Comprehensive Guide

Property Security Assessment Checklist: A Professional Framework for Tennessee Businesses

A structured, printable security assessment checklist covering perimeter, building, technology, personnel, and threat-specific evaluations, built on ASIS International methodology and adapted for Tennessee properties.

Last Updated: March 2026 25 min read 4,500+ words

01What Is a Security Assessment (and Why Every Tennessee Business Needs One)

A security assessment checklist is a structured tool used to systematically evaluate the physical security posture of a property, facility, or campus. It identifies vulnerabilities, measures existing countermeasures against established standards, and produces a prioritized list of recommendations for improvement. Whether you manage a warehouse in Memphis, a corporate office in Nashville, or a retail property in Knoxville, a well-executed security assessment is the foundation of every effective security program.

The concept is straightforward: you cannot protect what you have not measured. A security assessment walks through every layer of your property's defenses, from the perimeter fence to interior access controls to the procedures your personnel follow, and assigns a score to each element. The result is a clear, data-driven picture of where your security stands today and what needs to change.

The methodology in this guide draws from the ASIS International General Security Risk Assessment (GSRA) guidelines, widely considered the industry standard for physical security evaluation. ASIS International is the world's leading organization for security management professionals, and their framework provides the structured approach that separates a professional assessment from a casual walkthrough.

Why It Matters for Tennessee Businesses

Liability reduction. Tennessee follows a comparative fault system for premises liability. Property owners and managers have a legal duty to provide reasonable security measures. A documented security assessment demonstrates that you have exercised due diligence in identifying and addressing security risks. Without one, a plaintiff's attorney can argue that you were unaware of, or chose to ignore, foreseeable threats.

Insurance premium reduction. Many commercial insurance carriers offer premium discounts to businesses that can demonstrate proactive security management. A documented assessment with a resulting improvement plan shows underwriters that you take risk management seriously. Some carriers specifically require security assessments for certain property types or coverage levels.

Crime deterrence. The act of assessing and improving security has a measurable deterrent effect. Visible security measures, proper lighting, functional cameras, controlled access points, signal to would-be offenders that the property is monitored and protected. Research consistently shows that properties with layered security measures experience fewer incidents than those without.

Regulatory compliance. Depending on your industry, you may face specific security requirements from regulatory bodies. Healthcare facilities must comply with HIPAA physical safeguard requirements. Financial institutions face FFIEC and Gramm-Leach-Bliley physical security mandates. Even general businesses must meet OSHA workplace safety standards that include security considerations.

Tennessee-specific considerations. The state's rapid growth, particularly in the Nashville metropolitan area, the Chattanooga corridor, and the Memphis logistics hub, means that neighborhoods and threat profiles are changing quickly. A property that was low-risk five years ago may now be adjacent to new development, increased traffic patterns, or shifting demographics that alter the security landscape. Tennessee's position in Tornado Alley also means that natural disaster preparedness must be part of any comprehensive security assessment.

Key Takeaway

A security assessment is not a one-time event, it is a recurring process that should be conducted at least annually and after any significant change to your property, operations, or threat environment. The checklist in this guide provides the framework to make that process consistent and thorough.

02Who Should Conduct the Assessment

The question of who should perform your security assessment depends on your property's complexity, risk level, budget, and the purpose of the assessment. Both internal (self-conducted) and professional (third-party) assessments have their place in a well-managed security program.

Internal Self-Assessments

Self-assessments using a structured checklist like this one are appropriate for ongoing monitoring between professional assessments, small to medium properties with straightforward security needs, property managers who want to establish a baseline before hiring a professional, and organizations with trained security managers on staff. The advantage of self-assessment is cost-effectiveness and the ability to conduct them frequently. A property manager who walks the checklist quarterly will catch deteriorating conditions, burned-out lights, malfunctioning cameras, propped-open doors, before they become serious vulnerabilities.

Professional Assessments

Professional third-party assessments are recommended when you are establishing a new security program from scratch, after a significant security incident, for high-value or high-risk properties such as financial institutions, healthcare facilities, or data centers, when required by insurance carriers or regulatory bodies, or when you need an independent, defensible evaluation for litigation or compliance purposes.

When selecting a professional assessor, look for individuals holding the CPP (Certified Protection Professional) or PSP (Physical Security Professional) certifications from ASIS International. The CPP is considered the gold standard in security management, it requires a minimum of nine years of security experience (or seven with a bachelor's degree), and candidates must pass a comprehensive examination covering security principles, investigations, physical security, personnel security, information security, crisis management, and legal aspects. The PSP focuses specifically on physical security and is ideal for assessors who specialize in facility protection.

Several Tennessee security companies offer professional assessment services alongside their guard and technology services. Firms like Shield of Steel provide site assessments as part of their security consulting offerings. Larger regional providers such as Walden Security also maintain dedicated assessment teams with CPP- and PSP-certified professionals on staff.

Cost Ranges for Professional Assessments

Property Type Typical Cost Range Timeline
Small retail / office $2,000 – $5,000 1–2 days on-site
Mid-size facility / warehouse $5,000 – $10,000 2–3 days on-site
Large campus / multi-building $10,000 – $15,000+ 3–5 days on-site
High-security (data centers, etc.) $15,000 – $30,000+ 5+ days on-site

Key Takeaway

Use self-assessments for ongoing monitoring and professional assessments for establishing baselines, post-incident reviews, and compliance documentation. The two approaches complement each other, they are not mutually exclusive.

03The Assessment Framework

This checklist follows a five-step methodology rooted in the ASIS International General Security Risk Assessment process. Understanding this framework will help you apply the checklist more effectively and interpret your results with the right context.

Step 1: Identify Assets. What are you protecting? This includes people (employees, visitors, customers), physical assets (equipment, inventory, cash), information (documents, data, intellectual property), and reputation (brand image, customer trust). Every property has a unique asset profile, and your assessment should be weighted toward protecting your most critical assets.

Step 2: Identify Threats. What could go wrong? Threats include criminal activity (theft, burglary, vandalism, assault), workplace violence, natural disasters, terrorism, civil unrest, and internal threats such as employee theft or sabotage. In Tennessee, threat profiles vary significantly by region, a Nashville entertainment district faces different threats than a rural distribution center.

Step 3: Identify Vulnerabilities. Where are the gaps? This is the core of the checklist, systematically examining every layer of security to find weaknesses that a threat could exploit. A vulnerability is any gap, deficiency, or weakness in your security posture.

Step 4: Assess Risk. Risk is the product of likelihood and impact. A threat that is very likely to occur but has minimal impact may be a lower priority than a rare event with catastrophic consequences. The scoring system in this checklist helps you quantify both dimensions.

Step 5: Prioritize Countermeasures. Based on your risk scores, develop a prioritized list of security improvements. High-risk vulnerabilities with low-cost solutions should be addressed first. This step transforms your assessment from a diagnostic exercise into an actionable improvement plan.

Scoring System Used in This Checklist

Each checklist item should be scored on a 1-to-5 scale. When applying this checklist to your property, assign a score to each item based on the following definitions:

Score Rating Definition
1 Critical No countermeasure in place; immediate action required
2 Poor Minimal or ineffective countermeasure; significant improvement needed
3 Adequate Basic countermeasure in place but with notable gaps or weaknesses
4 Good Effective countermeasure with minor room for improvement
5 Excellent Best-practice countermeasure fully implemented and maintained

04Section 1: Perimeter Security Assessment

The perimeter is your first line of defense. It defines the boundary between public and private space and should create a clear deterrent and delay for unauthorized entry. Perimeter security follows Crime Prevention Through Environmental Design (CPTED) principles, the idea that the physical environment can be designed and managed to reduce the opportunity for crime.

Fencing

Evaluate your perimeter fencing for type, height, condition, and effectiveness. Chain-link fencing should be a minimum of 7 feet tall with 3-strand barbed wire or razor ribbon for high-security applications. Ornamental fencing should be at minimum 6 feet with anti-climb features such as pointed finials. Check for gaps underneath the fence line (ground clearance should be no more than 2 inches), damage from weather or vehicle impact, and signs of cutting or tampering. Gates should be of equal or greater strength than the fence line and should self-close and self-lock.

Vehicle Barriers

Assess barriers designed to control or prevent vehicle access. Bollards should be rated for the appropriate vehicle threat, K-rated bollards for high-security applications, decorative bollards for general traffic control. Evaluate planters, jersey barriers, and raised curbing for their effectiveness as vehicle standoff measures. Loading dock approaches and building entrances are priority areas for vehicle barrier assessment.

Perimeter Lighting

Lighting is one of the most cost-effective security measures available. The Illuminating Engineering Society (IES) provides recommended foot-candle levels for different areas. For security purposes, evaluate against these minimums: parking areas should have 1 to 2 foot-candles of illumination at ground level, building entrances and exits should have 5 or more foot-candles, loading docks and service areas should have 5 or more foot-candles, critical areas such as cash-handling zones or high-value storage access should have 50 or more foot-candles. Beyond raw illumination levels, check for uniformity, dark pockets between light fixtures create hiding spots. Evaluate timer and photocell operation to ensure lights activate at the correct times. Note any fixtures that are burned out, damaged, or obscured by vegetation.

Access Points

Map every perimeter access point including vehicle gates, pedestrian gates, emergency exits, and any informal access points such as gaps in fencing or habitually propped doors. Each access point should be evaluated for access control (locks, card readers, or guard staffing), visibility from occupied areas, lighting, signage, and hours of operation. Minimize the number of active access points, every entry and exit is a potential vulnerability.

Landscaping and Natural Surveillance

CPTED principles recommend the "3-foot/6-foot rule" for landscaping: shrubs should be maintained below 3 feet and tree canopies should be trimmed above 6 feet to maintain clear sightlines. Evaluate whether landscaping creates concealment opportunities near entrances, windows, or parking areas. Trees should not provide access to upper floors or rooftops. Natural surveillance, the ability for occupants and passersby to observe the property, should be maximized by avoiding solid fencing on street-facing perimeters where appropriate.

Signage

Assess the presence and condition of security-related signage. "No Trespassing" signs establish legal standing for trespassing enforcement. Camera notification signs serve as a deterrent and may be legally required in some contexts. Property boundary markers, parking restrictions, and visitor direction signs all contribute to access control. Signage should be clearly visible, in good condition, and compliant with Tennessee state law.

