AST Digital Magazine September 2017 AST Digital Magazine September 2017 | Page 26

Volume 16
response and engagement ) ought to be considered and present in some form at every layer .
September 2017 Edition
Some assets have internal spaces that not everyone in the building is allowed to access .
A great example is a bank vault or the pharmacy in a hospital . Only certain folks are allowed entry .
A building asset in New York City for example , has both layers 1 and 3 combined .
The building itself becomes the property boundary because that is the point at which access can be controlled .
A dedicated threat will “ get in ”, just ask Jason Bourne or Jack Reacher .
Layer 2 – Externally Controlled Perimeter / Enclave Some assets that have special functions , like data centers or communication infrastructure will have an external perimeter dedicated to the asset .
It usually is in the form of a fence with an automated access control systems and some lighting . This is usually enough .
Layer 3 – Asset Façade or Shell All assets have a layer 3 . For building assets , it ’ s the facade or elevation .
For above ground water-tanks it ’ s actually the structure itself – the skin , if you will .
Layer 4 – Internally Controlled Spaces
Unless , it affects the occupants of the building nobody really cares about the crazy guy on the sidewalk .
There probably would be some controlled spaces within the building where some folks are allowed access and others aren ’ t , so it would have a layer 4 .
There probably wouldn ’ t be a layer 2 , but for a communication facility on a military installation there would be .
Adding the “ Fire and Fury ” Too often when considering security solutions for perimeters we tend to hone in on electronictechnologies for the property line that will work without too much human interaction , because let ’ s face it most of the time nothing happens .