ABSTRACT

LLIS Best Practice -- Incident Site Security: Perimeter Security: Credentialing   [open pdf - 110KB]

"This Best Practice discusses the importance of credentialing procedures for incident site security and incident site management. Credentialing procedures help control access to all response areas enclosed by outer perimeters, limiting entry to those tasked by Incident Command (IC). This control prevents complications presented by self-dispatching and volunteerism yet protects responders from secondary attacks. Further, credentialing provides a mechanism to control inner perimeter access."

Publisher:
Series:
Copyright:
Public Domain
Retrieved From:
Lessons Learned Information Sharing (LLIS)
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations