SEC-05 Integrated Security System
SEC-05 Integrated Security System
MINISTRY OF INTERIOR
HIGH COMMISSION FOR INDUSTRIAL SECURITY
SECURITY DIRECTIVES
FOR INDUSTRIAL FACILITIES
SEC-05
l ! !
i i
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
KINGDOM OF SAUDI ARABIA
MINISTRY OF INTERIOR
HIGH COMMISSION FOR INDUSTRIAL SECURITY
SECURITY DIRECTIVES
FOR INDUSTRIAL FACILITIES
SEC-05
i
(
RESTRICTED
|
All Rights reserved to HC1S. Copying or distribution prohibited jvithout written permission from HCIS
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security LUJl
Secretariat General
SEC-05 Integrated Security System
Table of Contents
1.0. ADMINISTRATION 3
1.1. SCOPE 3
1.2. APPLICATION 3
1.3. CONFLICTS & DEVIATIONS 3
2.0. DEFINITIONS 4
3.0. REFERENCES 5
4.1. INTRODUCTION 6
4.2. INTRUSION DETECTION & ASSESSMENT SYSTEM (IDAS) 6
4.3. ACCESS CONTROL SYSTEM 13
4.4. VIDEO ASSESSMENT & SURVEILLANCE SYSTEM (VASS) 21
4.5. ID MANAGEMENT SYSTEM (IDMS) 26
4.6. COMPUTER INSTALLATION IN SECURITY SYSTEMS 27
4.7. SECURITY SYSTEMS INTEGRATION 30
4.8. FACILITY DESIGN REQUIREMENTS FOR HOUSING SECURITY SYSTEMS 31
4.9. PLANT CONTROL ROOM 32
4.10. SECURITY CONTROL CENTER (SCC) 33
i
I
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 2 of 34
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security U«ll Ujil
1.0. Administration
1.1. Scope
This Directive provides the minimum requirements for companies and establishments
that are subject to the supervision of the High Commission for Industrial Security
(HCIS), Ministry of Interior, for integrated security systems at industrial facilities.
1.2. Application
This Directive is applicable to all facilities, including new projects, the expansion of
existing facilities, and upgrades. For application to existing facilities, the Operator
shall assess his facilities against the requirements of these Directives and coordinate
with the General Secretariat of the High Commission for Industrial Security (HCIS) to
comply with the Security, Safety, and Fire Protection requirements according to these
Directives and add to or modify the existing facilities as required. Where the HCIS
has assessed deficiencies in existing facilities during a survey, comparing the current
state of the facilities to the requirements of these Directives, those identified
deficiencies shall be corrected by the Operator.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 3 of 34
i i
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security ULJI *at
2.0. Definitions
HCIS High Commission for Industrial Security. The HCIS is part of the
Ministry of the Interior. It is responsible for the development, and
implementation, of security, safety and fire protection strategies
Kingdom-wide.
Operator: Company or owner of a facility.
Shall: Indicates a mandatory requirement.
Should: Indicates a recommendation or that which is advised but not
required.
ACS Access Control System: A system that permits, or denies, access to
a facility after evaluation of credentials.
Biometrics Biometrics is the study of methods for uniquely recognizing
humans based upon one or more intrinsic physical or behavioral
traits.
IDMS Identification Card Management System: A system to manage the
design, creation and retrieval of identification cards.
IDAS Intrusion Detection and Assessment System: Detects intrusion
attempt at perimeter, allows video surveillance and annunciates an
alarm.
ISS Integrated Security System
PIN Personal Identification Number
PTZ Pan-Tilt-Zoom: A method of mounting a surveillance camera that
allots it to pan, tilt and zoom while being controlled from a remote
location.
SED Single Entry Device: A physical device that allows entry to a
facility under the control of the ACS.
UPS Uninterruptible Power Supply
i i i
An uninterruptible power supply (UPS), also known as an uninterruptible
power source, is a device which maintains a continuous supply of electric
power to connected equipment by supplying power from batteries when
utility power is not available.
VASS Video Assessment & Surveillance System: A system using video
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 4 of 34
Kingdom of Saudi Arabia
Ministry of Interior
LLJI ieAl
High Commission for Industrial Security
Secretariat General iA»ll iil.'sll
3.0. References
This directive adopts the latest edition of the references listed.
The selection of material and equipment, and the design, construction, maintenance,
operation and repair of equipment and facilities covered by this Security Directive
shall comply with the latest edition of the references listed in each Security Directive,
unless otherwise noted.
