Welcome to ALT SAFE

Alternative Security Assessment for First Entry - Comprehensive Security Assessment Tool

What is ALT SAFE?

ALT SAFE stands for "The Alternative Security Assessment for First Entry (ALT SAFE) Beta." It's a helpful tool developed by the Cybersecurity and Infrastructure Security Agency (CISA) to help organizations look at their security practices and find ways to make them better.

The assessment examines multiple security domains, including:

  • Information Sharing - Communication protocols and intelligence sharing
  • Security Plans - Emergency and security planning documents
  • Physical Security - Access control and perimeter security
  • Security Systems - Surveillance and monitoring systems

Simple Terms

ALT SAFE helps identify the easiest ways someone could get into your facility - basically finding the weak spots. It also looks at how well your facility can spot, respond to, and handle security problems when they happen.

Finding Weak Spots

Finding security gaps that could be taken advantage of

Response Capability

Looking at how ready you are to spot and handle problems

Assessment Methodology

The assessment looks at your facility's security practices and helps identify areas where you're doing well and areas where you might want to make improvements. Each question is designed to help us understand your current security approach.

Responses to questions are categorized into three types, each with a clear meaning:

YES

Your facility is doing well in this area.

NO

Your facility could improve in this area. This is something to consider addressing.

N/A

This doesn't apply to your facility.

Getting Started

To get started with your security review:

  1. Complete the Facility Information section with basic details about your facility
  2. Work through each section systematically, answering questions about your current security practices
  3. Review the Report Review section to see auto-generated findings
  4. Generate your Executive Summary and Final Report for presentation
Auto-Save Feature: Your progress is automatically saved as you work. Use the "Restore Auto-Save" button above if you need to recover your previous session.

Facility Information

Basic facility details and assessment information

PSA Assessment Approach: This section gathers basic information about your facility to help us understand your situation and organize the results in a helpful way.
Click to automatically populate address fields and get coordinates

Information Sharing & Communication

Assessing information sharing practices and communication with first responders

PSA Assessment Approach: This section looks at how your facility shares information and communicates with first responders and other security partners. Good information sharing helps everyone respond better when problems happen.
Discussion-Based Assessment: These questions are meant to start a conversation about how your facility shares information. There are no right or wrong answers - we're here to understand what you're doing now and see if there are ways to make it even better.

1. Public Awareness Campaign

Are facility personnel aware of the nationwide 'If You See Something, Say Something' public awareness campaign?

Options for Consideration:

2. Law Enforcement Agency Visits

Has the primary law enforcement agency conducted an onsite visit of the facility?

Select which relationship elements you currently have:

3. Interoperable Communications with Law Enforcement

Does your facility have interoperable communications with the primary law enforcement agency?

Select which communication elements you currently have:

4. Fire Response Agency Visits

Has the primary fire response agency conducted an onsite visit of the facility?

Select which relationship elements you currently have:

5. Interoperable Communications with Fire Response

Does your facility have interoperable communications with the primary fire response agency?

Select which communication elements you currently have:

6. Emergency Medical Response Agency Visits

Has the primary emergency medical response agency conducted an onsite visit of the facility?

Options for Consideration:

7. Interoperable Communications with Emergency Medical Response

Does your facility have interoperable communications with the primary emergency medical response agency?

Options for Consideration:

8. FBI Information Exchange

Does your facility exchange information with the FBI?

Select which information sharing elements you currently have:

9. ISAC Information Exchange

Does your facility exchange information with the ISAC for its sector?

Select which ISAC elements you currently have:

10. HSIN Portal Information Exchange

Does your facility exchange information through the HSIN portal?

Options for Consideration:

11. InfraGard Information Exchange

Does your facility exchange information through InfraGard?

Select which InfraGard elements you currently have:

12. Federal Agency Information Exchange

Does your facility exchange information with federal agencies?

Select which federal agency elements you currently have:

13. State and Local Information Exchange

Does your facility exchange information with state and local agencies?

Select which state and local elements you currently have:

14. Neighboring Facility Information Exchange

Does your facility exchange information with neighboring facilities?

Select which neighboring facility elements you currently have:

Security Plans & Management

Assessing security planning, management, and training programs

PSA Assessment Approach: This section looks at your facility's security planning, how you manage security, and your training programs. Good security planning helps protect your facility and respond well when problems happen.
Discussion-Based Assessment: These questions are meant to start a conversation about your facility's security planning and management practices. There are no right or wrong answers - we're here to understand what you're doing now and see if there are ways to make it even better.

1. Security Manager

Does your facility have a designated security manager or security management position?

Select which security management elements you currently have:

2. Comprehensive Security Plan

Does your facility have a comprehensive security plan?

Select which security plan elements you currently have:

3. Security Plan Training

Are personnel trained on the security plan?

Select which training elements you currently have:

4. Security Plan Coordination

Is the security plan coordinated with local law enforcement?

Select which coordination elements you currently have:

5. Employee Security Training

Are employees trained on their security responsibilities?

