Physical Security / Security Education & Training

Using Architectural Elements for Stronger Security

When thinking of security, people tend to think of cameras, security officers and metal detectors.

When thinking of security, people tend to think of cameras, security officers and metal detectors. While these are all important elements of building security, the best security plans begin long before these elements are installed, and long before the building itself is even constructed. They begin on the drawing board, as designers and clients come together to sketch out buildings able to withstand a wide variety of threats, ranging from natural disasters to man-made attacks and cybersecurity concerns.

As an architect specializing in corporate and urban design, I have helped clients fulfill a variety of security needs, from the everyday to the top-secret. Some clients are simply seeking to provide a safe, comfortable workplace – after all, we all want to feel secure when we are at work or at school. For other clients, security is of paramount importance – they are responsible for critical data and operations that must be protected from natural and man-made threats. Their buildings are more than just structures – they are targets, living under the shadow of a bulls-eye. In each case, good design can be a very powerful defense mechanism.


Campus and Building Security – General Best Practices

Whether through small design decisions, such as sight lines or lighting, or bigger undertakings, such as sealing rooms and buildings from physical or digital invasion, a building’s design scheme can be its first line of defense against a wide range of potential threats, ranging from petty crime to bioterrorism. Specific threats will differ based on a facility’s function and location, and designers should work with owners to analyze, prioritize and accommodate a building’s particular needs. However, there are several general best practices that can greatly improve a facility’s overall security by subconsciously encouraging safe usage and diffusing potential internal or external threats.

When planning for security, the psychology of a particular design is just as important as its tangible attributes, if not more so. The built environment can significantly affect users’ thought patterns and behavior. Often without their knowledge, building occupants and visitors respond to environmental cues that encourage particular behaviors and discourage potentially harmful tendencies. Lighting is perhaps the most common example – well-lit, open areas tend to deter crime, while darker, enclosed spaces can encourage it. Other design features can have similarly strategic effects on behavior, and are part of the larger discipline of Crime Prevention Through Environmental Design (CPTED). Key goals include using the built environment to improve visibility, control access and increase a facility’s resilience.



Promoting visibility, and even creating the illusion of visibility, can help deter crime and foster a sense of security among building users. Designers should abide by an “eyes on the street” mentality, both within and outside of their building, allowing security personnel and building occupants to monitor potential threats. For example, using straight, unobstructed sight lines with no blind corners eliminates potential hiding places and creates spaces that can be easily surveyed. Curves, alcoves and other obstructions should be kept to a minimum in highly-trafficked areas. Landscaping should reduce places to hide and avoid plantings and shrubbery exceeding the height of an average person. To encourage surveillance among building personnel, windows and other openings should allow for easy viewing of high-activity areas, as well as of street activity outside. For example, including ample windows in highly-trafficked spaces, such as building lobbies, allows occupants to clearly see activity on the street and identify potential threats before they arrive. Similarly, orienting offices to face major corridors encourages occupants to take note of their surroundings and can facilitate early threat detection.

Each of these design strategies create spaces with a sense of openness and visibility that can act as a psychological deterrent against would-be threats. These spaces also create a sense of watchfulness and accountability, as building occupants can become guards of sorts, able to quickly spot any problems and provide important information to security personnel.



The creation of open, visible spaces should be carefully balanced with measures controlling and restricting building access, to ensure that the open spaces themselves do not increase potential threats. The wayfinding strategies built into a facility are key to achieving this goal. Signs, placards and other markers should guide all visitors to a central area upon entering the building, with minimal opportunity to disperse into other rooms. This makes it much easier for on-site security personnel to scan incoming visitors and identify potential threats. Lighting, artwork and other interior design elements should subconsciously enforce this direction by emphasizing spaces where designers most wish to draw the eye and direct visitors’ footsteps.

