Maturing Your Physical Security Program Starts with Foundational Governance

Written by
Tim Leroux
Published on
May 14, 2025

First Things First: Maturing Your Physical Security Program Starts with Foundational Governance

Corporate Security Advisors has assessed numerous hospital and healthcare systems’ security programs over the past few years, and several critical trends have emerged. One of the most basic and most common deficiencies is a lack of clear foundational governance.

Quite understandably, hospitals and healthcare organizations have historically not been built with security as a top-of-mind consideration. At many hospitals, long-tenured staff can remember when security was merely a single uniformed officer sitting in the main lobby. However, our hospitals and clinics have become more dangerous over the past decades, and many security programs have grown apace. High-profile incidents, including hospital-based shootings, targeted attacks, and internal security breaches, are no longer unthinkable—they are part of the healthcare risk landscape.

As a result of these emerging trends and the never-ending pace of healthcare operations, security programs have, in most cases, evolved in a reactionary manner without a clear vision or a rational, documented governance framework.

Governance Begins at the Top

Two critical governance cornerstones often missing even in large, high-performing healthcare systems are a codified organizational structure and a charter-type document specifically tailored to the security program.

The organizational structure is critical in identifying the lines of responsibility and authority for the security program. The executive risk-owner (e.g., CEO) should designate, in writing, who “owns” the security function, must ensure that the necessary authority and resources are provided to the responsible party, and must be kept appraised of the security posture of the organization.

In many healthcare organizations, the responsibility for physical security resides too low in the organizational hierarchy, which often results in an immature and under-resourced security program. In the past, Security was often treated as an add-on to other departments, such as Facilities, Safety, or Risk. While this approach may have made sense during simpler times, this legacy, fragmented approach now leaves institutions exposed—not only to physical harm, but to reputational, financial, and legal consequences.

Once the organizational structure is clarified, the responsible parties should draft a charter or overarching policy for the Security function. Such a document should include:

  • Security Department’s Mission Statement and Vision
  • Roles and Responsibilities and Key Tasks
  • Performance Metrics
  • Risk Management Processes
  • Operational Rhythm

An impactful Mission Statement describes the department’s ‘what and why’ and is truly the foundation of the security program. A typical Security Department Mission Statement clarifies that the Security Department’s role is to implement risk-rational and culturally aligned security controls to protect people, property, assets, interests and brand with the goal of maintaining an environment conducive to providing world-class healthcare.

While that may seem intuitive, it’s important to codify. When asked, it’s not uncommon for security leaders to be unable to clearly articulate their program’s reason for existence. Answers like this include:

“My mission is to deter crime.”

“My mission is to enforce hospital policies.”

“We observe and report to keep people safe.”

While all of those may be true, they do not articulate the true overarching purpose and core-value-alignment that are hallmarks of a well-crafted mission statement.

The Roles and Responsibilities/Key Tasks section is a vital part of the charter document, as it clearly defines what the security team is—and is not—accountable for. Healthcare leaders must articulate the boundaries of security’s scope by identifying the functions the team fully owns, those in which they are integrated partners, and those where they provide support. A practical framework for this delineation is: “Owned, Integrated, Supporting.” For example, an organization:

  • Owns: Access Control, Executive Protection, Security Technology, Alarm Monitoring
  • Integrates: Cybersecurity, Risk Management, High-Risk Patient Operations, Infant Security
  • Supports: Investigations, Diversion Prevention, Privacy

The security department charter document should also articulate the Key Performance Metrics for the security program. The charter document doesn’t necessarily need to set the Specific, Measurable, Achievable, Relevant, and Time-bound (S.M.A.R.T.) objectives for metrics, but it should at a minimum lay out the items to be measured. Some security professionals advocate for aligning with the corporate metric scorecard. While that may be an effective technique, we advocate for aligning with corporate goals and cultural alignment across four broad categories of metrics:

  • Security spending
  • Security incidents
  • Staff/Provider perceptions of security
  • Risk Quantification

Risk Management is such a critical function of the security department that it warrants a dedicated section in the charter document. It is arguably at the core of the security team’s mission. This section should outline the methodology used to identify, evaluate, and prioritize the risks the security team is responsible for mitigating. Because these risks evolve over time, the charter should also define a regular review and update process to ensure continued alignment with the organization's risk landscape.

Additionally, the risk management section should detail the security controls that are required, authorized, or prohibited along with the rationale behind these designations. For example, in some jurisdictions such as the U.K., certain types of video surveillance, including audio recording in public areas, may be restricted or outright prohibited under privacy regulations. Lastly, clarify how the security function integrates into the broader Enterprise Risk Management (ERM) program.

Operational Rhythm is a final section that belongs in any departmental charter. The Operational Rhythm would describe when and how often critical security tasks are performed, how often different controls are audited, and when and to whom security reports should be presented.

Conclusion

Having a documented and published security structure and charter is, of course, only the beginning.  In addition to these governance “who,” “what,” and “why” cornerstones, the hospital or healthcare system must develop and publish policies, standards, training materials, and job aids that flesh out the details of “how” the security function operates. Firmly establishing a clear governance structure will help avoid the creation or continuation of healthcare security programs that are reactionary, unaligned, and sometimes even counterproductive.

--

Tim Leroux is a security and risk management expert with a distinguished, 30-year track record of leading teams to solve a wide range of problems in all kinds of conditions across multiple industries.  A proven leader in healthcare security and risk management, he has extensive experience guiding large organizations through enterprise-wide assessments and safety initiatives.  Tim has held senior roles at Sutter Health and Kaiser Permanente, where he helped shape programs that protect patients, staff, and facilities.

Download ButtonVideo thumbnail

Speak to a Security Expert

Enter your information below to speak to a security expert on our team.

* Required Field
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Resources and insight

Related articles

Browse, read and learn about our related security resources and services.

Image representing resource topic
Article

Maturing Your Physical Security Program Starts with Foundational Governance

Many healthcare security programs have developed reactively, lacking clear governance structures that align with modern risk realities. Establishing foundational governance—through defined organizational ownership, a formal charter, and aligned risk management practices—is essential to maturing these programs and protecting people, assets, and reputation.
Image representing resource topic
Article

Supplemental Security Assessments in Healthcare

The annual comprehensive security risk assessments required by various laws, regulations, and compliance bodies are essential components of a healthcare security program. However, leading and lagging indicators can arise anytime, signaling that a supplemental security review is appropriate or urgently needed. This article explores the key signals to watch for to keep your security program in alignment with your ever-evolving care environment.
Image representing resource topic
Article

Using Counterintelligence to Protect the Cyber – Physical Gap

The recent Wall Street Journal article, “U.S. Secret Service, CISA Host Cybersecurity Training for Critical-Infrastructure Directors” (Rundle, 2024), highlighted the need to understand the often-overlooked network penetration risks that exist beyond standard cybersecurity protection tools and methods.