4.1. Introduction
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 6 of 34
Kingdom of Saudi Arabia
Ministry of Interior i-LuiJi i'/jj
High Commission for Industrial Security LLJl
I.UI
Secretariat General
SEC-05 Integrated Security System
4.2.1. Design
The IDAS design shall be based on a comprehensive evaluation of the site and
available technologies to determine the optimal design.
4.2.2. Architecture
The IDAS shall be designed to ensure continued operation despite the failure of a
single device. Systems shall be designed to so that no single component failure can
disable the system.
Failover between primary and backup devices shall be automatic and shall not require
any User intervention.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 7 of 34
Kingdom of Saudi Arabia
'
Ministry of Interior i Jv-hJl i'/jj
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 8 of 34
i i i
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security OJl iiAl
4.2.12. Sensors
4.2.12.1. The IDAS shall use at least 2 independent types of sensors to detect
an intrusion attempt into the facility and shall have video capability
around the perimeter to assess the intrusion attempt.
4.2.12.2. Sensorÿ shall be adjustable to set detection thresholds. Sensors shall
be installed as required by the individual fence configurations
specified in SEC-02 “Security Fencing”. The IDAS shall use video
cameras for intrusion assessment.
4.2.12.3. At least one of the 2 independent sensor types shall be a volumetric
sensoi;1 system to detect an intrusion attempt. This shall detect any
motion, within the covered volume, of any man sized object. This
sensor shall be augmented with a second independent sensor, using
different technology than the other sensor type that shall be selected
by the Operator to detect any intrusion attempt.
i i i
RESTRICTED ,
AH Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 9 of 34
Kingdom of Saudi Arabia
Ministry of Interior
mMmm i
*
i'/jj
4.2.12.4. The effective sensitivity of all sensors shall be uniform in the entire
area/volume being monitored by the sensors. Where variable
sensitivity is employed, Operator shall ensure that the sensitivity is
adequate in all locations in the sensor volume, including the edges.
Sensor overlap shall be used to cover areas at the edge to ensure
elimination of any blind spots. Each sensor area/volume shall be
fully compliant with the requirements on its own,
4.2.14. Displays
The IDAS shall provide the User with multiple displays that will allow easy visual
monitoring of IDAS camera outputs.
The multiple display setup shall include, as a minimum, the following:
Display 1: Overview Map Display with all alarm location data.
Display 2: Split-screen display, preset or user selected, automatically
switches to alarm zone display when alarm is triggered.
Display 3: Index Display for cycling through a random, or user selected,
series of images from IDAS fixed and PTZ cameras. User shall
have the choice to create an index of selected cameras tliat are
displayed simultaneously and updated at user selectable or
preset intervals.
Display 4: PTZ camera display
Camera imagery from PTZ cameras shall normally be displayed at any acceptable
sub-multiple of the full frame rate & resolution but in ,no event less than seven (7)
frames per second during non-alarm conditions.
i I
All displays shall be minimum 20” size flat screen displays. Displays shall be capable
of displaying video images consistent and compatible with the quality and resolution
required to distinguish between human crawlers and small animals.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 10 of 34 i
l i
I
User shall size digital recording capacity to permit recording under all scenarios and
still maintain at least 50% spare storage capacity.
Alarm recording shall be at the pixel dimension and frame rate specified in 4.4.2.
Pre -Alarm recording - 5-20 seconds configurable
Post-Alarm recording- 5-20 seconds configurable
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 12 of 34
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-05 Integrated Security System
The IDAS shall provide a map display for displaying the overall system. The map
display shall permit the optional use of bilingual labels in Arabic and English. The
display shall use color icons to annunciate perimeter status.
4.2.20. Network
The IDAS shall operate on a dedicated local network. It shall use redundant networks
for all IDAS systems including field devices such as cameras & sensor interfaces.
Failover between networks shall be automatic.
Any field device failure shall not impact network performance.
Access to the IDAS shall be protected by user ID’s and passwords, at a minimum, and
an audit trail shall be maintained to log all User and user activities.
4.2.23. Environmental
l
All devices mounted externally shall be sealed to a minimum standard of IEC 60529
and shall meet the environmental conditions stated in SEC-01 ‘‘Application of
Security Directives”.
I I 1 1 1
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 13 of 34
Kingdom of Saudi Arabia
Ministry of Interior -
S -Is-ljJl ijljj
The Access Control System (ACS) comprises the hardware and software needed to
electronically authenticate a request by personnel to access a facility and to advise security
personnel of any invalid attempts. The ACS shall operate on a dedicated local network.
