Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Physical Security
  4. Bombing Prevention
  5. Protective Measures
Share:
Blue background design

Protective Measures

Determine best practices to identify risks and vulnerabilities to mitigate Improvised Explosive Device (IED) threats to critical infrastructure.

Bombing Prevention

  • Bomb Threats
  • Suspicious Activity and Items
  • IED Awareness
  • Protective Measures
  • Planning and Preparedness

What to Do: Protective Measures

Understanding Protective Measures

Having general knowledge to identify risks and vulnerabilities of facilities, venues, and event locations is vital to mitigating potential Improvised Explosive Device (IED) threats. Protective measures are used to control risk and reduce the likelihood of such an event. 

Site-specific protective measures prevent perpetrators from accessing intended target sites and protect people and assets should attacks occur. These measures may also deter potential perpetrators from considering attacks against protected sites because of the challenges that they present. 

Read more
Protective Measures Strategies

Protective measure tools are especially valuable as proactive approaches at special events and public gatherings for facility owners/operators and public safety officers. 

The implementation of protective measures is organized around the five “Ds” of security: 

  1. Deter – systems that cause someone to not enter an area (signage indicating the presence of a K-9). 
  2. Detect - systems designed to identify an unauthorized person/thing in a protected area (cameras, intrusion detection systems). 
  3. Delay - systems designed to slow down a person’s access to an area (fences).
  4. Deny - designed to refuse or grant a person access to an area (fences with razor wire, high walls). 
  5. Defend - the ability to interrupt and/or neutralize a potential threat as it attempts to exploit a vulnerability or breach a security measure (counter UAV measures, security with authority to apprehend, firewalls within cybersecurity systems). 

Different facilities/venues require different protective measures for effective action. These actions may include but are not limited to monitoring the situation, monitoring for suspicious behaviors, limiting access to critical areas, or conducting a security search or sweep.

Read more
Protective Measures Recommendations

By prioritizing these recommendations, facility owners, operators, and public safety officers can significantly reduce the likelihood of successful attacks and better protect people and assets from potential IED threats.

  • Review or conduct vulnerability assessments of potential targets and prioritize physical security efforts. Analysis should weigh benefits, potential impacts to facility operations, and acceptable costs. 
  • Include subject matter experts in blast effects, such as engineers and other professionals, on planning teams. Blast-experienced professionals are accustomed to considering the effects of explosions on structures. These professionals will be able to assist planners with identifying blast-sensitive requirements and developing and implementing IED-specific protective measures. 
  • Ensure sites maximize standoff. The primary strategy for preventing, protecting against, and mitigating explosive threats is to keep explosive devices as far away as possible, known as maximizing standoff distance. Protective measures that provide standoff distance include physical and natural barriers that prevent IEDs from getting close to buildings and people. This may include vehicle checkpoints and barriers, pedestrian entry control points or screening lines, and mail screening facilities. 
  • Ensure sites provide a layered defense. A defense that relies on multiple consecutive layers of protective measures around an asset mitigates manmade threats, including use of IEDs. Layers are mutually independent and designed to reduce the effectiveness of an attack by forcing attackers to penetrate and overcome each security layer. 
  • Incorporate blast-resistant features and materials into new and existing sites. In situations where sufficient standoff distance or layered defense is not achievable, structural hardening and use of blast-resistant features and materials is particularly important. 
  • Develop plans for deploying temporary protective measures. High or elevated-risk sites may consider deploying assets to extend standoff distance or screen for explosives and IEDs. Additional temporary protective measures include maximizing standoff and layering defense by adding temporary outer, middle, or inner security perimeters to address vehicle, personnel, and item access. 

The deployment of these measures should be informed by thorough vulnerability assessments and involve experts in blast effects to ensure that protective strategies are both practical and effective. Maximizing standoff distance, providing layered defenses, incorporating blast-resistant features, and planning for temporary protective measures are all critical components in safeguarding against explosive threats.

Read more

Training

Access training courses on how to identify risks and vulnerabilities to mitigate IED threats to critical infrastructure.

For more information about the Office for Bombing Prevention (OBP) Training Program and the types of courses we offer, visit the OBP Training page. 