Perimeter Security Scoring Checklist

  • Fencing: type, height, condition, anti-climb features (Score: __ /5)
  • Fencing: gaps, ground clearance, signs of tampering (Score: __ /5)
  • Vehicle barriers: bollards, planters, rated protection (Score: __ /5)
  • Lighting: foot-candle levels meet IES recommendations (Score: __ /5)
  • Lighting: uniformity, no dark spots, timers/sensors functional (Score: __ /5)
  • Access points: controlled, lit, visible, minimized in number (Score: __ /5)
  • Landscaping: 3-foot/6-foot rule, clear sightlines, CPTED compliant (Score: __ /5)
  • Signage: trespassing warnings, camera notices, boundary markers (Score: __ /5)

Section Total: __ /40

05Section 2: Building Exterior Assessment

The building envelope is your second layer of defense. Once someone has breached the perimeter, the building exterior must provide sufficient delay and detection to prevent unauthorized entry. This section evaluates doors, windows, loading areas, roof access, utilities, and service areas.

Doors

Exterior doors should be evaluated against ANSI/BHMA (American National Standards Institute / Builders Hardware Manufacturers Association) grading standards. Grade 1 hardware is commercial-grade and recommended for primary entry points. Grade 2 is acceptable for low-traffic secondary doors. Grade 3 is residential-grade and generally insufficient for commercial applications. Check for deadbolt locks with a minimum 1-inch throw, non-removable hinge pins on outswing doors, reinforced strike plates with 3-inch screws, and door frames free of rot, warping, or damage. Gap clearances between the door and frame should not exceed 1/8 inch to prevent shimming or tool insertion. Electronic access control on primary entry points should log all entries with timestamps.

Windows

Ground-floor windows and any windows accessible from adjacent structures, fire escapes, or rooftops require particular attention. Evaluate lock types and functionality, sash locks, keyed locks, or pin locks depending on window type. Consider security film for ground-floor glazing, which holds glass in place after impact and significantly delays forced entry. Break sensors (glass-break detectors) should be installed on accessible windows, especially those not visible from occupied areas or the street. Upper-floor windows that are accessible from rooftops or adjacent structures should not be overlooked.

Loading Docks

Loading docks are a common security weak point because they are designed for large openings and frequent access. Evaluate roll-up door security, locks, sensors, and whether doors can be secured from inside only. Personnel access doors in loading areas should have the same level of access control as primary entrances. Delivery verification procedures should be documented: is there a delivery schedule, are drivers verified against expected deliveries, and is there a check-in process? Camera coverage of all loading dock activity is essential.

Roof Access

Evaluate all means of accessing the roof including fixed ladders, retractable ladders, stairwell hatches, and HVAC access points. Fixed ladders should have locking covers or cages that prevent unauthorized climbing. Roof hatches should be locked from below and alarmed. HVAC units on the roof should not provide access to the building interior through unsecured ductwork or service panels. Any exterior features that could serve as improvised ladders, dumpsters near walls, low-hanging tree branches, stacked materials, should be identified and addressed.

Utility Access

Electrical panels, water shutoff valves, natural gas meters, and telecommunications access points should all be secured against unauthorized access and tampering. Electrical panels in particular should be in locked enclosures, an unsecured electrical panel allows an intruder to cut power to alarms, cameras, and lighting. Telecom access points (demarcation boxes, fiber termination points) should be locked and ideally alarmed, as cutting communications can disable security systems and delay emergency response.

Dumpster and Service Areas

Dumpsters should be enclosed and positioned away from the building whenever possible. An unenclosed dumpster adjacent to a building provides concealment for intruders and can be used as a platform to access windows or the roof. Dumpster areas should be well-lit and within camera coverage. Service areas for HVAC, generators, and other equipment should be fenced or enclosed and locked.

Building Exterior Scoring Checklist

  • Doors: ANSI/BHMA grade, deadbolts, hinge pins, frames (Score: __ /5)
  • Doors: gap clearances, electronic access, audit logging (Score: __ /5)
  • Windows: locks, security film, break sensors, accessibility (Score: __ /5)
  • Loading docks: door security, access control, delivery verification (Score: __ /5)
  • Roof access: ladders secured, hatches locked/alarmed, HVAC access (Score: __ /5)
  • Utilities: electrical, water, gas, telecom, all locked/secured (Score: __ /5)
  • Dumpster/service areas: enclosed, lit, away from building (Score: __ /5)

Section Total: __ /35

06Section 3: Interior Security Assessment

Interior security controls manage access, monitor activity, and protect people and assets within the building. This layer assumes the perimeter and building exterior have been breached, either by an intruder or by someone who has legitimate building access but needs to be restricted from sensitive areas.

Access Control Systems

Evaluate the access control technology in use, card readers, biometric scanners (fingerprint, facial recognition), PIN pads, or a combination. Multi-factor authentication (card plus PIN, for example) should be used for high-security areas. Assess tailgating prevention measures such as mantraps, turnstiles, or anti-passback features that prevent a credential from being used to enter a zone it has already entered. Ensure that access levels are role-based and reviewed regularly, former employees and expired contractors should be removed promptly.

