Security Operations
Security Operations
Note to Users:
This checklist may include terms specific to Operation Enduring Freedom and should be customized as
needed. For example:
For specific percentages and numbers, the user should apply the appropriate numbers; such as 70%,
80%, 90%, 99%, etc.
For periodic terms, such as “weekly,” the user should apply the appropriate period, such as daily, weekly,
biweekly, monthly, annually, etc.
1
REQUIREMENT YES NO N/O N/A COMMENT
5. Has the contractor developed and
managed a training program that,
at a minimum, shall include
lesson plans, tests, after action
reports, training schedules and
evaluation of security officer
proficiency at trained tasks?
6. Does the contractor make the
training program documentation
available for review to the
PCO/ACO IAW the SOW?
7. Administration: Does the
contractor perform the
administration functions as
described in the SOW?
8. Does the contractor operate the
site vehicle registration program
for the designated bases?
9. Does the contractor process
requests for transportation and
travel of the Contractor’s
personnel to off site locations IAW
the appropriate requirements?
10. Does the contractor process
requests for logistical support and
requests for supplies?
11. Does the contractor provide a
Portable Guard facility at the
designated entrance to monitor
and screen personnel?
12. Does the contractor provide a
facility and location to issue
permanent badging to authorized
personnel to have unescorted
access to the designated area?
13. Does the contractor verify any
individual entering into the
designated area will have proper
identification and access roster?
14. Does the contractor properly
verify visitation requirements for
all individual not properly badged
which requires entrance?
15. Does the contractor provide a
means to badge all visitors
granted access to the designated
area?
2
REQUIREMENT YES NO N/O N/A COMMENT
16. Does the contractor provide a
location within the designated
area and means to maintain
badging operations for personnel
authorized unescorted access?
17. Does the contractor provide
and maintain a badging
operations for personnel
authorized restricted and escorted
access?
18. Does the contractor process
requests for logistical support and
requests for supplies for providing
badges to authorized personnel?
19. Does the contractor contact
the Host for each visitor
requesting access to the
designated area?
Note: Contactor is authorized to
receive telephonic means to reach
Host personnel with the designated
area. Contractor will receive current
telephones roster of personnel within
the designated area.
20. Physical Security: Does the
contractor provide physical
security and entry access control
and perform inspections and
surveys for associated activities,
property, material and equipment
located within the designated
boundaries?
21. Does the contractor
administer and maintain the
appropriate physical security
program?
22. Does the contractor report
physical security deficiencies
during physical security
inspections and are other
inspections/surveys provided to
the PCO/ACO and the
appropriate Commander within
seven (7) days of the date of the
survey/inspection?
3
REQUIREMENT YES NO N/O N/A COMMENT
23. Does the contractor conduct
physical security inspections and
surveys IAW the appropriate
regulations, and as required by
the PCO/ACO?
24. Does the contractor establish
and maintain a current priority
listing of critical activities and
facilities on the designated sites?
25. Does the contractor prepare
and update the physical security
plan IAW the appropriate
regulations and requirements?
26. Traffic Enforcement: Does
the contractor coordinate, plan
and direct all traffic operations
IAW the appropriate regulations
and requirements as required by
PCO/ACO?
27. Does the contractor conduct
traffic surveys designed to
improve road and traffic flow
conditions?
28. Force Protection: Does the
contractor protect all personnel,
Government and non-
governmental property, material,
and equipment located at the
designated main sites from
unauthorized use, loss, theft,
trespass, espionage, sabotage,
damage, and other incidents?
29. Does the contractor conduct
proactive anti-terrorism programs
such as awareness campaigns,
as required by regulations and the
PCO/ACO?
30. Does the contractor conduct
preliminary information gathering
and preserve crime scenes until
the arrival of the Military Police?
31. Does the contractor report
any suspected criminal violations
to the appropriate authorities for
any subsequent investigations?
4
REQUIREMENT YES NO N/O N/A COMMENT
32. Does the contractor respond
to accidents and reports of
crimes, to include administering
First Aid (if required), protection of
the crime scene, detain suspects
until the arrival of law
enforcement authorities?
33. Does contractor patrol the
designated installations by motor
vehicle, or on foot, as required to
monitor any unauthorized
activities or evidence of
sabotage?
