Security Assessment at First Entry
Cybersecurity and Infrastructure Security Agency
Alternative Security Assessment for First Entry - Comprehensive Security Assessment Tool
ALT SAFE stands for "The Alternative Security Assessment for First Entry (ALT SAFE) Beta." It's a helpful tool developed by the Cybersecurity and Infrastructure Security Agency (CISA) to help organizations look at their security practices and find ways to make them better.
The assessment examines multiple security domains, including:
ALT SAFE helps identify the easiest ways someone could get into your facility - basically finding the weak spots. It also looks at how well your facility can spot, respond to, and handle security problems when they happen.
Finding security gaps that could be taken advantage of
Looking at how ready you are to spot and handle problems
The assessment looks at your facility's security practices and helps identify areas where you're doing well and areas where you might want to make improvements. Each question is designed to help us understand your current security approach.
Responses to questions are categorized into three types, each with a clear meaning:
Your facility is doing well in this area.
Your facility could improve in this area. This is something to consider addressing.
This doesn't apply to your facility.
To get started with your security review:
Basic facility details and assessment information
Assessing information sharing practices and communication with first responders
Are facility personnel aware of the nationwide 'If You See Something, Say Something' public awareness campaign?
Has the primary law enforcement agency conducted an onsite visit of the facility?
Does your facility have interoperable communications with the primary law enforcement agency?
Has the primary fire response agency conducted an onsite visit of the facility?
Does your facility have interoperable communications with the primary fire response agency?
Has the primary emergency medical response agency conducted an onsite visit of the facility?
Does your facility have interoperable communications with the primary emergency medical response agency?
Does your facility exchange information with the FBI?
Does your facility exchange information with the ISAC for its sector?
Does your facility exchange information through the HSIN portal?
Does your facility exchange information through InfraGard?
Does your facility exchange information with federal agencies?
Does your facility exchange information with state and local agencies?
Does your facility exchange information with neighboring facilities?
Assessing security planning, management, and training programs
Does your facility have a designated security manager or security management position?
Does your facility have a comprehensive security plan?
Are personnel trained on the security plan?
Is the security plan coordinated with local law enforcement?
Are employees trained on their security responsibilities?
Is the security plan tested regularly with drills and exercises?
Does your facility conduct regular security risk assessments?
Assessing physical security measures, security force, and perimeter protection
Does your facility have dedicated security personnel or contract security services?
Does your facility have perimeter fencing or barrier systems?
Does your facility have electronic access control systems?
Does your facility have adequate security lighting?
Does your facility have adequate standoff distance between parking areas and buildings?
Are your building exteriors and entry points adequately secured?
Does your facility have a key control program?
Assessing electronic security systems, video surveillance, and intrusion detection
What type of video surveillance system do you have?
Evaluate the supporting controls that improve analytics accuracy, response performance, compliance, and resilience.
Does your video surveillance system provide adequate coverage of critical areas?
Does your facility use real-time monitoring for the video surveillance system?
Does your video surveillance system record and store video footage?
Does your facility have intrusion detection or alarm systems?
Are your alarm systems monitored by a central station or security personnel?
Are your security systems integrated to provide coordinated response capabilities?
Add facility-specific vulnerabilities and options for consideration
Document security practices that exceed standard requirements
Document key personnel and contact information
Review and select findings for inclusion in the final report
Validate your assessment first, then generate a comprehensive report review organized by findings.
Comprehensive security assessment findings and recommendations
Report metadata will be automatically generated from your assessment data, including facility information, assessment date, and contact details. No manual input required.