Skip to Content
TS-RDC-07 Trust & Stewardship Risk, Data & Compliance CORE Compliance v2.9.7

On-site security governance

Evaluates the framework for managing physical security risks, fulfilling the Amānah to protect life (Ḥifẓ al‑Nafs) and property. This proactive governance builds stakeholder confidence, ensures operational resilience, and safeguards all individuals and assets within the organization's premises. Scope includes all premises under the charity’s control (including entrances/exits, prayer halls, classrooms, offices, car parks, storage rooms, and any on-site events/peak services), and interfaces with safeguarding, H&S, and data protection (CCTV/access logs).

KPI / Measure
MetricSecurity Performance Index
TargetVarious
FrequencyQuarterly
MethodComposite: Drill times, Training % (>95%), Action closure (<90d), Incident trends.
UnitComposite
Maturity Levels
Level 1: Initial/Ad-hoc

On-site security measures are informal, ad-hoc, and primarily reactive to incidents. There are no documented policies or assigned responsibilities.

Level 2: Developing

Basic security policies and procedures (e.g., access control, visitor logs) are documented. Responsibilities are assigned, but implementation is inconsistent and lacks a formal governance structure.

Level 3: Established

A formal on-site security governance framework is established and consistently implemented. Regular physical security risk assessments are conducted, and mitigation plans are tracked. Staff receive basic security awareness training.

Level 4: Advanced

The security governance framework is integrated with the organization's overall risk management and business continuity strategies. Technology is effectively used for surveillance and access control, and performance is measured against defined metrics. Continuous improvement processes are in place.

Level 5: Optimizing

A proactive, forward-looking security culture is embedded throughout the organization, reflecting the principles of Amānah and shared responsibility. The organization uses intelligence-led planning and regular drills to anticipate threats, setting a benchmark for excellence in protecting life and property.

Applicability

Organisation Types

mosque-prayer-space islamic-center community-center charity-relief humanitarian-aid zakat-sadaqah-body islamic-school-madrasa educational-institution supplementary-school islamic-university-college youth-organization womens-organization student-islamic-society advocacy-campaign-group umbrella-organization representative-body media-publication islamic-broadcasting professional-association trade-body sports-recreation arts-culture healthcare-service counselling-mental-health elderly-care funeral-service bereavement-support certification-body standards-organization restaurant butcher-meat-supplier food-manufacturer catering-service bank finance-provider investment-fund insurance-provider accountancy-firm advisory-consultancy legal-practice bookstore-retail fashion-retail ecommerce-platform private-school training-provider private-healthcare-clinic counselling-practice general-enterprise social-enterprise community-interest-company

By Organisation Size

SizeApplicabilityNotes
Micro exempt Formal RACI matrices, SMT escalation, and dedicated roles (DPO, Site Manager) are highly disproportionate for volunteer-run groups.
Small partial Requires basic physical security risk assessments and a simple policy, but complex RACI and out-of-hours cover are scaled down.
Medium partial Needs documented policies and risk assessments; however, role mapping can be consolidated as they may lack a distinct SMT or dedicated DPO.
Large full
Major full

Applicable When

  • The organization has physical premises where people are present.
  • The organization has assets (physical or intellectual) to protect on-site.

Not Applicable When

  • The organization operates entirely remotely and has no physical presence.
  • The organization has no assets to protect.

Discussion (1)

Administrator 2026-03-07 11:07:51.977657

📋 **Version updated: 1.0.0 → 2.9.7** **Changes:** Updated islamic_references from mizan-297.json

Sign in to post a comment.