Uploaded by Ahmed Elkholy

NEOM-NSE-PRC-001 01.00 - Security Standard Procedure

advertisement
SECURITY DOCUMENT
SECURITY STANDARD PROCEDURE
NEOM-NSE-PRC-001 Rev 01.00 July 2022
©NEOM [2022]. All rights reserved.
Document History
Revision code
Description of changes
Purpose of issue
Date
First Issue
Issued for Implementation
20.07.2022
Rev 01.00
Document Approval
Prepared by
Reviewed by
Approved by
Name
Alawi Alogbel
ETSD
Naif Rabeah
Adel Wihaib
Job Title
Industrial Security
Planning Manager
-
Senior Manager –
Security Capability
Development
Executive Director,
Public Safety
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 OF 311
Contents
1
INTRODUCTION .................................................................................................................... 11
2
DESIGN DEVELOPMENT PROCESS................................................................................... 14
3
SECURITY THREAT & RISK ASSESSMENT METHODOLOGY ......................................... 17
4
DESIGN STAGE REVIEWS & DELIVERABLES .................................................................. 23
5
MINIMUM SECURITY REQUIREMENTS .............................................................................. 41
ANNEX A - SECURITY FUNCTIONAL REQUIREMENTS (NON-INDUSTRIAL) ............................... 49
ENVIRONMENTAL REQUIREMENTS – ALL SYSTEMS ................................................................... 49
TESTING REQUIREMENTS – ALL SECURITY INFRASTRUCTURE ................................................ 51
A1: VIDEO SURVEILLANCE SYSTEMS AND VIDEO ANALYTICS .................................................. 53
A2: OTHER SURVEILLANCE SYSTEMS ........................................................................................... 64
A3: ACCESS CONTROL SYSTEMS ................................................................................................... 66
A4: INTRUDER DETECTION SYSTEMS............................................................................................. 77
A5: DURESS ALARMS ........................................................................................................................ 80
A6: SECURITY LIGHTING ................................................................................................................... 84
A7: CYBER SECURITY........................................................................................................................ 88
A8: PERIMETER SECURITY BARRIERS AND ENTRY POINTS....................................................... 91
A9: VEHICLE SECURITY BARRIERS ............................................................................................... 101
A10: COUNTER-UNMANNED AERIAL SYSTEMS .......................................................................... 115
A11: BLAST PROTECTION ............................................................................................................... 122
A12: BALLISTIC PROTECTION ........................................................................................................ 125
A13: SECURITY DOORSETS ............................................................................................................ 128
A14: SECURITY GLAZING ................................................................................................................ 133
A15: MANUAL LOCK SECURITY ..................................................................................................... 142
A16: SEARCHING, SCREENING AND DETECTION ....................................................................... 145
A17: SECURITY CONTROL ROOMS AND MONITORING POINTS ................................................ 156
A18: HVAC, INTAKES AND DUCTING ............................................................................................. 163
ANNEX B - SECURITY FUNCTIONAL REQUIREMENTS (INDUSTRIAL) ...................................... 166
ENVIRONMENTAL REQUIREMENTS – ALL SYSTEMS ................................................................. 166
TESTING REQUIREMENTS – ALL SECURITY INFRASTRUCTURE .............................................. 168
B1: VIDEO SURVEILLANCE SYSTEMS AND VIDEO ANALYTICS ................................................ 171
B2: OTHER SURVEILLANCE SYSTEMS ......................................................................................... 182
B3: ACCESS CONTROL SYSTEMS ................................................................................................. 184
B4: INTRUDER DETECTION SYSTEMS........................................................................................... 192
B5: DURESS ALARMS ...................................................................................................................... 195
B6: SECURITY LIGHTING ................................................................................................................. 199
B7: CYBER SECURITY...................................................................................................................... 203
B8: PERIMETER SECURITY BARRIERS – FENCES AND GATE HOUSES .................................. 206
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 OF 311
B9: VEHICLE SECURITY BARRIERS ............................................................................................... 219
B10: COUNTER-UNMANNED AERIAL SYSTEMS .......................................................................... 231
B11: BLAST PROTECTION ............................................................................................................... 237
B12: BALLISTIC PROTECTION ........................................................................................................ 240
B13: SECURITY DOORSETS ............................................................................................................ 242
B14: SECURITY GLAZING ................................................................................................................ 247
B15: MANUAL LOCK SECURITY ..................................................................................................... 256
B16: SEARCHING, SCREENING AND DETECTION ....................................................................... 259
B17: SECURITY CONTROL ROOMS AND MONITORING POINTS ................................................ 270
B18: HVAC, INTAKES AND DUCTING ............................................................................................. 277
ANNEX C- CONSTRUCTION SITE (TEMPORARY) ......................................................................... 280
C1: INTRODUCTION .......................................................................................................................... 280
C2: CONSTRUCTION SITE SECURITY INFRASTRUCTURE REQUIREMENTS ........................... 283
C3: CONSTRUCTION SITE SECURITY AUDIT CHECKLIST .......................................................... 290
C4: PERIMETER FENCE SPECIFICATION ...................................................................................... 298
ANNEX D: SITE CATEGORIZATION MATRIX ................................................................................. 305
ANNEX E: SECURITY MANUAL CONTENTS .................................................................................. 309
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 OF 311
Executive Summary
The Security Standard has been developed to guide those developing the security scope for NEOM
projects. The aim is to define a baseline security requirement to protect and safeguard NEOM assets.
The approach advocated is a risk-based one, recognising that each element will be different but still
requires an appropriate level of security suited to the specific site.
By underpinning the design with a risk-based approach, NEOM will benefit from a more creative
approach that is focused on innovative solutions that are suited to the intended function of the facility.
Each site will be categorised, whereby an assessment is made to determine the specific Protection
Group, Site Classification and Design Route that will be assigned to the site. This assessment will be
undertaken by the designer and then reviewed for authorisation by the NEOM Public Safety
Department.
This document sets out the deliverable expectations at each Development Stage and Stage Review
that will evidence and support the production of a well-considered security design.
It is critical that all designers embed security within their approach to ensure that the NEOM Security
Vision of a Trust Neighbourhood and Resilient Society is achieved.
The Security Standard provides the security requirements for the built environment in NEOM.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 OF 311
Abbreviations
Acronym
Description
ACS
Access Control System
AIS
Automatic Identification System
ALPR
Automatic Licence Plate Readers
ATS
Alarm Transmission Systems
BLE
Bluetooth Low Energy
CBRN
Chemical, Biological, Radiological and Nuclear
CCTV
Closed Circuit Television
CER
Computer Equipment Room
CPTED
Crime Prevention Through Environmental Design
C-UAS
Counter Unmanned Aerial System
DBT
Design Basis Threat
DTIE
Detection, Tracking, Identification, Effect.
FAR
False Alarm Rate
FoV
Field of View
GUI
Graphical User Interface
HCIS
High Commission for Industrial Security
HD
High Definition
HVAC
Heating, Ventilation, Air-Conditioning
HVM
Hostile Vehicle Mitigation
ICAO
International Civil Aviation Organization
IDS
Intruder Detection Systems
IED
Improvised Explosive Device
IP
Internet Protocol
IR
Infra-Red
ISPS
International Shop and Port Facility Security Code
MEP
Mechanical, Electrical and Plumbing
NFC
Near Field Communications
ONVIF
Open Network Video Interface Forum
OR
Operational Requirement
PBIED
Person Borne Improvised Explosive Device
PDCA
Plan, Design, Check, Act
POE
Power Over Ethernet
PPM
Pixels Per Metre
PPS
Pictures Per Second
PSD
(NEOM) Public Safety Department
PSIM
Physical Security Information Management
PTZ
Pan, Tilt, Zoom
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 OF 311
Acronym
Description
PvB
Polyvinyl Butyral
RVSS
Radar Video Surveillance System
SCR
Security Control Room
SER
Server Equipment Room
SFR
Security Functional Requirement
SR
Stage Review
SOLAS
International Convention for the Safety of Life at Sea
SR
Security Rating
STRA
Security, Threat and Risk Assessment (use interchangeably with TVRA)
TVRA
Threat, Vulnerability and Risk Assessment (used interchangeably with STRA)
VBIED
Vehicle Borne Improvised Explosive Device
VDA
Vehicle Dynamic Assessment
VMS
Video Management System
VSB
Vehicle Security Barrier
VSS
Video Surveillance Systems
WTMD
Walk Through Metal Detector
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 OF 311
Definitions
Term
Description
Adversary
Any individual, group, organisation or government that conducts activities or has the
intention and capability to conduct activities detrimental to critical assets. Adversaries
can include insiders, outsiders or the two acting in collusion.
Alert State
Describes a progressive, qualitative measure of the likelihood of an adversary’s actions,
from negligible to imminent, based on international, national, or local intelligence
information.
Asset
Any real or personal property, tangible or intangible, that a company or individual owns
that can be given or assigned a monetary value. Intangible property includes things
such as goodwill, proprietary information, and related property. For purposes of this
guideline, people are included as assets
Asset category
Assets may be categorized in many ways. Among these are:
— people.
— hazardous materials (used or produced).
— information.
— environment.
— equipment.
— facilities.
— activities/operations.
— company reputation.
Benefit
Amount of expected risk reduction based on the overall effectiveness of
countermeasures.
Capability
Means to accomplish a mission, function, or objective.
Consequences
The outcome of an event, commonly measured in four ways—human, economic,
mission, and psychological—but may also include other factors such as impact on the
environment.
NOTE 1: An event can lead to a range of consequences.
NOTE 2: A consequence can be certain or uncertain and can have positive or negative
effects on objects.
NOTE 3: Consequences can be expressed qualitatively or quantitatively.
NOTE 4: Consequences can escalate through kock-on-effects / cascading and
cumulative effects.
Consequence
Assessment
Product or process of identifying or evaluating the potential or actual effects of an event,
incident, or occurrence.
Co-Planning
Meetings with stakeholders to analyse data, co-design site plans, establish advisory
design panels, facilitate community groups for feedback.
Countermeasures
An action, measure, or device intended to reduce an identified risk
Crime Forecasts
Future oriented time series analysis, trend projection of crime patterns, computer
simulations.
Crime Statistics
Property/personal crime, drug crime, rates increasing/decreasing.
Critical Asset
Any asset that is essential for the organization to deliver its products and/or services.
Criticality
The impact of a loss event, typically calculated as the net cost of that event. Impact can
range from fatal, resulting in a total recapitalization, abandonment, or long-term
discontinuance of the enterprise, to relatively unimportant
Criticality
Assessment
Product or process of systematically identifying, evaluating, and prioritizing based on
the importance of an impact to mission(s), function(s), or continuity of operations.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 OF 311
Term
Description
Delay
A countermeasure strategy that is intended to provide various barriers to slow the
progress of an adversary in penetrating a site to prevent an attack or theft or in leaving
a restricted area to assist in their apprehension and prevention of theft.
Demographics
Look for impact on safety from: Density, age, mobility, ethnicity, tenure.
Design Charrettes
Multiple stakeholders collaborate with architectural designers on tabletop exercise with
site drawings.
Design Team
Refers to the appointed consultant(s) or contractor teams who are engaged on the site
or project stage.
Detection
A countermeasures strategy that is intended to identify an adversary attempting to
commit a security event or other criminal activity to provide real-time observation and
post-incident analysis of the activities and identity of the adversary.
Deterrence
A countermeasures strategy intended to prevent or discourage the occurrence of a
breach of security through fear or doubt. Physical security systems such as warning
signs, lights, uniformed guards, cameras, and barriers are examples of
countermeasures that provide deterrence.
Edge
Edge refers to where a capability, processing or storage occurs at the sensor device
rather than centrally in the system. This is common amongst simple video analytics
applications.
GIS
Crime mapping and pattern analysis, hot spot analysis, trends, density analysis, traffic
counts and patterns.
Key Asset
A key asset is defined as an asset that would severely reduce or restrict the delivery of
the function of a facility.
Intelligence
Information to characterise specific or general threats, including adversaries’ motivation,
capabilities, and activities.
Long Term
Long term is defined as any effect or loss of capability that will significantly exceed the
Recovery Time Objective for a facility or capability. These are tailored to the use of the
facility or capability and therefore may vary from seconds for a data centre to weeks for
a non-essential function or capability.
Medium Term
Medium term is defined as any effect or loss of capability that goes beyond the
Recovery Time Objective for a facility or capability.
Mitigation
A measure designed to reduce the risk either in likelihood or impact.
Permanent
Any asset (i.e. Building, structure, or facility) that operate/will operate in the same
location for 2 years or more.
Physical security
Security systems, infrastructure and devices intended to improve protection. Examples
include fencing, gates, walls, doors, turnstiles, locks, motion detectors, vehicle barriers
and reinforced glazing.
Plan Review
Concept drawings, site plans, architectural renderings: look for territoriality, access
control, surveillance, space hierarchy, movement predicators, entrapment areas,
lighting, landscaping.
Protection Group
The grading of the facility in the respect of security.
Recovery Time
Objective
The RTO is the specified time for the restoring of normal functionality or full capability.
Response
The act of reacting to a perceived or actual criminal activity immediately upon its
detection or post-incident.
Risk
Effect of uncertainty on objectives.
NOTE 1: An effect is a deviation from the expected - positive and/or negative.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 OF 311
Term
Description
NOTE 2: Objectives can have different aspects such as financial, health, safety, and
environmental goals and can apply at different levels such as strategic, organizationwide, project, product, and process.
NOTE 3: Risk is often charaterized by reference to potential events, consequences, or a
combination of these and how they can affect the achievement of objectives.
NOTE 4: Risk is often expressed in terms of a combination of the consequences of an
event or a change in circumstances and the associated likelihood of occurrence.
Safety Audits
Multiple stakeholders conduct night-time audit, perception and fear data, suggested
solutions to perceived problems.
Search Conference
Facilitated visioning workshop with multiple stakeholders searching for ideal futures and
solutions to design flaws.
Security, Threat
and Risk
Assessment
(STRA)
Risk (R) assessment is the process of determining the likelihood (L) of a threat (T)
successfully exploiting vulnerability (V) and the resulting degree of consequences (C)
on an asset. A risk assessment provides the basis for rank ordering of risks and thus
establishing priorities for the application of countermeasures.
Shall
A term used to indicate a mandatory requirement.
Should
A term used to indicate a recommendation or that which is advised but not required.
Site Interviews
Interviews related to travel routes, public transit routes, perceptions/experiences of
crime and safety, use of space, designated use and design fit.
Site Visit
Daytime, night-time, photo surveys: look for territoriality, access control, surveillance,
space hierarchy, movement predicators, entrapment areas, lighting, landscaping.
Social Asset Maps
Focus groups, data analysis, marketing studies and asset mapping looking at: social
cohesion, difficult to reach groups, financial assets, cultural assets, gang issues, race
issues.
Surveys
Mail-out, telephone questionnaires, victimization surveys, perception data.
Temporary
Any asset (i.e. Building, structure, or facility) that operate/will operate in the same
location for more than 4 months and less than 2 years and that is intended for a onetime basis, interim basis.
Threat Level
The threat level is based on international, national, or local intelligence information.
Different security measures may be implemented as an Alert State for each facility
based on the threat level.
Time Series
Prior crime trends over 5 years by monthly, weekly, daily pattern.
All definitions have been adapted or generated for NEOM.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 0 OF 31 1
1
Introduction
NEOM aspires to be the safest place on Earth. A key element of this is that security is
considered in all NEOM development. Vulnerability is designed out, and security is designed
in, providing an enduring, efficient, and effective solution.
One of NEOM’s most critical Security Objectives is building a resilient society ready to face all types
of hazards.
NEOM's Resilience Concept is structured along 10 essential building blocks:
1
Organize for Risk and Resilience - Establish Risk Reduction as a key consideration across
NEOM'S Strategic Plan. Define an Organizational structure to drive risk reduction and resilient
development.
2 Identify, Understand and Use Current and Future Risk Scenarios - Prepare and maintain an allhazards risk database, capturing past, current and predicted events. Develop contingency
planning across all sectors to mitigate and manage these events.
3 Strengthen Financial Capacity for Resilience - Prepare a financial plan for embedding risk
reduction and resilience across NEOM and contingency funding for emergency scenarios.
4 Pursue Resilient Urban Development and Design - Carry out risk-informed urban planning and
development decisions based on up-to-date risk assessments, compliant codes and international
best practice.
5 Safeguard Natural Resources to Enhance the Protective Functions Offered by Natural
Ecosystems - Identify, protect and monitor natural ecosystems within and outside the NEOM
geography to sustain and safeguard their protective functions and enhance their use for risk
reduction.
6 Strengthen Sector Capacity for Resilience - Strengthen NEOM sectors with effective capabilities
to implement risk management and resilience through the introduction of overall risk ownership.
7 Understand and Strengthen Societal Capacity for Resilience - Foster and strengthen the ability of
the NEOM community to be resilient through support and partnership.
8 Build and raise Infrastructure Resilience - Provide adequate Critical Regional Infrastructure and
develop a plan for its resilient enduring operation.
9 Ensure Effective Preparedness and Disaster Response - Ensure effective disaster response by
creating and regularly reviewing contingency and preparedness plans.
10 Expedite Recovery and Build Back Better - Establish strategies for post-disaster recovery,
rehabilitation and reconstruction for an improved and more resilient NEOM environment.
The Security Standard is designed to be a practical guide to those involved in all interim and
permanent NEOM development. The document is divided into distinct sections to provide easy to
understand requirements for the types of design projects across NEOM.
These areas of the document are applicable to all development projects within NEOM regardless of
being a construction, interim or end-state facility or site:
•
Section 2 covers the Design Development Process and the development requirements,
deliverables and approvals required at each Development Stage and Stage Review.
•
Section 3 covers the methodology and approach to be followed by all projects for the
development of a site-specific Security Threat and Risk Assessment.
•
Section 4 covers the Design Stage Reviews & Deliverables that are applicable to the design
routes for security development on NEOM projects.
•
Section 5 covers the Minimum-Security Requirements associated with each Protection Group.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 1 OF 31 1
•
Annex A contains the Security Functional Requirements for Non-Industrial sites across NEOM
for each security element:
o
A1: Video Surveillance Systems and Video Analytics
o
A2: Other Surveillance Systems
o
A3: Access Control Systems
o
A4: Intruder Detection Systems
o
A5: Duress Alarms
o
A6: Security Lighting
o
A7: Cyber Security – compliance with CISO requirements.
o
A8: Perimeter Security Barriers and Entry Points
o
A9: Vehicle Security Barriers
o
A10: Counter-Unmanned Aerial System
o
A11: Blast Protection
o
A12: Ballistic Protection
o
A13: Security Doorsets
o
A14: Security Glazing
o
A15: Manual Lock Security
o
A16: Search, Screening and Detection
o
A17: Security Control Rooms and Monitoring Points
o
A18: HVAC, Intakes and Ducting
Annex A is applicable to all sites that have been designated as Non-Industrial Sites by the
NEOM Public Safety Department, following the designer’s recommendation.
•
Annex B – contains the Security Functional Requirements for Industrial sites. The Annex will set
out the minimum-security requirements for industrial sites across each of the same security
elements outlined within Annex A.
Annex B is applicable to all sites that have been designated as Industrial Sites by the
NEOM Public Safety Department, following the designer’s recommendation.
•
Annex C – contains the Security Functional Requirements for Constructions Sites. This annex
sets outs the minimum-security requirements that should be in place for construction sites.
Annex C is applicable to all construction sites and associated sites that are not covered
under Annex A or B.
•
Annex D – contains the Site Categorisation Matrix template that sets out the process to
determining the recommended Protection Group, Classification, and recommended design route.
Document hierarchy is shown on the subsequent schematic including parent documents that the
designer should be familiar with to understand your obligations and the context of security in
NEOM.
•
Annex E – contains the minimum requirements for each site, facility or building Security Manual.
This document must be produced for each and is an integral part of security management.
Security is an enabling factor that provides the platform for a safe and secure NEOM Society.
A consistent baseline design response for security based upon the risk profile of the
development, its users and its criticality are key.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 2 OF 31 1
Regulatory Requirements
Security Information Handling Requirements
The development, handling and dissemination of security information must be in compliance with the
following requirements:
•
Security information shall be classified as "confidential” and shall be accessed/shared by
authorized individuals on a strictly ‘need-to-know’ basis.
•
Security information (including information related to non-security systems supporting security)
will be required at each design stage and is to be contained within a stand-alone package, which
is separate from all other non-security related documents.
•
Security information may also reside within other non-security documents, this information must
be sanitized (limited) to what is required to communicate, while maintaining the clarity and context
in support of a non-security function.
As Section 2 outlines, NEOM Public Safety Department and the facility proponent will confirm whether
a site is considered Industrial or Non-Industrial following the submission of the Security, Threat and
Risk Assessment and Site Categorisation Matrix.
Advice Note:
A key design element across NEOM is the community and visitor experience that is seamless and
enabled by technology. The almost invisible application of security through trust levels and reauthentication is a key success factor to be applied to all public interfacing developments.
It is recommended that engagement with security and regulatory stakeholders is commenced at
the earliest opportunity, supported by clear process and experience flow diagrams/descriptions.
Security solutions that are described as traditional infrastructure may not be suitable for publicfacing areas of NEOM, thus being reserved for inclusion at the more industrial and remote sites.
Any deviation from this standard shall be addressed through waiver request to PSD. All waiver
requests are subject to PSD approval. Non-compliance shall be addressed with "Noncompliance risk impact", "Sound engineering reasons and justifications for non-compliance",
"Alternatives that have been considered" and/or "Risk mitigation strategy".
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 3 OF 31 1
2
Design Development Process
The Design Development Process provides the framework for the development, delivery, and
approval of the security scope across NEOM. This Section contains the following guidance:
•
The process.
•
The protection groups.
•
Criteria for the selection of a facility, building or site as an Industrial or Non-Industrial site.
•
Engineernig and other standards.
•
Regulatory requirements.
The Process
The first activities of the Design Delivery Process are undertaken in the NEOM Plan of Work Stage 1
where the Proponent will develop Security Vision and Strategy for the Development that is aligned
with both the NEOM Security Strategy and the Vision and Strategic Objectives for the Development.
Then, design team will define the site, facility, or building, with the designer's completing:
•
A Security Threat and Risk Assessment.
•
A Strategic Security Layering Diagram.
•
A Categorization Matrix, including:
o
The recommended Protection Group for each asset, which will then define the minimum
standards required.
o
Whether an asset should be classified as Non-Industrial or Industrial. NEOM Public Safety
Department in collaboration with facility proponent shall make the initial determination
whether a facility is industrial or non-industrial.
o
The recommended Design Route for each asset as outlined in Section 4.
This will be subject to final approval by NEOM Public Safety Department.
The Security Threat and Risk Assessment methodology is outlined in Section 3.
The Categorisation Matrix is located in Annex D.
Protection Group Selection
NEOM categorises all assets into three groupings to define the minimum protection requirements that
are required for these types of facilities. The three Protection Groups are:
•
Baseline.
•
Enhanced.
•
Restricted.
If a site, building or facility satisfies more than one criteria in a number of Groups, then the highest
Protection Group will apply.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 4 OF 31 1
Definitions for each Protection Group are as follows.
Baseline
A Protection Group of Baseline should be applied if one or more of the following criteria are met:
•
Loss or failure would cause no reduction in the NEOM economy.
•
Loss or failure would cause only very localized health or safety concerns.
•
There is potential for limited injury only.
•
Loss or failure would cause no environmental damage.
•
Loss or failure would cause only very localized business disruption.
•
Loss or failure would cause very limited damage to the reputation or confidence in NEOM.
Enhanced
A Protection Group of Enhanced should be applied if one or more of the following criteria are met:
•
Loss or failure would cause a limited reduction in the NEOM economy.
•
Loss or failure would cause localized health or safety concerns.
•
There is potential for localized loss of life.
•
Loss or failure would cause environmental damage.
•
Loss or failure would cause medium-term business disruption.
•
Loss or failure would cause moderate damage to the reputation or confidence in NEOM.
Restricted
A Protection Group of Restricted should be applied if one or more of the following criteria are met:
•
Loss or failure would cause a significant reduction in the NEOM economy.
•
Loss or failure would cause NEOM Regional health or safety concerns.
•
There is potential for mass loss of life.
•
Loss or failure would cause major environmental damage.
•
Loss or failure would cause long-term business disruption.
•
Loss or failure would cause significant damage to the reputation or confidence in NEOM.
Non-Industrial and Industrial Selection
NEOM Public Safety Department in collaboration with facility proponent shall make the initial
determination whether a facility is Industrial or non-industrial. Industrial is viewed as a wide usage
category that covers:
•
Manufacturing.
•
Engineered or Chemical Production.
•
Energy Production.
•
Water and Desalination installations.
•
Energy Distribution Networks.
•
Non-Passenger Rail and Cargo Transportation.
•
Maritime Ports.
•
Petroleum, Petro-Chemical and Gas extraction, processing, storage, and distribution.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 5 OF 31 1
•
Production, storage, and distribution of highly flammable, toxic, or explosive materials.
If a site, facility, building, or infrastructure falls under one of the above categories or uses, then it is
required to adopt the design requirements of:
•
The Industrial Design Process.
•
The Industrial Design Deliverables for each Stage Review.
•
The requirements as detailed in Appendix B.
Engineering and Other Standards
The relevant security and security engineering standards that are applicable to each security function
are listed at the end of the relevant appendix sections.
Dependent upon the facility type, and the usage of locations within the facility, broader engineering
and general standards may also apply. The designer should check these requirements against the
NEOM technical Schedules:
List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
Regulatory Requirements
All developments must be compliant with the NEOM Security Standard, the referenced national and
international standards, and relevant international regulatory requirements.
Regulatory requirements will depend upon the type of facility and the role it is performing, whether
regional to NEOM only, or if internationally non-NEOM regulations may need to comply with.
Examples of this are:
•
NEOM Airport – International regulations (ICAO etc) and carrier requirements.
•
NEOM Industrial Port – International regulations (ISPS, SOLAS etc) and National regulations for
goods transiting onwards into KSA.
It is the responsibility of the design team to identify the international regulations that are applicable.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 6 OF 31 1
3
Security Threat & Risk Assessment Methodology
Introduction
The Security Threat & Risk Assessment (STRA) is produced to identify the threats which may
propagate within NEOM and at which potential locations.
The STRA will be a standalone document and handled as ‘Confidential’.
The STRA is a critical step in the security scope and should be undertaken prior to the start of the
design process and be updated throughout the project lifecycle. This will ensure that the risk context
is fully understood in order that proportionate and effective mitigations can be developed.
As the security designer for a specific development you will need to complete a STRA for your
project.
Purpose
For any security scope in an interim or permanent facility, the designer shall conduct an STRA for the
facility to determine the mitigation measures required.
A successful STRA process will:
•
Identify the relevant threats against the specific object.
•
Identify critical assets potentially requiring protective mitigation.
•
Allow the designer to understand the likelihood and potential impact of relevant threats upon
people, asset, reputation etc.
•
Highlight where there are unacceptable risks that require mitigation or management.
•
Allow the designer to understand how mitigating measures should be applied to reduce risk,
across physical, systems and operational security design.
•
A STRA intends to highlight concepts of mitigation only, in relation to physical, systems based
and operation security design. Such concepts should be adequately developed by the security
designer through the design stage process.
The risk assessment should cover current and future development specific hazards, risks and threats,
covering the following (but not be limited to):
•
Environmental Hazards: (e.g. Flooding, Geological hazards, severe weather, severe space
weather) - consider geology, current climate conditions, future climate conditions considering
climate change and climate change adaptation, fauna, flora and NEOM environmental specific
requirements.
•
Manmade Hazards: (e.g. Industrial accidents, environmental pollution incidents, biological
release, structure incidents, failure of infrastructure, data infrastructure failure, transportation
accidents) - consider expanding industrial and economic activities related to development and
NEOM expansion, increasing population numbers as NEOM evolves over time, self-sustainable
development, the use of technologies of future as the backbone infrastructure, use of
technologies of the future as a threat vector.
•
Public Safety: (e.g. Crowded places, transport, public disorder, strikes, human / animal diseases)
- consider the culturally diverse NEOM citizens with various maturity levels of public safety,
predict / prevent / deter public safety related incidents / crime, use of nontraditional methods to
control public safety issues as NEOM is the “city of the future”.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 7 OF 31 1
•
Malicious Threats: (e.g. Chemical, Biological, Radiological and Nuclear - CBRN, Petty Crime,
Organized Crime, Smuggling, Espionage, Cyber, Terrorism, State Sponsored Malicious Threats) consider the overall NEOM objectives for residents / visitors, align it to development specific
objectives and implement security & resilience controls around the mentioned objectives.
Consider illicit and malevolent actors targeting this specific development.
STRA Process
A STRA should be undertaken by a designer with the relevant experience and knowledge of security
design.
Security Threat and Risk Assessment (STRA) shall be conducted in compliance with NEOM
Enterprise Risk Management Framework and NEOM Risk Management Procedure (NEOM-NENPRC-028).
Managing Risks" within Security Threat and Risk Assessment (STRA) shall be in compliance with ISO
Risk Management - Guidelines (ISO 31000).
Methodology of Risk Assessment and Treatment within Security Threat and Risk Assessment (STRA)
shall be in compliance with American Society for Industrial Security – General Security Risk
Assessment Guideline (ASIS – GSRA Guideline)
Preventing and reducing crime and the fear of crime" within Security Threat and Risk Assessment
(STRA) shall be in compliance with Security and Resilience — Protective security — Guidelines for
crime prevention through environmental design (BS ISO 22341:2021).
Scoring Methodolgy
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 8 OF 31 1
To ensure continuity of scoring for all security risk assessments, the following scoring criteria must be
used by all.
Risk should be scored for:
•
A score for Likelihood (L) and Impact (I) assigned to each threat as a first value.
•
Risk Severity (R) is based upon Likelihood (L) x Impact (I).
•
The second value of Risk Severity (R) is the estimation of the resultant risk following the
application of risk treatments.
The designer should adapt a STRA scoring process, according to the requirements and scale of the
object.
An indicative scoring process is as follows, based upon an R score (1-25), from multiplication of L (15) score x I (1-5) score.
Likelihood
Likelihood is the scoring of the likelihood for occurrence of the threat. This should be thought of in
relation to:
•
Target attractiveness (i.e. how attractive is the location as a target for the threat?).
•
Target vulnerability (i.e. does the object design provide opportunity for a threat to occur, through
design vulnerability?).
•
Threat type context (i.e. is this threat vector a common modus operandi?).
A score for Likelihood should be assigned to each threat, based upon the following indicative
descriptions:
Score
Likelihood
Likelihood Description
5
Almost Certain
Will undoubtedly happen, possibly frequently.
4
Likely
Will happen, but not a persistent issue.
3
Possible
May happen occasionally.
2
Unlikely
Not expected to happen but is possible.
1
Rare
Very unlikely this will ever happen.
Impact
Impact is the potential effect that a threat would have, if it were to occur, in relation to identified
assets.
The designer should identify what type of asset would be affected by a threat at an object level. For
example, an act of violence would impact upon people, where as a sabotage event may impact upon
business continuity. Impact is likely to be in relation to:
•
People.
•
Asset or financial loss.
•
Business process / continuity.
•
Reputation.
An example impact scoring matrix is set out below:
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 9 OF 31 1
Score
Impact
5
4
3
2
1
Very High
High
Medium
Low
Very Low
Asset /
Financial
People
Business
Process
Reputation
Severe loss, >
2,500,000 SAR.
A number of
fatalities.
Inability to
conduct
business
operations, full
service
restored in
months.
Highly
damaging,
severe
widespread
loss of
confidence.
Major loss, <
2,500,000 SAR.
Extensive
injury, major
permanent
harm. Potential
fatality.
Significant
disruption to
business
activity, full
service
restored in
weeks.
Major adverse
publicity, major
loss of
confidence.
Significant loss
< 1,250,000
SAR.
Medical
treatment
required, semipermanent
harm.
Business
objectives
partially
unachievable,
full service
restored in
days.
Adverse
publicity, legal
implications.
First aid
treatment
required, nonpermanent
harm.
Minor impact
on ability to do
business, full
service
restored in
minutes to
hours.
Some adverse
publicity, low
reputational
damage.
No obvious
harm or injury.
Minimal
impact, no
determinable
disruption, full
service
restored
immediately.
No interest to
the public, low
internal affect.
Moderate loss <
1,250,000 SAR.
Minimal loss <
50,000 SAR.
Risk Severity
Multiplying likelihood by impact provides a risk severity score. An indicative risk severity matrix is set
out below, however this should be reviewed at the start of the STRA process and be based upon the
designer’s established appetite for risk.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 0 OF 31 1
Score
Risk Severity
Risk Descriptor
16 - 25
Very High
A severe risk that would seriously affect or without treatment this
threat will have a detrimental effect that will impact business
continuity.
10 - 15
High
The risk is High, it is recommended that risk treatment is applied to
lower the overall severity.
5–9
Medium
Moderate risks are likely to be the most common risks experienced
and therefore careful ongoing consideration of treatment is required.
1–4
Low
A low risk level that is likely treated by other security measures
employed for more severe risks or may be tolerable.
Design Basis Threat Identification
A Design Basis Threat (DBT) should be identified at the Risk Identification stage. The DBT defines
the protection standard that needs to be applied to the applicable location. It is important that this is
evidence led and should follow qualitative and quantitative research of the Criminal and, or Extremist
threat vectors.
This should consider:
•
Available and relevant security source intelligence.
•
Assessment of the capability of threat groups.
•
Understanding of threat groups motivations.
•
Crime statistics (where available) and examples of occurrence of threat type.
It is recommended that the designer consults with relevant security stakeholders who may be able to
provide further understanding of the threat context.
Crime Prevention Through Environmental Design
A mandatory part of the STRA process for all security scopes is the undertaking of CPTED as
detailed in:
Security and Resilience — Protective Security — Guidelines for Crime Prevention Through
Environmental Design (BS ISO 22341:2021).
In addition to the items to be considered in-line with BS ISO 22341:2021, the designer shall consider
items related to 1st Generation, 1st Generation CPTED Advanced and 2nd Generation CPTED. Areas
for inclusion for CPTED Generation are listed below:
1st Generation CPTED
•
Territoriality.
•
Access Control.
•
Surveillance.
•
Image.
1st Generation CPTED Advanced
•
Incompatible land uses.
•
Movement Predictors.
•
Crime Support.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 1 OF 31 1
•
Crime Displacement.
•
Crime Generator.
•
Land use Mix.
2nd Generation CPTED
•
Capacity.
•
Cohesion.
•
Connectivity.
•
Culture.
The alignment of CPTED requirements into stage reviews is covered in the Section 4.
Site Categorisation Matrix
The Site Categorisation Matrix provides a framework to inform and categorise all facilities, buildings,
and infrastructure within NEOM. It shall determine:
•
The recommended Protection Group, which will then define the minimum standards required.
•
Whether the site should be classified as Non-Industrial or Industrial.
•
The recommended Design Route as outlined in Section 4.
The framework and process are set out within Annex D and is built upon a set of standardised
categories to assist the designer in determining the appropriate Site Category.
References
The following references should be considered:
•
City Of Federal Way - Crime Prevention Through Environmental Design (CPTED) Checklist.
•
HLS CAM Vulnerability Assessment Form.
•
Safe Growth Risk Assessment Matrix.
•
21st Century Security and CPTED, 2nd Edition by Randall I. Atlas.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 2 OF 31 1
4
Design Stage Reviews & Deliverables
The Design Process
The development stages are defined in outline within the Resilience Planning Guide, which have been
extracted in turn from the Engineering Procedures – Stage Deliverables Procedure that apply to all
design disciplines for all projects within NEOM including security.
The latest NEOM Plan of Work (NEOM-NEN-PRC-029) should be utilized.
NEOM Security Outcomes
NEOM have two overarching security outcomes that should be supported through all security scopes:
Outcome 1
•
Frequency of Violent Crimes per year – Target Zero.
•
Frequency of Fire Related Deaths per year – Target Zero.
•
Average onsite response time for defined communities – Target < 4 minutes.
Outcome 2
Security technology supports the NEOM technology use strategy, allowing integration and
convergence of systems, networks and information.
Engineering Procedures – Stage Deliverables Procedure (Reference NEOM-NEN-PRC-005 Latest
revision to be used) sets forth the components required for master planning and the design of assets
in accordance with the NEOM Plan of Work.
This Section of the Security Standard further refines the deliverables required at each stage for
security. It is incumbent upon the designer to ensure their submission at each development stage is
adequate and evidences the security solution in enough detail to allow the following to be clearly
understood:
•
The approach to security that is being taken, and how this fits within the NEOM vision for security.
Unobtrusive, enabling and based upon trusted communities are key themes.
•
Any performance or technical detail that is required in that development stage.
•
Design coordination with other disciplines.
•
Detail around any external stakeholder interaction and requirements.
The Development Stages
The development stages provide a logical progression of design information required to ensure that
security has been adequately considered. Aligned to the stages are a series of formal and interim
Stage Reviews, and these will include the checking of security design information.
The stages are defined on the following schematic.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 3 OF 31 1
Further information on the stages is contained within NEOM-NEN-PRC-005_02 Stage Deliverables
Procedure – latest version to be used.
The Design Routes
There are two design routes that can be instructed by NEOM Public Safety Department dependent on
set criteria for the site.
•
Matrix 1 – Standard Design Route – Applicable across all Restricted and Enhanced security
projects and for Baseline Protection Group sites, facilities and buildings that will follow the
standard Urban Development stage review process.
•
Matrix 2 – Fast Track Design Route – The Fast Track Design Route may be used for:
o
Protection Group Baseline site, facility, or building, where approved by PSD and the
proponent.
o
A temporary facility.
▪
If the design is an off-site pre-fabricated unit, then the specification should be submitted
for review. If accepted, then this may be accepted as fulfilling the design process for this
part of the facility only.
The information required at each Development Stage, and Stage Review, is defined in the relevant
Security Design Deliverables Matrix at the end of this Section.
The matrices define the minimum information the designer will need to present. This should be added
to as required by the design to ensure clear, concise, and relevant information is reviewed.
NEOM Security Scope Compliance List
The NEOM Security Scope Compliance List (SSCL) should be utilised for security work on projects to
establish that the correct actions have been taken and sufficient information has been provided for
design coordination, design progression and approvals.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 4 OF 31 1
Item No.
Description
Compliance
(Y/N)
Part 1
General
1.01
Security Threat and Risk Assessment (STRA) shall be conducted in
compliance with NEOM Enterprise Risk Management Framework and
NEOM Risk Management Procedure (NEOM-NEN-PRC-028).
1.02
Managing Risks within Security Threat and Risk Assessment (STRA)
shall be in compliance with ISO Risk Management - Guidelines (ISO
31000).
1.03
Methodology of Risk Assessment and Treatment within the Security
Threat and Risk Assessment (STRA) shall be in compliance with
American Society for Industrial Security – General Security Risk
Assessment Guideline (ASIS – GSTRA Guideline).
1.04
Preventing and reducing crime and the fear of crime" within
Security Threat and Risk Assessment (STRA) shall be in compliance
with Security and Resilience — Protective security — Guidelines for
crime prevention through environmental design (BS ISO
22341:2021).
CPTED items for consideration as per CPTED Generation:
•
1st Generation CPTED
Territoriality.
Access Control.
Surveillance.
Image.
•
1st Generation CPTED Advanced
Incompatible land uses.
Movement Predictors.
Crime Support.
Crime Displacement.
Crime Generator.
Land use Mix.
2nd Generation CPTED
Capacity.
Cohesion.
Connectivity.
Culture.
1.05
•
The STRA shall include the following:
o
Site Security Constraints and Influencing Factors.
o
Security Spatial Requirements.
o
Security Systems Integration matrix, including an outline Cause
& Effects Matrix.
o
Baseline Infrastructure Security Requirements.
o
Security Privacy Zoning traces produced to assist the
application of access control locations.
o
Specialist Security Analysis completed as required, e.g. vehicle
dynamics assessment, initial blast analysis, screening &
detection.
1.06
Typical STRA Content
1.06.1
•
Vision
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 5 OF 31 1
Item No.
1.06.2
1.06.3
1.06.4
1.06.5
Description
•
•
•
•
Compliance
(Y/N)
o
Site (Status + Description + Location + Population Index).
o
Ranking Criteria.
o
NEOM Protection Groups.
o
Site Classification.
Problem Identification
o
Threat Overall Assessment.
o
Adversary Sequence Diagrams. (Attack Path Analysis and
Attack Path Characteristics)
o
Plan Review.
o
Asset Identification/Characterization worksheet.
o
Chemicals of Interest (as per Appendix A to Part 27 - DHS
Chemicals of Interest.
o
Asset/Attack Matrix. (Design Basis Threats per Asset)
o
User Profiles per Asset.
Problem Analysis – Data Collection.
o
Site Visits, interviews and surveys, as appropriate.
o
Crime Statistics, including crime index. i.e. Type of Crime
[personnel, property], Time/Day [3-5 years before critical
incident & 2-3 miles area coverage].
o
Crime Forecasts (i.e. trends).
Problem Analysis – Data Analysis.
o
Asset Target Value (ATV) - Terrorists Attractiveness.
o
Asset Target Value (ATV) - Economic Criminal Attractiveness.
o
Asset Target Value (ATV) - Non-Terrorism Violent Crime
Attractiveness.
o
Asset Target Value (ATV) - Subversives Attractiveness.
o
Asset Target Value (ATV) - Petty Crimes Attractiveness.
o
Asset Attractiveness Target Ranking worksheets.
o
Demographic (i.e Housing, Age category and Income
level/category [renting, owner]).
o
GIS.
o
Time Series.
o
Social Analysis / Asset Mapping.
o
Asset Surveillance Opportunity Matrix.
o
Asset Vulnerability Matrix.
o
Co-Planning.
o
Design Charettes.
o
Search Conference.
o
Risk Matrix.
Strategy.
o
Vulnerability Assessment.
o
Risk Evaluation.
o
Risk Treatment Strategy.
o
Residual Risk Matrix.
o
Recommendations of countermeasures.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 6 OF 31 1
Item No.
Description
Compliance
(Y/N)
o
Security Concept of Operations.
o
Security Components compliance summary.
o
Phasing.
Part 2
NEOM Stage – 2A and 2B Drawings
2.01
An Overview drawing identifying:
2.02
•
Facility location.
•
All adjacent facilities and infrastructure bordering the facility.
•
Adjacent public parking or vehicle accessible areas.
•
Consequence assessment of adjacent facility influences on the site.
•
Facility Layout drawing(s) showing:
o
Site zoning.
o
Boundaries and associated security treatments.
o
External and internal security patrol roads including connections
to the facility road system as included.
o
All gates showing approach roads including connections to the
facility road system. (Drawing shall indicate gate dimensions).
o
Perimeter penetrations/crossings (underground, above ground
[i.e. buried, over the fence or through the fence]) and their
purpose.
o
Critical assets identified in the STRA.
Part 3
NEOM Stage - 3A Conceptual Design Document
3.01
•
Conceptual Design Document shall contain the following items:
o
Project Overview & Site/Facility Description.
o
Summary from the STRA, Critical Assets, NEOM Security
Protection Group & Physical Security Recommendations.
o
A site specific conceptual description of the Physical Security
design and security infrastructure.
o
A site specific conceptual description of the security systems
required for the security design of the facility. (i.e. Monitoring
locations and periods [24 X 7], space requirements, and
hardware requirements).
o
Specific security countermeasures for areas where compliance
cannot be achieved as identified in the STRA.
Part 4
NEOM Stage - 3A & 3B Drawings
4.01
•
Facility Layout Drawing(s) to show:
o
All security infrastructure and device locations.
o
Intrusion Detection systems installed around the perimeter,
including alarm zones.
o
All security system equipment, locations and physical layouts.
o
Security lighting layouts and illumination levels (Perimeter &
Check Point Lighting).
o
Gate Layout and Design. This covers all gates at the facility.
Each gate shall be submitted in a separate drawing set.
o
Power sources and backup power services to all security
facilities.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 7 OF 31 1
Item No.
Description
4.02
•
4.03
4.04
•
•
Compliance
(Y/N)
Perimeter Fence Drawings showing:
o
Elevation views, clearances, and fence crossing details.
o
Perimeter penetrations.
o
All cameras monitoring fence crossings.
System Drawings showing:
o
VSS cameras, analytics and Field of View.
o
Access control system layout.
o
Intrusion detection system layout.
o
Gate security layout and equipment.
o
Building security equipment.
o
SCR layout.
o
Network topology and major network devices.
o
Security communication system layout (Radio & Telephone
only).
o
Single line diagram: power supply for security equipment
(primary, alternate, UPS and emergency power generator).
Security Systems and Device information in a schedule to show:
o
Security components/device type.
o
Security components/device manufacturer.
o
Security component/device model number.
o
Security compliance (Yes/No) for security components.
Part 5
NEOM Stage - 3B Documentation
5.01
General Requirements
5.01.1
•
•
Basis of Design document including:
o
A general description of the facility/site and the project overview.
o
General design criteria and specifications including any
integration requirements.
o
Detailed requirements for the engineering design basis of the
security system.
Security Concept of Operations.
5.02
Physical Security Infrastructure Document
5.02.1
The PSI is based on the Conceptual Design Document.
It shall provide a description for each element of the physical security
infrastructure and physical security measures together with the human
interface and procedures required to provide the security system and
organization for facility protection.
This section shall include the design requirements (Functional
requirements, Performance Requirements, and Capacity requirements),
specifications and operational objectives of the sub-systems and
components.
5.03
System Design Document
5.03.1
Security Systems design document is based on the Conceptual Design
Document.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 8 OF 31 1
Item No.
Description
Compliance
(Y/N)
It shall provide a description of the security systems required
(electronic/technical components) for the security design.
It shall provide an overview of the Security Systems terminating in the
SCR and integrated into the SCR environment.
The section shall include a description of each system, sub-system and
provide a layout of all the elements and components in the SCR. This
section shall include the design requirements (Functional requirements,
Performance Requirements, and Capacity requirements), specifications
and operational objectives of the sub-systems and components.
5.04
Scope of Work (SoW)
5.04.1
•
A detailed Scope of Work (SoW) shall be included to provide a clear
understanding on what the security project will consist of and all the
construction, installation and integration of security infrastructure and
security systems required for the project that will be carried out by
the Security Contractor.
•
This section shall provide an overview of the concept of security for
the site including all elements.
5.05
Equipment Identification Schedule
5.05.1
•
Part 6
NEOM Stage - 3C Deliverables
6.01
General Requirements
6.01.1
•
Security Consultant review report of the detail design documentation,
identifying any vulnerabilities.
•
Basis of Design document.
•
Detailed project description and SoW document.
•
Equipment Schedules.
All equipment and components required for the security system shall
be summarized in an Equipment Schedule.
6.02
System Design Document
6.02.1
•
Detailed SCR design documentation.
•
SCR system and network architecture description.
•
Function description, main requirements, architectural description
and technical description for each system and sub-system.
•
Integration Schedule.
•
Overview of the Security Systems terminating in the SCR and
integrated into the SCR environment.
•
Design requirements, specifications and operational objectives of the
sub-systems.
6.03
Physical Security Infrastructure Document
6.03.1
•
Detailed PSI design documentation, the detail design parameters,
specifications and requirements for each building/element or
equipment for the PSI.
•
Detailed Design drawings for the construction of all security
buildings, such as gatehouses, search facilities, security SCR and
security partitions within buildings.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 9 OF 31 1
Item No.
Description
Compliance
(Y/N)
•
Design parameters for the buildings.
•
Details of any blast and ballistic performance, and the certification
method.
•
A description for each element of the physical security infrastructure
and physical security measures together with the human interface
and procedures required to provide the security system and
organization for facility protection.
6.04
Security Fencing
6.04.1
•
Specifications, calculations and design document for installation of
fencing systems considering the specific soil conditions.
•
Site Perimeter Layout drawing including fence detail suitable for
procurement and installation.
•
Detailed Design drawings for where impact rated vehicle security
barriers are included.
•
Certificates for anti-vehicle barriers, and anti-personnel fences as
applicable.
•
Detailed Design drawings for construction & patrol road layout.
•
Detailed Design drawings for the construction and installation of the
facility perimeter fencing and all other fences described in the PD.
•
Detailed Design drawings for each fence penetration in the facility
perimeter.
•
Detailed Design drawings for the layout and installation of all
emergency gates and heavy equipment gates.
•
Material data sheets and specifications. (and certificates; where
applicable).
•
Detailed Design drawings for Temporary fences and demolitions
along the fences. This will include any phasing diagrams.
6.05
Security Gates
6.05.1
•
Specifications, calculations and design document for layout and
installation of each facility gate.
•
Detailed Design drawings for the layout and installation of all security
equipment, security devices, and components at each gate and in
the gatehouse/search facility.
•
Material data sheets and specifications. (Certificates; where
applicable).
•
Certificate for the crash rated road blockers and bollards.
6.06
Security Lighting
6.06.1
•
Specifications and design document for perimeter security lighting,
each check point/gate lighting and area security lighting.
•
Security lighting calculations & computer plotter prints for all
perimeter, check point/gate and area security.
•
Detailed Design and Installation drawings for the installation of the
facility perimeter security lighting and each check point/gate lighting.
•
Material data sheets and specifications. (and certificates; where
applicable).
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 0 OF 31 1
Item No.
Description
Compliance
(Y/N)
6.07
Security Control Room
6.07.1
•
Detail Design drawing for the construction of the SCR with detail
design parameters & specification documents.
•
SCR layout.
•
Detailed list of systems & functions integrated into the SCR.
•
Details about Integration software at SCR.
•
Material and equipment data sheets & specifications. (and
certificates; where applicable).
•
Security operator requirements.
6.08
Intrusion Detection System
6.08.1
•
Detailed Design and Installation drawings for the layout and
installation of the Perimeter Intrusion Detection systems.
•
Detailed Design and Installation drawings for the layout and
installation of the perimeter camera surveillance and video analytics.
•
Building level intruder detection systems layout and installation
drawings.
•
Camera Field of View/Lens Calculations.
•
Material and equipment data sheets & specifications (and
certificates; where applicable).
6.09
Access Control System
6.09.1
•
Detailed Design & Installation drawings for the layout and installation
of the electronic Access Control System.
•
Material and equipment data sheets & specifications. (and
certificates; where applicable).
6.10
Video Surveillance System and Video Analytics
6.10.1
•
Detailed Design and Installation drawings for the layout and
installation of the Video Assessment & surveillance CCTV camera
systems.
•
Camera Field of View/Lens Calculation.
•
Material and equipment data sheets and specifications. (Certificates;
where applicable).
6.11
Data Networks & Communications
6.11.1
•
•
For Data Network:
o
SECNET topology & capacity.
o
Network interface equipment.
o
Connection to facility backbone.
o
Cabling overview & drawings for the gatehouse, SCR, ACS, IDS
and VSS locations.
o
Perimeter IDS & VSS interface and cabling.
For Communications:
o
All Gatehouse wired & wireless communications.
o
SCR wired and radio communications.
o
Radio equipment list (fixed, mobile, vehicle mounted).
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 1 OF 31 1
Item No.
Description
o
Compliance
(Y/N)
Radio coverage map.
•
VSS storage calculations.
•
Network Bandwidth Calculation.
6.12
Power Supply
6.12.1
•
Detailed Design & Installation drawings for:
o
The Emergency Power Supply.
o
The UPS system.
•
Power and UPS calculations.
•
Material and equipment data sheets and specifications (and
certificates; where applicable).
6.13
Testing Plans
6.13.1
•
Pre-delivery or Factory Acceptance Test (FAT).
•
Site Acceptance Tests (SAT).
•
Reliability or Operational Availability Testing (OAT).
•
After-acceptance test (After-implementation testing).
•
Closeout Activities (a list of activities or work to be accomplished is
derived from the PPS).
Part 7
NEOM Stage – 3D
•
Nil.
Part 8
NEOM Stage – 4A
8.01
Training
8.01.1
•
Facilitate the training program.
•
Evaluate the training program.
•
Training Lessons Learned (what training was conducted, by whom,
and when, keep a sign-in sheet of who attended the training).
•
Develop follow-up training requirements as applicable.
8.02
Pre-delivery or Factory Acceptance Test (FAT)
8.02.1
•
Conduct FAT(s).
•
FAT(s) data/result.
•
FAT(s) punch list for correction (corrective items).
8.03
Site Acceptance Tests (SAT)
8.03.1
•
Conduct SAT(s).
•
SAT(s) data/result.
•
SAT(s) punch list for correction (corrective items).
8.04
Maintenance
8.04.1
•
Define maintenance contract or in house capability requirements.
•
Develop Guides for:
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 2 OF 31 1
Item No.
Description
Compliance
(Y/N)
o
Trouble shooting.
o
Hardware maintenance.
o
Software installation and maintenance.
8.05
Reliability or Operational Availability Testing (OAT)
8.05.1
•
Conduct OAT(s); Testing the system to demonstrate its effectiveness
and reliability.
•
OAT(s) data/result.
•
OAT(s) punch list for correction (corrective items).
8.06
Warranty: 1 year minimum after commissioning
8.06.1
•
Part 9
NEOM Stage - 4B
9.01
After-acceptance test (After-implementation testing)
9.01.1
•
Conduct After-acceptance test(s).
•
After-acceptance test(s) data/result.
•
After-acceptance test(s) punch list for correction (corrective items).
Warranty Schedule (i.e which items are covered by the manufacturer
and which component is covered by the integrator) and how?
9.02
Warranty
9.02.1
•
Review of warranty conditions and activities.
•
Define warranty providers.
Part 10
Transmittal
10.01
Designer shall prepare relevant design submissions in-line with stage
requirements.
10.02
•
Once the draft STAGE package has incorporated all NEOM
comments and required edits, the designer shall provide NEOM
copies of STAGE package that will include:
o
Electronically submitted finalized Stage documents in MS Word
format (version 2013 or later) and in pdf format, using the NEOM
Report Template (soft copy available upon request).
o
Legible drawings, minimum size shall be a minimum of ISO A1
or larger.
Part 11
Consultant/Contractor Compliance
11.01
All Security engineering documents and studies must be at all times
marked as CONFIDENTIAL.
11.02
Stakeholder coordination undertaken at each relevant stage.
11.03
Quality review undertaken at each design stage prior to submission for
approval.
11.04
•
Reviews submitted on the NEOM Template for official review to
receive, address, and successfully incorporate comments by NEOM.
•
All comments are to be tracked in a design matrix and only be closed
once NEOM are satisfied.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 3 OF 31 1
Item No.
Description
11.05
•
Compliance
(Y/N)
Proponent, NEOM PSD, other designers comments incorporated at
each design stage.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 4 OF 31 1
Matrix 1 – Standard Design Route
Each design submission will be accompanied by a BIM model and GIS files developed to the level specified in NEOM’s Technical Procedure reference NEOM-NEN-PRC-009 (GIS & BIM Procedure) at the end of each design stage. The
proponent is responsible for deliverables under Security Consultant and Security Contractor.
Stage
Description
NEOM Public Safety Department
Proponent
S1
Strategic Definition
•
NEOM Security Standard issued.
•
•
Initial Security Requirements issued.
Develop Security Vision and Strategy for the
Development that is aligned with both the
NEOM Security Strategy and the Vision and
Strategic Objectives for the Development.
•
Confirm Protection Group and
Industrial/Non-Industrial Status.
•
Determine the type of the facility.
•
•
Propose the Protection Group in
consultation with the Security Consultant.
Draft Regional STRA Report (refer to NEOM
Security Compliance List).
•
Draft Regional Drawings (refer to NEOM Security
Compliance List).
•
Draft Regional Security Manual Contents and
Format.
•
Final Regional STRA Report (refer to NEOM
Security Compliance List).
•
Final Regional Drawings (refer to NEOM Security
Compliance List).
•
Final Regional Security Manual Contents and
Format.
•
Draft Public Safety Initial Asset Brief.
S2
Concept Master Plan (2A)
Detailed Master Plan (2B)
•
Determine additional stakeholders as
required.
•
Security Consultant
Security spatial requirements coordinated
with masterplan designer.
Security Contractor
(If applicable)
Initial Asset Brief (2C)
•
Final Public Safety Initial Asset Brief.
•
(If applicable)
Submit Development Assets for Public
Safety to confirm asset compliance.
End of Stage
S3
Concept Design (3A)
Developed Design (3B)
•
•
Design coordination facilitated across all
disciplines.
Design coordination facilitated across all
disciplines.
DOCUMENT CODE : NEOM-NSE-PRC-001
•
Final version of all deliverables for this stage
collated into a single report.
•
Design Comments Log created.
•
Develop Deliverables from previous stages.
•
Asset STRA Report (refer to NEOM Security
Compliance List).
•
Asset Security Manual Contents and Format.
•
Concept Of Design (COD): Conceptual Design
Document and Drawings (refer to NEOM
Security Compliance List).
•
Incorporate all requirements from the Protection
Group.
•
Design Comments Log updated.
•
Further develop Deliverables from previous
stages
•
Developed Design: Documents and Drawings
(refer to NEOM Security Compliance List)
•
Early tender package development
•
Draft Security Manual
•
Update Design Comments Log
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 5 OF 31 1
Stage
Description
NEOM Public Safety Department
Detailed Design (3C)
Proponent
Security Consultant
Security Contractor
•
•
Review Detailed Design:
If Contractor led Detailed Design:
o
Documents and Drawings.
•
o
Equipment selection (refer to NEOM
Security Compliance List).
Further develop Deliverables from previous
stages.
•
Detailed Design:
•
Tendering Stage & IFC (3D)
•
Tender documents and drawings
providing sufficient detail for contractor
pricing and scope of work to be clearly
understood.
Final coordination of design with other
disciplines.
Tender Stage support to NEOM.
If Consultant led Detailed Design then ‘Security
Contractor’ requirements remain with the Security
Consultant.
S4
Mobilisation & Construction (4A)
•
Testing Plans (refer to NEOM Security
Compliance List).
•
•
Refinement of design information as required to
be Issued For Construction (IFC).
Tender Stage support to NEOM.
Approval of documentation for Stages 1 - 3 is
required prior to the construction, procurement or
installation of any new security equipment, system or
security infrastructure.
Testing, Commissioning,
Handover and Close-Out(4B)
•
Collated Detailed Design and IFC information
•
Collated Detailed Design and IFC information
•
Compliance to Annex C requirements for the
construction sites.
•
Installation of security infrastructure and systems
compliant with IFC information.
•
FAT(s) (refer to NEOM Security Compliance
List).
•
SAT(s) (refer to NEOM Security Compliance
List).
•
Refine Operational Policies and Procedures.
•
Maintenance preparation (refer to NEOM
Security Compliance List).
•
Record, with authorizations any design variance
and alterations.
•
As-built drawings/documents.
•
Final Product/Equipment data.
•
Final Security Manual.
•
Training (refer to NEOM Security Compliance
List).
•
OAT(s) (refer to NEOM Security Compliance
List).
•
Warranty documentation preparation (refer to
NEOM Security Compliance List).
•
Review Security Manual.
•
Evaluate/Approve records of evidence of
Factory and Site Testing.
•
Monitor Training.
•
Monitor Testing.
•
Review O & M manuals.
•
Review As-built drawings
•
Review Product/Equipment data.
•
Evaluate/Approve records of evidence of
Reliability or Operational Availability
Testing.
•
Review Warranty documentation.
•
Audit Compliance at construction sites.
•
•
Evaluate/Approve records of evidence of
After-acceptance test (Afterimplementation testing).
Approve snagging items.
DOCUMENT CODE : NEOM-NSE-PRC-001
•
Monitor Testing.
•
Monitor Commissioning.
•
Monitor Security Manual implementation.
•
Monitor Training.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
Equipment selection (refer to NEOM
Security Compliance List).
Security Manual further refined.
Attend Security Operator Training.
Review maintenance Contract.
o
•
•
•
Documents and Drawings.
Approval of documentation for Stages 1 - 3 is
required prior to the construction, procurement or
installation of any new security equipment, system or
security infrastructure.
If Consultant led Detailed Design then `Security
Contractor' requirements remain with the Security
Consultant.
End of Stage
o
Approval of Stage 4 documentation is required during
the commissioning stage of the security system but
prior to declaring the facility operational.
•
Ensure test and handover scripts are prepared
and approved.
PAG E 3 6 OF 31 1
Stage
S5
Description
Operation & Maintenance
NEOM Public Safety Department
Proponent
Security Consultant
Security Contractor
•
Evaluate design variance and alterations.
•
Review early O&M manuals.
•
Complete all testing activities.
•
Audit completion of security system
installation (Witness commissioning).
•
Evidence of witnessing at commissioning.
•
Resolve all issues identified in the punch lists.
•
Record of evidence of all testing activities.
•
Witness handover.
•
Compliance certificate for the required testing
plans, and test contents.
•
Complete As-Built drawings/documents/tables
from previous Stages.
•
Lesson learned documentation.
•
System Commissioning.
•
Operational Readiness Certification (ORC)
•
Security Compliance Certification for the
construction, installation and commissioning of
all security infrastructure, systems and
components implemented by the project.
•
Warranty Agreements/ Certificates (refer to
NEOM Security Compliance List).
•
Security Equipment Training.
•
Collation of Snagging Items.
•
Final acceptance & sign-off on the project as
work completed (Project completion certificate).
•
Handing over of the security system for
operational use to the Facility Operator.
•
Evidence of witnessing at Handover.
Operation:
•
Compliance to Annex C if an interim facility.
•
Compliance to the Security Manual.
•
Post-acceptance test (refer to NEOM
Security Compliance List).
•
Development of service contracts.
•
Manage warranty plans.
•
Detailed record keeping of Operating costs.
•
Review of operations logs and records.
Maintenance:
•
Maintenance contract and service level
agreement.
•
Detailed record keeping of Maintenance.
•
Detailed record keeping of fault reporting.
•
Upgrades.
•
System completed its useful life.
Evaluation:
•
Lesson learned.
•
Detailed record keeping of ideas for
enhancement.
•
Lifecycle planning.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 7 OF 31 1
Matrix 2 – Fast Track Design Route
Each design submission will be accompanied by a BIM model and GIS files developed to the level specified in NEOM’s Technical Procedure reference NEOM-NEN-PRC-009 (GIS & BIM Procedure) at the end of each design stage. The proponent is responsible
for deliverables under Security Consultant and Security Contractor.
Stage
Description
NEOM Public Safety Department
Proponent
S1
Strategic Definition
•
•
Develop Security Vision and Strategy for
the Development that is aligned with
both the NEOM Security Strategy and
the Vision and Strategic Objectives for
the Development.
S2
Concept Master Plan (2A)
•
Determine the type of the facility.
Detailed Master Plan (2B)
•
Propose the Protection Group in
consultation with the Security
Consultant.
•
Submit Development Assets for Public
Safety to confirm asset compliance.
•
Design coordination facilitated across all
disciplines.
•
STRA Report (refer to NEOM Security
Compliance List).
•
Implement minimum security standards
through design.
•
Security Manual Contents and Format.
•
Concept Of Design (COD): Conceptual
Design Document and Drawings (refer to
NEOM Security Compliance List).
•
Incorporate all requirements from the
Protection Group.
•
Design Comments Log updated.
•
Review Detailed Design:
If Contractor led Detailed Design:
o
Documents and Drawings.
•
o
Equipment selection (refer to NEOM
Security Compliance List).
Further develop Deliverables from
previous stages.
•
Detailed Design:
NEOM Security Standard issued.
Initial Asset Brief (2C)
End of Stage
S3
Concept Design (3A)
Developed Design (3B)
•
Agree minimum security requirements
Security Contractor
Developed and Detailed Design Stages combined into a single design stage
•
Detailed Design (3C)
•
Tendering Stage & IFC (3D)
Security Consultant
•
Tender documents and drawings
providing sufficient detail for contractor
pricing and scope of work to be clearly
understood.
Final coordination of design with other
disciplines.
Tender Stage support to NEOM
End of Design Stage
DOCUMENT CODE : NEOM-NSE-PRC-001
If Consultant led Detailed Design then
‘Security Contractor’ requirements remain
with the Security Consultant
Documents and Drawings.
o
Equipment selection (refer to NEOM
Security Compliance List).
•
Security Manual further refined.
Approval of documentation for Stages 1 - 3 is
required prior to the construction,
procurement or installation of any new
security equipment, system or security
infrastructure
•
Testing Plans (refer to NEOM Security
Compliance List).
•
Tender Stage support to NEOM.
•
•
If Consultant led Detailed Design then
`Security Contractor' requirements
remain with the Security Consultant.
Refinement of design information as
required to be Issued For Construction
(IFC).
•
Collated Detailed Design and IFC
information.
•
Collated Detailed Design and IFC
information.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
o
Approval of documentation for Stages 1 - 3 is
required prior to the construction, procurement
or installation of any new security equipment,
system or security infrastructure
PAG E 3 8 OF 31 1
Stage
Description
NEOM Public Safety Department
S4
Mobilisation & Construction (4A)
•
•
Testing, Commissioning, Handover and Close-Out
(4B)
Security Consultant
Security Contractor
Attend Security Operator Training.
•
Review Security Manual.
•
Evaluate/Approve records of evidence of
Factory and Site Testing.
•
Monitor Training.
Compliance to Annex C requirements for
the construction sites.
•
Monitor Testing.
•
Installation of security infrastructure and
systems compliant with IFC information.
•
FAT(s) (refer to NEOM Security
Compliance List).
•
SAT(s) (refer to NEOM Security
Compliance List).
•
Refine Operational Policies and
Procedures.
•
Maintenance preparation (refer to NEOM
Security Compliance List).
•
Record, with authorizations any design
variance and alterations.
•
As-built drawings/documents.
•
Final Product/Equipment data.
•
Final Security Manual.
•
Training (refer to NEOM Security
Compliance List).
•
OAT(s) (refer to NEOM Security
Compliance List).
•
Warranty documentation preparation (refer
to NEOM Security Compliance List).
•
Review maintenance Contract.
•
Review O & M manuals.
•
Review As-built drawings
•
Review Product/Equipment data.
•
Evaluate/Approve records of evidence of
Reliability or Operational Availability
Testing.
•
Review Warranty documentation.
•
Audit Compliance at construction sites.
•
Proponent
Evaluate/Approve records of evidence of
After-acceptance test (Afterimplementation testing).
•
Monitor Testing.
•
Monitor Commissioning.
•
Monitor Security Manual
implementation.
•
Approve snagging items.
•
Evaluate design variance and
alterations.
•
Monitor Training.
•
Audit completion of security system
installation (Witness commissioning).
•
•
•
Witness handover.
DOCUMENT CODE : NEOM-NSE-PRC-001
•
Ensure test and handover scripts are
prepared and approved.
Review early O&M manuals.
•
Complete all testing activities.
Evidence of witnessing at commissioning
•
Resolve all issues identified in the punch
lists.
•
Record of evidence of all testing activities.
•
Compliance certificate for the required
testing plans, and test contents.
•
Complete As-Built
drawings/documents/tables from previous
Stages.
•
Lesson learned documentation.
•
System Commissioning.
•
Operational Readiness Certification
(ORC).
•
Security Compliance Certification for the
construction, installation and
commissioning of all security
infrastructure, systems and components
implemented by the project.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
Approval of Stage 4 documentation is
required during the commissioning stage of
the security system but prior to declaring
the facility operational.
PAG E 3 9 OF 31 1
Stage
S5
Description
Operation & Maintenance
NEOM Public Safety Department
Nil.
Proponent
Security Consultant
Operation:
Nil.
•
Compliance to Annex C if an interim
facility.
•
Compliance to the Security Manual.
•
Post-acceptance test (refer to NEOM
Security Compliance List).
•
Development of service contracts.
•
Manage warranty plans.
•
Detailed record keeping of Operating
costs.
•
Review of operations logs and records.
Security Contractor
•
Warranty Agreements/ Certificates (refer to
NEOM Security Compliance List).
•
Security Equipment Training.
•
Collation of Snagging Items.
•
Final acceptance & sign-off on the project
as work completed (Project completion
certificate).
•
Handing over of the security system for
operational use to the Facility Operator.
•
Evidence of witnessing at Handover.
Nil.
Maintenance:
•
Maintenance contract and service level
agreement.
•
Detailed record keeping of Maintenance.
•
Detailed record keeping of fault
reporting.
•
Upgrades.
•
System completed its useful life.
Evaluation:
•
Lesson learned.
•
Detailed record keeping of ideas for
enhancement.
•
Lifecycle planning.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 0 OF 31 1
5
Minimum Security Requirements
The following table matrices set out the minimum-security requirements expected for Industrial and Non-Industrial sites. It clearly sets out the minimum expected standards for security provision at each designated protection group;
Baseline, Enhanced and Restricted. For security elements, auxiliary systems shall be designed in compliance with BRA/QRA.
Non-Industrial Security Functional Requirements
Non-Industrial
Ref
Security Elements
A1
VSS & Video
Analytics
Baseline
Enhanced
Restricted
1.
Publicly accessible spaces shall be covered by camera surveillance
to an Observation resolution (62ppm).
1.
All entry points are to be covered by visual surveillance cameras
with a Recognition (125ppm) level of coverage.
1.
All entry points are to be covered by visual surveillance cameras
with a Recognition (125ppm) level of coverage.
2.
Multi-tenanted/occupancy buildings shall incorporate camera
surveillance to an Observation resolution (62ppm) in all corridors
and circulation spaces.
2.
Main pedestrian access points are to be covered by camera
surveillance to an Identification resolution (250ppm).
2.
Main pedestrian access points are to be covered by camera
surveillance to an Identification resolution (250ppm).
3.
Only utilised where another function is required (i.e. people
counting, IDS).
BOH / FOH Transition points shall be covered by camera
surveillance to a Recognition (125ppm) level of coverage.
3.
3.
BOH / FOH Transition points shall be covered by camera
surveillance to a Recognition (125ppm) level of coverage.
4.
Publicly accessible spaces shall be covered by camera surveillance
to an Observation resolution (62ppm).
4.
Publicly accessible spaces shall be covered by camera surveillance
to an Observation resolution (62ppm).
5.
Motion detection at the edge should be utilised to optimise recording
levels, with motion treated as being a trigger for recording rates.
5.
(Edge refers to capability/processing completed at the sensor rather than
at the main interface/processing unit.)
All lobby areas, restricted area, key points, and high value asset
storage to be covered by camera surveillance to a Recognition
(125ppm) level of coverage.
6.
Additional coverage requirements around each individual site should be
informed by the Security Design and site specific STRA, but will include:
Motion detection at the edge should be utilised to optimise recording
levels, with motion treated as being a trigger for recording rates.
7.
Specific sterile zones will be established within the facilities and
these should be covered by suitable analytics.
Key constriction points to utilise facial recognition at all facilities.
1.
Entrance and exit areas of sites including emergency exits.
2.
Entrance and exits of all the roads, street and walk ways.
8.
3.
Vehicle parking entrance and parking area.
4.
Control and equipment room of proposed system.
Additional coverage requirements around each individual site should be
informed by the Security Design and site specific STRA.
5.
All passenger's drop off and pickup areas.
6.
Reception / customer service and waiting area.
7.
Water / fuel tanks refuelling points, main utility room entrances
(electrical, lifts, mechanical, and communication rooms).
8.
Goods loading and unloading areas.
9.
Entrance of public toilet.
10. Entrance of Mosque and government institution.
11. Around the outer fence of the area with 100% coverage to enable
intrusion detection.
A2
Other Surveillance
Systems