Visitor Management

Evaluate visitor sign-in procedures including identification verification, badge issuance, escort requirements, and log maintenance. Digital visitor management systems that photograph visitors and print temporary badges with expiration times are the current best practice. Visitor logs should be retained for a minimum of 90 days. Assess whether visitors are restricted to specific areas and whether the escort policy is actually enforced.

Key Management

Physical key control remains critical even in buildings with electronic access control, since many areas still use physical locks. Evaluate the key control policy: is there a documented key issuance and return process, is there a master key system with appropriate hierarchy, and is there an electronic audit trail for key cabinet access? Key cabinets should be secured and ideally electronic with logging. When keys are lost or an employee departs without returning keys, rekeying procedures should be in place and consistently followed.

Alarm Systems

Evaluate intrusion alarm coverage zone by zone. Are all exterior doors and accessible windows on alarm contacts? Are interior motion sensors placed to cover likely intrusion paths? Assess the monitoring arrangement, is the alarm professionally monitored by a central station, and what is the expected response time? Review alarm response procedures: who is notified, in what order, and what is the verification process? Check the alarm system's battery backup and test frequency. False alarm rates should be tracked and addressed, as high false alarm rates lead to complacency.

Camera Placement and Coverage

Map camera coverage against the floor plan to identify blind spots. Priority coverage areas include all entry and exit points, lobbies and reception areas, hallways and stairwells, parking areas, cash handling areas, server rooms, and storage areas for high-value items. Evaluate camera resolution, 1080p should be considered the minimum for any new installation, with 4K recommended for areas where facial identification is important. Check camera angles to ensure they capture faces rather than just the tops of heads. Assess night vision or infrared capability for low-light areas.

Emergency Exits and Life Safety

Emergency exit paths must be clear of obstructions at all times. Illuminated exit signs must be functional and visible. Emergency exit doors must be equipped with panic hardware (push bars) and should not be locked in a way that prevents egress. However, they should be alarmed to prevent unauthorized use as entry points. Assess the balance between security (keeping people out) and life safety (letting people out), life safety always takes priority.

Safe Rooms and Shelter-in-Place Areas

Identify designated safe rooms for active threat scenarios and shelter-in-place areas for natural disasters. Safe rooms should have solid-core doors with locks operable from inside, communication capability (phone or radio), and basic supplies. Shelter-in-place areas for tornadoes, a critical consideration in Tennessee, should be interior rooms on the lowest floor, away from windows and exterior walls. These areas should be clearly marked and known to all occupants.

Sensitive Areas

Server rooms, cash-handling areas, pharmaceutical storage, evidence rooms, and other sensitive areas require additional security layers. Evaluate whether these areas have dedicated access control (separate from general building access), environmental monitoring (temperature, humidity, water detection for server rooms), camera coverage, and alarm contacts. Server rooms should have restricted access lists reviewed monthly.

Interior Security Scoring Checklist

  • Access control: technology, multi-factor, tailgating prevention (Score: __ /5)
  • Visitor management: sign-in, badges, escorts, logging (Score: __ /5)
  • Key management: policy, audit trail, rekeying procedures (Score: __ /5)
  • Alarm systems: coverage, monitoring, response, backup power (Score: __ /5)
  • Cameras: coverage, resolution, angles, blind spots, night vision (Score: __ /5)
  • Emergency exits: clear paths, illuminated signs, panic hardware (Score: __ /5)
  • Safe rooms / shelter areas: designated, equipped, marked (Score: __ /5)
  • Sensitive areas: dedicated access, monitoring, camera coverage (Score: __ /5)

Section Total: __ /40

07Section 4: Personnel and Procedures Assessment

Technology and physical barriers are only as effective as the people and procedures that operate them. A state-of-the-art access control system is useless if guards prop doors open. A comprehensive camera system provides no value if no one reviews the footage. This section evaluates the human element of your security program.

Guard Post Orders

If you employ security guards, whether in-house or contracted, evaluate the quality and currency of their post orders. Post orders should be written, comprehensive, and accessible at each guard station. They should cover routine duties, access control procedures, patrol requirements, emergency response protocols, reporting procedures, and escalation contacts. Post orders should be reviewed and updated at least quarterly. Ask guards if they have read and understand their post orders, you may be surprised at the answers.

Patrol Routes and Verification

Guard patrols should be documented with specific routes covering all areas of the property. Patrol timing should be randomized to prevent predictability, a patrol that occurs at exactly the same time every hour is easy for an adversary to plan around. Evaluate whether patrol routes cover parking areas, building perimeter, stairwells, restrooms, loading docks, and other vulnerable areas. Guard tour verification technology, GPS-based or NFC checkpoint systems, should be used to confirm that patrols are actually being conducted as required. Supervisors should review patrol data regularly.

Incident Reporting

Evaluate whether there is a standardized incident reporting system in place. Reports should capture the who, what, when, where, and how of every security event. Digital reporting systems are preferred over handwritten logs for searchability, consistency, and timestamp verification. Assess the chain of custody for evidence, photographs, video clips, and physical evidence should be documented and preserved. Review recent incident reports for completeness and timeliness.

Emergency Response Plans

Emergency response plans should be documented, accessible, and regularly drilled. Evaluate plans for fire, active shooter, severe weather (tornado, flooding), bomb threat, medical emergency, and utility failure scenarios. Plans should include evacuation routes, assembly points, communication procedures, and roles and responsibilities. Tennessee properties should place particular emphasis on tornado response given the state's position in Tornado Alley, severe weather drills should be conducted at least twice annually. Verify that plans have been updated within the past 12 months and that all personnel have been trained on current procedures.

Employee Screening and Termination

Assess background check procedures for new hires, particularly for positions with access to sensitive areas, cash, or confidential information. Evaluate whether background checks include criminal history, employment verification, and reference checks. Drug testing policies should be documented and consistently applied. Equally important are termination procedures: when an employee departs, is access immediately revoked across all systems? Are keys, badges, and company property collected? Is there a documented exit procedure, and is IT notified to disable accounts? A delayed termination process is one of the most common sources of insider security incidents.

Personnel and Procedures Scoring Checklist

  • Post orders: written, current, comprehensive, accessible (Score: __ /5)
  • Patrol routes: documented, randomized, all areas covered (Score: __ /5)
  • Guard tour verification: GPS/NFC checkpoints, supervisor review (Score: __ /5)
  • Incident reporting: standardized, digital, complete, timely (Score: __ /5)
  • Emergency plans: documented, trained, drilled, updated annually (Score: __ /5)
  • Employee screening: background checks, drug testing, references (Score: __ /5)
  • Termination procedures: immediate access revocation, property return (Score: __ /5)

Section Total: __ /35

08Section 5: Technology Assessment

Security technology multiplies the effectiveness of physical barriers and personnel. However, technology is only as good as its implementation, maintenance, and the procedures that support it. This section evaluates your surveillance, access control, alarm, communication, and cybersecurity systems.

CCTV and Video Surveillance

Assess your camera system beyond simple camera count. Key evaluation criteria include coverage versus camera count (a well-placed camera is worth more than three poorly placed ones), resolution (1080p minimum, 4K recommended for identification-critical areas), video retention (30 days minimum, 90 days recommended for most commercial properties), night vision and infrared capability for low-light and after-hours coverage, monitoring approach (live monitoring versus recorded-only, live monitoring enables response, recording-only only supports investigation), remote access capability for management and law enforcement, and recording system redundancy (what happens if the NVR fails or is stolen?).

Access Control Technology

Evaluate the access control system's technology type (proximity cards, smart cards, biometric, mobile credentials), integration with other systems (alarm, video, elevator control), audit logging capability and retention, anti-passback functionality (preventing a card from being used to enter a space it is already in), and lockdown capability (the ability to secure all doors simultaneously in an emergency). The system should provide real-time reporting and alerts for events such as forced doors, held-open doors, and access attempts with invalid credentials.

Alarm and Detection Systems

Assess all alarm systems including intrusion detection (door contacts, motion sensors, glass-break detectors), fire and smoke detection (code-required, but verify functionality), environmental monitoring (water, temperature, humidity, critical for server rooms and storage areas), and duress/panic buttons (locations, testing, and monitoring). For each alarm type, evaluate the monitoring service, expected response time, and verification procedures. Mass notification capability, the ability to send alerts to all occupants via text, email, or PA system, should be assessed for emergency communication readiness.

Communication Systems

Security communication systems include guard radios (assess coverage, battery life, and encryption), intercom systems (entry verification, parking garage call stations), emergency notification systems (PA, mass text, email alerts), and two-way communication at access points. Evaluate whether communication systems have battery backup to function during power outages and whether there is a backup communication method if the primary system fails.

Cybersecurity for Physical Security Systems

Modern physical security systems are networked, IP cameras, access control panels, and alarm systems all connect to your network. This creates cybersecurity vulnerabilities that must be assessed. Evaluate network segmentation: are security devices on a separate VLAN or network from general business traffic? Have default passwords been changed on all devices? Is firmware regularly updated? Is remote access secured via VPN rather than exposed to the internet? Are security system credentials managed with the same rigor as other critical system credentials? A compromised camera system or access control panel can undermine your entire physical security program.

Important

Many security breaches originate from compromised IP cameras or access control systems that still use default passwords or have not been updated with security patches. If your physical security devices are on the same network as your business systems, a compromised camera can become a gateway to your entire network.

Technology Scoring Checklist

  • CCTV: coverage, resolution, retention, night vision, monitoring (Score: __ /5)
  • CCTV: remote access, redundancy, NVR security (Score: __ /5)
  • Access control: integration, audit logging, anti-passback, lockdown (Score: __ /5)
  • Alarms: intrusion, fire, environmental, duress, monitoring (Score: __ /5)
  • Communications: radios, intercoms, mass notification, backup (Score: __ /5)
  • Cybersecurity: network segmentation, passwords, firmware, VPN (Score: __ /5)

Section Total: __ /30

09Section 6: Threat-Specific Assessments

Beyond general physical security, certain threats require dedicated assessment and planning. This section covers four critical threat categories that every Tennessee business should evaluate: active shooter, natural disaster, workplace violence, and cybersecurity for physical security systems.