The local ACS consists of card readers or biometric readers, computer systems to validate the
request and local displays to advise security personnel of system status and access request
status. This local ACS shall be connected to a central ACS for data storage of all local ACS
logs and access data. The central ACS shall be used for reporting and data management.
The ACS shall meet the following requirements:
4.3.1. Architecture
4.3.1.1. The ACS shall consist of a local ACS at each facility with a central
ACS that shall store and retain all ACS personnel and access data
online for at least 36 months.
4.3.1.2. Personnel data referring to card holder short leave, vacation, lost,
stolen, revoked shall automatically be updated in the ACS and
disseminated automatically to all sites.
4.3.1.3. The ACS shall be designed with full redundancy at all levels to
ensure continued operation despite the failure of a single device.
4.3.1.4. Failover, and restore, between primary and backup devices shall be
automatic and shall not require any User intervention.
4.3.1.5. All local ACS operations & functions shall continue to operate with
no loss of capability when communication links to the central ACS
are disrupted.
4.3.1.6. All access data shall be uploaded to central system at periodic
intervals not to exceed 1 0 minutes.
| I |
4.3.2. Card Readers or Biometric Readers
Refers to devices that are used to initiate a request for access to the ACS, receive the I
response, and operate an associated single entry device. The readers may, use cards i
with PIN and/or biometrics as the access requesting mechanism.
o One reader minimum shall be installed per single entry device (SED) where
multiple single entry devices are installed.
lilt
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 14 of 34
i i ° i i i
Kingdom of Saudi Arabia
Ministry of Interior i i'/jj
High Commission for Industrial Security LUl igAI
o Where the installation only has one SED, two card readers shall be installed at
both the entry and exit sides of the SED to allow continued operation if one of
the card readers fails.
° If reader controllers are used a minimum of two controllers shall be installed
with each alternate card reader connected to alternate controllers.
° The ACS shall have the ability to deploy readers in multiple zones with each
zone having independent security access levels.
• The readers shall allow or deny access based on the response from the ACS.
All access denied alarms shall be annunciated at the local gatehouse.
° Biometric readers may use fingerprint, hand geometry, iris or any other
biometric measurement generally accepted within the security industry.
i
° Biometric readers shall validate data against a biometric template
either stored in a smart card or against a central j database. Biometric
data retained in the smart card shall be encrypted.
° All biometric readers shall have the ability to verify that the
measurements are being taken from a live person and not a printed)
copy or a copy made from some inanimate object'.
RESTRICTED ,
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 15 of 34
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security LixJi *g.i
Refers to the device used to conti-ol access to and fi-om the facility. For personnel it is
generally a turnstile or door and for vehicles it is a drop gate. The single entiy device
shall be controlled by the ACS and shall normally be in closed or locked position
unless released by the ACS after a valid card or biometric read.
All single entry devices shall be compliant with SEC-06 “Security Devices”.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 16 of 34
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security LUII ij>i
Secretariat General
SEC-05 Integrated Security System
Refers to a physical emergency switch that will allow security personnel to initiate an
emergency release of selected single entry devices when required.
4.3.6.1. ' Emergency Release switch shall be protected against accidental
activation.
4.3.6.2. Only selected single entry devices shall be released.
i i i
4.3.6.3. 1 Emergency switch activation shall be logged in ACS.
4.3.6.4.I Emergency switch shall function independently of the ACS.
4.3.6.5. In the event of an emergency gate personnel shall be able to allow
entry and exit of emergency vehicles.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 17 of 34
Kingdom of Saudi Arabia
Ministry of Interior a-Jrt* i'/ij
High Commission for Industrial Security VJUJl
4.3.7. Cameras
Refers to cameras that provide gate area surveillance ability and user suiveillance
cameras.
Area Surveillance: 1 PTZ color camera for entry side and 1 PTZ color
camera for exit side.
User Surveillance: The user surveillance cameras shall have the ability to
record ACS users either at the card reader or after passing through the single
entry device.
° The Area surveillance camera shall provide imagery at 320x240, or higher,
pixel dimensions with a minimum frame rate of 7.5 frames per second.
o The User surveillance camera shall provide imagery at 640x480, or higher,
pixel dimensions and 15 frames per second, or higher, frame rate to ensure
clear images of ACS users.