A3
ACS
1.
Access control required based upon Single-Factor Authentication.
1.
2.
Location, authentication type etc should be detailed in the design
process.
3.
All access control systems will incorporate an identity token
management system for both digital and physical tokens.
1.
Linkage to radar detection systems to provide tracking capability if
wide area surveillance is identified as a requirement during the
STRA process.
Access control required based upon Single-Factor Authentication.
1.
Access control required based upon Dual-Factor Authentication.
2.
Location, authentication type etc should be detailed in the design
process.
2.
Location, authentication type etc should be detailed in the design
process.
3.
All access control systems will incorporate an identity token
management system for both digital and physical tokens.
3.
All access control systems will incorporate an identity token
management system for both digital and physical tokens.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 1 OF 31 1
Non-Industrial
A4
IDS
Applied to individual secure units and high importance areas.
A single technology approach should be adopted.
Intruder detection to be possible through forced entry of any door that is
access controlled or strong situational awareness with proactive
monitoring at the perimeter of the site.
For any critical areas, a single technology-based detection with
verification cameras will be utilised.
Intruder detection to be possible through forced entry of any door that is
access controlled, supported with camera verification.
For critical areas, dual technology detection with verification cameras to
be utilised.
The perimeter IDS shall utilise dual-technology detection with cameras
systems with analytics.
A5
Duress Alarms
Only required where it is a multi-occupancy building.
Static panic alarms to be provided at key points within the building
layouts (i.e. reception).
Static panic alarms are to be provided at key points throughout the
facility to allow duress situations to be alerted.
A6
Security Lighting
1.
1.
Lighting should be provided to support security infrastructure, safety
and movement.
1.
Lighting should be provided to support security infrastructure, safety
and movement.
2.
VSS Cameras to incorporate IR illumination.
2.
VSS Cameras to incorporate IR illumination.
3.
For facilities with a fixed perimeter, visible illumination of the
perimeter is to be provided during the hours of darkness. This
illumination zone is a strip of 2.0m outward and inward of the
perimeter barrier.
Lighting should be provided to support security infrastructure, safety
and movement.
A7
Cyber Security
See Cyber Security Section (ref: NEOM Standard)
A8
Perimeter Security
(Site / Building)
1.
Territorial demarcation should be provided through ‘green’ planted
barriers to movement. CPTED guidance should be applied.
1.
Territorial demarcation should be provided through ‘green’ planted
barriers to movement. CPTED guidance should be applied.
1.
Territorial demarcation should be provided through ‘green’ planted
barriers to movement. CPTED guidance should be applied.
2.
Where a secured perimeter is required:
2.
Where a secured perimeter is required:
2.
Where a secured perimeter is required:
3.
See Cyber Security Section (ref: NEOM Standard)
•
A fence line should be installed providing a minimum height of
3.0m.
•
A fence line should be installed providing a minimum height of
3.0m.
•
A fence line should be installed providing a minimum height of
3.0m.
•
Lighting should support safe movement and security activity.
•
Vehicle Barrier with single factor access control and video
intercom, if required by type of facility.
•
Vehicle Barrier with single factor access control and video
intercom.
•
Pedestrian gate with single factor access control and video
intercom, if required by the type of facility.
•
Pedestrian gate with single factor access control and video
intercom.
•
Lighting should support safe movement and security activity.
•
Lighting should support safe movement and security activity.
•
Provide a stable structure that is capable of hosting a PID
system.
•
Provide a stable structure that is capable of hosting a PID
system.
If provided by the building exterior:
•
Walls, windows, grilles, and doors to provide a minimum level of
delay equivalent to LPS 1175 A1.
3.
If provided by the building exterior:
•
A9
Vehicle Security
Barriers

See Cyber Security Section (ref: NEOM Standard)
3.
•
Walls, windows, grilles, and doors to provide a minimum level of
delay equivalent to LPS 1175 A1.
The building and its associated landscaping should be designed to deny
vehicle paths close to the building and towards vulnerable entrances and
facades. Where possible, a 20.0m stand-off should be achieved.
If provided by the building exterior:
Walls, windows, grilles, and doors to provide a minimum level of
delay equivalent to LPS 1175 B3.
All facilities will be landscaped and utilise suitable Vehicle Security
Barriers at entrance points and perimeter to prevent unauthorised
vehicle entry. These VSBs shall be selected from IWA 14 or equivalent
approved products.
All selected VSBs shall meet the vehicle impact requirements
determined by the Vehicle Dynamics Assessment.
Any landscaping measures utilised, shall conform to the required
dimensions to prevent vehicle entry or encroachment.
A10
C-UAS


DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
1.
All drones should be subject to a strict no-fly zone, unless
specifically used as part of the facility operational plan.
2.
Each site will have a DTI system as standard. E based systems will
be employed based on a specific need and safe area to operate.
3.
All sensitive areas should be screened to prevent data extraction
using a UAS, this also includes roof areas.
PAG E 4 2 OF 31 1
Non-Industrial
4.
A11
Blast Protection

Sensitive information processing should be done at a location in the
buildings that prevent direct line of sight, and other directional
information gathering from occurring.
Materials, fixtures, and fittings within public areas not accessible by
vehicle should be constructed to withstand the equivalence of 15kg TNT
at a distance of 6.0m with no secondary fragments projected further then
10.0m from the seat of the explosion.
Materials, fixtures, and fittings within public areas not accessible by
vehicle should be constructed to withstand the equivalence of 15kg TNT
at a distance of 6.0m with no secondary fragments projected further then
10.0m from the seat of the explosion.
Where achievable a minimum 20.0m stand-off should be achieved from
the building fabric for vehicles. Where this is not possible, the effects of
blast shall be considered with the stand-off which is achievable.
Where achievable a minimum 20.0m stand-off should be achieved from
the building fabric for vehicles. Where this is not possible, the effects of
blast shall be considered with the stand-off which is achievable.
Buildings should be designed to avoid progressive collapse of the
primary structure caused by 100kg TNT equivalent at 20.0m stand-off.
This can be achieved through stand-off distance, building hardening or a
combination of both. Calculations and/or modelling shall be completed
for the enforceable stand-off from the building.
Buildings should be designed to avoid progressive collapse of the
primary structure caused by 500kg TNT equivalent at 20.0m stand-off.
This can be achieved through stand-off distance, building hardening or a
combination of both. Calculations and/or modelling shall be completed
for the enforceable stand-off from the building.
The most severe damage mechanism, i.e. overpressure, impulse
loading, should be utilised.
The most severe damage mechanism, i.e. overpressure, impulse
loading, should be utilised.
For security elements which respond to impulse loading, the value of
impulse shall be taken from BRA or QRA.
Design teams should also consider improved protection of specific
critical rooms within the Restricted facility, such as:
•
Security Control Rooms.
•
Gate / Entry Posts.
•
Safe Rooms.
For security elements which respond to impulse loading, the value of
impulse shall be taken from BRA or QRA.
A12
Ballistic Protection


Ballistic protection should be provided at key areas within Restricted
facilities where the threat presents a higher likelihood and impact. It is
anticipated that this will be primarily the Security Control Rooms and
Gate / Entry Points, however the STRA may identify additional critical
areas that may require protection.
The protective measures at these points should be designed to provide
the following security ratings:
•
Provide baseline protection against BR/FB6 and SG2.
•
Adopt as a minimum both BS EN 1063 and BS EN 1522 standards.
A13
Security Doorsets
See Section A13.
See Section A13.
See Section A13.
A14
Security Glazing
See Section A14.
See Section A14.
See Section A14.
A15
Manual Lock
Security
1.
1.
1.
Keyless in-line with doorset requirements, off-line locks are usable
for low usage areas.
A16
Searching,
Screening and
Detection

1.
Infrastructure provision should be allowed within design to enable
100% of people to be processed.
2.
People screening to be conducted using Millimetric Wave Scanners
(MMW).
3.
Bag scanning to be conducted using either 3d X-Ray scanning or
CT scanning that does not require the removal of electronic and
other goods from bags. If the STRA indicates significant risk, then
screening of personnel and bags should be conducted in a
dedicated space or building designed to withstand the effects of
15kg TNT equivalent.
4.
For vehicle entrances, sufficient space should be allowed for to
undertake vehicle search. Screening of vehicles will be achieved
Keyless in-line with doorset requirements, off-line locks are usable
for low usage areas.
Keyless in-line with doorset requirements, off-line locks are usable
for low usage areas.

DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 3 OF 31 1
Non-Industrial
through the use of Under Vehicle Imaging System (UVIS) supported
by appropriate manual search (i.e. Explosive Trace Detection) as
required.
A17
Security Control
Room and
Monitoring Points
1.
The security system should be monitored in either an SCR or via a
formal monitoring point or security control point suitable for the type
of facility.
2.
Additional monitoring capability should be provided at an alternative
on-site location either through a dedicated interface or via a browser
application.
3.
A18
HVAC, Intakes and
Ducting

1.
The security system should be monitored in either an SCR or via a
security monitoring point suitable for the type of facility.
1.
A dedicated Security Control Room should be provided for each
Restricted level facility.
2.
Additional monitoring capability should be provided at any static
security control point, gatehouse or command and control centre.
2.
Additional monitoring capability should be provided at any static
security control point, gatehouse or command and control centre.
3.
To provide redundancy, an off-site monitoring solution may be
utilised.
3.
The sizing and operational requirements for the site-specific SCR
shall be determined as an outcome of the overall electronic security
design.
For all locations with external air intakes, these should be positioned at a
height greater than 4.0m or made inaccessible to uncontrolled areas.
1.
All intakes should be positioned in controlled areas that negate easy
access to unauthorised personnel and a minimum of 4.0m from FFL.
2.
Rapid close-down, flow reversal and other methods should be
features of the system.
3.
All air duct or air vent openings exceeding 8 x 12 in the rooftop or
exterior walls of any building shall be secured by means of:
The use of an off-site monitoring capability may be possible.
4.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
•
Iron bars of at least 0.5 inch diameter or flat steel bars of at
least 0.25 inch width, spaced no more than 5 inches and
securely fastened.
•
Grill of at least 8 inch steel and 2 inch mesh, if the barrier is on
the outside, it shall be secured with galvanized rounded head,
flush bolts of at least three 8 inch diameter.
Roof mounted intakes should be protected from UAS interference.
PAG E 4 4 OF 31 1
Industrial Security Functional Requirements
Industrial
Ref
Security Elements
Baseline
Enhanced
Restricted
B1
VSS and Video
Analytics
1.
Publicly accessible spaces shall be covered by camera
surveillance to an Observation resolution (62ppm).
1.
All entry points are to be covered by visual surveillance cameras with a
Recognition (125ppm) level of coverage.
1.
All entry points are to be covered by visual surveillance cameras with a
Recognition (125ppm) level of coverage.
2.
Only utilised where another function is required (i.e.
people counting, IDS).
2.
Main pedestrian access points are to be covered by camera surveillance
to an Identification resolution (250ppm).
2.
Main pedestrian access points are to be covered by camera surveillance to
an Identification resolution (250ppm).
3.
BOH/FOH Transition points shall be covered by camera surveillance to a
Recognition (125ppm) level of coverage.
3.
BOH/FOH Transition points shall be covered by camera surveillance to a
Recognition (125ppm) level of coverage.
4.
Publicly accessible spaces shall be covered by camera surveillance to an
Observation resolution (62ppm).
4.
Publicly accessible spaces shall be covered by camera surveillance to an
Observation resolution (62ppm).
5.
ALPR to be utilised at vehicle entrances onto site.
5.
6.
Perimeter to be covered by visual surveillance cameras with an
Observation resolution (62ppm) level of coverage.
All lobby areas, restricted area, key points, and high value asset storage to
be covered by camera surveillance to a Recognition (125ppm) level of
coverage.
7.
Perimeter to be covered by visual assessment PTZ cameras.
6.
ALPR to be utilised at vehicle entrances onto site.
8.
Motion detection at the edge should be utilised to optimise recording
levels, with motion treated as being a trigger for recording rates.
7.
Perimeter to be covered by visual surveillance cameras with an
Observation resolution (62ppm) level of coverage.
8.
Perimeter to be covered by visual assessment PTZ cameras.
9.
Motion detection at the edge should be utilised to optimise recording levels,
with motion treated as being a trigger for recording rates.
10. Specific sterile zones, covered by suitable analytics, will be established at
the perimeter and within the facilities.
11. Key constriction points to utilise facial recognition at all facilities.
B2
B3
B4
Other Surveillance
Systems
ACS
IDS

1.
Linkage to radar detection systems to provide tracking capability for wide
area surveillance is to be considered by the designer where:
1.
Linkage to radar detection systems to provide tracking capability for wide
area surveillance is to be considered by the designer where:
•
Coverage is beneficial and/or extended distances are required above
500m.
•
Coverage is beneficial and/or extended distances are required above
500m.
•
There is a requirement to identify and track multiple targets and/or
authorised vehicles or personnel. This would be achieved with a type
of AIS system.
•
There is a requirement to identify and track multiple targets and/or
authorised vehicles or personnel. This would be achieved with a type
of AIS system.
•
The coverage provided would be more cost-effective considering
supply, install, operational and integration costs.
•
The coverage provided would be more cost-effective considering
supply, install, operational and integration costs.
Critical Area(s):
Critical Area(s):
Critical Area(s)
1.
1.
1.
Dual Factor Authentication (1 Biometric) Read in /
Read out.
Dual Factor Authentication (1 Biometric) Read in / Read out.
Controlled Area(s):
Controlled / General Area:
2.
2.
3.
General Area(s):
Single Factor authentication.
All access control systems will incorporate an identity
token management system for both digital and
physical tokens.
Intruder detection to be possible through forced entry of
any door that is access controlled or strong situational
awareness with proactive monitoring at the perimeter of the
site.
Dual Factor Authentication (1 Biometric) Read in / Read out.
Dual Factor Authentication (1 Biometric + 1 Issued on-site only credential)
Read in / Read out.
Controlled Area(s)
2. Dual Factor Authentication (1 Biometric) Read in / Read out.
General Area(s)
3. Single Factor Authentication.
4. All access control systems will incorporate an identity token management
system for both digital and physical tokens.
3.
4.
Single Factor Authentication.
All access control systems will incorporate an identity token management
system for both digital and physical tokens.
Intruder detection to be possible through forced entry of any door that is
access controlled, supported with camera verification.
Intruder detection to be possible through forced entry of any door that is access
controlled, supported with camera verification.
For critical areas, dual technology detection with verification cameras to be
utilised.
For critical areas, dual technology detection with verification cameras to be
utilised.
For any critical areas, a single technology-based detection
with verification cameras will be utilised.
The perimeter shall incorporate IDS which utilises dual-technology detection
including cameras systems with analytics.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 5 OF 31 1
Industrial
B5
Duress Alarms
Only required where it is a multi-occupancy building.
Static panic alarms to be provided at key points within the building layouts (i.e.
reception).
Static panic alarms are to be provided at key points throughout the facility to
allow duress situations to be alerted.
B6
Security Lighting
1.
Lighting should support safe movement during the
operational hours of the facilities.
1.
Lighting should support safe movement during the operational hours of the
facilities.
1.
Lighting should support safe movement during the operational hours of the
facilities.
2.
VSS Cameras to incorporate IR illumination.
2.
VSS Cameras to incorporate IR illumination.
2.
VSS Cameras to incorporate IR illumination.
3.
For facilities with a fixed perimeter, visible illumination
of the perimeter is to be provided during the hours of
darkness. This illumination zone is a strip of 3.0m
outward and 2.0m inward of the perimeter barrier.
3.
For facilities with a fixed perimeter, visible illumination of the perimeter is
to be provided during the hours of darkness. This illumination zone is a
strip of 3.0m outward and 3.0m inward of the perimeter barrier.
3.
For facilities with a fixed perimeter, visible illumination of the perimeter is to
be provided during the hours of darkness. This illumination zone is a strip of
3.0m outward and 10.0m inward of the perimeter barrier.
B7
Cyber Security
See Cyber Security Section (ref: NEOM Standard)
See Cyber Security Section (ref: NEOM Standard)
See Cyber Security Section (ref: NEOM Standard)
B8
Perimeter Security
(Site / Building)
1.
1.
1.
2.
The external site perimeter shall meet the following:
External Clear Zone: Min. 3.0m width.
•
External Clear Zone: Min. 3.0m width.
•
External Clear Zone: 3.0m width.
•
Fence/Barrier: Min. 3.0m height.
•
Fence/Barrier: Min. 3.0m height.
•
Outer Fence: Min. 3.0m height.
•
Detection: On fence/barrier or internal if identified
through the STRA.
•
Detection: On fence/barrier or internal if identified through the STRA.
•
Detection Zone: 5.0m width.
•
VSS: Perimeter coverage / Min. images: 25ppm.
VSS: Continuous coverage / Min. images: 62ppm, with PTZ for
tracking.
•
•
VSS: Continuous coverage / Min. images: 62ppm, with PTZ tracking to
125ppm.
•
24hr capability required.
•
24hr capability required.
•
24hr capability required.
•
Internal Clear Zone: Min. 2.0m width, including the
detection zone if required.
•
Internal Clear Zone: Min. 3.0m width, including detection zone if
required.
•
Internal Clear Zone: 5.0m width.
•
Provide minimum overall delay of 10 mins as Section B9 details.
•
Provide minimum overall delay of 5 mins as
Section B9 details.
•
An internal barrier may be added
2.
•
Provide minimum overall delay of 10 mins as Section B9 details.
After the perimeter security lighting and before the internal patrol road, sign
postings defining the limit of the perimeter security internal clear zone shall be
installed at maximum intervals of 250 meters. The sign must include the text
“Security Zone - Entry for Authorized Persons Only”.
Signage
The sign shall be readable from both sides of the zone and
shall have reflective painting and readable day and night.
Vehicle Security
Barriers
The external site perimeter shall meet the following:
•
After the perimeter security lighting and before the internal
patrol road, sign postings defining the limit of the perimeter
security internal clear zone shall be installed at maximum
intervals of 250 meters. The sign must include the text
“Security Zone - Entry for Authorized Persons Only”.
B9
The external site perimeter shall meet the following:
Only if the requirement is identified via the STRA.
2.
Signage
After the perimeter security lighting and before the internal patrol road, sign
postings defining the limit of the perimeter security internal clear zone shall be
installed at maximum intervals of 250 meters. The sign must include the text
“Security Zone - Entry for Authorized Persons Only”.
Signage
The sign shall be readable from both sides of the zone and shall have reflective
painting and readable day and night.
The sign shall be readable from both sides of the zone and shall have
reflective painting and readable day and night.
The building and its associated landscaping should be designed to deny
vehicle paths close to critical assets and towards vulnerable entrances and
facades. Where possible, a 25.0m stand-off should be achieved to critical
assets.
A physical barrier may be added if identified through the STRA and approved
by NEOM PSD.
All facilities will be landscaped and utilise suitable Vehicle Security Barriers at
entrance points and perimeter to prevent unauthorised vehicle entry. These
VSBs shall be selected from IWA 14 or equivalent approved products.
All selected VSBs shall meet the vehicle impact requirements determined by the
Vehicle Dynamics Assessment.
Any landscaping measures utilised, shall conform to the required dimensions to
prevent vehicle entry or encroachment.
A physical barrier may be added if identified through the STRA and approved by
NEOM PSD.
Where possible, a 45.0m stand-off should be achieved to critical assets and a
25.0m stand-off to assets.
B10
C-UAS

1.
Site should include a DTI system is threat is identified within the STRA.
DOCUMENT CODE : NEOM-NSE-PRC-001
1.
All drones should be subject to a strict no-fly zone, unless specifically used
as part of the facility operational plan.
2.
Each site will have a DTI system as standard. E based systems will be
employed based on a specific need and safe area to operate.
3.
All sensitive areas should be screened to prevent data extraction using a
UAS, this also includes roof areas.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 6 OF 31 1
Industrial
4.
B11
Blast Protection

Sensitive information processing should be done at a location in the
buildings that prevent direct line of sight, and other directional information
gathering from occurring.
Materials, fixtures, and fittings within public areas not accessible by vehicle
should be constructed to withstand the equivalence of 15kg TNT at a distance
of 6.0m with no secondary fragments projected further then 10.0m from the
seat of the explosion.
Materials, fixtures, and fittings within public areas not accessible by vehicle
should be constructed to withstand the equivalence of 15kg TNT at a distance
of 6.0m with no secondary fragments projected further then 10.0m from the seat
of the explosion.
Where achievable a minimum 25.0m stand-off should be achieved from critical
assets.
Where achievable a minimum 45.0m stand-off should be achieved from critical
assets and 25.0m from assets.
Buildings should be designed to avoid progressive collapse of the primary
structure caused by 100kg TNT equivalent at 20.0m stand-off. This can be
achieved through stand-off distance, building hardening or a combination of
both. Calculations and/or modelling shall be completed for the enforceable
stand-off from the building.
Buildings should be designed to avoid progressive collapse of the primary
structure caused by 500kg TNT equivalentat 20.0m stand-off. This can be
achieved through stand-off distance, building hardening or a combination of
both. Calculations and/or modelling shall be completed for the enforceable
stand-off from the building.
The most severe damage mechanism, i.e. overpressure, impulse loading,
should be utilised.
The most severe damage mechanism, i.e. overpressure, impulse loading,
should be utilised.
For security elements which respond to impulse loading, the value of impulse
shall be taken from BRA or QRA.
Design teams should also consider improved protection of specific critical rooms
within the Restricted facility, such as:
•
Security Control Rooms.
•
Gate / Entry Posts.
•
Safe Rooms.
For security elements which respond to impulse loading, the value of impulse
shall be taken from BRA or QRA.
B12
Ballistic Protection

Ballistic protection should be provided at key areas within Enhanced facilities
where the threat presents a higher likelihood and impact. It is anticipated that
this will be primarily the Security Control Rooms and Gate / Entry Points,
however the STRA may identify additional critical areas that may require
protection.
Ballistic protection should be provided at key areas within Restricted facilities
where the threat presents a higher likelihood and impact. It is anticipated that
this will be primarily the Security Control Rooms and Gate / Entry Points,
however the STRA may identify additional critical areas that may require
protection.
The protective measures at these points should be designed to provide the
following security ratings:
The protective measures at these points should be designed to provide the
following security ratings:
•
Provide baseline protection against BR/FB6 and SG2.
•
Provide baseline protection against BR/FB6 and SG2.
•
Adopt as a minimum both BS EN 1063 and BS EN 1522 standards.
•
Adopt as a minimum both BS EN 1063 and BS EN 1522 standards.
B13
Security Doorsets
See Section B13.
See Section B13.
See Section B13.
B14
Security Glazing
See Section B14.
See Section B14.
See Section B14.
B15
Manual Lock
Security
1.
Keyless in-line with doorset requirements, off-line locks
are usable for low usage areas.
1.
Keyless in-line with doorset requirements, off-line locks are usable for low
usage areas.
1.
Keyless in-line with doorset requirements, off-line locks are usable for low
usage areas.
B16
Searching,
Screening and
Detection
1.
The ability to control vehicle entry to the site must be
allowed for. The designer is to provide the details of
how this will be achieved and it is to be agreed by
NEOM PSD.
1.
Infrastructure provision should be allowed within design to enable 100% of
people to be processed.
1.
Infrastructure provision should be allowed within design to enable 100% of
people to be processed.
2.
2.
People screening to be conducted using Millimetric Wave Scanners
(MMW).
A rejection U-turn lane shall be provided so vehicles
denied access shall be able to turn around without
entering the facility.
3.
People screening should be proportionate to the STRA and in line with the
detection matrix.
For vehicle entrances, searching should be proportionate to the STRA in
line with the detection matrix.
A rejection U-turn lane shall be provided so vehicles denied access shall
be able to turn around without entering the facility.
3.
Bag scanning to be conduct using either 3d X-Ray scanning or CT
scanning that does not require the removal of electronic and other goods
from bags.
For vehicle entrances, sufficient space should be allowed for to undertake
vehicle search. Screening of vehicles will be achieved through the use of
Under Vehicle Imaging System (UVIS) supported by appropriate manual
search (i.e. Explosive Trace Detection) as identified through the STRA.
A rejection U-turn lane shall be provided so vehicles denied access shall be
able to turn around without entering the facility.
2.
4.
4.
5.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 7 OF 31 1
Industrial
B17
Security Control
Room and
Monitoring Points
1.
The security system should be monitored in either an
SCR or via a formal monitoring point or security control
point suitable for the type of facility.
2.
Additional monitoring capability should be provided at
an alternative on-site location either through a
dedicated interface or via a browser application.
3.
B18
HVAC, Intakes and
Ducting

