Security Policy and Procedure Development

We can develop security policies tailored to the exact risks you face—all within the framework of laws and regulations of each country you operate in.

Do you have policies and procedures that cover risks like workplace violence, bomb threats, active shooters or natural disasters? How about executive protection or travel to high-risk areas? How do you know if current procedures will be sufficient or effective?

Given the complexity of most organizations, developing effective security programs can be an overwhelming job. As a world leader in physical, cyber and corporate security, we can help you create security policies and procedures that work together to close the gaps that might otherwise expose your organization to greater risks.

An effective security program must cover many scenarios and clearly define the duties and expectations for everyone in your organization—from the security department to management and employees as well as third parties like local emergency responders and business continuity partners. Taking a multidisciplinary approach, we can review your current security policies to ensure they cover your current risks and vulnerabilities.

Security Policy Development Best Practices and Customized Applications

If you find your current policies are insufficient or ineffective, we can develop security policies and services tailored to the exact risks you face—all within the framework of laws and regulations of each country in which you operate. Depending on your needs, we can assist with either comprehensive security programs or individual components, such as access control, pre-employment background checks, workplace violence prevention or executive protection.

Case Study – Security Policy and Procedure Development of an Oil Refinery Project 

Kroll was engaged jointly by a refining company and an investment bank to assess the security measures at an oil refinery project in North Africa.

Considerable political upheaval and changes in the security institutions has occurred over the past ten years, impacting the project site and the effectiveness of the security program. Both clients required Kroll to conduct an initial assessment including a review of an expected maximum loss (EML) report. Kroll undertook a security threat and vulnerability review of the project which included a visit to the site, meetings with key participants and a review of available documentation and designs for the construction. We provided our findings and recommendations in our report, which also provided comment upon various scenarios contained in the EML report.

As a result of our initial work, we were further retained to assist and support the refinery company with services including reviewing and advising on security design documents for measures the company is constructing and designing, alongside reviewing and developing security policy and procedures to enable the company to have effective security at the project site. Kroll enabled the refinery project team to meet the security requirements of the investors.

/en/services/security-risk-management/security-consulting/security-policy-procedure-development /-/media/feature/services/security-risk-management/security-consulting-desktop-banner.jpg service

Contact Us

Stay Ahead with Kroll

Kroll Business services

Business Services

Technology-enabled legal and business solutions for corporate restructurings, settlement administrations, issuer services, agent and trustee services, and other complex support needs.

Business Services
Comprehensive Due Diligence Solution

Compliance and Regulation

End-to-end governance, advisory and monitorship solutions to detect, mitigate and remediate operational security, legal, compliance and regulatory risk.

Compliance and Regulation
Corporate Finance

Corporate Finance and Restructuring

Comprehensive corporate finance, investment banking and restructuring support to clients, investors and stakeholders.

Corporate Finance and Restructuring
Cyber Risk

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Cyber Risk
Governance, Risk, Investigations and Disputes

Investigations and Disputes

World-wide expert services and tech-enabled advisory through all stages of diligence, forensic investigation, litigation and testimony.

Investigations and Disputes
Restructuring Advisory

Restructuring

Financial and operational restructuring and enforcement of security, including investigation, preservation and realization of assets for investors, lenders and companies.

Restructuring
Valuation Advisory

Valuation

Valuation of businesses, assets and alternative investments for financial reporting, tax and other purposes.

Valuation

Insights

Podcast

Kroll’s Security Concepts Podcast

Podcast
Video Library

Security Risk Management –
Hear Ongoing Global Security Insights From Our Security Risk Management Experts

Video Library