Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative.
In accordance with the requirements of MOHURD Notice on printing and distributing the development and revision plan of engineering construction standards and specifications in 2015 (JIAN BIAO [2014] No. 189), this standard is jointly revised based on GB 50348-2004 Technical code for engineering of security and protection system, which was developed by the drafting team through extensive investigation, careful summarization of practical experience, reference to relevant international standards and foreign advanced standards and on the basis of widely solicited opinions, by First Research Institute of the Ministry of Public Security of PRC, Science and Technology Informatization Bureau of the Ministry of Public Security of PRC and other relevant organization.
The standard includes 12 clauses with the main contents as following: general provisions, terms, basic requirements, planning, engineering construction planning, engineering design, engineering construction, construction supervision, engineering inspection, engineering acceptance, system operation and maintenance as well as consultation service.
Main technical contents revised in this standard are as follows:
1. On the basis of the previous edition, the following content is added: risk protection planning, system configuration planning, personnel protection planning, physical protection design as well as engineering construction procedures, supervision, operation & maintenance and consultation service;
2. The design of security engineering for high and general risk objects in previous edition is deleted, and the content of the standard is targeted to the general requirements of security engineering construction and system operation and maintenance.
The provisions printed in bold type in this standard are compulsory and must be enforced strictly.
The Ministry of Housing and Urban-Rural Development of the People's Republic of China is in charge of the administration of this standard and the explanation of the compulsory provisions; First Research Institute of the Ministry of Public Security of PRC is responsible for the explanation of specific technical contents. The relevant revisions and supplements, whenever necessary, can be posted or passed on to the First Research Institute of the Ministry of Public Security of PRC (Address: No.1, South Road, Capital Gymnasium, Haidian District, Beijing; postal code: 100048; Tel: 0086-(0)10-68773938; Fax: 010-68773960; Email: tc100sjl @ 263 net) for future reference.
Technical standard for security engineering
1 General provisions
1.0.1 This standard is developed with a view to regulating security engineering construction procedure as well as engineering design, construction, supervision, inspection, acceptance, operation, maintenance and consultation services, improve the security engineering construction quality and system operation and maintenance level, protect personal and property safety and social safety and maintain social stability.
1.0.2 The standard is applicable to construction and system operation and maintenance of the security engineering of constructed, extended and renovated buildings (structures).
1.0.3 The construction of security engineering shall be incorporated in the overall planning of the engineering construction and, according to the use function, security management requirements, construction investment, etc., simultaneously implemented and independently inspected for acceptance.
1.0.4 The construction of security engineering shall organically combine personnel protection, physical protection and electronic security so as to construct comprehensive prevention and control system meeting security management requirements and possessing corresponding risk prevention capabilities through scientific and reasonable planning, design, construction, operation and maintenance.
1.0.5 Security system shall be of security, reliability, maintainability and extendibility, with advanced technology and economic applicability.
1.0.6 Security engineering involving special fields like national security and state secrets shall be constructed by making strict the security access mechanism and selecting safety-controlled products and equipment and professional design, construction and service teams meeting the requirements according to relevant management requirements.
1.0.7 Construction of security engineering must comply with relevant national laws and regulations.
1.0.8 The construction of security engineering shall comply with those specified in both this standard and current relevant standards of the nation.
2 Terms
2.0.1
security
preventing and delaying intrusion, theft, robbery, destruction, explosion, violent attack and the like by comprehensively using multiple means like personnel protection, physical protection, electronic security, etc.
2.0.2
personnel protection
security management behaviors like organized prevention and disposal performed by personnel with corresponding quality
2.0.3
physical protection
physical protection means for delaying or preventing risk events from occurring by making use of building (structure), screen, appliance, equipment or combination thereof
2.0.4
electronic security
protection means for improving the detection, delay and response capabilities by making use of technologies like sensing, communication, computer, information processing and control as well as biometric feature recognition
2.0.5
security system
protection system with a view to achieving security by comprehensively using technologies such as physical protection, electronic protection, etc.
2.0.6
security engineering
construction projects implemented with a view to establishing security system
2.0.7
physical protection system
physical system with a view to realizing security by comprehensively using natural barrier, artificial barrier, and appliances and equipment like anti-theft lock/cabinet
2.0.8
electronic protection system
system with a view to realizing security by using various electronic equipment, which usually includes subsystems for intrusion and hold-up alarm, video surveillance, access control, security management in parking lots, anti-explosion security inspection, guard tour, building intercom, etc.
2.0.9
intrusion and hold-up alarm system (I&HAS)
electronic system detecting unauthorized access or attempt of unauthorized access into protected area using sensor technology and electronic information technology and, when emergent alarm device is triggered by user, sending out and processing alarm information
2.0.10
video surveillance system (VSS)
electronic system that uses video technology to detect and monitor the surveillance area and to display and record in real time the onsite video images
2.0.11
access control system (ACS)
electronic system recognizing objects going through entrance and controlling the open/close of entrance actuator through customized symbol recognition, (or) biological feature and other mode
2.0.12
security management system in parking lots
electronic system for realizing comprehensive management of registration and supervision of personnel and vehicles going in/out of parking lots as well as of the security of personnel and vehicles in parking lots
2.0.13
anti-explosion security inspection system
electronic system for detecting explosives, weapons and/or other prohibited goods carried by personnel and vehicles or carried secretly in articles and/or alarming
2.0.14
guard tour system
electronic system that manages and controls the inspection routes, mode and processes of patrol personnel
2.0.15
building intercom system
electronic system that confirms visitors via (visual) intercom mode so as to control and manage the visitors at the entrance of building (complex), also known as visitor intercom system
2.0.16
security management platform (SMP)
combination of hardware and software integrating the subsystems of the security system and related information systems and therefore organically linking physical protection system, electronic protection system and personnel protection resource, centralized processing, sharing and applying information, comprehensively studying and judging risk events, commanding and dispatching event handling, as well as uniformly managing, operating and maintaining system and equipment
2.0.17
protected object
object which shall be protected for it is faced with risks, including unit, building (structure) as well as parts, areas and specific object inside and outside of them
2.0.18
high risk protected object
key units that determined in accordance with laws for security defense and key objects for preventing terrorist attacks
2.0.19
defensing object
object which threats the protected object and for which defense is needed
2.0.20
risk
potential security hazard existing in the protected object itself and the possible threats the protected object may suffer, including intrusion, theft, robbery, destruction, explosion, violent attack and the like
2.0.21
risk assessment
process confirming the risks that shall be defended for security system through risk identification, risk analysis and risk appraisal
2.0.22
level of risk
magnitude of a single risk or combination of risks that exist in and around the protected object and poses a threat to its security, expressed as a combination of consequences and possibilities
2.0.23
level of protection
level of precaution measures taken to guarantee the security of the protected object
2.0.24
security grade
ability level of security systems and equipment to counter different attacks
2.0.25
detection
perception of explicit risk event and/or implicit risk event
2.0.26
delay
extending or (and) postponing the progress of a risk event
2.0.27
response
action taken to address the occurrence of a risk event
2.0.28
false alarm
alarm sent out in response to an undesigned event
2.0.29
leakage alarm
condition in which no alarm response is given to the designed alarm event
2.0.30
perimeter
area boundary of a protected object
2.0.31
zone
part of protection area where intrusion and hold-up alarm system (I&HAS) may detect intrusion or where the emergency alarm device is manually triggered
2.0.32
surveillance area
site space range corresponding to the image taken by the video capture device of the video surveillance system (VSS)
2.0.33
controlled area/protected area
spatial area enclosed by physical boundaries and corresponding to one or more access control points of the access control system
2.0.34
longitudinal-depth protection
protection measures for setting up successive lines of defense from outside to inside, or vice versa, for the whole protected area according to the environmental conditions where the protected object is located in and the security management requirements, which is divided into overall longitudinal-depth protection and partial longitudinal-depth protection
2.0.35
balanced protection
security protection level of each part of the security system basically being the same, without obvious weak link
2.0.36
surveillance center
central control room that receives and processes security system information, handles alarm events, and manages and controls system equipment and which is usually divided into guard area and equipment area
2.0.37
system operation
process conducting safety activities like alarm event handling, video surveillance and access control through security system
2.0.38
system maintenance
maintenance activities conducted to ensure the normal operation of the security system and continuously exert the security effectiveness
2.0.39
system effectiveness evaluation
process of analysis and evaluation on the extent to which the security system meets the expected effectiveness
3 Basic requirements
3.0.1 Full life cycle management and overall planning shall be conducted for security engineering construction and system operation maintenance. The engineering construction and system operation and maintenance shall be carried out by following the engineering construction procedure and requirements and in a planned and step-by-step way by determining the goal of each stage.
