{"id":371794,"date":"2024-10-20T02:26:22","date_gmt":"2024-10-20T02:26:22","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-232342021\/"},"modified":"2024-10-26T04:14:36","modified_gmt":"2024-10-26T04:14:36","slug":"bs-iso-232342021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-232342021\/","title":{"rendered":"BS ISO 23234:2021"},"content":{"rendered":"
This document provides requirements and recommendations for effective planning and design of security measures in the built environment.<\/p>\n
The purpose of the document is to achieve optimal protection of assets against all kinds of malicious acts, while ensuring functional, financial, and aesthetic aspects.<\/p>\n
The document describes which methods and routines need to be implemented in various stages of a building or civil engineering works project, as well as the competencies needed to achieve a good result.<\/p>\n
This document is applicable to new builds, refurbishments and development projects by government and private entities, for various environments, buildings and infrastructure.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4 Planning of security measures for the built environment 4.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.2 Security planning as part of risk management 4.3 Size of projects 4.4 Division of the building process into stages 4.4.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.4.2 Strategic definition <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.4.3 Preparation and brief 4.4.4 Concept design 4.4.5 Developed and technical design 4.4.6 Construction <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.4.7 Testing and handover 4.4.8 In use 4.4.9 Decommissioning 4.5 Organization and principal <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.6 Special advisers in security projects 4.6.1 General 4.6.2 Security planner 4.6.3 Security risk adviser <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.6.4 Technical security adviser <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.6.5 Operational security adviser 4.6.6 Project information security adviser <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5 Security deliverables in stages 5.1 Strategic definition 5.1.1 Asset inventory 5.1.2 Protective security objectives <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.1.3 Requirements for protective security planning 5.1.4 Threat assessment, scenario selection and design-basis threats <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.1.5 Information security for the project 5.1.6 Security risk analysis (strategic) 5.1.7 Clarification of conditions <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.2 Preparation and brief 5.2.1 Input to the dependency map 5.2.2 Security risk analysis (preparation and brief) 5.2.3 External requirements report <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.2.4 Security strategy 5.2.5 Input to zoning 5.2.6 Input to the spatial and functional programming 5.2.7 Identification and assessment of security measures 5.2.8 Cost survey <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.2.9 Contributions to preliminary design report 5.3 Concept design 5.3.1 Reassessment of security objectives 5.3.2 Security risk analysis (concept) 5.3.3 Reassessment of security strategy 5.3.4 Description of security measures <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.3.5 Integration of security measures 5.3.6 Selection of security measures 5.3.7 Input to operational requirements 5.3.8 Cost survey for concept 5.4 Developed and technical design 5.4.1 Input to tender drawings <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.4.2 Input to delivery and job descriptions 5.4.3 Contributions in tender evaluation 5.4.4 Assessment of final design 5.5 Construction 5.5.1 Implementation control <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.5.2 Participation in functional tests and commissioning 5.5.3 Input to the operations and maintenance manuals 5.5.4 Input to operational requirements 5.5.5 Requirements for alterations in security measures <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.5.6 Assessment of as-built design 5.6 Testing and handover 5.6.1 Participation in handover 5.6.2 Completeness check 5.6.3 Quality and functionality check 5.7 In use 5.7.1 Contribution to trial use 5.7.2 Security training <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.7.3 Security verification 5.8 Decommissioning 5.8.1 Overview of sensitive installations 5.8.2 Security risk assessment (decommissioning) <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Buildings and civil engineering works. Security. Planning of security measures in the built environment<\/b><\/p>\n |