
-
Recommendation / Action
-
Action Owner
-
Recommendation / Action Status
-
Action Taken
Summary / Comments
Disclaimer
-
All information contained in this document is confidential and is not to be used for any other purpose or disclosed wholly or in part to any other party without prior permission in writing being granted by the author.
This restriction does not cover information published or information that can be demonstrated was publicly available on the date of this document.
Copyright and intellectual property rights in all documents and drawings supplied by the author are vested in the author of the report. The recipient accepts this proposal on the basis that this document may not be copied unless agreed in writing by the author.
We reserves the right at any time to request that all copies of this document be returned. The recipient agrees to return all copies of this document forthwith upon receipt of such request.
All details were correct at the time of writing the report however some of these items may be have been rectified.