Language selection

Search

Royal Canadian Mounted Police

GCPSG-019 (2023): Protection, Detection, Response, and Recovery

On this page

Foreword

The Protection, Detection, Response, and Recovery Guide is an UNCLASSIFIED publication, issued under the authority of Royal Canadian Mounted Police Lead Security Agency for Physical Security (RCMP LSA). Although UNCLASSIFIED, the access and use of this guide should be limited to Government of Canada (GC) departments and agencies.

Suggestions for amendments and other information can be sent to the RCMP Lead Security Agency rcmp.lsa-grc.posm@rcmp-grc.gc.ca.

Reproduction

This publication may be reproduced verbatim, in its entirety, without charge, for educational and personal purposes only. Written permission from the RCMP LSA is required for use of the material in edited or excerpted form, or for any commercial purpose.

Effective date

The effective date of GCPSG-019 - Protection, Detection, Response, and Recovery Guide is 2023-12-15.

Record of Amendments

Record of Amendments
Amendment number Date Entered by Summary of amendment
       

Note: Authority for modifications or variances is Royal Canadian Mounted Police Lead Security Agency for Physical Security (RCMP LSA).

Introduction

The RCMP, as the Lead Security Agency (LSA) for physical security for the Government of Canada (GC) is responsible for providing advice and guidance on all matters relating to physical security.

Purpose

The purpose of this guide is to provide departments and agencies with information on the Protection, Detection, Response, and Recovery model to assist in the development of physical security systems, programs, and standard operating procedures. These measures support operational security, the safety of personnel, and business continuity efforts to facilitate the continued delivery of services throughout a security incident.

For detailed information, GC employees should refer to their departmental security policies, standards and guidelines, the Policy on Government Security (PGS), Appendix C of the Directive on Security Management (DSM) and other RCMP LSA Guides to implement the appropriate measures to counter threats to government employees, assets and service delivery and to provide consistent safeguarding for the GC.

The guide contains both required security control safeguards, indicated by use of the word "must" and recommended security control safeguards or guidance, indicated by the use of the word "should". Use of the word "must" indicates a reference to an established GC policy or standard while the use of the word "should", refers to advice, guidance, or a best practice.

Some departments and agencies or operational activities may face different threats due to the nature of their business, their location or the attractiveness of their assets. Examples include police or military establishments, health services, laboratories, sensitive research facilities, museums, service counters, offices in high-crime areas and facilities located outside of Canada.

Applicability

This guide applies to all GC facilities, as departments and agencies are responsible for safeguarding employees, assets and service delivery within their area of responsibility. The guidance provided in this document is intended for Chief Security Officers (CSO), directors, managers, and security personnel who are responsible for the design, operation, and protection of GC facilities and personnel.

Tenant departments are responsible for informing custodian departments of their security requirements for site selection and tenant fit-up.

Custodian departments are responsible for providing and funding the safeguards considered necessary by the custodian to protect facilities, based on a threat and risk assessment (TRA) conducted by or for the custodian. This responsibility includes implementing and integrating measures for base building security (exterior doors and lighting), building systems (elevator, mechanical and electrical systems) and life safety (exit stairs, fire alarms and sprinklers). Custodians are also responsible for integrating tenant-funded requirements, both baseline and enhanced, into their base building infrastructure.

Information Technology Considerations

With the constantly evolving threat landscape, and the convergence of physical and information technology (IT) security, the requirement to assess the risk of any application and/or software connected to a network to operate and support equipment in Government of Canada controlled buildings is critical. Some examples of these control systems could be for items such as, but not limited to, security lighting, perimeter gates, doors, HVAC, etc.

Before implementing any applications and/or software that will control and/or automate certain building functions, your departmental security requires the completion of a Security Assessment and Authorization (SA&A). This will ensure that the integrity and availability of the components the applications and/or software controls are maintained and that any risks highlighted will be mitigated. Starting the SA&A process early is highly recommended to ensure project delivery schedules are not affected. For more information on the SA&A process, please consult your departmental Security.

