Houses of Worship

Introduction

Security Self-Assessment

On behalf of the Cybersecurity and Infrastructure Security Agency (CISA), thank you for using the Houses of Worship Security Self-Assessment. The topics addressed here reflect assessment methodologies and recommended practices that physical security professionals in public and private sector roles use routinely. These are also applicable beyond faith-based communities and can be utilized by other nonprofit organizations.

This tool is designed to guide personnel at houses of worship through a security-focused self-assessment to understand potential vulnerabilities and identify options for consideration in mitigating those vulnerabilities. This self-assessment is a first step in building an effective security program; it is not intended to be an in-depth security assessment. After completing this process and addressing preliminary findings, houses of worship personnel may consider pursuing more detailed security assessments to explore specific issues in greater detail.

Houses of worship can use the results of this process in many ways as they partner to improve their security and manage risk. These efforts include prioritizing potential security measures, reviewing best practices and available resources, and developing investment justifications for internal budgeting processes or external grant requests.

Introduction/Instructions

This tool works well in a variety of web browsers but performs best in Microsoft Edge and Google Chrome and on a computer running Windows 7 (or later) and with Microsoft Word and Excel 97 (or later).

  1. To begin using the Houses of Worship Security Self-Assessment, enter the Facility Name and Date on the Assessment Details tab, or load a previously saved Houses of Worship Security Self-Assessment file to continue working on it.
    • To continue working on an existing Houses of Worship Security Self-Assessment, click the "Choose File" button and locate the appropriate .txt file. Then click the "Load selected saved data" button.
  2. Click the tabs on the left to view and select answers to each question for each category.
    • Click the “+” sign to view the background, reference, and additional information for each question.
    • Click the “-” sign to hide the background, reference, and additional information for each question.
  3. Each question has either three or five answers. Select the answer that most accurately represents the house of worship. An option for consideration will appear below the range of possible answers for each question, based on the selected answer.
    • Double-click on the radio button for a selected answer to clear it and select a different answer.
    • Click the “Clear all” button at the top of each section to clear all of the selected answers in that category.
    • Click the “Clear All Data” button in the top left corner of the browser to delete all of the information entered for this Houses of Worship Security Self-Assessment.
  4. Click the “Action Items” tab at any time to view the options for consideration by category.
    • Click the “Export to Excel” button to create an editable spreadsheet of the options for consideration. Instructions on how to format this file are available under this button.
  5. Click the “Create Report” tab to view and export the report.
    • Click the “Export Microsoft Word Report” button to create an editable file. Instructions on how to generate this file without Microsoft Word are available under this button.
    • The Microsoft Word report will automatically save to the Downloads folder as .doc file. The suggested process is to go to “File,” “Save As,” and save the file in a preferred folder before making any changes. The Save As file type automatically defaults to a web page. Change the Save As drop-down to a Microsoft Word format to ensure full functionality in Word.
  6. Save data for recordkeeping or future use.
    • Click the “Save Data” button in the top left corner of the browser. NOTE: Click this button only when ready to exit the tool—it is not necessary to periodically save data while using the application.
    • The data will automatically download and be saved in a .txt format. NOTE: A popup might appear to indicate the file has been downloaded and can be opened. If so, close the popup to access the saved file.
    • Browse to a location on the local drive and save the file for recordkeeping or future use (see Step 1).

Assessment Details

Houses of Worship Security Self-Assessment Details

When filling out this self-assessment, consider significant areas and assets at the house of worship. Significant areas and assets may be critical components that support the facility’s mission or unique elements of the facility. They may represent key vulnerabilities or areas of interest to an attacker. Potential significant areas and assets at a house of worship include the following:

  • Sanctuary or Primary Gathering Area: The most sacred part of a house of worship, where congregants gather for worship services, prayer, recitations, and other religious activities. Generally, the most populated area during meeting times, thus often an area for attack by an active shooter.
  • Fellowship Hall: Where congregants gather for meals, workshops, and other communal activities. May include a kitchen and eating areas or serve as a gymnasium.
  • Financial Office: Where donations are stored during and after meetings. May be targeted for theft.
  • Religious Exhibit, Display, Artifact, or Symbol: May be a permanent feature of the facility or temporarily erected for holidays or special events. May be a target for vandalism or theft.
  • Facility Vehicles: Usually vans or buses belonging to the house of worship. May be used to transport congregants and visitors to and from the facility as well as offsite activities.

