Security Components

Security Components

Each of the components of our security framework has physical modalities which make it possible. A threat and risk assessment must be conducted using a methodology; security systems for new builds must be the result of a security design brief; and various contingency plans must be written into reality.

The following are our most popular components.

Threat and Risk Assessment (TRA)

This tool comes under many names: threat and vulnerability assessment, risk assessment, security review or assessment, etc. Regardless of the nomenclature, the TRA is the foundation for all security. It identifies the assets for protection, how they are vulnerable, what threatens them, and how best to protect them.

The presence of security systems, policies and practices does not negate the need for this. Security modalities have often been applied without the understanding of threats and vulnerabilities that the TRA will show.

Primoris has performed these in many environments: mining, government, nuclear, dairy, laboratory, and many more. The result is a baseline that helps to deliver an effective security system. We recommend that they be performed every two years of when major alterations have been made to the environment.

Security Design Brief (SDB)

During construction, a TRA will identify assets, threats and risk. To select proper countermeasures, a security design brief will identify security equipment to be installed at a site.

The SDB will identify the types of devices and where they are to be installed. It will identify the specifications and robustness of equipment. For example, where a door lock is required, it will determine whether it should be a lock with a physical key, a lock with an electric strike, a maglock, or a deadbolt. These specifications are often provided to the architects for inclusion in building construction plans. When high security is desired, details are often kept by the corporation for installation after building delivery.

Contingency Plans

Unfortunately, contingency plans rise and fall in popularity through time. Business Continuity Plans, Disaster Recovery Plans and Crisis Management Plans vary in popularity (but not in necessity). Emergency Evacuation Plans are almost always included in the policy suite with some mention of bomb threats.

We are experts at developing these plans. We can train participants, test the plans, and make sure they are resourced and unified. We have done this in international and domestic environments with great success.

Policy Writing
We have developed entire policy management systems for small companies. We have long experience in effective policy writing and ensuring legal promulgation.  Policies become a legal component of a company’s history and must be definitively managed and archived. We offer experienced guidance on how to approach this.
Security Training

It is everyone’s duty to help secure company assets: valuable things, people, information, intangible. But if employees don’t know or won’t play, security will be weak despite the company’s best efforts.

One thing is certain in security: security practitioners can sit at a desk and write all the security policies they wish but if employees are unaware or not on board, this will be wasted time. The remedy for this is security awareness and training programs.

We differentiate between awareness (information in the environment) and training (formal and accountable). We have developed many of these programs and delivered training in classroom environments. This is truly an effective way to engage employees to help secure corporate assets.

Let’s Work Together