1.
The security system should be monitored in either an SCR or via a
security monitoring point suitable for the type of facility.
1.
A dedicated Security Control Room should be provided for each Restricted
level facility.
2.
Additional monitoring capability should be provided at any static security
control point, gatehouse or command and control centre.
2.
A secondary/back-up Security Control Room will be provided at a diverse
location from the primary SCR.
3.
To provide redundancy, an off-site monitoring solution may be utilised.
3.
Additional monitoring capability should be provided at any static security
control point, gatehouse or command and control centre.
4.
The sizing and operational requirements for the site-specific SCR shall be
determined as an outcome of the overall electronic security design.
1.
All intakes should be positioned in controlled areas that negate easy
access to unauthorised personnel and a minimum of 4.0m from FFL.
2.
Rapid close-down, flow reversal and other methods should be features of
the system.
All air duct or air vent openings exceeding 8 x 12 in the rooftop or exterior
walls of any building shall be secured by means of:
The use of an off-site monitoring capability may be
possible.
1.
2.
3.
4.
All intakes should be positioned in controlled areas that negate easy
access to unauthorised personnel and a minimum of 4.0m from FFL.
Rapid close-down, flow reversal and other methods should be features of
the system.
All air duct or air vent openings exceeding 8 x 12 in the rooftop or exterior
walls of any building shall be secured by means of:
3.
•
Iron bars of at least 0.5 inch diameter or flat steel bars of at least 0.25
inch width, spaced no more than 5 inches and securely fastened.
•
Iron bars of at least 0.5 inch diameter or flat steel bars of at least 0.25
inch width, spaced no more than 5 inches and securely fastened.
•
Grill of at least 8 inch steel and 2 inch mesh, if the barrier is on the
outside, it shall be secured with galvanized rounded head, flush bolts
of at least three 8 inch diameter
•
Grill of at least 8 inch steel and 2 inch mesh, if the barrier is on the
outside, it shall be secured with galvanized rounded head, flush bolts
of at least three 8 inch diameter
Roof mounted intakes should be protected from UAS interference.
DOCUMENT CODE : NEOM-NSE-PRC-001
4.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
Roof mounted intakes should be protected from UAS interference.
PAG E 4 8 OF 31 1
Annex A - Security Functional Requirements (Non-Industrial)
Environmental Requirements – All Systems
All systems in NEOM must perform without degradation caused by environmental influences and
weather conditions. Therefore, all systems should comply or exceed the following requirements.
Minimum environmental conditions shall comply with those related to Telecommunications spaces as
per BICSI-TDMM latest edition.
All security spaces (including Security Equipment Rooms, Security Rooms, Security Entrance
Facilities, Security Enclosures/Cabinets) shall be cooled by redundant split or central air-conditioning
units.
No cabling associated with security should be exposed.
Environmental Considerations
Minimum Performance Requirements
Wind, rain, hail and potentially snow.
•
IP66 and NEMA 4X-rated.
•
All devices such as camera columns shall be provided with
deflection analysis based on the local wind conditions to ensure
products are fit for purpose.
•
Minimum wind speed conditions: 112km/hr unless 20 year data
available.
Temperature variances.
The Working environment
-10 °C to +65 °C (-14 °F to 149 °F) including direct sunlight and
shall include temperature rise inside the cabinet.
Maximum temperature (intermittent): 65 °C (149 °F)
Humidity 5 – 100% RH (non-condensing)
-10 °C to +65 °C (-14 °F to 149 °F) when IR LEDs are off.
Light sources, including the sun.
•
Outdoor equipment should be designed to operate without air
conditioning or a forced air ventilation system and shall be able
to function continuously within its own specific environment
conditions.
•
Window type air conditioners shall not be used for cooling any
security facilities or equipment.
•
Outdoor equipment should be designed to meet the specified
performance required under the full range of the local
environmental conditions.
•
Equipment not capable of meeting environment requirements
should be installed in a cabinet with active cooling.
•
Capable of incorporating auxiliary equipment (coolers, heaters)
only if required.
•
Sun-shaded as necessary.
Minimum Illumination
•
With Wide Dynamic Range - forensic capture & Light finder
Colour: 0.1 lux at 30 IRE, F1.6, B/W: 0.008 lux F1.6, 0 lux with
IR illumination on.
•
Colour: 0.15 lux at 50 IRE, F1.6, B/W: 0.01 lux, F1.6, 0
lux with IR illumination on.
DOCUMENT CODE : NEOM-NEN-PRC-004
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 4 9 OF 31 1
Environmental Considerations
Minimum Performance Requirements
•
Products where possible shall be provided with a sunshield to
reduce glare and thermal overheating.
Privacy regulations related to specific
public areas.
All cameras to be capable of creating privacy masking in
accordance with the Human Rights Act 1998, Anti Cybercrimes Law
2017, The National Data Governance Regulations 2020.
Wildlife including birds.
Video Analytics - To Avoid False Alarms/Triggers
Water, dust and corrosion.
•
Included video motion detection, fence guard, motion guard,
loitering guard, Auto tracking, Active Gatekeeper.
•
The video analytics system shall assist an operator in rapidly
locating and determining the cause of sensor alarms by
identifying activity in the camera scene where potential risk
exists in the area being monitored. The processing shall allow
the detection of abnormal behaviour such as, but not limited to,
activity at a time when no activity is expected, packages left
behind, entry into a restricted area or approach to a restricted
area.
•
Support for installation and integration of third-party
applications.
Equipment Housing
•
IK08, IK10 housing and mounting, IP66- and NEMA 4X-rated.
•
Airborne Dust: Average 0.3 mg/m / Sandstorm 3 mg/m.
•
Re-coatable metal casing (aluminium), hard coated.
•
Lightweight, rugged.
•
Polycarbonate clear dome with Sharp dome Technology.
•
All coastal devices to be suitable for marine environments.
•
Sun shielded as necessary.
•
Shall be both vandal and corrosion resistant.
The following shall comply with BICSI-TDMM:
•
Security Spaces (i.e. security rooms) and related elements (i.e. HVAC and fire protection)
specifications for Telecommunications spaces.
•
Security indoor cable distribution systems (i.e. cable trays, conduits, grounding).
The following shall comply with BICSI-OSPDRM:
•
Security outdoor cable distribution systems (i.e. manholes, ductbanks, grounding).
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 0 OF 31 1
Testing Requirements – All Security Infrastructure
General
•
The first training class should be scheduled so that it is completed about 30 days before factory
acceptance test (if conducted) or site acceptance test begins.
•
Equipment performance testing is designed to determine whether equipment is functional, has
adequate sensitivity, and will meet its design and performance objectives. It is not sufficient for a
component to meet the manufacturer’s standards if the component proves ineffective during
testing.
•
Testing of the operational security structure should be undertaken.
•
Standard compliance testing (SCT). SCT encompasses both NEOM standards and industry
standards.
•
Original copies of all data produced during any testing should form part of the handover
documentation at the conclusion of each phase of testing, prior to approval of the test. This
documentation also describes who will witness all testing activities. The contractor will be required
to obtain written permission from NEOM before proceeding with any testing.
•
Any component that is a part of the security system should be tested. In addition to component
testing, subsystem and complete system tests will be specified to ensure that the system
performs according to the design.
•
Before testing, the customer (or the contractor) should develop (design and prepare) a detailed
test plan. The test plan specifies the testing approach that will be taken, what will be tested, when
it will be tested, how it will be tested, and who will perform the testing.
Pre-Delivery or Factory Acceptance Testing (FAT) / Initial Acceptance test (IAT)
•
The FAT should demonstrate the concept and functionality, including integrated activities prior to
any installation at the site. The FAT should be witnessed and reported upon by the designer.
•
All data produced during FAT, including the results of each test procedure, should be delivered to
the designer and NEOM for approval of the test.
•
All deficiencies noted in the FAT should be resolved to the satisfaction of NEOM before any
installation. The contract agreement should be written so that NEOM has the option of cancelling
the contract if any major issues identified during the FAT cannot be resolved within a reasonable
Period.
Site Acceptance Testing (SAT)
•
SAT should be started after written approval has been received from NEOM regarding any
previous testing activities or installation problems.
•
Before conducting the site testing, the contractor should provide a report to the designer and
NEOM describing results of previous acceptance tests, functional tests, diagnostics, and
calibrations, including written certification that the installed, complete system has been calibrated
and tested and is ready to begin SAT. This report should be received at least two weeks before
the start of SAT. The report should also include a copy of the approved FAT procedures. The
contractor should be instructed that NEOM or its agent may terminate testing any time the system
fails to perform as specified.
•
Using SAT procedures, the contractor should demonstrate that the completed system complies
with all the contract requirements. All physical and functional requirements of the project should
be demonstrated.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 1 OF 31 1
•
Upon successful completion of the SAT, the contractor should deliver test reports and other
documentation to the designer and NEOM before commencing further testing. The contractor
should deliver a report describing results of functional tests, diagnostics, and calibrations,
including written certification that the installed, complete system has been calibrated and tested
and is ready for reliability testing. The report should also include a copy of the approved SAT
procedures.
Reliability Test or Operational Availability Testing (OAT)
•
OAT is usually conducted over a 30-day period (24 hours per day for 30 consecutive calendar
days). The purpose of the test is to ensure that the system under test can operate reliably and
stably for an extended period.
•
OAT should not be started until NEOM notifies the contractor, in writing, that all acceptance
testing has been satisfactorily completed, training (if specified) has been completed, and all
outstanding deficiencies have been corrected.
•
The contractor should provide one representative to be available 24 hours per day, including
weekends and holidays (if necessary), during OAT.
•
NEOM may terminate testing whenever the system fails to perform as specified.
•
OAT is best conducted in alternating phases (15-day Phase I and 15-day Phase II) of testing and
evaluation to allow for validation of the tests and corrective actions. The contractor should make
no repairs during any phase of testing unless authorized by NEOM in writing.
•
After each Phase testing, the contractor should identify all failures, determine causes of all
failures, repair all failures, and deliver a written report to NEOM. The report should explain in
detail the nature of each failure, corrective action taken, and the results of tests performed; it
should also recommend when to resume testing. About a week after receiving the report,
thedesigner should convene a test review meeting at the job site to discuss the results and
recommendations. At the meeting, the contractor should demonstrate that all failures have been
corrected by performing appropriate portions of the acceptance tests. Based on the contractor’s
report and the test review meeting, NEOM may set a restart date or may require the Phase
repeated. The contractor should not commence any required retesting before receiving written
notification from the customer.
•
If the system experiences no failures during Phase I testing, the contractor may proceed directly
to Phase II testing after receipt of written permission from NEOM. Otherwise, the testing and
assessment cycles continue until the testing is satisfactorily completed. (The process is repeated
until the system either achieves the desired availability or the project team determines whether to
accept the system or make design changes.
After-Implementation Testing
Several tests may be conducted after implementation or when the system has begun it useful life,
such as these:
•
•
•
•
•
•
Operational test (periodic tests to prove correct system operation but do not involve verification of
equipment operating specifications)).
Performance test.
Post-maintenance test (operational test conducted after preventive or remedial maintenance).
Subsystem tests (ensure that large parrs of the system are all working together as originally
designed).
Limited scope tests (test a complex system which is broken down into several subsystems or
segments that are tested separately).
Evaluation tests (periodic test, performed at least once a year, to validate the vulnerability
analysis and ensure that overall effectiveness is being maintained).
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 2 OF 31 1
A1: Video Surveillance Systems and Video Analytics
Security Functional Requirements are included in the NEOM Security Standard to provide minimum
levels of appropriate security based upon the likely security related risk a facility, site or element of the
built environment may be subjected to in its final operational state.
Overview
This Section defines the performance requirements and design considerations that need to be taken
into account when designing Video Surveillance Systems (VSS) within NEOM.
The designer is required to produce field of view (FoV) traces for any camera included in their
design scheme. The coverage overlay must include where a camera will also incorporate a
video analytic, and the type of analytic being used.
Invisible and Discrete Surveillance
A key element of the NEOM community is privacy, and therefore VSS should only be used where
required and supported by the specific location Security Threat and Risk assessment. When required,
the design of equipment and infrastructure should be carefully considered and combined with other
infrastructure elements wherever possible. i.e. the placement of cameras in wayfinding totems,
lighting units etc.
Whilst, cameras should not be hidden, they should be discretely placed as not to detract from the
overall environment in the specific area. They must also take account of lighting schemes to ensure
the image quality is not degraded or obscured by either artificial or natural light levels across the year.
Exceptions to this are where a strong visible security presence is required to provide a robust
deterrent effect. The need for a strong deterrent effect should be identified through the Security
Threat and Risk assessment completed by the designer. It is expected this effect will be required for
facilities and sites with a protection grading of Restricted but may also apply to specific areas of an
Enhanced security site.
Areas Where Surveillance Will Be Required
The following areas should always be considered for surveillance. Where not included in the design
scheme, an exceptions matrix should be produced to evidence why surveillance is not required or is
not appropriate.
•
Automated vehicle entry points.
•
External access points onto sites for vehicles and pedestrians.
•
VSS in support of any intruder detection systems to provide as a minimum verification of the
alarm state, but also to provide tracking of an intrusion at perimeters as appropriate.
•
Vulnerable internal areas, including:
o
Main reception points.
o
Key access control points.
o
Front of House routes.
o
Computer Equipment Rooms (CERs).
o
Server Equipment Rooms (SERs).
o
Security Control Room.
o
Critical power supply areas and plant rooms.
o
Accessible communication route points.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 3 OF 31 1
o
Fire Command Centre.
o
Loading and delivery bays.
o
Lifts, lift lobbies and escalators, to capture key movement nodes.
o
Stairwells, for safety and to capture key movement nodes.
Regulatory requirements that are incorporated into NEOM should be complied with in all
circumstances.
Specific requirements for facilities that are at border locations will be required and should be
discussed with the NEOM Border Security Lead.
Performance Requirements
The following minimum performance requirements should be taken into account when developing the
VSS design.
System
Element
Requirement
Cameras
•
High Definition (HD) minimum, with suitable higher resolution cameras where
appropriate, including 360o cameras. (1920 x 1080 minimum)
•
IP cameras only.
•
Colour images at all image quality levels including low light to 0.05 Lux.
•
Support privacy zoning.
•
Support edge recording onto storage cards.
•
Suitable for IR illumination where visible light is not available.
•
ONVIF compliant in conjunction with the VSS.
•
Thermal cameras should be suitable for the usage and have a minimum resolution
of at least 320 x 240.
•
Support video analytics.
•
The VMS must be fully configurable and upgradable to extend its operational
lifespan. Including flexible licensing.
•
The VMS must have a single common and configurable Graphical User Interface
(GUI).
•
The VMS must provide audible and visual alarm indication.
•
The VMS must provide full IP camera support, graphical mapping, integration,
reporting, alarm management, remote access and user profile management.
•
The VMS must support individual camera quality and recording settings.
•
The VMS must provide alarm/event displays and recording.
•
The VMS must provide a minimum of 90 days of VSS camera video storage
according to the recording schedule.
•
The VMS must be fully resilient and redundant with availability not falling below
99.9%
•
The VMS provide configurable reporting for audit purposes to include but not limited
to event logs, user transactions, alarms, etc.
•
The VMS will allow reports to be automatically generated on a scheduled basis and
that can be emailed to specified recipients.
Video
Management
System
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 4 OF 31 1
System
Element
Recording
Requirement
•
The VSS cameras must be recorded and stored locally onsite via a resilient and
redundant infrastructure, or off-site storage must offer the same levels of resilience
and redundancy.
•
Must support video wall usage.
•
All cameras shall be geospatially mapped to provide physical coordinates of each
device. This capability shall be used to display imagery and alarm data on GIS maps
that correlate each camera location to the map.
•
Fully functional VSS cameras must be controllable via the VMS using a mouse or a
USB PTZ control unit and support primacy control.
•
The entire VSS system shall be capable of resisting mains power spikes and
fluctuation and an indirect lightning strike and its associated EMP.
•
The VMS will provide a graphical mapping interface with dynamic VSS device icons.
•
The VSS system shall support secure and encrypted communication.
•
The VMS must support controlled, secure and auditable data exporting to approved
storage devices.
•
The VMS will support instant video recording and data tagging via user initiation.
•
The VMS will support the use of mobile devices (including body-worn cameras) for
both live and recorded images, and remote monitoring.
•
VSS system must support 180 and 360-degree cameras with de-warping and
recording.
•
VSS system shall include the ability to pixelate any area of recorded video footage.
•
The Video Recording server software must have configurable settings for individual
cameras and record images with a time and date stamp.
•
The video from all cameras must be stored and be available for viewing locally and
across the network.
•
The video recording servers must be capable of recording IP camera video feeds.
•
The video recording servers will be installed, and rack mounted in a suitable location
such as an IT Comms/Server room with resilient network and power connectivity.
•
The video recording servers must alarm if a camera is lost, if a disk fails, if power or
communications are lost via the VMS.
•
The video recording server must receive a hard or soft shutdown trigger from a UPS
unit where installed.
•
Background recording rates unless stated as regulatory requirement will be 6pps
(pictures per second).
•
If event or alarm activated the recording rate will rise to 25 - 30pps.
•
Image retention will be as follows:
•
o
Restricted Protection Group – 90 days.
o
Enhanced Protection Group – 90 days.
o
Baseline Protection Group – 30 days.
o
All groups alarm events – 90 days.
Where surveillance assets provide imagery that supports NEOM border security,
image retention will be 180 days.
Minimum Resolution Requirements
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 5 OF 31 1
Resolution is defined in the following matrix. It is the responsibility of the designer to confirm any
resolution requirements based on their specific development. Both internal and external cameras will
be installed based upon the six image categories defined in the following matrix.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 6 OF 31 1
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 7 OF 31 1
Image Standards to be Used
Resolution Requirement
Pixels Per Metre (ppm)
Strong Identification
1000
Identification
250
Recognition
125
Observation
62
Detection
25
Monitoring
12
Automatic Licence Plate Readers
•
ALPR will only be utilised where non-automated vehicles will be used in the region.
•
Automated vehicles will carry transponders to aid their real time recognition and vehicle
movement.
•
Where ALPR is employed it will be required to record vehicle entry and exit from a facility or site.
This is mandatory for Restricted and Enhanced Industrial sites.
Operational Issues
•
The VSS cameras and VMS will be reliant upon a suitably resilient network infrastructure.
•
The UPS will need to shut down the VMS/video recording servers correctly after an agreed period
of time following a power failure if the backup generator does not come online.
•
Regular system maintenance must be carried out otherwise the images captured will lose clarity
and may not meet the capture requirements.
•
VSS data requests may be made by authorised organisations and these will need to be approved
by NEOM Public Safety Department in-line with NEOM Data Privacy Policy.
Key Functional Outcomes
•
The VSS system will provide live and a post-event record of unauthorised access into the
perimeter, buildings and vulnerable areas and of events and incidents on a 24/7 basis.
•
The VSS system will provide instant live coverage with pre/post footage of a detected incident,
initiated by the VSS system itself or via an integrated system.
•
The VSS system will aid situational awareness through blank or ‘priority’ screen monitoring
(monitoring by exception) on site, with the capability of doing the same across all sites during
emergencies.
Integration Requirements
The VSS should be capable of integrating with the following systems, with integration being defined
by the security level required at the facility, site or building.
•
ACS.
•
Security lighting.
•
Intercoms.
•
HVM active barriers.
•
Physical security documents, policies and procedures.
•
Manned guarding patrols.
•
Other security systems.
•
Ability to export and import movies and images to the system.
•
All security systems shall be integrated to the command and control centre.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 8 OF 31 1
Dependent upon the level of integration that is present between systems, linked actions and queued
effects may be required. These should be detailed in a cause and effects matrix.
A brief example of a cause and effects matrix is provided below.
Alarm Indicates On Security Work Station
Camera View xxx available for selection via
Work Station alarm
Event Recorded on Security Database
Effect
Analytic alert activated
X
X
X
Door forced alarm received
X
X
X
Cause
Camera auto-cue to alert/alarm area
Cause and Effects Matrix Example
Video Surveillance System
X
Video Analytics Overview
The use and application of video analytics will be a key method to achieving the NEOM Security
Vision to create safe and secure spaces, enabled through invisible technology.
This section will provide guidance to consultants and designers on the considerations around video
analytics that need to be made.
The application of video analytics should be informed by the specific STRA and any detection and
monitoring requirements. Designers should consider the use of analytics as part of a layered security
system and, in particular, they should be developed alongside the VSS ad IDS designs.
Selection of the correct video analytic is the responsibility of the design team to meet the specific
requirements of their Concept of Security Operations.
Type of Analytic
The type of analytic to be employed must be carefully considered by the designer, rather than an
‘overarching’ capability statement including a long list of analytics. Therefore, each analytic type and
its purpose should be:
•
Clearly describe the locations and cameras where the analytic will operate.
•
Define what the alert or alarm criteria for the analytic are to be.
•
Define where the alert or alarm will be received.
•
Define the operating details for the analytic, i.e. is it 24hr or time bound, or conditions dependent.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 5 9 OF 31 1
Intelligent Functions
The designer should consider whether self-learning systems, machine learning or AI applications can
enhance the use of a video analytic in their design.
Scene Robustness
The analytics engines must be able to operate effectively, and without undue false alarm rates or
degradation, in the intended operating environment for the surveillance asset/sensor. Therefore,
certain considerations need to be taken into account where the video scene may be unduly altered
without a security incident being actually present. Video Surveillance & Assessment System shall
provide active surveillance capability under all weather conditions. Some examples of weather
conditions are given in the following matrix.
If the analytics provides a critical security function, such as primary source of detection, and it will be
ineffective under certain conditions, as second technology must be utilised to avoid this vulnerability.
Location
External assets and sensors
Impact
Rain.
Dust.
Dense Fog.
Sandstorms.
Wind.
Land Animals.
Birds.
Scenery movement, such as trees, doors or other scene items not of
interest.
Water surface movement and reflections, if applicable.
Waves, if applicable.
Fast changing illumination levels, sunlight, deep shadows or vehicle lighting.
Low scene contrast.
Low light.
Internal assets and sensors
Doors or Lifts opening.
Escalator movement.
Changing illumination levels.
Reflection from surfaces, including glazing.
Overly crowded image scenes.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 0 OF 31 1
Cameras and Lighting
The choice of camera will assure that the best analytics performance is achieved. The
analytics/camera solution must be able to automatically adapt when a camera or a scene switches
between day and night modes. This should include the selection of the most appropriate image type,
visual, thermal etc.
Fields of View
Video analytics field of view, detection location or coverage must be clearly annotated onto
surveillance overlays that include the camera field of view illustrations.
Fields of view must be shown adjusted to the location, i.e. not just general coverage which goes
through walls etc.
Cameras shall be placed based on local topography and applicable requirements.
A study shall be carried out to define the actual field of view of each camera/lens combination used
and identify blind spots. The study shall consider the actual focal length of the camera lens, camera
pole height, local topography and obstructions in the camera field of view.
Camera coverage shall overlap so there are no blind spots between adjacent cameras exist. Local
terrain shall be used to determine the optimal camera mounting pole height that will meet the
requirements of this standard.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 1 OF 31 1
Surveillance Analytic Example
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 2 OF 31 1
Reference Standards
The following standards should be used when developing the VSS design:
Standard
Description
BS EN 62676
Video surveillance systems for use in security applications.
BS 7958
Closed Circuit Television (CCTV), Management and operation code of Practice.
BS EN 50130-4 +A1
Alarm systems. Electromagnetic compatibility. Product family standard:
Immunity requirements for components of fire, intruder, hold up, CCTV, access
control and social alarm systems.
NCP 104
NSI Code of Practice for Design, Installation and Maintenance of CCTV
systems, NSI.
BS 8418 +A1
Installation and remote monitoring of detector-activated CCTV systems. Code
of practice.
NFPA 730
Guide for Premises Security.
NFPA 731
Standard for the Installation of Electronic Premises Security Systems.
NFPA 70
National Electrical Code.
NFPA 70B
Recommended Practice for Electrical Equipment Maintenance.
ANSI/SIA CP-01-2019
American National Standard Institute/Security Industry Association – Features
for False Alarm Reduction.
IEC 60529
Degrees of protection provided by enclosures (IP Code)
ASIS FPSM
Facilities Physical Security Measures Guideline.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 3 OF 31 1
A2: Other Surveillance Systems
Overview
This section outlines the requirements of other surveillance technology that is not a major part of the
VSS. In the majority of cases it is envisaged that other surveillance assets will be required at locations of
major regional infrastructure and industrial locations that require either a secure perimeter line or
early/extended detection and monitoring of activity close to the site.
This section is not to define this technology, but to outline the considerations that are for these additional
surveillance technology assets.
Counter-Unmanned Aerial Systems is covered in a separate section that should be referred to if this
threat is a consideration for the facility, site or building.
Use of Radar and Long Range Cameras
Surveillance beyond the perimeter of sites that require either early warning or situational awareness
should utilise an integrated radar and long range camera system. The radar detection range should be a
minimum of 2km and the final range should be highlighted by the STRA. The long range camera should
have a minimum range of 1km with image stabilization to provide HD imaging. Both should be
connected to the Command and Control center.
A Radar Video Surveillance System (RVSS) will utilise a single or series of radars dependent upon site
and terrain to provide a wide area, up to 360o coverage across the area of interest. Verification of
detection will be via a dual band camera system incorporating both visual and thermal cameras to
provide a true 24hr long range detection and verification capability.
The system will have the following requirements:
•
Be integrated into external security cameras, which will include:
o
Cameras mounted at the Radar Unit location. These will provide the long-range camera
capability. This is the typical location for thermal band cameras that will be able to provide
verification across the individual radar detection footprint.
o
Cameras located along the site perimeters. Generally visual band cameras with low light
capability.
•
All cameras associated with the RVSS will be networked to allow the RVSS software to select the
camera that will provide the ‘best’ view of the area or object of concern. Networking will also allow
the automatic handoff between cameras so that a continuous visual or thermal verification
accompanies the movement history of an object of interest.
•
The radar will detect multiple potential threats and ‘tagged’ friendly assets to provide strong
situational awareness to the Security Control Room operator.
•
The RVSS will be integrated into an Automatic Identification System (AIS) and ‘friendly asset’
transponder system. This will allow all tagged assets, be that vehicles, equipment or people to be
tracked so that threat analysis and information led security can be applied at the site.
•
The system will allow asset descriptions to be attached to the asset, so hovering over the asset on
the operator screen will provide details to aid situational awareness.
•
The RVSS will be able to distinguish between vehicles, people and animals based on target crosssectional size and be able to prioritise alerts based on target type, direction of travel and proximity to
specific critical locations at the site.
•
Designed to operate in all weather conditions with minimal effects from adverse weather and
precipitation on detecting intruders.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 4 OF 31 1
•
•
Minimum RVSS detection and verification capability will be in the range:
o
Vehicles: 2.0km.
o
Moving people: 1.5km.
Where RVSS is deployed at a border location it will capable of detection and verification at ranges:
o
Vehicles: 25.0km or more.
o
Moving people: 15.0km or more.
•
The radar configuration will allow for full 360° coverage with reliable detection.
•
The PTZ head of the radar system should feature a long range high definition visible spectrum
camera which is coordinated with a digitally zoomed cooled thermal camera. This allows an operator
to switch seamlessly between thermal and visible images to facilitate threat verification and tracking.
•
Low effective radiated power that poses no threat to human exposure.
•
Software enabled masking zones can be configured across the full detection area.
Reference Standards
The designer is to select relevant standards for the technology chosen. These should be submitted to
NEOM Public Safety Department for a suitability check for the proposed installation.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 5 OF 31 1
A3: Access Control Systems
Overview
This Section defines the performance requirements and design considerations that need to be taken
into account when designing Electronic Access Control Systems (ACS) within NEOM.
The designer is required to produce privacy zoning to support their placement of access control points
and lines.
Consideration on the selection of access credentials should be carefully considered and in general
should conform to the scale given below and therefore, the dwell time tolerance also. However, the
process must be suitable for the application, user experience and most importantly achieve the
desired security effect.
Where a site, building or facility is in Protection Group Restricted, and some Enhanced, access
control should have a stronger deterrence effect and therefore may not comply with the concept of
invisible security. However, the application of access control should be layered and provide greater
protection at critical locations. The different application of access control techniques and
authentication should be informed by the privacy zoning mentioned above.
By way of an example, a hospital will operate the site at many varying access control levels. Hospitals
may generally be a Protection Group Enhanced due to their vital role in the community, but may also
have some highly controlled areas such as maternity wards. It is recommended that these differing
requirements are represented by the designer in a matrix as follows.
Area
Business as Usual
Scalability
Reception Areas
Publicly accessible.
Automatic authentication.
(Free Flow – Zero Dwell)
Access controlled:
Publicly accessible.
Automatic authentication.
(Free Flow – Zero Dwell)
Access controlled:
Pharmacies
Fully Controlled. (Biometric)
Regulatory Standards.
(ACS – Process Driven)
N/A – Always Fully Controlled.
(Biometric + Second Factor)
Maternity Ward
Fully Controlled. (Biometric)
Regulatory Standards.
(ACS – Process Driven)
N/A – Always Fully Controlled.
(Biometric + Second Factor)
General Ward
Hands Free. (Biometric)
Staff ward reception controlled.
(ACS – Minimum Dwell)
Hands Free.
(Biometric + Second Factor)
Staff ward reception controlled.
(ACS – Moderate Dwell)
Accident & Emergency
Waiting Area
•
Staff credential.
•
Staff reception controlled.
•
Staff credential.
•
Staff reception controlled.
etc…
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 6 OF 30 1
The desirable dwell times apply to single access control points. As facilities, sites and buildings
become more secure, multiple access control points may be incorporated to segregate between
different privacy zones, and these may also represent different access control levels as in the hospital
example above. A 3D representation of this is provided on the following page to illustrate the different
ACS zones.
Invisible Re-Authentication
A key element of NEOM and the ability of the community and visitors to move around it, is the
concept of seamless and invisible security, as much as is practicable whilst still meeting security
requirements. People and objects would be re-authenticated based upon a tokenised and stored
biometric profile and also based on the IoT devices they choose to use.
To achieve this, public realm areas and open access locations may well contain sensors that capture
specific data to allow re-authentication to occur without the need for direct interaction by the person or
object. This would be suitable for a variety of use cases, including the integration to smart systems for
payments, access, and safety purposes.
Hands Free / Contactless Operation
Wherever possible, regardless of the Protection Group, it is desirable to make any access control
point a contactless operation. This includes biometrics and this requirement should form part of the
selection criteria used for the authentication method.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 7 OF 31 1
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 8 OF 31 1
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 6 9 OF 31 1
Performance Requirements
Access Control Credentials
Access control credentials shall be divided between different tokens:
•
Mobile Near Field Communication (NFC) and Bluetooth Low Energy (BLE) activated and
authenticated with on-device biometrics. Access control systems shall use encrypted storage
sectors as part of an IoT device architecture to identify the token and access rights associated.
These may be virtualised access card systems.
•
Segregated Access Control Tokens shall be used for high security facilities (nominally all Restricted
and STRA identified Enhanced locations). These tokens will remain within the facility, site or building
and be exchanged to users as part of their entry procedures to provide greater levels of control over
these access tokens. Designs should identify how this will be achieved and tokens controlled. An
alternative is the use of robust biometric controls.
•
Biometric usage is the preferred access control credential due to its uniqueness, either as an
individual or as part of a multi-factor identification/authorisation process. The biometrics below are
arranged in order of preferred method, however these need to be matched to the use case at each
access control point.
o
Facial recognition.
o
Palm vein scanning.
o
Iris recognition.
o
Voice recognition.
o
Fingerprint.
The type of biometric to be utilised should be carefully considered to ensure that its ability to capture the
biometric is not adversely affected by environmental conditions. For example, a visual band facial
recognition camera installed in a location where it is subject to changing strong sunlight will be less
reliable. The same applies to palm vein readers exposed to bright sunlight also.
The guiding principle is that all access control points wherever possible should be contactless.
Doors
The following guidance should be complied with:
•
External entrance doors will accommodate door position switches for monitoring as a minimum.
•
Security rated door-sets will be provided where there is a need to delay forced entry, or a secured
zone within the building, and to provide an overall deterrent effect to criminal activity.
•
Access control points at doors require the surrounding walls, floor, and ceilings to provide a similar
level of delay to unauthorised movement, and wherever possible deny by-pass of the access control
point.
•
Final exit and emergency egress / escape doors will accommodate a manual means of exit device in
order to secure doors from the exterior, whilst still providing a method for safe egress during an
emergency and evacuation scenario.
•
Revolving doors will be able to accommodate a position switch and shall also be monitored by the
ACS and will also have the ability to be manually locked.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 0 OF 31 1
Lifts
The following guidance should be complied with:
•
Where vertical transitions require control, then access control readers should be included within lift
cars.
•
Where vertical transitions are possible by a large number of personnel, it may be more appropriate
to have a horizontal access control point with anti-passback and tailgating prior to the vertical
transition point, and therefore the vertical control may not be required. This is dependent upon the
number of access control groups and the differing privileges assigned to each.
Receptions
The following guidance should be complied with:
•
Reception desks with access control interfaces/systems must employ strict control over the ability to
alter access database records, adding or deleting records and the ability to change transaction logs.
Log ins must be unique and strong password protected.
•
Where enrolment is completed as part of a reception function, this must also be strictly controlled
and authorised.
•
Receptions with either of the above functions must have a strategically positioned duress alarm
capability and/or and alert field in the access control GUI.
Pedestrian Barriers
The following guidance should be complied with:
•
Where pedestrian barriers, such as turnstiles or portals are required to control access, these should
provide a complete barrier to unauthorised entry.
•
Entry points should take account of all potential users, and therefore allow passage for those with
disabilities providing the same experience across all users.
•
A method must exist for responding to and processing access failure attempts.
Fire Strategy
The following guidance should be complied with:
•
The fire alarm and warning system (FAS) will be hard wired into the ACS for each building and shall
allow for the fire alarm system to directly open all electronically locked doors designated as “fail
safe” and without a mechanical override. Any mechanical locks on escape routes will be fitted with a
simple mechanical release facility in the direction of escape.
•
Locks that have a securing function even during a fire incident will operate via multi-pole activation.
•
It is the designer’s responsibility along with the fire engineer to ensure that the access control
system is safe and compliant for evacuation purposes.
Visitor Access Control
The following aspects should be carefully considered and articulated in the access control strategy:
•
Visitor access and the gaining of the correct access rights.
•
Visitor access should avoid the issue of codes, PINs or other tokens that are not specific to a
person.
•
Visitor access should always be time bound.
•
Visitor access should always be auditable.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 1 OF 31 1
•
Where secure facilities are visited, the designer should consider secondary criteria to control
access, such as escort recognition in the access control system prior to allowing a visitor credential
to successfully open an access control point.
•
For Restricted facilities, sites, and buildings all visitors to critical areas must be escorted.
Mobile Reader Capability
The designer should determine if mobile reading technology is required. If required then units should
provide the necessary functionality, be environmentally protected, robust, and also offer a secured
interface to the access control system.
Environmental Requirements
The following guidance should be compiled with:
•
ACS devices that are indoors or housed in an environmental indoor cabinet shall be cooled by
redundant centralised air-conditioning.
•
Outdoor equipment should be designed to operate without air conditioning or a forced air ventilation
system and shall be able to function continuously within its own specific environment conditions.
•
Outdoor equipment should be designed to meet the specified performance required under the full
range of the local environmental conditions.
•
Equipment not capable of meeting environment requirements should be installed in a secure cabinet
with active cooling.
•
Ambient temperature range for ACS equipment should be (-10°C to +65°C).
•
Ambient relative humidity range should be (5% to 100%) non-condensing.
ACS Reader Housings
Refer to Environmental Requirements – All Systems, Equipment Housing.
Access Control System Integration
As part of the access control strategy, the designer will need to include the following elements:
•
A Cause and Effects Matrix
•
An Integration Diagram.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 2 OF 31 1
Cause
Access
Controlled
Door
Emergency
Break
Glass Unit
Access
Control
Reader
XXXXX
(Invalid)
Effect
Access
Control
Reader
XXXXX
(Valid)
X
X
X
X
X
Access
Control
Request to
Exit
Access
Control
Door
Forced
X
X
Access
Control
Door Held
X
X
DOCUMENT CODE : NEOM-NSE-PRC-001
©NEOM [2022]. All rights reserved.
REVISION CODE: 01.00
X
X
PAG E 7 3 OF 31 1
Security Shutters Disengaged
Security Shutters Engaged
Security Cages Disengaged
Security Cages Engaged
Lifts reengaged normal usage
Lifts disengaged (Floor of Choice - Doors Open
Disengage Secondary locking mechanism
Door PIR Reengaged
Engage Secondary locking mechanism
Door PIR disengaged
Security Control Room Notified
Signal Sent to Fire Alarm Panel
Access Control readers un-masked
Signal Sent to BMS to Operate AHU
Signal Sent to BMS to Shutdown AHU
Security Control Room Notified
Signal Sent to Fire Alarm Panel
Door PSU de-energised
Access Control readers masked
Access Control disengaged
Access Control Engaged
Access
Control
All Doors
Relevant Door releases
X
Camera View xxx available for selection via Work Station
alarm
Event Recorded on Security Database
Alarm Indicates on Security Work Station
An example of a cause and effects matrix is provided below.
An example of an integration illustration is provided below.
Lockdown Systems
Where specified, lockdown capabilities will protect people and assets from marauding attacks by
providing internal safe havens and isolating intruders in areas where responders can remove the threat.
This is a mandatory requirement for all Protection Group Restricted sites, facilities, and buildings.
Two types of lockdown should be considered:
•
Dynamic: This is based upon the installed access control points and ability to ‘lock-out’ these points
from further use until deemed safe to do so. This should be enabled via the access control systems
software.
•
Manual: Where individual actions deny access through a designated point by manually locking or
securing the location. This approach is only to be utilised and defined in the security concept of
operations where it is impractical to enable dynamic lockdown.
All lockdown points should be at locations that also provide good levels of delay to forced entry and
where technical surveillance (e.g. cameras) can be achieved to aid situational awareness and response.
Therefore, it is expected that if a door set provides a specific level of delay, the surrounding walls, floor,
and ceiling that would give access into the protected space also offer an equivalent level of delay to
forced entry.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 4 OF 31 1
Effect of Lockdown
The effect of initiating a lockdown of an area where the person has authority to do so, should be to:
•
Divide the building or site into a number of segregated or compartmentalised zones.
•
Each zone should provide a level of delay to unauthorised or forced entry. The level of protection
needs to be appropriate for the Protection Group and objects being protected by the lockdown.
Activation
Activation of lockdown procedures and actions for a facility, building or a site should be able to be
completed as follows:
•
In less than 3 seconds.
•
Not require the manual locking of any doors or partitions for designated key protective areas.
•
Automatically alert the Security Control Room (SCR) on activation.
•
Be initiated through, or be integrated through, the access control system.
Deactivation
Deactivation of lockdown shall be a controlled process. Deactivation methods will vary by protection
group and include:
•
Timed deactivation.
•
Authorised biometric at centrally controlled points by only authorised personnel.
•
Local Security Control Room, but only where it is a secured SCR that would not be subject to duress
or influence.
Communication
Any facility, site or building that operates a lockdown capability should also have the ability to provide
mass notification to relevant persons, to:
•
Inform of the lockdown, and the need to Run and Hide to those personnel already at the facility, site,
or building.
•
Inform of the lockdown and to stay away from the facility, site or building until further notice.
Reference Standards
The following standards should be used when developing the ACS design:
Standard
Description
Disability Discrimination Act 1995 +
Amendment 2005.
Ensure all equipment does not impede access to any areas of the
development.
BS EN 60839
Alarm and electronic security systems.
BS 8593
Code of Practice for the Deployment and use of Body Worn Video.
NCP 109
NSI code of practice for design, installation, and maintenance of
access control systems.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 5 OF 31 1
Standard
Description
BSIA A specifier’s guide to access
control systems (Form 132), BSIA.
Guide to assist specifiers in grading access control systems in line
with other security applications.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 6 OF 31 1
A4: Intruder Detection Systems
This section should be read where an Intruder Detection System (IDS) capability has been identified.
It is mandatory for Protection Group Restricted sites, facilities, and buildings.
Requirements for Enhanced and Baseline sites should be identified through the STRA process.
Overview
The inclusion of an IDS at the facility, site or building will be based upon the site-specific threat and risk
assessment and the identified need to protect specific people, assets, or processes.
It will therefore be incumbent on each designer to identify their development’s IDS requirements and
how these are met.
Design Considerations
The following design considerations should be considered when selecting sensors/detectors:
•
Environmental conditions to which the sensor will need to operate in. i.e. would a sandstorm render
the system incapable of detection; will high winds make the detector ineffective?
•
Provide efficient coverage of the distance, area, or location to be covered.
•
What is the probability of a positive detection?
•
What is the probability of negative detection or nuisance detection?
•
Are sensors/detectors configured so that they cannot be defeated?
•
Is the system working on a single or multiple ‘knock’ basis?
•
How will an alert be verified?
•
Does the point of detection provide sufficient time for an effective response to be activated, prevent
intrusion or access to the protected object?
•
Are multiple detection technologies required?
Sensor selection is the responsibility of the designer given the specific details of the design location and
the number of technologies required.
IDS Control Panels
All intrusion detection panels shall be installed in secure locations with controlled access.
Panels should be monitored for tampering and fitted with anti-tamper technology.
For efficient arming and disarming of the IDS, a remote arming station (reader/keypad) shall be located
in a secure area near to the main entry/exit door of each building with the relevant sensor shunted for a
variable time to allow for an activation/deactivation code to be entered.
The IDS reader/keypad shall include a duress code facility.
Each control panel shall have an inbuilt memory buffer that stores IDS alarm events, and each panel
must be earthed appropriately to avoid any false alarms due to power surges. Individual Intruder alarm
control panels must have a minimum of eight (8) hours of battery back-up to maintain full operation
during a prolonged power outage.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 7 OF 31 1
Where an alarm system is a critical element of protecting the building assets, then an uninterruptible
power supply (UPS), allowing the system to continue functioning for the time directed by local law
enforcement.
IDS Tamper Alarms
All IDS sensors, control panels, and cable containment shall have integrated tamper alarms, and all IDS
components must be installed so that they cannot be tampered with by the public both by design and by
accident. IDS cabling must also have a tamper circuit to detect if it is cut or short-circuited. The tamper
circuit must be active at all times.
IDS False Alarms Rate
The designer must consider the stability of the IDS and document the acceptable threshold for an
acceptable False Alarm Rate (FAR) that is suitable for its use at the specific facility, site, or building.
However, false alarms should be a rare occurrence to avoid unnecessary disruption.
At Restricted sites this rate must be below 1 event in every 30 days.
Detection Approach
The following detection approaches should be adopted.
Protection Group
Requirement
Restricted Perimeter IDS
Dual technology-based detection with verification cameras.
Restricted Critical Area IDS
Dual technology-based detection with verification cameras.
Restricted Supporting Area IDS
Single technology-based detection with verification cameras.
Enhanced Perimeter IDS
Single technology-based detection with verification cameras or
strong situational awareness with proactive monitoring.
Enhanced Critical Area IDS
Single technology-based detection with verification cameras.
Baseline Critical Area IDS
Single technology-based detection.
Reference Standards
The following standards should be used when developing the IDS design:
Standard
Description
PD 6662:2017 PD 6662
Scheme for the application of European Standards for intrusion
and hold-up alarm systems.
NACP 11
Supplementary Code of Practice for the Planning, Installation
and Maintenance of Intruder Alarms.
BS EN 50130-5
Alarm systems. Environmental test methods.
BS EN 50518
Monitoring and Alarm Receiving Centre.
BS 8243 + A1
Installation and configuration of intruder and hold-up alarm
systems designed to generate confirmed alarm conditions.
Code of practice.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 8 OF 31 1
Standard
Description
BS EN 50130-4 + A1
Alarm systems. Electromagnetic compatibility. Product family
standard: Immunity requirements for components of fire,
intruder, hold up, CCTV, access control and social alarm
systems.
BS EN 62676
Video surveillance systems for use in security applications.
BS EN 60839
Alarm and electronic security systems.
BS EN 50136
Alarm systems. Alarm transmission systems and equipment.
BS EN 50131
Alarm systems. Intrusion and hold-up systems.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 7 9 OF 31 1
A5: Duress Alarms
Overview
The primary objective of the duress and panic alarms in this standard are targeted to the protection of
people, assets, and sites.
While different types of devices shall feature unique buttons or layouts, the main idea is to have an
emergency button to press, a verbal duress phrase to transmit, or a duress action to demonstrate so
that security staff can observe and respond to people in emergencies.
Anyone responding to such alarms must be trained in security response policies and procedures.
It is expected that specified Restricted, and potentially Enhanced security sites, will provide an alarm
direct to the Police for an immediate, and potentially armed response. The sites that have this response
will be indicated to the designers by NEOM Public Safety Department when the Protection Group is
confirmed.
Duress Alarm
A duress alarm shall be an activation device placed covertly, but accessibly, which is intended for
security situations where silent notification is appropriate. Typical locations shall include critical
equipment areas, main reception areas within medical, educational, and government authorities’
buildings, as well as higher security financial and administration facilities.
Panic Alarm
A panic alarm shall be an activation device placed overtly and accessibly, intended for security
situations where silent notification is not required. For example, within The Spine rail stations these may
be provided via Help Points.
Considerations
Both duress and panic alarms are electronic devices that shall alert a monitoring station. Each alarm
shall initiate an appropriate response and shall take into consideration the following elements.
•
Layout and scope of the panic alarm and duress security system coverage.
•
Type of activation device (button, switch, keyboard, wireless push button, Kick bar and mobile GPS
unit).
•
Placement of activation device (under a desk, a computer icon, carried on a person, or fixed in the
public realm).
•
Integration with security and building management systems, for example, dynamic lockdown and
VSS.
•
Location and type of annunciation (local/remote and audio/visual).
•
Identification and availability of responders.
In general duress button activation either via the hardwired duress button or via the wireless
transmitters, a duress signal will be sent to the operators within the Security Control Room (SCR). The
duress signal should take precedence over all activities in the SCR. The security operatives will then
decide upon the action to take based on NEOM security response policies and procedures.
The following table provides some examples:
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 0 OF 31 1
Protection
Group
Restricted
Example
Device
Name
(Identifier)
Example
Purpose of
Sensor
(Cause)
Fixed Panic
Button
Under Desk
Wireless
Panic /
Duress
Device
carried by
staff inside
a building
possibly a
lone worker
Example
Type of
Alert
Example
Alert
Description
A deliberately
operated push
button, for
personal use in
an attack or
duress
situation, to
alert the
security control
room of an
attack situation
Hold Up
Attack –
Priority 1
Personal
Attack / Hold
Up
A wireless
Radio
Frequency
Identification
device (RFID)
carried by a
person as they
move around a
building
Suspicious
activity
observed,
i.e.
tailgating
Priority 2
Example
Response
Example procedures for
responding to panic and
duress alarm annunciation
summarised below:
SCR guards verify alarm and
record events using VSS
Summon police response
Contact on-call manager
Continue to report ongoing
activity to the police
Personal
response
required.
Use VSS to follow activity
Deploy external guard to
meet attending police
Record as panic or duress
incident
Acknowledge and once
actioned reset the system
Mobile
Panic /
Duress
Device
carried by
staff outside
of a
building,
i.e., a tour
guide
Performance Requirements
Duress alarms shall provide the following minimum requirements:
Fixed / Wired
•
•
•
•
•
Fixed duress buttons shall be deliberately operated devices requiring two separate actions
before activation.
Mechanical latching action released / reset by a key.
Metal-clad construction.
Normally closed contacts that shall open on activation.
For medical facilities and similar alert applications, a mushroom type push button is required.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 1 OF 31 1
Fixed / Mobile Wireless
•
•
•
•
•
Wireless devices shall provide intelligent location-based technology allowing for immediate
reporting of employees or assets on a web-based management reporting system optimised for
mobile and tablet devices.
Mobile duress devices shall use Bluetooth transmitters that repeatedly broadcast their
presence to other nearby Bluetooth detectors. Each beacon shall have its own Unique Identifier
(UUID) and when in range of a Bluetooth ‘detector’ it can recognise the specific UUID and
report its whereabouts in real-time onto either an online console or a mobile application.
Each duress device shall be capable of integration with Wi-Fi and other sensor technologies or
to be a completely standalone system resulting in a self-monitoring solution that can provide
SMS alerts to registered numbers that can also provide real-time location information to third
parties for use with security management applications and services.
Fixed and mobile devices are to be made of robust, durable, hardwearing, and waterproof
materials adaptable to their environment.
Panic buttons and duress alarm devices shall have a wide variety of mounting and enclosure
options, including devices that can be worn as wristbands and lanyards and devices that can
be attached to or easily associated with any existing employee identity or access control card.
Card reader duress options
Other duress options that the designer shall consider for each ACS reader shall include but are not
limited to the following:
•
Initiate Dynamic Lockdown if under duress.
•
Deny if under duress.
•
Inform SCR of duress incident at specific reader within a defined security zone.
Advisory Requirements
The design should also take into consideration the development of policies and related procedures
which clearly define the following:
•
Appropriate use of the system including how and when to activate the alarm as well as clearing the
alarm and resetting the alarm.
•
Response protocols (internal and external).
•
Preventive maintenance, inspection and testing of applicable devices.
•
Establishing interim procedures during system downtime.
Documenting system activations including:
•
Reporting of malfunctions or other maintenance issues immediately and addressing functional
issues promptly.
•
Reviewing the system on a regular basis as part of the security vulnerability assessment. The
system should be modified as needed based on evolving requirements or the mitigation of identified
risks.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 2 OF 31 1
Reference Standards
The following standards should be used when developing the Duress and Panic Alarm System design:
Standard
Description
BS EN 50131
Alarm Systems. Intrusion and hold-up sytems.
BS EN 50518
Monitoring and Alarm Receiving Centres.
PD 6662
Scheme for the application of European Standards for intruder
and Hold-Up Alarm systems.
PD 6669
Guidance for the Provision of Alarm Transmission Systems
(ATS).
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 3 OF 31 1
A6: Security Lighting
Overview
The primary desired security effect is in support of surveillance assets, be they technical or operational.
The illumination type must be suitable for the surveillance type being employed. i.e. Infra-Red (IR)
illumination may well be a good choice for camera systems, but if operational staff need to operate in the
same area this is unlikely to provide the levels of illumination for them to move safely and identify
intruders, damage etc.
Dark Skies Policy
NEOM is committed to the creation of Dark Skies Policies. Policies seek to reduce the amount of light
pollution emitted directly upward or reflected from the ground to the sky.
The requirement to reduce light pollution and save energy will present challenges to lighting designers
for security as they will need to consider the following:
•
Minimising visible light.
•
Moving towards motion detection activated illumination which may not be suitable for a number of
security applications.
•
The use of Passive Infra-Red activation measures where possible.
•
Directional design for visible light.
•
The use of surveillance technology that is not visible light dependent.
•
Use of the lowest level of lighting appropriate for the purpose and location of the lighting source.
Performance Requirements
General Functional Requirements
•
Preference should be given to the use of ambient light wherever possible, unless required to meet
specific security or safety requirements.
•
Each perimeter light shall be connected to a different ring main than the light adjacent to it.
•
Perimeter lights shall be powered by an emergency power generator in the event of power failure.
•
Each lighting fixture of perimeter lighting shall be protected by circuit breaker in a secure
compartment with a suitable lock.
•
The lighting controls shall be designed so the lights are energized prior to darkness, or during the
day, at a time suitable for the run-up period of the lamps used.
•
All switchgear controls and switches for security lighting shall be located in a locked and secure
facility.
•
All VSS cameras to incorporate infrared illumination so continuous visual band illumination will be
provided. This does not apply to thermal band cameras.
•
Energy efficient lighting should be used wherever possible.
•
The use of sodium lighting or ‘yellow light’ should be avoided as it does not provide an effective
colour rendition, either for the human eye or surveillance technology, as white light halogen or LED
lighting.
•
Provide uniform illumination to avoid the development of shadows or severe illumination contrasts.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 4 OF 31 1
•
Where lighting is used in the public realm, lighting should be used to support the hierarchy of
pathways. It should encourage the use of primary routes through well-lit pathways and discourage
routes without lighting or low levels of lighting (as per the below image). This is based on the
principle that the public will perceive a well-lit area to be safe and secure. As such the lighting
design should support those routes which do not increase the opportunity for criminality.
•
Lighting should be designed in such a manner as to minimise unwanted glare.
•
Lighting/illumination infrastructure should not cause other security concerns such as climbing aids
etc. In general, anything that could be classed as a climbing aid should be a minimum of 3.0m away
from anything be protected.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 5 OF 31 1
Perimeter Illumination
Perimeter illumination using visual band light should be considered as the exception and used only in
areas where its use is essential for supporting safe movement. Where visual band light is required the
following should be considered:
•
Fixed perimeters: Visible (i.e. non-IR) illumination of the perimeter should only be used where is
supports safe and effective working of the Guard Force. If there is no guard force, then the need for
constant illumination should be considered.
•
The illumination zone is a strip of 3.0m outward and 3.0m inward of the perimeter barrier or 3.0m
outwards of the building façade.
•
The lighting in all areas shall be designed so that it does not interfere with cameras and does not
intrude into the camera field of view to the extent that camera performance is affected.
•
At existing facilities, lighting output shall be measured and recorded. Measurements shall be taken 2
hours after local sunset. Shared fence lighting has special requirements for this measurement.
•
Lighting design for parking facilities shall be in accordance with IESNA RP-20.
•
If visual band light is required, then the following minimum should be achieved where only camera
usage is required:
o
Horizontal: 5 Lux minimum @ 100mm above ground level. Uniformity to be a minimum of 2:1
average to minimum.
o
Vertical: 2 Lux minimum @ 300mm above ground level and normal to the fence line.
o
The illumination should be present during all hours of darkness and should not be event
activated. Rather it should be activated through the use of a central switch(s).
o
If cameras are being used, then colour rendition of the light should be above 60.
o
Illumination should be provided to cover any vulnerable points.
Computer plotted prints shall be supplied with all security lighting proposals showing grid patterns and
calculations covering perimeter, area lighting at perimeter fences and shared fence lighting. Grid size on
the plotted points shall be based upon a grid of 10.0m square while a grid of 3.0mx3.0m shall be used
for perimeter lighting.
Average levels of lighting for security purposes where security personal movement occurs should be a
minimum of:
Location
Lux
Vehicle parks
10
Walkways
20
Stores and loading bays
100
Perimeter lighting shall illuminate the fence line and its surrounding area with the minimum light
levels specified in the below. Lighting along the fence line shall be uniform with all light
illumination overlapping adjacent light illumination.
Location
Lux
Fence +/- 1.0m
23
Fence +3.0m internally
20
Fence +10.0m externally
12
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 6 OF 31 1
This measurement shall be taken during fully dark time (2 hours after sunset) with existing
facility lights turned off. Higher lighting level should be added if required for surveillance
systems.
Public Spaces
Average levels of illuminance that should be considered for security purposes are:
Location
Lux
Pedestrian areas
20
Vehicle parks
10
Sports stadia and similar venues – minimum level for stands and exit areas.
30
Reference Standards
The following standards should be used when developing the Security Lighting design:
Standard
Description
Lighting Against Crime
ACPO Secured by Design 2011.
BS 5489-1
Code for the design of road lighting and public amenity areas.
BS 12665
Light and Lighting. Basic terms and criteria for specifying lighting
requirements.
BS EN13201-2
Road lighting performance requirements.
BS EN 62717
LED modules for general lighting.
BS EN 12464
Lighting of workplaces
BS EN 5266-1
Emergency Lighting Code of Practice for the emergency lighting of
premises.
Lighting Guide for the Built
Environment. Lighting Guide 6
The exterior environment. The Society of Lighting Professionals
part of the Chartered Institute of Building Services Engineers.
January 2016.
Guide to Limiting Obtrusive Light
The Society of Lighting Professionals part of the Chartered
Institute of Building Services Engineers. November 2012.
Guidance Note 01/20
Guidance Note for the reduction of obtrusive light. The Institution of
Lighting Professionals.
LG06/16
Chartered Institute of Building Services Engineers Lighting
Handbook (LG06 and LG15).
LG12
Lighting Guide 12 – Emergency Lighting.
Saudi Building Code SBC 401
Saudi Electrical Code.
SASO 2870/2015 Regulation
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 7 OF 31 1
A7: Cyber Security
‘An object-orientated model, where individuals, objects and assets interact within the security system,
and physical and cyber converge.’ NEOM Technical Strategies Report - Security
NEOM’s embrace of a fully converged system architecture, with all elements being treated as objects in
a virtual eco-system will attract both malicious and curious cyber activity. It is therefore essential that all
systems are cyber-secure and conform to minimum standards to avoid vulnerabilities within the ecosystem architecture.
The sequence and frequency of Identification, Authentication, Re-authentication and Authorization
(IARA) is a key element of the cyber-physical convergence. Therefore, systems should be designed with
this criterion in mind.
This section introduces the underpinning generic requirements, and the NEOM Cyber Security Lead
should be consulted for more detailed considerations, along with complying with the security system
cyber security requirements defined by the NEOM IT and Cyber Security Teams.
For specific systems, the designer may be requested to complete a specific cyber-security risk
assessment to understand fully the threat vectors applicable and therefore the additional cyber-security
measures that will need to be included in the system design. Consideration must be given to hardware
middleware and software for control systems and security systems.
Cyber Security measures shall be the final part of a Plan-Design-Check-Act (PDCA) approach to threat
management of a converged physical, technical and logical network and physical security network
designers and operators shall utilise the PDCA cycle to evidence how cyber-security has been
evaluated in their design process. This should include a simple topology schematic showing system and
object connectivity that will be enabled.
The overarching tenet being that all systems should be designed with cyber-engineering
inherently considered, so that each system/object is considered ‘hardened’ against cyber, virtual
and logical threats.
As a baseline, all systems should be compliant with the:
•
NEOM Information Security Policy: CS_GRC_Pol_102.
•
KSA National Cyber Centre requirements.
•
ISO27001.
All systems should be able to evidence an appropriate cyber-secure engineered standard, such as the
UK Cyber Essentials Plus scheme or equivalent.
Control and safety systems are more likely to operate under regimes determined by the IEC 615082 and
ISA/IEC 624433 standards.
Physical Design Considerations
Physical security and resilience of networks and infrastructure are key to maintaining availability of the
systems.
Security Assets shall have dedicated duct(s) and Fiber Optic Cable(s).
The LAN deployed for security shall be dedicated to security systems and designated as security
network (SECNET).
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 8 OF 31 1
SECNET shall be implemented with redundant, physically discrete networks.
SECNET cabling shall be physically installed in separate discrete physical ducts or sub-ducts,from other
facility's cabling.
All security devices, except field devices, with LAN connectivity requirements shall have two, physically
discrete, network connections and shall automatically connect to the active LAN.
SECNET shall have a dedicated router/switch to connect to a backbone or public network.
It is key that measures are taken at each facility and site to ensure that a local vulnerability does not
exist, and that a cascading vulnerability does not develop through the City eco-system. i.e. the
downstream and upstream effects of their network, infrastructure and information.
The information held by each system should be prepared at each design stage to evidence that this has
been considered and that adequate information security is planned.
The following physical measures shall be implemented to mitigate or reduce the potential likelihood and
impact of cyber security threats. These measures shall be applied by the designers for the following.
Protection Group
Restricted
Enhanced
Baseline
Core Network Physical
Security
Resilience of Infrastructure
Core network hardware to be within
electronically access controlled
equipment room.
Fault-tolerant architecture with
redundant capacity systems and
multiple distribution paths.
Secure Configuration
