ICD 705 Physical and Technical

Security Standards

SOG-I, a disabled veteran owned and operated company has a select group of security professionals in the USA and International who perform or have been assigned the duties of Physical and Technical Security Services.  SOG-I will provide experienced project managers and resources to these select personnel in order to meet their organizations goals.

 

The goal is to aid midlevel physical security professionals to become proficient in planning, designing, constructing, evaluating, accrediting and maintaining the physical security level of an accredited Acess Control Facility (ACF), Security Secure Area (SSA), Sensitive Compartmented Information Facility Construction (SCIF). We will review your designs for compliance with ICD 705 Tech Specifications, and identify items that are not in compliance, areas of concern where compliance is questionable or items we feel that would not meet the intent of the SCIFs mission.

This includes: Site selection surveysDesign reviews Facility inspectionsEventually pre and post testing of facilities as needed and chosen by the customer.

 

Access Control Command System (ACCS)

SOG-I, SME's have experience in the engineering, general construction with design, and manufacturing of Access Control Command Systems (ACCS), the only host-based security system that is a single source solution for ACP Control System applications. SOG-I's ACCS is a state-of-the-art facility management and asset protection system. Developed to address the need for an integrated and seamless solution our ACCS design combines access control, perimeter protection, CCTV/DVR, traffic control, wrong way and over speed detection, and ACP Access Control into a single user-friendly stand-alone or networkable system.

 

The SOG-I, ACCS employs universal access control technology to automate the entry of personnel, vehicles, and visitors into a secure location. The ACCS integrates multiple standard hardware and software components including:

-Gates

-Identification Sensors
-CCTV
-Over Speed Detection
-Wrong way Detection
-Card Readers
-Detection Technologies Perimeter Intrusion Detection Systems
-Provide a Security Guard Force, as additional security support in  case security systems are temporary inoperable or being updated 

Our ACCS takes these components and combines them into a single, user-friendly product that provides security personnel with a scalable turnkey solution for controlling access into any facility in real time. The ACCS replaces older Programmable Logic Controller technology and is the new benchmark in ACP Control System.

 

Scalable to the need of the client, the SOG-I ACCS may be configured to meet the most exacting and demanding Access Control Point (ACP), standards while providing an interface that remains user-friendly.  The SOG-I ACCS is the new benchmark for Access Control Point Control Systems (ACPCS).

Threat/Risk Assessments

SOG-I conducts  Threat/Vulnerability Evaluation and Risk Analysis" from a “Physical and Technical” Aspect.

 

What are the most commonly mixed up security terms? Threat, vulnerability, and risk.  While it might be unreasonable to expect those outside the security industry to understand the differences, more often than not, many in the industry use these terms incorrectly or interchangeably. Perhaps definitions from Strategic Security Management can clarify this issue.

 

Asset – People, property, and information.  People may include employees and customers along with other invited persons such as contractors or guests.  Property assets consist of both tangible and intangible items that can be assigned a value.  Intangible assets include reputation and proprietary information.  Information may include databases, software code, critical company records, and many other intangible items. An asset is what we’re trying to protect.

 

Threat – Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset. A threat is what we’re trying to protect against.

 

Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. A vulnerability is a weakness or gap in our protection efforts.

 

Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. Risk is the intersection of assets, threats, and vulnerabilities.

 

Why is it important to understand the difference between these terms? If you don’t understand the difference, you’ll never understand the true risk to assets.  You see, when conducting a risk assessment, the formula used to determine risk is….

A + T + V=R

 

That is, Asset + Threat + Vulnerability=Risk.

 

Risk is a function of threats exploiting vulnerabilities to obtain, damage or destroy assets. Thus, threats (actual, conceptual, or inherent) may exist, but if there are no vulnerabilities then there is little/no risk. Similarly, you can have vulnerability, but if you have no threat, then you have little/no risk.

 

Accurately assessing threats and identifying vulnerabilities is critical to understanding the risk to assets.  Understanding the difference between threats, vulnerabilities, and risk is the first step.

 

SOG-I's utilizes security guide lines for Building Occupants and Assets                                                                                                       

SOG-I's, Luis Arellano is Chair Member of Anti-Terrorism Accreditation Board (ATAB).