Please Contact CISA at Central@CISA.GOV if you have any questions while performing a Houses of Worship Security Self-Assessment

To begin, enter the Facility Name and Date below to start a new self-assessment, or load a previously saved Houses of Worship Security Self-Assessment file to continue working on it. Then click the “Continue with Houses of Worship Security Self-Assessment” button.


   Then click button   


Date*

Security / Emergency Management

Security / Emergency Management

Security/emergency management refers to the people, plans, and procedures that a house of worship has in place to address security issues and emergencies. Factors that contribute to the effectiveness of security and emergency management efforts at houses of worship include the designation of a security manager or security committee; existence of security and emergency operations plans; commitment to training and exercises on these plans; engaging with external partners such as first responders and working groups; and mass notification capabilities and crisis communications. Houses of worship may use different names for these plans. They may incorporate security elements into a plan that outlines the facility’s approach to operations before, during, and after an emergency, or they may have two separate plans, one focused on security and another focused on emergency operations.

To view Background, Reference, and/or More Information related to a question click the '+' icon below the options per question.






Security Force

Security Force

A security force is a group of volunteers, employees, or contractors whose sole responsibilities are to provide security at the house of worship. A security force, which may be referred to a security team, does not include general personnel who are trained in security awareness (i.e., observe and report) in addition to their regular duties. Security forces at houses of worship can vary significantly in terms of size and responsibilities. Smaller facilities may have one or two people with a few security responsibilities, medium-sized facilities may have a larger team with several types of security capabilities, and larger facilities may have a professionalized security force consisting of combinations of in-house security employees and contract personnel. The need for a security force should be determined based on an assessment of threats facing the facility. The number and nature of assets and people needing protection and available staffing, budget, and expertise influence the size and scope of a security force. The key factor for a security force is to have a team of people with some ability to provide access control and respond to security- and safety-related incidents at the facility. Be aware that in some state and local areas, paid security force members must be licensed by the state and/or local county/municipality in order to carry out security functions. Check with state and local agencies for licensing and insurance requirements.

Due to some historical and recent events, the issue of providing lethal and less-than-lethal weapons has been raised. Although no question in this self-assessment deals directly with that topic, some facilities may choose to explore that option. Some house of worship leaders may wish to consider arming their security force as part of their broader security strategy. The range of options for maintaining an armed force is former military/law enforcement to off-duty law enforcement officers all the way to a professionalized and contracted security force. Generally, having members with concealed carry weapons that have not coordinated a response is not considered a security force. Arming a security force may not be appropriate for all houses of worship. The decision should be based on a thorough risk analysis process that includes identification of potential threats, understanding of liability, and knowledge of local regulations, as well as training and insurance costs. It is important to coordinate a planned armed response with law enforcement and first responders.


For more information see:
  • Secure Community Network, Firearms and the Faithful: Approaches to Armed Security in Jewish Communities, January 2020, accessed January 20, 2020, https://cdn.fedweb.org/fed-91/2/FirearmsandtheFaithful%255B2%255D%25281%2529.pdf.
  • Norman, Thomas L., Risk Analysis and Security Countermeasure Selection, Boca Raton, FL: CRC Press, 2010.
  • ASIS International, Protection of Assets: Security Officer Operations, Alexandria, VA: ASIS International, 2011.
  • To view Background, Reference, and/or More Information related to a question click the '+' icon below the options per question.