The following functional components of secure configuration shall be implemented during design and
operation of any system:
•
Physical Security – this includes access to physical ports, removable media, debug interfaces,
tamper-protection boundary and resistance to attacks such as loss of power. The product may
consist of some elements that are deployed in a non-secure area and other elements that are
deployed in a secure area or secure enclave – these may have different requirements.
•
Secure Configuration – the product must follow NEOM’s Cyber Policy with controls over who can
change configurations.
•
Network Security – the product will consist of elements that need to communicate with each other or
to other systems. There must be controls on all pathways and objects suitable to the accessibility
and potential vulnerability associated with each.
•
Authentication management (Access Privileges) – use of Multi Factor Authentication (MFA) where
necessary as dictated by the protection group and the system criticality or information holding, with
unique credentials for each individual user, with privileges based on Need for Access and not on
seniority.
•
Monitoring – systems should be engineered to monitor for potential breaches and rules-based
violations.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 8 9 OF 31 1
Cyber Audit Requirements
Unless superseded by the aforementioned policies and standards, the following activities are required to
be completed at least annually by the facility operator and its staff:
•
Review of cybersecurity management policy and procedures.
•
Review and updating of the site/facility cybersecurity risk assessment.
•
Review the cybersecurity incident response plan.
•
Undertake an incident response exercise.
•
All staff to undertake cybersecurity awareness and training.
Reference Standards
The following standards should be used when developing the Cyber Security design:
Standard
Description
CS_GRC-Pol_101
NEOM Information Security Policy Summary
CS_GRC-Pol_102
NEOM Information Security Policy
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 0 OF 31 1
A8: Perimeter Security Barriers and Entry Points
The following section sets out design requirements for the use of pedestrian barriers at site and
facility perimeters within NEOM. Where perimeter barrier systems will form the most visible part of any
of the security systems within the built environment it is critical that they are developed in a way that
supports both the security need and the aesthetics of where they are required in NEOM.
It is expected that perimeter barrier systems will be included by exception on non-industrial sites
within NEOM. Their use will be indicated through the Security Threat and Risk Assessment.
The following should also be used as an outline guide:
•
Restricted – Site perimeter security treatment to deter trespass and site incursions. It is expected
that critical or important buildings and infrastructure will have further layers of protection.
•
Enhanced – Perimeter security treatment will be provided at the site perimeter and/or building
perimeter, whichever is most appropriate for the location.
•
Baseline – Perimeter security treatment will be provided at the building fabric level, unless
outdoor storage is required, then it will be provided at the site perimeter.
Designers should take into account the overall security effect they are trying to achieve and ensure
that measures are effectively integrated into the wider technological and operational security
provision. This also allows that the overall security effect can be built-up over a number of elements or
layers if appropriate.
Wherever possible, landscaped or a designed barrier that supports the local architecture is preferred,
assuming that a similar and demonstratable security effect is achieved.
Overview
The following design considerations should be made:
•
Are pedestrian barriers appropriate for this asset and location. Or is detection better?
•
Can the building line act as an effective perimeter to what is being protected?
•
What is the overall delay effect that is desired? Can this be achieved through other security
measures?
•
What is the criticality of the assets to be protected, and is a local level of protection close to the
asset more appropriate?
•
If free public access is required, does a barrier system actually provide any security?
•
Is there an equivalent design feature that would fit better with the local environment?
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 1 OF 31 1
For lower security sites, the emphasis should be on utilising measures to support territorial
demarcation that reinforces an implicit understanding of space and when individuals move between
public and private space. This should be clearly detailed in the CPTED development for the
site/facility.
Higher security locations that require a barrier system should be considered in two categories:
•
Those with a highly visual presence or adjacent to high footfall areas. The design aesthetic will be
more important in these locations and a bespoke design option may be required.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 2 OF 31 1
•
More remote locations with low footfall. These should adopt a more traditional perimeter approach
based upon security fencing, walls, or other type of barrier
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 3 OF 31 1
Primary Functions
The primary functions of pedestrian barriers within NEOM are as follows:
•
To delineate between public and private spaces and provide stand-off range where required to
critical elements of a facility or site.
•
To provide an obstacle against hostile intrusion into restricted or private spaces.
•
To provide an increased time delay that will restrict an attacker’s ability to penetrate a defensive
perimeter.
•
To provide resistance against burrowing, scaling, or penetration of a barrier system.
•
To allow for the authorised access of people and vehicles at designated perimeter locations
where required.
•
To act as a host for other security detection equipment such as VSS, IDS and security lighting.
•
To provide privacy screening of the location, if required and in conjunction with either solid panels
or coverings.
Pedestrian Barrier Example
The following images (see following page) and infographics provide the base standard for a 3.0m high
weld-mesh security fence that should be used where a security fence is unavoidable or is warranted
by the STRA.
For non-industrial or non-specialist applications the fence will be:
•
A minimum of 3.0m above finished ground level.
•
Follow ground contours to provide the minimum height at all points.
•
Gates will provide the same level of delay.
•
Be made from weld-mesh with a mesh size of 75mm x 12.5mm.
•
Not incorporate anti climb toppings or barbed tape coils unless a clearly identified need is shown
via the STRA.
Further specification can be found in BS1722: Part 14 which provides details on:
•
General purpose fences.
•
Boundary and perimeter fences.
•
Security fences.
•
High security fences.
Gatehouses and Formal Entry Points
The following are the requirements for each of the Protection Groups.
All Groups:
The roadway approaching a gatehouse shall have a chicane or zigzag design to retard the speed of
incoming vehicles. This may be augmented by additional speed retardation devices and designs if so
required by the proponent. A 90-degree turn leading to the gatehouse shall be an acceptable
alternative to a chicane.
•
The approach to the gatehouse after the chicane/speed control devices shall be no longer than
50.0m in order to minimize the distance the vehicle has available to accelerate to the gatehouse.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 4 OF 31 1
•
The sides of the roadway in the chicane shall have barriers that shall prevent a vehicle from
driving or cutting across the chicane.
•
Each lane in the gatehouse inspection area shall have medians separating each lane of traffic.
The medians shall be sized to allow installation of lane equipment and permit a safe area for
security personnel to stand on. The height and width of the median shall be sized as needed for
safe operation. The width shall not be less than 800mm.
•
The gatehouse should be in front of the facilities and exactly at the center of the entry, between
the entrance and exit lanes.
•
An audible and visual alarm shall be provided that is activated via pushbutton in the gatehouse
during an emergency. The pushbutton shall be protected against accidental activation but shall
not be locked at any time. The audio alarm shall be audible to all personnel in the gate area and
the visual alarm shall be placed in multiple locations to ensure clear visibility to all personnel in
the gate area. Once alarm is activated, it shall annunciate an alarm at the SCR.
•
Only security devices that require security personnel interaction or review shall be installed in the
gatehouse. The gatehouse may not be used for installation of other support and infrastructure that
are not directly required for security.
•
While the gatehouse may be used to display alarms for specified security related activities at the
gate, it may not be used for SCR functions, unless specifically identified and recommended in the
STRA.
•
A rejection U-turn lane shall be provided for vehicles denied access shall be able to turn around
without entering the facility. The rejection lane turning radius shall be sized for the largest vehicle
expected to enter the facility. The rejection lane/turning point shall be located before the
gatehouse.
•
Each entry and exit lane shall have a clearly visible traffic light type setup that will inform users
from a distance if a lane is operational or closed.
•
All lanes and traffic flow directions shall be clearly marked on the roadway.
•
Roadway containment in the access control and inspection area shall prevent inbound vehicles
from unauthorized access and shall extend from the inspection area to the end of the Response
Zone.
•
The containment shall consist of passive barriers on either side of the roadway that shall deny a
vehicle entry to the facility until the end of the Response Zone.
Protection Group
Requirement
Baseline
•
Preferred automated entry points where practicable.
•
Vehicle control barriers to be installed across all lanes for traffic control.
•
Emergency gates to be included where required by the emergency services or
site evacuation plan. All to be covered by VSS and ability to be lit to provide
adequate task lighting at a nominal 100 Lux.
•
All gates should be fully closeable to the same standard as the surrounding
perimeter barriers. These should be lockable to provide the same level of
delay as a cutting attack on the perimeter barrier.
•
If a staffed entry point is required, then a gatehouse should be provided sized
to incorporate the activities required at that point. At least one form of
communication should be provided to a supporting SCR or response point.
•
Preferred automated entry points where practicable.
•
Vehicle control barriers to be installed across all lanes for traffic control.
•
Emergency gates to be included where required by the emergency services or
site evacuation plan. All to be covered by VSS and ability to be lit to provide
adequate task lighting at a nominal 100 Lux.
Enhanced
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 5 OF 31 1
Protection Group
Requirement
•
All gates should be fully closeable to the same standard as the surrounding
perimeter barriers. These should be lockable to provide the same level of
delay as a cutting attack on the perimeter barrier.
•
Vehicle Control Barriers:
•
•
o
Vehicle speed reduction measures should be incorporated on the
approach to any gate that reduces the achievable speed at the gate line
to 48kph for a 7,200kg (N2/N3C under IWA-14).
o
Vehicle control barriers should be provided on each lane at the gate line
to help position vehicles trying to gain entry.
o
VSBs only need to be incorporated at the gate line where a need has
been identified during the STRA process.
Gatehouse Protection:
o
If not reinforced concrete, a vehicle impact barrier should cover the full
width of the attack face of the gatehouse. (IWA-14)
o
Ballistic protection for glazing, doors and walls to conform with a level of
protection at FB/BR6 + SG2.
o
Entry doors to be placed on facades 90o away from the vehicle lanes.
o
Gatehouse structure to protect against a PBIED attack.
Systems:
o
o
o
o
All security and life support systems to be on UPS.
Duress alarms to be provided.
At least 2 diverse communication methods.
Doors to the non-public areas of the gatehouse should be access
controlled using dual factor authentication.
The activity area and façade of the gatehouse should be covered by
VSS with min. image resolution 125ppm.
o
•
•
Gatehouse Sizing:
o
Sized to the activities to be undertaken at the location.
o
In-house welfare facilities to be provided.
o
Sun shading to be provided to support any external activities. The sun
shades should be installed above 5.5m in height to allow the full range of
vehicles entry to the site.
o
360o visibility should be provided for the gatehouse.
o
Two parking bays should be provided for facility security vehicles.
o
Adequate vehicle parking spaces shall be provided to allow parking of
gate personnel and visitors without obstructing traffic flow.
o
Five visitor parking bays should be provided outside of any VSB lines.
o
If a visitor centre is required, it shall be adjacent to the gatehouse.
o
Rejection lanes are to be provided without vehicles needing to traverse
any VSB lines.
Pedestrian Entry Points:
o
Restricted
To be positioned within 10.0m of the gatehouse and be covered by VSS
to an image quality to 250ppm.
•
Preferred automated entry points where practicable.
•
Vehicle control barriers to be installed across all lanes for traffic control.
•
Emergency gates to be included where required by the emergency services or
site evacuation plan. All to be covered by VSS and ability to be lit to provide
adequate task lighting at a nominal 100 Lux.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 6 OF 31 1
Protection Group
Requirement
•
All gates should be fully closeable to the same standard as the surrounding
perimeter barriers. These should be lockable to provide the same level of
delay as a cutting attack on the perimeter barrier.
•
VSBs:
•
•
•
•
o
Vehicle speed reduction measures should be incorporated on the
approach to any gate that reduces the achievable speed at the gate line
to 48kph for a 7,200kg (N2/N3C under IWA-14) where a full VSB
perimeter is to be installed.
o
Vehicle speed reduction for sites that provide VSB at critical points of the
site, but not a full perimeter, should achieve speed management to those
measures not the gate line.
o
VSB barrier controls should be adequately protected with equipment
cabinets in a protected area or in an internal equipment room as part of
the gatehouse.
Gatehouse Protection:
o
If not reinforced concrete, a vehicle impact barrier should cover the full
width of the attack face of the gatehouse. (IWA-14)
o
Ballistic protection for glazing, doors and walls to conform with a level of
protection at FB/BR6 + SG2.
o
Entry doors to be placed on facades 90o away from the vehicle lanes.
o
Gatehouse structure to protect against a PBIED attack.
Systems:
o
All security and life support systems to be on UPS.
o
Duress alarms to be provided.
o
At least 2 diverse communication methods.
o
Doors to the non-public areas of the gatehouse should be access
controlled using dual factor authentication.
o
The activity area and façade of the gatehouse should be covered by VSS
with min. image resolution 125ppm.
o
Under-Vehicle Imaging System is to be employed on all incoming lanes.
Gatehouse Sizing:
o
Sized to the activities to be undertaken at the location.
o
In-house welfare facilities to be provided.
o
Sun shading to be provided to support any external activities. The sun
shades should be installed above 5.5m in height to allow the full range of
vehicles entry to the site.
o
360o visibility should be provided for the gatehouse.
o
Two parking bays should be provided for facility security vehicles.
o
Adequate vehicle parking spaces shall be provided to allow parking of
gate personnel and visitors without obstructing traffic flow.
o
Five visitor parking bays should be provided outside of any VSB lines.
o
If a visitor center is required, it shall be adjacent to the gatehouse.
o
Rejection lanes are to be provided without vehicles needing to traverse
any VSB lines.
Pedestrian Entry Points:
o
To be positioned within 10.0m of the gatehouse and be covered by VSS
to an image quality to 250ppm.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 7 OF 31 1
Reference Standards
The following standard should be used when developing the security rated pedestrian barrier system
design:
Standard
Description
BS 1722 – Part 1 to Part 18
Fences.
LPS 1175 – Issue 8
LPS1175 focusses on the physical security of ‘intruder resistant
building components’, which includes strong-points, security
enclosures, free-standing barriers, and any products that fall within
those categories, such as doors, shutters or fencing.
Crime Prevention Through Environmental
Design
Crime Prevention Through Environmental Design (CPTED) is
defined as a multi-disciplinary approach for reducing crime
through urban and environmental design and the management
and use of built environments.
Secured by Design 2019 UK
SBD is a police initiative that improves the security of buildings
and their immediate surroundings to provide safe places to live,
work, shop, and visit.
UFC 4-022-03
Uniform Facility Codes Security Fences and Gates.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest
revision.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 8 OF 31 1
High Security Fence – Elevation
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 9 9 OF 31 1
High Security Fence – Minimum Performance Requirements
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 00 OF 3 11
A9: Vehicle Security Barriers
Overview
This section applies to any location with a Protection Group of Restricted or the site-specific Threat and
Risk Assessment identifies a need for the protection of people against a hostile vehicle threat, whether
that be a Vehicle As a Weapon (VAW) attack or a Vehicle-Borne IED.
Whilst many of the NEOM vehicles are set to be automated and driverless, the need for Hostile Vehicle
Mitigation (HVM) may remain in locations where standard vehicles could gain access. This is likely to be
the case for the NEOM Industrial City due to the Port and also any facilities that can be accessed from
highways and roads through the region.
Key considerations for the designer when designing an appropriate HVM scheme is in relation to:
•
The level of threat and identified threat methodology.
•
The expected performance requirements of HVM protection measures.
•
The likely throughput if the measures are active and need to all authorised vehicle movement.
•
Integration with intended architectural design of locations.
The designer should design HVM measures to complement their surrounding whilst still maintaining a
certified level of impact protection.
More obtrusive and standard HVM design approaches should be reserved for industrial sites with limited
public footfall where the aesthetic is less of a concern.
The Design Process
For the successful design of a HVM scheme, a multi-stage process is required in order to develop the
relevant performance requirements, through a well-defined Operational Requirement (OR). The OR
process is robust and will illustrate the relevant factors in selecting the right scheme, rather than a
blanket application of Vehicle Security Barriers (VSBs).
The following image highlights the design steps and design considerations that should be considered
through the various design stages by the designer for an HVM scheme, if required.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 01 OF 3 11
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 02 OF 3 11
Threat
There are two vehicular based threat types to be considered. Dependent upon the assessed threat type
and level, the designer should select an applicable mitigation strategy, summarised in the later sections.
•
Vehicle As a Weapon (VAW) – the use of a hostile vehicle to target Crowded Place, as part of a
crude and simplistic attack methodology. Pedestrians are targeted by driving a vehicle at crowds
with the intent of killing and injuring multiple casualties.
•
Vehicle-Borne Improvised Explosive Device (VBIED) – the use of a vehicle to store, carry and
ultimately detonate an explosive load against an identified target.
Further to the potential vehicular terrorist threat types, there are a number of methodologies that should
be considered as defined in the following matrix. All applicable options should be considered as part of
the OR process.
Attack Methodology
Designer Consideration
Parked – a parked VBIED device is left adjacent to a target
and detonated.
•
Enforce stand-off.
•
Detection of suspicious vehicles.
Encroachment – a vehicle encroaches beyond a site
perimeter where protection provides exploitable gap or a
hostile vehicle 'tailgates' behind an authorised vehicle.
•
VSB protection to disable hostile vehicle
upon impact.
•
HVM scheme designed in line with design
/ installation requirements.
•
Tiger trap system for critical asset.
Penetrative – vehicle speed is built up to allow a hostile
vehicle to breach a site perimeter and target an asset.
•
VSB protection to disable hostile vehicle
upon impact.
Deception – deception focuses upon gaining unauthorised
access beyond a secure perimeter through pretence or
stolen access credentials.
•
Secure access control system.
•
Authentication and Verification for
access.
Duress – an attack is facilitated by placing somebody under
duress to gain access beyond a secure perimeter.
•
Duress detection.
•
Multi-layered defence.
•
Tiger trap system.
Insider – a person with legitimate access facilitates an attack
by operating the security protective measures, providing
access for the hostile attacker.
•
Staff vetting.
•
Insider threat mitigation.
•
Multi-layered defence.
Tamper / Sabotage – the attacker disables or weakens the
security protective system prior to an attack. This may be a
physical or cyber-attack on automatically controlled
measures, to undermine their protective ability.
•
Visual surveillance.
•
Regular maintenance / inspection.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 03 OF 3 11
Vehicle Dynamics Assessment
As part of the OR process, a Vehicle Dynamics Assessment (VDA) should be conducted to understand
the impact classification requirements for any required VSBs.
Firstly, the designer should select the relevant risk-based threat vehicle for assessment, from the IWA14 vehicle classification types. It is recommended that the default is a N2 or N3C vehicle type.
Where a very clear threat is present, then larger vehicle types may need to be considered.
It should be noted that the threat vehicles do not cover construction equipment. If this is considered a
threat, then a pure VSB solution is unlikely to be successful without operational measures also.
The VDA should account for the total approach speed along an assessed attack path. This should be
calculated based upon the threat vehicles acceleration and cornering speeds along the vehicle swept
path.
The designer should remember that standard ‘rules of the road’ do not apply so any possible means of
approach is credible. The attacker will likely mount footpaths, enter pedestrianized zones and ignore
road signs, with the potential to traverse over large open spaces such as parks.
An example VDA is provided below.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 04 OF 3 11
The VDA impact speed provides an impact classification. An example impact classification is as follows.
It should be noted that some classification schemes will not provide a Dispersion of Major Debris
distance.
Applicable VSB measures should be selected based upon the calculated impact classification and their
intended placement and any throughput requirements for vehicles or pedestrians.
Design Approach
The design approach must be based upon the threat being mitigated.
Vehicle as a Weapon Attacks
The protection scheme should look to achieve the following aims in descending order:
•
Prevent vehicles entering the area to be protected through a denial scheme.
•
Provide a scheme that restricts easy or fast movement of vehicles into the protected space.
•
Provides a visual deterrence to vehicle attacks.
•
Provides early warning of an attack through noise or disturbance to allow people sufficient time to
move away from potential danger.
Vehicle Borne IED
Creation of Stand-off
Enforcement of stand-off is the key mitigation approach that should be adopted.
Protection Group
Stand-Off Required
Restricted – Critical Assets
45.0m
Restricted – Other Assets
25.0m
Enhanced – Critical Assets
25.0m
Additional blast mitigation measures (i.e. façade / glazing / structural design enhancement) may be
needed where stand-off is limited.
Stand-off must be enforced with impact tested and certified VSBs, with their impact rating at least
equivalent to the highest speed attainable in that location based on the VDA.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 05 OF 3 11
Attack Speed
When designing the object or surrounding approaches, there may be opportunity to limit potential attack
speeds. This reduces target attractiveness with a reduced potential impact from a VAW perspective and
reduced vehicular penetration if considering a VBIED attack.
As illustrated by a VDA, potential vehicle attack speed can be limited where there are a number of tight
radius turns. Therefore, the following principles can reduce the potential attack speed:
•
The approach roads to an object requiring HVM protection should be designed as to not allow for
direct straight approaches.
•
Direct approaches should not lead directly into an object opening, i.e. lobby area.
•
Chicanes can be inbuilt where it is desirable to further reduce attack speeds.
Visual Deterrence
A visual deterrence scheme can reduce the likelihood for attack by dissuading the potential attacker that
their attempt would be successful. This is based on the attacker wanting to avoid any substantial
obstacle.
However, it is important that the designer recognises, that residual risk remains in that a visual
deterrence scheme does not prevent a determined hostile attacker.
A visual deterrence scheme may be suitable in locations where there is a reduced risk of a vehicular
attack, but still some potential for attractiveness as a target, e.g. small crowds. Visual deterrence would
be particularly useful at large public open sites where rated VSB may not be proportionate to the threat.
Visual street furniture could be used in an architecturally supporting manner, with opportunity for design
creativity. Typical measures may include.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 06 OF 3 11
A successful visual deterrence scheme will reflect the following design principles:
•
Spaced at maximum distances of 1,200 mm from the hardened edge of structure, as to not provide
for large attractive gaps in protection.
•
Utilising substantial measures, i.e. height, mass, depth, to provide for greater visual deterrence.
•
Using robust materials, i.e. concrete planters to provide for enhanced visual deterrence.
The designer is reminded that the use of visual deterrence measures should only be used in low-risk
environments or in support of a rated VSB protective scheme, due to the fact that they are not impact
rated.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 07 OF 3 11
Vehicle Denial
If vehicle denial is required protecting crowded place against a VAW attack, or for enforcing stand-off
against a VBIED threat, then the design approach taken should successfully disable a hostile vehicle in
the event of impact.
Denial can be achieved through a number of approaches including:
•
Using standard VSB products certified to IWA-14.
•
Constructed defences.
•
Landscaped solutions.
Standard VSBs
A large range of VSB products are available, which are certified to IWA-14: 2013 – Vehicle Security
Barriers to disable a hostile vehicle, as specified by their impact rating.
It is vital that all HVM elements conform to the following principles:
•
The maximum air gap between the hardened core of adjacent VSBs is 1,200mm.
•
The 1,200mm air gap is measured between structural elements at a height of 600mm above ground.
•
The minimum height for vertical fixed structure is >600mm, assuming a vertical attack face.
However, increased height above 500mm will give greater visual deterrence and is likely to reduce
any potential penetration distances.
•
It should be noted that bollards must be to the tested height specific to each manufacturer; this is
generally in the region of 900 – 1,000mm from finished ground level.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 08 OF 3 11
VSB Type
Example Measure
Bollards
Static, retractable,
sliding, folding,
removable.
Blockers
Rising.
Gates
Swing, sliding, rising
arm barrier.
DOCUMENT CODE: NEOM-NSE-PRC-001
Typical Image
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 09 OF 3 11
VSB Type
Example Measure
Perimeter Barriers
Rope system,
planters, fences /
barriers.
Typical Image
The exact type of required measure should be specified by the OR process. For instance, if authorised
access for vehicles is required then some form of active measure is needed.
When selecting products, the designer should consider as a minimum:
•
Available foundation depths.
•
Static or active requirement.
•
Operational overlay i.e. automated, manual.
•
Expected throughput usage.
•
Aesthetics.
•
Suitability of the measure type to meet the VDA impact speeds.
•
Allowable penetration past the VSB.
•
Environmental conditions where the measures will be installed.
Constructed Defence
Where VSBs may not be suitable, constructed obstacles such as walls should be used to disable a
hostile vehicle in the event of impact. However, the constructed defence must be able to mitigate the
impact forces of a hostile vehicle. In most cases they will be best achieved through using a rated VSB
base measure and constructing a structure around it. The structure should not be overly rigid as to
prevent engagement with the VSB, or potentially form ‘a ramp’ to by-pass the location.
Where a VSB is not incorporated, the measures will not be impact rated as a tested measure but may
still be proportional to the threat if only deterrent measures are warranted.
A key example of this would be a wall system for e.g. a protected residence. This would be constructed
from substantial materials with a depth that would prevent hostile vehicle incursion. The defence of such
wall system could also be designed as to provide resistance against the effects of blast, or with added
structural resistance, e.g. using a Bi-Steel section to form the base section of the wall.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 10 OF 3 11
The principles to be followed are:
•
Be a minimum of 650mm height.
•
Be a minimum of 500mm in depth.
•
Be constructed of sufficiently robust and dense material e.g. reinforced concrete with extensive face
to face reinforcement.
•
Have a continuous foundation that allows the wall to act as one element and thus dissipate forces
better.
•
Be suitable for the ground conditions, such that there is no degradation of the foundation or wall
alignment over time.
Landscaped Features
Landscaped features will be important in the case of NEOM in separating areas of autonomous vehicles,
from people and where non-autonomous vehicles are in operation.
Landscaping as an HVM approach is also far more visually appealing, as well as cost effective over long
distances, and should be favoured over VSB measures by the designer where practicable. However,
landscaped measures do require maintenance to remain effective and this should be taken into account
by the designer when selecting their approach.
Bunds / Berm
Naturally formed barriers can provide vehicle denial as part of a secure perimeter, when meeting certain
requirements for installation. Bunds provide a sufficient obstacle when a tall enough obstacle, with a
sufficient angle on the attack face is installed.
Bunds can be enhanced when constructed using geo-textile VSB measures, which will also maintain the
shape of the measure over a period of time.
The designer should ensure that the bund:
•
Has an approach angle >50°.
•
A vertical height of at least 1,250mm.
•
A break-over angle of <130°.
Ditches
Ditches deny vehicle movement when a sufficiently wide and deep enough ditch is introduced. Ditches
must be maintained to be effective and therefore may not be suitable for all locations or threat vehicles.
The designer should not rely on information of dimensions and attacks speeds in this document and
must complete their own calculations and design.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 11 OF 3 11
The designer should consider a 4x4 vehicle’s capabilities in the design of an HVM ditch, as this vehicle
is most equipped to overcome it.
The typical ditch dimensions based upon the assessed impact speed are as outlined below.
Approach Speed
(Kph)
W = Minimum Ditch
Width
32
3.0
48
4.0
64
5.0
B = Back Face (˚)
D = Depth (M)
>50˚
>1.25
It is incumbent upon the designer to verify the dimensions for their specific use case.
Vehicle Access Control Points
At any location where an authorised vehicle requires access beyond a secure perimeter line, a Vehicle
Access Control Point will be required. This is typically needed at site perimeter entrances such the
airport airside perimeter, or at the Hydrogen Plant site boundary.
The designer must carefully consider the necessary access requirements, with consideration for:
•
How will active measures be operated?
•
What authentication is required to ensure only authorised vehicles and occupants have access?
•
How frequently will vehicle access be required?
•
Are there are any conditions of entry, i.e. vehicle search?
As part of the Concept of Operations, a detailed operational strategy should be provided for VACP
operations. An example of the outline operation is provided below.
The designer should be aware of the supporting infrastructure required at VACPs including:
•
Vehicle rejection capability.
•
Operational staff and welfare facilities.
•
Active barrier safety requirements e.g. safety sensors.
•
Video Surveillance coverage.
•
Other security systems.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 12 OF 3 11
Also refer to the Perimeter Security Section where gatehouses are required.
Example for Day to Day Operations
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 13 OF 3 11
Reference Standards
The following standard should be used when developing the Vehicle Security Barrier design:
Standard
Description
ISO IWA 14
Vehicle Security Barriers.
BSI PAS 170-1
Vehicle Impact – Low Speed Impact Testing.
CWA 16221
Vehicle security barriers. Performance requirements, test methods
and guidance on application.
ASTM F2656 / F2656M - 18
Test method that provides a structured procedure to establish a
penetration rating for vehicle perimeter barriers subjected to a
vehicle impact.
KSA Ministry of Interior HCIS Security
Directives Sec 06 4.3.3 for crash barriers
Defines level of protection required for facilities across Saudi
Arabia- specifically the standard required for crash barriers.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 14 OF 3 11
A10: Counter-Unmanned Aerial Systems
Overview
This section defines the requirements for Counter- Unmanned Aerial Systems (C-UAS), sometimes
referred to as Counter-Drone Systems. Whilst there have been incidents of hostile UAS in KSA, these
are currently infrequent and have been targeted against Royal, Government or Iconic locations, and
therefore it is prudent to plan a level of detection and protection.
However, due to the extensive range of UAS there will be a Regional level approach as well as any
localised requirements. The designer must consider the following threat options for UAS, and whether
they will apply to the facility, site or building they are designing.
•
A weaponised UAS attack – Likely to affect Royal residences and important Government
buildings.
•
Disruption of normal activity – Likely at locations where safety would be affected, such as the
airport.
•
UAS information collection – Likely for research facilities and flagship technology buildings.
The text, in terms of security effect, refers to a DTIE approach:
•
D – Detection.
•
T – Tracking.
•
I – Identification.
•
E – Effect.
C-UAS should be considered for Protection Group Restricted sites.
Where the vulnerability cannot be designed out, then a DTIE system should be designed.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 15 OF 3 11
Threat
The C-UAS function will provide mitigation against threats identified within the Design Basis Threat,
and specifically will reduce the impact against those threats highlighted in Overview Section. As UAS
threats, in general, are a potentially growing concern, further detail has been included below in the
Threat Overview.
Threat Overview
UAS present a number of key threats to the safety and security of NEOM. This is an emerging threat
with an increased use of UAS for criminal and extremist purposes seen globally. This has been
enhanced particularly with the growing capabilities of UAS such as increased flight times, payload
capacity and autonomous flight modes. UAS can support both criminal and extremist motivations or
be linked to intended nuisance attacks.
UAS have a variety of different forms from quad-copters to fixed-wing systems, however they can be
categorised into two primary categories:
•
Hobbyist: Readily available UAS with a low cost, typically with a payload capacity up to 20kg and
flight time up to 40 minutes.
•
Commercial: Bespoke and high cost UAS with upgraded capability including payload capacity,
flight time and technological components.
The varying capabilities of UAS determine the potential impact of a propagated UAS threat.
These can be broken down into kinetic and non-kinetic threats.
Kinetic threat types include:
•
Delivery of explosive payload i.e. mortar, IED, grenade.
•
Direct impact of UAS into person, object, or network function in order to cause damage or
disruption.
Non-kinetic threat types include:
•
Dispersal of CBRN agents.
•
First-person view surveillance.
•
Espionage and hostile reconnaissance.
•
Protest; carrying or dispersal of protest materials.
•
Protest; interruption of network capabilities.
•
Information theft i.e. WIFI capture, electronic jamming, signals collection.
The threats posed by UAS are set to increase as the capability of the available systems are
developed. If your design is required to take account of UAS threats, the above threat types must be
graded in your specific Threat and Risk Assessment.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 16 OF 3 11
Performance Requirements / Design Requirements
The C-UAS response will mitigate the effect of UAS through an approach of Detection, Tracking and
Identification of a hostile UAS, and application of the relevant security Effect to disable or disrupt the
UAS. This is known as a DTIE system.
Where the designer includes a C-UAS, then a concept of operations, including the response/effect
element of the DTIE system needs to be described. In certain cases, the E function will not be within
the designer’s remit, and in this scenario, the use of the DTI system needs to be clearly articulated.
Design Considerations:
The following design considerations must be taken into account:
•
Always first, is a C-UAS necessary or warranted based on the threat and risk assessment
completed by the designer.
•
Such systems, where warranted, should be discussed with NEOM Security Department prior to
any design work being undertaken.
•
Could the vulnerability to the protected assets be designed out, negating the need for a C-UAS
system?
•
Can cover from view be part of the design approach?
•
Can assets be concealed or disguised to prevent their easy recognition?
•
Will the system negatively affect neighbouring sites or operations?
•
Can a local physical barrier be put in place to protect the asset?
•
If protecting sensitive information, can obscuration films, placement away from window areas etc
be used to deny access to it?
•
Will the use of an Effect system represent an increased risk to life safety or other assets if
enacted?
•
Where located in an urban environment, would a C-UAS system offer any benefit due to the short
detection ranges and response times available?
•
Any system should not have a detrimental effect on other communications and signals.
Detection
The C-UAS should have a capability to sense the presence of unexpected objects within the specified
area of interest. Design consideration should be given to what is being protected and how time critical
the protected asset is, and thus define early warning requirements for detection of a UAS.
The detection capability of the UAS should:
•
Have a high detection rate for both hobbyist and commercial drones across a range of altitudes.
•
Ability to detect and track multiple targets.
•
Have a maximum detection time of 30 seconds after UAS launch within the system detection
zone.
•
Provide for a low false alarm rate, reducing interference from clutter or slow-moving objects such
as birds.
•
Provide a minimum detection arc of 200m within internal urban environments from the sensor and
provide a wide sensory range beyond the external perimeter, where appropriate. The arc should
be configurable so that the deployment location can be ‘filtered’ for known infrastructure,
obstructions and UAS flight paths.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 17 OF 3 11
•
Provide early detection to allow tracking and identification, as well as escalation of a security
response.
•
Where an extended perimeter is permissible, e.g. airport, hydrogen plant, the detection range
should be a minimum of 2km. The minimum detection range must be confirmed by the designer
based upon flight times to protected assets.
•
Must be capable of distinguishing between other airborne objects in that location.
The detection capability of the C-UAS must be linked to either a facility, site or building dedicated
Security Control Room or NEOM community central monitoring centre. Alerts will highlight to the
security operator a presence of a detected UAS. If the facility, site, or building does not have a
dedicated Security Control Room, then the requirement for a C-UAS should be the first consideration.
The detection process also extends beyond detecting UAS presence in the air. The C-UAS should be
integrated with security measures such as perimeter intruder detection and visual surveillance to
support the early detection of a drone operator. The system should also incorporate other electronic
detection methods that will identify an operator’s location as this provides another potential Effect
response which is easier to enact.
Ground detection of unauthorised persons or vehicles could be a precursor to a hostile UAS being
launched. Early detection for critical infrastructure facilities should consider detection technologies
that operate beyond their physical perimeter.
Tracking
Early detection of a UAS will be supported by the C-UAS tracking capability, which will determine the
location of the object and track the UAS flight path, altitude, and potential pilot location.
The tracking capability of the UAS will:
•
Track the UAS flight path, also indicating the movement trail from detection.
•
Determine flight altitude.
•
Indicate the UAS speed and therefore be able to integrate with other systems to show a threat
overlay with potential arrival times to different assets.
•
Track data signals to pinpoint location of operating pilot.
•
Provide GPS or other data to other security sensors, such as video, to allow multi-mode
verification and surveillance of the UAS.
UAS are based upon internet-based communications, which provide for an exploitable vulnerability to
track the user of the UAS. Data transmissions between the UAS, external servers and controlling
smart device will be detected and tracked to determine the pilot location. This information could
include GPS location, name information, IP addresses or product serial numbers.
Where the DTI or DTIE system is a commercial system, it will be the responsibility of the commercial
organisation for monitoring DTI functions, and only where appropriate and approved by NEOM
Authorities will an E function be allowable.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 18 OF 3 11
Identification
The C-UAS will then have the capability to identify the UAS; this will classify an unidentifiable object
as a hostile UAS.
The identification capability of the UAS will:
•
Distinguish between authorised UAS and unauthorised UAS, this will also link to a geo-fencing
system, flight exclusion zones, time authorisations as a minimum. The wider control of airspace
should be discussed with NEOM if your risk assessment determined that a C-UAS is warranted.
•
Provide a confirmation of the tracked UAS to a monitoring station as a hostile UAS intrusion.
•
Decide on an appropriate response.
•
An Automatic Identification System (AIS) will support the identification of UAS. All authorised UAS
used for a variety of supporting services i.e. security, service inspection, transport of goods within
NEOM will have an AIS transponder fitted and be registered with the NEOM authorities.
•
The AIS will link to a registered user database that will give the detecting C-UAS system standard
non-personal data. If the UAS poses a threat, then either the C-UAS will be able to take direct
action or reporting of the incident to NEOM if not an authorised Effect system.
•
Identify potential targets of the UAS.
Therefore, any object within the airspace that is not fitted with an AIS transponder and is registered
will be immediately identified allowing for the relevant security effect or response to be prioritised.
Effect
The combination of Detection, Tracking and Identification will allow for the supply of timely information
which allows for a relevant security Effect if authorised.
Any Effect must be safe and not increase the risk of injury to people or property.
This will manifest in the following C-UAS capabilities:
•
Disrupt: intercept and jam UAS signals to prevent incursion and return to the pilot location.
•
Disable: intercept data signals and commandeer UAS to force to land safely.
•
Defeat: use kinetic measures to physically destroy or capture the hostile UAS.
It should be accepted that it is unlikely to be safe and practical to use jamming or kinetic methods in
urban areas. A detailed Security Operational Requirement (SOR) is required to determine the
necessary security response to unauthorised UAS incursions. This will be determined by:
•
The criticality of the targeted object and required immediacy of response.
•
Surrounding assets and people, considering injury or damage if the UAS is brought down.
•
Type and size of the hostile UAS.
It is stressed, that in all cases, consideration of a UAS threat early in design is most
appropriate and where possible using design features and layout to prevent the threat will be
more effective and enduring than fitting a C-UAS.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 19 OF 3 11
Equipment
The designer needs to consider the range of detection measures that are suitable for their facility, site
or building as this will differ:
•
Radar: transmittal of radio waves to detect objects through reflection. Particularly useful for
scanning large area ranges.
•
Electro-Optical: camera that senses objects on the electro-magnetic spectrum in daylight, or
through the use of Infra-Red during night-time.
•
Electronic Surveillance: detecting electromagnetic emissions.
•
Acoustic Sensors: detection of objects through sound waves emitted by object.
The type of detection technology, and combination of sensors will need to be determined based on
layout and identification of assets for protection. The technology decision and supporting vulnerability
assessment should form part of the early design stages, preferably in the Concept Phase.
Supporting Mitigations
The designer should consider supporting the C-UAS with the following additional mitigations:
Exclusion Zones and Geo-Fencing
Discrete facilities, sites, and buildings with a defined physical security perimeter, such as a fence (e.g.
Airport, Desalination Plant) may benefit from geo-fencing to act as an exclusion zone. This will detect
the incursion of unauthorised UAS into the airspace of areas which will be attractive targets to both
criminal and extremist exploitation via UAS.
Internal Information Protection
Information Technology resilience will be designed into systems to limit the opportunity for a UAS to
extract sensitive information. Cyber resilience mitigations will successfully reduce the impact that a
cyber-attack via UAS could have.
Left Package / CBRN Detection
Left package detection and CBRN will support the detection of packages such as IEDs delivered via
UAS or dispersal of CBRN agents by UAS. This capability if required, should come from other
surveillance assets, and be clearly defined in the Security Concept of Operations.
Blast Resilience
A very limited number of facilities, sites or buildings should have a degree of blast resilience, with
particular consideration for object structure and rooftop strength. Any blast measures should be
designed into the building, only after vulnerability has been removed remembering that the majority of
UAS can only deliver small payloads.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 20 OF 3 11
Reference Standards
Currently very few specific standards exist to define C-UAS systems. The designer should follow the
guidance of the constituent elements of the system to provide a safe and effective system. i.e. radar
linked to video as a detection and tracking combination.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest
revision.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 21 OF 3 11
A11: Blast Protection
Introduction
The requirements for blast protection within NEOM will be based upon the specific threat and risk
assessment that is completed for the facility, site, or building. There are a number of baseline design
considerations that will provide an overall reduction in the effects of any blast or extreme loading
scenarios.
Before blast protection measures are designed, the following considerations should be made.
•
Is the overall risk severity of a blast related event beyond a tolerable level? i.e. is blast protection
needed?
•
Is it possible to design out the vulnerability for what is being protected?
•
Can the stand-off distance between the protected area and the location of an explosion be
increased to reduce the likely loading on the structure/asset?
•
Is the orientation and location of the protected asset such that it minimises any blast effects?
•
Can the blast wave be disrupted before it reaches the asset?
•
Can building/structural hardening be undertaken?
If there is a requirement for blast protection/mitigation then the following should be considered the
minimum design criteria, but must be informed by the specific threat and risk assessment:
•
Any structure must be designed to not disproportionately or progressively collapse when subjected
to the threat loading criteria.
•
Any elements that will form secondary fragmentation, especially glazing, must be designed that the
failure mode is a Low hazard. (See the Glazing Section).
•
Any blast effects experienced by people must not be made worse through the design.
Assessment of blast loading and its effects must be completed by a suitably qualified and experienced
person in the effects of blast loading.
Certain built objects within NEOM will require defined levels of protection from blast loading and these
are outlined in the following matrix. Further protection, if required, should be evidenced in the specific
threat and risk outcomes.
Built Object
Factor
Recommended Treatment
Restricted Protection Group
Effects of blast loading.
•
Specific consideration of critical assets
and key areas for protection.
•
Control Rooms.
•
Gate/Entry Posts.
•
Control Rooms.
•
Gate/Entry Posts.
•
Critical Points.
•
Safe Rooms.
•
To be informed by the Royal Protection
Unit.
Airport, Port, Data Centres,
Border Points, Security
Facilities, Hydrogen Production
& Pilot, Financial Services,
Government Complexes,
Consular, Police Stations.
Effects of blast loading.
Royal Residences
Effects of blast loading.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 22 OF 3 11
Design Basis Threat
The following table provides the standard DBTs for explosives base threats. Applicability of each DBT
should be taken from the Minimum Security Requirements Section.
Threat
Design Basis Threat
VBIED
•
100kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 20.0m.
•
Stand-off to structure to be informed by enforceable distance for preventing
a vehicle, i.e. HVM measures.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 20.0m is
taken where the stand-off is below 20.0m, and actual stand-off utilised
where the distance is above 20.0m.
•
500kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 20.0m.
•
Stand-off to structure to be informed by enforceable distance for preventing
a vehicle, i.e. HVM measures.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 20.0m is
taken where the stand-off is below 20.0m, and actual stand-off utilised
where the distance is above 20.0m.
•
15kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 6.0m.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 6.0m is
taken.
•
15kg TNT equivalent bare charge detonated at 0.25m above the ground
applied at a satnd-off distance of 6.0m.
•
For attacks against a structure it should be assumed that the charge has a
minimal to zero stand-off distance if no obstruction to placing the IED exists.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 6.0m is
taken.
•
1kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 1.0m.
Large VBIED
PBIED
Placed IED
Mail IED
Note: Unless specifically indicated by NEOM Public Safety Department, buildings and structures are not
designed to withstand military explosive based threats.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 23 OF 3 11
Reference Standards
The following standard should be used when developing the blast protection design:
Standard
Description
ISO16933
Glass in building - Explosion resistant security glazing Test and classification for
arena air blast loading.
ASTM F1642 / F1642M-17
Standard Test Method for Glazing and Glazing Systems Subject to Air blast
Loadings, ASTM International, West Conshohocken, PA, 2017.
EN 13123-1
Windows, Doors and Shutters Explosion resistance; Requirements and
Classification Part 1: Shock Tube. CEN European Committee for
Standardization, 2001.
EN 13123‐2
Windows, Doors and Shutters-Explosion Resistance; Requirements and
classification - Part 2: Range Test. CEN European Committee for
Standardization, 2004.
EN 13124-1
Windows, Doors and Shutters – Explosion Resistance; Test Method Part 1:
Shock Tube. CEN European Committee for Standardization, 2001.
EN 13541
Glass in building - Security Glazing -Testing and classification of resistance
against explosion pressure. CEN European Committee for Standardization
2012.
GSA-TS01
Standard test method for glazing and window systems subject to dynamic
overpressure loadings. US General Services Administration, 2003.
References
Blast Effects on Buildings. Cornie, Mays & Smith. 3rd Edition. 2019.
Handbook for Blast-Resistant Design of Buildings. John Wiley & Sons, Inc. 2010.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 24 OF 3 11
A12: Ballistic Protection
Overview
NEOM is being developed to provide multi-layered security from its borders, through the buffer zones
that surround the City and outlying sites, and into the buildings and structures that will form the
communities. It is anticipated that very few sites will require a level of ballistic protection, and by
exception these need to be identified during the facility, site or building specific threat and risk
assessment.
The topic of ballistic protection is closely aligned with the Glazing Section, and this should also be
referred to by the designer to understand the overall enhanced security requirements that may be
required.
Certain built objects within NEOM will require defined levels of protection for ballistic protection and
these are outlined in the following matrix. Further protection, if required, should be evidenced in the
specific threat and risk outcomes.
Built Object
Factor
Recommended Treatment
Restricted Protection Group
Effects of Ballistic Damage.
•
Specific consideration of critical
assets and key areas for protection.
•
Control Rooms.
•
Gate/Entry Posts.
•
Control Rooms.
•
Gate/Entry Posts.
•
Critical Points.
•
Safe Rooms.
•
To be informed by the Royal
Protection Unit.
Airport, Port, Data Centres, Border
Points, Security Facilities,
Hydrogen Production & Pilot,
Financial Services, Government
Complexes, Consular, Police
Stations.
Effects of Ballistic Damage.
Royal Residences
Effects of Ballistic Damage.
Threat
NEOM requires to future-proof specific locations against the threat of a ballistic attack. Whilst these
attacks could be unlikely, the likelihood may change in the future and such measures are costly and
difficult to retrofit effectively.
Therefore, an identified need for ballistic protection will use the following design base threat for all
locations unless an enhancement is required based on the people or asset being protected.
The security factor and its associated design base threats:
Security Factor
Effects of Ballistic Damage
Intent
• Protection Measures
DOCUMENT CODE: NEOM-NSE-PRC-001
Design Base Threat (DBT)
• BR/FB6 + SG2.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 25 OF 3 11
Performance Requirements
Effects of Ballistic Damage
The first consideration is for the vulnerability wherever possible to be designed out, consider:
•
Orientation and/or placement to avoid the vulnerability.
•
Denying direct line of sight. Most threats will require line of sight to be successful.
•
Where the situation cannot be avoided, designing a number of layers to provide the protection.
•
Glazing is degraded by ballistic attack and therefore as tested will only provide certainty of
protection for a maximum of three rounds of the specified ammunition. Therefore, no protective
ballistic system in isolation represents the whole security solution.
•
If polycarbonate is used in the glazing build-up, it should not be placed where the environmental
conditions will degrade it, or in areas where abrasion is likely.
•
A glazing specialist should be consulted where the glass tint is important, as thicker ballistic
protective glass will cause a green tint unless specified with the correct chemical content.
•
Protection can be developed through the use of multiple denial and protection layers as shown in
the following schematic.
The DBT is based against the system defined in BS EN1063 and BS EN1522 that defines the threat on
a scale prefixed by BR or FB. The threat is the same for each level.
Therefore, wherever ballistic protection is required, the baseline level of protection is BR/FB6 and SG2.
Certain facilities where ballistic glazing is required, such as the Royal Residences, may require an
enhancement above the DBT. This should be discussed with the relevant security stakeholders.
Safe rooms designed against ballistic attack will require careful consideration to ensure that no weak
areas exist in the protective shell of the room. This is 3 dimensional and should include floors and ceiling
areas, as well as wall panels.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 26 OF 3 11
Reference Standards
The following standard should be used when developing the ballistic protection design:
Standard
Description
BS EN 1063
Glass in building. Security glazing. Testing and classification of
resistance against bullet attack.
BS EN 1522
Windows, doors, shutters and blinds. Bullet resistance.
Requirements and classification.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 27 OF 3 11
A13: Security Doorsets
Overview
Security door sets will form a key element of the physical security overlay and must be considered as
part of the overall security effect.
It is important to determine the security requirements for the door specifically and the following
considerations should be taken account of:
•
What function does the doorset need to perform? This should consider normal operations alongside
the type of threats it should mitigate.
•
Following the STRA, what types of threat / attack does the door need to work against (i.e. Manual
attack, blast, ballistic etc.)?
The security function for doorsets is as follows:
•
To prevent or delay unauthorised access into a protected space by providing a physical barrier that
provides proportionate mitigation to an assessed threat of unauthorised entry.
•
In some cases, such as police stations, prisons, and secure mental health medical facilities it will be
necessary to provide doors and doorsets that prevent unauthorised exit from a facility.
•
To provide a demarcation between public and private space.
•
To prevent undetected entry into a protected area through resistance to surreptitious attacks.
•
To allow safe egress from the protected building or area in an emergency while preventing
unauthorised entry.
•
To provide enough time for those inside a protected building or space, if under attack, to act before
criminal entry is gained.
•
To provide the appropriate level of security against unauthorised entry to restricted areas within
buildings. For example, entrances to cash handling areas in banks or high value goods facilities in
logistics warehouses.
There are many different types of doorsets on the market and it is important that designers choose the
correct door for the location where it is to be installed and for its purpose. Some examples of security
rated doors are shown below:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 28 OF 3 11
Attacker Capability
The following table sets out a classification guide for potential manual attackers, based upon the level of
criminal intent, preparedness, skillset, knowledge, and available equipment.
The attacker types are taken from BRE LPS 1175: Issue 8 categorisation of criminal threat levels. This
considers an assessment of an attacker’s intent and capability, to provide a security rating based upon a
capability threat rated from A to H (low to high).
The overall delay time to be achieved can be achieved either through a single or multiple layers of
protection.
The following matrix provides guidance on the minimum standard that should be applied based upon the
Protection Group and criticality. However, these are minimum standards and if an STRA shows
increased threat greater protection levels may be required.
If a designer specifies doors that are certified under a different standard, proof of delay compliance will
need to be provided at the relevant design stage.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 29 OF 3 11
Protection
Group
Attacker
Type
Description
Tool set
SR Rating
Baseline
A
An opportunistic
criminal exploiting
a security
vulnerability using
low tech, handheld
tools.
SR 1
(A1 = toolset
A, 1-minute
delay).
Baseline –
Critical Areas
Enhanced –
Specified
Supporting
Areas
B
An opportunistic
criminal targeting
specific locations.
SR 1+
(A3 = toolset
A, 3-minute
delay).
Enhanced –
Critical Areas
C
Planned targeting
of more sensitive
sites.
SR 3
C5 = toolset
C, 5-minute
delay).
Restricted –
Specified
Supporting
Areas
E
Determined
criminal targeting
important sites.
SR 5
E10 = toolset
E, 10-minute
delay).
Restricted –
Critical Areas
H
Sophisticated and
determined
attacker, targeting
a mission critical
facility.
SR 7+
H10 = toolset
H, 10-minute
delay).
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 30 OF 3 11
Examples of how delay can be layered over different elements of the built form to achieve and overall
delay time are provided below.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 31 OF 3 11
The selected doorsets would be expected to meet the following performance requirements:
•
Delay an attacker’s attempts to penetrate the doorset in order to enter the protected building or
space within a building.
•
Provide the appropriate level of resistance according to the Protection group of the building or space
to be protected.
•
Resist the creation of a full-body access aperture through the fabric of the leaf. This aperture is
defined within the Centre for Protection of National Infrastructure’s Manual Forced Entry Standard
as being one through which an elliptical test block measuring 400mm by 225mm may be passed.
•
Prevent undetected entry into a protected area by providing resistance to surreptitious attack.
•
Be fitted with door locking hardware and hinges, dog bolts etc. that are commensurate with the
assessed resistance class of the doorset.
•
Be suitably durable and maintainable relative to the doorsets location.
•
Be securely installed within compatible structures. If this is not the case and a security door is
installed into a weaker structure it may:
o
Fail to prevent unauthorised entry. For example, it may be possible for an attacker to remove the
doorset from the surrounding structure or penetrate the surrounding structure in order to operate
door release mechanisms located on the protected side of the doorset.
o
Lead to structural damage. For example, if a doorset incorporating a heavy door leaf is fitted
within a lightweight partition, the surrounding partition may crack due to the door leaf opening
and closing repeatedly causing fatigue fractures in the walling material. Fixings holding the
doorset may also work loose.
Reference Standards
The following standards should be referred to when developing the security doorset design:
Standard
Description
LPS 1175 – Issue 8
LPS1175 focusses on the physical security of ‘intruder resistant building components’,
which includes strong-points, security enclosures, free-standing barriers, and any
products that fall within those categories, such as doors, shutters or fencing.
PAS 24
Enhanced security performance requirements for doorsets and windows in the UK.
Doorsets and windows intended to offer a level of security suitable for dwellings and
other buildings exposed to comparable risk.
BS EN 1627
Pedestrian doorsets, windows, curtain walling, grilles and shutters. Burglar resistance.
Requirements and classification
BS 3621
Locking system standard for doorsets - Locked by key from both sides.
BS 8621
Locking system standard for doorsets - Locked by key from outside only, can always
be opened from the inside without a key.
BS 10621
Lock assemblies in which the operating mode can be switched between the normal BS
8621 operating mode and a secure mode in which no egress is possible.
Saudi Building Code
2018
General requirements.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 32 OF 3 11
A14: Security Glazing
Overview
Given the design vision and liveability aspects of NEOM, natural light will form a key part of any scheme,
balanced against passive heat control and the maintenance of privacy for residents, businesses and
visitors. There are a number of concerns related to glazing and security that need to be taken into
account for any facility, site or building. These have been arranged into four Security Factors to aid the
designer in identifying clearly those which apply to their development.
•
Effects of Blast Loading.
•
Effects of Ballistic Damage.
•
Resisting Manual Attack.
•
Privacy.
Certain built objects within NEOM will require defined levels of protection for some or all of the above
factors. This will also account for non-intentional blast and ballistic damage are specified facilities. The
following matrix provides a baseline of minimum requirements. However, it should be noted that the
need and inclusion of mitigations and protection against attack on glazed systems will also be informed
by the specific Security Threat and Risk Assessment and how the site, facility or building will be used,
especially in relation to massing of people.
Protection Group
Factor
All Groups
•
Restricted
Restricted
Recommended Treatment
Resisting Manual Attack.
DOCUMENT CODE: NEOM-NSE-PRC-001
Graded to the criticality of the
site.
•
Graded to the local criticality for
where the glazing is placed.
•
Specific consideration of critical
and key areas for protection.
•
Effects of Blast Loading.
•
Resisting Manual Attack.
•
Privacy.
•
Privacy for key areas/points.
•
Effects of Ballistic Damage.
•
Control Rooms.
•
Gate/Entry Posts.
•
Critical Points.
•
To be informed by Royal
Protection Unit.
Enhanced (STRA indicated)
Royal Residences
•
•
All.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 33 OF 3 11
Security Factors
The four security factors and associated design base threats: 1
Security Factor
Intent
Design Base Threat (DBT)
Effects of Blast Loading
•
Mitigation Measures
•
•
Protection Measures
Person Borne IED – 15kg (Normal) applied at a
6.0m stand-off range.
•
Vehicle Borne IED – 100kg (Normal) at a 20.0m
stand-off range.
•
Large VBIED – 500kg (Enhanced) at a 20.0m
stand-off range.
Effects of Ballistic Damage
•
Protection Measures
•
BR/FB6 + SG2
Resisting Manual Attack
•
Protection Measures
•
EN1630 RC based attacker types and equipment.
(See Performance Requirements)
•
Loss Prevention Standard – specified sites.
•
(See Performance Requirements)
Privacy
•
Mitigation Measures
•
Mitigation: Orientation, obscuration etc.
•
Protection Measures
•
Protection: Counter Surveillance Technical
methods to be defined by designer if required.
Success Criteria
The success criteria for glazed systems are as follows:
•
Glazing subjected to blast loading should provide a Low Hazard failure. This is defined as the level
of hazard where glass debris would be projected into a room for a distance of not more than 3.0m
and not exceeding 0.5m above the floor at this distance. Injuries would be limited to low body cuts,
and fatalities would not be expected, although persons close to the window could be seriously
injured.
If the glazing is of a laminated nature to will significantly reduce the fragmentation produced upon
failure, with generally a higher level of energy absorption in the failing system, thus providing less
damaging energy.
1
It should be noted that the protection against military grade munitions is considered a specialist scenario, and if required this will
be informed by NEOM Public Safety Department.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 34 OF 3 11
•
Designers have considered the need for the glazing if security-based enhancements or hardening
are required.
•
Designers have considered whether a more enduring solution can be sought, such as re-orientation
or placement of what is trying to be protected.
•
Glazing is designed to take account of the four security factors as informed by the development
specific threat and risk assessment.
•
The inclusion of glazing does not increase the risk associated with an event. This is both likelihood
and impact based.
•
Any security enhancements or design features associated with glazed systems does not prevent the
glazed system performing its normal required function.
Performance Requirements
Effects of Blast Loading
Whilst not specific to glazing, design against adverse loading, such as blast, should result in a
design that resists disproportionate collapse of a structure.
External or Perimeter Glazing
Where a requirement to consider blast loading on glazing is identified, the designer should design to
achieve a Low Hazard failure against the selected DBTs at the enforceable stand-off that can be
achieved. Wherever possible, an increase in stand-off should be considered prior to any building
hardening. It is stressed that the designer must design for the conditions of their development, whilst not
dropping below the following minimum standards:
•
All glazed panes on the protected side of the glazed area should be laminated.
•
Lamination must be done with a 1.52mm PvB interlayer.
•
Single glazed units should be of a minimum 7.5mm laminated glazing.
•
Double glazed units should be of a minimum 7.5mm laminated inner pane with either an outer pane
of 7.5mm laminated glazing or a 6mm toughened pane.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 35 OF 3 11
The designer shall consider their specific threat and risk assessment to determine if the risk determines
whether a development is designed for mitigation or protection. It should also be remembered that
different solutions may be applied to different areas of a facility, site or building dependent upon that
area’s criticality and the impact of a successful threat attack occurring.
Mitigation is defined as the use of laminated glazing that is installed in normal frames or fixings.
Protection is defined as the use of laminated glazing that is installed in blast resistant frames
incorporating enhanced fixings and rebates of 35mm on all sides of the glazed panel. For protective
purposes the minimum thickness of glazing may well be increased.
Blast analysis should be undertaken where warranted to determine the exact glazing required for the
glazing system type.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 36 OF 3 11
Internal Glazing
Internal glazing presents a hazard where it can still be loaded by a blast wave, be this the failure of an
external element or where the potential for an internal explosion is possible. It is therefore recommended
that internal glazing where there are high population areas conform with the following criteria:
•
All glazing should be securely held in place by the framing or support system.
•
Glazing should be laminated using a minimum 1.52mm PvB interlayer to reduce the potential for
fragmentation on failure.
•
Where glass is supported as a cantilever, the support channel should be securely fixed to the floor,
glass should be epoxy-resin, silicone bonded and/or in deep clamped channels wherever possible.
Dry glazed clamping should provide similar retention capability as bonded units. Bonding should be
a minimum of 25mm deep onto the glazed panel.
•
As above, glazed wall lining systems.
Effects of Ballistic Damage
The first consideration is for vulnerability wherever possible to be designed out, consider:
•
Orientation and/or placement to avoid the vulnerability.
•
Denying direct line of sight. Most threats will require line of sight to be successful.
•
Where the situation cannot be avoided, designing a number of layers to provide the protection.
•
Glazing is degraded by ballistic attack and therefore as tested will only provide certainty of
protection for a maximum of three rounds of the specified ammunition. Therefore, no protective
ballistic system in isolation represents the whole security solution.
•
If polycarbonate is used in the glazing build-up, it should not be placed where the environmental
conditions will degrade it, or in areas where abrasion is likely.
•
A glazing specialist should be consulted where the glass tint is important, as thicker ballistic
protective glass will cause a green tint unless specified with the correct chemical content.
The DBT is based against the system defined in BS EN1063 and BS EN1522 which defines the threat
on a scale prefixed by BR or FB. The threat is the same for each level. Shotguns are pre-fixed SG.
Therefore, wherever ballistic protection is required, the baseline level of protection is BR/FB6 and SG2.
Certain facilities where ballistic glazing is required, such as the Royal Residences, may require an
