Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

The 5 D’s of Outdoor Perimeter Security

By Keven Marier
Chain link fence close up
Photo by MattCL on Unsplash

Photo by MattCL on Unsplash

March 5, 2012

Outdoor perimeter security is an often-overlooked area of physical security design that can dramatically improve the effectiveness of a facility’s security system. If you are involved in designing or managing physical security the infrastructure located in the buildings likely consumes the majority of your budget. However, small investments in outdoor perimeters can provide significant protection to the building’s assets well before the other, more costly, measures are encountered. These outdoor perimeters can serve as a valuable line of defense for a physical security plan because they add distance, time and scale to a physical security plan that cannot be achieved within the building itself.  If designed correctly, outdoor preventative measures can reduce the cost of building security. In all physical security designs outdoor perimeters should be included as a supportive element.

Read more about perimeter security

Read more about crime deterrence

To correctly utilize the outdoor perimeter requires that the security plan take a holistic and complete assessment of the outdoor and indoor areas. A holistic perimeter reference design is the 5D’s of perimeter security. This design focuses on a key objective for each specific perimeter, and layers the perimeters from outside the facility to inside the secured buildings. The 5D’s starting from the outside are: Deter, Detect, Deny, Delay and Defend.  

The 5D perimeter protection design can reduce the overall cost of a facility’s security system and improve the effectiveness of the plan. Focusing the security objectives at each perimeter layer on a specific task, and designing the system in such a way that takes advantage of special purpose security systems achieve this. The following provides an overview of the key principles behind a 5D perimeter security design.

 

Deter

The deter perimeter is the farthest one from the location of the assets and is often a mix of physical infrastructure such as fences and lighting. The security objective on this perimeter is to deter the criminal from even attempting a breach of the system. Deterrence is a psychological battle, and when the security department wins, the criminal activity never starts. Applying surveillance technology along the deter perimeter typically requires the use of overt, large enclosures, which make it obvious to all approaching the perimeter that they are under surveillance. Signs saying “no trespassing” or “area under surveillance” also aid in communicating a deterrent message to unauthorized persons.

 

Detect

The detection perimeter’s security objective is to monitor large areas of space to accurately detect possible unauthorized intrusion in time to respond appropriately. Surveillance camera technology, especially megapixel cameras, is very effective as an accurate detection tool. Important objectives are the timely notification to security personnel, and having the ability to digitally or optically zoom into the area where intrusion was detected.

 

Deny

The objective at the deny perimeter is to keep unauthorized persons out, while allowing authorized persons to enter. To perform this function the deny perimeter typically has access control technology or a manned security gate at the point of entry. The intention of surveillance at this point is to provide visual verification to the biometric or card access system.

 

Delay

The delay perimeter’s objective is to slow down an active intrusion enough to force the intruder to give up, or allow the security team to respond. Often, interior locking doors or other physical barriers are used to slow down the intrusion. Surveillance cameras can be used inside the delay perimeter to provide situational awareness and measure the effectiveness of the delay countermeasures.

 

Defend

The defend perimeter is typically a security personnel response that attempts to apprehend the intruder.  Surveillance is used at this perimeter to record the apprehension and determine the effectiveness of the response.  This final perimeter often includes the involvement of law enforcement and typically overlaps the other perimeters.

 

Keys to Outdoor Perimeters

The general rule is that the farther away from a secured building the more expensive are the security measures. This holds true for cameras, sensors and access control systems. Designing outdoor systems requires detailed upfront planning because of the wide range of operating conditions to which the security systems will be exposed. For cameras, lighting and weather conditions are the biggest problems the system will have to overcome through infrared light and motion sensors. Holistic design processes that combine both indoor and outdoor perimeters, similar to the 5D’s, will provide the most effective physical security systems.   

KEYWORDS: crime deterrence outdoor security perimeter security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Software in the Middle of the New Physical Security Economy

    See More
  • How to Measure the Effect of Megapixels

    See More
  • Studying the Pros and Cons of Proprietary Wireless Surveillance

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing