Physical Security & Community Defense Resource Atlas
This is a defense-only atlas for building layered physical security, community safety capacity, and operational resilience in hostile, unstable, or degraded environments—without depending on centralized institutions as the default endpoint.
The resources below are pulled as individual documents and tools (not “hub-of-hubs”), structured for sequencing and offline use.
How to read this atlas
Start with the Quick-Start Pack, then follow the sequencing inside each section: governance & risk → people skills → places → groups → intelligence.
Why these sources
Priority goes to field-tested doctrine, checklists, and frameworks that can be adapted to local context without heavy dependencies.
What “defense-only” means
No offensive tactics. No weapon instruction. Focus stays on prevention, deterrence, hardening, situational awareness, and crisis management.
Scope, boundaries, and adversarial bias checks
These guardrails prevent drift into topics outside the mandate and reduce “false completeness” caused by institutional or ideological bias.
Bias Check: “Institutional capture” vs. “field reality”
Many security documents assume police, courts, and stable governance as default. In degraded contexts, those endpoints may not exist or may be adversarial. Favor resources that: (a) specify principles, (b) expose assumptions, and (c) can be executed locally.
What to watch for
- Over-reliance on compliance (security as policy theatre, not capability).
- Over-reliance on “call authorities” as the only response pathway.
- Hardening without acceptance (visible fortification that escalates hostility).
- “Checklist-only security” without risk assessment and local threat modeling.
Sequencing rule: people → places → groups
Physical security fails when trained people and clear group protocols do not exist. This atlas sequences learning as: risk management → personal/family → site hardening → community teams → incident intelligence.
Why the order matters
- Hardening without training increases complacency and creates single points of failure.
- Training without protocols produces fragmentation and panic under stress.
- Protocols without incident intelligence degrade into superstition and rumor.
Quick-Start Pack (print-first)
Minimum viable set to build an end-to-end physical security program: doctrine, skills, site design, community operations, incident intelligence, and prevention architecture.
- GPR8 (Humanitarian Security Risk Management)
- Security to Go (GISF) + Module 8 (Facilities)
- SRM Basic Guide (Smaller NGOs)
- Safer Access (ICRC)
- Stay Safe (IFRC)
- SIIM Handbook (Incident reporting & analysis)
- Get in Formation (Community Safety Toolkit)
- Community Safety Plans Manual (GIZ)
- Our Spirit / Highway of Tears (Indigenous-led toolkit)
- Kidpower “People Safety” skills
- Victim-defined safety planning (VAWnet)
- Survivor safety planning (Survived & Punished)
- ICA CPTED Methodology White Paper
- FEMA 426 + Building Vulnerability Checklist
- Cardiff Model Toolkit (CDC)
- Violence Prevention: the evidence (WHO)
- INSPIRE (Ending violence against children)
GPR8: Humanitarian Security Risk Management (PDF)
Sector-standard security risk management framework: context → threats → mitigation → incident response → learning loops.
How to extract value fast
- Use it as the “governance layer” for all other tools (risk appetite, roles, review cycles).
- Pull templates/processes into local SOPs: risk assessment cadence, incident response, training, debriefs.
Security to Go (GISF) — full guide (PDF)
Fast-start checklists for building basic safety/security systems in new or rapidly changing contexts.
Extraction focus (physical security)
- Module 8 (office/compound/residence security) is the primary physical-security steal.
- Module 10 (travel safety) and Module 11 (hibernation/relocation/evac) connect movement to site security.
- Ignore digital security modules if out-of-scope for this atlas.
Security Risk Management: A Basic Guide for Smaller NGOs (PDF)
Compact SRM blueprint for small teams: roles, minimum processes, and practical templates.
Safer Access: A Guide for All National Societies (PDF)
Operational security by perception, acceptance, and access—how to reduce risk via stakeholder relations and neutrality practices.
