What's Important and When
Setback or Isolation?
Understands current facility operating costs compared to desired benchmarks.
The standoff distance
required for many federal
facilities can have an
Compares the relative life-cycle costs of the alternatives.
unfortunate impact on the
Program Development Study
image and potential use
of the site if they are not
Considers multiple micro-level alternatives and compares the life-cycle costs
carefully planned and
of various options (especially regarding building systems choices).
planning should address the
site design of public spaces
Security requirements may consist of progressive collapse, blast mitigation, glass
and facility perimeters.
fragmentation, and standoff distances, among others. Security requirements differ
significantly from one facility and customer agency to another, as do the key agencies
responsible for providing security at a facility. The Federal Protective Service, U.S.
Marshals, security specialists for law enforcement customers, and Building Security
Committees play key roles. As detailed security requirements continue to evolve,
consult these individuals and include them on the Feasibility Study and PDS teams.
During pre-planning or early in project development, a security/risk assessment process
is performed to determine the protection level classification deemed necessary for the
facility. The process includes a blast and progressive collapse analysis of the structure,
based on the current Interagency Security Committee (ISC) security requirements, and
a risk analysis per the procedures of the latest PBS guidance and the P-100 design
requirements. Security costs must be tracked separately and are reflected on the OA as
Works with Building Security Committees; conduct studies to identify threats
Assesses progressive collapse potential of existing buildings, using
performance criteria set by ISC/GSA guidelines.
Establishes security-level requirements for the customer agency and the
facility and the performance requirements for glass fragmentation, perimeter
security, and so forth.