Internal security emergency plan

The malicious acts of the first half of 2015 highlighted the vulnerability of industrial sites to intentional attacks.

In addition to the precautionary measures already in place to cover the accidental risk, the public authorities have decided to strengthen and control the safety measures on sensitive sites, including by attaching some of them to an Activity Sector. Vital importance.
   
While the safety approach (management of malicious acts) shares a similar logic with that of security (management of accidental acts) - initial risk analysis, drafting of adapted plans, crisis preparation - the approach is nevertheless made very different because it is based on taking into account the human factor and not metrics:

  • the intentions, objectives and modalities of taking action have very different origins: revenge, greed, ideological reasons, demands, etc.
  • their consequences may not be immediately detectable, such as theft of products or sensitive information;
  • they can take place in the material and physical, immaterial and logical fields or be the object of a combination of the two;
  • the  conduct of the alert , the evacuation  or  the sheltering of personnel  may be different from the safety procedures of the evacuation type following an industrial accident (fire, etc.) as defined in the Plan Internal Operation.


Faced with a malicious action, the  guard post, reception and the on-call manager  will in a large majority of cases be the entry points or the first to be informed: individuals forcing entry, postponement of an intrusion detection on the alarm panel, reception of a bomb threat by the security officers, gathering of demonstrators in front of the main gate ... How will they react? 
  

Our recommendation for the adoption of a protection system for people and property:

  1. Plan upstream credible scenarios of malicious acts, adapted to the site and the activity in order to:
  • Write instructions, procedures (in line with works such as "Emergency plans in industry").
  • Carry out training and exercises to manage these different events.
  1.  Put in place means of preserving evidence for the purpose of prosecuting the perpetrators. This point is regularly hidden during the occurrence of events, but becomes an immediate problem after the fact. Here again, simple measures must be put in place to allow the company to analyze the events and to take legal action if necessary.
      
    Taking into account the anteriority of the security plans Internal Operation Plan (POI) and their format imposed by the administration; the security plan that we recommend will be a complementary plan. Written in line with the POI, it will deal specifically with the security issue and called  the Internal Security Emergency Plan. (THEN). In the event of a classification of the site as PIV, the formalism will respect that imposed by the administration.

We offer support to help you structure your organization and formalize it through procedures and more generally through the tools necessary for the management of security incidents and the crisis. 
   

Internal security emergency plan, our summary in 3 steps:

  • Step 1  : analysis of the security and safety organization in place and selection of malicious attack scenarios, in line with those of the POI. 
  • Step 2  : definition of the crisis organization and drafting of the Internal Security Emergency Plan, comprising all the files, instructions and procedures  
  • Step 3 (Optional): establishment of a multi-year training schedule and exercises to prepare staff for malicious scenarios adapted to the site.

Contact