{"id":655,"date":"2020-09-14T06:07:00","date_gmt":"2020-09-14T06:07:00","guid":{"rendered":"http:\/\/www.klsecurity.com\/blog\/?p=655"},"modified":"2020-08-31T14:11:35","modified_gmt":"2020-08-31T14:11:35","slug":"scif-container-series-part-7-modular-scifs","status":"publish","type":"post","link":"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-7-modular-scifs\/","title":{"rendered":"SCIF Container Series | Part 7: Modular SCIFs"},"content":{"rendered":"\n<p><br><p>Modular SCIFs include ground-based temporary SCIFs (T-SCIFs) and include those on mobile platforms such as trucks and trailers\/containers, and SCIFs aboard aircrafts and on surface\/subsurface vessels. Modular SCIFs are the most durable and cost effective SCIF in both design and manufacturing. These versatile SCIFs require less construction time than a regular SCIF and can be permanent or relocatable depending on your needs.<\/p><\/p>\n\n\n\n<p><br><p>Modular SCIFs are constructed off-site and arrive at their destination wired and ready for use. Container SCIFs can be entirely customizable from height to interior details to meet your specialized needs. There\u2019s no limit on size! The interior customization can include pre-wired workstations, conference areas, and secure server rooms.<\/p><\/p>\n\n\n\n<p><br><p>T-SCIFs, depending on its design, can also be adjusted for future expansion to increase the longevity of your SCIF. For construction, modular SCIFs must adhere to the Fixed Facility checklist outlined in ICD 705. This includes acoustic, visual, and concealed entry protection. Cables and wires, as with all SCIFs, must be protected. Ground-based structures must be secured with GSA-approved locking devices and tamper-evident seals.<\/p><\/p>\n\n\n\n<p><br><p>Depending on your needs, TEMPEST countermeasures, Intrusion Detection System (IDS), and Access Control System (ACS) are optional features that can be included in T-SCIFs. It is ultimately up to the CTTA to decide if TEMPEST countermeasures are needed with your T-SCIF. The AO and CTTA will collaborate to provide red\/black separation and protected distribution guidance for field installation in accordance with NSTISSAM TEMPEST 2\/95 and 2\/95A, and CNSSI 7003.<\/p><\/p>\n\n\n\n<h4>Storage and Site Security<\/h4>\n\n\n\n<p><br><p>Like other SCIFs, T-SCIFs have specific requirements for overall security and storage of materials. Aircrafts and surface\/subsurface vessels require more security measures than ground-based T-SCIFs. Secure materials used inside a container SCIF must be limited to what is needed for operation. These materials must be stored in GSA-approved containers. The AO may approve exceptions to the storage of secure material in GSA-approved containers for a period of time.<\/p><\/p>\n\n\n\n<p><br><p>When this secure material is no longer needed, it must be destroyed by a means approved by the AO. Once a T-SCIF is no longer in use, a SCI security official will inspect the facility to ensure all secure material has been removed.<\/p><\/p>\n\n\n\n<p><br><p>It\u2019s the AO\u2019s responsibility to evaluate and assess operational risks associated with the location of the T-SCIF, specifically if it\u2019s located in an area that is not U.S.-controlled. The AO will determine what area offers the greatest degree of protection against forced entry.<\/p><\/p>\n\n\n\n<p><br><p>The T-SCIF will have only one entrance that will be controlled and monitored during the T-SCIF\u2019s hours of operation by SCI-indoctrinated persons via access roster. When in operation, the perimeter will be guarded by guards with a U.S. SECRET clearance. Hardened T-SCIFs with no open storage of secure material can be monitored by a U.S. SECRET-cleared individual.<\/p><\/p>\n\n\n\n<p><br><p>Does your facility require a&nbsp;<a href=\"https:\/\/www.klsecurity.com\/index.php\/products\/safes\/gsa-approved-safes.html?applications=40\" target=\"_blank\" rel=\"noreferrer noopener\">SCIF<\/a>? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, &amp; mobile requirements. &nbsp;We assist in the acquisition of modular facilities for DoD &amp; Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access&nbsp;<a href=\"https:\/\/www.klsecurity.com\/index.php\/consulting\" target=\"_blank\" rel=\"noreferrer noopener\">control planning and commercial business security<\/a>.<\/p><\/p>\n\n\n\n<bgr><p>Call 866-867-0306 or email&nbsp;<a href=\"mailto:contact@klsecurity.com\">contact@klsecurity.com<\/a>&nbsp;to see how the experts at KL Security can assist your facility in security needs.<\/p>\n\n\n\n<h6><em><a href=\"https:\/\/www.dni.gov\/files\/NCSC\/documents\/Regulations\/Technical-Specifications-SCIF-Construction.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities<\/a><\/em><em><\/em><\/h6>\n\n\n\n<h5><a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-1-site-evaluation\/\" target=\"_blank\">SCIF Container Series | Part 1: Site Evaluation<\/a><\/h5>\n\n\n\n<h5><a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-2-design-planning-checklist\/\" target=\"_blank\">SCIF Container Series | Part 2: Design Planning Checklist<\/a><\/h5>\n\n\n\n<h5><a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-3-perimeter-wall-construction-wall-a\/\" target=\"_blank\">SCIF Container Series | Part 3: Perimeter Wall Construction &#8211; Wall A<\/a><\/h5>\n\n\n\n<h5><a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-4-perimeter-wall-specifications-wall-b\/\" target=\"_blank\">SCIF Container Series | Part 4: Perimeter Wall Specifications &#8211; Wall B<\/a><\/h5>\n\n\n\n<h5><a href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-5-perimeter-wall-specifications-wall-c\/\" target=\"_blank\" rel=\"noreferrer noopener\">SCIF Container Series | Part 5: Perimeter Wall Specifications &#8211; Wall C<\/a><\/h5>\n\n\n\n<h5><a href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-6-vents-and-ducts\/\/\" target=\"_blank\" rel=\"noreferrer noopener\">SCIF Container Series | Part 6: Vents and Ducts<\/a><\/h5>\n\n\n\n<p><br><p>Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.<\/p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/Anagrams-8.31.png\" alt=\"\" class=\"wp-image-656\" width=\"734\" height=\"611\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/Anagrams-8.31.png 729w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/Anagrams-8.31-300x250.png 300w\" sizes=\"(max-width: 734px) 100vw, 734px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Modular SCIFs include ground-based temporary SCIFs (T-SCIFs) and include those on mobile platforms such as trucks and trailers\/containers, and SCIFs aboard aircrafts and on surface\/subsurface vessels. Modular SCIFs are the most durable and cost effective SCIF in both design and manufacturing. These versatile SCIFs require less construction time than a regular SCIF and can be &hellip; <a href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-7-modular-scifs\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SCIF Container Series | Part 7: Modular SCIFs<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":596,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[242],"tags":[246,243,248,247,244,142,245],"_links":{"self":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/655"}],"collection":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=655"}],"version-history":[{"count":3,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/655\/revisions"}],"predecessor-version":[{"id":660,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/655\/revisions\/660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media\/596"}],"wp:attachment":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}