34. While patrolling, does the
contractor check all designated
gates, doors, windows and
restricted passageways, and
visually check perimeter fences
for damage or erosion and
protective lighting systems?
35. If gates or doors are found
unlocked or windows open, does
the contractor notify the security
force supervisor, who will contact
the designated building
custodian?
5
REQUIREMENT YES NO N/O N/A COMMENT
39. Does the contractor
immediately report identified
violations of appropriate
regulations to the PCO/ACO and
appropriate officials?
40. Does the contractor
immediately report intrusion or
threat of intrusion to the
PCO/ACO and appropriate
officials?
41. Does the contractor control
personnel and vehicle entry to
and from designated entrances at
the designated sites?
42. Does the contractor inspect
deliveries and vehicles IAW
current training standards?
43. Does the contractor enforce
the appropriate badge and pass
system to identify and control all
military, civilian, and Contractor
personnel and visitors to the
designated sites?
44. Does the contractor develop,
implement, and operate a visitor
pass system to issue, maintain,
and account for visiting
personnel?
45. Closed Circuit Television
System (CCTV): Does the
contractor conduct monitoring of
installed alarms and intrusion
detection and closed circuit
television systems?
46. Does the contractor
coordinate the response upon
identification of a situation?
47. Does the contractor man the
CCTV System 24 hours per day,
7 days per week?
48. Does the contractor perform
general maintenance on a
quarterly basis or IAW
manufacturer’s recommendations,
whichever is more frequent?
6
REQUIREMENT YES NO N/O N/A COMMENT
49. During CCTV failure, does the
contractor repair and achieve
operational functionality within 24
hours?
50. If repair and operational
status remains unserviceable
after 24 hours, does the
contractor provide an additional
security officer to maintain
surveillance and awareness?
51. Does the contractor maintain
a copy of the manufacturer’s
maintenance requirements and
spec sheets?
52. As a minimum, does the
contractor check the following
components IAW the above
stated standards: The camera
housing and the camera itself, all
connections and enclosures,
cables to include power and video
feed, mounting hardware,
monitors where ever located, and
power sources?
53. Does the contractor report
any deficient condition to the
ACO/COR within 24 hours?
54. Does the contractor remedy
routine repairs that do not affect
the functioning of the system NLT
7 days after the deficient condition
is discovered?
55. If the deficient condition
affects the normal operation of the
system, does the contractor make
repairs NLT 24 hours after the
deficient condition is discovered?
56. Does the contractor perform
security services IAW the
provisions contained in the
applicable regulations, field
manuals, technical manuals, and
all revisions?
57. Workload: Do the contractor
security services encompass the
main site at the designated
location?
7
REQUIREMENT YES NO N/O N/A COMMENT
58. Is the contractor prepared to
provide security services at the
identified auxiliary sites, on or off
site, as directed by the
PCO/ACO?
59. Does the contractor provide
Force Protection and physical
security on a 24-hour per day, 7
day per week basis?
60. Does the contractor perform
special security services at the
request of the PCO/ACO?
61. Personnel Reliability: Does
the contractor ensure that
personnel who require unescorted
accesses to arms (weapons) are
subject to a favorable screening?
8
REQUIREMENT YES NO N/O N/A COMMENT
65. Security Clearances: Do
contractor personnel possess a
security clearance at a level
commensurate with the level of
access required to perform the
task under this SOW?
Note: Security clearances shall be
based on favorable completion of the
type of security investigation
designated for that level of access.
Processing of Contractor security
clearances shall be IAW the
appropriate regulations.
66. Does the contractor submit all
requests for security
investigations to the PCO/ACO
and security office for personnel
assigned to positions whose
duties require the favorable
completion of such an
investigation?
67. Do contractor employees
comply with the Installation
Commander's security direction
and regulations?
68. Lock, Key and Seal Control:
Does the contractor ensure the
establishment, maintenance and
enforcement of an auditable key,
lock and seal custodial system for
internal security of assigned
facilities, space and equipment of
a security interest?
69. Does the contractor maintain
Key and Lock Control for arms,
ammunition, and explosives
(AA&E)?
70. Does the contractor control
other security keys and locks IAW
the SOW?
71. Does the contractor control
seals IAW the appropriate
regulations?
72. Does the contractor
coordinate with all parties
involved to ensure the last person
leaving a shared facility secures
the area?
