Perimeter covers:

  • The line demarcating the extent of a site/building/asset often using a physical barrier
  • Access points within the demarcation line providing a means of entering/exiting for people or vehicles
  • Sterile zones consisting of two perimeter lines separated by an area of ground; the outer (attack side) perimeter is a sacrificial fence facilitating detection and the inner (defended side) perimeter provides delay



  • Dissuade adversaries from conducting an attack by making each element within the boundary line appear too physically/technically difficult to overcome without likelihood of detection/failure/capture


  • Install a security rated fence and commensurately rated portals around the site, which combined with appropriate signs emphasises the strength of the security measures. The number of portals should be kept to an absolute minimum
  • Introduce random, visible security patrols around the site
  • Utilise signage on a sacrificial fence line highlighting the use of CCTV cameras and security lighting


  • To identify suspicious behaviour at the perimeter boundary
  • To identify unauthorised intrusions across the boundary line
  • To raise an alarm and initiate further investigation
  • Verify all perimeter intrusion alerts
  • Initiate an appropriate response to a threat or attack as early as possible
  • Enable verification of attack force size/threat/direction of travel to the responding security team


  • Install a perimeter intrusion detection system and CCTV camera system capable of detecting and tracking an intrusion at all times of the day and night
  • Use fixed and pan-tilt-zoom cameras along with lighting to detect an intruder and track their direction of travel once inside the perimeter


  • Maximising the time taken for an attack to breach the perimeter once detection has taken place
  • Prevent an attack from breaching the perimeter


  • Install an approved security barrier and portal which maximises delay
  • Install approved hostile vehicle mitigation measures around the perimeter

The following pages provide more information on the protective security measures which can be used to achieve the protective security principles above. Considering the impact a measure has on Deter, Detect and Delay is important to ensure the measures are complementary and all three Ds have been covered.