° User surveillance cameras shall have adequate wide angle ability to display a
recognizable image of the user of the card reader, for a height range (of the
user) of 1.3-2.2 m.
o The operator shall place the camera to obstruct keypad view while maintaining
the ability to see faces of personnel entering the facility.
° The system shall have the ability to display cameras imagery locally and/or
remotely as required by the Operator.
° All camera imagery shall be recorded in digital format as defined under Video
Recording in 4.3.8.
° The system shall annunciate an alarm when the video signal from the camera
is lost.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 18 of 34
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security jV-SU UJl
Secretariat General
SEC-05 Integrated Security System
Refers to a device that will digitally record the video output from the area and user
surveillance cameras.
All images from Area surveillance cameras (as defined in 4.3.7.) shall be recorded
and retained for a 30 day period, from the date the date the video was recorded, before
the data can be overwritten. The resolution and frame rate shall be as specified in
4.3.7.
All images of ACS users from the User surveillance cameras (as defined in 4.3.7.)
shall be stored and available for viewing, locally and across the network, up to 90
days from the date the image was taken. The resolution and frame rate shall be as
specified in 4.3.7.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 19 of 34
Kingdom of Saudi Arabia
Ministry of Interior <. J.-Ui-iii i'/jj
LUI
High Commission for Industrial Security
Secretariat General
SEC-05 Integrated Security System
4.3.11.1. The Operator shall ensure that the ACS supplier clearly documents
the ability of the ACS to be remotely monitored.
4.3.11.2. The system shall provide the ability to transmit all system data to an
external system, including video, and receive acknowledgements in
a fully documented format and protocol.
4.3.11.3. The Operator may elect to use any interface format as long as all
system data, including video, can be transparently sent to an
external system for display and alarm acknowledgement, the
interface requirements are fully defined and the interface is installed
in the ACS.
4.3.11.4. All data transmitted to an external system shall use encryption to
secure the data during transit over the network.
The ACS shall provide a set of reporting tools that shall allow authorized system
operators and gate personnel to generate reports from data stored in the ACS database.
The following pre-formatted reports shall be available for ACS personnel to generate
at any time:
4.3.12.1. On-Site Report: Lists all personnel on site with details of last
access point used. This report shall include contact numbers for
each person.
4.3.12.2. Visitor Report: Lists all visitors to site. This report shall
include, at a minimum, visitor name, organization being visited,
contact person, exit / entry dates, gates used.
4.3.12.3. Card holder photographs and access records shall be available on
the local system for review by gate and SCC personnel.
i i i i
RESTRICTED
All Rights reserved to HCIS Copying or distribution prohibited without written permission from HCIS
Page 20 of 34
Kingdom of Saudi Arabia
Ministry of Interior
LLJI iJ.1
High Commission for Industrial Security
Secretariat General SAJI SjL«Vl
4.3.13.3. Local anti-pass back shall be enforced by the system. This shall
prevent a card holder from making an entry unless an exit has
already been recorded in the system.
4.3.13.4. Local system shall continue to function with no degradation even
when communication links to the central ACS are disrupted.
4.3.13.5. All User and access activities shall be stored in the system and be
available for review by system personnel.
4.3.14. Environmental
All devices mounted externally shall be sealed to a minimum standard of IEC 60529
and shall meet the environmental conditions stated in SEC-01 “Application of
Security Directives”.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 21 of 34
Kingdom of Saudi Arabia tmmmw «_Lui.di -.'/jj
Ministry of Interior
High Commission for Industrial Security mgm UJI *ij,i
Camera image quality and resolution shall be adequate so that the operator can
consistently distinguish between a human in any position or profile from an animal or
debris anywhere in the assessment zone.
A minimum of 6 horizontal TV lines resolution subtending a 30 cm object are required
for distinguishing a human crawler from animals.
Cameras used for alarm detection shall have a fixed frame rate of 30 frames per
second and pixel dimensions of 640x480 or greater. Cameras used for assessment
may have variable frame rates and pixel dimensions but must automatically switch to
full frame rate of 30 frames per second and 640x480 pixel dimensions minimum
when an alarm is activated.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 22 of 34
Kingdom of Saudi Arabia
Ministry of Interior i •>— l-Ut fljtjj
4.4.4.2. The Operator shall develop a study that defines the actual field of
view of each camera/lens combination used and identifies blind
spots. The study shall consider the actual focal length of the camera
lens, pole height, local topography and obstructions in the camera
field of view.