    Perimeter Security / Delineation

    Perimeter Security / Delineation

    Fences are barriers enclosing or bordering a facility that are used to prevent entry, contain people to particular areas, or mark a boundary. Fence construction may include different materials (e.g., chain link, wood, wrought iron, plastic), heights, anchoring, and other features (e.g., barbed wire along the top, privacy screening, outriggers). Gates are openings in the perimeter that allow people or vehicles to pass through at controlled points of entry. Gates can apply to vehicles and pedestrians and may include moveable bollards, roller or slide gates, swing gates, or turnstiles, among other construction options. Together, fences and gates are part of the broader layers of defense that facilities can put in place to protect against a spectrum of security issues including but not limited to active shooters. Depending on the facility and its location, fences and gates may not be appropriate for all houses of worship or may apply only to some features such as parking areas, sports fields, children play areas, gardens, or other outdoor spaces. Fences and gates can be used in addition to other measures to create layers of security. Measures other than fences and gates include sidewalks, perimeter landscaping, signage, and lighting, which can all be used to define a border and create a psychologic deterrent. These layers of protective measures are deployed in concentric circles around a facility, starting at the outer perimeter and moving inward to areas with the greatest need for protection. In addition, the facility can employ the concept of Crime Prevention Through Environmental Design (CPTED), which focuses on manipulating features of the environment surrounding the facility to create a feeling of safety while also deterring potential crime.

    To view Background, Reference, and/or More Information related to a question click the '+' icon below the options per question.






    Parking and Barriers

    Parking & Barriers

    Parking and barriers are part of the broader layers of defense that facilities can put in place to enhance security. Some of these security measures may be considered more relevant to explosive threats (i.e., where standoff distance is important) or vehicle ramming attacks (i.e., where high-speed avenues of approach are a concern). However, parking controls and barriers can also help deter individuals from initiating armed attacks; detect these attacks earlier at a safe distance; and delay attackers from reaching vulnerable and/or highly populated locations. Monitoring parking areas for suspicious or illegal vehicle placement can include viewing the parking area via security cameras, requiring onsite security personnel to conduct patrols, or maintaining incidental visual contact through windows.

    To view Background, Reference, and/or More Information related to a question click the '+' icon below the options per question.






    Access Control / Entry Control

    Access Control / Entry Control

    Controlling how and when staff, parishioners, visitors, and others can access the house of worship facilities and grounds is considered an effective mechanism for protecting against different threats, including active shooters. These controls can include minimizing the number of points of entry, requiring identification, or conducting searches. However, these entry controls may sometimes run counter to the overarching objective of creating an open and inviting environment for worship and fellowship. Entry controls are part of the broader layers of defense that houses of worship may have in place to enhance security. Entry controls can help deter individuals from initiating violent attacks, detect attacks earlier at a safe distance, and delay attackers from reaching vulnerable and/or highly populated locations.

    To view Background, Reference, and/or More Information related to a question click the '+' icon below the options per question.






    Closed-circuit Video / Video Surveillance Systems

    Closed-circuit Video/Video Surveillance Systems

    CCV and VSS are electronic systems of cameras, control equipment, recorders, and related apparatus used for surveillance or alarm assessment. These systems can help deter individuals from initiating armed attacks and detect these attacks earlier at a safe distance. CCV/VSS technology options include a range of technologies (e.g., digital or analog, fiber or wireless transmission) and features (e.g., color or black-and-white video, adjustable side-to-side or up-and-down movement of cameras, wide-angle or zoom views). They also can include software that helps identify anomalies and ultimately the ability of users to identify suspicious behaviors. Occasionally houses of worship may have dedicated security staff who monitor these systems in real time, or they may only view recorded information in response to specific incidents or inquiries. Following an incident, CCV/VSS data can provide valuable forensic information that first responders can use in response efforts and follow-on investigations. Surveillance cameras can be used to monitor common areas that are not within the normal view of staff, leaders, or security personnel. Video surveillance can also streamline access control procedures, allowing administrative or security personnel to monitor and control locked entrances remotely when used with intercoms and remote control door locks, if practical.

    To view Background, Reference, and/or More Information related to a question click the '+' icon below the options per question.





    You have completed the assessment questionnaire.  Please review the options below to create a report, action item list or to save your data for use today and in the future.

    Click the "Action Items" tab at any time to view the options for consideration by category.

    • Click the "Export to Excel" button to create an editable spreadsheet of the options for consideration. Instructions on how to format this file are available under this button.

    Click the "Create Report" tab to view and export the report.

    • Click the "Export Microsoft Word Report" button to create an editable file. Instructions on how to generate this file without Microsoft Word are available under this button.
    • The Microsoft Word report will automatically save to the Downloads folder as .doc file. The suggested process is to go to "File," "Save As," and save the file in a preferred folder before making any changes. The Save As file type automatically defaults to a web page. Change the Save As drop-down to a Microsoft Word format to ensure full functionality in Word.