3.0.2 The security engineering construction shall follow the following principles:
1 Technical protection, physical protection and personnel protection shall be combined and detection, delay and response shall be coordinated;
2 The protection level of the protected object shall be suitable for the risk level;
3 The security level of the system and equipment shall be suitable for the defensing object and its means of attack;
4 Longitudinal-depth, balance and anti-damage requirements for the protection shall be met;
5 Security and reliability requirements of the system shall be met;
6 Electro-magnetic compatibility and environmental adaptability requirements of the system shall be met;
7 Real-time performance and original integrity requirements of the system shall be met;
8 Compatibility, expandability and maintainability requirements of the system shall be met.
9 Economy and suitability requirements of the system shall be met.
3.0.3 Risk protection planning, system configuration planning and personnel protection planning shall be carried out for security engineering construction. A safe, controllable, open and shared security system shall be constructed by determining the risks that need to be defensed through risk assessment, taken into account the personnel protection capability, and reasonably selecting physical protection and electronic security.
3.0.4 Equipment and materials used in security engineering must meet national laws and current relevant standards of the nation and shall be subjected to test or certification.
3.0.5 In stages like construction, preliminary acceptance and commissioning, supervision organization should be hired to carry out engineering supervision.
3.0.6 Security engineering for high risk protected object shall be subject to engineering inspection. The engineering inspection shall be carried out by an inspection agency with security engineering inspection qualification and the inspection capability within the authorized scope of qualification.
3.0.7 Security engineering, after being completed, shall be subject to independent or special acceptance.
3.0.8 The development (using) organization of security system shall establish guarantee system and long-term mechanism for system operation and maintenance, guaranteeing the normal operation of security system and continuously exerting the security effectiveness.
3.0.9 During the operation of security system, the development (using) organization should carry out risk assessment and system effectiveness evaluation combining with the security demand and system usage condition.
3.0.10 Professional consultation service mechanism should be introduced in within the full life cycle of security engineering construction and system operation and maintenance.
4 Planning
4.1 Risk protection planning
4.1.1 For security engineering construction, the protected object and its security requirements shall be determined, and the following shall be met:
1 The determination of protected object shall take into account protected unit, protected position and/or area and protected target; protection target is classified into articles, personnel and system and/or equipment and/or parts to be protected;
2 The security demands of the protected object shall be analyzed and determined according to the demands of public security prevention and terrorism prevention.
4.1.2 For the security engineering construction, the specific risks need to be defensed shall be determined according to the security demands of the protected object through risk assessment, with at least the following covered:
1 Identification shall be carried out for various types of risks that may pose a threat to the protected object by combining the current internal and external environmental conditions and security capability;
2 Analysis shall be carried out on the possibility of the occurrence of the identified risks and the severity of the consequences ( including losses and adverse influence);
3 The risk analysis results shall be compared with the pre-set risk criteria to conduct risk assessment and determine the level of various risks;
4 The risks need to be defensed through security engineering shall be determined according to the risk assessment results by combining the risk tolerance of the security engineering development (using) organization.
4.1.3 The security engineering construction shall target to the risks needing to be defensed and, according to the principle of longitudinal-depth protection and balanced protection, taking into account the personnel protection capability, coordinating and configuring the equipment and facilities for physical protection and electronic protection, protect the protected objects in aspects of unit, position and/or area and target and shall meet the following requirements:
1 The perimeter protection shall meet the following requirements:
1) Protection measures like physical protection and/or intrusion detection and/or video surveillance shall be reasonably selected according to the field environment and security management requirements;
2) The defense capability of different physical protection measures for different risks shall be considered;
3) The detection capability of different intrusion detection devices for different intrusion behaviors such as overtaking, crossing and digging and for the personnel protection response capability after intrusion detection and alarm;
4) The surveillance effect of video surveillance equipment for perimeter environment shall be considered; at least the activities of the personnel in the perimeter environment shall be seen clearly.
2 The entrance/exit protection shall meet the following requirements:
1) Protection measures like physical protection and/or access control and/or intrusion detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements;
2) The defense capability of different physical protection measures for different risks shall be considered;
3) The different identification technology types and the capability of preventing illegal intrusion (forcibly entering, tailgating, opening with technology, etc.) of the access control shall be considered;
4) The detection capability of different intrusion detection devices for different intrusion behaviors such as overtaking and crossing and for the personnel protection response capability after intrusion detection and alarm;
5) The surveillance effect of the video surveillance equipment on the entrance/exit shall be considered; generally, the facial features of the personnel and the license plate number of vehicles going in/out shall be clearly distinguished.
3 The channel and public area protection shall meet the following requirements:
1) Video surveillance shall be selected, with the surveillance effect being such that the conditions of personnel, articles and vehicles passing through shall be clearly seen and that the facial features of the personnel and the license plate number of vehicles at important points shall be clearly distinguished;
2) Intrusion detection and/or physical protection measures may be selected for channels and public areas around the high risk protected object.
4 The protection of important areas and positions such as surveillance center, financial room, water/electric/gas/heating equipment room shall meet the following requirements:
1) Protection measures like physical protection and/or access control and/or intrusion detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements;
2) Security doors and/or security windows shall be adopted for physical protection, other protection measures shall take into account the equipment type selected and its capability of preventing illegal intrusion, response time after alarming as well as the surveillance effect of video surveillance.
