Security Considerations Assessment

The Security Considerations Assessment (SCA) process ensures security-related vulnerabilities are considered across a range of activities and processes within an organisation. This includes physical, personnel, cyber and cross-cutting security measures

Last updated: 30 September 2020

The Security Considerations Assessment (SCA) process ensures security-related vulnerabilities are considered across a range of activities and processes within an organisation. This includes physical, personnel, cyber and cross-cutting security measures.

Implementing the SCA should lead to fewer security-related changes being required at a later stage. It also reduces the chance of repeating mistakes that may have compromised security in the past.

The SCA process should be used by those who are accountable and responsible for actions across the built environment. These includes activities such as planning, design, construction and manufacturing. It is also for organisations who wish to embed security-mindedness, or protect their commercial information, personal data and intellectual property.

Did you find this page useful? YesNo
Thank you for your feedback. If you have any further suggestions on how this information can be made even more useful to improve your experience, feel free to share details below.
Thank you for your feedback. Sorry to hear that you haven't found this information useful. Please help us improve your experience and share how we can make this information more useful for you.