Stay Safe: Guide to a Safer Mission (PDF)
Security culture, personal safety behaviors, and management practices for humanitarian deployments and volunteer operations.
SIIM Handbook (PDF): Security Incident Information Management
Tools and templates for incident reporting systems, taxonomy, analysis, and learning loops.
Get in Formation: A Community Safety Toolkit (PDF)
Community defense practices: de-escalation, patrol roles, event safety, safety culture, and team operations.
Developing Community Safety Plans (GIZ) — Manual (PDF)
Facilitation methods to map local risks, design interventions, and build owned safety infrastructure.
Our Spirit: Community Safety Toolkit (Toolkit intro)
Indigenous-led safety toolkit adapted from Highway of Tears work; supports missing-person response and community safety capacity.
Kidpower: People Safety Skills (Library)
Boundary-setting, situational awareness, de-escalation, and last-resort escape skills for kids, teens, and adults.
Victim-Defined Safety Planning (PDF)
Safety planning anchored in victim priorities; includes broader security needs beyond physical violence.
ICA CPTED Methodology White Paper (PDF)
Methodological rigor for CPTED: evidence gathering, ethics, collaborative analysis, and coherent recommendation design.
FEMA 426 / BIPS 06: Reference Manual to Mitigate Attacks (PDF)
Threat/hazard, asset value, vulnerability → protective design patterns (standoff, glazing, access control, layouts).
CDC Cardiff Model Toolkit (PDF)
Operational method to combine hospital + law enforcement data to map violence hotspots and target prevention.
Violence Prevention: The Evidence (WHO) — briefings (PDF)
Seven briefings summarizing what works in violence prevention across multiple domains (interpersonal and self-directed).
INSPIRE: Seven Strategies for Ending Violence Against Children (PDF)
Evidence-backed strategy suite for reducing violence against children; integrates law, norms, safe environments, services, and education.
Risk management backbone
Doctrine and minimum viable systems for security risk management (SRM): threat modeling, mitigation planning, and learning loops.
GPR8 (PDF)
Use as the root schema: terminology, SRM process, governance, and accountability patterns.
Recommended extraction
- Define: risk appetite, decision rights, escalation triggers, and review cadence.
- Build a “security operating system”: SOPs + training + incident reporting + after-action reviews.
SRM Basic Guide for Smaller NGOs (PDF)
Minimum viable SRM for small teams: roles, templates, and practical steps that scale upward.
Security to Go — Module 7: Security Plan (PDF)
How to convert risk assessment outputs into a usable security plan and staff procedures.
ICRC Safer Access (PDF)
Acceptance-based protection: stakeholder mapping, perception management, and access negotiation patterns.
ICRC SAFE Manual (landing page)
Updated replacement for “Staying Alive”; holistic security and safety management at individual level in operations context.
Note on “mirror” PDF
- The PDF mirror is included for offline use. Where possible, keep the ICRC publication page as the canonical reference.
Safety First (Save the Children) (PDF)
Field safety and security handbook: threat awareness, travel, site security, and incident handling.
Staying Alive (ICRC) (PDF)
Classic security guidelines for conflict areas; still useful as patterns and checklists (superseded by SAFE).
IFRC Stay Safe (PDF)
Personal security behaviors + security management systems; useful for volunteer-based networks and distributed teams.
Personal & family safety (non-weapon, civilian)
High-leverage resources for boundary-setting, situational awareness, de-escalation, and survivor-centered safety planning.
Kidpower People Safety Skills (library)
Teachable “people safety” skills for all ages: awareness, confidence, boundaries, help-seeking, and last-resort escape.
Victim-Defined Safety Planning (PDF)
Safety planning centered on survivor priorities; expands safety beyond “physical violence only.”
Safety Planning & IPV (Survived & Punished) (PDF)
Safety planning as community organizing; includes risk reduction and the harm of criminalization.
Creative Interventions Toolkit (PDF)
Community-based interventions to interpersonal violence; useful for building non-police pathways of safety and accountability.