5 The protected target protection shall meet the following requirements:
1) Protection measures like physical protection and/or area intrusion detection and/or displacement detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements;
2) The corresponding physical protection measures shall be taken according to the specific conditions of different protected targets and the risks to be prevented;
3) Means of area intrusion detection, displacement detection and the like may be taken to detect and alarm in real time the conditions that a fixed target is approached or moved, with the personnel protection response capability after alarm considered;
4) Where video surveillance is adopted for protection, ensure that the protected target is continuously within the scope of monitoring, and the surveillance effect on the protected target and its area shall be considered. At the very least, it shall be able to see the protected target and the activities of personnel in the area. When the protected target is confidential or has privacy protection requirements, video surveillance shall meet the relevant provisions for confidentiality and privacy protection.
6 For personnel-intensive, large-flow entrances/exits, channels and other places, in addition to security protection measures, measures for personnel evacuation and guidance and express pass shall also be considered.
4.1.4 Where the protected object is determined to be a key target that shall be protected from terrorist attacks, protection measures shall be strengthened according to the specific demand for terrorist attack prevention, and the following requirements shall be met:
1 The perimeter protection shall take into account the joint arrangement of physical protection devices and electronic protection devices;
2 The protection of the entrances/exits and channels shall take into account the arrangement of anti-explosion security inspection equipment, passage gate, vehicle retention device, safety buffers or isolation zones;
3 Personnel-intensive public area protection shall consider the full coverage of video surveillance and the configuration of explosive disposal facilities and defense facilities;
4 The protection of important areas and positions such as surveillance center and water/electric/gas/heating equipment room shall consider the joint arrangement of physical protection devices and electronic protection devices;
5 The application of video image intelligent analysis technique and the special requirements of information storage time shall be considered;
6 The defense and countermeasures against unmanned aerial vehicle shall be considered;
7 Consideration shall be given to strengthening security system and its critical equipment security measures and redundancy measures.
4.2 System configuration planning
4.2.1 The security system configuration planning shall follow the principle of safe, controllable, open and sharing, taking uniform steps to consider subsystem composition, information resources, integration/networking mode, transport network, security management platform (SMP), information sharing application mode, storage management mode, system power supply, interface protocol, intelligent application, system operation and maintenance, system security and the like.
4.2.2 Subsystems of the security system shall be determined according to field investigation, risk protection planning and front-end defense organization condition and shall meet the following requirements:
1 Physical protection system, electronic protection system and security management platform (SMP) shall be designed, selected and arranged comprehensively;
2 Physical protection systems like artificial barrier and protective device (equipment) shall be designed, selected and arranged comprehensively according to field natural conditions, physical space and the like and by reasonably using natural barrier;
3 Electronic protection systems like intrusion and hold-up alarm system (I&HAS), video surveillance system (VSS), access control system (ACS), security management system in parking lots, anti-explosion security inspection system, guard tour system and building intercom system as well as units of subsystems including front-end, transmission, information processing/control/management and display/record shall be designed, selected and arranged comprehensively.
4.2.3 Various integrated and/or networked information resources shall be determined according to the demand of integrated management over security subsystems.
4.2.4 The following system integration networking methods shall be reasonably selected according to the actual needs of sharing and exchanging information resources as well as the complexity of the systems:
1 Simple linkage method realized by signal driving between different subsystem equipment;
2 Subsystem linkage method realized by communication between different subsystem management software;
3 Integrated method of controlling and managing in a centralized way the security subsystems and other subsystems through security management platform (SMP);
4 Cascading mode of large-scale and cross-regional security systems realized through the interconnection of multi-level security management platforms;
5 Comprehensive application mode of integrating and networking security system with other business systems according to the demands of security management.
4.2.5 Dedicated transmission network should be adopted for the security system, for which dedicated line mode or public transport network-based virtual private network (VPN) mode may be adopted. The transmission network should adopt a star/tree transmission network topology with the surveillance center as the tandem/core point (root node). The communication link of system transmission shall meet the needs of the system for information transmission, exchange and sharing. When the wired transmission is not available, a wireless transmission method with corresponding security measures may be adopted.
4.2.6 The specific functions of security management platform (SMP) shall be reasonably planned according to the actual demands for integration, networking and management of security system, with the relevant provisions in 6.4.1 of this standard met.
4.2.7 Client-side and/or branch platform shall be arranged according to the actual demands for information sharing application of security system. The planning and design of client-side and/or branch platform shall be carried out based on the system private transmission networks. Security management platform (SMP) may also realize information exchange and sharing through perimeter security isolation measures and security system and/or other business system constructed on the basis of other network environment.
4.2.8 Data storage management mode shall be reasonably planned according to the actual demands for information storage and management of security system.
4.2.9 Main power supply, standby power supply as well as the power supply mode and supporting measures shall be reasonably selected according to spatial distribution characteristics, power supply conditions and security assurance demands of security system and its equipment.
4.2.10 Various interfaces of system as well as information transmission, exchange and control protocols shall be planned and designed in an overall way according to specific requirements of security system, equipment interconnection and information sharing application.
4.2.11 Intelligent module design for security management platform (SMP) shall be carried out according to the actual demands of users on security system information and data deepening application, or intelligent application systems, including video intelligent analysis system, big data analysis system, etc., shall be separately planned and designed outside the security management platform (SMP).
4.2.12 The operation and maintenance module of security management platform (SMP) shall be designed according to the scale and complexity of the equipment the security system connects, or operation and maintenance platform (operation and maintenance system) shall be separately planned and designed outside the security management platform (SMP) so as to guarantee the normal operation of security system, equipment and network.
4.2.13 Integrated planning shall be made for the security policies of security system, and appropriate access equipment measures, data security measures, transmission network security measures as well as security isolation measures at perimeter of different networks shall be selected according to the relevant requirements of information security.
4.3 Personnel protection planning
4.3.1 Security engineering development (using) organization shall carry out personnel protection planning according to the principle of combination of personnel protection, physical protection and electronic security as well as coordination between detection, delay and response, comprehensively considering the capability of physical protection and electronic security as well as the demands of system normal operation and emergency disposal.
4.3.2 Security engineering development (using) organization shall reasonably arrange security personnel, system operation and maintenance personnel and other personnel as well as necessary equipment, facilities and outfits for protection and defense.
4.3.3 The number and location of personal, equipment, facilities and outfits shall meet the requirements of security system on operation, emergency response, site disposal and expected risk resistance.
4.3.4 The security management system shall be established and improved, and business process shall be optimized by combining the operation requirements of security system.
4.3.5 Emergency response plans shall be made separately targeted to various emergencies, and drilling shall be carried out periodically. The emergency response plan shall cover at least the events in question, personnel and division of labor, procedures and measures for disposal, use of equipment (facilities or outfits), target protection and personnel evacuation plan.
4.3.6 Technology and skills training mechanisms shall be established to ensure that personnel are competent for the corresponding posts.
5 Engineering construction procedure
5.1 General requirements
5.1.1 The construction procedure of security engineering shall be divided into several main stages including project approval, engineering design, engineering construction, engineering preliminary acceptance and commissioning, engineering inspection, acceptance and handover as well as system operation and maintenance.
