Workplace Physical Security Audit Checklist

The workplace security audit includes the verification of multiple systems and procedures – including the physical access control system – used for a comprehensive workplace security. 

workplace security audit checklist
A checklist should cover all major categories of the security audit

For easy use, download this physical security audit checklist as PDF which we've put together.

Some of the most important questions to ask:

  • Is a documented workplace security policy covering the physical security aspects in place/
  • Is access to the building/place restricted?
  • Are all access points monitored manually or electronically?
  • Is ID based access control in place?
  • Do you maintain a visitor record/register?
  • Are employees easily identifiable due badges or other visual IDs?
  • Are access cards, fobs or passwords highly secure?
  • Is the surveillance system installed and up to date?
  • Is security light properly installed and maintained?
  • Is an alarm system installed and maintained?
  • Do you check access control, surveillance and lighting system regularly?
  • Is testing record available to show?
  • Are all documents related to physical access control procedures updated and available?
  • Is workplace staff trained for emergency egress?
  • Any other customized activity or items installed and updated?

For most of these elements it's important to plan who will be implementing these procedures. In most cases it will be the IT manager or administrator in charge of the technical office operations. The person in charge of this aspect of the office should be aware of any permits, safety codes and inspections needed from the city or whichever governing body is overseeing the safety of people in the building.

5d08d720370a894ac9eeac18
template-3
container

How to Start a Workplace Security Audit Template

Preparation of a workplace security checklist is a detailed oriented assessment of your workplace security system dealing with personal, physical, procedural and information security. It can be conducted in a number of ways, from a full-scale technical analysis, to simple one-to-one interviews and surveys of the people in the workplace and their knowledge of the security policies already in place. An audit implies a comprehensive look at the workplace security elements being used and should not just be applied to one aspect of the space. In the case of an emergency (or some sort of technical breach), every point of entry and piece of wiring is important, especially in offices that contain sensitive information.

So you need to start with accessing security related to those categories. You can also get the help of security consultancy organizations to create a customized workplace security checklist for your company. You can also get help from the examples of workplace security checklists.

An audit should be conducted in a professional manner, with everyone in the office taking steps to minimize distractions or mistakes that could compromise the results. When scrutinizing the safety of your workplace, you should walk through the building and secure areas as if you are an outside expert seeing things for the first time. Ask yourself whether the safety directions are intuitive, easy to spot and have clear directions, whether it's an online procedure or a simple fire exit. Frequently interview the workers inside the building and gauge how strong their knowledge of the various security procedures is. Be prepared to take extensive notes on any blind spots you may notice, for both the physical space (emergency doors, lights, surveillance cameras, etc...) and the virtual space (i.e. email etiquette, internet firewalls, app authentications, mobile phone location services, etc...)

What Processes and Procedures Are Needed

  • Security system maintenance and improvement plan
  • Security policy and plan
  • Data management policy
  • Operational procedures
  • Security audit checklist
  • Privacy policy

A cloud-based access control system can streamline most of the moving parts of a workplace security audit. Since data from every unlock and the movements of every user are stored in the cloud, it is much easier for the administrator (or IT manager) to aggregate this data to gain insight on how effective the existing security procedures are. Kisi is the perfect example of a modern access control system that takes out some of the uncertainty in rating your own workplace security when it comes to the crucial entry and exit points of the office. For an administrator, this data is easily exported and ready for analysis from anywhere.

5d08d831370a895c58eec465
template-6
section