Contact information

For more information, please contact:

Mail

RCMP Lead Security Agency for Physical Security
73 Leikin Dr, Mail Stop #165
Ottawa ON  K1A 0R2

Email
rcmp.lsa-grc.posm@rcmp-grc.gc.ca

Protection, Detection, Response, and Recovery

The Government of Canada's approach to physical security compliments other aspects of the PGS. It is based on the principal that the external and internal area of government facilities can be designed and managed to create conditions that, together with specific physical security control measures, will reduce the risk of violence to employees, protect against unauthorized access, detect attempted or actual unauthorized access, and activate effective response and recovery activities. This physical security goal, found in GCPSG-010 Operational Physical Security Guide, includes the concept of protection, detection, response, and recovery (PDRR).

Preventative Approach

The prevention of harm or damage is accepted as being less costly, in terms of human and financial loss, than it is to repair the damage after it occurs. This summarizes the importance of incorporating PDRR elements into GC physical security systems. Protection, Detection, and Response are interdependent elements that enable a natural recovery to normal operations in a cost and time efficient manner. Periodic tests of security procedures, plans, and equipment should be undertaken by authorized persons to verify compliance with each department or agency's security practices in order to achieve a higher preparedness level for potential security threats.

Crime Prevention Through Environmental Design

Crime Prevention Through Environmental Design (CPTED) is a multi-disciplinary approach to crime prevention during the designation, definition, and security design of an environment. Facility design and management of natural and man-made environments, can enable departments and agencies to deter criminal or adversarial actions while safely managing the flow of individuals throughout a facility. These models intend to positively influence behavior and activities while discouraging undesirable actions by staff, visitors, and potential adversaries.

Threat Risk Assessment and Risk Management

A Threat and Risk Assessment (TRA), is a process used to identify, analyse, and address observed vulnerabilities against known or anticipated threats to establish the risk environment and is an integral part of a department or agency's overall risk management strategy. Once a department or agency's risk landscape has been established, application of these PDRR concepts and other physical security guides, found at RCMP LSA Publications, will aide in managing known risks and in building resilience to rare or unforeseen risks in the future.

Protection

Protection is achieved through the use of physical, procedural and psychological barriers to delay or deter unauthorized access. Protection safeguards impede the occurrence of unwanted events and are often referred to as barriers. A protective barrier should serve some or all of the following functions:

  • Mark the perimeter of a restricted access area or zone
  • Provide a level of protection from physical attack or force
  • Deter an intrusion by making an assailant/attacker/trespasser more readily identifiable
  • Prevent, delay, or control access by unauthorized personnel or vehicles
  • Contain personnel or assets within a room, area, or zone
  • Impede escape

A barrier is considered effective against unauthorized access when it restricts access routes to an asset and is able to stop or hinder the unauthorized person(s) approaching from any side. An assessment must be completed against known and likely threats, the probable adversary, and the adversary's motivation, capabilities, skill, and resources. Protection from threats identified in a TRA should include:

Physical Barriers

Physical barriers are passive, active, or a combination of the two.

A passive barrier, such as a bollard, restricts the unauthorized vehicles from passing but it will not respond to an attack.

Active barriers react or are altered when there is unauthorized activity; for example, security guards on patrol.

A combined active and passive barrier could be a fence that restricts access to the area by creating a compound perimeter which is then used to contain patrolling guards that would detect and respond to an intruder.

When detection does not activate an effective response, a physical barrier system does little more than provide a psychological barrier to a determined and skilled adversary. Without the elements of detection and response, a barrier will only deter the initiation of the event and limit unskilled opportunistic adversaries.

Objectives of Physical Barriers

There are usually two objectives for physical barriers:

  • To make penetration so complex or difficult that only a few attackers will be able to breach the barrier
  • To delay or if possible stop an intrusion and/or attack

Complexity of the System

A well-planned design reduces the number of potential attackers who have the necessary knowledge, determination, skills and resources to overcome a barrier. Barrier designs that employ a variety of materials and procedures can help deter many potential attackers who may not be skilled or ambitious enough to take on this challenge.

