The first line of defense is perimeter control at the physical site location, this prevents unauthorized access to the facility. Perimeter security deals with facility and personnel access controls, external boundary protection mechanisms, intrusion detection, and corrective actions.
This defense model works in two main modes:
1) During normal facility operations
- When the facility is in operation, security gets more complicated because authorized individuals need to be distinguished from unauthorized individuals.
2) After the facility is closed
- When closed, all doors should be locked with monitoring mechanisms in strategic positions to alert security personnel of suspicious activity.
0 comments:
Post a Comment