5.1.2 The security engineering construction management shall be carried out in accordance with those specified in GB/T 50326 The code of construction project management.
5.2 Project approval
5.2.1 During the project approval of security engineering, project proposal shall be developed, putting forward the actual demands of security as well as project construction planning.
5.2.2 The feasibility study report shall be prepared after the approval of project proposal. The feasibility study report shall analyze, demonstrate and comprehensively evaluate the technical feasibility and economic rationality, be capable of providing investment decision-making basis for the security engineering construction, and it includes design descriptions, design drawings, main equipment lists, and project cost (investment) estimations.
5.3 Project design
5.3.1 Before the preliminary design of security engineering, the development organization shall organize to compile the design assignment according to the approved feasibility study report. The design assignment shall, in accordance with relevant national laws and regulations, standards and specifications as well as management application demands, make clear the engineering construction purpose and content, protected object and defensing object, security demand, risks to be defensed by the security engineering and functional requirements of security system.
5.3.2 The development organization shall determine the design organization in accordance with relevant laws and regulations.
5.3.3 Design organization shall, jointly with relevant organizations, carry out field investigation and prepare field investigation report which shall be confirmed by parties participated in the investigation.
5.3.4 The design organization shall, according to the design assignment, design contract and field investigation report, carry out preliminary design work and put forward the specific implementation scheme for achieving the project construction goal and meeting the security management requirements. The preliminary design documents shall include design descriptions, preliminary design drawings, main equipment and material lists as well as engineering estimates.
5.3.5 After the preliminary design of security engineering is completed, the project management organization shall organize experts to review the preliminary design scheme and provide review comments.
5.3.6 After the review on preliminary design scheme of security engineering is passed and confirmed by the project management organization, the design organization shall design the construction drawing according to the preliminary design scheme and review comments.
5.3.7 The construction drawing design documents shall meet the needs for procurement of equipment and materials as well as manufacture and construction of non-standard equipment. The construction drawing design documents shall include design descriptions, construction drawing design drawings, equipment material lists as well as engineering estimates.
5.3.8 After the construction drawing design is completed, the development organization shall, in accordance with policies and regulations, report the relevant data to the construction administration department for review. The data that shall be provided by the design organization to the review organization include documents and attachments that are served as the investigation and design basis and approved by relevant government departments, full set of construction drawings and other deliverables.
5.4 Engineering construction
5.4.1 After the construction drawing review is passed, the development organization shall determine the construction organization in accordance with relevant laws and regulations.
5.4.2 The detailed design shall, based on the construction drawing design documents which pass the review, review, check and revise the construction drawing design content, express in a quantified and accurate way the design contents as well as requirements of equipment, materials and processes, and detail the special requirements for construction party and construction operations.
5.4.3 Construction drawing design organization shall cooperate with the detailed design organization in understanding the system conditions and requirements and review the design drawings of the detailed design organization.
5.4.4 After the detailed design is completed, it shall be reviewed by the project management organization. After the review is passed, the detailed design organization shall submit all the detailed design documents.
5.4.5 Before the engineering construction, the design organization shall carry out design disclosure for construction organization and supervision organization.
5.4.6 During engineering construction, the construction organization shall order according to the technical index specified in detailed design document and construct according to construction content and construction process therein.
5.4.7 Pipeline laying, equipment installation, system debugging, etc. in the security engineering shall be implemented according to those specified in clause 7 of this standard.
5.4.8 During the engineering construction, the development organization may entrust the supervision organization with corresponding capability to supervise and manage the engineering construction. The engineering supervision shall be implemented in accordance with clause 8 of this standard.
5.5 Engineering preliminary acceptance and commissioning
5.5.1 The construction organization shall carry out technical training for related personnel in accordance with the engineering contract requirements. The training outline, course arrangement and training scheme shall be submitted to the project management organization for review and approval.
5.5.2 Should the engineering quality and system functional performance meet the requirements of engineering contract and design documents upon the self-inspection of construction organization, the project management organization, design organization and construction organization shall jointly carry out preliminary acceptance for the engineering, producing the preliminary acceptance report.
5.5.3 After the preliminary acceptance is passed and item rectification and re-inspection is completed, security system shall be put into commissioning for at least 30d. During the commissioning, construction organization shall cooperate with the project management organization in establishing management system for system operation and maintenance.
5.5.4 Should the system meet the requirements of the contract and design documents upon the commissioning, the project management organization shall issue a commissioning report according to the system operation condition and commissioning record during the commissioning.
5.6 Engineering inspection, acceptance and handover
5.6.1 After the security engineering is constructed and, upon the commissioning, meets the requirements of engineering contract and design documents, the construction organization shall prepare the completion report.
5.6.2 The construction organization shall prepare the completion documents according to detailed design drawings, drawing review records as well as documents for design change, engineering alternation and others. The completion documents shall be complete, accurate, true, signed and sealed, and consistent with the construction content.
5.6.3 For high risk protected objects and security engineering that shall be subject to engineering inspection in accordance with the requirements of relevant laws and regulations, engineering contract, etc., the inspection agency shall inspect the engineering quality and issue inspection report before engineering completion acceptance. The basis and procedure for the engineering inspection as well as inspection items, requirements and methods shall be as specified in clause 9 of this standard.
Foreword i
1 General provisions
2 Terms
3 Basic requirements
4 Planning
4.1 Risk protection planning
4.2 System configuration planning
4.3 Personnel protection planning
5 Engineering construction procedure
5.1 General requirements
5.2 Project approval
5.3 Project design
5.4 Engineering construction
5.5 Engineering preliminary acceptance and commissioning
5.6 Engineering inspection, acceptance and handover
5.7 System operation and maintenance
6 Engineering design
6.1 General requirements
6.2 Field investigation
6.3 Physical protection design
6.4 Electronical protection design
6.5 Integration and networking design
6.6 Safety design
6.7 EMC design
6.8 Reliability design
6.9 Maintainability design
6.10 Environmental adaptation design
6.11 Lightning protection and grounding design
6.12 Power supply design
6.13 Signal transmission design
6.14 Surveillance center design
7 Engineering construction
7.1 Construction preparation
7.2 Engineering construction
7.3 System debugging
8 Engineering supervision
8.1 General requirements
8.2 Construction preparation supervision
8.3 Engineering construction supervision
8.4 System debugging supervision
8.5 Engineering preliminary acceptance and system commissioning supervision
9 Engineering inspection
9.1 General requirements
9.2 System architecture inspection
9.3 Physical protection inspection
9.4 Electronic security inspection
9.5 Security, electromagnetic compatibility, lightning protection and grounding inspection
9.6 Inspection for power supply and signal transmission
9.7 Surveillance center and equipment installation inspection
10 Engineering acceptance
10.1 Organization of acceptance
10.2 Construction acceptance
10.3 Technical acceptance
10.4 Information review
10.5 Acceptance conclusion
11 System operation and maintenance
11.1 General requirements
11.2 System operation
11.3 System maintenance
12 Consultation service
12.1 General requirements
12.2 Consultation contents
Explanation of wording in this standard
List of quoted standards
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative.
