Handbook
Track updates
iconCreated with Sketch.

SA HB 188:2021

[Current]

Base-building physical security handbook — Terrorism and extreme violence

SA HB 188 provides guidance on identifying and assessing relevant sources of building risk associated with threat sources (especially terrorism, civil commotion, and malicious damage) and implementing suitable controls to mitigate the likelihood and consequences related to these threat sources.
Published: 17/12/2021
Pages: 86
Table of contents
Cited references
Content history
Table of contents
Header
About this publication
Preface
Introduction
1 Scope and general
1.1 Scope
1.2 Application
1.3 Referenced documents
1.4 Terms and definitions
2 Identification of physical threats
2.1 Identification of threats
2.1.1 Threat concept
2.1.2 Threat identification
2.1.3 Threat environment – external inputs
2.2 Threat types – weapons and tactics
2.3 Arson
2.3.1 Overview
2.3.2 History of arson
2.3.3 Arson impacts
2.3.4 Common types of arson attack
2.3.5 Vulnerable areas in building design susceptible to arson
2.4 Hostile vehicle attack
2.4.1 Overview
2.4.2 History of hostile vehicle attacks
2.4.3 Hostile vehicle attack impacts
2.4.4 Common types of hostile vehicle attacks
2.4.5 Vulnerable areas in building design susceptible to hostile vehicle attacks
2.5 IED threats
2.5.1 Overview
2.5.2 History of IED attacks
2.5.3 Impact of IED attacks
2.5.4 Common types of tactics using IEDs
2.5.4.1 Vehicle borne improvised explosive device (VBIED)
2.5.4.2 Person borne improvised explosive device (PBIED)
2.5.4.3 Emplaced IEDs – packages or items
2.5.4.4 Mail bombs
2.5.4.5 Vulnerable areas in building design susceptible to IED attacks
2.6 Chemical, biological and radiological (CBR) agent threats
2.6.1 Overview
2.6.2 History of CBR attacks
2.6.3 CBR attack impacts
2.6.4 Common types of CBR attacks
2.6.4.1 Chemical
2.6.4.2 Biological
2.6.4.3 Radiological
2.6.5 Vulnerable areas in building design susceptible to CBR attacks
2.7 Sabotage
2.7.1 Overview
2.7.2 History of sabotage attacks
2.7.3 Sabotage impacts
2.7.4 Common types of sabotage attacks
2.7.5 Vulnerable areas in building design susceptible to sabotage attacks
2.8 Cyber attacks
2.8.1 Overview
2.8.2 History of cyber attacks
2.8.3 Cyber-attack impacts
2.8.4 Common types of cyber-attacks
2.8.5 Vulnerable areas in building design susceptible to cyber-attacks
2.9 Armed attacks
2.9.1 Overview
2.9.2 History of armed attacks
2.9.3 Armed attack impacts
2.9.4 Common types of armed attack
2.9.5 Vulnerable areas in building design susceptible to armed attacks
2.10 Violent protests
2.10.1 Overview
2.10.2 History of violent protests
2.10.3 Violent protest impacts
2.10.4 Common types of violent protests
2.10.5 Vulnerable areas in building design susceptible to violent protests
3 Security risk management
3.1 Security risk assessment
3.1.1 Overview
3.1.2 Risk assessment and tolerances
3.1.3 Stakeholders
3.1.4 Risk assessment methodology
3.1.5 Building security factors
3.2 Critical assets and functions
3.3 Vulnerability analysis
3.3.1 Overview
3.3.2 Vulnerability analysis — Measurement of security measures
3.4 Likelihood analysis
3.5 Consequence analysis
3.5.1 Consequences in building security
3.5.2 Consequence analysis – measurement
3.6 Risk ratings and documentation
4 Risk treatment
4.1 Risk treatment
4.1.1 Overview
4.1.2 Risk treatment strategies
4.1.3 Security-in-depth principles
4.2 Risk treatment in building design
4.2.1 Physical building controls
4.2.2 General architectural considerations in risk treatment
4.2.3 Higher risk areas and facilities
4.2.4 Security personnel and procedures
4.3 Controls in building design
