Title Page

  • Conducted on

  • Client / Site

  • Location
  • Prepared by

  • Personnel supporting audit

  • Document No.

  • THE INFORMATION CONTAINED IN THIS DOCUMENT IS CONFIDENTIAL AND IS NOT TO BE COMMUNICATED TO ANY PERSON OTHER THAN AUTHORISED EMPLOYEES.

Content Page

  • 1. Executive Summary

    2. Key Assets & Locations

    3. Threat Assessment

    4. Vulnerability Findings / Recommendations

    5. Summary / Comments

    5. Disclaimer

Executive Summary

  • A physical site security risk assessment was conducted using a Comparative Risk Assessments process. The Risk Assessment looks at the facility attractiveness, known threats, and vulnerabilities to enable recommendations to be implemented to mitigate risk. <br><br>The Security Vulnerability Assessment highlighted areas of risk which are likely to affect the overall security of the site, based on these findings the current vulnerability of this site to known threats is classified as: -<br>

  • Consideration should be made to the vulnerability findings listed in this report to help improve the overall security of the site to known threats.

    This Security Vulnerability Assessment [SVA] forms a vital part of identifying any potential vulnerabilities in physical security measures, security systems, policies, processes, procedures, and personnel, that may cause risk to the business.

    The information gained to compile this security vulnerability assessment was gathered through conducting an in-depth site inspection of current existing and/or natural mitigation security measures.

  • Risk Tolerance
    NOTE - Currently the risk tolerance shading is purely for example only. Tolerances to be decided when risk appetite agreed upon.

    Risk Tolerence.PNG

Key Assets / Locations

Key Assets

  • Staff, Visitors, Contractors & other individuals present on the site.

  • Intellectual property inclusive of high value, sensitive information and data concerning clients business interests either on computer, servers or files.

  • Intangibles; clients image, reputation, financial strength and future profitability

  • Site property inclusive of the buildings, technical and IT equipment

  • Controlled Drugs

  • Products

  • Manufacturing Equipment / Plant

Key Locations

  • Select Key Asset Locations

  • Rationale

Threat Assessment

  • Assessment of the threat against the following categories will be based on and supported by credible intelligence sources or events that have taken place in the past 5 years.

    Threat Criteria.JPG
  • Theft - Internal

  • Rationale

  • Theft - External

  • Rationale

  • Public Order Protest

  • Rationale

  • Site Penetration

  • Rationale

  • Major Disaster

  • Rationale

  • Direct Protest Activity

  • Rationale

  • Workplace Violence

  • Rationale

  • Low Level Crime

  • Rationale

  • Violation of Policy

  • Rationale

  • Terrorism

  • Rationale

  • Inside Threats

  • Rationale

Vulnerability Findings / Recommendations

  • Vulnerabilities are then assessed against resistant to perceived threats that have been highlighted and given a severity / risk level rating according to the following vulnerability criteria to enable informed decision on highlighted findings / recommendations to be made.

    Capture 2.JPG

  • Finding / Risk

  • Finding #
  • Location

  • Finding Description

  • Severity / Risk Level

  • Add media

  • Recommendation #
  • Category

  • Recommendation / Action

  • Action Owner

  • Recommendation / Action Status

  • Action Taken

Summary / Comments

Disclaimer

  • All information contained in this document is confidential and is not to be used for any other purpose or disclosed wholly or in part to any other party without prior permission in writing being granted by the author.

    This restriction does not cover information published or information that can be demonstrated was publicly available on the date of this document.

    Copyright and intellectual property rights in all documents and drawings supplied by the author are vested in the author of the report. The recipient accepts this proposal on the basis that this document may not be copied unless agreed in writing by the author.

    We reserves the right at any time to request that all copies of this document be returned. The recipient agrees to return all copies of this document forthwith upon receipt of such request.
    All details were correct at the time of writing the report however some of these items may be have been rectified.

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.