BS ISO 23234:2021
$167.15
Buildings and civil engineering works. Security. Planning of security measures in the built environment
Published By | Publication Date | Number of Pages |
BSI | 2021 | 36 |
This document provides requirements and recommendations for effective planning and design of security measures in the built environment.
The purpose of the document is to achieve optimal protection of assets against all kinds of malicious acts, while ensuring functional, financial, and aesthetic aspects.
The document describes which methods and routines need to be implemented in various stages of a building or civil engineering works project, as well as the competencies needed to achieve a good result.
This document is applicable to new builds, refurbishments and development projects by government and private entities, for various environments, buildings and infrastructure.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
15 | 4 Planning of security measures for the built environment 4.1 General |
16 | 4.2 Security planning as part of risk management 4.3 Size of projects 4.4 Division of the building process into stages 4.4.1 General |
17 | 4.4.2 Strategic definition |
18 | 4.4.3 Preparation and brief 4.4.4 Concept design 4.4.5 Developed and technical design 4.4.6 Construction |
19 | 4.4.7 Testing and handover 4.4.8 In use 4.4.9 Decommissioning 4.5 Organization and principal |
20 | 4.6 Special advisers in security projects 4.6.1 General 4.6.2 Security planner 4.6.3 Security risk adviser |
21 | 4.6.4 Technical security adviser |
22 | 4.6.5 Operational security adviser 4.6.6 Project information security adviser |
23 | 5 Security deliverables in stages 5.1 Strategic definition 5.1.1 Asset inventory 5.1.2 Protective security objectives |
24 | 5.1.3 Requirements for protective security planning 5.1.4 Threat assessment, scenario selection and design-basis threats |
25 | 5.1.5 Information security for the project 5.1.6 Security risk analysis (strategic) 5.1.7 Clarification of conditions |
26 | 5.2 Preparation and brief 5.2.1 Input to the dependency map 5.2.2 Security risk analysis (preparation and brief) 5.2.3 External requirements report |
27 | 5.2.4 Security strategy 5.2.5 Input to zoning 5.2.6 Input to the spatial and functional programming 5.2.7 Identification and assessment of security measures 5.2.8 Cost survey |
28 | 5.2.9 Contributions to preliminary design report 5.3 Concept design 5.3.1 Reassessment of security objectives 5.3.2 Security risk analysis (concept) 5.3.3 Reassessment of security strategy 5.3.4 Description of security measures |
29 | 5.3.5 Integration of security measures 5.3.6 Selection of security measures 5.3.7 Input to operational requirements 5.3.8 Cost survey for concept 5.4 Developed and technical design 5.4.1 Input to tender drawings |
30 | 5.4.2 Input to delivery and job descriptions 5.4.3 Contributions in tender evaluation 5.4.4 Assessment of final design 5.5 Construction 5.5.1 Implementation control |
31 | 5.5.2 Participation in functional tests and commissioning 5.5.3 Input to the operations and maintenance manuals 5.5.4 Input to operational requirements 5.5.5 Requirements for alterations in security measures |
32 | 5.5.6 Assessment of as-built design 5.6 Testing and handover 5.6.1 Participation in handover 5.6.2 Completeness check 5.6.3 Quality and functionality check 5.7 In use 5.7.1 Contribution to trial use 5.7.2 Security training |
33 | 5.7.3 Security verification 5.8 Decommissioning 5.8.1 Overview of sensitive installations 5.8.2 Security risk assessment (decommissioning) |
34 | Bibliography |