4.4.4.3. The study shall identify all areas visible to the camera to at least
lkm past the outer perimeter (IDAS) and 5-1 01cm for long range
cameras while ACS cameras shall allow clear view of the
designated gate area.
4.4.4.4. Local terrain shall be used to determine the optimal camera
mounting pole height that will meet the requirements of this
Security Directive.
Clear zone width and length, camera resolution and sensitivity, camera location and
smallest human profile shall all be considered when determining lens focal length. All
camera views shall overlap the views from adjacent cameras in the detection zone so
that there are no blind spots along the detection zone.
4.4.7. Lighting
Compliant with SEC-04 “Security Lighting” and adequate for camera to display a
clear image under all ambient conditions.
Issue Dale: 12/6/1431H / 26/05/2010
RESTRICTED ,
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 23 of 34
i i i i t
Kingdom of Saudi Arabia
S-lÿUl-dl Sjljj
Ministry of Interior
ytuji UJI
High Commission for Industrial Security
Secretariat General oUi siL-Vi
SEC-05 Integrated Security System
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 24 of 34
• <II
Kingdom of Saudi Arabia
Ministry of Interior
LUl
High Commission for Industrial Security
Secretariat Genera! w«Ji
RESTRICTED
All Rights reserved to HC1S. Copying or distribution prohibited without written permission from HCIS
Page 25 of 34
Kingdom of Saudi Arabia
Ministry of Interior
UJl iiJ.1
High Commission for Industrial Security
Secretariat General
SEC-05 Integrated Security System
4.4.13.2. In general, facilities in open areas shall have the ability to monitor
surrounding areas. While facilities in built-up areas shall have the
ability to monitor areas up to 1km from the facility.
4.4.13.3. Facilities in open areas shall base the camera monitoring range on
the time required to deploy a response from the nearest security
post. In no event shall this be less then lion.
4.4.13.4. Facilities shall use either radar {facilities in open areas only),
thermal sensors or night vision sensors to detect activity in the
monitored area. These sensors, after their output has been
processed, as specified in the Imagery Processing section, shall be
used by the system to automatically slew a camera to the area of
interest and annunciate an alarm.
4.4.13.5. Radar shall be optimized to detect personnel and vehicle sized
targets. The radar beam shall automatically be blanked or turned
off when the beam emission points towards the facility being
protected.
4.4.13.6. This VASS ability shall be used to complement the IDAS which
monitors actual intrusion attempts at or inside the perimeter.
RESTRICTED
Al! Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 26 of 34
Kingdom of Saudi Arabia
Ministry of Interior
LUl iÿAl
High Commission for Industrial Security
oUll til.S/I
Secretariat Genera!
SEC-05 Integrated Security System
4.5.1. The IDMS shall produce, track and manage ID cards for issue to
eligible personnel including both employees and contractors.
4.5.2. The IDMS shall consist of local IDMS workstations at each facility
with a central IDMS that shall store and retain all IDMS access data
online for at least 5 years.
4.5.2.1. The central IDMS shall be designed with full redundancy at all
levels to ensure continued operation despite the failure of a single
device.
4.5.2.2. Failover, and restore, between primary and backup devices shall be
automatic and shall not require any User intervention.
4.5.2.3. All local IDMS workstation operations shall function with no loss
of capability when communication links to the central IDMS are
disrupted.
4.5.2.4. All card data shall be sent to the central IDMS at regular intervals of
1 5 minutes or less.
4.5.3. A minimum of two IDMS workstations shall be deployed at each local
facility.
4.5.4. Operator shall ensure that IDMS workstations are available in
reasonable proximity to each plant using these identification cards.
4.5.5. The IDMS shall provide data online to the ACS and other systems that
use identification cards.
4.5.6. ID cards and ID card management shall be fully compliant with the ID
card requirements stated in this Security Directive & SEC-1 1
“Identification Cards”.
4.6.1. Redundancy
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 27 of 34
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security tun
Secretariat General
SEC-05 Integrated Security System
4.6.3. Hardware
Computer hardware and software used for security systems shall be of the latest
generation available at the time of the design completion.
4.6.4. Communications
When configured for connectivity to an external system, Systems shall employ
redundant communications links, in compliance with SEC-08 “Communications”, and
employ route diversity in the physical link installation to the nearest communication
central office.
4.6.5. Database
All system data pertaining to the security system shall be stored in a relational data
base management system. The system storage shall be designed to ensure that all
system data is available online for a minimum 24 month period, or greater.