Aside from pedestrian access, secure designs should also limit vehicle access and, as much as possible, remove a building from the radius of external threats. For example, an exterior perimeter, even one simply demarcated by bollards or planters, will prevent vehicles from directly approaching a facility, and distance it from any accidents, explosions or other threats that might occur on nearby streets. Other external features, such as plazas and courtyards (provided they are highly visible and easily monitored) are also useful as buffer zones.



In addition to focusing on preventing threats, secure building designs should include built-in mechanisms to improve resilience if and when such threats become a reality. A building’s resilience is key to its security, and designers can increase resilience by creating spaces that proactively adapt to unexpected situations. In flood-prone areas, for example, elevating crucial functions like a hospital’s emergency room or an office building’s IT nerve center can help preserve operations even as waters rise. Additional safeguards include reinforcing connectors and other structural elements to withstand extreme loads, enhancing insulation to guard against utility failures and installing resilient backup power sources and redundant systems to provide insurance in an emergency.  


High-Security Facilities – Designing Additional Defenses

While no one wants to see their building damaged in the event of a disaster, there are certain facilities where loss of function can have extraordinarily dire large-scale implications. These high-security facilities should take into account the best practices mentioned above while also providing increased protection to safeguard mission-critical operations and highly-sensitive information. Data centers are a good example of facilities needing specialized protection. These facilities house tremendous amounts of information, typically affecting networks far beyond their physical location. Imagine, for example, if a national hospital network’s central data facility went offline during a tornado. If you were a patient in any one of that network’s hospitals, your medical history, prescriptions, MRI results or CT scans could vanish, damaged by a weather event that you likely did not even know was occurring. Multiply that loss by thousands of patients around the country, and you have a terrible headache on your hands. To prevent such losses, data centers and other mission-critical facilities should be designed with physical safeguards far exceeding those of a typical building. As one data center client put it, we must design facilities that will remain online even when Buicks are flying through the air. Several factors can help designers achieve that charge.

  • Location –High-security data centers should be placed in an inconspicuous location, remote from other buildings and outside of city centers or transportation hubs. Additionally, data centers should be located in a different city from the primary operators that they serve, to minimize the risk of both facilities being under duress simultaneously.
  • Exterior ConstructionThough designers love to create visually striking buildings, it is wise to refrain from that tendency when working on this type of high-security facility. Data centers should be nondescript, better suited to deflecting attention than to attracting it. Windows should be kept to a minimum and walls should be thick, reinforced with concrete or steel.
  • Facility LayoutCrucial operations should be located at the center of the building, with non-crucial and administrative functions creating a perimeter shield.

Similar precautions apply to facilities housing sensitive information, though such facilities cannot always be hidden away in a remote location. Often, seemingly ordinary office buildings must, through less visible methods, ensure both physical and cybersecurity. These can be categorized as Sensitive Compartmented Information Facilities (SCIF), a subset of building design with extremely high security standards and strict certification requirements. Within SCIF facilities, particular areas where sensitive information are stored or discussed is sectioned off and protected with numerous, layered features, including aluminum-lined walls, sound-masking systems and electronic or radio frequency shields.

Whether a building is a SCIF facility or simply a normal office building, security should always be a top priority, from the drawing board onwards. Good design allows the building itself to take on an active role in ensuring occupant safety, by subconsciously directing users, emphasizing safe behavior and deterring outside threats. The severity and cost of such precautions varies, but with each step taken, our buildings, our cities and crucially, our people can become a bit safer, a bit more secure behind the defenses of a smart built environment.  


About the Author: Patrick Gilbert, AIA, LEED AP is an architect with Gresham, Smith and Partners. He has worked on a wide variety of projects for GS&P, including office, retail and educational spaces. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

April 2015 security magazine cover

2015 April

In this April 2015 issue of Security, find out how to keep your enterprise resilient after a disaster in 2015. Also discover how to strike a balance between design basis threats and active shooter threats and see what's in store for the 2015 RSA Conference.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.