In accordance with the requirements of MOHURD Notice on printing and distributing the development and revision plan of engineering construction standards and specifications in 2015 (JIAN BIAO [2014] No. 189), this standard is jointly revised based on GB 50348-2004 Technical code for engineering of security and protection system, which was developed by the drafting team through extensive investigation, careful summarization of practical experience, reference to relevant international standards and foreign advanced standards and on the basis of widely solicited opinions, by First Research Institute of the Ministry of Public Security of PRC, Science and Technology Informatization Bureau of the Ministry of Public Security of PRC and other relevant organization.
The standard includes 12 clauses with the main contents as following: general provisions, terms, basic requirements, planning, engineering construction planning, engineering design, engineering construction, construction supervision, engineering inspection, engineering acceptance, system operation and maintenance as well as consultation service.
Main technical contents revised in this standard are as follows:
1. On the basis of the previous edition, the following content is added: risk protection planning, system configuration planning, personnel protection planning, physical protection design as well as engineering construction procedures, supervision, operation & maintenance and consultation service;
2. The design of security engineering for high and general risk objects in previous edition is deleted, and the content of the standard is targeted to the general requirements of security engineering construction and system operation and maintenance.
The provisions printed in bold type in this standard are compulsory and must be enforced strictly.
The Ministry of Housing and Urban-Rural Development of the People's Republic of China is in charge of the administration of this standard and the explanation of the compulsory provisions; First Research Institute of the Ministry of Public Security of PRC is responsible for the explanation of specific technical contents. The relevant revisions and supplements, whenever necessary, can be posted or passed on to the First Research Institute of the Ministry of Public Security of PRC (Address: No.1, South Road, Capital Gymnasium, Haidian District, Beijing; postal code: 100048; Tel: 0086-(0)10-68773938; Fax: 010-68773960; Email: tc100sjl @ 263 net) for future reference.
Technical standard for security engineering
1 General provisions
1.0.1 This standard is developed with a view to regulating security engineering construction procedure as well as engineering design, construction, supervision, inspection, acceptance, operation, maintenance and consultation services, improve the security engineering construction quality and system operation and maintenance level, protect personal and property safety and social safety and maintain social stability.
1.0.2 The standard is applicable to construction and system operation and maintenance of the security engineering of constructed, extended and renovated buildings (structures).
1.0.3 The construction of security engineering shall be incorporated in the overall planning of the engineering construction and, according to the use function, security management requirements, construction investment, etc., simultaneously implemented and independently inspected for acceptance.
1.0.4 The construction of security engineering shall organically combine personnel protection, physical protection and electronic security so as to construct comprehensive prevention and control system meeting security management requirements and possessing corresponding risk prevention capabilities through scientific and reasonable planning, design, construction, operation and maintenance.
1.0.5 Security system shall be of security, reliability, maintainability and extendibility, with advanced technology and economic applicability.
1.0.6 Security engineering involving special fields like national security and state secrets shall be constructed by making strict the security access mechanism and selecting safety-controlled products and equipment and professional design, construction and service teams meeting the requirements according to relevant management requirements.
1.0.7 Construction of security engineering must comply with relevant national laws and regulations.
1.0.8 The construction of security engineering shall comply with those specified in both this standard and current relevant standards of the nation.
2 Terms
2.0.1
security
preventing and delaying intrusion, theft, robbery, destruction, explosion, violent attack and the like by comprehensively using multiple means like personnel protection, physical protection, electronic security, etc.
2.0.2
personnel protection
security management behaviors like organized prevention and disposal performed by personnel with corresponding quality
2.0.3
physical protection
physical protection means for delaying or preventing risk events from occurring by making use of building (structure), screen, appliance, equipment or combination thereof
2.0.4
electronic security
protection means for improving the detection, delay and response capabilities by making use of technologies like sensing, communication, computer, information processing and control as well as biometric feature recognition
2.0.5
security system
protection system with a view to achieving security by comprehensively using technologies such as physical protection, electronic protection, etc.
2.0.6
security engineering
construction projects implemented with a view to establishing security system
2.0.7
physical protection system
physical system with a view to realizing security by comprehensively using natural barrier, artificial barrier, and appliances and equipment like anti-theft lock/cabinet
2.0.8
electronic protection system
system with a view to realizing security by using various electronic equipment, which usually includes subsystems for intrusion and hold-up alarm, video surveillance, access control, security management in parking lots, anti-explosion security inspection, guard tour, building intercom, etc.
2.0.9
intrusion and hold-up alarm system (I&HAS)
electronic system detecting unauthorized access or attempt of unauthorized access into protected area using sensor technology and electronic information technology and, when emergent alarm device is triggered by user, sending out and processing alarm information
2.0.10
video surveillance system (VSS)
electronic system that uses video technology to detect and monitor the surveillance area and to display and record in real time the onsite video images
2.0.11
access control system (ACS)
electronic system recognizing objects going through entrance and controlling the open/close of entrance actuator through customized symbol recognition, (or) biological feature and other mode
2.0.12
security management system in parking lots
electronic system for realizing comprehensive management of registration and supervision of personnel and vehicles going in/out of parking lots as well as of the security of personnel and vehicles in parking lots
2.0.13
anti-explosion security inspection system
electronic system for detecting explosives, weapons and/or other prohibited goods carried by personnel and vehicles or carried secretly in articles and/or alarming
2.0.14
guard tour system
electronic system that manages and controls the inspection routes, mode and processes of patrol personnel
2.0.15
building intercom system
electronic system that confirms visitors via (visual) intercom mode so as to control and manage the visitors at the entrance of building (complex), also known as visitor intercom system
2.0.16
security management platform (SMP)
combination of hardware and software integrating the subsystems of the security system and related information systems and therefore organically linking physical protection system, electronic protection system and personnel protection resource, centralized processing, sharing and applying information, comprehensively studying and judging risk events, commanding and dispatching event handling, as well as uniformly managing, operating and maintaining system and equipment
2.0.17
protected object
object which shall be protected for it is faced with risks, including unit, building (structure) as well as parts, areas and specific object inside and outside of them
2.0.18
high risk protected object
key units that determined in accordance with laws for security defense and key objects for preventing terrorist attacks
2.0.19
defensing object
object which threats the protected object and for which defense is needed
2.0.20
risk
potential security hazard existing in the protected object itself and the possible threats the protected object may suffer, including intrusion, theft, robbery, destruction, explosion, violent attack and the like
2.0.21
risk assessment
process confirming the risks that shall be defended for security system through risk identification, risk analysis and risk appraisal
2.0.22
level of risk
magnitude of a single risk or combination of risks that exist in and around the protected object and poses a threat to its security, expressed as a combination of consequences and possibilities
2.0.23
level of protection
level of precaution measures taken to guarantee the security of the protected object
2.0.24
security grade
ability level of security systems and equipment to counter different attacks
2.0.25
detection
perception of explicit risk event and/or implicit risk event
2.0.26
delay
extending or (and) postponing the progress of a risk event
2.0.27
response
action taken to address the occurrence of a risk event
2.0.28
false alarm
alarm sent out in response to an undesigned event
2.0.29
leakage alarm
condition in which no alarm response is given to the designed alarm event
2.0.30
perimeter
area boundary of a protected object
2.0.31
zone
part of protection area where intrusion and hold-up alarm system (I&HAS) may detect intrusion or where the emergency alarm device is manually triggered
2.0.32
surveillance area
site space range corresponding to the image taken by the video capture device of the video surveillance system (VSS)
2.0.33
controlled area/protected area
spatial area enclosed by physical boundaries and corresponding to one or more access control points of the access control system
2.0.34
longitudinal-depth protection
protection measures for setting up successive lines of defense from outside to inside, or vice versa, for the whole protected area according to the environmental conditions where the protected object is located in and the security management requirements, which is divided into overall longitudinal-depth protection and partial longitudinal-depth protection
2.0.35
balanced protection
security protection level of each part of the security system basically being the same, without obvious weak link
2.0.36
surveillance center
central control room that receives and processes security system information, handles alarm events, and manages and controls system equipment and which is usually divided into guard area and equipment area
2.0.37
system operation
process conducting safety activities like alarm event handling, video surveillance and access control through security system
2.0.38
system maintenance
maintenance activities conducted to ensure the normal operation of the security system and continuously exert the security effectiveness
2.0.39
system effectiveness evaluation
process of analysis and evaluation on the extent to which the security system meets the expected effectiveness
3 Basic requirements
3.0.1 Full life cycle management and overall planning shall be conducted for security engineering construction and system operation maintenance. The engineering construction and system operation and maintenance shall be carried out by following the engineering construction procedure and requirements and in a planned and step-by-step way by determining the goal of each stage.