Active Shooter Preparedness

Active shooter preparedness has become a necessary component of every comprehensive security program. Evaluate your facility's preparedness across these dimensions: has Run/Hide/Fight (or equivalent) training been provided to all employees, and is it refreshed annually? Are lockdown procedures documented and tested, can doors be locked quickly from inside, and are there designated safe rooms? Has your organization coordinated with local law enforcement on response procedures, including providing floor plans and access information? Is there a communication plan for alerting occupants during an active threat, and does it include multiple channels (PA, text, email)? Have tabletop exercises or live drills been conducted within the past 12 months?

Natural Disaster Preparedness

Tennessee faces significant natural disaster risks that must be addressed in your security assessment. Tornadoes and severe storms are the primary weather threat, particularly from March through June. Evaluate whether your facility has designated tornado shelter areas on the lowest floor, away from windows and exterior walls. Are shelter areas clearly marked and known to all occupants? Are NOAA weather radios or alert systems in place? Do you have emergency supply kits (water, first aid, flashlights, batteries) in shelter areas? Flooding is an additional risk in many Tennessee communities, assess whether your facility has a flood response plan if located in or near a flood-prone area. Business continuity plans should address prolonged loss of power, communications, and building access following a disaster event.

Workplace Violence Prevention

Workplace violence encompasses a range of behaviors from threats and harassment to physical assault. Assess whether your organization has a threat assessment team or process for evaluating concerning behaviors. Are reporting procedures in place and known to all employees? Is there a clear, confidential way to report threats without fear of retaliation? If restraining orders have been issued against anyone regarding an employee, has the security team been notified and has a safety plan been developed? Does your organization provide or facilitate access to an Employee Assistance Program (EAP) for employees experiencing personal crises that could escalate to workplace violence?

Cybersecurity for Physical Security Systems

This topic was introduced in the Technology Assessment section, but deserves deeper evaluation as a standalone threat. IoT devices, which include most modern security cameras, access control panels, and alarm communicators, are frequent targets for cyberattack. Assess whether all IoT security devices are inventoried and tracked, whether devices are isolated on a dedicated network segment, whether firmware update procedures are documented and followed on a regular schedule, whether access to security system administration is restricted and logged, and whether default credentials have been changed on every device. A compromised physical security system does not just expose your network, it can disable cameras, unlock doors, and silence alarms.

Threat-Specific Scoring Checklist

  • Active shooter: Run/Hide/Fight training, lockdown, LE coordination (Score: __ /5)
  • Active shooter: communication plan, drills conducted (Score: __ /5)
  • Natural disaster: shelter areas, weather alerts, supplies, plans (Score: __ /5)
  • Natural disaster: business continuity, flood plan if applicable (Score: __ /5)
  • Workplace violence: threat assessment, reporting, EAP, safety plans (Score: __ /5)
  • Cyber-physical: IoT inventory, segmentation, firmware, credentials (Score: __ /5)

Section Total: __ /30

10Scoring and Prioritization Framework

Once you have scored every item in the checklist, the next step is to assess overall risk using a standard risk matrix. Risk is the product of two factors: the likelihood that a threat will exploit a given vulnerability and the impact that exploitation would have on your organization. The 5x5 risk matrix below is used by ASIS International and most security professionals worldwide.

5x5 Risk Matrix

Likelihood / Impact Negligible (1) Minor (2) Moderate (3) Major (4) Catastrophic (5)
Almost Certain (5) 5 10 15 20 25
Likely (4) 4 8 12 16 20
Possible (3) 3 6 9 12 15
Unlikely (2) 2 4 6 8 10
Rare (1) 1 2 3 4 5

Risk Level Definitions

Low Risk (1–4)

Acceptable risk. Monitor and address during routine maintenance cycles.

Medium Risk (5–9)

Elevated risk. Address within 90 days. Include in next budget cycle.

High Risk (10–15)

Significant risk. Address within 30 days. Allocate resources immediately.

Critical Risk (16–25)

Unacceptable risk. Immediate action required. Implement interim measures now.

Calculating Your Overall Security Score

Your overall security score is the sum of all individual item scores divided by the maximum possible score, expressed as a percentage. The maximum possible score from all six checklist sections in this guide is 210 points (40 + 35 + 40 + 35 + 30 + 30). For example, if your total score is 147, your security score is 147/210 = 70%. Use the following benchmarks to interpret your overall score:

Score Range Rating Interpretation
90–100% Excellent Best-practice security posture. Continue monitoring and maintaining.
75–89% Good Solid foundation with minor gaps. Develop targeted improvement plan.
60–74% Adequate Meaningful vulnerabilities present. Prioritize and address within 90 days.
40–59% Poor Significant gaps in security posture. Immediate action needed on critical items.
Below 40% Critical Serious security deficiencies. Engage professional help immediately.

Prioritizing Remediation

Not all findings are created equal. When prioritizing remediation, use a simple framework: address high-risk, low-cost items first. Changing default passwords on cameras costs nothing but dramatically reduces cyber-physical risk. Replacing burned-out security lights is inexpensive but immediately improves deterrence. On the other end, installing a new perimeter fence is a capital expenditure that requires budget allocation and planning. Map each finding on a cost-versus-risk grid to identify your quick wins, then build a phased plan for larger investments.

