Main Sections
- Foreword
- Introduction
- 1 Scope
- 3 Terms and definitions
- 4 Context of the organization
- 4.1 Understanding the organization and its context
- 4.1.1 General
- 4.1.2 Internal context
- 4.1.3 External context
- 4.1.4 Supply chain and subcontractor mapping and analysis
- 4.1.5 Defining risk criteria
- 4.2 Understanding the needs and expectations of stakeholders
- 4.3 Determining the scope of the security operations management system
- 4.4 Security operations management system
- 4.1 Understanding the organization and its context
- 5 Leadership
- 5.1 Leadership and commitment
- 5.1.1 General
- 5.1.2 Statement of Conformance
- 5.2 Policy
- 5.3 Organization roles, responsibilities and authorities
- 5.1 Leadership and commitment
- 6 Planning
- 6.1 Actions to address risks and opportunities
- 6.1.1 General
- 6.1.2 Legal and other requirements
- 6.1.3 Internal and external risk communication and consultation
- 6.2 Security operations objectives and planning to achieve them
- 6.2.1 General
- 6.2.2 Achieving security operations and risk treatment objectives
- 6.1 Actions to address risks and opportunities
- 7 Support
- 7.1 Resources
- 7.1.1 General
- 7.1.2 Structural requirements
- 7.2 Competence
- 7.2.1 General
- 7.2.2 Competency identification
- 7.2.3 Training and competence evaluation
- 7.2.4 Documentation
- 7.3 Awareness
- 7.4 Communication
- 7.4.1 General
- 7.4.2 Operational communications
- 7.4.3 Risk communications
- 7.4.4 Communicating complaint and grievance procedures
- 7.4.5 Communicating whistle-blower policy
- 7.5 Documented information
- 7.5.1 General
- 7.5.2 Creating and updating
- 7.5.3 Control of documented information
- 7.1 Resources
- 8 Operation
- 8.1 Operational planning and control
- 8.1.1 General
- 8.1.2 Performance of security-related functions
- 8.1.3 Respect for human rights
- 8.1.4 Prevention and management of undesirable or disruptive events
- 8.2 Establishing norms of behaviour and codes of ethical conduct
- 8.3 Use of force
- 8.3.1 General
- 8.3.2 Weapons authorization
- 8.3.3 Use of force continuum
- 8.3.4 Less-lethal force
- 8.3.5 Lethal force
- 8.3.6 Use of force in support of law enforcement
- 8.3.7 Use of force training
- 8.4 Apprehension and search
- 8.4.1 Apprehension of persons
- 8.4.2 Search
- 8.5 Operations in support of law enforcement
- 8.5.1 Law enforcement support
- 8.5.2 Detention operations
- 8.6 Resources, roles, responsibility and authority
- 8.6.1 General
- 8.6.2 Personnel
- 8.6.3 Procurement and management of weapons, hazardous materials and munitions
- 8.6.4 Uniforms and markings
- 8.7 Occupational health and safety
- 8.8 Incident management
- 8.8.1 General
- 8.8.2 Incident monitoring, reporting and investigations
- 8.8.3 Internal and external complaint and grievance procedures
- 8.8.4 Whistle-blower policy
- 8.1 Operational planning and control
- 9 Performance evaluation
- 9.1 Monitoring, measurement, analysis and evaluation
- 9.1.1 General
- 9.1.2 Evaluation of compliance
- 9.1.3 Exercises and testing
- 9.2 Internal audit
- 9.3 Management review
- 9.3.1 General
- 9.3.2 Review input
- 9.3.3 Review output
- 9.1 Monitoring, measurement, analysis and evaluation
- 10 Improvement
- 10.1 Nonconformity and corrective action
- 10.2 Continual improvement
- 10.2.1 General
- 10.2.2 Change management
- 10.2.3 Opportunities for improvement
Annexes (Informative)
- Annex A: Guidance on the use of this International Standard
- Annex B: General principles
- Annex C: Getting started - Gap analysis
- Annex D: Management systems approach
- Annex E: Qualifiers to application