enhancement above the DBT. This should be discussed with the relevant security stakeholders.
Resisting Manual Attack
Glazing that is identified as needing to resist manual attack should conform to the following criteria.
Low Risk Facilities, Sites or Buildings
This will encompass general residential property, most hotels, offices etc.
The glazing will conform to the Manual Attack Resistance specification of EN1627 and 1630. Individual
glass should be specified and tested in accordance with EN356.
The following table provides the relevant RC gradings under EN 1627, and where they are normally
applied.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 37 OF 3 11
It should be noted that the delay timings associated with EN1627 are not comparable to those of the
BRE grading system as the BRE system use a wider range of tools. Therefore, RC6 does not give more
protection than a H10 system. Once the level of delay is determined, liaison with specialist suppliers will
need to be undertaken.
The selection of a RC rated system should be informed by the specific threat and risk assessment, but
the following minimum standards should be applied where the glazing would provide access into critical
and important areas.
Minimum for all low threat locations (Baseline):
RC2
Minimum for all moderate threat locations (Enhanced):
RC3
Minimum for higher threat locations (Restricted):
RC4+
High Risk Facilities, Sites or Buildings
High risk facilities should be considered to be the target of a determined and well resourced attacker.
Therefore, they will have access to specialist equipment.
The attacker types are built upon the BRE LPS 1175: Issue 8 categorisation of criminal threat levels
(BRE Global Ltd). This considers an assessment of an attacker’s intent and capability, to provide a
security rating based upon a threat rated from A to H (low to high).
An overview of the BRE LPS 1175 attacker types A to H are provided below:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 38 OF 3 11
•
A – Low technology level of attack using small, very easily concealed tools.
•
B – More determined attack using easily concealed tools of a greater mechanical advantage.
•
C – Deliberate forced entry using a wide selection of commonly available, relatively easily concealed
tools.
•
D – Experienced attempts at forced entry.
•
E – Experienced attempts at forced entry using tools of a greater battery power.
•
F – Professional attempts at forced entry into a higher value area.
•
G – Enhanced professional attempts of access to high value assets.
•
H – Extreme methods of access to very high value assets using portable tools.
Consideration of the potential attacker types allows the proportionate and effective selection of physical
security measures that have a Security Rating (SR) level providing a tested level of delay, against the
tool types available to the designated attacker types.
It is anticipated that SRs applied to glazing in isolation will be limited due to the attacker resources
available. Therefore, for Restricted sites, the following attacker types should be considered, but
wherever possible glazing should be designed out in favour of more robust construction materials.
Attacker
Type
E
H
Description
Tool set
LPS Rating
Determined criminal targeting
restricted sites such as the
transport hub, using heavy
high-powered tools.
SR 5
E10 = toolset E
10-minute delay
Sophisticated and determined
attacker, targeting a mission
critical facility using industrial
powered machinery.
SR 7+
H10 = toolset H
10-minute delay
Where a high security location requires glazing, a primary consideration should be whether physical
protection can also be utilised, such as protective bars, shutters or covers. It should be noted that
achieving a specific protection level can be achieved by layering glazing and other protection, each
contributing to the overall delay timing.
All windows should be lockable to prevent opening from the unprotected side.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 39 OF 3 11
Privacy
The designer’s first consideration must be to assess whether the vulnerability can be designed out
through orientation, placement or through the built form. This should also consider exactly what is being
protected, whether it is information, activity or just privacy of individuals.
For areas where it is not possible to design out a vulnerability, the following should be considered:
•
Etching – Obscuration by etched glass use. Directional etching may be used to allow light passage
but block certain views.
•
Filming – Use of reflective or screen printed film applied to internal face of the glazed pane.
Preferred to only be used for retrofit scenarios. Directional printing may be used to allow light
passage but block certain views.
•
Tinted Glass – Use of a tinted glass that reduces visibility to an acceptable level. Care should be
taken that both daylight, night time and internal lighting levels are taken into account.
•
Electronically Controlled Glass – Obscuration through the use of electrical current effected cells.
•
Use of contrasting light levels – The lux ratio to be effective must (External) 7:1 (Internal). This may
well be impractical for areas where external lighting is not appropriate or well lit interior spaces make
achieving a 7:1 impractical.
In general, the stand-off distance for a viewer into a space should be greater than 10m, if possible, to aid
obscuration.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 40 OF 3 11
Reference Standards
The following standards should be referred to when developing the security glazing design:
Standard
Description
BS EN 356
Glass in building. Security glazing. Testing and classification of resistance against
manual attack.
BS 5357
Code of practice for installation and application of security glazing.
BS 5516
Patent glazing and sloping glazing for buildings.
BS EN 1522
Windows, doors, shutters and blinds. Bullet resistance. Requirements and
classification.
BS EN 1523
Windows, doors, shutters and blinds. Bullet resistance. Test method.
BS 5051-1
Bullet resistant glazing Specification for glazing for interior use.
BS EN 1063
Glass in building Security glazing. Testing of resistance against bullet attack.
BS EN 13541
Glass in building. Security glazing. Testing and classification of resistance against
explosion pressure.
ISO 16933
Glass in building, Explosion-resistant security glazing, Test and classification for arena
air-blast loading.
EN 1627-1630
European standard for performance determinations in connection with burglary
attempts via windows and doors.
EN 1630
Manual test (burglary attempt) with standard tool kit.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 41 OF 3 11
A15: Manual Lock Security
This section sets out the functional requirements for manual locking systems including key operated
padlocks and biometrically operated padlocks.
Notwithstanding the aspiration for NEOM to have keyless entry systems it is likely that manual door
locking systems and padlocks may be required in some locations. However, these should be minimised
through design.
It is expected that manual locks will be of low frequency throughout NEOM and should only be used by
exception on Enhanced and Restricted Protection Group facilities and buildings.
A statement of overall lock security should be formulated by considering the following questions:
•
What are the perceived criminal and terrorist threats that the asset may be subjected to and the lock
must endure?
•
Does the lock location require immediate notification of an unauthorised attempt to enter?
•
Is an audit trail of users and access attempts required?
Performance Requirements
General Functional Requirements – Manually Operated Door Locks
•
The selection of manually operated door locks should be guided by reference to a security needs
evaluation an OR that determines the level of security performance required for the protection group
and doorset requirements.
•
Manually operated door locks such as mechanical lock, thumb turn and latched bolts should be a
deadlock action type of lock.
•
The deadbolt shall be not less than 25mm throw with a saw-resistant hardened steel insert.
•
Lock cylinders should comply with Grade 4 (Key related security), or higher, of BS EN 1303:2005.
•
Lock cylinders should have up to 30,000 possible different key combinations, a minimum of five
movable levers, pins or discs and resist at least 15Nm of ‘plug’ torque.
•
Lock fixing screws should be hidden when the door is closed.
•
The lock bolt should be made of Type 304 stainless steel (or equivalent) material that is corrosion
resistant and has a hardness of at least Rockwell B85, Rockwell hardness is to be specified by the
methods specified in ASTM E18.
•
The lock should be morticed into the fabric of the door.
•
Protection for extending locking bolts should be built into the door frame.
•
All external manually operated locks should be designed to operate in the following environmental
conditions:
o
-10⁰C to +65⁰C in direct sunlight.
o
Ambient relativity humidity range: 5% to 95% non-condensing.
o
Airborne dust concentration: Annual average 0.3mg/m – Sandstorm 3mg/m.
o
Wind speed: 112km/hour.
o
Other pollutants: CO – 50ppm; H2S – 10ppm; Hydrocarbons – 150ppm; NOx – 5ppm; O3 –
1ppm and SO2 – 10ppm.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 42 OF 3 11
•
Outdoor security locks should be capable of continuous operation under the environmental
conditions listed above and shall meet the listed performance when subjected to the full range of the
described conditions.
General Functional Requirements – Padlocks and Biometric Padlocks
•
The selection of padlocks, whether manually operated or biometric, should be guided by reference
to the identified security and operational requirements that determines the level of security
performance required.
•
Where used, hasps should be securely fastened to the anchoring structure and have the same
resistance to attack as the padlock to be used.
•
Where keys are used to operate the padlocks strict key control should be maintained.
Advisory Requirements
Designers are advised that at present there are no specific standards for the certification of biometric
padlocks.
When designers are considering the use of padlocks within NEOM it is suggested that following security
rating matrix is considered to guide the choice of padlock:
Protection Group
Recommended Standard
Baseline – Non-Critical
CEN 1 & 2
LPS 1654 Level 1 or 2.
Baseline – Critical
BS EN 12320 Grade 3
Enhanced – Other
CEN Grade 3, Sold Secure –
Bronze or Silver
Enhanced – Critical
BS EN 12320 Grade 5 or 6
Restricted – Other
CEN Grade 5 or 6
Sold Secure – Gold
LPS 1654 Level 7 or 8
Restricted – Critical
DOCUMENT CODE: NEOM-NSE-PRC-001
Fully auditable access control
expected.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 43 OF 3 11
Reference Standards
The following standards should be used when developing the manual locking systems design:
Standard
Description
BS EN 12209
Building hardware – mechanically operated locks and locking plates. Requirements
and test methods.
BS EN 1303
Building hardware – cylinders for locks. Requirements and testing methods.
BS EN 12051
Building hardware – door and window bolts. Requirements and test methods.
BS EN 179
Building hardware – emergency exit devices operated by a lever handle or push pad,
for use on escape routes. Requirements and testing methods.
BS EN 1125
Building hardware – panic exit devices operated by a horizontal bar, for use on
escape routes. Requirements and test methods.
BS EN 12320
Building hardware – padlocks and padlock fittings. Requirements and test methods.
Sets a 6-number classification. The higher the number the greater the resistance to
attack. The grading level should be referred to by designers when specifying padlock
choice.
Central European Norm
(CEN) Ratings
A European standard that sets 6 levels of security from 1 to 6. The higher the
number the more robust and hence more secure the padlock. Security testing is
based on the resistance of the lock and its shackle to twisting, drilling, pulling and
cutting.
BS EN 16864
Building hardware – mechatronic padlocks. Requirements and test methods
LPS 1654
Requirements and testing standards for approval and listing of mechanical padlocks.
Sets 8 levels of resistance based on the amount of time it takes to remove a padlock
based on the use of different types of tools used by criminals.
Sold Secure
Tested and rated padlocks that have been awarded bronze, silver or gold status.
Gold representing the most secure.
ASTM E18-19
Standard test methods for Rockwell hardness of metallic materials.
Saudi Building Code
2018
General Requirements.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 44 OF 3 11
A16: Searching, Screening and Detection
Overview
The unobtrusive nature of NEOM provides for free-flow movement wherever practicable.
Where exceptionally the control and detection of prohibited items is required, this will be primarily be met
through the use of searching, screening or detection technology strategies. This should still:
•
Be as unobtrusive as is possible,
•
Where practicable hands free for the user experience and;
•
Cause the minimum dwell time possible.
Minimum dwell time should not be just considered as a throughput measurement. Integration and
convergence of searching, screening and detection should drive a minimum level of disruption or
deviation from daily tasks wherever possible.
However, certain critical locations will still require a process driven approach to search, screening and
detection. In these cases the security requirement takes precedence and therefore assurance of
detection of unauthorised articles is the primary aim.
The following facilities, sites and buildings will require a form of search, screening or detection for
prohibited items. Specific requirements are to be developed through the site specific threat and risk
assessment. Commercially operated sites should apply processes to protect their businesses adequately.
Location
Search, Screening or Detection Purpose
Safety Critical Environments.
•
Checks on unauthorised and prohibited items being
brought into a safety critical environment.
Potable Water Storage.
•
Prohibited items that could affect potable water supply.
Hospitals.
•
Prohibited items that will affect medical equipment.
•
Mass casualty threat screening.
NEOM Airport.
•
In-line with International and National Aviation Security
Plans and Regulations.
Industrial City Port.
•
In-line with National and International Regulations and
ISPS Code.
Data Centres, R&D, Sensitive Commercial.
•
Data protection.
Royal Palace/Residences.
•
Compliant to Royal protection requirements.
Hydrogen Plant, Explosive or Flammable
Chemical production or storage.
•
Asset protection.
Major Government Complexes & Regional
Government Offices.
•
Mass casualty threat screening.
•
Data protection.
Consular Buildings.
•
In-line with foreign government policy.
Sports Stadia & Arenas.
•
Mass casualty threat screening.
•
Weapon screening.
•
Mass casualty threat screening.
Crowded Spaces, Major Transport Hubs etc.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 45 OF 3 11
Threat
Search, Screening and Detection is applicable to a range of threats identified in the Design Basis
Threat, for criminality, terrorism and extremism.
During the threat and risk consideration, the designer should determine first whether there are prohibited
items or not. This will then drive whether there is a need for search, screening or detection to be
undertaken.
Secondly, if there is an identified requirement, the designer needs to determine where the threat is likely
to occur at the facility, site or building to ensure timely intervention that will minimise the likelihood and
impact of the risk being realised.
For example, the prevention of threats focused upon violence or terrorism may require early detection of
crossing the site boundary. This may then focus on detecting:
•
Mass Casualty Items – IED, large firearm.
•
Smaller firearms.
•
Knives, and other weapons.
However, where detection of more specific items is required, which would most likely be at Restricted
Protection Group locations. These items may include:
•
Mobile phones and cameras.
•
Data removal devices.
•
Trace detection – e.g. narcotics, explosive, firearms residue.
The detection of these elements may be applied site-wide or just to specific areas.
Search, screening or selection should only be required where there is an identified threat or asset
requiring protection that would be an intolerable risk without the screening mitigation.
Success criteria
The success criteria for searching, screening and detection is as follows:
•
The detection of relevant prohibited items, at the desired point of detection.
•
Provision of required assurance level for detection, i.e. is it 100% or a lower percentage to act as a
deterrent effect.
•
Provision for sufficient screening capacity, to allow for the required throughput rates, minimise dwell
and disruption. In some cases, this will need to be balanced against spatial requirements and likely
capital and operational costs.
•
On a positive detection, can the prohibited item be effectively prevented from passing the search or
screening area.
•
Blended design, enhancing the user journey through any security process, or if practicable, making
the process seamless.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 46 OF 3 11
Search, Screening and Detection Process
If the risk assessment identifies a need for search, screening or detection, then the design process
should be developed across three distinct process zones with key design considerations being satisfied
in each zone. The three zones are outlined in the following graphic:
1. Risk Identification
Prior to commencing design, the designer must assess whether a search, screening or detection
security effect is required based upon the threat and risk assessment for the specific site.
Threat changes and scalability should be planned for. This may be in the form of power, data and
spatial allocations in the correct locations.
The risk identification stage will be based upon a number of considerations including:
•
Crowded Place – a crowded location provides an inherently attractive location for a terrorist attack
and could use mass casualty threat methodologies such as firearm, blade or IED attacks. Providing
high-level screening for crowded places where there is an identified and assessed inherent target
attractiveness, can help in detecting mass casualty threat methodologies.
•
Criticality – a site, facility or building with a higher level of criticality, including function or
association with the government, will have a number of assets which could be targetable by both
criminal and terrorist / extremist methodologies.
•
Detection Requirement – certain sites or facilities will require enhanced detection, such as
explosives trace detection or drug substance detection, e.g. Airport, where there are clear
requirements under the aviation security requirements.
The site-specific risk zoning exercise is particularly important in defining the requirements for search,
screening and detection. The risk context may not apply to the whole site, and only certain areas of the
site may require Search, Screening or Detection.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 47 OF 3 11
A site risk zoning exercise therefore identifies the areas where different levels of prohibited item
detection are needed. A simplified example for a hospital site is shown below.
The process provides a logical method for ensuring that searching, screening and detection is only
applied where needed at the site, rather than providing complete site coverage.
2. Detection Matrix
Once a risk-based need for search, screening or detection is identified, the designer must identify what
constitutes the prohibited items. A detection matrix should then be produced that indicates what will and
what will not be detected by the screening process.
The detection matrix is based upon:
•
What prohibited items the screening process should detect?
•
What level of assurance should be provided that the threat will be detected by the search and
screening process? (assurance % of detecting the threat). The designer should consider scalability
of the process to meet higher threat levels and whether an allowance for this is included.
•
What percentage of attendees should be processed through the search and screening process for
detecting the relevant threat? (% of people processed).
A prohibited items list can be drawn from the identified threat types of the location specific Threat and
Risk Assessment, and should relate to the risk zoning exercise undertaken in step one.
The prohibited items list can then be applied against the levels of assurance for detection required,
categorising threat items as either:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 48 OF 3 11
1. Essential to detect (100%)
There should be a 100% assurance that the prohibited item is successfully detected during the
screening process. To achieve 100%, it is imperative that all personal/goods are subject to the search,
screening or detection process. This approach can be scaled back if the threat level is lower than
anticipated or altered by an event at a facility.
2. Desirable to detect (10-90%)
The level of assurance required is variable, and scalable in response to the designer’s risk assessment.
The process is scalable in the level of assurance provided by the screening process, and the percentage
of people/goods subjected to such screening.
3. Not required to detect (0%)
These items are not considered as threat items by the designer’s risk assessment, and therefore do not
require detection.
If the facility, site or building will operate in a number of operational modes that change the threat level,
then different detection matrices may be required for each mode. Otherwise, the process must be shown
as scalable and flexible to be suitable for all modes of operation.
An example detection matrix is as follows:
Essential to Detect (100%)
Desirable to Detect (10-90%)
Not Required to Detect (0%)
Explosives
Other items on the prohibited item
list including alcohol etc
Mobile phones
Firearms and ammunition
Other liquids
Recording devices
Large weapons – machete,
baseball bats, hammer etc
Computing devices
Protest materials – chain, flags etc
Cameras
Damage materials – Animal blood,
paint, flour etc
Smaller weapons – knives under 6
inches, sharp weapons, including
scissors
Arson equipment – matches,
lighters etc
CS or pepper sprays
The example below shows varying detection matrix requirements across the different locality risk zones
of the identified hospital example.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 49 OF 3 11
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 50 OF 3 11
4. Methods of Search, Screening or Detection Achievement
From the development of the detection matrices, suitable search, screening and detection options
should be selected.
In general, there are likely to be five broad levels of search, screening or detection, with varying levels of
user disruption. Each example level of screening could use different equipment / processes, or
combinations, to provide a varying level of detection assurance and scalability. The designer must select
a proportionate level of screening to the level of identified risk, and the complexity of detecting the
prohibited item.
Level 0: Do nothing – no screening required.
Level 1: Automatic high-level screening for mass casualty threats.
This is to be non-intrusive, as to not diminish from the visitor journey / experience. However, there must
be a method for investigating detections. The over-arching approach may limit bag size that can be
brought to the venue, could employ staff to visually assess for larger threats such as a rucksack IED or
long barrelled weapon. Or a high flow rate mass screening system may be employed using Terrahertz
scanning or other technology.
The designer should detail a clear interdiction process for the high-level mass casualty screening
process. The designer should also consider how assurance can be provided, reducing opportunity for
the mass casualty threat scanning to be bypassed – this may need to be operationally managed.
Level 2: Automatic high-level screening for mass casualty threats, plus video analytics.
This may be non-intrusive as given above. The use of video analytics, such as left package / loitering
alerts, can provide enhanced assurance for detection of certain threats.
This represents a combination of methods, which may also include trained staff, and the designer needs
to define the overall detection strategy and its concept of operations.
Level 3: Low level screening for some level of assurance of prohibited item detection.
Level 4: Comprehensive screening for high assurance of prohibited item detection.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 51 OF 3 11
A comprehensive screening process is required for detection of a wide and complex range of items.
Therefore, the detection approach will need to rely on a range of searching and screening methods,
more likely in a layered system to be able to provide various assurance levels.
5. Throughput Analysis
Dependent upon the search and screening method / equipment / process used, there will be a variable
throughput rate. This should be considered in relation to:
•
Capacity – the number of persons to pass through the process.
•
Flow rate – the rate of which a person is screened, dependent upon the chosen screening method /
equipment.
•
User arrival process – the variable rates in which users will arrive.
•
Customer journey – the level of interaction that is acceptable.
An example throughput matrix is as follows:
Location
Main Entrance
Expected
Arrival
Capacity
(15 mins)
Flow rate
(each lane per
minute)
(per 15 mins)
Lanes
Required
235
6
90
(2.6) 3
Single Lane
Capacity
Space
Required (per
lane)
Min 10.0m x
12.0m
The throughput flow rate is likely to be variable, with delays caused by user non-compliance likely at
either the Preparation Process Zone or Response Process Zone, complexity of what is being screened
or detections. As part of the screening process, the potential for reductions in throughput can be
addressed, by:
•
Communicating the expected arrival process to the users.
•
Clear policies on prohibited items, communicated to user pre-arrival.
•
Allowable bag sizes communicated to user pre-arrival.
•
Allowing sufficient spatial allocation for the process to take place.
•
Having a quick and defined interdiction policy within the response process zone.
6. Example Screening Measures
The table below provides examples of varying types of screening technology. The designer should
select the relevant screening process / measures, based upon their specific use case performance
requirements. Throughputs should be clarified with manufacturers with evidence of the achievable
throughput given.
Example Measure
Usage Characteristics
CT Scanner
•
Baggage scanning.
•
Detects prohibited items with 3-D model of
contents.
•
High level of assurance for detection.
•
Throughput (200 – 300 people per hour).
•
Analytics to aid detection of prohibited items.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 52 OF 3 11
Example Measure
Usage Characteristics
Millimetric Wave Scanner
•
MMW scanner for persons.
•
Profile images of person, showing concealed
items.
•
Analytics to aid detection of prohibited items.
•
Throughput (150 – 300 people per hour).
•
WTMD portal for persons.
•
Alert when metal object passes through.
•
Varying levels of sensitivity to provide for
required threat type detection, and level of
assurance.
•
Throughput (350 – 400 people per hour).
•
Passive scanning system for persons, with
person screened whilst in transit.
•
Detection of mass casualty threat items.
•
Throughput system (Optimised 3,500 people per
hour).
•
Limited level of assurance for detection.
Walk Through Metal Detector
Mass Casualty Threat
It is important that the designer is aware of, and respondent to, the limitations of any screening process
employed.
For example, mass casualty passive scanning could be unreliable if multiple persons pass through
simultaneously and if complicated bags are carried – this would require a supporting technology,
management process or design to ensure that the potential for residual risk is limited.
7. Intervention Plan
As identified in the throughput analysis, clear policies in the Response Process Zone are required to
support both the throughput and also the integrity of the process. The process becomes redundant
without a clear intervention plan to prevent the detected item from being carried beyond the control line.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 53 OF 3 11
A defined intervention plan must be developed by the designer in order to support the screening
process. This should take account of:
•
How will alerts be generated when a prohibited item is detected?
•
How will such alerts be dealt with? Will this be an automated or human response?
•
What enhanced screening will a person be required to undertake to resolve a first alarm?
•
Is there sufficient area for a person to be dealt with, in a rejection zone?
8. Design Considerations
The following further design considerations will need to be taken into account:
•
Architecturally lead – there is opportunity for the design to be incorporated within the architectural
design principles of the project. The design and process should aim to improve the visitor / user
journey and look to use innovative design features to make the screening process as seamless as
possible.
•
MEP – screening equipment requires power and data, which should be coordinated with design
teams. This will be required for both permanent screening locations, and any temporary ‘pop-up’ or
scalable screening locations.
•
Spatial allocation – adequate spacing for the screening equipment, and to allow for the throughput of
screened persons is required. This also needs to provide sufficient space for security operators. The
spatial allocation can be large, especially with a high volume of people, bags or goods.
•
Lane design – coordinated design to provide for maximum efficiency and user experience, ensuring
lane design is easily accessible and supportive of required throughput, e.g. appropriate length of
tray roller beds for luggage screening.
•
Ground loading – screening equipment such as CT scanners are heavy pieces of equipment. The
ground loading should account for the equipment.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 54 OF 3 11
Reference Standards
The following reference standards are the minimum standards for searching, screening and detection
technology.
Standard
Description
EN 62368-1 + A11
Audio/video, information and communication technology equipment. Safety
requirements.
BS EN IEC 61000-6-1
Electromagnetic compatibility (EMC). Generic standards. Immunity standard for
residential, commercial and light-industrial environments.
ASTM F3356
Standard Specification for Conformity Assessment of Metal Detectors Used in
Safety and Security.
ASTM F2401
Standard Practice for Security Checkpoint Metal Detector Screening of Persons
with Medical Devices.
STM C1270 - 97
Standard Practice for Detection Sensitivity Mapping of In-Plant Walk-Through
Metal Detectors.
ASTM C1269 - 97
Standard Practice for Adjusting the Operational Sensitivity Setting of In-Plant
Walk-Through Metal Detectors.
ASTM C1238 - 97
Standard Guide for Installation of Walk-Through Metal Detectors.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 55 OF 3 11
A17: Security Control Rooms and Monitoring Points
This section covers the fundamentals of Security Control Rooms (SCR) design throughout the NEOM
region. These facilities provide a point of consolidation for operators to obtain information on the status
of related security systems and operations. Control rooms where practicable should be within walking
distance of other static security locations, such as gatehouses, monitoring points etc.
A structured design process should be followed in the development of all control rooms environments
with a human centred approach to meet with the demand for the number of systems, sensors and
services which are controlled or monitored by the operators.
Spatial requirements should be identified early, including UPS locations, welfare and operator space.
Defining the operational requirements for the SCR is therefore a key initial step that the designer must
undertake at the start of the design process.
Systems
The operation and control of each system needs to be determined prior to the development of a SCR
design. Security systems will vary dependant on the site application with some large sites or integrated
regional systems being responsible for all aspects of control and operation.
Typical security applications featured within an SCR include but are not limited to some of the following
applications:
•
Intruder Alarm Systems.
•
Access Control.
•
Video Surveillance.
•
Perimeter Intruder Detection Systems.
•
Security Lighting.
•
Alarm Signalling.
•
Intercom Systems.
•
Radio Communications
•
Vehicle Barrier Controls.
•
User Interface.
•
Other non-security systems that are critical to the site, e.g. development/industrial freezer alarms.
A Physical Security Information Management (PSIM) system should be used to harmonise the various
systems and consolidate the interface to a single user interface.
The need to integrate systems should be carefully considered to ensure integration is the appropriate
option.
Redundancy and System Resilience
The security systems with the exception of field devices (intrusion detection sensors, cameras, card
readers, radars) shall exclude single point of failures, such that a single component failure cannot
disable the system function.
All security systems core computing and network components shall be in a high-availability configuration
to ensure availability of not less than 99.95% per component. These components specifically include:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 56 OF 3 11
•
Servers.
•
Network Video Recorders (NVR).
•
Operator workstations.
•
Administration workstations.
•
Archive and back-up systems.
•
Network switches, routers and firewalls.
Exception: industrial ethernet switches supporting single field devices are excluded from the above
requirement.
The high-availability requirements detailed above can be achieved by a combination of:
•
Separate redundant units, such as primary and back-up units.
•
Single units with fully redundant hot-swappable components of CPU, memory, power supply,
network cards, hard-disk storage, etc.
•
Virtual computing architecture.
The critical computing and network equipment shall also have a spare capacity as follows:
•
20% spare capacity of all computing power (RAM & CPU).
•
20% spare capacity for all network physical ports.
•
20% spare capacity for all network bandwidth (within the site security network).
•
50 % spare capacity for all hard disks.
Field devices (intrusion detection sensors, cameras, card readers, radars) shall be in a redundant
configuration only if a single device failure will significantly disable the system function.
Automatic switch-over function shall be enabled between all redundant components without loss of
operational function or data.
Computer Hardware
Computer hardware applied as a component of security systems shall be of the latest generation
available at the time of project proposal design completion. The hardware shall have adequate memory
and processing capacity to ensure no latency to allow real-time operation in all operational conditions.
Operating system and applications shall be installed on a Hard-Disk Drive (HDD) or Solid-State Drive
(SDD) while data shall be stored on a separate discrete physical HDD or SSD.
Operating Systems
Operating systems used for the security system shall be latest version and have full mainstream support
from the manufacturer.
All service packs, and other Operating System updates, shall be installed prior to system
commissioning.
Data and System Backup
The systems shall be equipped with mechanism to provide full back-up every 30 days and daily
incremental back-ups. Back-up operations shall not interrupt the system operation.
Back-up records shall be stored off-site and accessed only by authorized personnel.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 57 OF 3 11
Date/Time Synchronization
All devices connected to the security systems shall have their date and time synchronized via a
centralized or distributed time servers.
Tamper Protection
All security system field components shall be equipped with tamper protection that will annunciate an
alarm if any attempt is made to tamper with system elements.
All junction and pull boxes, mounted externally, shall use tamper-proof screws for all fasteners. All
outdoor cables shall be protected in steel conduits.
Openings in the system housing shall be sealed.
Component Failure Alarms
The system shall annunciate an alarm when the function of an operational component is lost (e.g. field
devices, UPSs, generators, etc.).
False Alarm Reduction
The system control panels shall observe guidelines in ANSI/SIA CP-01-2014, False Alarm Reduction
Standard, into the system design and material selection to reduce the incidence of false alarms.
Integration
The SCR shall be integrated into central Security Control Center (Emergency Center / 911 Building).
UPS and Emergency Generators
For Sites with a Restricted Protection Group, on-site dedicated UPS and emergency generators shall be
provided for Security systems.
The UPS shall have battery capacity to power its maximum rating for 2 hours minimum and it shall be
sized with 30% spare capacity over and above the actual calculated load.
The emergency generator shall be sized to power all security systems & devices, air conditioning,
lighting, fence lighting and communication equipment installed at the security facility while maintain 20%
spare capacity.
The generator shall be able to sense power failure at the incoming local utility power feed to the security
system and initiate start-up. The fuel tank for the generator shall have a low-fuel level alarm connected
to the gatehouse and Central Security Control Center that triggers when the fuel level drops to 10% of
full capacity.
Policies
Clear policies should be developed in terms of the day to day operation and responsibilities within the
SCR environment to ensure activities are adhered to and the integrity of the SCR is maintained.
Policies should include training and communications, division of work and tasks, competencies and
management, code of conduct and auditing. The designer will need to provide a concept of operations
for the SCR that demonstrates how it functions day to day, and also during an incident.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 58 OF 3 11
People
The SCR will comprise a number of system interfaces both “hard” (panels, controls devices) and “soft”
(computer and digital interfaces) to accommodate the daily operations, such as:
•
Control Panels.
•
Operator Consoles.
•
Safety Systems.
•
Displays Screens and Walls.
•
Furniture.
•
Welfare Facilities.
Once a study has been undertaken to determine the operational requirements of the SCR a User
Centred Design (UCD) should be undertaken as the amount and type of information that an operator
can monitor is limited and errors can occur if over-burdened with duties.
Resilience
The systems being managed by the SCR should be resilient against both attack and failure.
Consideration should be given to redundancy of systems and back-up and/or failover of critical power
and communications connections in the event of an outage or incident response.
As the SCR is a critical room, the routing of other building services through the room should be avoided,
where these services could cause damage. e.g. water pipes.
Physical SCR Design
Spacing should be assessed for the mounting of display and control equipment throughout the SCR and
how operators will interact with the systems.
The layout of furniture, lighting and temperature all have to be considered to achieve a suitable working
environment for operators allowing them to conduct tasks unhindered.
Working spaces should be considered for operators, managers, incident rooms, collaboration spaces,
welfare facilities.
Operator consoles should be suited to meet the necessary equipment required:
•
Display screens:
o
The system shall have 4 levels of integrated display for security operators. All displays shall be
1080p or higher definition. Displays shall be adequately sized for the application and shall have
capability for 24/7 operation.
▪
Display 1: Overview Map.
▪
Display 2: Video Split-Screen Display, dedicated to viewing camera feeds, user selectable
or sequenced, and shall automatically switch to alarm zones display during an alarm.
▪
Display 3: Index display, listing all cameras or alarm zones.
▪
Display 4: PTZ Camera Display.
•
Keyboards.
•
Camera control equipment.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 59 OF 3 11
•
Telephones.
•
Hard wired panels and controls.
•
Space to undertake paperwork.
Enough displays should be provided to carry out duties and sized accordingly, including visual access to
a display wall if required.
The console design should be ergonomically correct to meet with the demands of the operator and
provide a comfortable working position including:
•
Vertical, horizontal and lateral clearance for the legs, knees and feet under the work surface.
•
Work surfaces at or slightly below elbow height.
•
Instruments and displays located in appropriate visual zone.
Further Considerations
For larger SCRs there are other areas of consideration which supplement the SCR. These areas are
detailed below with insight as to scaling and location in relation to the SCR.
Room
Sizing
Location
Equipment room
Number of cabinets, including potential
future additions.
Direct access from Control Room?
Engineering Support
Room
Number of people, furniture and
equipment. Consider ʻnormalʼ support and
demanding situations e.g. commissioning.
Engineering support desks may be
located in the Control Room or
Equipment Room in addition or as an
alternative. Location should be
determined by the required
interaction between Engineers and
operators.
Electrical power
room
May need to be partitioned (e.g. between
transformers, switchgear and UPS and
between redundant feeds).
Access restricted to authorised
persons.
Environmental
services/HVAC
Number of Air Handling Units (AHU),
heating and cooling plant.
Noise and maintenance access.
Meeting rooms
Number of people, furniture and equipment.
Will operators need to attend
meetings whilst on duty?
Offices
Number of people, furniture and
equipment. Particular consideration for
Supervisors and Plant/Field Operators.
Direct access from Control Room?
Able to see into or monitor activity in
Control Room?
Training facility
Furniture and equipment.
Will operators need to attend
meetings whilst on duty?
Kitchen/dining
Food storage for each team/shift
(lockable), preparation and cooking
facilities. Dining furniture
Access for duty CRO.
Room
Considerations regarding size.
Considerations regarding location.
Drinks lounge
Access to drinking water. Tea/coffee
making facility
Access for duty operators.
Toilets
Male, female and disabled.
Access for duty operators.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 60 OF 3 11
Room
Sizing
Location
Showers
Male, female and disabled.
Clean and dirty areas.
Personal storage
Storage for clothing and personal items.
Provision for secure storage (lockers).
Work item storage
PPE, cleaners’ equipment and materials,
office supplies, plant spares, portable
communications. Adequate to contain any
special maintenance or cleaning
equipment to be used in the Control
Building (e.g. cleaning or maintenance of
a room with a high ceiling).
Document Library
Books, manuals, drawings. Access to
electronic copies, local backups.
Access for duty operators.
Visitor facility
Reception area. Viewing gallery.
Controlled access.
Prayer room
Cultural requirements.
Access for duty operators.
Muster area
Maximum number of people to be
accommodated. Emergency equipment to
be stored.
May be combined with another use or
located in another room. Mustering in
the Control Room should be avoided
because it can cause distraction.
Incident command
centre
Maximum number of people making up
the command team.
Access for duty operators and
communication links with Control
Room during an incident. Control
Room may be used for this.
Collaboration or
Video Conference
Room
Number of people, equipment to be used.
Typically to facilitate
Direct access from Control Room?
collaboration with remote operations
and technical support teams.
IT Support
Number of people, furniture and
equipment.
May be as part of the control room or
as a separate room.
Humans System Interfaces
A SCR operators’ role involves the monitoring and controlling of security systems and detecting
assessing and responding to events.
A Physical Security Information System PSIM should be utilised to consolidate various events and alerts
from security systems and present them in a Guided User Interface or GUI. For smaller systems, this
may be achieved through either the access control or VSS head end software.
The GUI should collect and present data from all integrated systems and devices enabling the operators
to carry out their tasks efficiently.
The PSIM should assist operators in their roles by automating and prompting certain aspects of
operations through a structured cause and effect matrix by aggregating information from various
systems and automating processes to effectively manage events and initiating the appropriate response.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 61 OF 3 11
Reference Standards
The following standards should be used when developing the SCR design:
Standard
Description
BS EN ISO 11064
Ergonomic design of control centres.
BS 6396
Electrical systems in office furniture and educational furniture
Specification.
BS 7083
The accommodation and operating environment for Information
technology (IT) equipment.
BS EN 50398-1
Alarm systems. Combined and integrated alarm systems.
General requirements.
BS 7958:2015
Closed circuit television (CCTV). Management and operation.
Code of practice.
BS 8418 + A1
Installation and remote monitoring of detector-activated CCTV
systems. Code of practice.
BS EN 62676 Series
Video surveillance systems for use in security applications.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 62 OF 3 11
A18: HVAC, Intakes and Ducting
This section should be read where the Security Threat and Risk Assessment has identified a need for a
secure and resilient HVAC system. This will be a requirement for critical facilities and also all facilities
where there is a crowded internal space, such as an arena, station or hospital.
Given the climate in NEOM, HVAC systems will be widely used across all indoor spaces, it will perform a
key function in ensuring a comfortable environment for all NEOM Citizens and Visitors. If an individual
HVAC system within a key asset or an industrial control facility was disabled during the summer months,
then this would likely result in a level of discomfort that could lead to disruption.
It is anticipated, however, that consideration of this aspect will be included within the MEP design and it
not an additional concern for security.
This functional requirement is concerned with facilities that may be targeted by and, in an unmitigated
state, be vulnerable to a CBRN attack.
Overview
Mechanically ventilated spaces provide a viable means to disseminate chemical or biological agents
within a building.
The use of contaminants within the built environment, to date, has been rarely seen, however it should
be acknowledged that threats will likely evolve over time, especially where the building creates a
crowded space. Taking the opportunity to embed good security design practice within NEOM will ensure
that the opportunity for threats, such as CBRN, are more difficult to realise.
Therefore, air intake and recirculation vents should be positioned at a suitable height to make a
deliberate act more easily identifiable by VSS or operational staff.
Performance Requirements
Air Intakes and HVAC Ducting
All air intakes should be positioned where possible at a suitable height above grade level to deny
physical access to the air intake, especially to deny the introduction of vapours, gases and liquids.
The minimum height above accessible areas should be 3.0m from the most advantageous attack point.
If a building or space is classed as a Protection Group Restricted, then the minimum height should be
increased to 4.0m.
If air intakes are placed on roof levels, then access to the roof space should be controlled, with no public
access allowed within the vicinity of the vents.
Where a suitable height above grade cannot be achieved, intakes should be protected with appropriate
architectural covers or grates in keeping with the appearance of the facility.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 63 OF 3 11
Ducting, access hatches and inspection points should all be positioned in back of house areas and fitted
with either locks or anti-tamper fixings as appropriate.
For buildings that are classed as Protection Group Restricted, and Enhanced if identified as a
specific vulnerability during the STRA:
•
All HVAC intakes shall be positioned a minimum of 4.0m above FFL and positioned behind a
secure physical barrier.
•
Where a physical barrier is not desirable or practical, the HVAC intakes should be positioned a
minimum of 5.0m above FFL.
•
All HVAC intakes vents should be fitted with louvres and grilles, to mitigate against
unauthorised access by persons and materials.
•
For secure rooms, or sensitive areas (i.e. Control rooms or Protected spaces) these should
have isolated ventilation systems designed in and be separate from the main building
ventilation systems.
•
HVAC systems should be supported by suitable UPS to ensure a minimum level of redundancy
is achieved.
•
VSS and detection capabilities should be designed to provide monitoring and alarm functions at
HVAC intake locations with alarms to the Security Control Room.
•
The ability to stop intakes and reverse air flows via the Building Management System should be
possible.
•
If indicated by the STRA process for blast related threats – Restricted sites, facilities and
buildings shall consider the inclusion of blast protection valves and dampers to reduce the
internal effects of adverse loading.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 64 OF 3 11
Reference Standards
The following standards should be used when developing the HVAC design:
Standard
Description
ASIS POA
Protection of Assets Manual.
ASHRAE. 2003
Risk Management Guidance for Health, Safety, and
Environmental Security under Extraordinary Incidents.
Presidential Report of the American SCRiety of Heating,
Refrigerating and Air-Conditioning Engineers.
ANSI/ASHRAE 52.1-1992
Gravimetric and Dust Spot Procedures for Testing Air-Cleaning
Devices Used In General Ventilation For Removing Particulate
Matter.
ANSI/ASHRAE Standard 55-2004
Thermal Environmental Conditions for Human Occupancy.
ASHRAE 62.1 - 2019
Ventilation for Acceptable Indoor Air Quality
DHHS (NIOSH) Publication No. 2002-139
Guidance for Protecting Building Environments from Airborne
Chemical, Biological, or Radiological Attacks.
Saudi Building Code (SBC) 2018
The Saudi Building Code (SBC) is a set of legal, administrative
and technical regulations and requirements that specify the
minimum standards of construction for building in order to
ensure public safety and health.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 65 OF 3 11
Annex B - Security Functional Requirements (Industrial)
Environmental Requirements – All Systems
All systems in NEOM must perform without degradation caused by environmental influences and
weather conditions. Therefore, all systems should comply or exceed the following requirements.
Minimum environmental conditions shall comply with those related to Telecommunications spaces as
per BICSI-TDMM latest edition.
All security spaces (including Security Equipment Rooms, Security Rooms, Security Entrance Facilities,
Security Enclosures/Cabinets) shall be cooled by redundant split or central air-conditioning units.
No cabling associated with security should be exposed.
Environmental Considerations
Minimum Performance Requirements
Wind, rain, hail and potentially snow.
•
IP66 and NEMA 4X-rated.
•
All devices such as camera columns shall be provided with
deflection analysis based on the local wind conditions to ensure
products are fit for purpose.
•
Minimum wind speed conditions: 112km/hr unless 20 year data
available.
Temperature variances.
The Working environment
-10 °C to +65 °C (-14 °F to 149 °F) including direct sunlight and shall
include temperature rise inside the cabinet.
Maximum temperature (intermittent): 65 °C (149 °F)
Humidity 5 – 100% RH (non-condensing)
-10 °C to +65 °C (-14 °F to 149 °F) when IR LEDs are off.
Light sources, including the sun.
•
Outdoor equipment should be designed to operate without air
conditioning or a forced air ventilation system and shall be able to
function continuously within its own specific environment
conditions.
•
Window type air conditioners shall not be used for cooling any
security facilities or equipment.
•
Outdoor equipment should be designed to meet the specified
performance required under the full range of the local
environmental conditions.
•
Equipment not capable of meeting environment requirements
should be installed in a cabinet with active cooling.
•
Capable of incorporating auxiliary equipment (coolers, heaters)
only if required.
•
Sun-shaded as necessary.
Minimum Illumination
•
With Wide Dynamic Range - forensic capture & Light finder
Colour: 0.1 lux at 30 IRE, F1.6, B/W: 0.008 lux F1.6, 0 lux with IR
illumination on.
•
Colour: 0.15 lux at 50 IRE, F1.6, B/W: 0.01 lux, F1.6, 0
lux with IR illumination on.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 66 OF 3 11
Environmental Considerations
Minimum Performance Requirements
•
Products where possible shall be provided with a sunshield to
reduce glare and thermal overheating.
Privacy regulations related to specific
public areas.
All cameras to be capable of creating privacy masking in accordance
with the Human Rights Act 1998, Anti Cybercrimes Law 2017, The
National Data Governance Regulations 2020.
Wildlife including birds.
Video Analytics - To Avoid False Alarms/Triggers
Water, dust and corrosion.
•
Included video motion detection, fence guard, motion guard,
loitering guard, Auto tracking, Active Gatekeeper.
•
The video analytics system shall assist an operator in rapidly
locating and determining the cause of sensor alarms by
identifying activity in the camera scene where potential risk exists
in the area being monitored. The processing shall allow the
detection of abnormal behaviour such as, but not limited to,
activity at a time when no activity is expected, packages left
behind, entry into a restricted area or approach to a restricted
area.
•
Support for installation and integration of third-party applications.
Equipment Housing
•
IK08, IK10 housing and mounting, IP66- and NEMA 4X-rated.
•
Airborne Dust: Average 0.3 mg/m / Sandstorm 3 mg/m.
•
Re-coatable metal casing (aluminium), hard coated.
•
Lightweight, rugged.
•
Polycarbonate clear dome with Sharp dome Technology.
•
All coastal devices to be suitable for marine environments.
The following shall comply with BICSI-TDMM:
•
Security Spaces (i.e. security rooms) and related elements (i.e. HVAC and fire protection)
specifications for Telecommunications spaces.
•
Security indoor cable distribution systems (i.e. cable trays, conduits, grounding).
•
Security outdoor cable distribution systems (i.e. manholes, ductbanks, grounding) shall comply with
BICSI-OSPDRM.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 67 OF 3 11
Testing Requirements – All Security Infrastructure
General
•
The first training class should be scheduled so that it is completed about 30 days before factory
acceptance test (if conducted) or site acceptance test begins.
•
Equipment performance testing is designed to determine whether equipment is functional, has
adequate sensitivity, and will meet its design and performance objectives. It is not sufficient for a
component to meet the manufacturer’s standards if the component proves ineffective during testing.
•
Testing of the operational security structure should be undertaken.
•
Standard compliance testing (SCT). SCT encompasses both NEOM standards and industry
standards.
•
Original copies of all data produced during any testing should form part of the handover
documentation at the conclusion of each phase of testing, prior to approval of the test. This
documentation also describes who will witness all testing activities. The contractor will be required to
obtain written permission from NEOM before proceeding with any testing.
•
Any component that is a part of the security system should be tested. In addition to component
testing, subsystem and complete system tests will be specified to ensure that the system performs
according to the design.
•
Before testing, the customer (or the contractor) should develop (design and prepare) a detailed test
plan. The test plan specifies the testing approach that will be taken, what will be tested, when it will
be tested, how it will be tested, and who will perform the testing.
Pre-Delivery or Factory Acceptance Testing (FAT) / Initial Acceptance test (IAT)
•
The FAT should demonstrate the concept and functionality, including integrated activities prior to
any installation at the site. The FAT should be witnessed and reported upon by the designer.
•
All data produced during FAT, including the results of each test procedure, should be delivered to
the designer and NEOM for approval of the test.
•
All deficiencies noted in the FAT should be resolved to the satisfaction of NEOM before installation
and acceptance testing. The contract agreement should be written so that NEOM has the option of
cancelling the contract if any major issues identified during the FAT cannot be resolved within a
reasonable Period.
Site acceptance Testing (SAT)
•
SAT should be started after written approval has been received from NEOM regarding any previous
testing activities or installation problems.
•
Before conducting the site testing, the contractor should provide a report to the designer and NEOM
describing results of previous acceptance tests, functional tests, diagnostics, and calibrations,
including written certification that the installed, complete system has been calibrated and tested and
is ready to begin SAT. This report should be received at least two weeks before the start of SAT.
The report should also include a copy of the approved FAT procedures. The contractor should be
instructed that NEOM or its agent may terminate testing any time the system fails to perform as
specified.
•
Using SAT procedures, the contractor should demonstrate that the completed system complies with
all the contract requirements. All physical and functional requirements of the project should be
demonstrated.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 68 OF 3 11
•
Upon successful completion of the SAT, the contractor should deliver test reports and other
documentation to the designer and NEOM before commencing further testing. The contractor should
deliver a report describing results of functional tests, diagnostics, and calibrations, including written
certification that the installed, complete system has been calibrated and tested and is ready for
reliability testing. The report should also include a copy of the approved SAT procedures.
Reliability Test or Operational Availability Testing (OAT)
•
OAT is usually conducted over a 30-day period (24 hours per day for 30 consecutive calendar days).
The purpose of the test is to ensure that the system under test can operate reliably and stably for an
extended period.
•
OAT should not be started until NEOM notifies the contractor, in writing, that all acceptance testing
has been satisfactorily completed, training (if specified) has been completed, and all outstanding
deficiencies have been corrected.
•
The contractor should provide one representative to be available 24 hours per day, including
weekends and holidays (if necessary), during OAT.
•
NEOM may terminate testing whenever the system fails to perform as specified.
•
OAT is best conducted in alternating phases (15-day Phase I and 15-day Phase II) of testing and
evaluation to allow for validation of the tests and corrective actions. The contractor should make no
repairs during any phase of testing unless authorized by NEOM in writing.
•
After each Phase testing, the contractor should identify all failures, determine causes of all failures,
repair all failures, and deliver a written report to NEOM. The report should explain in detail the
nature of each failure, corrective action taken, and the results of tests performed; it should also
recommend when to resume testing. About a week after receiving the report, thedesigner should
convene a test review meeting at the job site to discuss the results and recommendations. At the
meeting, the contractor should demonstrate that all failures have been corrected by performing
appropriate portions of the acceptance tests. Based on the contractor’s report and the test review
meeting, NEOM may set a restart date or may require the Phase repeated. The contractor should
not commence any required retesting before receiving written notification from the customer.
•
If the system experiences no failures during Phase I testing, the contractor may proceed directly to
Phase II testing after receipt of written permission from NEOM. Otherwise, the testing and
assessment cycles continue until the testing is satisfactorily completed. (The process is repeated
until the system either achieves the desired availability or the project team determines whether to
accept the system or make design changes.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 69 OF 3 11
After-Implementation Testing
Several tests may be conducted after implementation or when the system has begun it useful life, such
as these:
•
Operational test (periodic tests to prove correct system operation but do not involve verification of
equipment operating specifications)).
•
Performance test.
•
Post-maintenance test (operational test conducted after preventive or remedial maintenance).
•
Subsystem tests (ensure that large parrs of the system are all working together as originally
designed).
•
Limited scope tests (test a complex system which is broken down into several subsystems or
segments that are tested separately).
•
Evaluation tests (periodic test, performed at least once a year, to validate the vulnerability analysis
and ensure that overall effectiveness is being maintained).
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 70 OF 3 11
B1: Video Surveillance Systems and Video Analytics
Security Functional Requirements are included in the NEOM Security Standard to provide minimum
levels of appropriate security based upon the likely security related risk a facility, site or element of the
built environment may be subjected to in its final operational state.
Overview
This Section defines the performance requirements and design considerations that need to be taken
into account when designing Video Surveillance Systems (VSS) within NEOM.
The designer is required to produce field of view (FoV) traces for any camera included in their
design scheme. The coverage overlay must include where a camera will also incorporate a
video analytic, and the type of analytic being used.
Invisible and Discrete Surveillance
A key element of the NEOM community is privacy, and therefore VSS should only be used where
required and supported by the specific location Security Threat and Risk assessment. When required,
the design of equipment and infrastructure should be carefully considered and combined with other
infrastructure elements wherever possible. i.e. the placement of cameras in wayfinding totems,
lighting units etc.
Whilst, cameras should not be hidden, they should be discretely placed as not to detract from the
overall environment in the specific area. They must also take account of lighting schemes to ensure
the image quality is not degraded or obscured by either artificial or natural light levels across the year.
Exceptions to this are where a strong visible security presence is required to provide a robust
deterrent effect. The need for a strong deterrent effect should be identified through the Security
Threat and Risk assessment completed by the designer. It is expected this effect will be required for
facilities and sites with a protection grading of Restricted but may also apply to specific areas of an
Enhanced security site.
Areas Where Surveillance Will Be Required
The following areas should always be considered for surveillance. Where not included in the design
scheme, an exceptions matrix should be produced to evidence why surveillance is not required or is
not appropriate.
•
Automated vehicle entry points.
•
External access points onto sites for vehicles and pedestrians.
•
VSS in support of any intruder detection systems to provide as a minimum verification of the
alarm state, but also to provide tracking of an intrusion at perimeters as appropriate.
•
Vulnerable internal areas, including:
o
Main reception points.
o
Key access control points.
o
Front of House routes.
o
Computer Equipment Rooms (CERs).
o
Server Equipment Rooms (SERs).
o
Security Control Room.
o
Critical power supply areas and plant rooms.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 71 OF 3 11
o
Accessible communication route points.
o
Fire Command Centre.
o
Loading and delivery bays.
o
Lifts, lift lobbies and escalators, to capture key movement nodes.
o
Stairwells, for safety and to capture key movement nodes.
o
Border security locations and boundaries.
Regulatory requirements that are incorporated into NEOM should be complied with in all
circumstances.
Specific requirements for facilities that are at border locations will be required and should be
discussed with the NEOM Border Security Lead.
Performance Requirements
The following minimum performance requirements should be taken into account when developing the
VSS design.
System Element
Requirement
Cameras
•
High Definition (HD) minimum, with suitable higher resolution
cameras where appropriate, including 360o cameras. (1920 x 1080
minimum)
•
IP cameras only.
•
Colour images at all image quality levels including low light to 0.05
Lux.
•
Support privacy zoning.
•
Support edge recording onto storage cards.
•
Suitable for IR illumination where visible light is not available.
•
ONVIF compliant in conjunction with the VSS.
•
Thermal cameras should be suitable for the usage and have a
minimum resolution of at least 320 x 240.
•
Support video analytics.
•
The VMS must be fully configurable and upgradable to extend its
operational lifespan. Including flexible licensing.
•
The VMS must have a single common and configurable Graphical
User Interface (GUI).
•
The VMS must provide audible and visual alarm indication.
•
The VMS must provide full IP camera support, graphical mapping,
integration, reporting, alarm management, remote access and user
profile management.
•
The VMS must support individual camera quality and recording
settings.
•
The VMS must provide alarm/event displays and recording.
•
The VMS must provide a minimum of 90 days of VSS camera video
storage according to the recording schedule.
•
The VMS must be fully resilient and redundant with availability not
falling below 99.9%
Video Management System
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 72 OF 3 11
System Element
Recording
DOCUMENT CODE: NEOM-NSE-PRC-001
Requirement
•
The VMS provide configurable reporting for audit purposes to include
but not limited to event logs, user transactions, alarms, etc.
•
The VMS will allow reports to be automatically generated on a
scheduled basis and that can be emailed to specified recipients.
•
The VSS cameras must be recorded and stored locally onsite via a
resilient and redundant infrastructure, or off-site storage must offer
the same levels of resilience and redundancy.
•
Must support video wall usage.
•
All cameras shall be geospatially mapped to provide physical
coordinates of each device. This capability shall be used to display
imagery and alarm data on GIS maps that correlate each camera
location to the map.
•
Fully functional VSS cameras must be controllable via the VMS using
a mouse or a USB PTZ control unit and support primacy control.
•
The entire VSS system shall be capable of resisting mains power
spikes and fluctuation and an indirect lightning strike and its
associated EMP.
•
The VMS will provide a graphical mapping interface with dynamic
VSS device icons.
•
The VSS system shall support secure and encrypted communication.
•
The VMS must support controlled, secure and auditable data
exporting to approved storage devices.
•
The VMS will support instant video recording and data tagging via
user initiation.
•
The VMS will support the use of mobile devices (including body-worn
cameras) for both live and recorded images, and remote monitoring.
•
VSS system must support 180 and 360-degree cameras with dewarping and recording.
•
VSS system shall include the ability to pixelate any area of recorded
video footage.
•
The Video Recording server software must have configurable
settings for individual cameras and record images with a time and
date stamp.
•
The video from all cameras must be stored and be available for
viewing locally and across the network.
•
The video recording servers must be capable of recording IP camera
video feeds.
•
The video recording servers will be installed, and rack mounted in a
suitable location such as an IT Comms/Server room with resilient
network and power connectivity.
•
The video recording servers must alarm if a camera is lost, if a disk
fails, if power or communications are lost via the VMS.
•
The video recording server must receive a hard or soft shutdown
trigger from a UPS unit where installed.
•
Background recording rates unless stated as regulatory requirement
will be 6pps (pictures per second).
•
If event or alarm activated the recording rate will rise to 25 - 30pps.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 73 OF 3 11
System Element
Requirement
•
•
Image retention will be as follows:
o
Restricted Protection Group – 90 days.
o
Enhanced Protection Group – 90 days.
o
Baseline Protection Group – 30 days.
o
All groups alarm events – 90 days.
Where surveillance assets provide imagery that supports NEOM
border security, image retention will be 180 days.
Minimum Resolution Requirements
Resolution is defined in the following matrix. It is the responsibility of the designer to confirm any
resolution requirements based on their specific development. Both internal and external cameras will
be installed based upon the six image categories defined in the following matrix.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 74 OF 3 11
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 75 OF 3 11
Image Standards to be Used
Resolution Requirement
Pixels Per Metre (ppm)
Strong Identification
1000
Identification
250
Recognition
125
Observation
62
Detection
25
Monitoring
12
Automatic Licence Plate Readers
•
ALPR will only be utilised where non-automated vehicles will be used in the region.
•
Automated vehicles will carry transponders to aid their real time recognition and vehicle
movement.
•
Where ALPR is employed it will be required to record vehicle entry and exit from a facility or site.
This is mandatory for Restricted and Enhanced Industrial sites.
Operational Issues
•
The VSS cameras and VMS will be reliant upon a suitably resilient network infrastructure.
•
The UPS will need to shut down the VMS/video recording servers correctly after an agreed period
of time following a power failure if the backup generator does not come online.
•
Regular system maintenance must be carried out otherwise the images captured will lose clarity
and may not meet the capture requirements.
•
VSS data requests may be made by authorised organisations and these will need to be approved
by NEOM Public Safety Department in-line with NEOM Data Privacy Policy.
Key Functional Outcomes
•
The VSS system will provide live and a post-event record of unauthorised access into the
perimeter, buildings and vulnerable areas and of events and incidents on a 24/7 basis.
•
The VSS system will provide instant live coverage with pre/post footage of a detected incident,
initiated by the VSS system itself or via an integrated system.
•
The VSS system will aid situational awareness through blank or ‘priority’ screen monitoring
(monitoring by exception) on site, with the capability of doing the same across all sites during
emergencies.
Integration Requirements
The VSS should be capable of integrating with the following systems, with integration being defined
by the security level required at the facility, site or building.
•
ACS.
•
Security lighting.
•
Intercoms.
•
HVM active barriers.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 76 OF 3 11
•
Physical security documents, policies and procedures.
•
Manned guarding patrols.
•
Other security systems.
•
Ability to export and import movies and images to the system.
•
All security systems shall be integrated to the command and control centre.
Dependent upon the level of integration that is present between systems, linked actions and queued
effects may be required. These should be detailed in a cause and effects matrix.
A brief example of a cause and effects matrix is provided below.
Alarm Indicates On Security Work Station
Camera View xxx available for selection via
Work Station alarm
Event Recorded on Security Database
Effect
Analytic alert activated
X
X
X
Door forced alarm received
X
X
X
Cause
Camera auto-cue to alert/alarm area
Cause and Effects Matrix Example
Video Surveillance System
X
Video Analytics Overview
The use and application of video analytics will be a key method to achieving the NEOM Security
Vision to create safe and secure spaces, enabled through invisible technology.
This section will provide guidance to consultants and designers on the considerations around video
analytics that need to be made.
The application of video analytics should be informed by the specific STRA and any detection and
monitoring requirements. Designers should consider the use of analytics as part of a layered security
system and, in particular, they should be developed alongside the VSS ad IDS designs.
Selection of the correct video analytic is the responsibility of the design team to meet the specific
requirements of their Concept of Security Operations.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 77 OF 3 11
Type of Analytic
The type of analytic to be employed must be carefully considered by the designer, rather than an
‘overarching’ capability statement including a long list of analytics. Therefore, each analytic type and
its purpose should be:
•
Clearly describe the locations and cameras where the analytic will operate.
•
Define what the alert or alarm criteria for the analytic are to be.
•
Define where the alert or alarm will be received.
•
Define the operating details for the analytic, i.e. is it 24hr or time bound, or conditions dependent.
Intelligent Functions
The designer should consider whether self-learning systems, machine learning or AI applications can
enhance the use of a video analytic in their design.
Scene Robustness
The analytics engines must be able to operate effectively, and without undue false alarm rates or
degradation, in the intended operating environment for the surveillance asset/sensor. Therefore,
