Security Guide

>Security Guide

Physical security includes protection measures taken against many threats.

Your security risk assessment shall show you the way on what measures you should take. These consist of from placing basic security elements to special solutions such as closed circuit TV systems (CCTV), alarm systems, lighting measures.

Special solutions must absolutely definitely be implemented as a result of risk evaluation. Otherwise you may make ineffective and unnecessarily expensive investments.

Security Awareness:

Your own staff (cleaning and maintenance staff, including employees of other subcontractors) shall be your ears and your eyes in the recognition of the risks relating to security and in implementing security measures. As they know their office and the duty area the best, they will be the first ones to be aware of extraordinary situations. The staff should be informed on how reporting should be made if such situations are observed. Training and informing the staff on security awareness is a very important requirement.

Entrance Control:

Efficiently operated reception areas and gates used by authorized personnel play an important role in assuring entry-exit controls. You must be sure that the number of entry-exit gates is kept at a minimum number and that your private area and the areas delimitating other areas are well defined and that security is fully assured. Where appropriate, the use of card and/or controlled passage systems must be preferred.

Card Entrance:

If card entrance system is utilized for the entrance of the staff, make sure that all the staff carries those cards at all times and that they are fully informed about the applications. Visitors, placing visibly their visitor cards must be accompanied to where they are going and to the gate following visit. Those who do not have a visitor card and who act suspiciously must immediately be warned and reported to the related security units.


According to the risks that are detected, body search as well as bag search may be conducted. This practice should be carried out with the consent of the persons however those who refuse to be searched must not be taken in.

Vehicle Control:

If you think that there is risk of bomb vehicle, the basic principle is to check all vehicles at least 30 m away from your area. Before allowing vehicles to enter zones with security risks, they must be checked and make sure that they are parked at places foreseen within the area.

Doors and Windows:

External doors must be sufficiently robust, well lighted and provided with an appropriate lock system. Doors that are not continuously closed must be reinforced with different methods in addition to the normal lock system. All ground floor windows as well as other accessible windows must be locked with the adequately working locking mechanisms. If we consider that in blasts, wounds mostly occur from pieces of glass that are shot, using glazed glasses will reduce injuries.

Alarm, CCTV (closed circuit TV system) and Lighting:

Alarm, CCTV (closed circuit TV system) and lighting are indispensable elements of an integrated security system. CCTV, provides very useful data not only in the visual verification of the alarm but also in the investigations after the event. We must not forget that CCTV can be useful only when it is observed and put under record regularly. The lighting, aside its deterrent effect, helps efficient monitoring with the CCTV system.


The below indicated practices have been prepared to provide a reference for the new security measures to be taken at your organization or in your area.

Spare time and resources for a security risk analysis. What sorts of risks are you faced with? What is the likelihood for these risks to be realized? What are your weaknesses from the security perspective? If you have a new building built or new area prepared, take appropriate measures by taking to account security threats at the start. This will be a much more efficient solution than applying security solutions subsequently (from the perspective of time and money).

Make "Security awareness" a part of your organizational culture. Appoint a manager who is responsible for this subject. Provide short trainings to your employees on the subjects to pay attention. Take to account your employees` suggestions in determining potential threats .Train employees in the matters of emergency situations as well as evacuation and perform exercises. Ensure that employees who work in spaces that are of critical importance regarding security are provided with special training.

Make sure that environmental order exists and cleaning is adequately performed- when you keep indoor and outdoor areas in the same order, it will be easier to notice extraordinary situations.

Decrease to the minimum the entrances-exits to your area. Ensure that staff entrances and exits are through controlled cards; develop procedures for guest and sub-contractor entrances-exits. Bag and body searches may be thought in necessary cases depending on the size of the threat however why this procedure must be performed should be explained adequately to your employees. Vehicle entrances should be made under barrier control and the selection of the parking areas are among the matters to be evaluated.

Taking other necessary physical measures – locking doors and windows, CCTV (closed circuit TV systems), alarm, lighting. Check periodically whether these are operating correctly or not.

Examining the mail distribution system – Collects mail and packages at a center which is distant form the main buildings and train concerned staff for emergency situations.

Request necessary documents when hiring new employees or from the employees of the subcontractors working within the area. Check records of subcontractors periodically.

Make sure that the safety of the information systems has been assured. Determine beforehand the adequateness of employees or subcontractors who operate and maintain information systems to this work.

Make plans to ensure the continuity of jour main job at all events – how shall you ensure the continuity of your work when an event threatening the security of your information systems?