Where it fits in this atlas
- Use when building “third path” safety responses that do not default to the criminal-legal system.
- Pairs well with Get in Formation and OVP Toolkit when building community safety infrastructure.
Home/site hardening & CPTED
Built-environment patterns: natural surveillance, access control, territorial reinforcement, maintenance, and professional facility hardening guidance.
CPTED Overview (LISC)
Accessible CPTED introduction and practical framing for community spaces and neighborhoods.
ICA CPTED Methodology White Paper (PDF)
Methodological guardrails for CPTED work: data collection, ethics, evaluation, and coherent recommendations.
CPTED Guidelines for Queensland (PDF)
Modern CPTED guideline with principles and practices for planners, councils, police, and community stakeholders.
City of Las Vegas CPTED Handbook (PDF)
Applied CPTED handbook: lighting, layouts, and practical design tactics for reducing crime opportunity.
Essex CPTED Guide (PDF)
Concise CPTED guidance with clear tactics (lighting, visibility, streetscape, overlooked spaces).
FEMA 426 / BIPS 06 (PDF)
Facility hardening doctrine and vulnerability assessment patterns (standoff, glazing, access control, entry points).
FEMA 452: Risk Assessment How-To (PDF)
Systematic methodology for identifying assets, threats, vulnerabilities, and choosing mitigations.
FEMA 430: Site & Urban Design for Security (PDF)
Perimeter and site design patterns for protection: approaches, stand-off, and layered site defenses.
VA Physical Security & Resiliency Design Manual (PDF)
Deep design patterns for entry control, glazing, standoff, and layered security—highly stealable even outside healthcare.
Community safety teams & neighborhood defense (non-police, non-militarized)
How to structure local safety capacity: roles, training, de-escalation, patrol patterns, and participatory safety planning.
Get in Formation (PDF)
Core playbook for building community safety teams: de-escalation, event roles, safety culture, and response planning.
GIZ Community Safety Plans Manual (PDF)
Participatory safety planning methods: mapping risk, prioritizing interventions, governance and M&E loops.
Offices of Violence Prevention (OVP) Toolkit (PDF)
Blueprint for establishing and running local violence prevention offices with infrastructure, roles, and evaluation.
Community Safety Toolkit (Safety & Justice Challenge) (PDF)
Community-driven safety planning: concepts, indicators, engagement methods, and priority alignment.
National Neighborhood Watch Manual (PDF)
Structured neighborhood coordination, observation/reporting patterns, meetings, and sustainment mechanics.
Our Spirit Toolkit (web)
Indigenous-led community safety approach; designed for real-world missing-person and corridor risk conditions.
UNODC Crime Prevention Guidelines Handbook (PDF)
High-level prevention and safety architecture; useful for formalizing local safety strategy without militarization.
Event & mass-gathering security
Tools for planning security at gatherings, religious sites, schools, and community spaces—focused on layered, practical measures.
CISA Mass Gathering Security Planning Tool (PDF)
Framework + checklists for event planners: venue characteristics, planning steps, and protective measures.
CISA Physical Security Performance Goals (Faith-Based) (PDF)
Baseline measures for houses of worship and faith-based facilities: planning, access control, surveillance, response.
CISA K-12 School Security Guide (PDF)
Systems-based methodology for layered physical security planning in schools: detection, delay, and response.
CISA Active Shooter Emergency Action Plan (Guide) (PDF)
Preparedness and response planning framework: roles, communications, drills, and recovery considerations.
Incident intelligence & reporting
Systems for capturing incident data, analyzing patterns, and turning observations into preventive action.
SIIM Handbook (PDF)
Incident reports, taxonomy, analysis templates, decision questions, and organizational feedback loops.
CDC Cardiff Model Toolkit (PDF)
Collect and combine health + law enforcement data to locate hotspots and target interventions.