Select which training elements you currently have:

6. Security Plan Testing

Is the security plan tested regularly with drills and exercises?

Select which testing elements you currently have:

7. Security Risk Assessment

Does your facility conduct regular security risk assessments?

Select which risk assessment elements you currently have:

Physical Security

Assessing physical security measures, security force, and perimeter protection

PSA Assessment Approach: This section evaluates your facility's physical security measures, including security personnel, perimeter protection, access controls, and physical barriers. Physical security forms the foundation of facility protection.
Discussion-Based Assessment: These questions are meant to facilitate conversation about your facility's physical security practices. There are no right or wrong answers - we're here to understand your current approach and explore opportunities for improvement.

1. Security Personnel

Does your facility have dedicated security personnel or contract security services?

Select which security personnel elements you currently have:

2. Perimeter Fencing and Barriers

Does your facility have perimeter fencing or barrier systems?

Select which perimeter security elements you currently have:

3. Access Control Systems

Does your facility have electronic access control systems?

Select which access control elements you currently have:

4. Security Lighting

Does your facility have adequate security lighting?

Select which lighting elements you currently have:

5. Parking and Standoff Distance

Does your facility have adequate standoff distance between parking areas and buildings?

Select which standoff elements you currently have:

6. Building Envelope Security

Are your building exteriors and entry points adequately secured?

Select which building envelope elements you currently have:

7. Key Control Program

Does your facility have a key control program?

Select which key control elements you currently have:

Security Systems

Assessing electronic security systems, video surveillance, and intrusion detection

PSA Assessment Approach: This section evaluates your facility's electronic security systems, including video surveillance systems (VSS), intrusion detection systems (IDS), and alarm systems. These systems provide critical monitoring and detection capabilities.
Discussion-Based Assessment: These questions are meant to facilitate conversation about your facility's security systems. There are no right or wrong answers - we're here to understand your current approach and explore opportunities for improvement.

1. Video Surveillance Systems (VSS)

What type of video surveillance system do you have?

1A. Video Analytics Program Controls

Evaluate the supporting controls that improve analytics accuracy, response performance, compliance, and resilience.

Data Quality Rubric
Operational Readiness Checklist
Policy Safeguards
Interoperability Checkpoints
Outcome Metrics (Executive Summary Inputs)

2. Video Surveillance Coverage

Does your video surveillance system provide adequate coverage of critical areas?

3. Video Surveillance Monitoring

Does your facility use real-time monitoring for the video surveillance system?

4. Video Recording and Storage

Does your video surveillance system record and store video footage?

5. Intrusion Detection Systems (IDS)

Does your facility have intrusion detection or alarm systems?

6. Alarm System Monitoring

Are your alarm systems monitored by a central station or security personnel?

7. Security System Integration

Are your security systems integrated to provide coordinated response capabilities?

Custom Vulnerabilities & Options for Consideration

Add facility-specific vulnerabilities and options for consideration

PSA Assessment Approach: This section allows you to add facility-specific vulnerabilities and options for consideration that may not be covered in the standard assessment questions. These custom items will appear in your final report.
Important: Custom VOFCs will only appear in the report if all fields (Category, Vulnerability, and Options for Consideration) are populated.

Custom Vulnerability 1

Custom Vulnerability 2

Custom Vulnerability 3

Commendable Practices

Document security practices that exceed standard requirements

PSA Assessment Approach: This section allows you to document security practices and initiatives that demonstrate exceptional security posture and exceed standard requirements. These commendable actions will be highlighted in your final report.

Commendable Action 1

Commendable Action 2

Commendable Action 3

Points of Contact

Document key personnel and contact information

PSA Assessment Approach: This section documents key personnel and their contact information for the assessment report. This information helps ensure proper follow-up and coordination.

PSA Contact Information

PSA Contact Information: Assigned CISA Protective Security Advisor conducting this assessment.
Primary PSA Contact

CSA Contact Information

CSA Contact Information: Assigned CISA Cyber Security Advisor conducting this assessment.
Primary CSA Contact

Assessment Facility Contact Information

Assessment Facility Contact Information: Primary facility contact for this security assessment.
Primary Facility Contact

Emergency Contacts

CISA Emergency Contact Information: These contacts will be used by CISA in the event of an elevated or direct threat to the organization and should be available 24/7.
Operations Emergency Contact
IT Emergency Contact
Backup Emergency Contact

Report Review

Review and select findings for inclusion in the final report

PSA Assessment Approach: This section automatically fills in with security concerns, improvement ideas, commendable actions, and custom items based on your responses. Review and choose which items to include in your final report.

Validate your assessment first, then generate a comprehensive report review organized by findings.

Final Report

Comprehensive security assessment findings and recommendations

Comprehensive Assessment Report: This section generates a detailed security assessment report with actionable recommendations, resource requirements, and implementation timelines for enhancing your facility's security posture.

Report Information

Report metadata will be automatically generated from your assessment data, including facility information, assessment date, and contact details. No manual input required.

Click "Generate Final Report" to create your comprehensive assessment report