Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Identifying Control Perimeters

By Michael Khairallah
April 1, 2007


After a security perimeter is established, assess the video systems needs. Assume a perpetrator has breached the protected perimeter or that attempts are being made to do so and detection has been made by other elements of the planned security system.

Evaluate the protection zone and determine which observation points would be most effective in observing the presence of the intruder and classifying their intent. Classification is important since an all out response may not be needed if the intruder is simply an employee who has inadvertently breached a controlled area. Pay special attention to the outer perimeters; these will afford the greatest response time for the security force.

Camera Considerations

Indicate the placement of a camera in the appropriate location that will afford the optimum view. Some of the elements to consider in camera placement are:
  • The range of view (left/right).
  • The angle of view (up/down).
  • The availability of lighting.
  • The distance from the subject.
Consider the physical mounting of the equipment and the availability of power. Judgment of the value of the view in relation to the cost of providing that view will determine the viability of the option. For example, a petrochemical plant with a large perimeter may require mounting poles and long power runs to provide the desired view. This may be financially unfeasible. Long lenses are used to offset long viewing distances but they will provide less useful images. Consider all aspects of camera placement in this step.

Establish the Command Center

Inspect the existing command center for the facility. If one does not exist, plan a command center for the facility. This establishes the centralized reporting location for alarms and the control point for openings throughout the system.

Usually, some type of security command posts exists in most organizations. This would be the most obvious place to locate the command center for a new security system. If you do not have a security command center yet, there may be a control center for elevator and fire alarm reporting. The company’s facility manager can help to determine where the security command center should be located.

Some elements to examine when reviewing a potential command center are:
  • Location within the protected perimeter.
  • Adequate lighting and ventilation.
  • Easy access to the key areas of the facility.
  • Sufficient room for equipment and security furniture.
  • Available wall space for mounting equipment (security cameras).
  • Ample access to commercial power.
  • Cable pathways into the room.
Consider enhancements to existing command centers to improve the effectiveness of the post and encourage heightened attention by the watch officers operating that post.

Equipment Location

In addition to the command center, most large electronic security systems require the installation of control equipment to provide power and communications to end-point devices. It is sometimes necessary to have multiple equipment locations to minimize the impact of cable runs to each end point. There are several elements to examine when selecting equipment locations:
  • Located within the protected perimeter.
  • Controlled access to the space by means of secured walls and lockable doors.
  • Adequate lighting and ventilation.
  • Cable pathways into the room (a vital consideration).
  • In multi-story buildings, cable pathways between floors.
  • In multi-building complexes, access to network and inter-building communications.
  • Sufficient wall space for mounting control equipment.
  • Ample access to commercial power and emergency power backup services.
Where these facilities are not available, the CSO needs to recommend enhancements to the equipment location areas to make them suitable for equipment and cabling.

Conduct the Physical Survey

Once the security perimeter is established, the access openings identified and the resistance value of the perimeter and openings evaluated, determine the valid access and egress requirements for the secured area. Do this with the help of other company executives during the physical survey.

Begin the physical survey by establishing a “walk through” schedule that includes a management representative of the operating department for that area and a representative of the physical plant or facility department. When starting the survey, write the names and titles of the parties participating in the survey and the date the survey was done for later reference.

Using the site plans and floor plans as a guide, start at the most active opening in the outer most perimeter then proceed to all perimeters identified in the physical survey plan. Identify the openings employees typically use. In some cases, employees use openings that the CSO would prefer they not use. Plan a monitoring device for each opening.

Consider each opening in the protected perimeter and determine the following characteristics of the opening to decide if the opening requires an access control device: Is there something behind the door of significant value to the company, either people or property? Is there dangerous or hazardous material behind the opening that could be a liability to the company if accessed by unauthorized personnel? Are there privacy issues regarding elements behind the opening?

If the opening requires an access control device, then consider the following questions to decide how to handle the opening:
  • When should this door be locked?
  • When this door is locked are there times when access should be permitted?
  • When this door is locked are there times when egress should be permitted?
  • Does the security operation plan to monitor access or egress (or both) at this door by means of a security officer?
  • If not, will the company need a record of entry or exit at this opening?
  • Is this a primary exit door? In most buildings, an “Exit” sign above the door identifies a primary exit door. Fire code requirements in most states call for primary exit doors to be clearly marked and available for egress at all times.
  • Does this door lead to other doors that are considered primary exits and are there other avenues of escape to that exit without passing through the subject door?
  • Are there select individuals (as opposed to all company employees) who are permitted to use this door?
It is generally best to begin the survey at the main or front entrance. That term does not always apply but it means the opening in the protected perimeter that has the highest level of traffic. Then walk the full length of the exterior perimeter, examine each opening in the perimeter and make a determination on how best to secure that opening. The operations personnel attending the walk through can explain how a particular opening is used. Appearances can be deceiving. A door that appears to be secured and infrequently opened may in fact be a high traffic door but simply lacks the evidence of the traffic. Operational personnel from the department will know best how an opening is used.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael Khairallah is president, Security Design Solutions of Covington, La. His book, Physical Security Systems Handbook – The Design and Implementation of Electronic Security Systems (Elsevier, Butterworth Heinemann), is available at $49.95 and can be ordered through the Elsevier Web site at www.elsevier.com or telephone (800) 545-2522 or write Elsever, Order Fulfillment, 11830 Westline Industrial Drive, St. Louis, Mo. 63146.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Perimeter Identification is Pertinent

    See More
  • Know Your Vulnerabilities

    See More
  • Completing the Vulnerability Survey

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!