Don’t Duck the Ductwork

Manbars need to be half-inch diameter steel and welded in place five inches on center.

With today’s global uncertainty, many enterprises and government agencies are building sensitive compartmented information facilities (SCIF).

In particular, those who perform sensitive work for the government are building these types of spaces. A SCIF space is a space where sensitive information may be stored, used, discussed or processed. The goal of these types of rooms is whatever type of information is available in the space cannot be heard or seen outside that space. There are some unique challenges involved when designing the mechanical systems for such a space.

Beyond the manbars, a 1.5 hour fire damper is needed.


In a typical mechanical design, many ducts enter and leave the SCIF space in the plenum ceiling. If the building exists, there may even be some ducts that do not service the area but pass through it. For an SCIF facility, each duct that is greater than 96 square inches that passes to or from the SCIF area to an unrated space shall be protected with manbars. However, any duct that has one dimension less than six inches does not require manbars. Figures 1.1, 1.2 and 1.3 show typical manbar construction in ductwork passing from an SCIF area to a nonrated area.

Figure 1.1 illustrates that the manbars shall be half-inch diameter steel. The bars must be welded in place five inches on center. The walls between the SCIF areas and non-SCIF areas must have a 2-hour firewall rating. In addition to the manbars at the wall penetration, a 1.5-hour fire damper is needed for all duct penetrations.

Ducts are not the only equipment that need manbar protection through the SCIF perimeter wall. Pipes also need to be protected if they are greater than 96 square inches or greater than 6 inches in direction. An inspection port is also required at the wall penetrations from SCIF to non-SCIF. The inspection port is typically located on the SCIF side of the penetration. The port is typically located on the secure side so no one from the non-secure side can tamper with the port. It is acceptable, however, to locate the port on the non-secure side as long as it is locked. Most inspection ports installed are hinged access doors as shown in Fig. 1.3, but an inspection window is also acceptable.

Sound can travel through a ductwork system at any size. To meet accreditation standards, proper sound attenuation is needed for each duct penetration to or from the space. There are several ways security can meet this requirement. The first method, less popular than some, is to place sound baffles directly inside the ductwork. The sound baffles must be metal and positioned no more than 6 inches apart.

A hinged access door on the security side for inspection can work, or you can use an inspection window.


The baffles work well, but a preferred method for sound attenuation is to strategically locate sound generators so no coherent sound passes through. The generators need to be connected to the building electrical system and should run continuously. The key with sound generators is to balance them so they are not so loud as to be distracting to people working below the ceiling locations.

There are several challenges in making an area’s mechanical systems SCIF rated and accredited, but with careful design and construction, the space can safely be used for many years.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.