    Save data for recordkeeping or future use.

    • Click the "Save Data" button in the top left corner of the browser.
      NOTE: Click this button only when ready to exit the tool‐it is not necessary to periodically save data while using the application.
    • The data will automatically download and be saved in a .txt format.
      NOTE: A popup might appear to indicate the file has been downloaded and can be opened. If so, close the popup to access the saved file.
    • Browse to a location on the local drive and save the file for recordkeeping or future use


    Action Items
    View / Export as csv file

    Action Items


     

     How to format the exported .csv file after downloading










    Create Report
    View / Print Formatted Report

    Houses of Worship Security Self-Assessment Report


     How to print if Microsoft Word is not available

    Houses of Worship Security Self-Assessment Results for BkMrkFacName


    On BkMrkDate, personnel representing the BkMrkFacName conducted a security self-assessment using the Houses of Worship Security Self-Assessment developed by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA).

    This report summarizes the results of that process, listing vulnerabilities (i.e., areas where the facility could improve) and options for consideration (i.e., strategies for enhancing security) that were identified using the guided self-assessment tool. These options outline specific actions that facility personnel can prioritize based on their existing security practices and available resources.

    Completion of this self-assessment is one step in a broader process of improving physical security at BkMrkFacName_PDF. Ongoing efforts to improve security and manage risk will support the organization’s mission to provide a safe environment for its congregants.


    Results from Self-Assessment

    The table below summarizes the results of the self-assessment completed by BkMrkFacName_PDF. The information includes the following content:
    • Section: six sections addressing core elements of physical security at houses of worship (i.e., security and emergency management; security force; perimeter security and delineation; parking and barriers; access control and entry control; and closed-circuit video and video surveillance systems)
    • Vulnerability: potential security concern that leaves a house of worship susceptible to different types of threats
    • Option for Consideration: potential actions that houses of worship can take to address identified vulnerabilities

    BkMrkObs

    Next Steps

    Develop a Prioritization Plan

    If not already established, form an internal team to evaluate and prioritize the options for consideration identified in this report, taking into account the facility's characteristics, budgetary outlook, and relevant local regulations.


    Connect with Federal, State, and Local Authorities

    Use this report as a starting point for engagement with local law enforcement or state and federal partners who can assist your organization in improving its physical security. CISA has Protective Security Advisors in each state across the country who can provide guidance on available resources, coordination of local assets, and suggestions on implementing the actions identified in this report.


    Use to Inform Investment Justifications for Organizational Budgets and Grants

    Explore different options that may be available for resourcing actions identified in this report. Houses of worship may be able to address some of the options for consideration identified in this report by applying existing organizational resources. In addition, public and private partners manage grant programs focused on improving facility security. The results of this self-assessment may serve as an input into grant program applications, depending on program focus areas and application requirements.

    Reference Materials for Houses of Worship

    Security/Emergency Management

    Security Force

    Perimeter Security / Delineation

    Parking and Barriers

    Access Control / Entry Control

    Closed-circuit Video / Video Surveillance Systems

    Acronyms and Abbreviations

    ADL
    Anti-Defamation League
    CCV
    Closed-circuit Video
    CISA
    Cybersecurity and Infrastructure Agency
    CPG
    Comprehensive Preparedness Guide
    CPTED
    Crime Prevention Through Environmental Design
    DHS
    U.S. Department of Homeland Security
    DOJ
    U.S. Department of Justice
    ED
    U.S. Department of Education
    FBI
    Federal Bureau of Investigation
    FB-ISAO
    Faith-Based Information Sharing & Analysis Organization
    FEMA
    Federal Emergency Management Agency
    HHS
    U.S. Department of Health and Human Services
    HSEEP
    Homeland Security Exercise and Evaluation Program
    ISC
    Interagency Security Committee
    NIJ
    National Institute of Justice
    NSI
    Nationwide SAR Initiative
    PTZ
    Pan-tilt-zoom
    SAMHSA
    Substance Abuse and Mental Health Services Administration
    VSS
    Video Surveillance System

    Houses of Worship Security Self-Assessment Results for BkMrkFacName


    On BkMrkDate, personnel representing the BkMrkFacName conducted a security self-assessment using the Houses of Worship Security Self-Assessment developed by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA).

