Security Systems Design Process

Security Systems Design Process

Was a panellist at the FSAI panel discussion today on the topic 'From Threat Analysis to Security Systems Design'. Contributed with presenting the nine step security design process given below:

No alt text provided for this image

5 Key Takeaways:

  1. Three Cs to consider - Context, conflict and competence. Establish the context - is the facility in a high risk zone, what are the threats, what is the desirable level of security....The consultant should be independent to avoid conflict of interest.....The consultant should have competence over the entire process.
  2. Incorporate CPTED in design.
  3. Data Centre security (for that matter any facility's security) gets enhanced if a TVRA has been done prior to deployment of secuirty control measures.
  4. Security design is not static and so regular risk assessments are essential to keep pace with emerging threats.
  5. Design with the future in mind - It's closer than we think.
Aditya Gurtoo

Manager, Security Operations & Resilience, McKinsey & Company I CPP, CFE, NEBOSH, Aviation Security (Av Sec) Certified I Ex - Army Veteran Col

4 年

Missed the event Sir. Is a recording available?

回复

Sir very well articulated

回复
Major Ayanangshu Hazra SM, CPP? PSP?

Infantry Veteran | Mining | Telecom | Luxury Hotels | Oil & Gas | Software | Banking

4 年

Wonderful insight sir from all the Panelists

回复
Ravinder Paliwal,CPP,CFE

Risk Advisor l Security leader I Mentor l Entrepreneur

4 年

Very insightful... looking forward to hearing more of such expert comments sir ????

回复

You are the best in the field sir.

回复

要查看或添加评论,请登录

Col Deepak Kajla (Retd)的更多文章

社区洞察

其他会员也浏览了