Prolonging and Delaying Attack

A robust barrier requires time in order to exploit or defeat. Barrier time-delay design should incorporate the following characteristics:

  • Amount of force required to defeat the barrier
  • Amount of time needed to defeat the barrier (delay)
  • Ability to recognize any attempts to defeat the barrier
  • Response time of the guard force / police force

Layering Barriers

Security systems are often designed utilizing multiple barriers encircling a protected asset; commonly referred to as "defense-in-depth" or "rings of protection". Layered barrier designs are advantageous when they require increased knowledge, skill, and talent to circumvent and, as a result, increase the likelihood of being discovered due to a prolonged exposure of an attacker's efforts at each layer of protection. This enables detections systems to promptly identify the incident and initiate a response.

Procedural Barriers

The use of routine procedures, to establish a baseline standard of acceptable conduct or activity, will aid personnel in recognizing actions and behaviours that fall outside of the norm; which in turn supports Detection. The use of security staff, log books and administrative procedures, such as signing into an office area, can act as a deterrent to any unwanted activity. Procedures such as these can be automated which can activate a response when they are not properly followed. They may also deter unwanted activity by creating a perceived barrier to entry into an area; which tends to prevent compromise of the asset.

Example: Access to files in a file room. If administrative procedures require someone to sign out or record files accessed, this may act as a deterrent for individuals to take any files without the specific need-to-know of the file contents. Thus, protection of information in the files is achieved in accordance with the need-to-know and need-to-access principles.

Psychological Barriers

A psychological barrier is a deterrent only, as it does not hinder or stop an event if the adversary decides to attack. A psychological barrier such as the presence of CCTV cameras or functioning security lighting illuminating a facility will help to confirm to any trespasser that they will be easier to detect but it will not physically prevent anyone from entering the area. The intruder will recognize this will increase their risk of being detected and could generate a response from security personnel. The extent of usefulness of specific psychological barriers should be determined through the TRA process.

Detection

Detection involves the use of appropriate design, devices, systems, and procedures to signal that an attempted or actual unauthorized access has occurred. Detection systems should be designed and implemented with the intent of providing the earliest possible notification, of any event, in order to reduce the amount of time needed to provide an appropriate response. Detection elements increase the effectiveness of protection measures if employed in a complimentary manner as part of any department or agency's access management system. Additional information on access management is found in GCPSG-006 Access Management Guide.

Electronic Intrusion Detection

Electronic Intrusion Detection (EID) systems are intended to provide continuous monitoring of vital or high value locations, access control points, zones in which access is controlled (OZ, SZ, HSZ), and any other spaces in which human supervision and control is not possible. EID systems often are incorporated with alarm systems, fire safety systems, CCTV, security lighting, and electronic access control card systems. EID must be monitored by personnel capable of coordinating a response when intrusions or emergencies occur. Best practice is for departments and agencies to establish a Security Operations Centre (SOC) to lead in this function.

Security Operations Centre

A SOC provides a facility to support security personnel in the monitoring, surveillance, display, control, management and response to security-related events. A SOC typically provides 24-hour surveillance activities through video camera systems, intrusion alarm sensors, and related systems. The SOC also provides the ability to detect and assess alarm notifications and dispatch staff to address the issue such as Contracted Security teams, Commissionaires, or Emergency Services personnel. There are a number of critical functions carried out within the SOC and situational awareness is at the forefront of the operational purpose. Operators in the SOC:

  • Collect information related to the controlled and monitored environment
  • Analyze the information to determine the impact to personnel or the facility
  • Respond to the situation appropriately
  • May also be utilized to function as a command centre during emergencies

More information concerning the functions of using a SOC are found at GCPSG-003 Security Operations Centre Design Considerations Guide.

Security Awareness Programs

As per DSM, Appendix H: Mandatory Procedures for Security Awareness and Training Control, GC departments and agencies must develop and maintain a security awareness and training program for employees at all levels. It is strongly encouraged that direction on which procedures staff must initiate when observing or experiencing security incidents is included in all security awareness programs. Developing a strong culture of security co-operation and reporting will strengthen the detection functions within GC departments and agencies.

