BRC Global Standard: Food Defense and Site Security Audit Checklist

A comprehensive audit checklist focusing on food defense and site security practices within the framework of the BRC Global Standard for Food Safety, ensuring effective protection against intentional adulteration and malicious contamination.

Get Template

About This Checklist

The BRC Global Standard: Food Defense and Site Security Audit Checklist is a critical tool for food and beverage manufacturers committed to protecting their products from intentional adulteration and malicious contamination. This specialized checklist aligns with the food defense requirements of the BRC Global Standard for Food Safety, focusing on the assessment and mitigation of potential threats to the food supply chain. By systematically evaluating site security measures, personnel practices, and incident response protocols, this checklist helps organizations safeguard their products, facilities, and brand reputation against deliberate acts of contamination or sabotage. Regular use of this checklist not only supports compliance with BRC requirements but also enhances an organization's resilience against emerging food defense threats in an increasingly complex global food production landscape.

Learn more

Industry

Food and Beverage

Standard

BRC Food Safety Standard

Workspaces

Food Manufacturing Facility

Occupations

Food Safety Manager
Security Officer
Operations Manager
Quality Assurance Specialist
Crisis Management Coordinator
1
Is there a documented threat assessment in place?

Select whether the threat assessment is complete.

To ensure that potential threats to food safety have been identified and assessed.
2
Are access control measures in place to restrict unauthorized entry?

Indicate if access control measures are implemented.

To evaluate the effectiveness of security measures against unauthorized access.
3
How frequently is personnel security training conducted? (in months)

Enter the frequency of training in months.

To assess the regularity of training in personnel security.
Min1
Target6
Max12
4
Is there an incident response plan available and accessible to staff?

Select the availability status of the incident response plan.

To confirm that staff can respond effectively to security incidents.
5
What measures are in place to protect the supply chain?

Provide details on supply chain protection measures.

To evaluate the effectiveness of supply chain protection strategies.
6
Are emergency contact details accessible to all staff?

Select the availability status of emergency contacts.

To ensure that staff can quickly contact necessary personnel in emergencies.
7
Describe the documentation process for food safety training.

Provide details on the documentation process.

To evaluate how food safety training is recorded and maintained.
8
How often are access control audits conducted? (in months)

Enter the frequency of audits in months.

To assess the regularity of access control audits for compliance.
Min1
Target6
Max12
9
Are background checks conducted for all new personnel?

Indicate if background checks are performed.

To confirm that security measures are in place for personnel selection.
10
Outline the procedures for handling incident reports.

Provide a detailed description of handling procedures.

To evaluate the effectiveness of incident reporting and response procedures.
11
Are visitor access protocols documented and enforced?

Select the status of visitor access protocols.

To ensure that visitor access is managed effectively to prevent unauthorized entry.
12
Are monitoring systems fully operational?

Indicate if monitoring systems are operational.

To verify that security monitoring systems are functioning correctly.
13
How frequently are security drills conducted? (in months)

Enter the frequency of drills in months.

To assess the frequency of security preparedness drills.
Min1
Target3
Max12
14
Describe the food defense measures in place.

Provide a detailed description of food defense measures.

To evaluate the effectiveness of measures taken to defend against intentional adulteration.
15
When was the last security audit performed?

Enter the date of the last security audit.

To ensure that security audits are conducted regularly and documented.
16
Are all suppliers verified for security compliance?

Select the compliance status of supplier security verification.

To ensure that suppliers meet necessary security standards to protect the supply chain.
17
Are security monitoring logs maintained and reviewed regularly?

Indicate if security logs are maintained.

To ensure that security incidents can be tracked and reviewed for potential improvements.
18
How often is incident response training conducted? (in months)

Enter the frequency of incident response training in months.

To evaluate the regularity of training for handling incidents effectively.
Min1
Target12
Max24
19
Describe the risk assessment process for food safety.

Provide a detailed description of the risk assessment process.

To assess the thoroughness and effectiveness of food safety risk assessments.
20
When was the last food safety training conducted?

Enter the date of the last food safety training.

To ensure that food safety training is up to date and regularly conducted.
21
Is there a scheduled maintenance plan for security equipment?

Select the status of the security equipment maintenance schedule.

To ensure that security equipment is properly maintained and functional.
22
Are vulnerability assessments conducted regularly?

Indicate if vulnerability assessments are conducted regularly.

To verify that potential vulnerabilities are identified and addressed in a timely manner.
23
How often are food safety audits performed? (in months)

Enter the frequency of food safety audits in months.

To determine the frequency of food safety audits to ensure compliance.
Min1
Target6
Max12
24
Provide an overview of the crisis management plan.

Summarize the crisis management plan.

To assess the preparedness and strategies in place for crisis situations.
25
When was the last food security review conducted?

Enter the date and time of the last food security review.

To ensure that food security reviews are conducted periodically.

FAQs

The checklist covers threat assessment, site security measures, access control, personnel security, visitor management, transportation security, incident response planning, and food defense training programs.

It guides the assessment of critical points in the production process where intentional adulteration could occur, ensuring appropriate preventive measures are in place to mitigate these risks.

The audit should involve the food defense team, including security personnel, operations managers, human resources representatives, and key members of the crisis management team.

It includes checks on information security practices, ensuring that sensitive details about food defense measures, site layouts, and critical process points are properly protected and shared on a need-to-know basis.

Yes, the Food Defense and Site Security Audit Checklist is adaptable to various types of food and beverage facilities. However, it should be tailored to reflect the specific threats, vulnerabilities, and operational characteristics of each facility.

Benefits

Ensures comprehensive food defense measures in line with BRC Global Standard

Reduces risks associated with intentional adulteration and malicious acts

Enhances overall site security and personnel awareness

Improves preparedness for potential food defense incidents

Demonstrates commitment to product integrity and consumer safety