9
REQUIREMENT YES NO N/O N/A COMMENT
73. Protection of Arms: Does
the contractor adequately protect
arms that are in its custody and
store them only in secure facilities
equipped with approved locking
devices and intrusion detection
systems IAW the appropriate
regulations?
74. Does the contractor maintain
an auditable record for the
constant accountability of
sensitive weapons in its control?
75. Does the contractor perform
monthly serial number inventories
of arms and gross count, unless
serial number accountability is
required?
76. Does the contractor use the
appropriate logistics system for
asset visibility and detailed
storage location information?
Note: System reconciliation must be
at 100%.
77. Does the contractor, in
addition to any other security
requirements/work, implement a
physical security plan and submit
to the Government on a quarterly
basis or as required to protect
Government furnished facilities
IAW the SOW?
78. Does the contractor’s plan
describe how the contractor shall
prevent unauthorized access,
vandalism, pilferage, larceny,
sabotage, and arson?
79. Does the contractor’s plan
also provide internal safeguards
for the security of GFP?
80. Is the contractor’s plan
consistent with the appropriate
regulations?
81. Force Protection: Is the
contractor prepared to increase
security measures at the notice of
the designated officials to meet
the standards for each Force
Protection Condition level IAW the
appropriate regulations?
10
REQUIREMENT YES NO N/O N/A COMMENT
82. Is the contractor prepared to
obtain armored "Hard Cars" for
the purpose of transporting
personnel to and from the
designated area, outlying work
sites, and to obtain local
purchases of supplies and
services from local vendors?
83. Does the contractor develop
strict control procedures for
accounting for personnel when off
the installation?
84. Does the contractor support
the requirements of the host site
Commander’s installation
response to Antiterrorism Force
Protection (AT/FP)?
85. Does the contractor meet the
required AT/FP measures as
defined by the host and parent
Commander and participation in
AT/FP exercises (as required by
the PCO/ACO)?
86. Does the contractor provide
representation on designated
Force Protection Committees or
Working Groups in an advisory
capacity as required?
87. Personnel Security: Do the
contractor personnel in
designated information
technology (IT) positions meet the
appropriate investigative
requirements before network
access is granted?
11
REQUIREMENT YES NO N/O N/A COMMENT
89. Does the contractor submit all
requests for security
investigations required for
personnel assigned to positions
whose duties require the
favorable completion of such an
investigation?
90. Do the contractor’s security
clearances exceed the level of
access required for duties of the
assigned position?
91. Are the contractor personnel
subject to the same restrictions as
Government personnel under law
and the appropriate regulations?
92. Does the contractor comply
with requirements of the
appropriate regulations for the
safeguarding and protection of
classified information or materiel?
93. Does the Contractor also
comply with any additional
command or local requirements
regarding the safeguarding,
protection, or control of classified
information or materiel?
94. Information Assurance (IA):
Do all contractor personnel with
access to Government
information systems and networks
successfully complete all required
information assurance (IA)
awareness training as specified in
the appropriate regulations and as
directed by the Government
requiring activity?
95. Does this IA Awareness
training include Service-mandated
training?
96. Does the contractor require
that IA awareness training is
taken upon work performance
start date and annually thereafter,
for the duration of this
contract/task order?
12
REQUIREMENT YES NO N/O N/A COMMENT
97. Do the contractor personnel
performing IA functions have the
required IA certifications and
appropriate operating system
certification for information
assurance technical positions as
required?
98. Does the contractor comply
with the appropriate regulations
and applicable Information
Assurance Best Business
Practices?
99. Does the contractor take
measures to not install or connect
non-Government-owned
computing systems or devices to
Government networks without the
COR/OCOR coordinating and
obtaining proper authorization
from the appropriate IA office?
100. Does the Contractor ensure
any sensitive information,
including but not limited to
Personably Identifiable
Information (PII), For Official Use
Only (FOUO), proprietary, and
Law Enforcement Sensitive
information residing on Mobile
Computing Devices (MCD) or
other external media is protected
in accordance with current Data at
Rest (DAR) guidelines and
requirements using an authorized,
approved and prescribed DAR
solution?
101. Does the contractor issue
Reports of Information System
Incident and Intrusion Reporting
as required by the appropriate
regulations?
13