Response

Response entails the implementation of measures to ensure that security incidents are being reported to appropriate security officials, and ensures that immediate and long-term corrective action is taken in a timely fashion. Response priorities, in order, are:

  1. Preservation of life and safety of personnel
  2. Safeguarding of GC information and assets
  3. Protection of property to enable prompt recovery to normal operations

Department and agency response plans and SOP should be based upon a TRA that includes known and anticipated threats to the location and personnel, capabilities of onsite security personnel, and available support from First Responders (Police, Fire, Ambulance). These should be routinely practiced (exercised) by both security and non-security personnel in order to foster a greater preparedness and enable an agile recovery to normal operations. These exercises may include scenarios based on fire emergencies, facility evacuations, emergency destruction plans, intruder alarms, lockdowns, armed intruders, natural disasters, and protests or demonstrations. Methods available to test these plans include table-top exercises, Emergency Response Team (ERT) training, practical scenario-based training and exercises, and penetration tests.

Recovery

Recovery refers to the restoration of full levels of service delivery following an incident. The ability of a department or agency to recover from an incident, also referred to as resiliency, is directly enabled by the measures employed in the areas of Protection, Detection, and Response. In a physical security context, this may include:

  • Delivery of an apprehended intruder to responding police
  • Returning to office spaces following a fire alarm evacuation
  • The restoration of damaged or compromised access management systems
  • The activation of an Alternate Command Post (ACP) or Alternate Service Delivery Point (ASDP) until the original location is safe and fully operational

Following an incident, a review of the key elements of the event, and actions taken to prevent or limit the impact, should be included in the recovery process. The lessons learned from each incident can then be incorporated into a department's or agency's PDRR preparations and plans.

Collaborative Application of PDRR

Developing robust protection features, comprehensive detection systems, and well-trained and exercised response services will help enable the resiliency that departments and agencies need for a swift recovery from a security incident/event; as per GC Business Continuity Management (BCM) requirements. The PGS and Federal Policy for Emergency Management identify Public Safety Canada (PS) as the Lead Security Agency for BCM. PS can provide additional information on BCM via their Centre for Resiliency and Continuity Management. Additionally, as society embraces technological advances, PDRR for physical security and information technology (IT)/cyber security are becoming more entwined. The PGS identifies the Communications Security Establishment (CSE) as the lead technical authority for IT security. CSE can provide additional information via their Canadian Centre for Cyber Security.

When designing a PDRR system, it is important that all aspects of the system work in a complementary fashion to ensure its effectiveness. To help in identifying the necessary aspects of a PDRR system, the following should be considered:

  1. What is of value or perceived value that an adversary may wish to:
    • Disclose (example: sell information to others)
    • Interrupt (example: stopping electrical power service to a facility)
    • Modify (example: change the intention of written documents or electronic files)
    • Destroy (example: burn)
    • Remove (example: steal)
  2. Who/what is the known or potential threat? Is the risk from:
    • An individual or group (client, former employee, current employee/insider threat)
    • An organization (organized crime, terror group)
    • Another nation (espionage, political or trade adversary)
    • Environmental Risks (natural disasters, climate change, remote locations, high crime)
  3. How/why a known or potential threat may impact the facility:
    • What is the known or likely method of intrusion or attack
    • What are the known or likely capabilities of an adversary
    • What are the known or assessed motivations of an adversary
    • What are the stated or assessed intentions of an adversary
    • What is the known history of incidents occurring in the area and/or against the GC, department, or agency

Once these considerations are investigated, assessed via a TRA, and addressed with interoperable protection barriers and measures, detection systems, and response personnel, departments and agencies can be better suited to mitigate the risk and enable timely recovery from threats to GC personnel, information, and real property.

Reference and Source Documents

Promulgation

Reviewed and recommended for approval.

I have reviewed and hereby recommend, GCPSG-019 (2023) - Protection, Detection, Response, and Recovery Guide, for approval.

Shawn Nattress
Manager
RCMP Lead Security Agency
2023-12-12

Approved

I hereby approve GCPSG-019 (2023) - Protection, Detection, Response, and Recovery Guide.

Andre St-Pierre
Director, Physical Security
Royal Canadian Mounted Police
2024-01-05

Date modified: