Threat Information
Plan & Build
NPSA undertake a number of functional evaluation schemes for automated access control products
Perimeter Intrusion Detection Systems is a generic term which covers a wide range of technologies designed to provide advance warning of an intruder gaining access to a secure area
NPSA have developed this guidance as we often see security being considered too late in the design process where the physical security measures conflict with the design aspirations
NPSA have published the following new guidance: Forced Entry Standards - A guide to forced entry protection standards for facades and other building elements used within the UK
Doors form an essential part of physical security and are often required to perform several functions
Security walling systems can be used to provide enhanced levels of security around important assets, sensitive material or people.
The overarching objective of the FARM project is to seek and identify materials capable of improving the forcible attack resistance of security products against modern tools
Guidance to aid those responsible for developing, designing, and delivering a new perimeter solution
Secure rooms are often used for the storage of sensitive information or large assets. They are primarily designed to protect against surreptitious attack, but may offer some resistance to forcible entry.
In general terms, secure working areas are areas within buildings or facilities where personnel work with sensitive information or assets.
Role of properly implemented perimeter security measures as part of a site security scheme and how to identify what is needed.
An essential tool to enable you to produce a clear, considered, high-level statement of security needs based on the risks faced
The intelligent, co-ordinated promotion of protective security provision to the hostile.
It is important that you understand the risks associated with deploying these technologies, whether they relate to location sensitivities, data protection considerations or privacy concerns
NCST are highly functional computers which are connected to a network and need to be suitably protected
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems.
Electronic attack of physical security systems is the means of carrying out a localised cyber-attack specifically on the security system. This can be to corrupt data, open a portal or disable alarms.
An introduction for Local Authorities, Event organisers, and similar end user groups on using temporary Vehicle Security Barriers (VSBs) as part of a HVM scheme - which itself should be one piece of a wider security plan.
Operate & Detect
Closed-Circuit Television (CCTV) is a system in which images are monitored and recorded for surveillance and security purposes. NPSA have updated the page to include a new Introduction to CCTV video
Locks, technology & control rooms can help control who can go where and when. These systems integrate with physical barriers to provide delay and detection against a multitude of attackers.
Updated guidance on Intrusion Detections Systems (IDS) is now available. IDS are sited within a building and offer out of hours protection when the building or buildings are locked at night
All perimeters will require points of access and for secure perimeters; this is the optimal location for controlling access for authorised personnel
Entry points into a building provide the first impression to staff and visitors of both the business and the site security posture
Advice on the use of active access delay systems which can disorient and delay attackers from entering the site(s)
Passport to Good Security - Control Access: the level of security in your access control system needs to be a balance between business needs and effective security.
Passport to Good Security - Search and Screening: your threat assessment will give you a good idea of the likely risks posed by anyone - and anything - entering your premises
Protective security is important for a site’s own infrastructure which is crucial for it to function or could present hazards if attacked.
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems.
Response & Review
Marauding terrorist attacks are fast-moving, violent incidents where assailants move through a location aiming to find and kill or injure as many people as possible
Effective Command and Control is critical to mitigating the impact of terrorist incidents. Information is provided that is intended to enhance the capability of Security Control Room (SCR) operators to respond to incidents
NPSA have published two guidance documents for developing a dispersal plan and a quick guide to developing incident plans for small businesses
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems
Complete Guidance
A well-run control room can provide the fundamental principles of Deter, Detect and Delay
Automatic Access Control Systems (AACS) provide detection and audit to limit who can go where.
The consequences of failing to plan properly for new security projects or upgrades of existing security measures can be costly.
NPSA runs various functional evaluation schemes for perimeter intrusion detection products. This page describes the schemes and the process that manufacturers should follow for product submission
Security lighting plays an important part of any site’s security regime. Good quality and well planned lighting will assist your guard force
A tracking system can assist and aid the response force following initial detection of intrusion.
These systems are essential for the safe, secure and resilient operation of most built assets, and their potential vulnerability should addressed when assessing potential threats.
Effective security risk management requires an organisation to have defined governance and oversight of protective security management systems.
Locks and locking hardware need to provide security against forcible and/or surreptitious attack
Guidance for data centre owners and users. You should use this guidance to inform your own risk management strategy that is unique to your organisation’s needs
NPSA has a wide range of protective security guidance products relevant to Public Premises and Events
Guidance covering a wide range of topics that will help keep your public premises and events safe and secure, intended both for security managers and other managers whose responsibilities include security
Guidance for organisations’ senior leaders, highlighting the importance of senior leadership in achieving effective security
NPSA and NCSC have written guidance about Network Connected Security Technologies (NCST)
NPSA’s Passport to Good Security for Senior Executives sets out 20 principles for effective security management
Increase awareness relating to fraudulent documentation and improve the vigilance of your security personnel
Physical and personnel security measures for major events require specific consideration due to their dynamic and complex character.
Here you can find information on further external resources and standards relevant to data centre security


