SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A

Wall A is suggested to be used for these Fixed Facility SCIFs: Closed Storage, Secure Working Area (SWA), Continuous Operation, or Open Storage with SID. The list below and accompanying diagram list all construction specifications for Wall A.
  • Three layers of Gypsum Wall Board (GWB) ⅝ inch-thick
    • One layer on the uncontrolled side
    • Two layers on the controlled side
    • Acoustic protection: Sound Class 3
  • Wallboard must be attached to 3 ⅝ inch-wide 16 gauge metals studs or wooden 2×4 studs placed no less than 16” on center
  • 16 gauge continuous track (top and bottom) with anchors at 32” on center maximum in continuous bead of acoustical sealant
  • Interior two layers of wallboard must be mounted so seams do not align
  • Acoustic fill 3 ½” (89 mm) sound attenuation material, fastened to prevent sliding down and leaving void at the top
  • Top and bottom of each wall must be sealed with acoustic sealant where it meets the slab
  • Fire safe non-shrink grout or acoustic sealant in all voids above/below track both sides of partition
  • Entire wall must be finished and painted from floor to ceiling
  • Any electrical or communications outlets required on the perimeter wall must be surface mounted


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email contact@klsecurity.com to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.


SCIF Container Series | Part 2: Design Planning Checklist

Sensitive Compartmented Information Facility

SCIF Secure Repository

Modular and Portable construction for high security electronic information that is processed, discussed, and/or stored. Government work and government-related contract work require a SCIF. 

All SCIFs require specialized construction and security measures (including electronic and TEMPEST security). Every SCIF is designed and constructed according to the purpose of the facility and location. Thus, no two SCIFs are the same in construction and security measures. SCIF planning and design begins with a sponsorship by an Accrediting Official (AO) to ensure security oversight and quality control throughout development.

Design & Build Supplier, Distributor & Manufacturer

ICD 705, ICS 705-1, and ICS 705-2 Compliant Requirements

Individual physical and technical SCIF requirements are assessed by an AO and a construction Site Security Manager (SSM). Both the AO and SSM will take the customer’s needs, purpose of the facility, location, and environmental factors into consideration when designing and in the management of the construction of a SCIF. 

Consult, Plans and Planning of Features of Buildings, Containers and Security

Specialists in Access Control for Accredited SCIFs

For the Operation checklist of Management of a SCIF, refer to this guide for security and data protection.

Note: The features listed below will vary depending on the risk assessments done by your AO and SSM.

  • Perimeter
    • Radio Frequency (RF) protection by a Certified TEMPEST Technical Authority (CTTA)
    • Depending on design, walls may include TEMPEST countermeasures
    • Acoustic and physical protection from outside security threats
  • Access Control Systems (ACS)
  • Intrusion Detection Systems (IDS)
  • Compartmented areas (CA) that provide separation between control systems, compartments, and workstations. Some features of a CA include:
    • Closed Storage – for storage when information is not in use
    • Open Storage – access controlled storage
    • SWA (Secure Working Areas) – used in discussing, handling, and/or processing secure information
    • TSWA (Temporary Secure Working Areas) – for temporary use of discussing, handling, and/or processing secure information
  • Interior vaults and security doors for access control
  • Emergency exists and notification systems

Note: SCIFs outside the United States including Temporary, Airborne, and Shipboard SCIFs , vessel and maritime have more detailed requirements in addition to the features listed above. Those requirements can be found in Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities.


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.

Call 866-867-0306 or email contact@klsecurity.com to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 1: Site Evaluation


What is a ‘SCIF’? SCIF stands for: Sensitive Compartmented Information Facility. SCIFs are used as locations for sensitive and/or confidential information to be discussed or shared. Many government and private entities utilize SCIFs to safeguard information. The ‘situation room’ in the White House is inarguably the most famous SCIF in the world. The steps we will share with you in this series will highlight the steps taken in acquiring a SCIF.


The first step in acquiring a SCIF, as it is with any security protocol, is recognizing & identifying the need. Every SCIF is constructed independent of another and individual facility needs & risks are addressed and evaluated prior to construction.


Risk Management Process:

The Accrediting Official (AO) and Site Security Manager (SSM) evaluate threats, vulnerabilities, and assets to determine countermeasures needed.

  1. Threat Analysis
    • The capability, intent, and opportunity of an adversary to exploit or damage assets and/or information is assessed.
  2. Vulnerability Analysis
    • The susceptibility of attack to a procedure, facility, information system, equipment or policy is assessed.
  3. Probability Analysis
    • The probability of an adverse action, incident, or attack is assessed.
  4. Consequence Analysis
    • The consequences of an adverse event are assessed: loss of resources, monetary cost, mission impact, and/or program functionality.
  5. Security in Depth (SID)
    • SID includes factors that increase and enhance the probability of detecting threats to SCIFs before the occurrence of an incident. These are additional protection methods taken to further safeguard confidential information/materials.
    • SID is mandatory for locations (containing SCIFs) located outside of the United States due to increased threats.
    • Examples of SID factors:
      • Dedicated response force of U.S. personnel
        • Ex: military bases, embassies, government compounds, contractor compounds with military guard
      • Controlled buildings
        • Containing: separate building access controls, alarms, elevator controls, stairwell controls, etc. required to gain entry into building or thoroughfares leading to SCIF
      • Controlled office areas
        • Must maintain alarm equipment if adjacent to SCIF
      • Fenced compounds
        • Gated entry controlled by security staff and/or access codes
      • Additional mitigations may be developed if deemed necessary to prevent unauthorized entry


Security plans should be coordinated with the AO before construction plans are designed, materials ordered, or contracts signed. Any non-standard methods used to meet security protection levels must be documented & approved by the AO and must at least equal or exceed the level of standard.

Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email contact@klsecurity.com to see how the experts at KL Security can assist your facility in security needs.


Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities


Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

Depository Drop Safes – Maintaining Business Functions in the time of COVID

By Shelley Swearingen | August 20, 2020


This year’s occurrence of a global pandemic has altered the way we live our daily lives as well as the functional procedures of businesses. Business operators are looking for ways to maintain operations while protecting employees & customers. Depository safes make it possible for items to be received with little to no contact between parties. While societally we’re conducting more transactions through digital means, there’s always going to be a need to receive physical payments and documents.


Drop and depository safes were created with the intention of securely receiving and storing payments during non-business hours. Their usage is not limited to after-hours payments, though.


These depository safes can be used for clients to drop off any documentation while eliminating person to person contact. The use of a depository safes also ensures these documents remain safe and their contents are protected. With so many businesses limiting their hours or working remotely, there’s a real necessity for secure receipt of items.


Types of Drop and after hours drop safes:


KL Security is trusted by businesses nationwide spanning various industries. We evaluate each client’s needs to identify the best solution. If you have a security concern, chances are we’ve addressed it. For pricing on secure depositories or to discuss any other security related concerns, call (866) 867-0306 or email contact@klsecurity.com.

Air Tube Systems: Security Applications in the Cannabis Industry

By: Shelley Swearingen | August 18, 2020

Pneumatic Air Tubes may not be considered ‘innovative’, but their application within an emerging market is. Pneumatic tubes have been used to transport items for well over a century, and the legal cannabis industry is in its infancy in America. Cannabis entrepreneurs are in uncharted territory as to how best safeguard their employees and protect product – all while minimizing diversion and driving revenue. Air Tubes are an easy way to achieve all of these goals.

Banks have utilized pneumatic tubes for over a hundred years, and tube systems are commonplace in today’s pharmacies, as well. Air tubes allow for the fast and safe transportation of small items like medication or currency.

By using pneumatic air tubes, dispensaries can keep the majority of their inventory safely stored in a secure room. The less stock left on the sales floor, the less the chances for theft or diversion. When inventory on the sales floor is minimized, the opportunity for diversion is also reduced. A budtender can assist a customer/patient select their preferred product, and then request the quantity from an employee working in a stock room. The item is retrieved (employees never have to leave their respective areas) and sent to the front of the house for the point of sale. This also makes inventory management and surveillance easier.

Air tube systems also provide extra safeguards within cash management. Cashiers are also able to make cash deposits quickly and safely to more secure locations (like vaults).

Out of sight, out of mind. Keeping cash and product stored elsewhere ensures the safety of employees while making it harder for would-be thieves to steal cannabis product – key components to security protocols and operational procedures to deter diversion of cash and cannabis.

KL Security utilizes the THC360 holistic approach when evaluating a facility’s needs. Brand image and company expectations are assessed to formulate the best solution for an issue. Our implementations assist in diversion, drive revenue, and maintain compliance. To see how the experts at K.L. Security can assist your cannabis dispensary/pharmacy, craft growing facility, secure transporting service, or testing facility call us at 866-867-0306 or email contact@klsecurity.com.

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice.

Arizona One Step Closer to Recreational Marijuana Market

By Shelley Swearingen | August 11, 2020



Earlier this year, Arizonans banned together in an attempt legalize marijuana. Marijuana is currently legal for medicinal use in the state, but residents would like to see access made available for all adults.


The issue was set to be voted on within the November ballot. A petition was submitted earlier this year by constituents; the initiative required 237,645 signatures and Smart and Safe Arizona (the group spearheading the initiative) acquired 420,000.


Opposition to this proposal was met by Arizonans for Health and Public Safety, a group backed by the Center for Arizona Policy (conservative group that supports ‘right-wing’ legislation). It’s safe to assume this group is also anti-cannabis legislation of any kind, but attacked the proposal on the basis that it doesn’t adequately address cannabis sales tax increases, driving under the influence, or marijuana potency. It also claimed the initiative is ‘confusing and deceptive’.  Based on these theories, the group filed a lawsuit challenging the pro-cannabis initiative.


And late last week, this suit was rejected. A Superior Court Judge ruled the provisions had be addressed sufficiently and found the initiative was not lacking. The judge found their claims to be unfounded. This was a huge win to the voters of Arizona. For now, the issue of legalizing marijuana for all adult Arizonans will be resolved in November by voters.


The recreational market is proposed to favor existing medical marijuana operators and also designate 26 new licenses specifically for social equity applicants.


Using data from the US Census Bureau and assuming the Arizona market would resemble the Illinois market, we can figure that Arizona might have had $170,322,000 in sales (so far) in 2020. That would have brought in over $27,000,000 in tax dollars for the state.*

Here at KL Security, we observe and implement a holistic approach to cannabis facility compliance and safety. We assist dispensaries, pharmacies, secure transporters, craft growers, large scale growers, and testing facilities in achieving revenue goals through protecting assets. We assist with security planning and SOPs for security protocols that prevent diversion of cash and cannabis products at all steps within a marijuana business’s lifetime: from licensing to successful operation to inspections. If you need assistance with the security portion of an application, want to learn how to make your operation safer, or are concerned about compliance – contact the consultants at KL Security at 866-867-0306 or at contact@klsecurity.com


Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice.


*9,900,000 estimated adults in Illinois and $300,000,000 in sales (YTD Jan-Aug 2020) equated to roughly $30.3 spent per adult resident.5,677,400 estimated adults in Arizona = $170,322,000