3.0.2 The security engineering construction shall follow the following principles:
1 Technical protection, physical protection and personnel protection shall be combined and detection, delay and response shall be coordinated;
2 The protection level of the protected object shall be suitable for the risk level;
3 The security level of the system and equipment shall be suitable for the defensing object and its means of attack;
4 Longitudinal-depth, balance and anti-damage requirements for the protection shall be met;
5 Security and reliability requirements of the system shall be met;
6 Electro-magnetic compatibility and environmental adaptability requirements of the system shall be met;
7 Real-time performance and original integrity requirements of the system shall be met;
8 Compatibility, expandability and maintainability requirements of the system shall be met.
9 Economy and suitability requirements of the system shall be met.
3.0.3 Risk protection planning, system configuration planning and personnel protection planning shall be carried out for security engineering construction. A safe, controllable, open and shared security system shall be constructed by determining the risks that need to be defensed through risk assessment, taken into account the personnel protection capability, and reasonably selecting physical protection and electronic security.
3.0.4 Equipment and materials used in security engineering must meet national laws and current relevant standards of the nation and shall be subjected to test or certification.
3.0.5 In stages like construction, preliminary acceptance and commissioning, supervision organization should be hired to carry out engineering supervision.
3.0.6 Security engineering for high risk protected object shall be subject to engineering inspection. The engineering inspection shall be carried out by an inspection agency with security engineering inspection qualification and the inspection capability within the authorized scope of qualification.
3.0.7 Security engineering, after being completed, shall be subject to independent or special acceptance.
3.0.8 The development (using) organization of security system shall establish guarantee system and long-term mechanism for system operation and maintenance, guaranteeing the normal operation of security system and continuously exerting the security effectiveness.
3.0.9 During the operation of security system, the development (using) organization should carry out risk assessment and system effectiveness evaluation combining with the security demand and system usage condition.
3.0.10 Professional consultation service mechanism should be introduced in within the full life cycle of security engineering construction and system operation and maintenance.
4 Planning
4.1 Risk protection planning
4.1.1 For security engineering construction, the protected object and its security requirements shall be determined, and the following shall be met:
1 The determination of protected object shall take into account protected unit, protected position and/or area and protected target; protection target is classified into articles, personnel and system and/or equipment and/or parts to be protected;
2 The security demands of the protected object shall be analyzed and determined according to the demands of public security prevention and terrorism prevention.
4.1.2 For the security engineering construction, the specific risks need to be defensed shall be determined according to the security demands of the protected object through risk assessment, with at least the following covered:
1 Identification shall be carried out for various types of risks that may pose a threat to the protected object by combining the current internal and external environmental conditions and security capability;
2 Analysis shall be carried out on the possibility of the occurrence of the identified risks and the severity of the consequences ( including losses and adverse influence);
3 The risk analysis results shall be compared with the pre-set risk criteria to conduct risk assessment and determine the level of various risks;
4 The risks need to be defensed through security engineering shall be determined according to the risk assessment results by combining the risk tolerance of the security engineering development (using) organization.
4.1.3 The security engineering construction shall target to the risks needing to be defensed and, according to the principle of longitudinal-depth protection and balanced protection, taking into account the personnel protection capability, coordinating and configuring the equipment and facilities for physical protection and electronic protection, protect the protected objects in aspects of unit, position and/or area and target and shall meet the following requirements:
1 The perimeter protection shall meet the following requirements:
1) Protection measures like physical protection and/or intrusion detection and/or video surveillance shall be reasonably selected according to the field environment and security management requirements;
2) The defense capability of different physical protection measures for different risks shall be considered;
3) The detection capability of different intrusion detection devices for different intrusion behaviors such as overtaking, crossing and digging and for the personnel protection response capability after intrusion detection and alarm;
4) The surveillance effect of video surveillance equipment for perimeter environment shall be considered; at least the activities of the personnel in the perimeter environment shall be seen clearly.
2 The entrance/exit protection shall meet the following requirements:
1) Protection measures like physical protection and/or access control and/or intrusion detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements;
2) The defense capability of different physical protection measures for different risks shall be considered;
3) The different identification technology types and the capability of preventing illegal intrusion (forcibly entering, tailgating, opening with technology, etc.) of the access control shall be considered;
4) The detection capability of different intrusion detection devices for different intrusion behaviors such as overtaking and crossing and for the personnel protection response capability after intrusion detection and alarm;
5) The surveillance effect of the video surveillance equipment on the entrance/exit shall be considered; generally, the facial features of the personnel and the license plate number of vehicles going in/out shall be clearly distinguished.
3 The channel and public area protection shall meet the following requirements:
1) Video surveillance shall be selected, with the surveillance effect being such that the conditions of personnel, articles and vehicles passing through shall be clearly seen and that the facial features of the personnel and the license plate number of vehicles at important points shall be clearly distinguished;
2) Intrusion detection and/or physical protection measures may be selected for channels and public areas around the high risk protected object.
4 The protection of important areas and positions such as surveillance center, financial room, water/electric/gas/heating equipment room shall meet the following requirements:
1) Protection measures like physical protection and/or access control and/or intrusion detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements;
2) Security doors and/or security windows shall be adopted for physical protection, other protection measures shall take into account the equipment type selected and its capability of preventing illegal intrusion, response time after alarming as well as the surveillance effect of video surveillance.