11Creating Your Security Improvement Plan

A security assessment is only valuable if it leads to action. The improvement plan transforms your findings into a structured roadmap with clear priorities, timelines, responsibilities, and budgets. Without this step, the assessment is just a report that sits on a shelf.

Step 1: Prioritize by Risk Score

List all findings from your assessment and assign each a risk score using the 5x5 matrix. Sort the list from highest to lowest risk score. Any item scoring 16 or above (critical risk) should be flagged for immediate attention, these are vulnerabilities that represent an unacceptable level of risk to your organization.

Step 2: Estimate Costs

For each finding, develop a rough cost estimate for remediation. Costs fall into three categories: no cost (procedural changes, policy updates, password changes), low cost (under $5,000, lighting repairs, lock upgrades, signage, training), and capital investment ($5,000+, camera systems, access control upgrades, fencing, structural modifications). Having cost estimates allows you to make informed decisions about budget allocation and phasing.

Step 3: Create Your Timeline

Timeline Priority Level Examples
Immediate (0–7 days) Critical risk items, no/low cost Change default passwords, fix propped doors, replace burned-out lights
30 days High risk items, low/medium cost Install additional locks, update post orders, conduct emergency drill
90 days Medium risk items, medium cost Camera upgrades, access control improvements, policy development
Annual plan Lower risk items, capital investments Perimeter fencing, comprehensive camera system, building modifications

Step 4: Assign Responsibility

Every action item needs an owner. Assign a specific person (not a department) to each item with a clear deadline. Responsibility without accountability is meaningless, build status reviews into your regular management meetings to track progress.

Step 5: Budget Allocation

Security budgets should be proportional to the value of the assets being protected and the risk environment. A general industry guideline is 2 to 6 percent of a facility's operating budget for security, though this varies widely by industry and risk profile. Allocate budget by timeline phase, fund immediate and 30-day items from current operating budgets, and plan 90-day and annual items into the next budget cycle. Present the risk matrix and cost estimates to decision-makers to justify expenditures with data rather than anecdotes.

Quick Wins vs. Capital Improvements

Quick wins are changes that cost little or nothing but provide immediate security improvement: updating procedures, enforcing existing policies, fixing broken equipment, trimming overgrown landscaping, and training personnel. Capital improvements, new camera systems, access control installations, fencing projects, take longer to plan, fund, and implement but provide lasting infrastructure upgrades. A balanced improvement plan addresses both simultaneously.

Tennessee security providers can assist with developing and implementing improvement plans. Many companies offer consultation services that go beyond guard staffing to include security system design, installation project management, and ongoing program management. Engaging a professional for the implementation phase can be particularly valuable for organizations without in-house security expertise.

Key Takeaway

The best security improvement plan addresses quick wins immediately while building a phased roadmap for capital improvements. Start with items that are high-risk and low-cost, they deliver the greatest security value per dollar spent and demonstrate momentum to stakeholders.

12Printable Checklist Summary

Use this condensed checklist as a quick-reference during your property walkthrough. Print this page or save it for use in the field. Score each item 1 through 5 using the scoring definitions from Section 03.

Perimeter Security (8 items, Max 40 pts)

  • Fencing type, height, condition, and anti-climb features __ /5
  • Fencing gaps, ground clearance, and tampering signs __ /5
  • Vehicle barriers and bollards __ /5
  • Lighting foot-candle levels at IES standards __ /5
  • Lighting uniformity, no dark spots, timers working __ /5
  • Access points controlled, lit, minimized __ /5
  • Landscaping follows CPTED 3-foot/6-foot rule __ /5
  • Signage: trespass warnings, camera notices __ /5

Building Exterior (7 items, Max 35 pts)

  • Doors: ANSI/BHMA grade, deadbolts, hinges, frames __ /5
  • Doors: gap clearances, electronic access, logging __ /5
  • Windows: locks, security film, break sensors __ /5
  • Loading docks: door security, delivery verification __ /5
  • Roof access: ladders, hatches, HVAC secured __ /5
  • Utilities: electrical, water, telecom locked __ /5
  • Dumpster/service areas: enclosed, lit, distanced __ /5

Interior Security (8 items, Max 40 pts)

  • Access control: technology, multi-factor, anti-tailgating __ /5
  • Visitor management: sign-in, badges, escorts, logs __ /5
  • Key management: policy, audit trail, rekeying __ /5
  • Alarm systems: zones, monitoring, response, backup __ /5
  • Camera coverage: blind spots, resolution, angles __ /5
  • Emergency exits: clear, illuminated, panic hardware __ /5
  • Safe rooms / shelter areas: equipped, marked __ /5
  • Sensitive areas: dedicated access, monitoring __ /5

Personnel and Procedures (7 items, Max 35 pts)

  • Post orders: written, current, comprehensive __ /5
  • Patrol routes: documented, randomized, complete __ /5
  • Guard tour verification: GPS/NFC, reviewed __ /5
  • Incident reporting: standardized, digital, timely __ /5
  • Emergency plans: documented, drilled, updated __ /5
  • Employee screening: background, drug, references __ /5
  • Termination: access revoked, property returned __ /5

Technology (6 items, Max 30 pts)

