preview

Facility Security Assessment

Decent Essays

My experience with the critical skill of evaluation is most apparent in my ability to accurately review and critique facility security assessments (FSA). These assessments are prepared and completed by the Federal Protective Service (FPS) Inspectors as a part of their performance plan and core document. Facility security assessments are comprised of a Vulnerability Survey Report (VSR) that FPS provides as a unique yet comprehensive evaluation report that was developed under the Modified Infrastructure Survey Tool (MIST). As the Area Commander, it is my responsibility for overseeing all stages of the assessment process. The FSA includes the VSR. The VSR evaluates the weakness in the overall facility design noting areas of concern …show more content…

As a part of overseeing the assessment process, I assign a start and completion date for all FSA’s. The Inspector begins the assessment by downloading the builder, which is a data entry component of the MIST program that is used to formulate a VSR in the assessment process. All government owned or leased facilities are assigned a specific building number by the General Services Administration (GSA). These assigned building numbers are then entered into the Gateway program. The Gateway is a computer based website that is used to track activity and completion of the assessment process. The Inspector will log into the Gateway to enter their start date and initiate the builder downloading process to their desktop. The assessment data is then entered into the builder by addressing each security element noted on the dashboard. The concept of the VSR is to evaluate all areas of the facility to include significant area assets that are defined as areas of attractiveness based on location and occupancy. The VSR addresses areas of preexisting countermeasures buy using a Protective Measure Index (PMI). The PMI addresses the preexisting operational and physical security elements of a facility. The baseline of a facility is established by the ISC …show more content…

The TAR is comprised of several elements of security data that are also used to generate the FSL. The Special Agents work with the Inspectors to acquire crime statistics, population, square footage and the identification of the agencies’ mission. The Special Agents conduct interviews with state and local criminal intelligence units and also access the Enterprise Information System (EIS) to review past and present police activity within the vicinity of the facility. The Special Agents also conduct research with several fusion centers referencing the specific building address to identify credible threats aimed at that particular facility. The TAR is added to the VSR to complete the FSA package for that facility. I subsequently complete a review of all components that make up the FSA to insure the accuracy of the data entered using the ISC standards to ascertain compliance with established guidelines. This can be a very time consuming process evaluating each security related component of a completed FSA. After the complete and thorough review of the VSR, FSL, and TAR, I begin the final evaluation of the countermeasure recommendations. The recommendations are compared to the requirements established by the bi-annually produced ICS Design Basis Threat Report

Get Access