Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Planning and Communication: Physical Security Asset Control

By Doug Peckinpaugh
July 1, 2008
The design of a monitoring station in a bank building in Lexington, Ky., shows the need for designers and systems integrators, working with security, to match the surveillance and aesthetics needs of the facility. Photo by Kenny Owens


Good physical asset controls do not just happen. The process takes experience, dedication, planning and superior communication. The same is true for designing security systems for an existing or new building.
A building’s design team should be as experienced with such systems as it is dedicated to its task, but planning for security and access control systems involves the systems integrator or designer and the project’s security executive; and there is no substitute for good communication.

Even before the kickoff meeting with the design team, security should educate themselves on the types of physical security asset controls that the building will require and locations where devices and equipment will be needed. By that first meeting, security should be prepared to effectively discuss those required systems and their infrastructure with the designer or systems integrator.

Conversely, the integrator or designer must be sure that by the end of the kickoff meeting, they understand security needs by conducting extensive interviews, listening actively and asking skilled, probing questions.


Whether it’s new construction or remodeling, the placement of cameras, such as these in an atrium, is important. Photo by Doug Peckinpaugh

GETTING THINGS RIGHT

As the process moves into the actual development of plans and specifications, the systems integrator or designers should provide security with feedback on the infrastructure and/or systems that they are including. They will likely provide the security decision-maker with plans for review at various stages of completion, such as at 35, 60, and 90 percent.

The purpose of that feedback is for the chief security officer (CSO) or security director to review the plans to make sure that the integrator or designer is meeting their needs and requirements, and to identify errors during design, while it is still easy to fix them.

This can be a complex and multilayered process, especially if there are several standards with which the designs must comply.

For instance, a facility located on a military base may be required to meet standards unique to that base, such as a requirement that all buildings’ security video, intrusion or electronic access control networks be consistent. In addition to base standards, the buildings’ users may have specific needs that are different from those for other buildings. An armory would have different security and access control requirements than a recreational facility.

For example, a retrofit or new building for the military may also be subject to agency-wide requirements, which could include but not be limited to:
  • Unified Facilities Criteria documents, which provide planning, design, construction, sustainability, restoration and modernization criteria for U.S. military departments, Department of Defense agencies, and DoD field activities.
  • The Army Physical Security Program.
  • Army Regulation 190-13, which concerns requirements for, and use of, physical security equipment; the appointment of physical security officers and inspectors; physical security credentials; identification cards and badges; restricted areas; and security forces.
  • Director of Central Intelligence Directive 6/9, which provides guidance and requirements for the physical construction, access control and alarming of sensitive compartmented information facilities.



“Since no CSO can be expected to have a thorough knowledge of all major building systems, check with qualified evaluators including designers and systems integrators,” advised Doug Peckinpaugh.

REVIEW BY QUALIFIED EVALUATORS

Security’s review of the plans is important and needs to be as thorough as possible. Since no CSO can be expected to have a thorough knowledge of all major building systems, he or she will need to ensure that security and access control systems are reviewed by qualified evaluators. If there are base requirements for the project, a base security staff member should review the plans. Likewise, a building user’s representative will need to ensure that the facility has the required systems. The same is true for ensuring that the finished project will measure up to agency-wide requirements. Simply put, any person with specific security requirements in the building needs to participate actively in the design review process.

Many of those individuals may be local to the project, but some may be at other – and perhaps distant – locations, especially those who will review the plans to give an agency-level approval. It is important to identify those individuals, get plans to them and receive their feedback.

Someone else that should review the construction plans during development is the systems integrator or installation contractor. The installer would likely be able to spot problems in a design that other reviewers may miss. Unfortunately, this review is not possible on many projects, as the installation contract may not be awarded until the drawings are complete - or even late in construction. While there are good reasons for security to manage projects that way, it does cut out a potentially valuable reviewer from the evaluation process.

While all of that preconstruction or remodeling review may sound like a good strategy, any experienced systems integrator or designer knows that it sometimes does not happen. Designers often submit the security/access control system plans for review at the predetermined intervals, but then receive little or no response. Granted, if all parties have done their jobs up to this point – if security knows what he or she needs at the outset and the systems integrator or designer listens to those needs and design systems accordingly – then there should not be many changes, especially at the later reviews.

OPTIMISM AND SATISFACTION

In any case, lack of feedback will lead the design firm to conclude that either everything is acceptable, or that the design has not been carefully reviewed.

In either case, the firm has no basis on which to make changes, so the plans will go to construction as they are – right or wrong.

The result can be that problems in the design are not discovered until the project is well under construction, or even nearing completion. That will likely leave security with a choice between two bad options. He or she can settle for a system that will work with the infrastructure that has been installed, or make potentially costly field changes in order to accommodate the system requirements that absolutely must be met.

Neither security nor the design firm wins in those circumstances. This can lead to unresolved finger-pointing and potentially significant ill will. That rather unfortunate possibility brings the discussion full circle, affirming that pre-planning and excellent communication throughout the design of a project are vital to its success - and a much better option than solving problems during construction.

Though the security and access control systems are only a small part of a new facility or a retrofit project, they are important systems and must function properly. A lack of planning and poor communication during design can transform what ought to be a positive experience into a stressful and costly one. However, when done right, a new construction or remodeling project can be a rewarding and fulfilling experience, for systems integrators, designers and the security operation.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Doug Peckinpaugh, PE, RCDD, LEED AP leads Mason & Hanger’s Electrical Department and has over 12 years of professional experience.  He can be reached at Doug.Peckinpaugh@masonandhanger.com.  Mason & Hanger is a Day & Zimmermann company.


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!