certain considerations need to be taken into account where the video scene may be unduly altered
without a security incident being actually present. Video Surveillance & Assessment System shall
provide active surveillance capability under all weather conditions. Some examples of weather
conditions are given in the following matrix.
If the analytics provides a critical security function, such as primary source of detection, and it will be
ineffective under certain conditions, as second technology must be utilised to avoid this vulnerability.
Location
Impact
External assets and sensors
Rain.
Dust.
Dense Fog.
Sandstorms.
Wind.
Land Animals.
Birds.
Scenery movement, such as trees, doors or other scene items
not of interest.
Water surface movement and reflections, if applicable.
Waves, if applicable.
Fast changing illumination levels, sunlight, deep shadows or
vehicle lighting.
Low scene contrast.
Low light.
Internal assets and sensors
Doors or Lifts opening.
Escalator movement.
Changing illumination levels.
Reflection from surfaces, including glazing.
Overly crowded image scenes.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 78 OF 3 11
Cameras and Lighting
The choice of camera will assure that the best analytics performance is achieved. The
analytics/camera solution must be able to automatically adapt when a camera or a scene switches
between day and night modes. This should include the selection of the most appropriate image type,
visual, thermal etc.
Fields of View
Video analytics field of view, detection location or coverage must be clearly annotated onto
surveillance overlays that include the camera field of view illustrations.
Fields of view must be shown adjusted to the location, i.e. not just general coverage which goes
through walls etc.
Cameras shall be placed based on local topography and applicable requirements.
A study shall be carried out to define the actual field of view of each camera/lens combination used
and identify blind spots. The study shall consider the actual focal length of the camera lens, camera
pole height, local topography and obstructions in the camera field of view.
Camera coverage shall overlap so there are no blind spots between adjacent cameras exist. Local
terrain shall be used to determine the optimal camera mounting pole height that will meet the
requirements of this standard.
Cause and Effect
A cause and effects matrix must be prepared to support the use of video analytics. Examples of
cause and effects matrices can be found in A1: Video Surveillance.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 79 OF 3 11
Surveillance Analytic Example
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 80 OF 3 11
Reference Standards
The following standards should be used when developing the VSS design:
Standard
Description
BS EN 62676
Video surveillance systems for use in security applications.
BS 7958
Closed Circuit Television (CCTV), Management and operation code of Practice.
BS EN 50130-4: +A1
Alarm systems. Electromagnetic compatibility. Product family standard:
Immunity requirements for components of fire, intruder, hold up, CCTV, access
control and social alarm systems.
NCP 104
NSI Code of Practice for Design, Installation and Maintenance of CCTV
systems, NSI.
BS 8418 + A1
Installation and remote monitoring of detector-activated CCTV systems. Code
of practice.
NFPA 730
Guide for Premises Security.
NFPA 731
Standard for the Installation of Electronic Premises Security Systems.
NFPA 70
National Electrical Code.
NFPA 70B
Recommended Practice for Electrical Equipment Maintenance.
ANSI/SIA CP-01-2019
American National Standard Institute/Security Industry Association – Features
for False Alarm Reduction.
IEC 60529
Degrees of protection provided by enclosures (IP Code)
ASIS FPSM
Facilities Physical Security Measures Guideline.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 81 OF 3 11
B2: Other Surveillance Systems
Overview
This section outlines the requirements of other surveillance technology that is not a major part of the
VSS. In the majority of cases it is envisaged that other surveillance assets will be required at locations of
major regional infrastructure and industrial locations that require either a secure perimeter line or
early/extended detection and monitoring of activity close to the site.
This section is not to define this technology, but to outline the considerations that are for these additional
surveillance technology assets.
Counter-Unmanned Aerial Systems is covered in a separate section that should be referred to if this
threat is a consideration for the facility, site or building.
It is expected that wide-area and extended surveillance systems will be deployed at the following sites:
•
NEOM Industrial City Port.
•
Major industrial sites such as the desalination plant and hydrogen plant.
•
Border security locations and boundaries.
Use of Radar and Long Range Cameras
Surveillance beyond the perimeter of sites that require either early warning or situational awareness
should utilise an integrated radar and long range camera system. The radar detection range should be a
minimum of 2km and the final range should be highlighted by the STRA. The long range camera should
have a minimum range of 1km with image stabilization to provide HD imaging. Both should be
connected to the Command and Control center.
A Radar Video Surveillance System (RVSS) will utilise a single or series of radars dependent upon site
and terrain to provide a wide area, up to 360o coverage across the area of interest. Verification of
detection will be via a dual band camera system incorporating both visual and thermal cameras to
provide a true 24hr long range detection and verification capability.
The system will have the following requirements:
•
Be integrated into external security cameras, which will include:
o
Cameras mounted at the Radar Unit location. These will provide the long-range camera
capability. This is the typical location for thermal band cameras that will be able to provide
verification across the individual radar detection footprint.
o
Cameras located along the site perimeters. Generally visual band cameras with low light
capability.
•
All cameras associated with the RVSS will be networked to allow the RVSS software to select the
camera that will provide the ‘best’ view of the area or object of concern. Networking will also allow
the automatic handoff between cameras so that a continuous visual or thermal verification
accompanies the movement history of an object of interest.
•
The radar will detect multiple potential threats and ‘tagged’ friendly assets to provide strong
situational awareness to the Security Control Room operator.
•
The RVSS will be integrated into an Automatic Identification System (AIS) and ‘friendly asset’
transponder system. This will allow all tagged assets, be that vehicles, equipment or people to be
tracked so that threat analysis and information led security can be applied at the site.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 82 OF 3 11
•
The system will allow asset descriptions to be attached to the asset, so hovering over the asset on
the operator screen will provide details to aid situational awareness.
•
The RVSS will be able to distinguish between vehicles, people and animals based on target crosssectional size and be able to prioritise alerts based on target type, direction of travel and proximity to
specific critical locations at the site.
•
Designed to operate in all weather conditions with minimal effects from adverse weather and
precipitation on detecting intruders.
•
RVSS detection and verification capability will be in the range:
o
Vehicles: 2.0km.
o
Moving people: 1.5km.
•
The radar configuration will allow for full 360° coverage with reliable detection.
•
The PTZ head of the radar system should feature a long range high definition visible spectrum
camera which is coordinated with a digitally zoomed cooled thermal camera. This allows an operator
to switch seamlessly between thermal and visible images to facilitate threat verification and tracking.
•
Low effective radiated power that poses no threat to human exposure.
•
Software enabled masking zones can be configured across the full detection area.
Reference Standards
The designer is to select relevant standards for the technology chosen. These should be submitted to
NEOM Public Safety Department for a suitability check for the proposed installation.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 83 OF 3 11
B3: Access Control Systems
Overview
This Section defines the performance requirements and design considerations that need to be taken
into account when designing Electronic Access Control Systems (ACS) within NEOM.
The designer is required to produce privacy zoning to support their placement of access control points
and lines.
Consideration on the selection of access credentials should be carefully considered and in general
should conform to the scale given below and therefore, the dwell time tolerance also. However, the
process must be suitable for the application, user experience and most importantly achieve the
desired security effect.
Where a site, building or facility is in Protection Group Restricted, and some Enhanced, access
control should have a stronger deterrence effect and therefore may not comply with the concept of
invisible security. However, the application of access control should be layered and provide greater
protection at critical locations. The different application of access control techniques and
authentication should be informed by the privacy zoning mentioned above.
Hands Free / Contactless Operation
Wherever possible, regardless of the Protection Group, it is desirable to make any access control
point a contactless operation. This includes biometrics and this requirement should form part of the
selection criteria used for the authentication method.
Access Control Authentication
It is expected that the type and number of authentication factors will vary across Industrial sites
dependent upon the sensitivity or control required over an area or location. The following guidance
should be applied.
Protection Group
Location
Access Control Approach
Restricted
Critical Area
2 Factor Authentication
(one being biometric / one token issued on-site only)
Read In / Read Out
Restricted
Controlled Area
2 Factor Authentication
(one being biometric)
Read In / Read Out
Restricted
General Area
Single Factor Authentication
Enhanced
Critical Area
2 Factor Authentication
(one being biometric)
Read In / Read Out
Enhanced
Controlled Area
2 Factor Authentication
(one being biometric)
Read In / Read Out
Enhanced
General Area
DOCUMENT CODE: NEOM- NSE-PRC-001
Single Factor Authentication
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 84 OF 3 11
Protection Group
Location
Access Control Approach
Baseline
Critical Area
2 Factor Authentication
(one being biometric)
Read In / Read Out
Baseline
Controlled Area
Single Factor Authentication
Baseline
General Area
Single Factor Authentication
Performance Requirements
Access Control Credentials
Access control credentials shall be divided between different tokens:
•
Mobile Near Field Communication (NFC) and Bluetooth Low Energy (BLE), activated and
authenticated with on-device biometrics. Access control systems shall use encrypted storage
sectors as part of an IoT device architecture to identify the token and access rights associated.
These may be virtualised access card systems.
•
Segregated Access Control Tokens shall be used for high security facilities (nominally all
Restricted and STRA identified Enhanced locations). These tokens will remain within the facility,
site or building and be exchanged to users as part of their entry procedures to provide greater
levels of control over these access tokens. Designs should identify how this will be achieved and
tokens controlled. An alternative is the use of robust biometric controls.
•
Biometric usage is the preferred access control credential due to its uniqueness, either as an
individual or as part of a multi-factor identification/authorisation process. The biometrics below are
arranged in order of preferred method, however these need to be matched to the use case at
each access control point.
o
Facial recognition.
o
Palm vein scanning.
o
Iris recognition.
o
Voice recognition.
o
Fingerprint.
The type of biometric to be utilised should be carefully considered to ensure that its ability to capture
the biometric is not adversely affected by environmental conditions. For example, a visual band facial
recognition camera installed in a location where it is subject to changing strong sunlight will be less
reliable. The same applies to palm vein readers exposed to bright sunlight also.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 85 OF 3 11
The guiding principle is that all access control points wherever possible should be
contactless.
Doors
The following guidance should be complied with:
•
External entrance doors will accommodate door position switches for monitoring as a minimum.
•
Security rated door-sets will be provided where there is a need to delay forced entry, or a secured
zone within the building, and to provide an overall deterrent effect to criminal activity.
•
Access control points at doors require the surrounding walls, floor and ceilings to provide a similar
level of delay to unauthorised movement, and wherever possible deny by-pass of the access
control point.
•
Final exit and emergency egress / escape doors will accommodate a manual means of exit device
in order to secure doors from the exterior, whilst still providing a method for safe egress during an
emergency and evacuation scenario.
•
Revolving doors will be able to accommodate a position switch and shall also be monitored by the
ACS and will also have the ability to be manually locked.
Lifts
The following guidance should be complied with:
•
Where vertical transitions require control, then access control readers should be included within
lift cars.
•
Where vertical transitions are possible by a large number of personnel, it may be more
appropriate to have a horizontal access control point with anti-passback and tailgating prior to the
vertical transition point, and therefore the vertical control may not be required. This is dependent
upon the number of access control groups and the differing privileges assigned to each.
Receptions
The following guidance should be complied with:
• Reception desks with access control interfaces/systems must employ strict control over the ability to alter
access database records, adding or deleting records and the ability to change transaction logs. Log ins must
be unique and strong password protected.
• Where enrolment is completed as part of a reception function, this must also be strictly controlled and
authorised.
• Receptions with either of the above functions must have a strategically positioned duress alarm capability
and/or and alert field in the access control GUI.
Pedestrian Barriers
The following guidance should be complied with:
•
Where pedestrian barriers, such as turnstiles or portals are required to control access, these
should provide a complete barrier to unauthorised entry.
•
Entry points should take account of all potential users, and therefore allow passage for those with
disabilities providing the same experience across all users.
•
A method must exist for responding to and processing access failure attempts.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 86 OF 3 11
Fire Strategy
The following guidance should be complied with:
•
The fire alarm and warning system (FAS) will be hard wired into the ACS for each building and
shall allow for the fire alarm system to directly open all electronically locked doors designated as
“fail safe” and without a mechanical override. Any mechanical locks on escape routes will be fitted
with a simple mechanical release facility in the direction of escape.
•
Locks that have a securing function even during a fire incident will operate via multi-pole
activation.
•
It is the designer’s responsibility along with the fire engineer to ensure that the access control
system is safe and compliant for evacuation purposes.
Visitor Access Control
The following aspects should be carefully considered and articulated in the access control strategy:
•
Visitor access and the gaining of the correct access rights.
•
Visitor access should avoid the issue of codes, PINs or other tokens that are not specific to a
person.
•
Visitor access should always be time bound.
•
Visitor access should always be auditable.
•
Where secure facilities are visited, the designer should consider secondary criteria to control
access, such as escort recognition in the access control system prior to allowing a visitor
credential to successfully open an access control point.
•
For Restricted facilities, sites and buildings all visitors to critical areas must be escorted.
Mobile Reader Capability
The designer should determine if mobile reading technology is required. If required then units should
provide the necessary functionality, be environmentally protected, robust, and also offer a secured
interface to the access control system.
Environmental Requirements
The following guidance should be compiled with:
•
ACS devices that are indoors or housed in an environmental indoor cabinet shall be cooled by
redundant centralised air-conditioning.
•
Outdoor equipment should be designed to operate without air conditioning or a forced air
ventilation system and shall be able to function continuously within its own specific environment
conditions.
•
Outdoor equipment should be designed to meet the specified performance required under the full
range of the local environmental conditions.
•
Equipment not capable of meeting environment requirements should be installed in a secure
cabinet with active cooling.
•
Ambient temperature range for ACS equipment should be (-10°C to +65°C).
•
Ambient relative humidity range should be (5% to 100%) non-condensing.
DOCUMENT CODE: NEOM- NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 87 OF 3 11
Cause
Access Control
All Doors
Access
Controlled Door
Emergency
Break Glass
Unit
Access Control
Reader XXXXX
(Valid)
Access Control
Reader XXXXX
(Invalid)
Access Control
Request To Exit
Access Control
Door Forced
Access Control
Door Held
X
Relevant Door releases
X
X
X
X
X
X
X
X
DOCUMENT CODE: NEOM- NSE-PRC-001
©NEOM [2022]. All rights reserved.
REVISION CODE: 01.00
X
X
PAG E 1 88 OF 3 11
Security Shutters Disengaged
Security Shutters Engaged
Security Cages Disengaged
Security Cages Engaged
Lifts reengaged normal usage
Lifts disengaged (Floor of Choice - Doors Open
Disengage Secondary locking mechanism
Door PIR Reengaged
Engage Secondary locking mechanism
Door PIR disengaged
Security Control Room Notified
Signal Sent to Fire Alarm Panel
Access Control readers un-masked
Signal Sent to BMS to Operate AHU
Signal Sent to BMS to Shutdown AHU
Security Control Room Notified
Signal Sent to Fire Alarm Panel
An Integration Diagram.
Door PSU de-energised
•
Access Control readers masked
A Cause and Effects Matrix
Access Control disengaged
•
Access Control Engaged
Event Recorded on Security Database
X
Camera View xxx available for selection via Work Station alarm
Alarm Indicates On Security Work Station
ACS Reader Housings
Refer to Environmental Requirements – All Systems, Equipment Housing.
Access Control System Integration
As part of the access control strategy, the designer will need to include the following elements:
An example of a cause and effects matrix is provided below.
Effect
An example of an integration illustration is provided below.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 89 OF 3 11
Lockdown Systems
Where specified, lockdown capabilities will protect people and assets from marauding attacks by
providing internal safe havens and isolating intruders in areas where responders can remove the threat.
This is a mandatory requirement for all Protection Group Restricted sites, facilities and buildings.
Two types of lockdown should be considered:
•
Dynamic: This is based upon the installed access control points and ability to ‘lock-out’ these points
from further use until deemed safe to do so. This should be enabled via the access control systems
software.
•
Manual: Where individual actions deny access through a designated point by manually locking or
securing the location. This approach is only to be utilised and defined in the security concept of
operations where it is impractical to enable dynamic lockdown.
All lockdown points should be at locations that also provide good levels of delay to forced entry and
where technical surveillance (e.g. cameras) can be achieved to aid situational awareness and response.
Therefore, it is expected that if a door set provides a specific level of delay, the surrounding walls, floor
and ceiling that would give access into the protected space also offer an equivalent level of delay to
forced entry.
Effect of Lockdown
The effect of initiating a lockdown of an area where the person has authority to do so, should be to:
•
Divide the building or site into a number of segregated or compartmentalised zones.
•
Each zone should provide a level of delay to unauthorised or forced entry. The level of protection
needs to be appropriate for the Protection Group and objects being protected by the lockdown.
Activation
Activation of lockdown procedures and actions for a facility, building or a site should be able to be
completed as follows:
•
In less than 3 seconds.
•
Not require the manual locking of any doors or partitions for designated key protective areas.
•
Automatically alert the Security Control Room (SCR) on activation.
•
Be initiated through, or be integrated through, the access control system.
Deactivation
Deactivation of lockdown shall be a controlled process. Deactivation methods will vary by Protection
Group and include:
•
Timed deactivation.
•
Authorised biometric at centrally controlled points by only authorised personnel.
•
Local Security Control Room, but only where it is a secured SCR that would not be subject to duress
or influence.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 90 OF 3 11
Communication
Any facility, site or building that operates a lockdown capability should also have the ability to provide
mass notification to relevant persons, to:
•
Inform of the lockdown, and the need to Run and Hide to those personnel already at the facility, site
or building.
•
Inform of the lockdown and to stay away from the facility, site or building until further notice.
Reference Standards
The following standards should be used when developing the ACS design:
Standard
Description
Disability Discrimination Act 1995 +
Amendment 2005
Ensure all equipment does not impede access to any areas of the
development.
BS EN 60839
Alarm and electronic security systems.
BS 8593
Code of Practice for the Deployment and use of Body Worn Video.
NCP 109
NSI code of practice for design, installation and maintenance of
access control systems.
BSIA A specifier’s guide to access control
systems (Form 132), BSIA
Guide to assist specifiers in grading access control systems in line
with other security applications.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 91 OF 3 11
B4: Intruder Detection Systems
This section should be read where an Intruder Detection System (IDS) capability has been identified.
It is mandatory for Protection Group Restricted sites, facilities and buildings.
Requirements for Enhanced and Baseline sites should be identified through the STRA process.
Overview
The inclusion of an IDS at the facility, site or building will be based upon the site-specific threat and risk
assessment and the identified need to protect specific people, assets or processes.
It will therefore be incumbent on each designer to identify their development’s IDS requirements and
how these are met.
Design Considerations
The following design considerations should be considered when selecting sensors/detectors:
•
Environmental conditions to which the sensor will need to operate in. i.e. would a sandstorm render
the system incapable of detection, will high winds make the detector ineffective?
•
Provide efficient coverage of the distance, area or location to be covered.
•
What is the probability of a positive detection?
•
What is the probability of negative detection or nuisance detection?
•
Are sensors/detectors configured so that they cannot be defeated?
•
Is the system working on a single or multiple ‘knock’ basis?
•
How will an alert be verified?
•
Does the point of detection provide sufficient time for an effective response to be activated, prevent
intrusion or access to the protected object?
•
Are multiple detection technologies required?
Sensor selection is the responsibility of the designer given the specific details of the design location and
the number of technologies required.
IDS Control Panels
All intrusion detection panels shall be installed in secure locations with controlled access.
Panels should be monitored for tampering and fitted with anti-tamper technology.
For efficient arming and disarming of the IDS, a remote arming station (reader/keypad) shall be located
in a secure area near to the main entry/exit door of each building with the relevant sensor shunted for a
variable time to allow for an activation/deactivation code to be entered.
The IDS reader/keypad shall include a duress code facility.
Each control panel shall have an inbuilt memory buffer that stores IDS alarm events and each panel
must be earthed appropriately to avoid any false alarms due to power surges. Individual Intruder alarm
control panels must have a minimum of eight (8) hours of battery back-up to maintain full operation
during a prolonged power outage.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 92 OF 3 11
Where an alarm system is a critical element of protecting the building assets, then an uninterruptible
power supply (UPS), allowing the system to continue functioning for the time directed by local law
enforcement.
IDS Tamper Alarms
All IDS sensors, control panels, and cable containment shall have integrated tamper alarms, and all IDS
components must be installed so that they cannot be tampered with by the public both by design and by
accident. IDS cabling must also have a tamper circuit to detect if it is cut or short-circuited. The tamper
circuit must be active at all times.
IDS False Alarms Rate
The designer must consider the stability of the IDS and document the acceptable threshold for an
acceptable False Alarm Rate (FAR) that is suitable for its use at the specific facility, site or building.
However, false alarms should be a rare occurrence to avoid unnecessary disruption.
At Restricted sites this rate must be below 1 event in every 30 days.
Detection Approach
The following detection approaches should be adopted.
Protection Group
Requirement
Restricted Perimeter IDS
Dual technology based detection with verification cameras.
Maximum 50.0m alarm zones.
Restricted Critical Area IDS
Dual technology based detection with verification cameras.
Maximum 50.0m alarm zones.
Restricted Supporting Area IDS
Single technology based detection with verification cameras.
Maximum 75.0m alarm zones.
Enhanced Perimeter IDS
Single technology based detection with verification cameras or
strong situational awareness with proactive monitoring.
Maximum 50.0m alarm zones.
Enhanced Critical Area IDS
Single technology based detection with verification cameras.
Maximum 50.0m alarm zones.
Baseline Critical Area IDS
Single technology based detection with verification cameras.
Maximum 75.0m alarm zones.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 93 OF 3 11
Reference Standards
The following standards should be used when developing the IDS design:
Standard
Description
PD 6662
Scheme for the application of European Standards for intrusion
and hold-up alarm systems.
NACP 11
Supplementary Code of Practice for the Planning, Installation and
Maintenance of Intruder Alarms.
BS EN 50130-5
Alarm systems. Environmental test methods.
BS EN 50518
Monitoring and Alarm Receiving Centre.
BS 8243 + A1
Installation and configuration of intruder and hold-up alarm
systems designed to generate confirmed alarm conditions. Code
of practice.
BS EN 50130-4 + A1
Alarm systems. Electromagnetic compatibility. Product family
standard: Immunity requirements for components of fire, intruder,
hold up, CCTV, access control and social alarm systems.
BS EN 62676
Video surveillance systems for use in security applications.
BS EN 60839
Alarm and electronic security systems.
BS EN 50136
Alarm systems. Alarm transmission systems and equipment.
BS EN 50131
Alarm systems. Intrusion and hold-up systems. Applicationspecific requirements for Supervised Premises Transceiver (SPT).
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 94 OF 3 11
B5: Duress Alarms
Overview
The primary objective of the duress and panic alarms in this standard are targeted to the protection of
people, assets and sites.
While different types of devices shall feature unique buttons or layouts, the main idea is to have an
emergency button to press, a verbal duress phrase to transmit, or a duress action to demonstrate so
that security staff can observe and respond to people in emergencies.
Anyone responding to such alarms must be trained in security response policies and procedures.
It is mandatory that all Restricted industrial security sites will provide an alarm direct to the Police for an
immediate, and potentially armed response. The sites that have this response will be indicated to the
designers by NEOM Public Safety Department when the Protection Group is confirmed.
It is mandatory that all Enhanced industrial security sites will provide an alarm direct to the site Security
Control Room for an on-site response, unless escalated by the SCR to the Police or other emergency
response service.
It is mandatory that all Baseline industrial security sites will provide an alarm direct to the on-site
designated responders.
Duress Alarm
A duress alarm shall be an activation device placed covertly, but accessibly, which is intended for
security situations where silent notification is appropriate. Typical locations shall include critical
equipment areas, main reception areas within medical, educational, and government authorities’
buildings, as well as higher security financial and administration facilities.
Panic Alarm
A panic alarm shall be an activation device placed overtly and accessibly, intended for security
situations where silent notification is not required. For example, within The Spine rail stations these may
be provided via Help Points.
Considerations
Both duress and panic alarms are electronic devices that shall alert a monitoring station. Each alarm
shall initiate an appropriate response and shall take into consideration the following elements.
•
Layout and scope of the panic alarm and duress security system coverage.
•
Type of activation device (button, switch, keyboard, wireless push button, Kick bar and mobile GPS
unit).
•
Placement of activation device (under a desk, a computer icon, carried on a person, or fixed in the
public realm).
•
Integration with security and building management systems, for example, dynamic lockdown and
VSS.
•
Location and type of annunciation (local/remote and audio/visual).
•
Identification and availability of responders.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 95 OF 3 11
In general duress button activation either via the hardwired duress button or via the wireless
transmitters, a duress signal will be sent to the operators within the Security Control Room (SCR). The
duress signal should take precedence over all activities in the SCR. The security operatives will then
decide upon the action to take based on NEOM security response policies and procedures.
The following table provides some examples:
Protection
Group
Restricted
Example
Device
Name
(Identifier)
Example
Purpose of
Sensor
(Cause)
Fixed Panic
Button
Under Desk
Wireless
Panic /
Duress
Device
carried by
staff inside a
building
possibly a
lone worker
Example
Type of
Alert
Example
Alert
Description
A
deliberately
operated
push button,
for personal
use in an
attack or
duress
situation, to
alert the
security
control room
of an attack
situation
Hold Up
Attack –
Priority 1
Personal
Attack /
Hold Up
A wireless
Radio
Frequency
Identification
device
(RFID)
carried by a
person as
they move
around a
building
Suspicious
activity
observed,
i.e.
tailgating
Priority 2
Example
Response
Example procedures for
responding to panic and
duress alarm
annunciation
summarised below:
SCR guards verify alarm
and record events using
VSS
Summon police
response
Contact on-call manager
Personal
response
required.
Continue to report
ongoing activity to the
police
Use VSS to follow
activity
Deploy external guard to
meet attending police
Record as panic or
duress incident
Acknowledge and once
actioned reset the
system
Mobile Panic
/ Duress
Device
carried by
staff outside
of a building,
i.e.
Maintenance
Staff
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 96 OF 3 11
Performance Requirements
Duress alarms shall provide the following minimum requirements:
Fixed / Wired
•
•
•
•
•
Fixed duress buttons shall be deliberately operated devices requiring two separate actions before
activation.
Mechanical latching action released / reset by a key.
Metal-clad construction.
Normally closed contacts that shall open on activation.
For medical facilities and similar alert applications, a mushroom type push button is required.
Fixed / Mobile Wireless
•
•
•
•
•
Wireless devices shall provide intelligent location-based technology allowing for immediate
reporting of employees or assets on a web-based management reporting system optimised for
mobile and tablet devices.
Mobile duress devices shall use Bluetooth transmitters that repeatedly broadcast their presence
to other nearby Bluetooth detectors. Each beacon shall have its own Unique Identifier (UUID) and
when in range of a Bluetooth ‘detector’ it can recognise the specific UUID and report its
whereabouts in real-time onto either an online console or a mobile application.
Each duress device shall be capable of integration with Wi-Fi and other sensor technologies or to
be a completely standalone system resulting in a self-monitoring solution that can provide SMS
alerts to registered numbers that can also provide real-time location information to third parties for
use with security management applications and services.
Fixed and mobile devices are to be made of robust, durable, hardwearing and waterproof
materials adaptable to their environment.
Panic buttons and duress alarm devices shall have a wide variety of mounting and enclosure
options, including devices that can be worn as wristbands and lanyards and devices that can be
attached to or easily associated with any existing employee identity or access control card.
Card reader duress options
Other duress options that the designer shall consider for each ACS reader shall include but are not
limited to the following:
•
Initiate Dynamic Lockdown if under duress.
•
Deny if under duress.
•
Inform SCR of duress incident at specific reader within a defined security zone.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 97 OF 3 11
Advisory requirements
The design should also take into consideration the development of policies and related procedures
which clearly define the following:
•
Appropriate use of the system including how and when to activate the alarm as well as clearing the
alarm and resetting the alarm.
•
Response protocols (internal and external).
•
Preventive maintenance, inspection and testing of applicable devices.
•
Establishing interim procedures during system downtime.
Documenting system activations including:
•
Reporting of malfunctions or other maintenance issues immediately and addressing functional
issues promptly.
•
Reviewing the system on a regular basis as part of the security vulnerability assessment. The
system should be modified as needed based on evolving requirements or the mitigation of identified
risks.
Reference Standards
The following standards should be used when developing the Duress and Panic Alarm System design:
Standard
Description
BS EN 50131
Alarm Systems. Intrusion and hold-up sytems.
BS EN 50518
Monitoring and Alarm Receiving Centres.
PD 6662
Scheme for the application of European Standards for intruder and
Hold-Up Alarm systems.
PD 6669
Guidance for the Provision of Alarm Transmission Systems (ATS).
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 98 OF 3 11
B6: Security Lighting
Overview
The primary desired security effect is in support of surveillance assets, be they technical or operational.
The illumination type must be suitable for the surveillance type being employed. i.e. Infra-Red (IR)
illumination may well be a good choice for camera systems, but if operational staff need to operate in the
same area this is unlikely to provide the levels of illumination for them to move safely and identify
intruders, damage etc.
Dark Skies Policy
NEOM is committed to the creation of Dark Skies Policies. Policies seek to reduce the amount of light
pollution emitted directly upward or reflected from the ground to the sky.
The requirement to reduce light pollution and save energy will present challenges to lighting designers
for security as they will need to consider the following:
•
Minimising visible light.
•
Moving towards motion detection activated illumination which may not be suitable for a number of
security applications.
•
The use of Passive Infra-Red activation measures where possible.
•
Directional design for visible light.
•
The use of surveillance technology that is not visible light dependent.
•
Use of the lowest level of lighting appropriate for the purpose and location of the lighting source.
Performance Requirements
General Functional Requirements
•
Preference should be given to the use of ambient light wherever possible, unless required to meet
specific security or safety requirements.
•
Each perimeter light shall be connected to a different ring main than the light adjacent to it.
•
Perimeter lights shall be powered by an emergency power generator in the event of power failure.
•
Each lighting fixture of perimeter lighting shall be protected by circuit breaker in a secure
compartment with a suitable lock.
•
The lighting controls shall be designed so the lights are energized prior to darkness, or during the
day, at a time suitable for the run-up period of the lamps used.
•
All switchgear controls and switches for security lighting shall be located in a locked and secure
facility.
•
All VSS cameras to incorporate infrared illumination so continuous visual band illumination will be
provided. This does not apply to thermal band cameras.
•
Energy efficient lighting should be used wherever possible.
•
The use of sodium lighting or ‘yellow light’ should be avoided as it does not provide an effective
colour rendition, either for the human eye or surveillance technology, as white light halogen or LED
lighting.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 1 99 OF 3 11
•
Provide uniform illumination to avoid the development of shadows or severe illumination contrasts.
•
Where lighting is used in the public realm, lighting should be used to support the hierarchy of
pathways. It should encourage the use of primary routes through well-lit pathways and discourage
routes without lighting or low levels of lighting (as per the below image). This is based on the
principle that the public will perceive a well-lit area to be safe and secure. As such the lighting
design should support those routes which do not increase the opportunity for criminality.
•
Lighting should be designed in such a manner as to minimise unwanted glare.
•
Lighting/illumination infrastructure should not cause other security concerns such as climbing aids
etc. In general, anything that could be classed as a climbing aid should be a minimum of 3.0m away
from anything be protected.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 00 OF 3 11
Perimeter Illumination
Perimeter illumination using visual band light should be considered as the exception and used only in
areas where its use is essential for supporting safe movement. Where visual band light is required the
following should be considered:
•
Fixed perimeters: Visible (i.e. non-IR) illumination of the perimeter should only be used where is
supports safe and effective working of the Guard Force. If there is no guard force, then the need for
constant illumination should be considered.
•
The illumination zone is a strip of 3.0m outward and 3.0m inward of the perimeter barrier or 3.0m
outwards of the building façade.
•
The lighting in all areas shall be designed so that it does not interfere with cameras and does not
intrude into the camera field of view to the extent that camera performance is affected.
•
At existing facilities, lighting output shall be measured and recorded. Measurements shall be taken 2
hours after local sunset. Shared fence lighting has special requirements for this measurement.
•
Lighting design for parking facilities shall be in accordance with IESNA RP-20.
•
If visual band light is required, then the following minimum should be achieved where only camera
usage is required:
o
Horizontal: 5 Lux minimum @ 100mm above ground level. Uniformity to be a minimum of 2:1
average to minimum.
o
Vertical: 2 Lux minimum @ 300mm above ground level and normal to the fence line.
o
The illumination should be present during all hours of darkness and should not be event
activated. Rather it should be activated through the use of a central switch(s).
o
If cameras are being used, then colour rendition of the light should be above 60.
o
Illumination should be provided to cover any vulnerable points.
Computer plotted prints shall be supplied with all security lighting proposals showing grid patterns and
calculations covering perimeter, area lighting at perimeter fences and shared fence lighting. Grid size on
the plotted points shall be based upon a grid of 10.0m square while a grid of 3.0mx3.0m shall be used
for perimeter lighting.
Average levels of lighting for security purposes where security personal movement occurs should be a
minimum of:
Location
Lux
Vehicle parks
10
Walkways
20
Stores and loading bays
100
Perimeter lighting shall illuminate the fence line and its surrounding area with the minimum light levels
specified in the below. Lighting along the fence line shall be uniform with all light illumination overlapping
adjacent light illumination.
Location
Lux
Fence +/- 1.0m
23
Fence +3.0m internally
20
Fence +10.0m externally
12
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 01 OF 3 11
This measurement shall be taken during fully dark time (2 hours after sunset) with existing facility lights
turned off. Higher lighting level should be added if required for surveillance systems.
Public Spaces
Average levels of illuminance that should be considered for security purposes are:
Location
Lux
Pedestrian areas
20
Vehicle parks
10
Sports stadia and similar venues – minimum level for stands and exit areas.
30
Reference Standards
The following standards should be used when developing the Security Lighting design:
Standard
Description
Lighting Against Crime
ACPO Secured by Design 2011.
BS 5489-1
Code for the design of road lighting and public amenity areas.
BS 12665
Light and Lighting. Basic terms and criteria for specifying lighting
requirements.
BS EN13201-2
Road lighting performance requirements.
BS EN 62717
LED modules for general lighting.
BS EN 12464
Lighting of workplaces.
BS EN 5266-1
Emergency Lighting Code of Practice for the emergency lighting of
premises.
Lighting Guide for the Built Environment.
Lighting Guide 6
The exterior environment. The Society of Lighting Professionals
part of the Chartered Institute of Building Services Engineers.
January 2016.
Guide to Limiting Obtrusive Light
The Society of Lighting Professionals part of the Chartered
Institute of Building Services Engineers. November 2012.
Guidance Note 01/20
Guidance Note for the reduction of obtrusive light. The Institution
of Lighting Professionals.
LG06/16
Chartered Institute of Building Services Engineers Lighting
Handbook (LG06 and LG15).
LG12
Lighting Guide 12 – Emergency Lighting.
Saudi Building Code SBC 401
Saudi Electrical Code.
SASO 2870/2015 Regulation
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 02 OF 3 11
B7: Cyber Security
‘An object-orientated model, where individuals, objects and assets interact within the security system,
and physical and cyber converge.’ NEOM Technical Strategies Report - Security
NEOM’s embrace of a fully converged system architecture, with all elements being treated as objects in
a virtual eco-system will attract both malicious and curious cyber activity. It is therefore essential that all
systems are cyber-secure and conform to minimum standards to avoid vulnerabilities within the ecosystem architecture.
The sequence and frequency of Identification, Authentication, Re-authentication and Authorization
(IARA) is a key element of the cyber-physical convergence. Therefore, systems should be designed with
this criterion in mind.
This section introduces the underpinning generic requirements, and the NEOM Cyber Security Lead
should be consulted for more detailed considerations, along with complying with the security system
cyber security requirements defined by the NEOM IT and Cyber Security Teams.
For specific systems, the designer may be requested to complete a specific cyber-security risk
assessment to understand fully the threat vectors applicable and therefore the additional cyber-security
measures that will need to be included in the system design. Consideration must be given to hardware
middleware and software for control systems and security systems.
Cyber Security measures shall be the final part of a Plan-Design-Check-Act (PDCA) approach to threat
management of a converged physical, technical and logical network and physical security network
designers and operators shall utilise the PDCA cycle to evidence how cyber-security has been
evaluated in their design process. This should include a simple topology schematic showing system and
object connectivity that will be enabled.
The overarching tenet being that all systems should be designed with cyber-engineering
inherently considered, so that each system/object is considered ‘hardened’ against cyber, virtual
and logical threats.
As a baseline, all systems should be compliant with the:
•
NEOM Information Security Policy: CS_GRC_Pol_102.
•
KSA National Cyber Centre requirements.
•
ISO27001.
All systems should be able to evidence an appropriate cyber-secure engineered standard, such as the
UK Cyber Essentials Plus scheme or equivalent.
Control and safety systems are more likely to operate under regimes determined by the IEC 615082 and
ISA/IEC 624433 standards.
Physical Design Considerations
Physical security and resilience of networks and infrastructure are key to maintaining availability of the
systems.
Security Assets shall have dedicated duct(s) and Fiber Optic Cable(s).
The LAN deployed for security shall be dedicated to security systems and designated as security
network (SECNET).
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 03 OF 3 11
SECNET shall be implemented with redundant, physically discrete networks.
SECNET cabling shall be physically installed in separate discrete physical ducts or sub-ducts,from other
facility's cabling.
All security devices, except field devices, with LAN connectivity requirements shall have two, physically
discrete, network connections and shall automatically connect to the active LAN.
SECNET shall have a dedicated router/switch to connect to a backbone or public network.
It is key that measures are taken at each facility and site to ensure that a local vulnerability does not
exist, and that a cascading vulnerability does not develop through the City eco-system. i.e. the
downstream and upstream effects of their network, infrastructure and information.
The information held by each system should be prepared at each design stage to evidence that this has
been considered and that adequate information security is planned.
The following physical measures shall be implemented to mitigate or reduce the potential likelihood and
impact of cyber security threats. These measures shall be applied by the designers for the following.
Protection Group
Restricted
Enhanced
Baseline
Core Network Physical
Security
Resilience of Infrastructure
Core network hardware to be within
electronically access controlled
equipment room.
Fault-tolerant architecture with
redundant capacity systems and
multiple distribution paths
Secure Configuration
The following functional components of secure configuration shall be implemented during design and
operation of any system:
•
Physical Security – this includes access to physical ports, removable media, debug interfaces,
tamper-protection boundary and resistance to attacks such as loss of power. The product may
consist of some elements that are deployed in a non-secure area and other elements that are
deployed in a secure area or secure enclave – these may have different requirements.
•
Secure Configuration – the product must follow NEOM’s Cyber Policy with controls over who can
change configurations.
•
Network Security – the product will consist of elements that need to communicate with each other or
to other systems. There must be controls on all pathways and objects suitable to the accessibility
and potential vulnerability associated with each.
•
Authentication management (Access Privileges) – use of Multi Factor Authentication (MFA) where
necessary as dictated by the protection group and the system criticality or information holding, with
unique credentials for each individual user, with privileges based on Need for Access and not on
seniority.
•
Monitoring – systems should be engineered to monitor for potential breaches and rules-based
violations.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 04 OF 3 11
Cyber Audit Requirements
Unless superseded by the aforementioned policies and standards, the following activities are required to
be completed at least annually by the facility operator and its staff:
•
Review of cybersecurity management policy and procedures.
•
Review and updating of the site/facility cybersecurity risk assessment.
•
Review the cybersecurity incident response plan.
•
Undertake an incident response exercise.
•
All staff to undertake cybersecurity awareness and training.
Reference Standards
The following standards should be used when developing the Cyber Security design:
Standard
Description
CS_GRC-Pol_101
NEOM Information Security Policy Summary
CS_GRC-Pol_102
NEOM Information Security Policy
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 05 OF 3 11
B8: Perimeter Security Barriers – Fences and Gate Houses
The following section sets out design requirements for the use of pedestrian barriers at Industrial site
and facility perimeters within NEOM. It is recognised that Industrial sites and facilities may require a
stronger and more visual security infrastructure overlay than other Non-Industrial locations in NEOM.
Wherever possible solutions should be technology led, leading to security staff efficiencies and
stronger more immediate situational awareness.
The requirements based on each Protection Group are as follows.
The Minimum Delay is the overall time measured from the first credible point of detection to either a
critical or protected area of the site or facility based on an individual on foot. It should be noted these
are the minimum, and if it would take longer for an intervention force/Police response, the delay time
should be increased to match or exceed this time.
If a vehicle based threat is identified on the STRA as significant then Section B10 should be referred
to for the application of VSBs.
Protection Group
Perimeter
Baseline
•
External Clear Zone: Min. 3.0m.
•
Fence/Barrier: Min. 3.0m.
•
Detection: On fence/barrier or internal (if required).
•
VSS: Perimeter coverage / Min. images: 25ppm.
•
24hr capability required.
•
Internal Clear Zone: Min. 2.0m.
•
External Clear Zone: Min. 3.0m.
•
Fence/Barrier: Min. 3.0m.
•
Detection: Internal or on fence/barrier.
•
VSS: Continuous coverage / Min. images: 62ppm, with
PTZ for tracking.
•
24hr capability required.
•
Internal Clear Zone: Min. 3.0m, including detection zone
if not fence/barrier mounted.
•
External Clear Zone: 3.0m.
•
Outer Fence: Min. 3.0m.
•
Detection Zone: 5.0m
•
VSS: Continuous coverage / Min. images: 62ppm,
•
with PTZ tracking to 125ppm.
•
24hr capability required.
•
Inner Fence: Min. 3.0m.
•
Internal Clear Zone: 5.0m.
Enhanced
Restricted
DOCUMENT CODE: NEOM-NSE-PRC-001
Minimum Delay
5 mins
10 mins
15 mins
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 06 OF 3 11
Baseline Example Minimum Standard Section
Enhanced Example Minimum Standard Section
Restricted Example Minimum Standard Section
The following points should be complied with:
•
All clear zones should be free wherever possible of obstructions and climbing aids. Where this is
not achievable then consent from NEOM Public Safety Department should be obtained. The
designer will need to prove that situational awareness and detection are not degraded.
•
Technology should be used to provide virtual perimeter patrols, therefore negating the need for
formal perimeter patrol roads. However, quick access to all points of the perimeter is expected by
on foot and by a 4x4 vehicle. Existing roads and maintenance roads are acceptable at a minimum
width of 4.0m.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 07 OF 3 11
It is highly unlikely that the overall security effect can be achieved using a single layer approach and
therefore defence in depth and multiple layers should be employed. This should also negate single
points of failure in the overarching security strategy.
The Requirements for Entry Points and Gatehouses
The following are the requirements for each of the Protection Groups.
All Groups:
The roadway approaching a gatehouse shall have a chicane or zigzag design to retard the speed of
incoming vehicles. This may be augmented by additional speed retardation devices and designs if so
required by the proponent. A 90-degree turn leading to the gatehouse shall be an acceptable
alternative to a chicane.
•
The approach to the gatehouse after the chicane/speed control devices shall be no longer than
50.0m in order to minimize the distance the vehicle has available to accelerate to the gatehouse.
•
The sides of the roadway in the chicane shall have barriers that shall prevent a vehicle from
driving or cutting across the chicane.
•
Each lane in the gatehouse inspection area shall have medians separating each lane of traffic.
The medians shall be sized to allow installation of lane equipment and permit a safe area for
security personnel to stand on. The height and width of the median shall be sized as needed for
safe operation. The width shall not be less than 800mm.
•
The gatehouse should be in front of the facilities and exactly at the center of the entry, between
the entrance and exit lanes.
•
An audible and visual alarm shall be provided that is activated via pushbutton in the gatehouse
during an emergency. The pushbutton shall be protected against accidental activation but shall
not be locked at any time. The audio alarm shall be audible to all personnel in the gate area and
the visual alarm shall be placed in multiple locations to ensure clear visibility to all personnel in
the gate area. Once alarm is activated, it shall annunciate an alarm at the SCR.
•
Only security devices that require security personnel interaction or review shall be installed in the
gatehouse. The gatehouse may not be used for installation of other support and infrastructure that
are not directly required for security.
•
While the gatehouse may be used to display alarms for specified security related activities at the
gate, it may not be used for SCR functions, unless specifically identified and recommended in the
STRA.
•
A rejection U-turn lane shall be provided for vehicles denied access shall be able to turn around
without entering the facility. The rejection lane turning radius shall be sized for the largest vehicle
expected to enter the facility. The rejection lane/turning point shall be located before the
gatehouse.
•
Each entry and exit lane shall have a clearly visible traffic light type setup that will inform users
from a distance if a lane is operational or closed.
•
All lanes and traffic flow directions shall be clearly marked on the roadway.
•
Roadway containment in the access control and inspection area shall prevent inbound vehicles
from unauthorized access and shall extend from the inspection area to the end of the Response
Zone.
•
The containment shall consist of passive barriers on either side of the roadway that shall deny a
vehicle entry to the facility until the end of the Response Zone.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 08 OF 3 11
Protection Group
Baseline
Enhanced
Requirement
•
Preferred automated entry points where practicable.
•
Vehicle control barriers to be installed across all lanes for traffic control.
•
Emergency gates to be included where required by the emergency services or
site evacuation plan. All to be covered by VSS and ability to be lit to provide
adequate task lighting at a nominal 100 Lux.
•
All gates should be fully closeable to the same standard as the surrounding
perimeter barriers. These should be lockable to provide the same level of
delay as a cutting attack on the perimeter barrier.
•
If a staffed entry point is required, then a gatehouse should be provided sized
to incorporate the activities required at that point. At least one form of
communication should be provided to a supporting SCR or response point.
•
Preferred automated entry points where practicable.
•
Vehicle control barriers to be installed across all lanes for traffic control.
•
Emergency gates to be included where required by the emergency services or
site evacuation plan. All to be covered by VSS and ability to be lit to provide
adequate task lighting at a nominal 100 Lux.
•
All gates should be fully closeable to the same standard as the surrounding
perimeter barriers. These should be lockable to provide the same level of
delay as a cutting attack on the perimeter barrier.
•
Vehicle Control Barriers:
•
•
•
o
Vehicle speed reduction measures should be incorporated on the
approach to any gate that reduces the achievable speed at the gate line
to 48kph for a 7,200kg (N2/N3C under IWA-14).
o
Vehicle control barriers should be provided on each lane at the gate line
to help position vehicles trying to gain entry.
o
VSBs only need to be incorporated at the gate line where a need has
been identified during the STRA process.
Gatehouse Protection:
o
If not reinforced concrete, a vehicle impact barrier should cover the full
width of the attack face of the gatehouse. (IWA-14)
o
Ballistic protection for glazing, doors and walls to conform with a level of
protection at FB/BR6 + SG2.
o
Entry doors to be placed on facades 90o away from the vehicle lanes.
o
Gatehouse structure to protect against a PBIED attack.
Systems:
o
All security and life support systems to be on UPS.
o
Duress alarms to be provided.
o
At least 2 diverse communication methods.
o
Doors to the non-public areas of the gatehouse should be access
controlled using dual factor authentication.
o
The activity area and façade of the gatehouse should be covered by VSS
with min. image resolution 125ppm.
Gatehouse Sizing:
o
Sized to the activities to be undertaken at the location.
o
In-house welfare facilities to be provided.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 09 OF 3 11
Protection Group
Requirement
•
o
Sun shading to be provided to support any external activities. The sun
shades should be installed above 5.5m in height to allow the full range of
vehicles entry to the site.
o
360o visibility should be provided for the gatehouse.
o
Two parking bays should be provided for facility security vehicles.
o
Adequate vehicle parking spaces shall be provided to allow parking of
gate personnel and visitors without obstructing traffic flow.
o
Five visitor parking bays should be provided outside of any VSB lines.
o
If required, a visitor center shall be adjacent to the gatehouse.
o
Rejection lanes are to be provided without vehicles needing to traverse
any VSB lines.
Pedestrian Entry Points:
o
Restricted
To be positioned within 10.0m of the gatehouse and be covered by VSS
to an image quality to 250ppm.
•
Preferred automated entry points where practicable.
•
Vehicle control barriers to be installed across all lanes for traffic control.
•
Emergency gates to be included where required by the emergency services or
site evacuation plan. All to be covered by VSS and ability to be lit to provide
adequate task lighting at a nominal 100 Lux.
•
All gates should be fully closeable to the same standard as the surrounding
perimeter barriers. These should be lockable to provide the same level of
delay as a cutting attack on the perimeter barrier.
•
VSBs:
•
•
o
Vehicle speed reduction measures should be incorporated on the
approach to any gate that reduces the achievable speed at the gate line
to 48kph for a 7,200kg (N2/N3C under IWA-14) where a full VSB
perimeter is to be installed.
o
Vehicle speed reduction for sites that provide VSB at critical points of the
site, but not a full perimeter, should achieve speed management to those
measures not the gate line.
o
VSB barrier controls should be adequately protected with equipment
cabinets in a protected area or in an internal equipment room as part of
the gatehouse.
Gatehouse Protection:
o
If not reinforced concrete, a vehicle impact barrier should cover the full
width of the attack face of the gatehouse. (IWA-14)
o
Ballistic protection for glazing, doors and walls to conform with a level of
protection at FB/BR6 + SG2.
o
Entry doors to be placed on facades 90o away from the vehicle lanes.
o
Gatehouse structure to protect against a PBIED attack.
Systems:
o
All security and life support systems to be on UPS.
o
Duress alarms to be provided.
o
At least 2 diverse communication methods.
o
Doors to the non-public areas of the gatehouse should be access
controlled using dual factor authentication.
o
The activity area and façade of the gatehouse should be covered by VSS
with min. image resolution 125ppm.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 10 OF 3 11
Protection Group
Requirement
o
•
•
Under-Vehicle Imaging System is to be employed on all incoming lanes.
Gatehouse Sizing:
o
Sized to the activities to be undertaken at the location.
o
In-house welfare facilities to be provided.
o
Sun shading to be provided to support any external activities. The sun
shades should be installed above 5.5m in height to allow the full range of
vehicles entry to the site.
o
360o visibility should be provided for the gatehouse.
o
Two parking bays should be provided for facility security vehicles.
o
Adequate vehicle parking spaces shall be provided to allow parking of
gate personnel and visitors without obstructing traffic flow.
o
Five visitor parking bays should be provided outside of any VSB lines.
o
If required, a visitor center shall be adjacent to the gatehouse.
o
Rejection lanes are to be provided without vehicles needing to traverse
any VSB lines.
Pedestrian Entry Points:
o
To be positioned within 10.0m of the gatehouse and be covered by VSS
to an image quality to 250ppm.
Use of the Building Façade as part of the Layered Defence for Highly Visual Areas
It is recognised that certain Industrial facilities may be in highly visual locations, potentially with high
footfall adjacent to them, around NEOM. In these circumstances it is inappropriate to have highly
intrusive or more ‘military’ style perimeter treatments. The same principles will however still apply,
being:
•
A designed perimeter barrier will still be needed to provide territorial demarcation and separation.
•
The barrier should have a clear zone both on the outside and inside of a minimum of 2.0m, free
from other infrastructure or climbing aids.
•
The 2.0m clear zone internal to the barrier is used as a detection zone for technology based
systems. This is internal to avoid excessive nuisance alarms from the high footfall area on the
exterior.
•
A camera based system must be present to allow remote verification of an intrusion.
•
The designer must demonstrate that the layered delay time to any critical or protected areas of
the facility is adequate for a response to stop the intrusion.
•
Delay times can utilise the building façade and internal lines of delay.
Potential examples are shown in the following images.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 11 OF 3 11
Primary functions
The primary functions of pedestrian barriers within NEOM are as follows:
•
To delineate between public and private spaces and provide stand-off range where required to
critical elements of a facility or site.
•
To provide an obstacle against hostile intrusion onto Industrial sites.
•
To provide resistance against burrowing, scaling or penetration of a barrier system.
•
To allow for the authorised access of people and vehicles at designated perimeter locations
controlled either by technology or a staffed gatehouse.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 12 OF 3 11
•
To act as a host for other security detection equipment such as VSS, IDS and security lighting.
•
To provide privacy screening of the location, if required and in conjunction with either solid panels
or coverings.
Standard Fence Panel Example
The following images (see following page) and infographics provide the base standard for a 3.0m high
weld-mesh security fence. This represents the Baseline condition.
The Baseline fence will be:
•
A minimum of 3.0m above finished ground level.
•
Follow ground contours to provide the minimum height at all points.
•
Gates will provide the same level of delay with a maximum gap below each gate leaf of 50mm.
•
Be made from weld-mesh with a mesh size of 75.0mm x 12.5mm.
Further specification can be found in BS1722: Part 14 which provides details on:
•
High security fences.
The following performance standards shall also be met:
•
Fence shall run in straight lines as far as possible. Where changes of direction are required the
angle shall not be less than 90 degrees.
•
Fences shall match the terrain profile. When required due to terrain the fence panel width may be
reduced from the nominal 3.0m width requirement and shorter panel widths may be used with
fence posts increased in length as needed. This may create a stepped profile on top of the fence.
The razor tape shall seamlessly cover this profile.
•
Where the fence crosses features such as streams and drainage ditches and where conforming
of the fence to the ground contour is impractical, the fence shall span the depression.
•
A reasonably smooth profile at the fence line shall be provided.
•
The bottom of the fence shall not be more than 25.0mm (1 in) above the finished ground line. In
sections where 25.0mm (1 in) cannot be met, the space below the bottom of the fence shall be
closed with extra fence panel or barbed wire. If extra length fence posts are required at such
locations, they shall be furnished and installed in lieu of standard length posts as may be
required.
•
All line posts shall be equally spaced at 3.0m intervals or less.
•
Posts shall typically be 3.6m in length or as required by fencing system design.
•
Fence line, corner, end, gate, brace or pull posts shall be spaced as needed to guarantee fence
stability or as required due to changes in vertical or horizontal alignment.
•
Posts to be coated both externally and internally.
Perimeter Penetrations
•
Perimeter penetration by pipelines, conveyer systems, culverts, storm drains, sewers, air intakes
exhaust tunnel, and utility opening shall be either under or over the fence and shall comply with
the methods specified in this section.
•
No structures related to the perimeter penetration shall be constructed in the fencing system’s
internal interface or external interface zones.
•
Dedicated surveillance cameras shall be deployed at the perimeter crossing and shall be
monitored at the security control center.
•
The functioning and layout of the fencing system shall not be impacted by the penetration.
•
Guardrails shall be installed at the transition point where the pipeline enters/exits the ground.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 13 OF 3 11
Under Fence Penetration
•
Under fence penetration shall be limited to pipelines.
•
The Pipeline shall be buried outside the internal and external interface zones of the fencing
system.
•
If concrete culvert is required, opening shall be sealed on both sides with grates sized to prevent
ingress of human and small animals. The grates shall conform to the shape of the culvert.
•
Sensors shall be installed to detect tamper/breach attempts.
Over Fence Penetration
•
Over fence penetrations shall maintain a minimum of 7 m height from the base of anti-personnel
fence throughout the external and internal interface zones of the fencing system.
Concertina wire shall be installed to cover the penetration throughout the external and internal
interface zones of the fencing system.
The design of each security gate shall include 3 consecutive area zones:
•
Approach Zone: This is the area external to the gate in which vehicles and pedestrians move
towards the gate. The approach zone includes the Vehicle Approach Speed Management
(VASM).
•
Access Control Zone: This is the area immediately in the gatehouse vicinity where vehicles and
pedestrians are screened and permitted or denied entry to the facility. The access control zone
includes the auxiliary gate, the gatehouse, the gatehouse inspection area, the gate support
facilities, the access management area, and the additional inspection area.
•
Response Zone: This is the area inside the facility and include containment measures to prevent
and reject unauthorized access. This response zone includes the final denial crash barrier and the
over watch.
•
Response Zone is required for Protection Group Restricted. The response zone is the roadway
between the gatehouse and a certified, deployable VSB which shall prevent unauthorized
vehicles from entering the facility after passing the access control and inspection area.
•
The length of the response zone shall be calculated based on the configuration of the gate and
calculated from the rear end of the gatehouse.
•
The roadway shall be bordered with roadway containment to prevent any vehicle from bypassing
the response zone.
•
VSB shall not be installed next to or in line with the gatehouse, nor shall they be collocated with a
drop arm barrier.
•
Gatehouse personnel shall have a clear view of the roadway between the barrier and the
gatehouse to ensure routine barrier deployment will not cause problems when vehicles are
traversing the roadway.
•
Manned gates with security systems/devices shall require a support building with toilet and prayer
facilities and separate, dedicated rooms for security system support equipment installation. Toilets
shall not be more than 20.0m away.
•
Manned gates without security systems/devices shall require a support building with only toilet
and prayer facilities if the nearest existing toilet facilities are more than 20.0m away.
•
Unmanned gates with security systems/devices shall only require separate, dedicated rooms for
security system support equipment installation if the nearest existing security system support
equipment room is not within ethernet connectivity limits (i.e. Balanced twisted-pair cable limit of
≈90.0 m (295 ft)).
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 14 OF 3 11
•
Security system support equipment (i.e. network equipment) shall be installed in a dedicated
room in gate support building. Security system support equipment shall not be installed in the
gatehouse.
•
All Gate buildings (Gatehouses, other gate support buildings) and security systems field devices
in Gate area (such as Cameras and ACS readers) shall be within ethernet connectivity limits (i.e.
Balanced twisted-pair cable limit of ≈90.0m (295 ft)) from Security system support equipment
rooms.
•
An audible and visual alarm shall be provided for all gate support buildings occupied by security
personnel.
•
All gate support buildings occupied by security staff shall be protected with an anti- vehicle barrier
deployed on all sides facing traffic.
•
All gate support buildings occupied by security staff shall be within unobstructed line of sight to
the gatehouse.
•
The top of the installed post shall be covered with a cap that is secured using either a pop rivet,
screw, or bolt.
Visibility Index: Specifies how security personnel patrolling the perimeter will have their view
obscured by the fence fabric. It is computed by determining how much of the fence material in a
single typical 3-meter panel obscures vision.
•
The Visibility Index (VI) may not exceed 45% unless otherwise specified by Security Risk
Assessment or by NEOM Public Safety - Security. This requires that no more than 45% of the
fence panel area may be covered with fence wiring and strips.
The VI is determined as follow:
•
Determine total area covered by the width of all vertical and horizontal wires/strips in a single
typical 3.0m panel (not including razor tape or fence posts) when viewed perpendicular to the
fence line.
•
Add coating thickness of all wires in the panel.
•
Determine the total surface area of the typical 3.0m panel (including all wires).
•
Subtract the area from 1 and 2 from the area calculated in 3.
•
Determine the % that is obscured.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 15 OF 3 11
Reference Standards
The following standard should be used when developing the security rated pedestrian barrier system
design:
Standard
Description
BS 1722 – Part 1 to Part 18
Fences.
LPS 1175 – Issue 8
LPS1175 focusses on the physical security of ‘intruder resistant
building components’, which includes strong-points, security
enclosures, free-standing barriers, and any products that fall within
those categories, such as doors, shutters or fencing
Crime Prevention Through Environmental
Design
Crime Prevention Through Environmental Design (CPTED) is
defined as a multi-disciplinary approach for reducing crime
through urban and environmental design and the management
and use of built environments.
Secured by Design 2019 UK
SBD is a police initiative that improves the security of buildings
and their immediate surroundings to provide safe places to live,
work, shop and visit.
UFC 4-022-03
Uniform Facility Codes Security Fences and Gates.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest
revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 16 OF 3 11
High Security Fence – Elevation
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 17 OF 3 11
High Security Fence – Minimum Performance Requirements
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 18 OF 3 11
B9: Vehicle Security Barriers
Overview
This section applies to any location with a Protection Group of Restricted or the site-specific Threat and
Risk Assessment identifies a need for the protection of people or assets against a hostile vehicle threat,
whether that be a Vehicle As a Weapon (VAW) attack or a Vehicle-Borne IED.
Whilst many of the NEOM vehicles are set to be automated and driverless, the need for Hostile Vehicle
Mitigation (HVM) may remain in industrial locations where traditional vehicles may still be required for an
extended period. This is likely to be the case for the NEOM Industrial City due to the Port and also any
facilities that can be accessed from highways and roads through the region.
The Design Process
For the successful design of a HVM scheme, a multi-stage process is required in order to develop the
