Identify potential threat actors and their capabilities. Include information about known terrorist groups, criminal organizations, and any insider threats.
Describe specific threat scenarios, including the methods, tactics, and objectives that threat actors might employ
2.2 Threat Actors
Identify potential threat actors and their capabilities. Include information about known terrorist groups, criminal organizations, and any insider threats.
2.3 Threat Scenarios
Describe specific threat scenarios, including the methods, tactics, and objectives that threat actors might employ.
Â
3. Vulnerability Assessment
Consider fence type, material and age
Lighting considerations: Fence line, assets, surrounding area
Ease of access of surrounding area to property
Rate of vehicle approach possibility
3.1 Physical Security
Evaluate the facility’s physical security measures, including access control, perimeter security, and security infrastructure. Identify vulnerabilities and weaknesses.
3.2 Cybersecurity
Assess the facility’s cybersecurity posture, including network security, data protection, and the resilience of critical systems to cyberattacks.
3.3 Personnel Security
Evaluate the effectiveness of personnel security measures, including background checks, training, and awareness programs.
3.4 Operational Security
Analyze operational procedures and protocols to identify potential vulnerabilities and gaps in security.
4. Consequence Assessment
Assess the potential consequences of a successful attack or security breach, including human casualties, environmental damage, economic impact, and damage to the facility’s reputation.
5. Risk Assessment
5.1 Risk Matrix
Create a risk matrix that combines the assessed threat likelihood and consequence severity to determine the overall risk levels for different threat scenarios.
5.2 Risk Mitigation Measures
Recommend risk mitigation measures to reduce the identified risks. Include both immediate and long-term strategies for enhancing security.
6. Emergency Response and Recovery
Outline emergency response and recovery plans and procedures for each threat scenario. Include communication protocols, evacuation plans, and resource allocation.
7. Document Revision
Specify a schedule for reviewing and updating the DBT to ensure it remains relevant and effective in addressing evolving threats.
8. Approval
Provide spaces for signatures and approval by relevant stakeholders, including facility management, security personnel, operations/maintenance, and external agencies if applicable.