5 The protected target protection shall meet the following requirements:
1) Protection measures like physical protection and/or area intrusion detection and/or displacement detection and/or video surveillance shall be reasonably selected according to field environment and security management requirements;
2) The corresponding physical protection measures shall be taken according to the specific conditions of different protected targets and the risks to be prevented;
3) Means of area intrusion detection, displacement detection and the like may be taken to detect and alarm in real time the conditions that a fixed target is approached or moved, with the personnel protection response capability after alarm considered;
4) Where video surveillance is adopted for protection, ensure that the protected target is continuously within the scope of monitoring, and the surveillance effect on the protected target and its area shall be considered. At the very least, it shall be able to see the protected target and the activities of personnel in the area. When the protected target is confidential or has privacy protection requirements, video surveillance shall meet the relevant provisions for confidentiality and privacy protection.
6 For personnel-intensive, large-flow entrances/exits, channels and other places, in addition to security protection measures, measures for personnel evacuation and guidance and express pass shall also be considered.
4.1.4 Where the protected object is determined to be a key target that shall be protected from terrorist attacks, protection measures shall be strengthened according to the specific demand for terrorist attack prevention, and the following requirements shall be met:
1 The perimeter protection shall take into account the joint arrangement of physical protection devices and electronic protection devices;
2 The protection of the entrances/exits and channels shall take into account the arrangement of anti-explosion security inspection equipment, passage gate, vehicle retention device, safety buffers or isolation zones;
3 Personnel-intensive public area protection shall consider the full coverage of video surveillance and the configuration of explosive disposal facilities and defense facilities;
4 The protection of important areas and positions such as surveillance center and water/electric/gas/heating equipment room shall consider the joint arrangement of physical protection devices and electronic protection devices;
5 The application of video image intelligent analysis technique and the special requirements of information storage time shall be considered;
6 The defense and countermeasures against unmanned aerial vehicle shall be considered;
7 Consideration shall be given to strengthening security system and its critical equipment security measures and redundancy measures.
4.2 System configuration planning
4.2.1 The security system configuration planning shall follow the principle of safe, controllable, open and sharing, taking uniform steps to consider subsystem composition, information resources, integration/networking mode, transport network, security management platform (SMP), information sharing application mode, storage management mode, system power supply, interface protocol, intelligent application, system operation and maintenance, system security and the like.
4.2.2 Subsystems of the security system shall be determined according to field investigation, risk protection planning and front-end defense organization condition and shall meet the following requirements:
1 Physical protection system, electronic protection system and security management platform (SMP) shall be designed, selected and arranged comprehensively;
2 Physical protection systems like artificial barrier and protective device (equipment) shall be designed, selected and arranged comprehensively according to field natural conditions, physical space and the like and by reasonably using natural barrier;
3 Electronic protection systems like intrusion and hold-up alarm system (I&HAS), video surveillance system (VSS), access control system (ACS), security management system in parking lots, anti-explosion security inspection system, guard tour system and building intercom system as well as units of subsystems including front-end, transmission, information processing/control/management and display/record shall be designed, selected and arranged comprehensively.
4.2.3 Various integrated and/or networked information resources shall be determined according to the demand of integrated management over security subsystems.
4.2.4 The following system integration networking methods shall be reasonably selected according to the actual needs of sharing and exchanging information resources as well as the complexity of the systems:
1 Simple linkage method realized by signal driving between different subsystem equipment;
2 Subsystem linkage method realized by communication between different subsystem management software;
3 Integrated method of controlling and managing in a centralized way the security subsystems and other subsystems through security management platform (SMP);
4 Cascading mode of large-scale and cross-regional security systems realized through the interconnection of multi-level security management platforms;
5 Comprehensive application mode of integrating and networking security system with other business systems according to the demands of security management.
4.2.5 Dedicated transmission network should be adopted for the security system, for which dedicated line mode or public transport network-based virtual private network (VPN) mode may be adopted. The transmission network should adopt a star/tree transmission network topology with the surveillance center as the tandem/core point (root node). The communication link of system transmission shall meet the needs of the system for information transmission, exchange and sharing. When the wired transmission is not available, a wireless transmission method with corresponding security measures may be adopted.
4.2.6 The specific functions of security management platform (SMP) shall be reasonably planned according to the actual demands for integration, networking and management of security system, with the relevant provisions in 6.4.1 of this standard met.
4.2.7 Client-side and/or branch platform shall be arranged according to the actual demands for information sharing application of security system. The planning and design of client-side and/or branch platform shall be carried out based on the system private transmission networks. Security management platform (SMP) may also realize information exchange and sharing through perimeter security isolation measures and security system and/or other business system constructed on the basis of other network environment.
4.2.8 Data storage management mode shall be reasonably planned according to the actual demands for information storage and management of security system.
4.2.9 Main power supply, standby power supply as well as the power supply mode and supporting measures shall be reasonably selected according to spatial distribution characteristics, power supply conditions and security assurance demands of security system and its equipment.
4.2.10 Various interfaces of system as well as information transmission, exchange and control protocols shall be planned and designed in an overall way according to specific requirements of security system, equipment interconnection and information sharing application.
4.2.11 Intelligent module design for security management platform (SMP) shall be carried out according to the actual demands of users on security system information and data deepening application, or intelligent application systems, including video intelligent analysis system, big data analysis system, etc., shall be separately planned and designed outside the security management platform (SMP).
4.2.12 The operation and maintenance module of security management platform (SMP) shall be designed according to the scale and complexity of the equipment the security system connects, or operation and maintenance platform (operation and maintenance system) shall be separately planned and designed outside the security management platform (SMP) so as to guarantee the normal operation of security system, equipment and network.
4.2.13 Integrated planning shall be made for the security policies of security system, and appropriate access equipment measures, data security measures, transmission network security measures as well as security isolation measures at perimeter of different networks shall be selected according to the relevant requirements of information security.
4.3 Personnel protection planning
4.3.1 Security engineering development (using) organization shall carry out personnel protection planning according to the principle of combination of personnel protection, physical protection and electronic security as well as coordination between detection, delay and response, comprehensively considering the capability of physical protection and electronic security as well as the demands of system normal operation and emergency disposal.
4.3.2 Security engineering development (using) organization shall reasonably arrange security personnel, system operation and maintenance personnel and other personnel as well as necessary equipment, facilities and outfits for protection and defense.
4.3.3 The number and location of personal, equipment, facilities and outfits shall meet the requirements of security system on operation, emergency response, site disposal and expected risk resistance.
4.3.4 The security management system shall be established and improved, and business process shall be optimized by combining the operation requirements of security system.
4.3.5 Emergency response plans shall be made separately targeted to various emergencies, and drilling shall be carried out periodically. The emergency response plan shall cover at least the events in question, personnel and division of labor, procedures and measures for disposal, use of equipment (facilities or outfits), target protection and personnel evacuation plan.
4.3.6 Technology and skills training mechanisms shall be established to ensure that personnel are competent for the corresponding posts.
5 Engineering construction procedure
5.1 General requirements
5.1.1 The construction procedure of security engineering shall be divided into several main stages including project approval, engineering design, engineering construction, engineering preliminary acceptance and commissioning, engineering inspection, acceptance and handover as well as system operation and maintenance.