Public Health Implementation Guidance (Cardiff Model) (PDF)
Practical implementation guidance (capacity, barriers, governance) for agencies adopting Cardiff-style partnerships.
Institutional & critical infrastructure patterns
Overbuilt institutional frameworks contain reusable patterns for layered physical security, assessment, and resiliency design.
FEMA 426 / BIPS 06 (PDF)
Protective design methods + vulnerability assessment checklists; foundational for facility hardening patterns.
FEMA 452 (PDF)
Risk assessment methodology to prioritize mitigations and justify spending decisions.
FEMA 430 (PDF)
Site and urban design patterns: perimeter, approach control, and stand-off strategies.
VA Physical Security & Resiliency Design Manual (PDF)
Deep patterns for entry control, glazing, blast considerations, and facility security planning.
APPA Physical Security Resources (page)
Utility-focused physical security resources (critical infrastructure hardening patterns).
ASIS: Protection of Assets — Physical Security (paid reference)
Professional reference volume (PSP-aligned) for physical protection systems and program design.
Why include a paid source
- Many “free” sources summarize. This volume is a deep professional consolidation used for certification and program execution.
- For low-trust environments, extract methodology and systems thinking, not institutional ideology.
CISA K-12 School Security Guide (PDF)
Detection–delay–response logic and layered measures are reusable for many facility types (not just schools).
Evidence & prevention architectures
Evidence filters to avoid “security theatre,” plus prevention packages that scale community safety without militarization.
WHO Violence Prevention: The Evidence (PDF)
Evidence summaries for prevention strategies—use as a sieve for local programs and funding priorities.
INSPIRE (PDF)
Seven strategy package for ending violence against children: safe environments, norms, services, and education.
CDC Cardiff Model Toolkit (PDF)
Data-driven violence prevention architecture: convert injury data into targeted interventions.
OVP Toolkit (PDF)
Institutionalizes prevention capacity at city/county level with defined roles and evaluation loops.
Adversary doctrine (pattern-stealing)
Overbuilt state and professional doctrine contains reusable methods for assessment, deterrence, and layered protection—without adopting the politics.
DHS Active Shooter: How to Respond (PDF)
Plain-language response doctrine for public settings; pairs with CISA EAP materials.
FEMA 426 / BIPS 06 (PDF)
Threat modeling + vulnerability checklists + protective design patterns (standoff, glazing, entry control).
FEMA 452 (PDF)
Assessment methodology that can be repurposed for compounds, community sites, and critical assets.
CISA Faith-Based Physical Security Performance Goals (PDF)
Low-cost baseline practices; useful as a “security minimums” checklist for community sites.
UNODC Crime Prevention Handbook (PDF)
Policy-level crime prevention guidance; good for designing community safety programs that avoid coercive drift.
ASIS Protection of Assets — Physical Security
Professional physical security “sourcebook” used by practitioners for design and program implementation.
Offline mirroring checklist
Convert this atlas into a local “vault” for low-connectivity environments: download, hash, print, and store redundantly.
Mirror plan (practical)
A simple method to keep the pack usable when links rot or networks fail.
Checklist
- Download PDFs (Quick-Start Pack first).
- Store in two physical locations (primary + offsite).
- Export a printed “index” page with filenames and short descriptions.
- Optionally compute file hashes (SHA-256) and store alongside the index.
Local structure (suggested)
Folder naming that matches this atlas’s sequencing.
Folders
01_Risk_Management02_Personal_Family_Safety03_Site_Hardening_CPTED04_Community_Safety_Teams05_Events_Mass_Gatherings06_Incident_Intelligence07_Institutional_Patterns08_Evidence_and_Prevention
Document notes
Metadata, update notes, and constraints.
Built as a single-file HTML page with embedded CSS and small JS helpers. Intended for offline use and local sharing.
Last compiled: 2026-03-05
Safety note: This atlas avoids weapon instruction and offensive tactics. It focuses on prevention, deterrence, hardening, situational awareness, and crisis management.