{"id":371794,"date":"2024-10-20T02:26:22","date_gmt":"2024-10-20T02:26:22","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-232342021\/"},"modified":"2024-10-26T04:14:36","modified_gmt":"2024-10-26T04:14:36","slug":"bs-iso-232342021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-232342021\/","title":{"rendered":"BS ISO 23234:2021"},"content":{"rendered":"

This document provides requirements and recommendations for effective planning and design of security measures in the built environment.<\/p>\n

The purpose of the document is to achieve optimal protection of assets against all kinds of malicious acts, while ensuring functional, financial, and aesthetic aspects.<\/p>\n

The document describes which methods and routines need to be implemented in various stages of a building or civil engineering works project, as well as the competencies needed to achieve a good result.<\/p>\n

This document is applicable to new builds, refurbishments and development projects by government and private entities, for various environments, buildings and infrastructure.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
15<\/td>\n4 Planning of security measures for the built environment
4.1 General <\/td>\n<\/tr>\n
16<\/td>\n4.2 Security planning as part of risk management
4.3 Size of projects
4.4 Division of the building process into stages
4.4.1 General <\/td>\n<\/tr>\n
17<\/td>\n4.4.2 Strategic definition <\/td>\n<\/tr>\n
18<\/td>\n4.4.3 Preparation and brief
4.4.4 Concept design
4.4.5 Developed and technical design
4.4.6 Construction <\/td>\n<\/tr>\n
19<\/td>\n4.4.7 Testing and handover
4.4.8 In use
4.4.9 Decommissioning
4.5 Organization and principal <\/td>\n<\/tr>\n
20<\/td>\n4.6 Special advisers in security projects
4.6.1 General
4.6.2 Security planner
4.6.3 Security risk adviser <\/td>\n<\/tr>\n
21<\/td>\n4.6.4 Technical security adviser <\/td>\n<\/tr>\n
22<\/td>\n4.6.5 Operational security adviser
4.6.6 Project information security adviser <\/td>\n<\/tr>\n
23<\/td>\n5 Security deliverables in stages
5.1 Strategic definition
5.1.1 Asset inventory
5.1.2 Protective security objectives <\/td>\n<\/tr>\n
24<\/td>\n5.1.3 Requirements for protective security planning
5.1.4 Threat assessment, scenario selection and design-basis threats <\/td>\n<\/tr>\n
25<\/td>\n5.1.5 Information security for the project
5.1.6 Security risk analysis (strategic)
5.1.7 Clarification of conditions <\/td>\n<\/tr>\n
26<\/td>\n5.2 Preparation and brief
5.2.1 Input to the dependency map
5.2.2 Security risk analysis (preparation and brief)
5.2.3 External requirements report <\/td>\n<\/tr>\n
27<\/td>\n5.2.4 Security strategy
5.2.5 Input to zoning
5.2.6 Input to the spatial and functional programming
5.2.7 Identification and assessment of security measures
5.2.8 Cost survey <\/td>\n<\/tr>\n
28<\/td>\n5.2.9 Contributions to preliminary design report
5.3 Concept design
5.3.1 Reassessment of security objectives
5.3.2 Security risk analysis (concept)
5.3.3 Reassessment of security strategy
5.3.4 Description of security measures <\/td>\n<\/tr>\n
29<\/td>\n5.3.5 Integration of security measures
5.3.6 Selection of security measures
5.3.7 Input to operational requirements
5.3.8 Cost survey for concept
5.4 Developed and technical design
5.4.1 Input to tender drawings <\/td>\n<\/tr>\n
30<\/td>\n5.4.2 Input to delivery and job descriptions
5.4.3 Contributions in tender evaluation
5.4.4 Assessment of final design
5.5 Construction
5.5.1 Implementation control <\/td>\n<\/tr>\n
31<\/td>\n5.5.2 Participation in functional tests and commissioning
5.5.3 Input to the operations and maintenance manuals
5.5.4 Input to operational requirements
5.5.5 Requirements for alterations in security measures <\/td>\n<\/tr>\n
32<\/td>\n5.5.6 Assessment of as-built design
5.6 Testing and handover
5.6.1 Participation in handover
5.6.2 Completeness check
5.6.3 Quality and functionality check
5.7 In use
5.7.1 Contribution to trial use
5.7.2 Security training <\/td>\n<\/tr>\n
33<\/td>\n5.7.3 Security verification
5.8 Decommissioning
5.8.1 Overview of sensitive installations
5.8.2 Security risk assessment (decommissioning) <\/td>\n<\/tr>\n
34<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Buildings and civil engineering works. Security. Planning of security measures in the built environment<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n36<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":371804,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-371794","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/371794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/371804"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=371794"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=371794"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=371794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}