Specific periods for various systems are specified in eaclÿ section.
4.6.6. Backup
4.6.7. Storage
All computer systems shall be configured with at least 50% spare disc storage beyond
expected system requirements.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 28 of 34
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security jSti U«ll IUJ.I
Secretariat General
:U*J| CUVl
SEC-05 integrated Security System
4.6.9. Security
All computer systems shall apply a robust array of current security tools to protect the
system against unauthorized access attempts.
4.6.11. Environmental
All security system components shall be rated for the environmental conditions they
are used in as specified in SEC-01 “Application of Security Directives”.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 29 of 34
Kingdom of Saudi Arabia
Ministry of Interior --UUII i'/jj
5
WJl
High Commission for Industrial Security
Secretariat General i-Ult cuVi
Security systems shall present an integrated view to security personnel. This does not
preclude individual system installation on physically discrete computers as technology
limitations may preclude the optimal solution of a single, common hardware platform for all
systems.
All security systems deployed in facilities shall meet the following requirements:
4.7.1. All installations shall have the ability to present security personnel
with a single interface and user environment for all installed security
systems.
This will allow security personnel to manage the system from this
environment without regard to the physical system distribution on
different platforms.
Provision of this ability requires that all such systems transparently
share data across secured links and permit the integration of security
data with imagery from cameras and sensor activations.
This integrated environment shall be presented to security personnel
across multiple displays that share common design and management
techniques.
4.7.3. Integration at a data level, as specified in this requirement, allows
individual specialized management in each system’s own specialized
environment.
4.7.4. All IDAS and ACS installations can continue to install specialized
system monitoring equipment as dictated by individual system
requirements, i j i
This translates to a local monitoring facility for the IDAS and local
displays for ACS while maintaining full external system connectivity
to the integrated environment which may be at a different location or
could be co-located at the same location.
4.7.5. ISS components installed in the field shall have tamper sensors
connected to the ISS that will annunciate an alarm when any attempt is
made to access the component.
4.7.6. Site Acceptance Tests (SAT) for new installations shall be conducted
to verify ISS operation prior to acceptance by the Operator. The SAT
procedures and documentation shall be filed and available for review.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 30 of 34
Kingdom of Saudi Arabia
Ministry of Interior i'/jj
High Commission for Industrial Security jj-OO LLJl
Security systems shall be housed in secured facilities that have adequate structural, electrical
and environmental safeguards.
These facilities shall be classified by location as follows:
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 31 of 34
Kingdom of Saudi Arabia
Ministry of Interior
LLJl iiil
High Commission for Industrial Security
Secretariat General oUll liL.*/!
SEC-05 Integrated Security System
Plant Control Rooms present a special case for security compliance. This facility contains
controls for all elements of facility operation. It shall be safeguarded against intruders and
unauthorized visitors by the deployment of an Access Control System (ACS) at the control
room entrance door.
The ACS used at this facility shall be a scaled down version of the full ACS specified in this
directive. It shall include at least two card readers on the entry side and a camera to permit
plant control room personnel to observe personnel requesting access. The ACS shall have a
UPS and access to a backup power generator when power to the ACS is interrupted.
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 32 of 34
Kingdom of Saudi Arabia
i-Luuji s'j'jj
Ministry of Interior
LLJl 5iJ,l
High Commission for Industrial Security
Secretariat General w*ii uuyi
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Page 33 of 34
Kingdom of Saudi Arabia
3 JUljdl Sjljj
Ministry of Interior
High Commission for Industrial Securin’
Secretariat Genera!
SEC-05 Integrated Security System
Ail data required for the SCC function shall be provided to the operator
at this console.
4.10.13. Personnel data and imagery shall be available to the SCC operator.
4.10.14. All voice communications into and out of the SCC shall be recorded
and maintained for 12 months.
4.10.15. Large Screen Displays shall be used to provide a continuous overview
of the status of all areas under the SCC’s control.
This section lists how the elements of this security directive apply to facilities depending on their classification
using the criteria stated in section 4.2 of SEC-01.
ELEMENT
:
vÿ|g| mm
IH
Intrusion Detection & Assessment System /
(IDAS)
ID Management System s ✓
Computer Installation in Security Systems v' s s
Facility Design requirements for Housing
Security Systems
/ s y
RESTRICTED
All Rights reserved to HCIS Copying or distribution prohibited without written permission from HCIS
Page 34 of 34