relevant performance requirements, through a well-defined Operational Requirement (OR). The OR
process is robust and will illustrate the relevant factors in selecting the right scheme, rather than a
blanket application of Vehicle Security Barriers (VSBs).
The following requirements apply to Industrial site Protection Groups:
•
•
•
Restricted Sites:
o
Designer to consider whether perimeter deployment or more localized critical asset deployment
is beneficial.
o
Where a full perimeter is selected, VSBs must be installed internal to the outer fence, with a
clear spacings between fence and VSBs of 3.0m.
o
All measures to be either certified to IWA-14 or a recognized national standard referenced in
IWA-14.
o
Spacings are to form a continuous line of protection with maximum spacings of 1,200mm
applied.
o
At entry points single line active measures are to be used unless the STRA indicates a risk of
multiple attacks or forced tailgating.
Enhanced Sites:
o
Designer to consider whether perimeter deployment or more localized critical asset deployment
is beneficial.
o
Where a full perimeter is selected, VSBs must be installed internal to the outer fence, with a
clear spacings between fence and VSBs of 3.0m.
o
All measures to be either certified to IWA-14 or a recognized national standard referenced in
IWA-14.
o
Spacings are to form a continuous line of protection with maximum spacings of 1,200mm
applied.
o
At entry points single line active measures are to be used unless the STRA indicates a risk of
multiple attacks or forced tailgating.
Baseline Sites:
o
Not required unless indicated through the STRA process.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 19 OF 3 11
The following image highlights the design steps and design considerations that should be considered
through the various design stages by the designer for a HVM scheme.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 20 OF 3 11
Threat
There are two vehicular based threat types to be considered. Dependent upon the assessed threat type
and level, the designer should select an applicable mitigation strategy, summarised in the later sections.
•
Vehicle As a Weapon (VAW) – the use of a hostile vehicle to target Crowded Place, as part of a
crude and simplistic attack methodology. Pedestrians are targeted by driving a vehicle at crowds
with the intent of killing and injuring multiple casualties.
•
Vehicle-Borne Improvised Explosive Device (VBIED) – the use of a vehicle to store, carry and
ultimately detonate an explosive load against an identified target.
Further to the potential vehicular terrorist threat types, there are a number of methodologies that should
be considered as defined in the following matrix. All applicable options should be considered as part of
the OR process.
Attack Methodology
Designer Consideration
Parked – a parked VBIED device is left adjacent to a
target and detonated.
•
Enforce stand-off.
•
Detection of suspicious vehicles.
Encroachment – a vehicle encroaches beyond a site
perimeter where protection provides exploitable gap or
a hostile vehicle 'tailgates' behind an authorised
vehicle.
•
VSB protection to disable hostile vehicle
upon impact.
•
HVM scheme designed in line with design
/ installation requirements.
•
Tiger trap system for critical asset.
Penetrative – vehicle speed is built up to allow a
hostile vehicle to breach a site perimeter and target an
asset.
•
VSB protection to disable hostile vehicle
upon impact.
Deception – deception focuses upon gaining
unauthorised access beyond a secure perimeter
through pretence or stolen access credentials.
•
Secure access control system.
•
Authentication and Verification for
access.
Duress – an attack is facilitated by placing somebody
under duress to gain access beyond a secure
perimeter.
•
Duress detection.
•
Multi-layered defence.
•
Tiger trap system.
Insider – a person with legitimate access facilitates an
attack by operating the security protective measures,
providing access for the hostile attacker.
•
Staff vetting.
•
Insider threat mitigation.
•
Multi-layered defence.
Tamper / Sabotage – the attacker disables or
weakens the security protective system prior to an
attack. This may be a physical or cyber-attack on
automatically controlled measures, to undermine their
protective ability.
•
Visual surveillance.
•
Regular maintenance / inspection.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 21 OF 3 11
Vehicle Dynamics Assessment
As part of the OR process, a Vehicle Dynamics Assessment (VDA) should be conducted to understand
the impact classification requirements for any required VSBs.
Firstly, the designer should select the relevant risk-based threat vehicle for assessment, from the IWA14 vehicle classification types. It is recommended that the default is a N2 or N3C vehicle type.
Where a very clear threat is present, then larger vehicle types may need to be considered.
It should be noted that the threat vehicles do not cover construction equipment. If this is considered a
threat then a pure VSB solution is unlikely to be successful without operational measures also.
The VDA should account for the total approach speed along an assessed attack path. This should be
calculated based upon the threat vehicles acceleration and cornering speeds along the vehicle swept
path.
The designer should remember that standard ‘rules of the road’ do not apply so any possible means of
approach is credible. The attacker will likely mount footpaths, enter pedestrianized zones and ignore
road signs, with the potential to traverse over large open spaces such as parks.
An example VDA is provided below.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 22 OF 3 11
The VDA impact speed provides an impact classification. An example impact classification is as follows.
It should be noted that some classification schemes will not provide a Dispersion of Major Debris
distance.
Applicable VSB measures should be selected based upon the calculated impact classification and their
intended placement and any throughput requirements for vehicles or pedestrians.
Design Approach
The design approach must be based upon the threat being mitigated.
Vehicle as a weapon attacks
The protection scheme should look to achieve the following aims in descending order:
•
Prevent vehicles entering the area to be protected through a denial scheme.
•
Provide a scheme that restricts easy or fast movement of vehicles into the protected space.
•
Provides a visual deterrence to vehicle attacks.
•
Provides early warning of an attack through noise or disturbance to allow people sufficient time to
move away from potential danger.
Vehicle Borne IED
Creation of Stand-off
All occupied buildings shall maintain the minimum clearance distance defined below.
Enforcement of stand-off is the key mitigation approach that should be adopted.
Protection Group
Stand-Off Required
Restricted – Critical Assets
45.0m
Restricted – Other Assets
25.0m
Enhanced – Critical Assets
25.0m
Additional blast mitigation measures (i.e. façade / glazing / structural design enhancement) may be
needed where stand-off is limited.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 23 OF 3 11
Stand-off must be enforced with impact tested and certified VSBs, with their impact rating at least
equivalent to the highest speed attainable in that location based on the VDA.
Attack Speed
When designing the object or surrounding approaches, there may be opportunity to limit potential attack
speeds. This reduces target attractiveness with a reduced potential impact from a VAW perspective and
reduced vehicular penetration if considering a VBIED attack.
As illustrated by a VDA, potential vehicle attack speed can be limited where there are a number of tight
radius turns. Therefore, the following principles can reduce the potential attack speed:
•
The approach roads to an object requiring HVM protection should be designed as to not allow for
direct straight approaches.
•
Direct approaches should not lead directly into an object opening, i.e. lobby area.
•
Chicanes can be inbuilt where it is desirable to further reduce attack speeds. This may be
augmented by additional speed retardation devices and designs if so required by the proponent. A
90-degree turn leading to the gatehouse shall be an acceptable alternative to a chicane.
Vehicle Denial
Vehicle denial is the primary aim for industrial facilities against a VAW attack, or for enforcing stand-off
against a VBIED threat. The design approach taken should successfully disable a hostile vehicle in the
event of impact.
Denial can be achieved through a number of approaches including:
•
Using standard VSB products certified to IWA-14.
•
Constructed defences.
•
Landscaped solutions.
Standard VSBs
A large range of VSB products are available, which are certified to IWA-14: 2013 – Vehicle Security
Barriers to disable a hostile vehicle, as specified by their impact rating.
It is vital that all HVM elements conform to the following principles:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 24 OF 3 11
•
The maximum air gap between the hardened core of adjacent VSBs is 1,200mm.
•
The 1,200mm air gap is measured between structural elements at a height of 600mm above ground.
•
It should be noted that bollards must be to the tested height specific to each manufacturer; this is
generally in the region of 900 – 1,000mm from finished ground level.
VSB Type
Example Measure
Bollards
Static, retractable,
sliding, folding,
removable.
Blockers
Rising.
Gates
Swing, sliding, rising
arm barrier.
Perimeter Barriers
Rope system,
planters, fences /
barriers.
Typical Image
The exact type of required measure should be specified by the OR process. For instance, if authorised
access for vehicles is required then some form of active measure is needed.
When selecting products, the designer should consider as a minimum:
•
Available foundation depths.
•
Static or active requirement.
•
Operational overlay i.e. automated, manual.
•
Expected throughput usage.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 25 OF 3 11
•
Aesthetics.
•
Suitability of the measure type to meet the VDA impact speeds.
•
Allowable penetration past the VSB.
•
Environmental conditions where the measures will be installed.
Constructed Defence
Where VSBs may not be suitable, constructed obstacles such as walls should be used to disable a
hostile vehicle in the event of impact. However, the constructed defence must be able to mitigate the
impact forces of a hostile vehicle. In most cases they will be best achieved through using a rated VSB
base measure and constructing a structure around it. The structure should not be overly rigid as to
prevent engagement with the VSB, or potentially form ‘a ramp’ to by-pass the location.
Where a VSB is not incorporated, the measures will not be impact rated as a tested measure but may
still be proportional to the threat if only deterrent measures are warranted.
A key example of this would be a wall system for e.g. a protected residence. This would be constructed
from substantial materials with a depth that would prevent hostile vehicle incursion. The defence of such
wall system could also be designed as to provide resistance against the effects of blast, or with added
structural resistance, e.g. using a Bi-Steel section to form the base section of the wall.
The principles to be followed are:
•
Be a minimum of 650mm height.
•
Be a minimum of 500mm in depth.
•
Be constructed of sufficiently robust and dense material e.g. reinforced concrete with extensive face
to face reinforcement.
•
Have a continuous foundation that allows the wall to act as one element and thus dissipate forces
better.
•
Be suitable for the ground conditions, such that there is no degradation of the foundation or wall
alignment over time.
Landscaped Features
Landscaped features will be important in the case of NEOM in separating areas of autonomous vehicles,
from people and where non-autonomous vehicles are in operation.
However, landscaped measures do require maintenance to remain effective and this should be taken
into account by the designer when selecting their approach.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 26 OF 3 11
Bunds / Berm
Naturally formed barriers can provide vehicle denial as part of a secure perimeter, when meeting certain
requirements for installation. Bunds provide a sufficient obstacle when a tall enough obstacle, with a
sufficient angle on the attack face is installed.
Bunds can be enhanced when constructed using geo-textile VSB measures, which will also maintain the
shape of the measure over a period of time.
The designer should ensure that the bund:
•
Has an approach angle >50°.
•
A vertical height of at least 1,250mm.
•
A break-over angle of <130°.
Ditches
Ditches deny vehicle movement when a sufficiently wide and deep enough ditch is introduced. Ditches
must be maintained to be effective and therefore may not suitable for all locations or threat vehicles. The
designer should not rely on information of dimensions and attacks speeds in this document and must
complete their own calculations and design.
The designer should consider a 4x4 vehicle’s capabilities in the design of an HVM ditch, as this vehicle
is most equipped to overcome it.
The typical ditch dimensions, based upon the assessed impact speed are as outlined below.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 27 OF 3 11
Approach Speed
(Kph)
W = Minimum Ditch
Width
32
3.0
48
4.0
64
5.0
B = Back Face (˚)
D = Depth (M)
>50˚
>1.25
It is incumbent upon the designer to verify the dimensions for their specific use case.
Vehicle Access Control Points
At any location where an authorised vehicle requires access beyond a secure perimeter line, a Vehicle
Access Control Point will be required. This is typically needed at site perimeter entrances such the
airport airside perimeter, or at the Hydrogen Plant site boundary.
The designer must carefully consider the necessary access requirements, with consideration for:
•
How will active measures be operated?
•
What authentication is required to ensure only authorised vehicles and occupants have access?
•
How frequently will vehicle access be required?
•
Are there are any conditions of entry, i.e. vehicle search?
As part of the Concept of Operations, a detailed operational strategy should be provided for VACP
operations. An example of the outline operation is provided below.
The designer should be aware of the supporting infrastructure required at VACPs including:
•
Vehicle rejection capability.
•
Operational staff and welfare facilities.
•
Active barrier safety requirements e.g. safety sensors.
•
Video Surveillance coverage.
•
Other security systems.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 28 OF 3 11
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 29 OF 3 11
Reference Standards
The following standard should be used when developing the Vehicle Security Barrier design:
Standard
Description
ISO IWA 14
Vehicle Security Barriers.
BSI PAS 170-1
Vehicle Impact – Low Speed Impact Testing.
CWA 16221
Vehicle security barriers. Performance requirements, test methods
and guidance on application.
ASTM F2656 / F2656M - 18
Test method that provides a structured procedure to establish a
penetration rating for vehicle perimeter barriers subjected to a
vehicle impact.
KSA Ministry of Interior HCIS Security
Directives Sec 06 4.3.3 for crash barriers
Defines level of protection required for facilities across Saudi
Arabia- specifically the standard required for crash barriers.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 30 OF 3 11
B10: Counter-Unmanned Aerial Systems
Overview
This section defines the requirements for Counter- Unmanned Aerial Systems (C-UAS), sometimes
referred to as Counter-Drone Systems. Whilst there have been incidents of hostile UAS in KSA, these
are currently infrequent and have been targeted against Royal, Government or Iconic locations, and
therefore it is prudent to plan a level of detection and protection.
However, due to the extensive range of UAS there will be a Regional level approach as well as any
localised requirements. The designer must consider the following threat options for UAS, and whether
they will apply to the facility, site or building they are designing.
•
A weaponised UAS attack – Key industrial facilities where large scale damage or targeting of critical
equipment is possible.
•
Disruption of normal activity – Where the presence of a drone or an attack would disrupt service
provision to the NEOM population.
•
UAS information collection – Likely for research facilities and flagship technology buildings.
The text, in terms of security effect, refers to a DTIE approach:
•
D – Detection.
•
T – Tracking.
•
I – Identification.
•
E – Effect.
Application
Built Object
Recommended Treatment
Industrial Restricted Protection Group
•
Inclusion of a DTI based system as standard.
•
E based systems only to be included where UAS/Drone
activity cannot be tolerated.
•
E based systems only to be included where UAS/Drone
effects would not cause further damage or injury.
•
Inclusion of a DTI based system if threat indicated by
STRA.
Industrial Enhanced Protection Group
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 31 OF 3 11
Where the vulnerability cannot be designed out, then a DTIE system should be designed.
Threat
The C-UAS function will provide mitigation against threats identified within the Design Basis Threat, and
specifically will reduce the impact against those threats highlighted in Overview Section. As UAS threats,
in general, are a potentially growing concern, further detail has been included below in the Threat
Overview.
Threat Overview
UAS present a number of key threats to the safety and security of NEOM. This is an emerging threat
with an increased use of UAS for criminal and extremist purposes seen globally. This has been
enhanced particularly with the growing capabilities of UAS such as increased flight times, payload
capacity and autonomous flight modes. UAS can support both criminal and extremist motivations or be
linked to intended nuisance attacks.
UAS have a variety of different forms from quad-copters to fixed-wing systems, however they can be
categorised into two primary categories:
•
Hobbyist: Readily available UAS with a low cost, typically with a payload capacity up to 20kg and
flight time up to 40 minutes.
•
Commercial: Bespoke and high cost UAS with upgraded capability including payload capacity, flight
time and technological components.
The varying capabilities of UAS determine the potential impact of a propagated UAS threat.
These can be broken down into kinetic and non-kinetic threats.
Kinetic threat types include:
•
Delivery of explosive payload i.e. mortar, IED, grenade.
•
Direct impact of UAS into person, object or network function in order to cause damage or disruption.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 32 OF 3 11
Non-kinetic threat types include:
•
Dispersal of CBRN agents.
•
First-person view surveillance.
•
Espionage and hostile reconnaissance.
•
Protest; carrying or dispersal of protest materials.
•
Protest; interruption of network capabilities.
•
Information theft i.e. WIFI capture, electronic jamming, signals collection.
The threats posed by UAS are set to increase as the capability of the available systems are developed.
If your design is required to take account of UAS threats, the above threat types must be graded in your
specific Threat and Risk Assessment.
Performance Requirements / Design Requirements
The C-UAS response will mitigate the effect of UAS through an approach of Detection, Tracking and
Identification of a hostile UAS, and application of the relevant security Effect to disable or disrupt the
UAS. This is known as a DTIE system.
Where the designer includes a C-UAS, then a concept of operations, including the response/effect
element of the DTIE system needs to be described. In certain cases, the E function will not be within the
designer’s remit, and in this scenario, the use of the DTI system needs to be clearly articulated.
Design Considerations:
The following design considerations must be taken into account:
•
Always first, is a C-UAS necessary or warranted based on the threat and risk assessment
completed by the designer.
•
Such systems, where warranted, should be discussed with NEOM Public Safety Department prior to
any design work being undertaken.
•
Could the vulnerability to the protected assets be designed out, negating the need for a C-UAS
system?
•
Can cover from view be part of the design approach?
•
Can assets be concealed or disguised to prevent their easy recognition?
•
Will the system negatively affect neighbouring sites or operations?
•
Can a local physical barrier be put in place to protect the asset?
•
If protecting sensitive information, can obscuration films, placement away from window areas etc be
used to deny access to it?
•
Will the use of an Effect system represent an increased risk to life safety or other assets if enacted?
•
Where located in an urban environment, would a C-UAS system offer any benefit due to the short
detection ranges and response times available?
•
Any system should not have a detrimental effect on other communications and signals.
Detection
The C-UAS should have a capability to sense the presence of unexpected objects within the specified
area of interest. Design consideration should be given to what is being protected and how time critical
the protected asset is, and thus define early warning requirements for detection of a UAS.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 33 OF 3 11
The detection capability of the UAS should:
•
Have a high detection rate for both hobbyist and commercial drones across a range of altitudes.
•
Ability to detect and track multiple targets.
•
Have a maximum detection time of 30 seconds after UAS launch within the system detection zone.
•
Provide for a low false alarm rate, reducing interference from clutter or slow-moving objects such as
birds.
•
Provide a minimum detection arc of 200m within internal urban environments from the sensor and
provide a wide sensory range beyond the external perimeter, where appropriate. The arc should be
configurable so that the deployment location can be ‘filtered’ for known infrastructure, obstructions
and UAS flight paths.
•
Provide early detection to allow tracking and identification, as well as escalation of a security
response.
•
Where an extended perimeter is permissible, e.g. airport, hydrogen plant, the detection range should
be a minimum of 2km. The minimum detection range must be confirmed by the designer based
upon flight times to protected assets.
•
Must be capable of distinguishing between other airborne objects in that location.
The detection capability of the C-UAS must be linked to either a facility, site or building dedicated
Security Control Room or NEOM community central monitoring centre. Alerts will highlight to the security
operator a presence of a detected UAS. If the facility, site or building does not have a dedicated Security
Control Room, then the requirement for a C-UAS should be the first consideration.
The detection process also extends beyond detecting UAS presence in the air. The C-UAS should be
integrated with security measures such as perimeter intruder detection and visual surveillance to support
the early detection of a drone operator. The system should also incorporate other electronic detection
methods that will identify an operator’s location as this provides another potential Effect response which
is easier to enact.
Ground detection of unauthorised persons or vehicles could be a precursor to a hostile UAS being
launched. Early detection for critical infrastructure facilities should consider detection technologies that
operate beyond their physical perimeter.
Tracking
Early detection of a UAS will be supported by the C-UAS tracking capability, which will determine the
location of the object and track the UAS flight path, altitude and potential pilot location.
The tracking capability of the UAS will:
•
Track the UAS flight path, also indicating the movement trail from detection.
•
Determine flight altitude.
•
Indicate the UAS speed and therefore be able to integrate with other systems to show a threat
overlay with potential arrival times to different assets.
•
Track data signals to pinpoint location of operating pilot.
•
Provide GPS or other data to other security sensors, such as video, to allow multi-mode verification
and surveillance of the UAS.
UAS are based upon internet-based communications, which provide for an exploitable vulnerability to
track the user of the UAS. Data transmissions between the UAS, external servers and controlling smart
device will be detected and tracked to determine the pilot location. This information could include GPS
location, name information, IP addresses or product serial numbers.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 34 OF 3 11
Where the DTI or DTIE system is a commercial system, it will be the responsibility of the commercial
organisation for monitoring DTI functions, and only where appropriate and approved by NEOM
Authorities will an E function be allowable.
Identification
The C-UAS will then have the capability to identify the UAS; this will classify an unidentifiable object as a
hostile UAS.
The identification capability of the UAS will:
•
Distinguish between authorised UAS and unauthorised UAS, this will also link to a geo-fencing
system, flight exclusion zones, time authorisations as a minimum. The wider control of airspace
should be discussed with NEOM if your risk assessment determined that a C-UAS is warranted.
•
Provide a confirmation of the tracked UAS to a monitoring station as a hostile UAS intrusion.
•
Decide on an appropriate response.
•
An Automatic Identification System (AIS) will support the identification of UAS. All authorised UAS
used for a variety of supporting services i.e. security, service inspection, transport of goods within
NEOM will have an AIS transponder fitted and be registered with the NEOM authorities.
•
The AIS will link to a registered user database that will give the detecting C-UAS system standard
non-personal data. If the UAS poses a threat, then either the C-UAS will be able to take direct action
or reporting of the incident to NEOM if not an authorised Effect system.
•
Identify potential targets of the UAS.
Therefore, any object within the airspace that is not fitted with an AIS transponder and is registered will
be immediately identified allowing for the relevant security effect or response to be prioritised.
Effect
The combination of Detection, Tracking and Identification will allow for the supply of timely information
which allows for a relevant security Effect if authorised.
Any Effect must be safe and not increase the risk of injury to people or property.
This will manifest in the following C-UAS capabilities:
•
Disrupt: intercept and jam UAS signals to prevent incursion and return to the pilot location.
•
Disable: intercept data signals and commandeer UAS to force to land safely.
•
Defeat: use kinetic measures to physically destroy or capture the hostile UAS.
It should be accepted that it is unlikely to be safe and practical to use jamming or kinetic methods in
urban areas. A detailed Security Operational Requirement (SOR) is required to determine the necessary
security response to unauthorised UAS incursions. This will be determined by:
•
The criticality of the targeted object and required immediacy of response.
•
Surrounding assets and people, considering injury or damage if the UAS is brought down.
•
Type and size of the hostile UAS.
It is stressed, that in all cases, consideration of a UAS threat early in design is most appropriate
and where possible using design features and layout to prevent the threat will be more effective
and enduring than fitting a C-UAS.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 35 OF 3 11
Equipment
The designer needs to consider the range of detection measures that are suitable for their facility, site or
building as this will differ:
•
Radar: transmittal of radio waves to detect objects through reflection. Particularly useful for
scanning large area ranges.
•
Electro-Optical: camera that senses objects on the electro-magnetic spectrum in daylight, or
through the use of Infra-Red during night-time.
•
Electronic Surveillance: detecting electromagnetic emissions.
•
Acoustic Sensors: detection of objects through sound waves emitted by object.
The type of detection technology, and combination of sensors will need to be determined based on
layout and identification of assets for protection. The technology decision and supporting vulnerability
assessment should form part of the early design stages, preferably in the Concept Phase.
Supporting Mitigations
The designer should consider supporting the C-UAS with the following additional mitigations:
Exclusion Zones and Geo-Fencing
Discrete facilities, sites and buildings with a defined physical security perimeter, such as a fence (e.g.
Airport, Desalination Plant) may benefit from geo-fencing to act as an exclusion zone. This will detect
the incursion of unauthorised UAS into the airspace of areas which will be attractive targets to both
criminal and extremist exploitation via UAS.
Internal Information Protection
Information Technology resilience will be designed into systems to limit the opportunity for a UAS to
extract sensitive information. Cyber resilience mitigations will successfully reduce the impact that a
cyber-attack via UAS could have.
Left Package / CBRN Detection
Left package detection and CBRN will support the detection of packages such as IEDs delivered via
UAS or dispersal of CBRN agents by UAS. This capability if required, should come from other
surveillance assets and be clearly defined in the Security Concept of Operations.
Blast Resilience
A very limited number of facilities, sites or buildings should have a degree of blast resilience, with
particular consideration for object structure and rooftop strength. Any blast measures should be
designed into the building, only after vulnerability has been removed remembering that the majority of
UAS can only deliver small payloads.
Reference Standards
Currently very few specific standards exist to define C-UAS systems. The designer should follow the
guidance of the constituent elements of the system to provide a safe and effective system. i.e. radar
linked to video as a detection and tracking combination.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 36 OF 3 11
B11: Blast Protection
Introduction
The requirements for blast protection within NEOM will be based upon the specific threat and risk
assessment that is completed for the facility, site or building. There are a number of baseline design
considerations that will provide an overall reduction in the effects of any blast or extreme loading
scenarios.
Before blast protection measures are designed, the following considerations should be made.
•
Is the overall risk severity of a blast related event beyond a tolerable level? i.e. is blast protection
needed?
•
Is it possible to design out the vulnerability for what is being protected?
•
Can the stand-off distance between the protected area and the location of an explosion be
increased to reduce the likely loading on the structure/asset?
•
Is the orientation and location of the protected asset such that it minimises any blast effects?
•
Can the blast wave be disrupted before it reaches the asset?
•
Can building/structural hardening be undertaken?
If there is a requirement for blast protection/mitigation then the following should be considered the
minimum design criteria, but must be informed by the specific threat and risk assessment:
•
Any structure must be designed to not disproportionately or progressively collapse when subjected
to the threat loading criteria.
•
Any elements that will form secondary fragmentation, especially glazing, must be designed that the
failure mode is a Low hazard. (See the Glazing Section).
•
Any blast effects experienced by people must not be made worse through the design.
Assessment of blast loading and its effects must be completed by a suitably qualified and experienced
person in the effects of blast loading.
Certain built objects within NEOM will require defined levels of protection from blast loading and these
are outlined in the following matrix. Further protection, if required, should be evidenced in the specific
threat and risk outcomes.
Built Object
Factor
Recommended Treatment
Industrial Restricted Protection
Group
Effects of blast loading.
•
Specific consideration of critical
assets and key areas for
protection. (All factors)
•
Control Rooms. (All factors)
•
Gate/Entry Posts. (PBIED)
•
Specific consideration of critical
assets and key areas for
protection. (All factors)
•
Control Rooms. (All factors)
•
Gate/Entry Posts. (PBIED)
•
LVBIED.
•
PBIED.
•
Mail IED.
Industrial Enhanced Protection
Group
Effects of blast loading.
•
VBIED.
(unless downgraded through
STRA)
•
PBIED.
•
Mail IED.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 37 OF 3 11
Design Basis Threat
The following table provides the standard DBTs for explosives base threats. Applicability of each DBT
should be taken from the Minimum Security Requirements Section.
Threat
Design Basis Threat
VBIED
•
100kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 20.0m.
•
Stand-off to structure to be informed by enforceable distance for
preventing a vehicle, i.e. HVM measures.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 20.0m
is taken where the stand-off is below 20.0m, and actual stand-off utilised
where the distance is above 20.0m.
•
500kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 20.0m.
•
Stand-off to structure to be informed by enforceable distance for
preventing a vehicle, i.e. HVM measures.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 20.0m
is taken where the stand-off is below 20.0m, and actual stand-off utilised
where the distance is above 20.0m.
•
15kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 6.0m.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 6.0m is
taken.
•
15kg TNT equivalent bare charge detonated at 0.25m above the ground
applied at a satnd-off distance of 6.0m.
•
For attacks against a structure it should be assumed that the charge has a
minimal to zero stand-off distance if no obstruction to placing the IED
exists.
•
For attacks to determine if infrastructure will form secondary hazards, it is
suggested the equivalent loading criteria for a stand-off distance of 6.0m is
taken.
•
1kg TNT equivalent bare charge detonated at 1.0m above the ground
applied at a stand-off distance of 1.0m.
Large VBIED
PBIED
Placed IED
Mail IED
Note: Unless specifically indicated by NEOM Public Safety Department, buildings and structures are not
designed to withstand military explosive based threats.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 38 OF 3 11
Reference Standards
The following standard should be used when developing the blast protection design:
Standard
Description
ISO16933
Glass in building - Explosion resistant security glazing Test and classification
for arena air blast loading.
ASTM F1642 / F1642M-17
Standard Test Method for Glazing and Glazing Systems Subject to Air blast
Loadings, ASTM International, West Conshohocken, PA, 2017.
EN 13123-1
Windows, Doors and Shutters Explosion resistance; Requirements and
Classification Part 1: Shock Tube. CEN European Committee for
Standardization, 2001.
EN 13123‐2
Windows, Doors and Shutters-Explosion Resistance; Requirements and
classification - Part 2: Range Test. CEN European Committee for
Standardization, 2004.
EN 13124-1
Windows, Doors and Shutters – Explosion Resistance; Test Method Part 1:
Shock Tube. CEN European Committee for Standardization, 2001.
EN 13541
Glass in building - Security Glazing -Testing and classification of resistance
against explosion pressure. CEN European Committee for Standardization
2012.
GSA-TS01
Standard test method for glazing and window systems subject to dynamic
overpressure loadings. US General Services Administration, 2003.
References
Blast Effects on Buildings. Cornie, Mays & Smith. 3rd Edition. 2019.
Handbook for Blast-Resistant Design of Buildings. John Wiley & Sons, Inc. 2010.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 39 OF 3 11
B12: Ballistic Protection
Overview
NEOM is being developed to provide multi-layered security from its borders, through the buffer zones
that surround the City and outlying sites, and into the buildings and structures that will form the
communities. It is anticipated that very few sites will require a level of ballistic protection, and by
exception these need to be identified during the facility, site or building specific threat and risk
assessment.
The topic of ballistic protection is closely aligned with the Glazing Section, and this should also be
referred to by the designer to understand the overall enhanced security requirements that may be
required.
Certain built objects within NEOM will require defined levels of protection for ballistic protection and
these are outlined in the following matrix. Further protection, if required, should be evidenced in the
specific threat and risk outcomes.
Built Object
Factor
Recommended Treatment
Industrial Restricted Protection Group
Effects of Ballistic Damage.
•
Industrial Enhanced Protection Group
(unless downgraded through STRA)
•
Walls – (Floors, Ceilings if
applicable.)
Specific consideration of critical
assets and key area protection.
•
Control Rooms.
•
Doors.
•
Gate/Entry Posts.
•
Glazing.
Threat
NEOM requires to future-proof specific locations against the threat of a ballistic attack. Whilst these
attacks could be unlikely, the likelihood may change in the future and such measures are costly and
difficult to retrofit effectively.
Therefore, an identified need for ballistic protection will use the following design base threat for all
locations unless an enhancement is required based on the people or asset being protected.
The security factor and its associated design base threats:
Security Factor
Intent
Design Base Threat (DBT)
Effects of Ballistic
Damage
•
•
Protection Measures
BR/FB6 + SG2.
Performance Requirements
Effects of Ballistic Damage
The first consideration is for the vulnerability wherever possible to be designed out, consider:
•
Orientation and/or placement to avoid the vulnerability.
•
Denying direct line of sight. Most threats will require line of sight to be successful.
•
Where the situation cannot be avoided, designing a number of layers to provide the protection.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 40 OF 3 11
•
Glazing is degraded by ballistic attack and therefore as tested will only provide certainty of
protection for a maximum of three rounds of the specified ammunition. Therefore, no protective
ballistic system in isolation represents the whole security solution.
•
If polycarbonate is used in the glazing build-up, it should not be placed where the environmental
conditions will degrade it, or in areas where abrasion is likely.
•
A glazing specialist should be consulted where the glass tint is important, as thicker ballistic
protective glass will cause a green tint unless specified with the correct chemical content.
•
Protection can be developed through the use of multiple denial and protection layers as shown in
the following schematic.
The DBT is based against the system defined in BS EN1063 and BS EN1522 that defines the threat on
a scale prefixed by BR or FB. The threat is the same for each level.
Therefore, wherever ballistic protection is required, the baseline level of protection is BR/FB6 and SG2.
Certain facilities where ballistic glazing is required, such as the Royal Residences, may require an
enhancement above the DBT. This should be discussed with the relevant security stakeholders.
Safe rooms designed against ballistic attack will require careful consideration to ensure that no weak
areas exist in the protective shell of the room. This is 3 dimensional and should include floors and ceiling
areas, as well as wall panels.
Reference Standards
The following standard should be used when developing the ballistic protection design:
Standard
Description
BS EN 1063
Glass in building. Security glazing. Testing and
classification of resistance against bullet attack.
BS EN 1522
Windows, doors, shutters and blinds. Bullet resistance.
Requirements and classification.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 41 OF 3 11
B13: Security Doorsets
Overview
Security door sets will form a key element of the physical security overlay and must be considered as
part of the overall security effect.
It is important to determine the security requirements for the door specifically and the following
considerations should be taken account of:
•
What function does the doorset need to perform? This should consider normal operations alongside
the type of threats it should mitigate.
•
Following the STRA, what types of threat / attack does the door need to work against (i.e. Manual
attack, blast, ballistic etc.)?
The security function for doorsets is as follows:
•
To prevent or delay unauthorised access into a protected space by providing a physical barrier that
provides proportionate mitigation to an assessed threat of unauthorised entry.
•
In some cases, such as police stations, prisons and secure mental health medical facilities it will be
necessary to provide doors and doorsets that prevent unauthorised exit from a facility.
•
To provide a demarcation between public and private space.
•
To prevent undetected entry into a protected area through resistance to surreptitious attacks.
•
To allow safe egress from the protected building or area in an emergency while preventing
unauthorised entry.
•
To provide enough time for those inside a protected building or space, if under attack, to act before
criminal entry is gained.
•
To provide the appropriate level of security against unauthorised entry to restricted areas within
buildings. For example, entrances to cash handling areas in banks or high value goods facilities in
logistics warehouses.
There are many different types of doorsets on the market and it is important that designers choose the
correct door for the location where it is to be installed and for its purpose. Some examples of security
rated doors are shown below:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 42 OF 3 11
Attacker Capability
The following table sets out a classification guide for potential manual attackers, based upon the level of
criminal intent, preparedness, skillset, knowledge and available equipment.
The attacker types are taken from BRE LPS 1175: Issue 8 categorisation of criminal threat levels. This
considers an assessment of an attacker’s intent and capability, to provide a security rating based upon a
capability threat rated from A to H (low to high).
The overall delay time to be achieved can be achieved either through a single or multiple layers of
protection.
The following matrix provides guidance on the minimum standard that should be applied based upon the
Protection Group and criticality. However, these are minimum standards and if an STRA shows
increased threat greater protection levels may be required.
If a designer specifies doors that are certified under a different standard, proof of delay compliance will
need to be provided at the relevant design stage.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 43 OF 3 11
Protection
Group
Attacker
Type
Baseline
A
An opportunistic
criminal exploiting
a security
vulnerability using
low tech, handheld
tools.
SR 1
(A1 = toolset
A, 1-minute
delay).
Baseline –
Critical Areas
Enhanced –
Specified
Supporting
Areas
B
An opportunistic
criminal targeting
specific locations.
SR 1+
(A3 = toolset
A, 3-minute
delay).
Enhanced –
Critical Areas
C
Planned targeting
of more sensitive
sites.
SR 3
C5 = toolset
C, 5-minute
delay).
Restricted –
Specified
Supporting
Areas
E
Determined
criminal targeting
important sites.
SR 5
E10 = toolset
E, 10-minute
delay).
Restricted –
Critical Areas
H
Sophisticated and
determined
attacker, targeting
a mission critical
facility.
SR 7+
H10 = toolset
H, 10-minute
delay).
Description
DOCUMENT CODE: NEOM-NSE-PRC-001
Tool set
SR Rating
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 44 OF 3 11
Examples of how delay can be layered over different elements of the built form to achieve and overall
delay time are provided below.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 45 OF 3 11
The selected doorsets would be expected to meet the following performance requirements:
•
Delay an attacker’s attempts to penetrate the doorset in order to enter the protected building or
space within a building.
•
Provide the appropriate level of resistance according to the Protection group of the building or space
to be protected.
•
Resist the creation of a full-body access aperture through the fabric of the leaf. This aperture is
defined within the Centre for Protection of National Infrastructure’s Manual Forced Entry Standard
as being one through which an elliptical test block measuring 400mm by 225mm may be passed.
•
Prevent undetected entry into a protected area by providing resistance to surreptitious attack.
•
Be fitted with door locking hardware and hinges, dog bolts etc. that are commensurate with the
assessed resistance class of the doorset.
•
Be suitably durable and maintainable relative to the doorsets location.
•
Be securely installed within compatible structures. If this is not the case and a security door is
installed into a weaker structure it may:
o
Fail to prevent unauthorised entry. For example, it may be possible for an attacker to remove the
doorset from the surrounding structure or penetrate the surrounding structure in order to operate
door release mechanisms located on the protected side of the doorset.
o
Lead to structural damage. For example, if a doorset incorporating a heavy door leaf is fitted
within a lightweight partition, the surrounding partition may crack due to the door leaf opening
and closing repeatedly causing fatigue fractures in the walling material. Fixings holding the
doorset may also work loose.
Reference Standards
The following standards should be referred to when developing the security doorset design:
Standard
Description
LPS 1175 – Issue 8
LPS1175 focusses on the physical security of ‘intruder resistant building
components’, which includes strong-points, security enclosures, free-standing
barriers, and any products that fall within those categories, such as doors, shutters
or fencing.
PAS 24
Enhanced security performance requirements for doorsets and windows in the UK.
Doorsets and windows intended to offer a level of security suitable for dwellings and
other buildings exposed to comparable risk.
BS EN 1627
Pedestrian doorsets, windows, curtain walling, grilles and shutters. Burglar
resistance. Requirements and classification
BS 3621
Locking system standard for doorsets - Locked by key from both sides.
BS 8621
Locking system standard for doorsets - Locked by key from outside only, can always
be opened from the inside without a key.
BS 10621
Lock assemblies in which the operating mode can be switched between the normal
BS 8621 operating mode and a secure mode in which no egress is possible.
Saudi Building Code 2018
General requirements.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 46 OF 3 11
B14: Security Glazing
Overview
Given the design vision and liveability aspects of NEOM, natural light will form a key part of any scheme,
balanced against passive heat control and the maintenance of privacy for residents, businesses and
visitors. There are a number of concerns related to glazing and security that need to be taken into
account for any facility, site or building. These have been arranged into four Security Factors to aid the
designer in identifying clearly those which apply to their development.
•
Effects of Blast Loading.
•
Effects of Ballistic Damage.
•
Resisting Manual Attack.
•
Privacy.
Certain built objects within NEOM will require defined levels of protection for some or all of the above
factors. This will also account for non-intentional blast and ballistic damage are specified facilities. The
following matrix provides a baseline of minimum requirements. However, it should be noted that the
need and inclusion of mitigations and protection against attack on glazed systems will also be informed
by the specific Security Threat and Risk Assessment and how the site, facility or building will be used,
especially in relation to massing of people.
Protection Group
Factor
Recommended Treatment
All Groups
•
•
Graded to the criticality of the
site.
•
Graded to the local criticality for
where the glazing is placed.
•
Specific consideration of critical
and key areas for protection.
Restricted
Restricted
Resisting Manual Attack.
•
Effects of Blast Loading.
•
Resisting Manual Attack.
•
Privacy.
•
Privacy for key areas/points.
•
Effects of Ballistic Damage.
•
Control Rooms.
•
Gate/Entry Posts.
•
Critical Points.
Enhanced (STRA indicated)
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 47 OF 3 11
Security Factors
The four security factors and associated design base threats: 2
Security Factor
Intent
Design Base Threat (DBT)
Effects of Blast Loading
•
Mitigation Measures
•
•
Protection Measures
Person Borne IED – 15kg (Normal) applied at a
6.0m stand-off range.
•
Vehicle Borne IED – 100kg (Normal) at a 20.0m
stand-off range.
•
Large VBIED – 500kg (Increased) at a 20.0m
stand-off range.
Effects of Ballistic Damage
•
Protection Measures
•
BR/FB6 + SG2
Resisting Manual Attack
•
Protection Measures
•
EN1630 RC based attacker types and equipment.
(See Performance Requirements)
•
Loss Prevention Standard – specified sites.
•
(See Performance Requirements)
Privacy
•
Mitigation Measures
•
Mitigation: Orientation, obscuration etc.
•
Protection Measures
•
Protection: Counter Surveillance Technical
methods to be defined by designer if required.
Success Criteria
The success criteria for glazed systems are as follows:
•
Glazing subjected to blast loading should provide a Low Hazard failure. This is defined as the level
of hazard where glass debris would be projected into a room for a distance of not more than 3.0m
and not exceeding 0.5m above the floor at this distance. Injuries would be limited to low body cuts,
and fatalities would not be expected, although persons close to the window could be seriously
injured.
If the glazing is of a laminated nature to will significantly reduce the fragmentation produced upon
failure, with generally a higher level of energy absorption in the failing system, thus providing less
damaging energy.
2
It should be noted that the protection against military grade munitions is considered a specialist scenario, and if required this will
be informed by NEOM Public Safety Department.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 48 OF 3 11
•
Designers have considered the need for the glazing if security-based enhancements or hardening
are required.
•
Designers have considered whether a more enduring solution can be sought, such as re-orientation
or placement of what is trying to be protected.
•
Glazing is designed to take account of the four security factors as informed by the development
specific threat and risk assessment.
•
The inclusion of glazing does not increase the risk associated with an event. This is both likelihood
and impact based.
•
Any security enhancements or design features associated with glazed systems does not prevent the
glazed system performing its normal required function.
Performance Requirements
Effects of Blast Loading
Whilst not specific to glazing, design against adverse loading, such as blast, should result in a
design that resists disproportionate collapse of a structure.
External or Perimeter Glazing
Where a requirement to consider blast loading on glazing is identified, the designer should design to
achieve a Low Hazard failure against the selected DBTs at the enforceable stand-off that can be
achieved. Wherever possible, an increase in stand-off should be considered prior to any building
hardening. It is stressed that the designer must design for the conditions of their development, whilst not
dropping below the following minimum standards:
•
All glazed panes on the protected side of the glazed area should be laminated.
•
Lamination must be done with a 1.52mm PvB interlayer.
•
Single glazed units should be of a minimum 7.5mm laminated glazing.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 49 OF 3 11
•
Double glazed units should be of a minimum 7.5mm laminated inner pane with either an outer pane
of 7.5mm laminated glazing or a 6mm toughened pane.
The designer shall consider their specific threat and risk assessment to determine if the risk determines
whether a development is designed for mitigation or protection. It should also be remembered that
different solutions may be applied to different areas of a facility, site or building dependent upon that
area’s criticality and the impact of a successful threat attack occurring.
Mitigation is defined as the use of laminated glazing that is installed in normal frames or fixings.
Protection is defined as the use of laminated glazing that is installed in blast resistant frames
incorporating enhanced fixings and rebates of 35mm on all sides of the glazed panel. For protective
purposes the minimum thickness of glazing may well be increased.
Blast analysis should be undertaken where warranted to determine the exact glazing required for the
glazing system type.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 50 OF 3 11
Internal Glazing
Internal glazing presents a hazard where it can still be loaded by a blast wave, be this the failure of an
external element or where the potential for an internal explosion is possible. It is therefore recommended
that internal glazing where there are high population areas conform with the following criteria:
•
All glazing should be securely held in place by the framing or support system.
•
Glazing should be laminated using a minimum 1.52mm PvB interlayer to reduce the potential for
fragmentation on failure.
•
Where glass is supported as a cantilever, the support channel should be securely fixed to the floor,
glass should be epoxy-resin, silicone bonded and/or in deep clamped channels wherever possible.
Dry glazed clamping should provide similar retention capability as bonded units. Bonding should be
a minimum of 25mm deep onto the glazed panel.
•
As above, glazed wall lining systems.
Effects of Ballistic Damage
The first consideration is for vulnerability wherever possible to be designed out, consider:
•
Orientation and/or placement to avoid the vulnerability.
•
Denying direct line of sight. Most threats will require line of sight to be successful.
•
Where the situation cannot be avoided, designing a number of layers to provide the protection.
•
Glazing is degraded by ballistic attack and therefore as tested will only provide certainty of
protection for a maximum of three rounds of the specified ammunition. Therefore, no protective
ballistic system in isolation represents the whole security solution.
•
If polycarbonate is used in the glazing build-up, it should not be placed where the environmental
conditions will degrade it, or in areas where abrasion is likely.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 51 OF 3 11
•
A glazing specialist should be consulted where the glass tint is important, as thicker ballistic
protective glass will cause a green tint unless specified with the correct chemical content.
The DBT is based against the system defined in BS EN1063 and BS EN1522 which defines the threat
on a scale prefixed by BR or FB. The threat is the same for each level. Shotguns are pre-fixed SG.
Therefore, wherever ballistic protection is required, the baseline level of protection is BR/FB6 and SG2.
Certain facilities where ballistic glazing is required, such as the Royal Residences, may require an
enhancement above the DBT. This should be discussed with the relevant security stakeholders.
Resisting Manual Attack
Glazing that is identified as needing to resist manual attack should conform to the following criteria.
Low Risk Facilities, Sites or Buildings
This will encompass general residential property, most hotels, offices etc.
The glazing will conform to the Manual Attack Resistance specification of EN1627 and 1630. Individual
glass should be specified and tested in accordance with EN356.
The following table provides the relevant RC gradings under EN 1627, and where they are normally
applied.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 52 OF 3 11
It should be noted that the delay timings associated with EN1627 are not comparable to those of the
BRE grading system as the BRE system use a wider range of tools. Therefore, RC6 does not give more
protection than a H10 system. Once the level of delay is determined, liaison with specialist suppliers will
need to be undertaken.
The selection of a RC rated system should be informed by the specific threat and risk assessment, but
the following minimum standards should be applied where the glazing would provide access into critical
and important areas.
Minimum for all low threat locations (Baseline):
RC2
Minimum for all moderate threat locations (Enhanced):
RC3
Minimum for higher threat locations (Restricted):
RC4+
High Risk Facilities, Sites or Buildings
High risk facilities should be considered to be the target of a determined and well resourced attacker.
Therefore, they will have access to specialist equipment.
The attacker types are built upon the BRE LPS 1175: Issue 8 categorisation of criminal threat levels
(BRE Global Ltd). This considers an assessment of an attacker’s intent and capability, to provide a
security rating based upon a threat rated from A to H (low to high).
An overview of the BRE LPS 1175 attacker types A to H are provided below:
•
A – Low technology level of attack using small, very easily concealed tools.
•
B – More determined attack using easily concealed tools of a greater mechanical advantage.
•
C – Deliberate forced entry using a wide selection of commonly available, relatively easily concealed
tools.
•
D – Experienced attempts at forced entry.
•
E – Experienced attempts at forced entry using tools of a greater battery power.
•
F – Professional attempts at forced entry into a higher value area.
•
G – Enhanced professional attempts of access to high value assets.
•
H – Extreme methods of access to very high value assets using portable tools.
Consideration of the potential attacker types allows the proportionate and effective selection of physical
security measures that have a Security Rating (SR) level providing a tested level of delay, against the
tool types available to the designated attacker types.
It is anticipated that SRs applied to glazing in isolation will be limited due to the attacker resources
available. Therefore, for Restricted sites, the following attacker types should be considered, but
wherever possible glazing should be designed out in favour of more robust construction materials.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 53 OF 3 11
Attacker
Type
E
H
Description
Tool set
Determined criminal targeting
restricted sites such as the
transport hub, using heavy
high-powered tools.
LPS Rating
SR 5
E10 = toolset E
10-minute delay
Sophisticated and determined
attacker, targeting a mission
critical facility using industrial
powered machinery.
SR 7+
H10 = toolset H
10-minute delay
Where a high security location requires glazing, a primary consideration should be whether physical
protection can also be utilised, such as protective bars, shutters or covers. It should be noted that
achieving a specific protection level can be achieved by layering glazing and other protection, each
contributing to the overall delay timing.
All windows should be lockable to prevent opening from the unprotected side.
Privacy
The designer’s first consideration must be to assess whether the vulnerability can be designed out
through orientation, placement or through the built form. This should also consider exactly what is being
protected, whether it is information, activity or just privacy of individuals.
For areas where it is not possible to design out a vulnerability, the following should be considered:
•
Etching – Obscuration by etched glass use. Directional etching may be used to allow light passage
but block certain views.
•
Filming – Use of reflective or screen printed film applied to internal face of the glazed pane.
Preferred to only be used for retrofit scenarios. Directional printing may be used to allow light
passage but block certain views.
•
Tinted Glass – Use of a tinted glass that reduces visibility to an acceptable level. Care should be
taken that both daylight, night time and internal lighting levels are taken into account.
•
Electronically Controlled Glass – Obscuration through the use of electrical current effected cells.
•
Use of contrasting light levels – The lux ratio to be effective must (External) 7:1 (Internal). This may
well be impractical for areas where external lighting is not appropriate or well lit interior spaces make
achieving a 7:1 impractical.
In general, the stand-off distance for a viewer into a space should be greater than 10m, if possible, to aid
obscuration.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 54 OF 3 11
Reference Standards
The following standards should be referred to when developing the security glazing design:
Standard
Description
BS EN 356
Glass in building. Security glazing. Testing and classification of resistance
against manual attack.
BS 5357
Code of practice for installation and application of security glazing.
BS 5516-1
Patent glazing and sloping glazing for buildings. Code of practice for design and
installation of sloping and vertical patent glazing.
BS 5516-2
Patent glazing and sloping glazing for buildings. Code of practice for sloping
glazing.
BS EN 1522
Windows, doors, shutters and blinds. Bullet resistance. Requirements and
classification.
BS EN 1523
Windows, doors, shutters and blinds. Bullet resistance. Test method.
BS 5051-1
Bullet resistant glazing Specification for glazing for interior use.
BS EN 1063
Glass in building Security glazing. Testing of resistance against bullet attack.
BS EN 13541
Glass in building. Security glazing. Testing and classification of resistance
against explosion pressure.
ISO 16933
Glass in building, Explosion-resistant security glazing, Test and classification for
arena air-blast loading.
EN 1627-1630
European standard for performance determinations in connection with burglary
attempts via windows and doors.
EN 1630
Manual test (burglary attempt) with standard tool kit.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 55 OF 3 11
B15: Manual Lock Security
This section sets out the functional requirements for manual locking systems including key operated
padlocks and biometrically operated padlocks.
Notwithstanding the aspiration for NEOM to have keyless entry systems it is likely that manual door
locking systems and padlocks may be required in some locations. However, these should be minimised
through design.
It is expected that manual locks will be of low frequency throughout NEOM and should only be used by
exception on Enhanced and Restricted Protection Group facilities and buildings.
A statement of overall lock security should be formulated by considering the following questions:
•
What are the perceived criminal and terrorist threats that the asset may be subjected to and the lock
must endure?
•
Does the lock location require immediate notification of an unauthorised attempt to enter?
•
Is an audit trail of users and access attempts required?
Performance Requirements
General Functional Requirements – Manually Operated Door Locks
•
The selection of manually operated door locks should be guided by reference to a security needs
evaluation an OR that determines the level of security performance required for the protection group
and doorset requirements.
•
Manually operated door locks such as mechanical lock, thumb turn and latched bolts should be a
deadlock action type of lock.
•
The deadbolt shall be not less than 25mm throw with a saw-resistant hardened steel insert.
•
Lock cylinders should comply with Grade 4 (Key related security), or higher, of BS EN 1303:2005.
•
Lock cylinders should have up to 30,000 possible different key combinations, a minimum of five
movable levers, pins or discs and resist at least 15Nm of ‘plug’ torque.
•
Lock fixing screws should be hidden when the door is closed.
•
The lock bolt should be made of Type 304 stainless steel (or equivalent) material that is corrosion
resistant and has a hardness of at least Rockwell B85, Rockwell hardness is to be specified by the
methods specified in ASTM E18.
•
The lock should be morticed into the fabric of the door.
•
Protection for extending locking bolts should be built into the door frame.
•
All external manually operated locks should be designed to operate in the following environmental
conditions:
o
-10⁰C to +65⁰C in direct sunlight.
o
Ambient relativity humidity range: 5% to 95% non-condensing.
o
Airborne dust concentration: Annual average 0.3mg/m – Sandstorm 3mg/m.
o
Wind speed: 112km/hour.
o
Other pollutants: CO – 50ppm; H2S – 10ppm; Hydrocarbons – 150ppm; NOx – 5ppm; O3 –
1ppm and SO2 – 10ppm.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 56 OF 3 11
•
Outdoor security locks should be capable of continuous operation under the environmental
conditions listed above and shall meet the listed performance when subjected to the full range of the
described conditions.
General Functional Requirements – Padlocks and Biometric Padlocks
•
The selection of padlocks, whether manually operated or biometric, should be guided by reference
to the identified security and operational requirements that determines the level of security
performance required.
•
Where used, hasps should be securely fastened to the anchoring structure and have the same
resistance to attack as the padlock to be used.
•
Where keys are used to operate the padlocks strict key control should be maintained.
Advisory requirements
Designers are advised that at present there are no specific standards for the certification of biometric
padlocks.
When designers are considering the use of padlocks within NEOM it is suggested that following security
rating matrix is considered to guide the choice of padlock:
Protection Group
Recommended Standard
Baseline – Non-Critical
CEN 1 & 2
LPS 1654 Level 1 or 2.
Baseline – Critical
BS EN 12320 Grade 3
Enhanced – Other
CEN Grade 3, Sold Secure – Bronze or Silver
Enhanced – Critical
BS EN 12320 Grade 5 or 6
Restricted – Other
CEN Grade 5 or 6
Sold Secure – Gold
LPS 1654 Level 7 or 8
Restricted – Critical
DOCUMENT CODE: NEOM-NSE-PRC-001
Fully auditable access control expected.
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 57 OF 3 11
Reference Standards
The following standards should be used when developing the manual locking systems design:
Standard
Description
BS EN 12209
Building hardware – mechanically operated locks and locking
plates. Requirements and test methods.
BS EN 1303
Building hardware – cylinders for locks. Requirements and
testing methods.
BS EN 12051
Building hardware – door and window bolts. Requirements and
test methods.
BS EN 179
Building hardware – emergency exit devices operated by a lever
handle or push pad, for use on escape routes. Requirements
and testing methods.
BS EN 1125
Building hardware – panic exit devices operated by a horizontal
bar, for use on escape routes. Requirements and test methods.
BS EN 12320
Building hardware – padlocks and padlock fittings. Requirements
and test methods. Sets a 6-number classification. The higher the
number the greater the resistance to attack. The grading level
should be referred to by designers when specifying padlock
choice.
Central European Norm (CEN) Ratings
A European standard that sets 6 levels of security from 1 to 6.
The higher the number the more robust and hence more secure
the padlock. Security testing is based on the resistance of the
lock and its shackle to twisting, drilling, pulling and cutting.
BS EN 16864
Building hardware – mechatronic padlocks. Requirements and
test methods
LPS 1654
Requirements and testing standards for approval and listing of
mechanical padlocks. Sets 8 levels of resistance based on the
amount of time it takes to remove a padlock based on the use of
different types of tools used by criminals.
Sold Secure
Tested and rated padlocks that have been awarded bronze,
silver or gold status. Gold representing the most secure.
ASTM E18-19
Standard test methods for Rockwell hardness of metallic
materials.
Saudi Building Code 2018
General Requirements.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 58 OF 3 11
B16: Searching, Screening and Detection
Overview
Where the control and detection of prohibited items is required, this will be primarily be met through the
use of searching, screening or detection technology strategies. This should:
•
Provide strong visual deterrence;
•
Where practicable hands free for the user experience; and
•
Cause the minimum dwell time possible.
Minimum dwell time should not be just considered as a throughput measurement. Integration and
convergence of searching, screening and detection should drive a minimum level of disruption or
deviation from daily tasks wherever possible.
However, certain critical locations will still require a process driven approach to search, screening and
detection. In these cases the security requirement takes precedence and therefore assurance of
detection of unauthorised articles is the primary aim.
The following facilities, sites and buildings will require a form of search, screening or detection for
prohibited items. Specific requirements are to be developed through the site specific threat and risk
assessment. Commercially operated sites should apply processes to protect their businesses
adequately.
Location
Search, Screening or Detection Purpose
Safety Critical Environments.
•
Checks on unauthorised and prohibited items being
brought into a safety critical environment.
Potable Water Storage.
•
Prohibited items that could affect potable water supply.
Industrial City Port.
•
In-line with National and International Regulations and
ISPS Code.
Data Centres, R&D, Sensitive Commercial.
•
Data protection.
Hydrogen Plant, Explosive or Flammable
Chemical production or storage.
•
Asset protection.
Major Government Complexes & Regional
Government Offices.
•
Mass casualty threat screening.
•
Data protection.
•
Asset protection.
Energy Production.
•
Asset protection.
Border Security Points
•
Mass casualty threat screening.
•
Prohibited items.
•
Asset protection.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 59 OF 3 11
Threat
Search, Screening and Detection is applicable to a range of threats identified in the Design Basis
Threat, for criminality, terrorism and extremism.
During the threat and risk consideration, the designer should determine first whether there are prohibited
items or not. This will then drive whether there is a need for search, screening or detection to be
undertaken.
Secondly, if there is an identified requirement, the designer needs to determine where the threat is likely
to occur at the facility, site or building to ensure timely intervention that will minimise the likelihood and
impact of the risk being realised.
For example, the prevention of threats focused upon violence or terrorism may require early detection of
crossing the site boundary. This may then focus on detecting:
•
Mass Casualty Items – IED, large firearm.
•
Smaller firearms.
•
Knives, and other weapons.
However, where detection of more specific items is required, which would most likely be at Restricted
Protection Group locations. These items may include:
•
Mobile phones and cameras.
•
Data removal devices.
•
Trace detection – e.g. narcotics, explosive, firearms residue.
The detection of these elements may be applied site-wide or just to specific areas.
Search, screening or selection should only be required where there is an identified threat or asset
requiring protection that would be an intolerable risk without the screening mitigation.
Success criteria
The success criteria for searching, screening and detection is as follows:
•
The detection of relevant prohibited items, at the desired point of detection.
•
Provision of required assurance level for detection, i.e. is it 100% or a lower percentage to act as a
deterrent effect.
•
Provision for sufficient screening capacity, to allow for the required throughput rates, minimise dwell
and disruption. In some cases, this will need to be balanced against spatial requirements and likely
capital and operational costs.
•
On a positive detection, can the prohibited item be effectively prevented from passing the search or
screening area.
•
Blended design, enhancing the user journey through any security process, or if practicable, making
the process seamless.
Search, Screening and Detection Process
If the risk assessment identifies a need for search, screening or detection, then the design process
should be developed across three distinct process zones with key design considerations being satisfied
in each zone. The three zones are outlined in the following graphic:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 60 OF 3 11
1. Risk Identification
Prior to commencing design, the designer must assess whether a search, screening or detection
security effect is required based upon the threat and risk assessment for the specific site.
Threat changes and scalability should be planned for. This may be in the form of power, data and
spatial allocations in the correct locations.
The risk identification stage will be based upon a number of considerations including:
•
Crowded Place – a crowded location provides an inherently attractive location for a terrorist attack
and could use mass casualty threat methodologies such as firearm, blade or IED attacks. Providing
high-level screening for crowded places where there is an identified and assessed inherent target
attractiveness, can help in detecting mass casualty threat methodologies.
•
Criticality – a site, facility or building with a higher level of criticality, including function or
association with the government, will have a number of assets which could be targetable by both
criminal and terrorist / extremist methodologies.
•
Detection Requirement – certain sites or facilities will require enhanced detection, such as
explosives trace detection or drug substance detection, e.g. Airport, where there are clear
requirements under the aviation security requirements.
The site-specific risk zoning exercise is particularly important in defining the requirements for search,
screening and detection. The risk context may not apply to the whole site, and only certain areas of the
site may require Search, Screening or Detection.
A site risk zoning exercise therefore identifies the areas where different levels of prohibited item
detection are needed. A simplified example for a hospital site is shown below.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 61 OF 3 11
The process provides a logical method for ensuring that searching, screening and detection is only
applied where needed at the site, rather than providing complete site coverage.
2. Detection Matrix
Once a risk-based need for search, screening or detection is identified, the designer must identify what
constitutes the prohibited items. A detection matrix should then be produced that indicates what will and
what will not be detected by the screening process.
The detection matrix is based upon:
•
What prohibited items the screening process should detect?
•
What level of assurance should be provided that the threat will be detected by the search and
screening process? (assurance % of detecting the threat). The designer should consider scalability