Learn More

Training icon for Virtual-Instructor-Led Training course

IED Explosive Effects and Mitigation Course (AWR-337)

CUSTOMIZABLE | VIRTUAL/ONLINE
Introduces the effects of an explosive detonation and details the difference between blast, thermal/incendiary, and fragmentation effects, and describes the consequences on various targets.
Register
Training icon for Virtual-Instructor-Led Training course

Protective Measures Awareness Course (AWR-340)

CUSTOMIZABLE | VIRTUAL/ONLINE
Introduces how to identify and mitigate facility security gaps. It provides an overview of risks, the DHS Risk Management Process, and types of protective measures, and considerations for selecting protective measures to mitigate risk.
Register
Training icon for in-person training course

Protective Measures Course (PER-336)

CUSTOMIZABLE | IN-PERSON
Provides participants the foundational knowledge to identify risks and vulnerabilities to a facility, venue, or event and identify various types of protective measures to mitigate an IED threat.
Request Training
Training icon for in-person training course

VBIED Detection Course (PER-312)

CUSTOMIZABLE | IN-PERSON
Provides participants with the knowledge and skills to inspect for, identify, and/or respond to vehicle-borne explosive threats successfully and safely.
Request Training

Products

Learn to identify risks and vulnerabilities to mitigate IED threats to critical infrastructure.

View All Protective Measures Products
One Page Icon

Suspicious UAS Identification Poster and Postcard

PUBLICATION
The Suspicious UAS Identification Poster and Postcard explain how UAS are used for a range of tactical and recreational uses but can also be used for nefarious purposes. UAS can be turned into or carry IEDs that cause serious harm to individuals and infrastructure.
View Files
One Page Icon

VBIED Identification Card

PUBLICATION
The VBIED Identification Card provides information to help recognize potential indicators of a suspicious parked vehicle. It details steps to take if the vehicle is suspicious or if it is not suspicious.  
Download File (PDF, 4.62 MB)
Book Icon

Vehicle Inspection Guide

PUBLICATION
The Vehicle Inspection Guide demonstrates a thorough, systematic, effective, and safe procedure for inspecting vehicles for components of explosive devices.
View the Guide
Video Icon

Vehicle Inspection Video

VIDEO
The Vehicle Inspection Video demonstrates a thorough, systematic, effective, and safe procedure for inspecting vehicles for components of explosive devices.
Watch the Video
View All Protective Measures Products

Tools/Services

Leverage tools and services to assist with identifying risks and vulnerabilities to mitigate IED threats to critical infrastructure.

A photo of a hybrid working environment

Counter-Improvised Explosive Device (C-IED) Capability Assessments (CCA)

INCREASE YOUR RESILIENCE, SHARED SERVICE, RESPOND TO AN INCIDENT, SHARE INFORMATION, ASSESS YOUR RISK LEVEL, DEVELOP PARTNERSHIPS, OTHER
Contact: OBP@cisa.dhs.gov
CCA assessments evaluate and analyze public safety agencies and entities in a methodological assessment process. The assessment determines the specific capabilities and activities to best address IED risks and resources gaps found during the assessment process.
Foundational, Intermediate, Advanced, Other
Example image of EBM assessment

Explosive Blast Modeling (EBM) Assessment

INCREASE YOUR RESILIENCE, SHARED SERVICE, SHARE INFORMATION, ASSESS YOUR RISK LEVEL, DEVELOP PARTNERSHIPS
Contact: EBM@cisa.dhs.gov
EBM assessments use current blast modeling technologies and tools to provide a physics-based, 3D-model used for anti-terrorism and force protection against IED attacks.
Foundational, Intermediate, Advanced
An illustration that says TRIPwire

Technical Resource for Incident Prevention (TRIPwire) Portal

SERVICE
TRIPwire is DHS' online, collaborative information-sharing and resource portal for bomb squads, emergency responders, military personnel, government officials, intelligence analysts, private sector security professionals, and critical infrastructure owners and operators.
TRIPwire Logo

TRIPwire

To access more bombing prevention resources, visit the Technical Resource for Incident Prevention (TRIPwire). TRIPwire is an online, collaborative information-sharing and resource portal designed to help prevent improvised explosive device incidents.

Learn More

Contact

To report suspicious activity, call 9-1-1 or contact local law enforcement.

For additional information about OBP resources, please contact your local Protective Security Advisor (PSA) or OBP directly at OBP@cisa.dhs.gov.

Informed, alert communities play a critical role in keeping our nation safe. Everyone has a responsibility to protect our nation—"If You See Something, Say Something."

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback