[Cover Story] Feeling Vulnerable

Performing a facility vulnerability assessment is the first step in ensuring a secure plant.

You are probably aware of the increased concern for intentional contamination in the food industry. Perhaps you have participated in an informational session or seminar about food security/defense that the government and various educational organizations have provided. Upon returning to your plant, you probably wonder what your next step should be. The most logical sequence of events includes conducting a facility vulnerability assessment (FVA) and developing a food defense plan.

IDENTIFY VULNERABILITIES. A person(s) trained to evaluate security vulnerabilities and risks within your operation should conduct the FVA. There are many different methods to conduct an FVA, but they all share the goal of identifying the existing vulnerabilities and risks. Most FVAs use an approach referred to as a Triangular/Concentric Layered walk-through. This approach begins at the outermost portions of the facility, including the employee and visitor parking areas, and strategically works toward the inside areas of the building. A visible assessment of all areas surrounding the facility, including residential neighborhoods, streets, and alleyways will be made. At the conclusion of the assessment, a copy of the building plan/schematic should be observed.

The facility vulnerability assessment will identify various risks around the property and buildings. One of the most important steps is to evaluate how people and vehicles access company property. Unmarked property boundaries, lack of security signage, lack of physical barriers, and security threats from adjacent property will be evaluated. Identifying property boundaries is important so that signs can inform individuals the property is secured and trespassing is not allowed. Some companies define boundaries by using physical barriers such as bushes, signage, fences, or other measures. Unauthorized persons or vehicles on company property may lead to security risks and create an increased threat to authorized persons, vehicles, or other company assets located on the property.

The FVA should evaluate the presence or lack of physical barriers. It also will evaluate the presence of security signage. Various signs should indicate, "Private Property, No Trespassing", "All Vehicles and Persons Subject to Random Search", "High Security Property", "No Video Cameras Allowed," etc. Parking areas should be controlled so that authorized vehicles are easily identified. Visitor parking should be located as close to designated entry points as possible, and away from sensitive areas such as transport vehicles or ingredient/product storage vessels. Lighting around the facility also should be evaluated to minimize dark areas and to provide appropriate illumination from dusk to dawn. Other security risks will be evaluated and should be prioritized during the FVA.

BUILDING ACCESS. Next, evaluate how people access the building. Access control should be maintained so that employees and visitors are directed to designated entry points. These entry points should be designed so that only authorized persons are granted access. Door security is a critical component to access control.

Once inside, identify the critical assets within the building and determine what type of security measures are in place. For example, evaluate the ability of individuals to enter a sensitive area such as a laboratory or production area. Access control, employee and visitor identification, monitoring (such as CCTV), and other security measures should be evaluated. The persons conducting the FVA must identify the critical assets and understand their importance.

Much of the FVA will evaluate physical security measures, but another important aspect is the policies and procedures in place at the operation (i.e. key control, shipping/receiving, visitor entry, employee screening, chemical control, etc.). Lack of security policies and procedures may be as risky as not having a fence or secured doors.

When the FVA is completed, facility management and the company defense team should evaluate the findings. A plan should be developed to assess these risks and vulnerabilities and determine which issues will be addressed to reduce the risk. A formal defense plan should be developed and implemented.

The facility defense plan should implement specific measures to address concerns. Developing and implementing security policies and procedures will be critical to the success of the company’s defense program. Employee involvement is one of the most important components of the defense plan that is often overlooked. Educating all employees, from the president to the night janitor, about security policies is necessary. Employees ensure that procedures are followed and will also be the eyes and ears for the company to identify possible security issues.


CONCLUSION. A documented FVA and food defense plan are essential to maintain a high security level at any operation. Many customers and regulators require written security programs. Some customers include security in their supplier approval programs. A documented defense plan is essential to communicate the company’s commitment to protecting its product. The defense plan also should account for the safety and security of the company’s people, property, assets, and reputation.

The food industry has changed in recent years. An effective defense program is critical for the success of any food operation. Investing the time and resources to conduct a professional facility vulnerability assessment and develop a security plan will be money and time well spent. AIB

The author is Director of Food Defense, AIB International.

No more results found.
No more results found.