Sign In

Security Planning Guide

Text Size a a a Print Print this page

The following table is taken directly from the National Guidelines for Protecting Critical Infrastructure from Terrorism and provides examples of security considerations that could be implemented.  The guide is not exhaustive but provides a minimum basis from which further measures may be developed by specific businesses.

 

Security situationSecurity considerations
Terrorist attack is not expected
  • identify the risks associated with the normal business operating environment, for example criminal activity, natural disasters and accidents

Ensure a security audit is undertaken and security plans are developed which include:

  • procedures are in place to report any unusual activity or phone calls to police
  • after-hours contact details of key personnel and a procedure to ensure that police have access to the contact details
  • training staff, including contractors
  • develop facility bomb threat and evacuation procedures
  • designation of security controlled areas
  • implement effective access and identification controls, and
  • cleaning up facilities so they are easier to search and monitor
  • establish and communicate a risk management philosophy including the development of a risk management plan that articulates the level of acceptable risk, beyond which risk must be managed
  • ensure a business continuity plan has been developed
  • comply with State and Territory regulations in relation to dangerous goods
  • have the necessary systems, plans and processes in place to respond to increased levels of risk or threats.
Terrorist attack is possible

Includes considerations if an attack is possible, but not expected, plus:

  • ensure all staff, including contractors are aware of the increased risk, particularly those with key responsibilities
  • review delivery arrangements from suppliers
  • reinforce security practices and policies
  • check warning and evacuation procedures
  • tighten access controls for people and vehicles, e.g. all visitors escorted
  • identification checks on entry and exit points
  • review location of, and access to, external rubbish skips, storage containers etc
  • review buildings and activities in adjacent buildings
  • have the necessary systems, plans and processes in place to respond to increased levels of risk or threats
  • ensure the business continuity plan has been tested and apparent shortfalls rectified
  • detect and respond to security breaches within 48 hours.
Terrorist attack is probable

Includes considerations if an attack is possible, plus:

  • ensure all staff, including contractors are aware of the increased risk and measures being implemented
  • review delivery arrangements from suppliers
  • compulsory identification of staff, suppliers and visitors at all times
  • activate operations centre as required and consider preliminary activation of the business continuity plan
  • review response procedures for suspicious articles being found
  • screening of packages, mail deliveries and external deliveries to facility
  • facilitate closer liaison with emergency services
  • have the necessary systems, plans and processes in place to respond to increased levels of risk or threats
  • detect and respond to security breaches within 24 hours
  • increase vigilance using existing resources for suspicious people, items or vehicles e.g. check facility each 24 hour period
  • establish contact with police.
Terrorist attack is expected

Includes considerations if an attack is probable, plus:

  • ensure all staff, including contractors are aware of the increased risk and measures being implemented
  • review delivery arrangements from suppliers
  • consider service alteration
  • deploy resources to provide constant monitoring and guarding
  • implement perimeter security and restrict parking in the near vicinity
  • detect security breaches within 12 hours.
  • heightened vigilance for unattended vehicles etc – e.g. check facility every 12 hours
  • deploy additional security resources, particularly on entry/exit points.
Terrorist attack is certain

Includes considerations if an attack is expected, plus:

  • continuous patrols of critical nodes and points of vulnerability
  • restrict access to essential personnel only
  • activate operations centre on a 24/7 basis
  • activate the business continuity plan
  • detect and respond to security breaches as soon as possible.

 

Acknowledgement of Country

The Government of Western Australia acknowledges the traditional custodians throughout Western Australia and their continuing connection to the land, waters and community. We pay our respects to all members of the Aboriginal communities and their cultures; and to Elders both past and present.