Page 10 - Demo
P. 10
09 | OUR APPROACH & METHODOLOGYRisk MatrixThe risk assessment will precipitate a risk matrix which will detail the following key elements that will informsolutions to resonate with the client's unique circumstances and requirements.%u25cf risk type%u25cf risk identified%u25cf risk description%u25cf risk severity%u25cf risk impact%u25cf control measureOperational Design & SLABased on your unique circumstances an operating plan, detailing the deployment of personnel andequipment, will be set up to facilitate your security management operation.The primary aim of this design is to achieve the following:%u25cf comprehensive security: to ensure that there is sufficient security from the outermost to theinnermost layer. Each layer will delay the penetration time thus enabling the timeous deployment ofresponse teams/mechanisms.%u25cf balanced security: all security points will be tested to ensure that they provide equal resistance topenetration so as to maximize the time that it takes to reach the asset under protection.Shanti Africa Security (Pty) Ltd | COMPANY PROFILE