5.1.2 The security engineering construction management shall be carried out in accordance with those specified in GB/T 50326 The code of construction project management.
5.2 Project approval
5.2.1 During the project approval of security engineering, project proposal shall be developed, putting forward the actual demands of security as well as project construction planning.
5.2.2 The feasibility study report shall be prepared after the approval of project proposal. The feasibility study report shall analyze, demonstrate and comprehensively evaluate the technical feasibility and economic rationality, be capable of providing investment decision-making basis for the security engineering construction, and it includes design descriptions, design drawings, main equipment lists, and project cost (investment) estimations.
5.3 Project design
5.3.1 Before the preliminary design of security engineering, the development organization shall organize to compile the design assignment according to the approved feasibility study report. The design assignment shall, in accordance with relevant national laws and regulations, standards and specifications as well as management application demands, make clear the engineering construction purpose and content, protected object and defensing object, security demand, risks to be defensed by the security engineering and functional requirements of security system.
5.3.2 The development organization shall determine the design organization in accordance with relevant laws and regulations.
5.3.3 Design organization shall, jointly with relevant organizations, carry out field investigation and prepare field investigation report which shall be confirmed by parties participated in the investigation.
5.3.4 The design organization shall, according to the design assignment, design contract and field investigation report, carry out preliminary design work and put forward the specific implementation scheme for achieving the project construction goal and meeting the security management requirements. The preliminary design documents shall include design descriptions, preliminary design drawings, main equipment and material lists as well as engineering estimates.
5.3.5 After the preliminary design of security engineering is completed, the project management organization shall organize experts to review the preliminary design scheme and provide review comments.
5.3.6 After the review on preliminary design scheme of security engineering is passed and confirmed by the project management organization, the design organization shall design the construction drawing according to the preliminary design scheme and review comments.
5.3.7 The construction drawing design documents shall meet the needs for procurement of equipment and materials as well as manufacture and construction of non-standard equipment. The construction drawing design documents shall include design descriptions, construction drawing design drawings, equipment material lists as well as engineering estimates.
5.3.8 After the construction drawing design is completed, the development organization shall, in accordance with policies and regulations, report the relevant data to the construction administration department for review. The data that shall be provided by the design organization to the review organization include documents and attachments that are served as the investigation and design basis and approved by relevant government departments, full set of construction drawings and other deliverables.
5.4 Engineering construction
5.4.1 After the construction drawing review is passed, the development organization shall determine the construction organization in accordance with relevant laws and regulations.
5.4.2 The detailed design shall, based on the construction drawing design documents which pass the review, review, check and revise the construction drawing design content, express in a quantified and accurate way the design contents as well as requirements of equipment, materials and processes, and detail the special requirements for construction party and construction operations.
5.4.3 Construction drawing design organization shall cooperate with the detailed design organization in understanding the system conditions and requirements and review the design drawings of the detailed design organization.
5.4.4 After the detailed design is completed, it shall be reviewed by the project management organization. After the review is passed, the detailed design organization shall submit all the detailed design documents.
5.4.5 Before the engineering construction, the design organization shall carry out design disclosure for construction organization and supervision organization.
5.4.6 During engineering construction, the construction organization shall order according to the technical index specified in detailed design document and construct according to construction content and construction process therein.
5.4.7 Pipeline laying, equipment installation, system debugging, etc. in the security engineering shall be implemented according to those specified in clause 7 of this standard.
5.4.8 During the engineering construction, the development organization may entrust the supervision organization with corresponding capability to supervise and manage the engineering construction. The engineering supervision shall be implemented in accordance with clause 8 of this standard.
5.5 Engineering preliminary acceptance and commissioning
5.5.1 The construction organization shall carry out technical training for related personnel in accordance with the engineering contract requirements. The training outline, course arrangement and training scheme shall be submitted to the project management organization for review and approval.
5.5.2 Should the engineering quality and system functional performance meet the requirements of engineering contract and design documents upon the self-inspection of construction organization, the project management organization, design organization and construction organization shall jointly carry out preliminary acceptance for the engineering, producing the preliminary acceptance report.
5.5.3 After the preliminary acceptance is passed and item rectification and re-inspection is completed, security system shall be put into commissioning for at least 30d. During the commissioning, construction organization shall cooperate with the project management organization in establishing management system for system operation and maintenance.
5.5.4 Should the system meet the requirements of the contract and design documents upon the commissioning, the project management organization shall issue a commissioning report according to the system operation condition and commissioning record during the commissioning.
5.6 Engineering inspection, acceptance and handover
5.6.1 After the security engineering is constructed and, upon the commissioning, meets the requirements of engineering contract and design documents, the construction organization shall prepare the completion report.
5.6.2 The construction organization shall prepare the completion documents according to detailed design drawings, drawing review records as well as documents for design change, engineering alternation and others. The completion documents shall be complete, accurate, true, signed and sealed, and consistent with the construction content.
5.6.3 For high risk protected objects and security engineering that shall be subject to engineering inspection in accordance with the requirements of relevant laws and regulations, engineering contract, etc., the inspection agency shall inspect the engineering quality and issue inspection report before engineering completion acceptance. The basis and procedure for the engineering inspection as well as inspection items, requirements and methods shall be as specified in clause 9 of this standard.
Contents of GB 50348-2018
Foreword i
1 General provisions
2 Terms
3 Basic requirements
4 Planning
4.1 Risk protection planning
4.2 System configuration planning
4.3 Personnel protection planning
5 Engineering construction procedure
5.1 General requirements
5.2 Project approval
5.3 Project design
5.4 Engineering construction
5.5 Engineering preliminary acceptance and commissioning
5.6 Engineering inspection, acceptance and handover
5.7 System operation and maintenance
6 Engineering design
6.1 General requirements
6.2 Field investigation
6.3 Physical protection design
6.4 Electronical protection design
6.5 Integration and networking design
6.6 Safety design
6.7 EMC design
6.8 Reliability design
6.9 Maintainability design
6.10 Environmental adaptation design
6.11 Lightning protection and grounding design
6.12 Power supply design
6.13 Signal transmission design
6.14 Surveillance center design
7 Engineering construction
7.1 Construction preparation
7.2 Engineering construction
7.3 System debugging
8 Engineering supervision
8.1 General requirements
8.2 Construction preparation supervision
8.3 Engineering construction supervision
8.4 System debugging supervision
8.5 Engineering preliminary acceptance and system commissioning supervision
9 Engineering inspection
9.1 General requirements
9.2 System architecture inspection
9.3 Physical protection inspection
9.4 Electronic security inspection
9.5 Security, electromagnetic compatibility, lightning protection and grounding inspection
9.6 Inspection for power supply and signal transmission
9.7 Surveillance center and equipment installation inspection
10 Engineering acceptance
10.1 Organization of acceptance
10.2 Construction acceptance
10.3 Technical acceptance
10.4 Information review
10.5 Acceptance conclusion
11 System operation and maintenance
11.1 General requirements
11.2 System operation
11.3 System maintenance
12 Consultation service
12.1 General requirements
12.2 Consultation contents
Explanation of wording in this standard
List of quoted standards