4.3.1 Crime prevention through environmental design
4.3.1.1 General overview
4.3.1.2 CPTED concepts and strategies
4.3.1.3 Examples
4.3.1.4 Achievement of desired outcomes
4.3.1.5 Further guidance
4.3.2 Pedestrian perimeters
4.3.2.1 General overview
4.3.2.2 Objectives
4.3.2.3 Examples
4.3.2.4 Achievement of desired outcomes
4.3.2.5 Further guidance
4.3.3 Vehicle perimeters
4.3.3.1 General overview
4.3.3.2 Objectives
4.3.3.3 Examples
4.3.3.4 Achievement of desired outcome
4.3.3.5 Further guidance
4.3.4 Access control
4.3.4.1 General overview
4.3.4.2 Objectives
4.3.4.3 Examples
4.3.4.4 Achievement of desired outcome
4.3.4.5 Further guidance
4.3.5 Security screening
4.3.5.1 General overview
4.3.5.2 Objectives
4.3.5.3 Examples
4.3.5.4 Achievement of desired outcome
4.3.5.5 Further guidance
4.3.6 Security lighting
4.3.6.1 General overview
4.3.6.2 Objectives
4.3.6.3 Examples
4.3.6.4 Achievement of desired outcome
4.3.6.5 Further guidance
4.3.7 IED attack protections
4.3.7.1 General overview
4.3.7.2 Objectives
4.3.7.3 Examples
4.3.7.4 Achievement of desired outcome
4.3.7.5 Further guidance
4.3.8 Armed attack protections
4.3.8.1 General overview
4.3.8.2 Objectives
4.3.8.3 Examples
4.3.8.4 Achievement of desired outcome
4.3.8.5 Further guidance
4.3.9 Fire risk prevention
4.3.9.1 General overview
4.3.9.2 Objectives
4.3.9.3 Examples
4.3.9.4 Achievement of desired outcome
4.3.9.5 Further guidance
4.3.10 Video surveillance systems
4.3.10.1 General overview
4.3.10.2 Objectives
4.3.10.3 Examples
4.3.10.4 Achievement of desired outcome
4.3.10.5 Further guidance
4.3.11 Controls for chemical, biological or radiological (CBR) attacks
4.3.11.1 General overview
4.3.11.2 Objectives
4.3.11.3 Examples
4.3.11.4 Achievement of desired outcome
4.3.11.5 Further guidance
4.3.12 Intrusion alarm detection
4.3.12.1 General overview
4.3.12.2 Objectives
4.3.12.3 Examples
4.3.12.4 Achievement of desired outcome
4.3.12.5 Further guidance
4.3.13 Keys and locks
4.3.13.1 General overview
4.3.13.2 Objectives
4.3.13.3 Examples
4.3.13.4 Achievement of desired outcome
4.3.13.5 Further guidance
4.3.14 Information and operational technology controls
4.3.14.1 General overview
4.3.14.2 Objectives
4.3.14.3 Examples
4.3.14.4 Achievement of desired outcome
4.3.14.5 Further guidance
5 Testing, evaluation, monitoring and review
5.1 Overview
5.2 Methods for testing and evaluation
5.3 Testing and evaluation — Responding to identified risks
5.4 Continuous evaluation and improvement
5.4.1 Evaluation, improvement and maintenance
5.4.2 Heightened threat level
Bibliography
Cited references in this standard
[Current]
Petroleum and natural gas industries — Offshore production installations — Requirements and guidelines for emergency response
[Current]
Security and resilience - Protective security - Guidelines for crime prevention through environmental design
[Current]
Societal security — Guidelines for exercises
[Withdrawn]
Risk management - Vocabulary
[Current]
Security management systems for the supply chain — Best practices for implementing supply chain security, assessments and plans — Requirements and guidance
Content history
DR SA HB 188:2020
$161.10
AUD
Inclusive of GST
Available formats
iconCreated with Sketch.
Available formats
icon_export/16/closeCreated with Sketch.
Web Reader
Instantly view standards in your browser. Search, bookmark, highlight, and comment for anytime access - online and offline.
Web Reader (PDF)
View standards in PDF format in your browser. Search, bookmark, highlight, and comment for anytime access - online and offline.
Web Reader
Licence:
1 user
Total
$161.10
Add to cart
visa logo
mastercard logo
amex logo