Security Risk Management
Security Risk Management (SRM) encompasses the entire process of identifying, assessing, controlling, and monitoring security risks. Risks are assessed based on threats (potential incidents), interests at stake, and the existing level of control. Based on the outcomes of this assessment, an organization can choose to accept, control (by reducing the likelihood or mitigating the impact), or avoid certain risks.
There is an important distinction between security management and security risk management during the assessment process:
Security management assumes that an incident can occur anytime and anywhere.
Security risk management, on the other hand, involves an explicit risk trade-off and prioritization process.
Policy Framework
To make such risk-based decisions—aligned with organizational objectives—policy choices are required.
This security policy, which applies to all sites and assets of the organization, should describe, among other things:
the security objectives to be achieved,
the threat profiles considered,
the assets and interests to be protected (both for the organization and its immediate environment),
the incident scenarios (types and frequencies) that are taken into account, and
the method of risk assessment used.
The results of the risk assessment are also recorded within this policy framework.
The Three Security “Gates”
Within the SRM approach, three “gates” are distinguished—each representing a potential point of intrusion:
The logical gate (cyber) – concerning digital and information security
The personnel gate (reliability) – concerning insider threats and trustworthiness
The physical gate (protection) – concerning access and physical safeguarding
Each gate requires its own detailed elaboration.
In the context of this assignment, we focus solely on the physical gate.
Control Measures
The policy choices described are translated into control measures, which are categorized as:
Organizational
Structural (or architectural)
Electronic
(often referred to together as OBE measures).
Additionally, the effectiveness and cost-efficiency of each measure are evaluated along the security chain, consisting of the following stages:
Proaction – eliminating risks as much as possible during the design phase (e.g. CPTED, zoning, architectural adjustments)
Prevention – controlling residual risks through additional measures (e.g. access control, CCTV)
Preparation – preparing for potential incidents (e.g. training, exercises, procedures, and instructions)
Pre-emption – intervening before an incident occurs (e.g. surveillance, profiling, monitoring)
Repression – responding during an incident (e.g. deployment of security staff, enforcement officers, police)
Aftercare – support following an incident (e.g. assistance, counseling, incident registration)
Integrated Process Control
By applying this security chain, the entire process of risk control is managed in a structured and coherent way.
The earlier measures are implemented within this chain, the more cost-effective the overall risk management process becomes.
Policy development, including the formulation of objectives and Security Impact Assessments (SIA), precedes this operational process.