Audit of Physical Security Management
Audit of Physical Security Management
Audit of Physical Security Management
TABLE OF CONTENTS
1 BACKGROUND .......................................................................................................................3
This is an abbreviated version of the audit report as the release of the information contained in
the full version may represent a risk to the security of SSHRC and/or NSERC. The information
is withheld pursuant to section 16(2)(c) of the Access to Information Act.
1 BACKGROUND
The Natural Sciences and Engineering Research Council (NSERC) and the Social Sciences
and Humanities Research Council (SSHRC) 1 support scholarly endeavors in Canada’s post-
secondary institutions, and report to Parliament through the Minister of Industry. The Agencies
share a Common Administrative Services Directorate (CASD) in which the Corporate Security
function is housed. The Corporate Security team (CST) is comprised of two employees: the
Departmental Security Officer (DSO) and Deputy DSO. The DSO reports through the Deputy
Chief Information Officer (CIO), to the CIO, to the Vice President, CASD.
The Treasury Board Secretariat’s (TBS) Policy on Government Security (PGS) defines physical
security as, “the assurance that information, assets and services are protected against
compromise and individuals are protected against workplace violence” 2 and Departments and
Agencies are expected to implement a security program to achieve the following results: 3
• Information, assets and services are safeguarded from compromise and employees are
protected against workplace violence;
• Governance structures, mechanisms and resources are in place to ensure effective and
efficient management of security at both a departmental and government-wide level;
• Security incidents are effectively managed and coordinated within departments and
government-wide;
• Interoperability and information exchange are enabled through effective and consistent
security and identity management practices; and
• Continuity of government operations and services is maintained in the presence of
security incidents, disruptions or emergencies.
Organizations must ensure security management is collaborative, coordinated and monitored,
and also establish a framework that brings together the various functions responsible for
elements of security, 4 and ensure all employees, at every level of the organization, are aware of
and understand their responsibilities. 5 The overall success of an organization’s security
management program is contingent on effective planning, communication, organization-wide
collaboration and oversight.
2 AUDIT RATIONALE
As part of the risk-based internal audit planning process, the Corporate Internal Audit (CIA)
Division identified the Corporate Security function as an area meriting examination. This audit
was included in the 2014-17 Risk-Based Audit Plan (RBAP) because:
• The Agencies have never conducted an audit of physical security;
• The TBS Policy on Government Security states that all departments and agencies must
review their compliance periodically;
1
NSERC and SSHRC shall be referred to throughout the reports as “the Agencies.”
2
Policy on Government Security, July 1, 2009, Section 3.1
3
Policy on Government Security, July 1, 2009, Section 5.2
4
Policy on Government Security, July 1, 2009, Section 3.3
5
Directive on Departmental Security Management, July 1, 2009, Section 6.1.2
• The audit was identified in the NSERC-SSHRC 2014-17 Risk-based Audit Plan, which
was approved by the Presidents in March 2014.
4 AUDIT METHODOLOGY
The audit was carried out in accordance with the Institute of Internal Auditors (IIA) International
Standards for the Professional Practice of Internal Auditing, as outlined in the International
Professional Practices Framework (IPPF), and conforms to the Internal Auditing Standards for
the Government of Canada, as supported by the results of the quality assurance and
improvement program.
The planning phase of the audit included the conduct of preliminary interviews and the collection
and review of documentation in order to understand the current state of security management
within the Agencies. The audit program, including detailed audit criteria and procedures, was
then designed based on the information gathered during planning, and focused on the
objectives and the lines of enquiry defined above.
Subsequently, during the conduct phase of the audit, the audit team interviewed security
practitioners, program managers and employees; observed the physical safeguards in different
areas and locations; and, examined and assessed current security practices against best
practices and guidance provided by TBS.
5 AUDIT TEAM
Chief Audit Executive: Benjamin Cyr
Audit Principal: Patricia Morrell
1. Physical Security roles and responsibilities are clearly defined and performed by the
appropriate employee; and information and/or issues are reported at the appropriate
level.
- The governance structure supporting Physical Security Management is defined, clear and
adhered to.
- Roles and responsibilities of individuals responsible for Physical Security Management
are defined, clear and cover all mandatory aspects.
- Roles and responsibilities of committees and senior management related to Physical
security is defined, documented and adhered to.
- Physical Security information, incident reports, and/or assessment results are reported to
/ monitored by management or management committees for discussion and/or decision.
3. Employees are aware of and comply with their respective roles and responsibilities with
regard to physical security
- The Agencies’ employees are aware of physical security requirements.
- Physical Security roles and responsibilities for physical security are understood and
thoroughly adhered to by Agency employees at all levels.
- Physical security information is available and regularly communicated to all staff.
- Adherence to Physical Security Requirements is monitored, and issues are corrected.
4. Physical Security threat identification and risk management processes are in place,
adequate, efficient and working as intended.
- The Agencies have defined and documented a Physical Security risk management
process.
- The risk management process is a continuous, and the monitoring for possible
threats/risks occurs on an ongoing basis to ensure emerging risks are addressed.
- Previously identified physical security risks/threats were shared with senior management,
analyzed and appropriate actions were taken to address the risks.
- The Agencies have approved documented internal security plans that are reviewed on a
regular basis to ensure they are relevant and up-to-date.
8 APPENDIX II – Definitions
Variations of the following are definitions outlined in TBS Policies, Directives, Standards &
Guides, as well as the Emergency Management Planning Guide, 2010-11, published by Public
Safety Canada.
Environmental Scan: The process by which key external and internal factors and risks
influencing an organization’s policy and management agenda are identified.
Risk Assessment: The concept of risk is defined as a product or process which collects
information and assigns values to risks for the purpose of informing priorities, developing or
comparing courses of action, and informing decision making.
Threat Assessment: The process of identifying or evaluating entities, actions, or occurrences,
whether natural or man-made that have or indicate the potential to harm life, information,
operations and/or property.
Threat Risk Assessment (TRA): Is a process for:
- Identifying assets and resources and assessing the level of risk to those assets and
resources
- Evaluating threats, including the motivation, intent, capability of a threat agent and the
opportunity, likelihood and consequence of threat acts that could place the delivery of
critical services at risk.
- Examining and evaluating potential disruptions and events for the purpose of determining
vulnerabilities and the implementation of countermeasures to reduce vulnerabilities.
Business Impact Assessment (BIA): The process of analyzing the degree to which a
department is exposed to risks and impacts that could affect its ability to function or its ability to
provide for the continuous delivery of critical services. The process consists of several steps,
including: determining critical services and their priorities; determining minimum service levels
and maximum allowable downtimes; mapping dependencies to critical services; assessing risks
and existing recovery capabilities; and, formulating strategies for recovery.
Departmental Security Plan (DSP): A Departmental Security Plan should detail decisions for
managing security risks and outline strategies, goals, objectives, priorities and timelines for
improving departmental security and supporting its implementation.
Business Continuity Planning (BCP): An all-encompassing term that includes the development
and timely execution of plans, measures, procedures and arrangements to ensure minimal or no
interruption to the availability of critical services and assets. The BCP Program is composed of
four key steps:
- The establishment of BCP program governance;
- The conduct of a BIA;
- The development of business continuity plans and arrangements; and,
- The maintenance of BCP program readiness.
Emergency Management Plan (EMP): The development and implementation of plans to
manage emergencies concerning all-hazards, including all activities and risk management
measures related to prevention and mitigation, preparedness, response and recovery.