of the process to meet higher threat levels and whether an allowance for this is included.
•
What percentage of attendees should be processed through the search and screening process for
detecting the relevant threat? (% of people processed).
A prohibited items list can be drawn from the identified threat types of the location specific Threat and
Risk Assessment, and should relate to the risk zoning exercise undertaken in step one.
The prohibited items list can then be applied against the levels of assurance for detection required,
categorising threat items as either:
1. Essential to detect (100%)
There should be a 100% assurance that the prohibited item is successfully detected during the
screening process. To achieve 100%, it is imperative that all personal/goods are subject to the search,
screening or detection process. This approach can be scaled back if the threat level is lower than
anticipated or altered by an event at a facility.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 62 OF 3 11
2. Desirable to detect (10-90%)
The level of assurance required is variable, and scalable in response to the designer’s risk assessment.
The process is scalable in the level of assurance provided by the screening process, and the percentage
of people/goods subjected to such screening.
3. Not required to detect (0%)
These items are not considered as threat items by the designer’s risk assessment, and therefore do not
require detection.
If the facility, site or building will operate in a number of operational modes that change the threat level,
then different detection matrices may be required for each mode. Otherwise, the process must be shown
as scalable and flexible to be suitable for all modes of operation.
An example detection matrix is as follows:
Essential to Detect (100%)
Desirable to Detect (10-90%)
Not Required to Detect (0%)
Explosives
Other items on the prohibited item
list including alcohol etc
Mobile phones
Firearms and ammunition
Other liquids
Recording devices
Large weapons – machete,
baseball bats, hammer etc
Computing devices
Protest materials – chain, flags etc
Cameras
Damage materials – Animal blood,
paint, flour etc
Smaller weapons – knives under 6
inches, sharp weapons, including
scissors
Arson equipment – matches,
lighters etc
CS or pepper sprays
The example below shows varying detection matrix requirements across the different locality risk zones
of the identified hospital example.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 63 OF 3 11
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 64 OF 3 11
4. Methods of Search, Screening or Detection Achievement
From the development of the detection matrices, suitable search, screening and detection options
should be selected.
In general, there are likely to be five broad levels of search, screening or detection, with varying levels of
user disruption. Each example level of screening could use different equipment / processes, or
combinations, to provide a varying level of detection assurance and scalability.
It is expected that the majority of industrial applications will required Level 3 & 4 capabilities.
Level 0: Do nothing – no screening required.
Level 1: Automatic high-level screening for mass casualty threats.
This is to be non-intrusive, as to not diminish from the visitor journey / experience. However, there must
be a method for investigating detections. The over-arching approach may limit bag size that can be
brought to the venue, could employ staff to visually assess for larger threats such as a rucksack IED or
long barrelled weapon. Or a high flow rate mass screening system may be employed using Terrahertz
scanning or other technology.
The designer should detail a clear interdiction process for the high-level mass casualty screening
process. The designer should also consider how assurance can be provided, reducing opportunity for
the mass casualty threat scanning to be bypassed – this may need to be operationally managed.
Level 2: Automatic high-level screening for mass casualty threats, plus video analytics.
This may be non-intrusive as given above. The use of video analytics, such as left package / loitering
alerts, can provide enhanced assurance for detection of certain threats.
This represents a combination of methods, which may also include trained staff, and the designer needs
to define the overall detection strategy and its concept of operations.
Level 3: Low level screening for some level of assurance of prohibited item detection.
Level 4: Comprehensive screening for high assurance of prohibited item detection.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 65 OF 3 11
A comprehensive screening process is required for detection of a wide and complex range of items.
Therefore, the detection approach will need to rely on a range of searching and screening methods,
more likely in a layered system to be able to provide various assurance levels.
5. Throughput Analysis
Dependent upon the search and screening method / equipment / process used, there will be a variable
throughput rate. This should be considered in relation to:
•
Capacity – the number of persons to pass through the process.
•
Flow rate – the rate of which a person is screened, dependent upon the chosen screening method /
equipment.
•
User arrival process – the variable rates in which users will arrive.
•
Customer journey – the level of interaction that is acceptable.
An example throughput matrix is as follows:
Location
Main Entrance
Expected
Arrival
Capacity
(15 mins)
Flow rate
(each lane per
minute)
(per 15 mins)
Lanes
Required
235
6
90
(2.6) 3
Single Lane
Capacity
Space
Required
(per lane)
Min 10.0m x
12.0m
The throughput flow rate is likely to be variable, with delays caused by user non-compliance likely at
either the Preparation Process Zone or Response Process Zone, complexity of what is being screened
or detections. As part of the screening process, the potential for reductions in throughput can be
addressed, by:
•
Communicating the expected arrival process to the users.
•
Clear policies on prohibited items, communicated to user pre-arrival.
•
Allowable bag sizes communicated to user pre-arrival.
•
Allowing sufficient spatial allocation for the process to take place.
•
Having a quick and defined interdiction policy within the response process zone.
6. Example Screening Measures
The table below provides examples of varying types of screening technology. The designer should
select the relevant screening process / measures, based upon their specific use case performance
requirements. Throughputs should be clarified with manufacturers with evidence of the achievable
throughput given.
Example Measure
Usage Characteristics
CT Scanner
•
Baggage scanning.
•
Detects prohibited items with 3-D model of
contents.
•
High level of assurance for detection.
•
Throughput (200 – 300 people per hour).
•
Analytics to aid detection of prohibited items.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 66 OF 3 11
Example Measure
Usage Characteristics
Millimetric Wave Scanner
•
MMW scanner for persons.
•
Profile images of person, showing concealed
items.
•
Analytics to aid detection of prohibited items.
•
Throughput (150 – 300 people per hour).
•
WTMD portal for persons.
•
Alert when metal object passes through.
•
Varying levels of sensitivity to provide for
required threat type detection, and level of
assurance.
•
Throughput (350 – 400 people per hour).
•
Passive scanning system for persons, with
person screened whilst in transit.
•
Detection of mass casualty threat items.
•
Throughput system (Optimised 3,500 people per
hour).
•
Limited level of assurance for detection.
Walk Through Metal Detector
Mass Casualty Threat
It is important that the designer is aware of, and respondent to, the limitations of any screening process
employed.
For example, mass casualty passive scanning could be unreliable if multiple persons pass through
simultaneously and if complicated bags are carried – this would require a supporting technology,
management process or design to ensure that the potential for residual risk is limited.
7. Intervention Plan
As identified in the throughput analysis, clear policies in the Response Process Zone are required to
support both the throughput and also the integrity of the process. The process becomes redundant
without a clear intervention plan to prevent the detected item from being carried beyond the control line.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 67 OF 3 11
A defined intervention plan must be developed by the designer in order to support the screening
process. This should take account of:
•
How will alerts be generated when a prohibited item is detected?
•
How will such alerts be dealt with? Will this be an automated or human response?
•
What enhanced screening will a person be required to undertake to resolve a first alarm?
•
Is there sufficient area for a person to be dealt with, in a rejection zone?
8. Design Considerations
The following further design considerations will need to be taken into account:
•
Architecturally lead – there is opportunity for the design to be incorporated within the architectural
design principles of the project. The design and process should aim to improve the visitor / user
journey and look to use innovative design features to make the screening process as seamless as
possible.
•
MEP – screening equipment requires power and data, which should be coordinated with design
teams. This will be required for both permanent screening locations, and any temporary ‘pop-up’ or
scalable screening locations.
•
Spatial allocation – adequate spacing for the screening equipment, and to allow for the throughput of
screened persons is required. This also needs to provide sufficient space for security operators. The
spatial allocation can be large, especially with a high volume of people, bags or goods.
•
Lane design – coordinated design to provide for maximum efficiency and user experience, ensuring
lane design is easily accessible and supportive of required throughput, e.g. appropriate length of
tray roller beds for luggage screening.
•
Ground loading – screening equipment such as CT scanners are heavy pieces of equipment. The
ground loading should account for the equipment.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 68 OF 3 11
Reference Standards
The following reference standards are the minimum standards for searching, screening and detection
technology.
Standard
Description
EN 62368-1 + A11
Audio/video, information and communication technology equipment.
Safety requirements.
BS EN IEC 61000-6-1
Electromagnetic compatibility (EMC). Generic standards. Immunity
standard for residential, commercial and light-industrial environments.
ASTM F3356
Standard Specification for Conformity Assessment of Metal Detectors
Used in Safety and Security.
ASTM F2401
Standard Practice for Security Checkpoint Metal Detector Screening of
Persons with Medical Devices.
STM C1270 - 97
Standard Practice for Detection Sensitivity Mapping of In-Plant WalkThrough Metal Detectors.
ASTM C1269 - 97
Standard Practice for Adjusting the Operational Sensitivity Setting of InPlant Walk-Through Metal Detectors.
ASTM C1238 - 97
Standard Guide for Installation of Walk-Through Metal Detectors.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 69 OF 3 11
B17: Security Control Rooms and Monitoring Points
This section covers the fundamentals of Security Control Rooms (SCR) design throughout the NEOM
region. These facilities provide a point of consolidation for operators to obtain information on the status
of related security systems and operations. Control rooms where practicable should be within walking
distance of other static security locations, such as gatehouses, monitoring points etc.
A structured design process should be followed in the development of all control rooms environments
with a human centred approach to meet with the demand for the number of systems, sensors and
services which are controlled or monitored by the operators.
Spatial requirements should be identified early, including UPS locations, welfare and operator space.
Defining the operational requirements for the SCR is therefore a key initial step that the designer must
undertake at the start of the design process.
Systems
The operation and control of each system needs to be determined prior to the development of a SCR
design. Security systems will vary dependant on the site application with some large sites or integrated
regional systems being responsible for all aspects of control and operation.
Typical security applications featured within an SCR include but are not limited to some of the following
applications:
•
Intruder Alarm Systems.
•
Access Control.
•
Video Surveillance.
•
Perimeter Intruder Detection Systems.
•
Security Lighting.
•
Alarm Signalling.
•
Intercom Systems.
•
Radio Communications
•
Vehicle Barrier Controls.
•
User Interface.
•
Other non-security systems that are critical to the site, e.g. development/industrial freezer alarms.
A Physical Security Information Management (PSIM) system should be used to harmonise the various
systems and consolidate the interface to a single user interface.
The need to integrate systems should be carefully considered to ensure integration is the appropriate
option.
Redundancy and System Resilience
The security systems with the exception of field devices (intrusion detection sensors, cameras, card
readers, radars) shall exclude single point of failures, such that a single component failure cannot
disable the system function.
All security systems core computing and network components shall be in a high-availability configuration
to ensure availability of not less than 99.95% per component. These components specifically include:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 70 OF 3 11
•
Servers.
•
Network Video Recorders (NVR).
•
Operator workstations.
•
Administration workstations.
•
Archive and back-up systems.
•
Network switches, routers and firewalls.
Exception: industrial ethernet switches supporting single field devices are excluded from the above
requirement.
The high-availability requirements detailed above can be achieved by a combination of:
•
Separate redundant units, such as primary and back-up units.
•
Single units with fully redundant hot-swappable components of CPU, memory, power supply,
network cards, hard-disk storage, etc.
•
Virtual computing architecture.
The critical computing and network equipment shall also have a spare capacity as follows:
•
20% spare capacity of all computing power (RAM & CPU).
•
20% spare capacity for all network physical ports.
•
20% spare capacity for all network bandwidth (within the site security network).
•
50 % spare capacity for all hard disks.
Field devices (intrusion detection sensors, cameras, card readers, radars) shall be in a redundant
configuration only if a single device failure will significantly disable the system function.
Automatic switch-over function shall be enabled between all redundant components without loss of
operational function or data.
Computer Hardware
Computer hardware applied as a component of security systems shall be of the latest generation
available at the time of project proposal design completion. The hardware shall have adequate memory
and processing capacity to ensure no latency to allow real-time operation in all operational conditions.
Operating system and applications shall be installed on a Hard-Disk Drive (HDD) or Solid-State Drive
(SDD) while data shall be stored on a separate discrete physical HDD or SSD.
Operating Systems
Operating systems used for the security system shall be latest version and have full mainstream support
from the manufacturer.
All service packs, and other Operating System updates, shall be installed prior to system
commissioning.
Data and System Backup
The systems shall be equipped with mechanism to provide full back-up every 30 days and daily
incremental back-ups. Back-up operations shall not interrupt the system operation.
Back-up records shall be stored off-site and accessed only by authorized personnel.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 71 OF 3 11
Date/Time Synchronization
All devices connected to the security systems shall have their date and time synchronized via a
centralized or distributed time servers.
Tamper Protection
All security system field components shall be equipped with tamper protection that will annunciate an
alarm if any attempt is made to tamper with system elements.
All junction and pull boxes, mounted externally, shall use tamper-proof screws for all fasteners. All
outdoor cables shall be protected in steel conduits.
Openings in the system housing shall be sealed.
Component Failure Alarms
The system shall annunciate an alarm when the function of an operational component is lost (e.g. field
devices, UPSs, generators, etc.).
False Alarm Reduction
The system control panels shall observe guidelines in ANSI/SIA CP-01-2014, False Alarm Reduction
Standard, into the system design and material selection to reduce the incidence of false alarms.
Integration
The SCR shall be integrated into central Security Control Center (Emergency Center / 911 Building).
UPS and Emergency Generators
For Sites with a Restricted Protection Group, on-site dedicated UPS and emergency generators shall be
provided for Security systems.
The UPS shall have battery capacity to power its maximum rating for 2 hours minimum and it shall be
sized with 30% spare capacity over and above the actual calculated load.
The emergency generator shall be sized to power all security systems & devices, air conditioning,
lighting, fence lighting and communication equipment installed at the security facility while maintain 20%
spare capacity.
The generator shall be able to sense power failure at the incoming local utility power feed to the security
system and initiate start-up. The fuel tank for the generator shall have a low-fuel level alarm connected
to the gatehouse and Central Security Control Center that triggers when the fuel level drops to 10% of
full capacity.
Policies
Clear policies should be developed in terms of the day to day operation and responsibilities within the
SCR environment to ensure activities are adhered to and the integrity of the SCR is maintained.
Policies should include training and communications, division of work and tasks, competencies and
management, code of conduct and auditing. The designer will need to provide a concept of operations
for the SCR that demonstrates how it functions day to day, and also during an incident.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 72 OF 3 11
People
The SCR will comprise a number of system interfaces both “hard” (panels, controls devices) and “soft”
(computer and digital interfaces) to accommodate the daily operations, such as:
•
Control Panels.
•
Operator Consoles.
•
Safety Systems.
•
Displays Screens and Walls.
•
Furniture.
•
Welfare Facilities.
Once a study has been undertaken to determine the operational requirements of the SCR a User
Centred Design (UCD) should be undertaken as the amount and type of information that an operator
can monitor is limited and errors can occur if over-burdened with duties.
Resilience
The systems being managed by the SCR should be resilient against both attack and failure.
Consideration should be given to redundancy of systems and back-up and/or failover of critical power
and communications connections in the event of an outage or incident response.
As the SCR is a critical room, the routing of other building services through the room should be avoided,
where these services could cause damage. e.g. water pipes.
Physical SCR Design
Spacing should be assessed for the mounting of display and control equipment throughout the SCR and
how operators will interact with the systems.
The layout of furniture, lighting and temperature all have to be considered to achieve a suitable working
environment for operators allowing them to conduct tasks unhindered.
Working spaces should be considered for operators, managers, incident rooms, collaboration spaces,
welfare facilities.
Operator consoles should be suited to meet the necessary equipment required:
•
Display screens:
o
The system shall have 4 levels of integrated display for security operators. All displays shall be
1080p or higher definition. Displays shall be adequately sized for the application and shall have
capability for 24/7 operation.
▪
Display 1: Overview Map.
▪
Display 2: Video Split-Screen Display, dedicated to viewing camera feeds, user selectable
or sequenced, and shall automatically switch to alarm zones display during an alarm.
▪
Display 3: Index display, listing all cameras or alarm zones.
▪
Display 4: PTZ Camera Display.
•
Keyboards.
•
Camera control equipment.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 73 OF 3 11
•
Telephones.
•
Hard wired panels and controls.
•
Space to undertake paperwork.
Enough displays should be provided to carry out duties and sized accordingly, including visual access to
a display wall if required.
The console design should be ergonomically correct to meet with the demands of the operator and
provide a comfortable working position including:
•
Vertical, horizontal and lateral clearance for the legs, knees and feet under the work surface.
•
Work surfaces at or slightly below elbow height.
•
Instruments and displays located in appropriate visual zone.
Further Considerations
For larger SCRs there are other areas of consideration which supplement the SCR. These areas are
detailed below with insight as to scaling and location in relation to the SCR.
Room
Sizing
Location
Equipment room
Number of cabinets, including potential
future additions.
Direct access from Control Room?
Engineering Support
Room
Number of people, furniture and
equipment. Consider ʻnormalʼ support and
demanding situations e.g. commissioning.
Engineering support desks may be
located in the Control Room or
Equipment Room in addition or as an
alternative. Location should be
determined by the required interaction
between Engineers and operators.
Electrical power
room
May need to be partitioned (e.g. between
transformers, switchgear and UPS and
between redundant feeds).
Access restricted to authorised persons.
Environmental
services/HVAC
Number of Air Handling Units (AHU),
heating and cooling plant.
Noise and maintenance access.
Meeting rooms
Number of people, furniture and
equipment.
Will operators need to attend meetings
whilst on duty?
Offices
Number of people, furniture and
equipment. Particular consideration for
Supervisors and Plant/Field Operators.
Direct access from Control Room?
Able to see into or monitor activity in
Control Room?
Training facility
Furniture and equipment.
Will operators need to attend meetings
whilst on duty?
Kitchen/dining
Food storage for each team/shift
(lockable), preparation and cooking
facilities. Dining furniture
Access for duty CRO.
Room
Considerations regarding size.
Considerations regarding location.
Drinks lounge
Access to drinking water. Tea/coffee
making facility
Access for duty operators.
Toilets
Male, female and disabled.
Access for duty operators.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 74 OF 3 11
Room
Sizing
Location
Showers
Male, female and disabled.
Clean and dirty areas.
Personal storage
Storage for clothing and personal items.
Provision for secure storage (lockers).
Work item storage
PPE, cleaners’ equipment and materials,
office supplies, plant spares, portable
communications. Adequate to contain any
special maintenance or cleaning
equipment to be used in the Control
Building (e.g. cleaning or maintenance of
a room with a high ceiling).
Document Library
Books, manuals, drawings. Access to
electronic copies, local backups.
Access for duty operators.
Visitor facility
Reception area. Viewing gallery.
Controlled access.
Prayer room
Cultural requirements.
Access for duty operators.
Muster area
Maximum number of people to be
accommodated. Emergency equipment to
be stored.
May be combined with another use or
located in another room. Mustering in
the Control Room should be avoided
because it can cause distraction.
Incident command
centre
Maximum number of people making up
the command team.
Access for duty operators and
communication links with Control Room
during an incident. Control Room may
be used for this.
Collaboration or
Video Conference
Room
Number of people, equipment to be used.
Typically to facilitate
Direct access from Control Room?
collaboration with remote operations
and technical support teams.
IT Support
Number of people, furniture and
equipment.
May be as part of the control room or as
a separate room.
Humans System Interfaces
A SCR operators’ role involves the monitoring and controlling of security systems and detecting
assessing and responding to events.
A Physical Security Information System PSIM should be utilised to consolidate various events and alerts
from security systems and present them in a Guided User Interface or GUI. For smaller systems, this
may be achieved through either the access control or VSS head end software.
The GUI should collect and present data from all integrated systems and devices enabling the operators
to carry out their tasks efficiently.
The PSIM should assist operators in their roles by automating and prompting certain aspects of
operations through a structured cause and effect matrix by aggregating information from various
systems and automating processes to effectively manage events and initiating the appropriate response.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 75 OF 3 11
Reference Standards
The following standards should be used when developing the SCR design:
Standard
Description
BS EN ISO 11064
Ergonomic design of control centres.
BS 6396
Electrical systems in office furniture and educational
furniture Specification.
BS 7083
The accommodation and operating environment for
Information technology (IT) equipment.
BS EN 50398-1
Alarm systems. Combined and integrated alarm systems.
General requirements.
BS 7958
Closed circuit television (CCTV). Management and
operation. Code of practice.
BS 8418 + A1
Installation and remote monitoring of detector-activated
CCTV systems. Code of practice.
BS EN 62676 Series of Standards
Video surveillance systems for use in security applications.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 76 OF 3 11
B18: HVAC, Intakes and Ducting
This section should be read where the Security Threat and Risk Assessment has identified a need for
a secure and resilient HVAC system. This will be a requirement for critical facilities and also all
facilities where there is a crowded internal space, such as an arena, station or hospital.
Given the climate in NEOM, HVAC systems will be widely used across all indoor spaces, it will
perform a key function in ensuring a comfortable environment for all NEOM Citizens and Visitors. If an
individual HVAC system within a key asset or an industrial control facility was disabled during the
summer months, then this would likely result in a level of discomfort that could lead to disruption.
It is anticipated, however, that consideration of this aspect will be included within the MEP design and
it not an additional concern for security.
This functional requirement is concerned with facilities that may be targeted by and, in an unmitigated
state, be vulnerable to a CBRN attack.
Overview
Mechanically ventilated spaces provide a viable means to disseminate chemical or biological agents
within a building.
The use of contaminants within the built environment, to date, has been rarely seen, however it
should be acknowledged that threats will likely evolve over time, especially where the building creates
a crowded space. Taking the opportunity to embed good security design practice within NEOM will
ensure that the opportunity for threats, such as CBRN, are more difficult to realise.
Therefore, air intake and recirculation vents should be positioned at a suitable height to make a
deliberate act more easily identifiable by VSS or operational staff.
Performance Requirements
Air Intakes and HVAC Ducting
All air intakes should be positioned where possible at a suitable height above grade level to deny
physical access to the air intake, especially to deny the introduction of vapours, gases and liquids.
The minimum height above accessible areas should be 3.0m from the most advantageous attack
point.
If a building or space is classed as a Protection Group Restricted, then the minimum height should be
increased to 4.0m.
If air intakes are placed on roof levels, then access to the roof space should be controlled, with no
public access allowed within the vicinity of the vents.
Where a suitable height above grade cannot be achieved, intakes should be protected with
appropriate architectural covers or grates in keeping with the appearance of the facility.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 77 OF 3 01
Ducting, access hatches and inspection points should all be positioned in back of house areas and
fitted with either locks or anti-tamper fixings as appropriate.
For buildings that are classed as Protection Group Restricted and Enhanced if identified as a
specific vulnerability during the STRA:
•
All HVAC intakes shall be positioned a minimum of 4.0m above FFL and positioned behind a
secure physical barrier.
•
Where a physical barrier is not desirable or practical, the HVAC intakes should be positioned a
minimum of 5.0m above FFL.
•
All HVAC intakes vents should be fitted with louvres and grilles, to mitigate against
unauthorised access by persons and materials.
•
For secure rooms, or sensitive areas (i.e. Control rooms or Protected spaces) these should
have isolated ventilation systems designed in and be separate from the main building
ventilation systems.
•
HVAC systems should be supported by suitable UPS to ensure a minimum level of redundancy
is achieved.
•
VSS and detection capabilities should be designed to provide monitoring and alarm functions at
HVAC intake locations with alarms to the Security Control Room.
•
The ability to stop intakes and reverse air flows via the Building Management System should be
possible.
•
If indicated by the STRA process for blast related threats – Restricted sites, facilities and
buildings shall consider the inclusion of blast protection valves and dampers to reduce the
internal effects of adverse loading.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 78 OF 3 11
Reference Standards
The following standards should be used when developing the HVAC design:
Standard
Description
ASIS 2012
Protection of Assets Manual.
ASHRAE. 2003
Risk Management Guidance for Health, Safety, and
Environmental Security under Extraordinary Incidents.
Presidential Report of the American Society of Heating,
Refrigerating and Air-Conditioning Engineers.
ANSI/ASHRAE 52.1-1992
Gravimetric and Dust Spot Procedures for Testing AirCleaning Devices Used In General Ventilation For
Removing Particulate Matter.
ANSI/ASHRAE Standard 55-2004
Thermal Environmental Conditions for Human
Occupancy.
ASHRAE 62.1 - 2019
Ventilation for Acceptable Indoor Air Quality.
DHHS (NIOSH) Publication No. 2002-139
Guidance for Protecting Building Environments from
Airborne Chemical, Biological, or Radiological Attacks.
Saudi Building Code (SBC) 2018
The Saudi Building Code (SBC) is a set of legal,
administrative and technical regulations and
requirements that specify the minimum standards of
construction for building in order to ensure public safety
and health.
For facility type specific technical codes and standards that may have an impact on the provision of
security and its infrastructure, refer to:
Technical Schedules: List of Technical Codes and Standards, NEOM-NEN-SCH-005 – Latest
revision.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 79 OF 3 11
Annex C- Construction Site (Temporary)
C1: Introduction
This document defines the security infrastructure requirements for construction sites and temporary
camps at NEOM.
Operational requirements should refer to the Schedule S – Operations Security.
Construction requirements should refer to the Schedule S – Construction Security.
This document forms Appendix C to the Security Standard and provides a quick and detailed security
guide for these sites at NEOM.
The content of this document consists of the following three sections:
1.
C2 – Construction Site Security Requirements and temporary Camp Requirements.
2.
C3 – Site Security Audit Checklist.
3.
C4 – Perimeter Fence Specification.
Security Controls
For NEOM to maintain an effective security regime during construction, each facility shall have
security controls that are physical and procedural. The physical and procedural elements shall both
be designed to enhance the security of the site by using control measures designed to achieve the
following security effects:
•
Deter, detect, delay, and deny access to intruders.
•
Respond and recover from an actual or potential security incident.
Aligned to achieving this is the need for a minimum baseline for security management and operations.
An essential part of this is the development by each site of a Security Management Plan or Manual.
The minimum information required in the Security Manual is outlined below.
The Security Manual shall be reviewed on the following basis:
•
A minimum of every 6 months.
•
Following a major security incident.
•
When the STRA is amended.
Security Manual Contents
Facility Security Plan (FSP)
In addition to the following main components of FSP, FSP shall provide the FO with the requirements
for SCR and a method to identify and implement required changes, enhancements or improvements
to the facility security posture.
•
Physical protection measures (infrastructure & security systems design).
•
Security program for upgrades, enhancements or improvements to existing security components
or infrastructure as recommended in the STRA.
•
Security organization structure. (Organization chart & personnel list)
•
Competency & Training of Security Personnel:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 80 OF 3 11
•
o
Analyze Training Requirements/needs
o
Design Training program (example Formal, Refresher, Equipment, On the Job etc)
o
Develop Security Training program (Training syllabus, Instructor manuals, Training
schedules, Training manuals, and audio visuals) for Security Staff
o
Security Awareness Training for employees
o
Induction of new employees
o
Introduction of security requirements in the safety induction on site for visitors and
contractors.
Maintenance & Support Program (MSP); for security infrastructure & systems and equipment:
o
Define Maintenance Requirements.
o
A maintenance plan for Preventive Maintenance and Remedial Maintenance.
Security Management Policy
Standing Operating Procedures (SOPs)
SOPs shall include, but not be limited to the following:
•
•
•
•
Physical Security Procedures:
o
Access Control.
o
ID Card Procedures.
o
Visitors.
o
Contractors.
o
Vehicle Entry Permits.
o
Material Control.
o
Key Control.
Information Security & Cybersecurity:
o
Information protection.
o
Document Control & Document Security.
o
Photography permits.
o
Laptop & IT permits.
Security Management Procedures:
o
Security Reports (i.e. Daily).
o
Security Statistics and Performance Measurement.
o
Security Incident & Threat Reporting & Investigations.
o
Contraband items.
o
Pre-employment screening and background checks.
o
Weapons (Firearms) Control (Handling and Storage).
o
Communication with Security Services Contractors and Suppliers.
o
Waiving of Standard Security Procedures.
o
Monitoring Procedures.
o
Test Procedures.
o
Alarm Assessment Procedures.
o
Dispatch Procedures.
Specific Security Incidents:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 81 OF 3 11
o
Emergency Planning (Emergency Response for Security Personnel).
o
Response to Bomb Threat.
o
Dealing with suspicious parcels.
o
Dealing with “Lost and Found” Items.
o
Vehicle Accidents.
o
Workplace Violence, threats, intimidation, and other misconduct.
o
Security Alert Levels.
o
Security Breaches – Illegal document copying/removals etc.
Site Security Forms
Example forms are listed below. Exact number and type of forms, if required, shall be coordinated
with NEOM Public Safety Department.
•
SSF-01 Visitor’s Application Form
•
SSF-02 Departmental Authorized Signatory Form
•
SSF-03 Request for ID Card Form
•
SSF-04 Temporary Entry Permit Form
•
SSF-05 Reporting Loss of ID Card Form
•
SSF-06 Vehicle Entry Permit Application Form
•
SSF-07 Material & Equipment Gate Pass
•
SSF-08 Security Post Report
•
SSF-09 Shift Report
•
SSF-10 Daily Security Report Form
•
SSF-11 Security Incident Report Form
•
SSF-12 Bomb Threat Information Form
•
SSF-13 Equipment/Waste removal permit – Permanent transfer/Dispose/Repair –Return.
Security Post Orders/Assignment Instructions (Responsibilities & Job Description)
•
General Instructions.
•
Superintendent of Security – accountable for Security and its Governance at the site.
•
Security Supervisor.
•
Security Shift Captain.
•
Gate Security Staff.
•
Security Patrol Staff.
•
CCTV Operator.
•
Visitor/Reception Security Staff.
•
Security Control Centre Operator.
•
X-Ray Checkpoint Security Staff.
•
Foot Patrolling.
•
Mobile Patrolling.
•
Security Staff Turnstile Gate.
•
Security Staff Material Department Gate.
•
Security Staff Admin Building Reception.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 82 OF 3 11
C2: Construction Site Security Infrastructure Requirements
Security of NEOM Construction Sites
The following descriptions outline the requirements to be applied to all construction sites within NEOM, unless requirements are downgraded by NEOM Public
Safety Department on an individual site basis.
Infrastructure
Security Requirement
Video Surveillance System
•
Continuous coverage of the perimeter to an image quality of 62ppm through fixed cameras supported by PTZs for tracking.
•
Image quality of 125ppm to be achieved at all entry points.
•
Recording for 90 days at a background rate of 6pps that will rise to 25pps on incident, alarm or operator action.
•
All cameras should be IP and a minimum of 1080p.
•
Additional cameras should provide images at 62ppm of:
o
Critical power supplies.
o
Water tanks.
o
Sensitive locations or storage.
Video Analytics
Intrusion detection analytics linked to images to be employed as required.
Other Surveillance Systems
Based on results of the STRA.
Access Control System
All access points on and off the construction site must be controlled to ensure only authorised movement takes place.
When not in use, the perimeter gates should be locked. (These can be left unmanned without compromising security as long as
another form of surveillance is in place – VSS, patrolling, and an intrusion detection system).
All vehicles should be checked at the perimeter to ensure that the people and any load entering the site have been verified. All
personnel should be verified against identification carrying a photo where they are not regularly employed on the site. Other access
requirements will be based upon the site safety and escort policies.
A gate pass system for checking vehicles should control vehicles' exits with loads.
Personnel with regular access to the site should be controlled based on a site-wide access control system. This will involve
corporate badges and issued visitor or temporary badges using a guard-controlled 'pass system'. The following principles should
apply in designing a pass:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 83 OF 3 11
Infrastructure
Security Requirement
•
NEOM logo.
•
Computer-generated colour photograph.
•
Facility name.
•
Holder name.
•
Holder function.
•
Security zones access/colour code.
•
Expiry date.
•
The issue, control and return system must be reviewed by NEOM security management weekly.
Pedestrian entry points should be controlled through full height turnstiles that form part of the perimeter to continue the secure line.
The turnstiles and the surrounding elements must offer the same level of security protection as that achieved by the perimeter
barrier system.
Access control should be system based:
•
On either cards or biometric template.
•
Prevent tailgating or passback.
•
Be individual to the person allowing individual audit trails to be established.
•
Have a centrally controlled database that allows the rapid removal of access privileges and time based criteria for access.
All visitors should be registered and held at the guard room/gatehouse until the representative they visit authorizes their entrance.
Once on-site, the visitor should be escorted at all times, unless on pre-determined Green Lanes, and it becomes the responsibility of
the person who confirmed access (the sponsor) for their safety at all times on site.
Intruder Detection System
Perimeter Intruder Detection should be enabled through the Video Surveillance System using suitable analytics and monitoring, in
combination with security patrols.
Point Intruder Detection should be enabled through access control points and/or specific cameras set with motion detection for areas
or heightened threat.
Duress Alarms
To be included as a function of the site radio communications handsets or issued to key personnel as an individual device.
A mass notification in case of emergency and evacuation should be provided across the whole construction site and/or active work
areas.
Security Lighting
•
Perimeter lighting. Perimeter lighting should enable guards and patrols to detect persons interfering with the perimeter barrier.
Lighting should provide a minimum 10 Lux across the whole perimeter with a 0.4% uniformity.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 84 OF 3 11
Infrastructure
Security Requirement
•
Checkpoint lighting. The entire zone around any gate should be well lit so that people and vehicles can be seen and inspected
quickly with a white light of 100 Lux positioned to enable drivers and their photo IDs to be read easily.
•
Area lighting. For security purposes a minimum of 20 Lux should be provided. This may need to be increased if the lighting
also provides task lighting for other activities.
Cyber Security
•
See Section A7 of Appendix A.
Perimeter Barriers
A perimeter fence should be installed around the construction site with entry point and emergency gates designed to a similar
standard as the fence. The fence will be a 2.4m chain-link construction as defined in Section C3.
Pedestrian gates must be a minimum of 1.2m in width.
Vehicle gates must be a minimum of 4.0m in width.
Internal separation by fences should be 2.4m in height, constructed from chain-link and not contain an anti-climb topper. Internal
separation should be applied to critical power supplies, water tanks and sensitive areas and storage.
•
Vehicle Security Barriers
Where perimeter will only be in place for temporary periods (up to 4 months) a surface mounted fence system may be
employed, but must be suitable for the terrain, wind loading etc. in that specific location whilst meeting the same overall security
requirement as the 2.4m chain-link fence.
Based on results of the STRA.
Vehicle control barriers should be installed to control access of vehicles on and off the site. These should be sited to facilitate the
vehicle and load monitoring requirements required at the site.
Counter Unmanned Aerial Systems
Based on results of the STRA.
Blast Protection
Based on the results of the STRA.
Ballistic Protection
Based on the results of the STRA.
Security Door Sets
Doors that are access controlled should conform to a minimum standard of EN1630 RC2 or PAS 24 or equivalent.
Doors required to provide specific security protection to sensitive materials, sub-stations or information should be rated to a
minimum of LPS 1175 B3 or equivalent.
Security Glazing
Glazing that is easily accessible (below 2.0m) should be protected from impact damage through the fitting of grills or a bar system.
Manual Locks
Manual gates shall be secured with a padlock with a minimum Grade 4 rating under BS EN 12320.
Buildings secured by a manual lock should have a minimum Grade 5 rating under BS EN 12320.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 85 OF 3 11
Infrastructure
Security Requirement
Valuable items such as cash and information classified as confidential or higher should be stored in secure containers.
Safes
Safes should be of one-piece construction, burglar and fire-proof to protect against all types of attack for a minimum of four hours.
Lightweight safes should be bricked or cemented into position or securely bolted to the floor. A key may secure them, but a
combination / electronic lock is preferred.
Lockable Cabinets
Security standard furniture should be metal construction, and its component parts should be welded rather than riveted. Hinges and
hinge pins should be protected against attack. Locks can be either key or combination types.
Security Control Rooms &
Monitoring Points
All sites will integrate to a master command and control centre, and therefore local monitoring points will be required at associated
static security locations. The need for a formal SCR is not required unless identified through an STRA.
HVAC and Ducting
Based on results of the STRA.
Security of NEOM Temporary Sites
The following descriptions outline the requirements to be applied to all temporary sites within NEOM, unless requirements are amended by NEOM Public
Safety Department on an individual site basis.
Infrastructure
Security Requirement
Video Surveillance System
•
Continuous coverage of the perimeter to an image quality of 62ppm through fixed cameras supported by PTZs for tracking.
•
Image quality of 125ppm to be achieved at all entry points.
•
Recording for 90 days at a background rate of 6pps that will rise to 25pps on incident, alarm or operator action.
•
All cameras should be IP and a minimum of 1080p.
Video Analytics
Intrusion detection analytics linked to images to be employed as required.
Other Surveillance Systems
Based on results of the STRA.
Access Control System
All access points on and off the site must be controlled to ensure only authorised movement takes place.
All vehicles should be checked at the perimeter to ensure that the people entering the site have been verified.
Other access requirements will be based upon the site safety and escort policies.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 86 OF 3 11
Infrastructure
Security Requirement
Personnel with regular access to the site should be controlled based on a site-wide access control system.
This will involve badges and issued visitor or temporary badges using a guard-controlled 'pass system'. The following principles
should apply in designing a pass:
•
NEOM logo.
•
Computer-generated colour photograph.
•
Facility name.
•
Holder name.
•
Holder function.
•
Colour coded lanyards to indicate full, partial or escorted site access.
•
Expiry date.
•
The issue, control and return system must be reviewed by NEOM security management weekly.
Pedestrian entry points should be controlled through full height turnstiles that form part of the perimeter to continue the secure line.
The turnstiles and the surrounding elements must offer the same level of security protection as that achieved by the perimeter
barrier system.
Access control should be system based:
•
On either cards or biometric template.
•
Prevent tailgating or passback.
•
Be individual to the person allowing individual audit trails to be established.
•
Have a centrally controlled database that allows the rapid removal of access privileges and time based criteria for access.
All visitors should be registered and held at the guard room/gatehouse until the representative they visit authorizes their entrance.
Once on-site, the visitor should be escorted at all times.
Intruder Detection System
Perimeter Intruder Detection should be enabled through the Video Surveillance System using suitable analytics and monitoring, in
combination with security patrols.
Point Intruder Detection should be enabled through access control points and/or specific cameras set with motion detection for areas
or heightened threat.
Duress Alarms
To be included as a function of the site radio communications handsets or issued to key personnel as an individual device.
A mass notification in case of emergency and evacuation should be provided across the whole construction site and/or active work
areas.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 87 OF 3 11
Infrastructure
Security Requirement
Security Lighting
•
Perimeter lighting. Perimeter lighting should enable guards and patrols to detect persons interfering with the perimeter barrier.
Lighting should provide a minimum 10 Lux across the whole perimeter with a 0.4% uniformity.
•
Checkpoint lighting. The entire zone around any gate should be well lit so that people and vehicles can be seen and inspected
quickly with a white light of 50 Lux positioned to enable drivers and their photo IDs to be read easily.
•
Area lighting. For security purposes a minimum of 20 Lux should be provided. This may need to be increased if the lighting
also provides task lighting for other activities.
Cyber Security
•
See Section A7 of Appendix A.
Perimeter Barriers
A perimeter fence should be installed around the construction site with entry point and emergency gates designed to a similar
standard as the fence. The fence will be a 2.4m chain-link construction as defined in Section C3.
Pedestrian gates must be a minimum of 1.2m in width.
Vehicle gates must be a minimum of 4.0m in width.
Internal separation by fences should be 2.4m in height, constructed from chain-link and not contain an anti-climb topper. Internal
separation should be applied to critical power supplies, water tanks and sensitive areas and storage.
•
Vehicle Security Barriers
Where perimeter will only be in place for temporary periods (up to 4 months) a surface mounted fence system may be
employed, but must be suitable for the terrain, wind loading etc. in that specific location whilst meeting the same overall security
requirement as the 2.4m chain-link fence.
Based on results of the STRA.
Vehicle control barriers should be installed to control access of vehicles on and off the site. These should be sited to facilitate the
vehicle and load monitoring requirements required at the site.
Counter Unmanned Aerial Systems
Based on results of the STRA.
Blast Protection
Based on results of the STRA.
Ballistic Protection
Based on results of the STRA.
Security Door Sets
Doors that are access controlled should conform to a minimum standard of EN1630 RC2 or PAS 24 or equivalent.
Doors required to provide specific security protection to sensitive materials, sub-stations or information should be rated to a
minimum of LPS 1175 B3 or equivalent.
Security Glazing
Glazing that is easily accessible (below 2.0m) should be protected from impact damage through the fitting of grills or a bar system.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 88 OF 3 11
Infrastructure
Security Requirement
Manual Locks
Manual gates shall be secured with a padlock with a minimum Grade 4 rating under BS EN 12320.
Buildings secured by a manual lock should have a minimum Grade 5 rating under BS EN 12320.
Valuable items such as cash and information classified as confidential or higher should be stored in secure containers.
Safes
Safes should be of one-piece construction, burglar and fire-proof to protect against all types of attack for a minimum of four hours.
Lightweight safes should be bricked or cemented into position or securely bolted to the floor. A key may secure them, but a
combination / electronic lock is preferred.
Lockable Cabinets
Security standard furniture should be metal construction, and its component parts should be welded rather than riveted. Hinges and
hinge pins should be protected against attack. Locks can be either key or combination types.
Security Control Rooms &
Monitoring Points
All systems to be integrated to the NEOM Master Security Control Centre.
HVAC and Ducting
Based on results of the STRA.
Local monitoring points to be provided.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 89 OF 3 11
C3: Construction Site Security Audit Checklist
#
Question
Yes
No
N/A
Comment
Construction Site Security
1
Does the NEOM Public Safety Department and the construction site manager have
a copy of the construction site security policy?
2
Has the security policy been communicated to all employees and contractors in
writing with a supporting letter or note from the contractors management team?
3
Is the construction site security policy emphasized during new employee orientation
and inductions?
4
Do periodic written communication or posters support it?
5
Does the facility have an existing and current security plan?
6
What is the date of the plan?
7
Does the facility security office maintain a current listing of NEOM security
regulations and references?
8
Does the security plan cover:
•
Fire.
•
Explosions.
•
Crises / disturbance.
•
Terrorist threat.
•
Sabotage.
•
Bomb incidents.
•
Natural disasters.
•
Illegal Activity.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 90 OF 3 11
#
Question
Yes
No
N/A
Comment
Responsibility
9
Is a security manager designated and named in writing for the facility construction
site?
Has the facility manager received formal security training?
10
Does the facility manager keep and comply with all currently applicable security
policies and procedures, such as those that apply to information security, personal
protection, travel security, and business ethics?
11
Does the security officer/manager conduct a physical security survey at least
annually?
12
Do all members assigned to the facility (including contractors, government, military)
receive security briefings/updates?
Security Guard Force
Construction Site Security Manager
13
Name
14
Date of appointment?
15
Normal working hours?
16
On Call After Hours?
17
Chain of Reporting: immediate manager?
18
Is the manager normally responsible for Guard force administration?
19
Is the manager normally responsible for Guard force duties?
Security Shift Supervisors
20
Working Hours
21
Is there 24 hour coverage?
22
Is he responsible for Guard Force Operations including:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 91 OF 3 11
#
23
Question
•
Access Control
•
Inspection, Control and Monitoring Duties
•
Reporting Methods
Yes
No
N/A
Comment
Does he maintain records of
•
Training and Drills
•
Breaches of Security
•
Security communications
•
Other specific duties
Guard Force Duties and Procedures
24
Is the construction site Guard Force a direct hire force or a contract company?
25
If contract guards, have they been individually vetted?
26
Total number of the guard force?
27
Total number of posts?
•
Working Hours
•
After hours
28
Average hours worked by security guards per week?
29
How many guards are working per shift:
•
Day shift:
•
Night shift
30
What is the size of the guard force dedicated to gates and the perimeter of the
construction site?
31
Have security personnel been trained in procedures for the implementation of
emergency and disaster plans for their activities?
32
Have they received pre-assignment training in:
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 92 OF 3 11
#
Question
Yes
•
Division of powers between the NEOM security management team and the
police force?
•
Security equipment and procedures?
•
Safety and Fire regulations?
•
Fire-fighting procedures?
•
CPR?
•
Basic First Aid?
33
Are the guards provided with written construction site instructions that cover all
aspects of their duties?
34
Are security force personnel inspected an debriefed by a supervisor prior to
reporting to their posts of duty?
35
Once on the site, is training given concerning:
•
Regulations that apply to the construction site?
•
Specific job duties?
•
Layout of the installations and offices, to include vulnerable points such as
unsecure or hazardous areas?
•
The use and maintenance of security equipment?
•
Safety and fire regulations?
•
Emergency devices such as back-up generators, uninterrupted power supply
systems, control switches, emergency lighting, and emergency radio and
telephones?
36
Are periodic examinations/ drills conducted to ensure maintenance of guard training
standards?
37
Do supervisors inspect each post / patrol /activity at least once each shift?
38
Is this on a random or scheduled basis?
DOCUMENT CODE: NEOM-NSE-PRC-001
No
N/A
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
Comment
PAG E 2 93 OF 3 11
#
Question
39
Is an updated copy of written instructions available at all times to security guards on
duty?
40
Is there a logbook in which the following are reflected?
•
Supervisory visits.
•
Shift changes.
•
Incidents / occurrences.
•
Special instructions.
Yes
41
Does the person responsible for security on site review the logbook on a regular
basis?
42
Are the standards of recruitment, training and supervision by the contract security
firm satisfactory?
43
Is supervision of the guard force adequate?
44
Are there written procedures, in the post for the following:
•
Post responsibilities
•
Individual responsibilities
•
Access Controls
•
Response to threats / incidents
•
Maintaining critical operations
•
Specific post-orders
•
Evacuation
•
Fire
•
Interface with other agencies
•
Security patrol information
•
After hours/ week-end reporting procedures
•
Records of security incidents
DOCUMENT CODE: NEOM-NSE-PRC-001
No
N/A
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
Comment
PAG E 2 94 OF 3 11
#
Question
45
Do the guards know how to respond when alarms are activated?
46
Do security guard patrol internally?
•
By vehicle
•
On foot
•
Working Hours
•
Night shifts
Yes
47
Are guards equipped with radio-communications for their patrol?
48
Is there an adequate system of supervision and monitoring of patrols?
49
Have direct communications with local municipal fire and police headquarters been
established?
No
N/A
Comment
Communications
50
Is there an auxiliary power supply for communication with each element of the
security force?
51
What is the alternate means of communication?
Security Awareness Program
52
Does a Security Awareness Program exist for the construction facility?
Security Drills
53
Have some emergency drills been organized and implemented on the construction
site?
Which of the following topics were used:
54
•
Medical emergency
•
Bomb threat
•
Bomb search
•
Suspect letter/parcel
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 95 OF 3 11
#
Question
•
Building evacuation
•
Workplace violence
•
Elevator entrapment drill
•
Civil disturbance
Yes
No
N/A
Comment
Key Control
55
Is a key register maintained? Under which form?
•
Excel Spreadsheet?
•
Log Book?
Personnel Issues
56
Are background screening procedures used?
57
When an employee is leaving, are there measures in place to verify that all identity
cards, credit cards, tools, documents, and other forms of company property have
been returned?
Disaster Recovery
58
Does the site have a disaster recovery plan?
59
Is there a crisis management plan?
60
Do all personnel involved in the crisis management plan know their role?
61
Has the crisis management plan been tested, reviewed, updated and simulated?
Administration of ID Cards
62
Are cards disabled or recuperated when the employee is on leave or terminates?
63
Are retrieved cards appropriately destroyed?
64
Is there a procedure in place to collect contractors’ cards at the end of their
contract?
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 96 OF 3 11
#
Question
Yes
65
Is there a procedure to inform access control points that a card has been lost or
stolen?
66
Is all security system data backed up regularly?
No
N/A
Comment
Information Protection
67
Has a threat assessment been made as to which departments produce or receive
sensitive documents that are likely to be of interest to third parties?
68
Has management ensured that employees have the correct storage for classified
documents? Are office and desk keys kept in key safes?
69
Is the information security policy regularly reviewed?
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 97 OF 3 11
C4: Perimeter Fence Specification
Specification Section Chain Link Fences and Gates (Type I-V)
Products
System Description:
•
Conform to CLFMI PM 2445 for the specified use.
•
Provide chain link fence and gates, fabric, fabric coating, Posts and Tension wires in accordance with the standard detail drawings provided for Type I- V.
•
Provide framework, fabric, accessories and gates in accordance with ASTM F567.
•
Fence heights as indicated with top rail, bottom tension wire, and three strands of barbed wire projecting outward and inward at top.
•
Gates:
o
Residential: Provide gates in accordance with ASTM F654.
o
Industrial and Commercial:
▪
Provide swing gates in accordance with ASTM F900.
▪
Provide horizontal slide gates in accordance with ASTM F1184.
Fence fabric:
•
Galvanized Steel
o
•
Galvanized steel chain-link fabric conforming to ASTM A392, with Class 2 zinc coating 610 grams of zinc per square meter of uncoated wire surface;
Fabric woven in 50 mm mesh from No. 9 gauge wire in a 2.4 m height with barbed selvages top and bottom.
Coloured PVC-coated steel fabric with galvanized and factory-painted steel posts, hardware, and fittings.
o
Fabric woven in 50 mm mesh from PVC coated wire in a 2.4 m height with barbed selvages top and bottom. PVC coating thermally fused and bonded
over galvanized plastic primed commercial quality steel wire with minimum coating thickness of 7 mils. Coated wire 9-gauge with minimum breaking
strength of 545 kg. Colour to be selected to match total fence system (1.22 g of zinc per square. meter. of surface).
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 98 OF 3 11
Barbed Wire and Support Arms:
•
Galvanized steel barbed wire consisting of three or six strands of twisted No. 12-1/2 gauge wires with 4-point barbs spaced 80 mm apart and conforming
to ASTM A121, with Class 3 zinc coating minimum of 244 g of zinc coating over each square meter of uncoated wire surface for No. 12-1/2 gauge wire).
•
Colour matched PVC coated galvanized steel wire, consisting of three or six strands of twisted No. 11 gauge wires with No. 14 gauge, 4-point vinyl coated
aluminium alloy barbs spaced 80 mm apart.
•
Support arms projecting outward and/or inward, from top of posts, at 45 degrees and capable of withstanding 890 N downward pull on outermost end of
arm, without failure. Arms with provision for attachment of three or six strands of evenly spaced barbed wire and integral with post top weather caps with
holes for passage of top rail at intermediate posts.
Tension wire:
•
No. 7-gauge coil spring steel wire with galvanized finish having minimum of 244 g of zinc coating over each square meter of uncoated wire surface.
•
Colour matched PVC coated No. 6 gauge outside diameter, zinc coated coil spring steel wire having 0.40 oz of zinc coating per sq. ft. of wire surface.
Tie Wires:
•
Tie wires, for fastening fence fabric to line posts and rails, not less than No. 6 gauge aluminium wire.
•
Tie wires, for fastening fence fabric to line posts and rails, not less than 9 gauge (outside diameter) colour matched PVC coated galvanized steel wire.
Line Post:
•
60.3 mm outside diameter steel pipe weighing not less than 5.4 kg/m, or 47.6 mm high carbon steel H-beams weighing not less than 4.0 kg/m, unless
indicated otherwise on the drawings.
End, Corner, and Pull Posts:
•
73 mm outside diameter steel pipe weighing not less than 8.6 kg/m, or 63.5 mm square steel tube weighing not less than 7.6 kg/m, or 89 mm by 89 mm
roll-formed, steel corner section weighing not less than 7.6 kg/m, unless indicated otherwise on the drawings.
Gate Posts:
•
73 mm outside diameter steel pipe and gate posts, for gate leaves up to and including 1.8 m wide, weighing not less than 8.6 kg/m., or 63.5 mm square
steel tube weighing not less than 7.6 kg/m., or 89 mm by 89 mm roll-formed, steel corner section weighing not less than 7.6 kg/m, unless indicated
otherwise on the drawings.
•
100 mm outside diameter steel pipe, gate posts for gate leaves over 1.8 m wide and up to and including 4 m wide and weighing not less than 13.5 kg/m,
unless indicated otherwise on the drawings.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 2 99 OF 3 11
•
168.3 mm outside diameter steel pipe, gate posts for gate leaves over 4 m wide and up to and including 5.5 m weighing not less than 28.2 kg/m, unless
indicated otherwise on the drawings.
Railings:
•
41.3 mm outside diameter steel pipe with minimum weight of 3.4 kg/m or 41.3 mm by 31.8 mm, 14-gauge roll-form section, for top railing and railings for
top middle and bottom braces between terminal posts and adjacent line posts, unless indicated otherwise on the drawings.
Truss:
•
9.5 mm diameter steel rod diagonal truss braces between terminal and adjacent line posts and for gate framework, unless indicated otherwise on the
drawings.
Fittings:
•
Heavy-duty malleable iron or pressed steel fittings of suitable size to produce strong construction.
Stretcher Bars:
•
Flat bars with minimum cross section dimensions of 6.4 mm by 19 mm, full height of fabric, secured with bar bands of minimum 11-gauge sheet steel,
spaced approximately 380 mm) on centres and bolted with 9.5 mm diameter bolts, for attaching fabric to terminal posts, unless indicated otherwise on the
drawings.
Gate Leaf Framework:
•
47.6 mm outside diameter steel pipe weighing 4 kg/m, minimum, unless indicated otherwise on the drawings.
Gate Hinges:
•
Heavy pattern of adequate strength for gate size, with large bearing surfaces for clamping or bolting in position.
Latch:
•
Gates with suitable latch, accessible from both sides and with provision for padlocking.
Concrete Footings:
•
Class B concrete.
Grout:
•
One-part Portland cement and three parts of clean, sharp, well-graded sand with minimum water for proper workability for posts set in solid rock.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 00 OF 3 11
Accessories:
•
Steel pipe dimensions and weights: ASTM A53/A53M, Schedule 40. Dimensions specified are nominal pipe sizes.
•
Dimensions and weight tolerances: Plus or minus 5 percent.
•
Zinc Coating: Minimum 610 grams per square meter.
•
Provide posts with tops of same material and designed to fit securely over post and carry top rail. Carry apron around outside of post at base of top fitting.
•
Ferrous metal fittings, posts, fence, gate framework, and accessories galvanized with heavy coating of 610 g/m2 pure zinc spelter per square foot or
surface area to be coated. Use hot-dip process. Thinner zinc coatings, electro-galvanizing, zinc paint or cold galvanizing compounds not used as
substitute for hot-dipped galvanized finish not acceptable.
•
Fabricate and weld before hot-dip galvanizing. Weld conforming to American Welding Society standards.
•
Hot-dip galvanized gate frame, after welding, if bolted or riveted corner fittings not used.
•
Galvanize fittings, posts, fence and gate framework, and accessories, then epoxy phenolic primed and top coated with matching PVC, using thermal bond
process.
•
Single and double leaf swing gates with centre bolt, centre stop, and automatic backstops.
•
Cantilever sliding (rolling type) gate complete with latch, stop, keeper, rollers, heavy duty roller track, and 3 strands of barbed wire installed vertically
above fabric and electrically operated.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 01 OF 3 11
Details – Fence Type (I – V)
Type
Category
Fabric
Wire
Fabric
Ground
Clearance
Concrete
Anchor
Rail
Tension
Wire
Barbwire
V Type
Extension
Arm
Brace
Post
Ht.
Brace Post
Option
(A)
I
High
Chain Link
(Gal)
2400
25mm
Tie fabric to
anchor at
600mm
TOP
Nil
6 Strands
Double
1500
All posts
Buried
Skirt
600mm
II
Medium High
Chain Link
(Gal)
2400
25mm
Nil
TOP
Bottom
6 Strands
Double
1500
All posts
Buried
Skirt
600mm
III
Medium
Chain Link
(Gal)
2400
25mm
Nil
Nil
Top/Bottom
6 Strands
Double
1500
Uninterrupted
fence runs
Buried
Skirt
600mm
IV
Medium Low
Chain Link
(Gal)
2400
25mm
Nil
Nil
Top/Bottom
3 Strands
Single
1500
Uninterrupted
fence runs
Nil
V
Low
Chain Link
(Gal)
2400
25mm
Nil
Nil
Top/Bottom
Nil
Nil
1500
Uninterrupted
fence runs
Nil
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 02 OF 3 11
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 03 OF 3 11
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 04 OF 3 11
Annex D: Site Categorization Matrix
Site Categorisation Matrix
The following Annex sets out the Site Categorisation Matrix which has been developed to assist the Designer in undertaking their assessment of the Site. The
categorisation will determine the following elements:
•
•
•
Protection Group
o
Baseline
o
Enhanced
o
Restricted
Site Classification
o
Industrial
o
Non-Industrial
Design Route
o
Standard
o
Fast-Track
In line with the process outlined with Section 4, the designer along with the facility proponent should make an assessment and recommendation to the NEOM
Public Safety Department as to what Category the site should be. This recommendation will be informed by the STRA and guided by the questions set out
within this Annex.
The following questions are intended to guide the Designer to consider the relevant factors that will influence the Site Categorisation recommendation.
While all guidance questions can be used to inform each of the three elements that make up the Site Categorisation, to assist the Designers the questions
have been split into the following categories.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 05 OF 3 11
Protection Group
#
Question
Response
1
If the site was to become offline or disabled, what impact could this have to the NEOM region?
(i.e. would it be felt beyond the local / individual community)?
2
What level of disruption would the loss of operation cause locally?
3
How easily can the site, or assets, be damaged or disrupted?
4
What level of redundancy is there for the function of this site?
5
What is the maximum tolerable downtime of the site that is allowable?
6
How easily can critical elements of the site be replaced to minimize loss or function?
7
How is the site used?
8
Are there likely to be large crowded publicly accessible areas created at this site?
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 06 OF 3 11
Site Classification (Industrial or Non-Industrial)
#
9
Question
Response
Will the chosen site be connected with any of the following
sectors:
•
Petroleum
•
Electrical Power & Distribution
•
Petrochemical
•
Water
•
Industrial Services
•
Communications
•
Mining
•
Gas
•
Civil Explosives
•
Chemical Manufacturing
•
Ports
•
Railroads
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 07 OF 3 11
Design Route
#
Question
10
Is the site protection group assessed as either Enhanced or
Restricted?
11
•
If yes, only the Standard design route can be undertaken.
[Check this].
•
If no, and site is assessed as Baseline, then Fast-Track is
possible.
Response
What is the planned lifecycle of this site?
•
If less than 4 months, the fast track route can be
considered.
12
Will the design utilise an off-site pre-fabricated unit?
13
Will the design require the incorporation of multiple elements?
Designer Recommendation
Following the STRA and Site Categorisation Assessment, the Designer should make a formal recommendation to the NEOM Public Safety Department who
shall then review and confirm what Protection Group, Site Classification and Design Route should be assigned.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 08 OF 3 11
Annex E: Security Manual Contents
Introduction
Aligned to achieving this is the need for a minimum baseline for security management and operations.
An essential part of this is the development by each site of a Security Management Plan or Manual.
The minimum information required in the Security Manual is outlined below.
The Security Manual shall be reviewed on the following basis:
•
A minimum of every 6 months.
•
Following a major security incident.
•
When the STRA is amended.
Security Manual Contents
Facility Security Plan (FSP)
In addition to the following main components of FSP, FSP shall provide the FO with the requirements
for SCR and a method to identify and implement required changes, enhancements or improvements
to the facility security posture.
•
Physical protection measures (infrastructure & security systems design).
•
Security program for upgrades, enhancements or improvements to existing security components
or infrastructure as recommended in the STRA.
•
Security organization structure. (Organization chart & personnel list)
•
Competency & Training of Security Personnel:
•
o
Analyze Training Requirements/needs
o
Design Training program (example Formal, Refresher, Equipment, On the Job etc)
o
Develop Security Training program (Training syllabus, Instructor manuals, Training
schedules, Training manuals, and audio visuals) for Security Staff
o
Security Awareness Training for employees
o
Induction of new employees
o
Introduction of security requirements in the safety induction on site for visitors and
contractors.
Maintenance & Support Program (MSP); for security infrastructure & systems and equipment:
o
Define Maintenance Requirements.
o
A maintenance plan for Preventive Maintenance and Remedial Maintenance.
Security Management Policy
Standing Operating Procedures (SOPs)
SOPs shall include, but not be limited to the following:
•
Physical Security Procedures:
o
Access Control.
o
ID Card Procedures.
o
Visitors.
DOCUMENT CODE : NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 09 OF 3 01
•
•
•
•
o
Contractors.
o
Vehicle Entry Permits.
o
Material Control.
o
Key Control.
Information Security & Cybersecurity:
o
Information protection.
o
Document Control & Document Security.
o
Photography permits.
o
Laptop & IT permits.
Security Management Procedures:
o
Security Reports (i.e. Daily).
o
Security Statistics and Performance Measurement.
o
Security Incident & Threat Reporting & Investigations.
o
Contraband items.
o
Pre-employment screening and background checks.
o
Weapons (Firearms) Control (Handling and Storage).
o
Communication with Security Services Contractors and Suppliers.
o
Waiving of Standard Security Procedures.
o
Monitoring Procedures.
o
Test Procedures.
o
Alarm Assessment Procedures.
o
Dispatch Procedures.
Specific Security Incidents:
o
Emergency Planning (Emergency Response for Security Personnel).
o
Response to Bomb Threat.
o
Dealing with suspicious parcels.
o
Dealing with “Lost and Found” Items.
o
Vehicle Accidents.
o
Workplace Violence, threats, intimidation, and other misconduct.
o
Security Alert Levels.
o
Security Breaches – Illegal document copying/removals etc.
Site Security Forms:
Example forms are listed below. Exact number and type of forms, if required, shall be coordinated
with NEOM Public Safety Department.
o
SSF-01 Visitor’s Application Form
o
SSF-02 Departmental Authorized Signatory Form
o
SSF-03 Request for ID Card Form
o
SSF-04 Temporary Entry Permit Form
o
SSF-05 Reporting Loss of ID Card Form
o
SSF-06 Vehicle Entry Permit Application Form
o
SSF-07 Material & Equipment Gate Pass
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 10 OF 3 11
o
SSF-08 Security Post Report
o
SSF-09 Shift Report
o
SSF-10 Daily Security Report Form
o
SSF-11 Security Incident Report Form
o
SSF-12 Bomb Threat Information Form
o
SSF-13 Equipment/Waste removal permit – Permanent transfer/Dispose/Repair –Return.
Security Post Orders/Assignment Instructions (Responsibilities & Job Description)
•
General Instructions.
•
Superintendent of Security – accountable for Security and its Governance at the site.
•
Security Supervisor.
•
Security Shift Captain.
•
Gate Security Staff.
•
Security Patrol Staff.
•
CCTV Operator.
•
Visitor/Reception Security Staff.
•
Security Control Centre Operator.
•
X-Ray Checkpoint Security Staff.
•
Foot Patrolling.
•
Mobile Patrolling.
•
Security Staff Turnstile Gate.
•
Security Staff Material Department Gate.
•
Security Staff Admin Building Reception.
DOCUMENT CODE: NEOM-NSE-PRC-001
REVISION CODE: 01.00
©NEOM [2022]. All rights reserved.
PAG E 3 11 OF 3 11
Download