- DIRECTOR OF COLLEGE FACILITIES »
- ELECTRICIAN »
- Facilities Director »
- Senior Director of Facilities »
- Construction engineer, U.S. Dept. of State »
<< Back to Facilities Management Security Category Home
Tips For Planning A Security Audit Checklist
Compiled by FacilitiesNet Staff
There is no such thing as a one-size-fits-all checklist for conducting security audits. That's because every building — and the security threats they face — is unique.
Still, while there may not be a ready-made security audit checklist, there are some general rules facility managers can follow when considering security audits.
First, security audits shouldn't be a one-time process. Formal security audits should be done on a regular basis because occupancy and business conditions can change.
There are three occasions in particular when security audits should be conducted. The first is when a site is being considered for a new building. There are commercial and consumer crime statistics companies available that conduct threat and risk assessments based on geographical location.
Such assessments detail what the crime and murder rates are for a specific address and compare those rates to those of the city and county. When evaluating a location, if all other factors are equal, this could make the difference.
A security audit should also be conducted when a significant change has been made to an existing facility, such as an addition. Finally, a security audit should be done when there’s been a serious incident. In the last case, the goal should be to find out why an incident occurred and how it can be avoided in the future.
When conducting a security audit, think of it in three steps. Questions to ask: First, where do you stand today? What are your policies? Procedures? Equipment? Second, where do you need to be? Third, if there’s a significant gap between where you are and where you need to be, how do you fill that gap?
Your Real Risks by Desiree Hanford
Security: Think Strategically to Plan for Myriad Threats
Assessment and Mitigation of Risks to Physical Security, Information Security, and Operational Security