  • CCTV: coverage, resolution, retention, night vision __ /5
  • CCTV: remote access, NVR redundancy, security __ /5
  • Access control: integration, logging, lockdown __ /5
  • Alarms: intrusion, fire, environmental, panic __ /5
  • Communications: radios, intercoms, mass notify __ /5
  • Cybersecurity: segmentation, passwords, firmware __ /5

Threat-Specific (6 items, Max 30 pts)

  • Active shooter: training, lockdown, LE coordination __ /5
  • Active shooter: communication plan, drills __ /5
  • Natural disaster: shelters, alerts, supplies, plans __ /5
  • Natural disaster: business continuity, flood plan __ /5
  • Workplace violence: threat team, reporting, EAP __ /5
  • Cyber-physical: IoT inventory, segmentation, updates __ /5

Total Score Calculation

Perimeter Security:__ /40 Building Exterior:__ /35 Interior Security:__ /40 Personnel & Procedures:__ /35 Technology:__ /30 Threat-Specific:__ /30
Overall Total: __ /210 = ___ %

13Frequently Asked Questions

How often should a security assessment be conducted?

Most security professionals recommend conducting a comprehensive security assessment at least once per year. However, you should also perform assessments after any significant security incident, major tenant or occupancy change, building renovation or expansion, change in the surrounding neighborhood or threat landscape, or after a natural disaster. Interim self-assessments using a checklist like this one can be conducted quarterly to catch deteriorating conditions between professional reviews.

What is the difference between a security assessment and a security audit?

A security assessment is a broad evaluation of your overall security posture, identifying vulnerabilities and recommending improvements. It is forward-looking and focuses on "what should we do better?" A security audit is a more formal process that measures your existing security program against a specific set of standards, regulations, or compliance requirements. It is backward-looking and focuses on "are we meeting the standard?" Both are valuable, but they serve different purposes. Assessments are generally more flexible and practical for most businesses, while audits are necessary when compliance with specific frameworks (HIPAA, PCI-DSS, etc.) is required.

How much does a professional security assessment cost?

Professional security assessments in Tennessee typically range from $2,000 to $15,000 depending on the size and complexity of the property. Small retail locations or single-floor offices may fall on the lower end ($2,000–$5,000), while large campuses, multi-building facilities, or high-security environments such as data centers or financial institutions can cost $10,000 to $30,000 or more. Some security companies offer a basic site assessment as part of their proposal process at no charge, though these are typically less comprehensive than a dedicated assessment engagement.

Can I conduct a security assessment myself?

Yes, you can conduct a basic security assessment using a structured checklist like this one. Self-assessments are valuable for ongoing monitoring, identifying obvious vulnerabilities, and establishing a baseline understanding of your security posture. However, professional assessors bring specialized training, experience across many different facility types, familiarity with current threat tactics, and knowledge of advanced security technologies. For high-risk properties, properties with a history of incidents, or situations requiring a legally defensible evaluation, a professional assessment is strongly recommended.

What certifications should a security assessor have?

The most respected certifications for security assessors are the CPP (Certified Protection Professional) and PSP (Physical Security Professional) from ASIS International. The CPP requires extensive experience in security management and covers a broad range of security domains. The PSP focuses specifically on physical security assessments, applications, and principles. Other relevant credentials include the CPO (Certified Protection Officer) from IFPO and various state-specific security consultant licenses. In Tennessee, anyone providing security consulting services for compensation should hold the appropriate state licensure.

How long does a security assessment take?

A thorough professional security assessment typically takes 1 to 5 days of on-site evaluation depending on the facility size and complexity, plus an additional 2 to 4 weeks for report writing and delivery. A small retail location or single-floor office may require only a single day on-site. A mid-size warehouse or multi-story building typically needs 2 to 3 days. Large campuses or multi-location assessments can take a full week or more of on-site work. Self-assessments using a structured checklist can often be completed in a few hours for smaller properties or over the course of a day for larger ones.

What happens after a security assessment?

After a professional security assessment, you receive a detailed report documenting all findings, risk scores for each vulnerability, and prioritized recommendations for improvement. The next step is to create a security improvement plan, as outlined in Section 11 of this guide, that translates findings into specific action items with timelines, budgets, and assigned owners. You then implement changes, starting with the highest-risk and lowest-cost items. Follow-up assessments should be scheduled to verify that improvements have been implemented effectively and to identify any new vulnerabilities that may have emerged.

Do I need a security assessment for insurance purposes?

While not universally required, many commercial insurance providers offer premium discounts, sometimes 5 to 15 percent, for businesses that can demonstrate proactive security measures through a documented assessment. Some carriers require security assessments for specific property types, high-value locations, or certain coverage levels. Beyond premium savings, a documented security assessment and improvement plan can be critically important for liability defense following a security incident. If a lawsuit alleges inadequate security, demonstrating that you conducted regular assessments and acted on findings shows due diligence that can limit your exposure.

14About TN Security Review

TN Security Review is an independent resource for Tennessee businesses evaluating private security services. We publish in-depth company reviews, side-by-side provider comparisons, and practical guides like this one to help property managers, business owners, and security directors make informed decisions about protecting their people and assets.

This guide is provided for informational purposes and does not constitute professional security consulting advice. For properties with complex security needs, high-value assets, or regulatory compliance requirements, we recommend engaging a qualified security professional to conduct a formal assessment tailored to your specific situation.