Security of Critical Infrastructure (SoCI)

Security of Critical Infrastructure

What it is

Protective security support for organisations that own or operate critical infrastructure assets. We help you identify and manage security risks to essential services and facilities, strengthen physical and procedural controls, and align security arrangements to regulatory obligations and sector expectations.

When to use this service

  • You operate critical infrastructure assets (energy, water, transport, telecommunications, health)

  • You need to strengthen physical security to reduce theft, sabotage, or disruption risk

  • You have experienced recurring incidents (copper theft, trespass, insider theft, vandalism)

  • You are expanding, upgrading, or building new infrastructure and need security designed in

  • You need to demonstrate due diligence to executives, regulators, or governance committees

  • You require a consistent security approach across multiple sites and remote locations

What you will receive

  • Critical infrastructure security risk assessment and prioritised risk register

  • Site-specific recommendations for perimeter, access control, CCTV, lighting, and monitoring

  • Guidance on operational security procedures (access, contractor management, incident response)

  • Staged uplift plan aligned to budget and operational constraints

  • Optional support for technology design, procurement, and vendor evaluation

  • Executive briefing and implementation planning support ‍

Our process

  1. Scope and asset context: Confirm asset types, site locations, operational constraints, and critical dependencies.

  2. Information gathering: Review incidents, current controls, site documentation, and operational procedures.

  3. Site inspections: Assess perimeter integrity, access points, remote site vulnerabilities, and control effectiveness.

  4. Stakeholder engagement: Engage operations, maintenance, security, and management teams to confirm practical constraints.

  5. Threat and vulnerability assessment: Assess realistic threats including theft, sabotage, insider risk, and disruption, and identify vulnerabilities across physical, procedural, and human controls.

  6. Risk analysis and prioritisation: Assess consequence and likelihood, document assumptions, and prioritise risks based on impact to essential services.

  7. Recommendations and staging: Develop proportionate recommendations and staged uplift options, including quick wins and longer-term improvements.

  8. Reporting and executive debrief: Deliver report and risk register, and brief executives on priorities, investment sequencing, and implementation approach.

Common focus areas for critical infrastructure

  • Remote site and perimeter vulnerabilities

  • Copper and equipment theft prevention

  • Access control, credential management, and contractor access

  • CCTV coverage, monitoring, and response arrangements

  • Lighting, barriers, and delay measures

  • Insider risk controls and procedural compliance

  • Incident response and escalation pathways

Frequently asked questions

  1. Is this cyber security consulting? No. PSA provides protective security and physical security consulting. Where cyber risk intersects with physical systems (for example, access control or CCTV networks), we consider the implications for system design and data security, but we do not provide cyber security services.

  2. Can you help across multiple sites? Yes. We can assess multiple sites and develop a consistent control standard and staged uplift plan across your portfolio.

  3. Do you recommend replacing existing systems? Only where necessary. We focus on improving control effectiveness and rationalising what you have. Replacement is recommended when systems are end-of-life, not fit for purpose, or create material risk.

  4. Can you support procurement and vendor selection? Yes. We can develop specifications, evaluate vendors, and support tender processes. We remain independent and do not accept commissions.

Related services

Security Risk Assessment

Security Master Planning

Security Technology Design

Physical Security Design

Need to strengthen protective security for critical infrastructure? Contact us for a confidential consultation

‍ ‍