    This report summarizes the results of that process, listing vulnerabilities (i.e., areas where the facility could improve) and options for consideration (i.e., strategies for enhancing security) that were identified using the guided self-assessment tool. These options outline specific actions that facility personnel can prioritize based on their existing security practices and available resources.

    Completion of this self-assessment is one step in a broader process of improving physical security at BkMrkFacName. Ongoing efforts to improve security and manage risk will support the organization’s mission to provide a safe environment for its congregants.


    Results from Self-Assessment

    The table below summarizes the results of the self-assessment completed by BkMrkFacName. The information includes the following content:
    • Section: six sections addressing core elements of physical security at houses of worship (i.e., security and emergency management; security force; perimeter security and delineation; parking and barriers; access control and entry control; and closed-circuit video and video surveillance systems)
    • Vulnerability: potential security concern that leaves a house of worship susceptible to different types of threats
    • Option for Consideration: potential actions that houses of worship can take to address identified vulnerabilities
    BkMrkObs

    Next Steps

    Develop a Prioritization Plan

    If not already established, form an internal team to evaluate and prioritize the options for consideration identified in this report, taking into account the facility's characteristics, budgetary outlook, and relevant local regulations.


    Connect with Federal, State, and Local Authorities

    Use this report as a starting point for engagement with local law enforcement or state and federal partners who can assist your organization in improving its physical security. CISA has Protective Security Advisors in each state across the country who can provide guidance on available resources, coordination of local assets, and suggestions on implementing the actions identified in this report.


    Use to Inform Investment Justifications for Organizational Budgets and Grants

    Explore different options that may be available for resourcing actions identified in this report. Houses of worship may be able to address some of the options for consideration identified in this report by applying existing organizational resources. In addition, public and private partners manage grant programs focused on improving facility security. The results of this self-assessment may serve as an input into grant program applications, depending on program focus areas and application requirements.



    Reference Materials for Houses of Worship

    Security/Emergency Management

    Security Force

    Perimeter Security / Delineation

    Parking and Barriers

    Access Control / Entry Control

    Closed-circuit Video / Video Surveillance Systems

    Acronyms and Abbreviations

    ADL
    Anti-Defamation League
    CCV
    Closed-circuit Video
    CISA
    Cybersecurity and Infrastructure Agency
    CPG
    Comprehensive Preparedness Guide
    CPTED
    Crime Prevention Through Environmental Design
    DHS
    U.S. Department of Homeland Security
    DOJ
    U.S. Department of Justice
    ED
    U.S. Department of Education
    Federal Bureau of Investigation
    FB-ISAO
    Faith-Based Information Sharing & Analysis Organization
    FEMA
    Federal Emergency Management Agency
    HHS
    U.S. Department of Health and Human Services
    HSEEP
    Homeland Security Exercise and Evaluation Program
    ISC
    Interagency Security Committee
    NIJ
    National Institute of Justice
    NSI
    Nationwide SAR Initiative
    PTZ
    Pan-tilt-zoom
    SAMHSA
    Substance Abuse and Mental Health Services Administration
    VSS
    Video Surveillance System
    Questions Only
    View / Print Complete list of Questions Only

       



    House Of Worship Self Assessment Questions


       

    References
    View / Print Complete list of all References

       



    Options for Consideration References


       

    Privacy Act Statement

    Authority: 5 U.S.C. § 301 and 44 U.S.C. § 3101 authorize the collection of this information.
    Purpose: The primary purpose for the collection of this information is to allow the Department of Homeland Security to contact you about your request.
    Routine Uses: The information collected may be disclosed as generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act of 1974, as amended. This includes using the information as necessary and authorized by the routine uses published in DHS/ALL-002 - Department of Homeland Security (DHS) Mailing and Other Lists System November 25, 2008, 73 FR 71659.
    Disclosure: Providing this information is voluntary. However, failure to provide this information will prevent DHS from contacting you in the event there are questions about your request.