Credit: Thinkstock Crime Prevention Through Environmental Design, or CPTED, is a method used in security planning that focuses on design, placement and the way the building is used as a means to increase security in an aesthetically pleasing manner.“CPTED tends to provide a purposeful sense of orderliness in developing a security program,” says William Nesbitt, president of SMSI. “It’s geared at trying to not only have an effective security program, but to have that program be perceived as being effective. It has to do with both the appearance and the perception.”CPTED principles can vary from place to place and firm to firm, but the three that are fairly standard are Natural Surveillance, Natural Access Control, and Territorial Reinforcement. These principles, though most easily used when designing a new building, can be used in virtually any type of building or scenario, new or existing.Natural surveillance“Doing a lighting study is one of the most important pieces of the Natural Surveillance principle,” says Toby Heath, electromechanical specialist at ASSA ABBLOY. “That involves measuring the light output every 10 feet throughout parking lots and the perimeter of a building.” Because light starts degrading as soon as you install a light bulb, chances are good that existing lighting isn’t particularly safe if it has been around for a while, says Heath. “One of the biggest things that people don’t understand is that you have to look at light uniformity, which is the difference between the lightest and the darkest spot. You want to have certain thresholds so that when people are driving by or people are in the building, they can actually see what’s happening.”The 3-7 rule is an important component of natural surveillance as well, says Heath. This means that all landscaping around the perimeter of the facility should be no taller than three feet for shrubs and plants and there should be no foliage below seven feet for trees. This leaves a clear view of people, making criminal activity easier to spot. Heath says not following the 3-7 rule is a common oversight at facilities because people don’t realize that landscaping obstructions may cause points of vulnerability. “The idea of surveillance in and of itself has a deterrent value,” says Nesbitt. For example, having parking lots adjacent to a building with no obstruction to the view no matter what floor you’re on may cause criminals to pause. For schools, putting the bike rack near classroom windows where it can be seen deters thieves, Nesbitt says.Making sure windows are unobstructed and clear is another component, particularly in a public space, says Heath. “K-12 schools are a big violator because teachers like to put artwork up on the windows,” he says. “You need two-way visibility so people can look in and you can look out.”Natural access control“It’s really important to minimize the points of entry to a building to one, for visitors as well as employees,” says Heath. “It’s completely inconvenient, but there’s always that balance between security and convenience to find your sweet spot.” In a related matter, all doors should be inspected to make sure they close completely and by themselves. Having open doors creates huge vulnerability points.[ ALSO ON CSO: Skip the picks, expert uses hammer to open a Master Lock ]Wayfinding is also hugely important in the quest for natural access control, both Heath and Nesbitt say. “It’s really important because as buildings get older, obviously there are renovations, improvements and additions. Within hospitals, departments move around all the time over the course of years and places can be marked incorrectly or not at all,” says Heath. “Having people coming into your facility and not being able to find where they’re going is a catalyst for a crime of opportunity.”For new buildings, “designing sidewalks and entryways with not just a sign, but inviting you to go in a certain direction” employs this principle of natural access control, Nesbitt says. “In some hospitals you sometimes see where they have different colored lines that help people find their way. All of these things can be done through design.” Territorial reinforcement“Territorial reinforcement basically tells you where your property begins. There is no defining property line, so to speak, so if you give cues as to where the property is and what’s under your control and maybe some signage, it helps you establish the foundational basis that you have control over this piece of land from this point inward and it’s not common area,” says Nesbitt.Changing the way that areas around and inside the facility are used is one aspect of territorial reinforcement. “Over time, some places get used more than others. People go to certain areas and some areas are avoided,” Heath says. “It’s important to be aware of where those areas are because obviously the opportunity for crime is way higher in the non-used areas.”Putting safe activities in unsafe places helps. “An unused space could have a bench or a winding walkway or nice shrubbery, something to invite the public to use that space, which forces the crime out of the area. It’s a slow migration. You want to reinforce that the whole territory is a safe place,” says Heath.Natural landscaping is also a big part of territorial reinforcement and of CPTED, Heath says. Buildings that once had beautiful shrubs and landscaping often don’t keep up maintenance or landscaping gets cut in the operational budget. “Putting that back in place and creating that delineation of public to private space is a big deal,” says Heath. Parting thoughtsUnderstand CPTED principles thoroughly. “Don’t substitute CPTED for traditional methodologies,” warns Nesbitt. “CPTED provides harmony between the more traditional methods and human behavior. It takes a little study to understand it, but the more you do, the more you will come up with ways to apply it that are unique to your situation.”Flexibility is key to the successful use of CPTED. “Security is hugely situational. There is no universality. Everything is about reducing the probability of things happening, since we can’t stop them from happening,” Nesbitt says. “Something may pop up that causes you to need to change the environment. Using CPTED principles will make any security program that much more effective than it would be without.”For more information about CPTED, visit the International CPTED Association website. Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe