Food Defense Plan Page 1 of 13
Issue Date:
Supersedes: N/A
Food Defense Plan
[Company Name]
Developed By ____________ [Qualifications]
Implemented By ___________ [ Title]
Implemented on ___________ [Date]
Food Defense Plan Page 2 of 13
Issue Date:
Supersedes: N/A
Food Defense Team: 3
Vulnerability Assessment: 4
Section 1: Outside Security Measures 4
1.1 Physical Security 4
1.2 Shipping / Receiving Security 4
1.3 Mail Handling Security 5
Section 2: Inside Security Measures: 5
2.1 General Inside Security 5
2.2 Production Area Security 6
2.3 Storage Security 6
2.4 Ingredients/Water/Ice Security 6
2.5 Chemical Hazardous Material Control Security 7
2.6 Information Security 7
Section 3: Personnel Security Measures 8
3.1 Employee Security 8
3.2 Non-Employee Security (visitors, contractors, guests, customers, truck drivers) 8
3.3 Security Training 8
Section 4 Incident Response Measures 9
4.1 Investigating Security Concerns 9
4.2 Emergency Contact Security 9
4.3 Other Plant Security 10
Vulnerability Mitigation Strategy 11
Food Defense Plan Page 3 of 13
Issue Date:
Supersedes: N/A
Food Defense Team:
Name Title Role
Food Defense Plan Page 4 of 13
Issue Date:
Supersedes: N/A
Vulnerability Assessment:
Section 1: Outside Security Measures
Goal: to prevent unauthorized access by people, or entry of unauthorized materials into the facility
1.1 Physical Security
Vulnerability Yes No N/A Detail
Are plant boundaries clear and secure to prevent unauthorized entry?
Are entrances secured (locks, alarms, etc.?)
Is the plant perimeter periodically monitored for suspicious activity?
Are other access points (windows, vents) secured?
Is outside storage on the premises protected from unauthorized access?
1.2 Shipping / Receiving Security
Vulnerability Yes No N/A Detail
Are incoming shipments examined for potential tampering?
Are incoming and outgoing vehicles examined for suspicious activity?
Food Defense Plan Page 5 of 13
Issue Date:
Supersedes: N/A
Are loading and unloading activities scheduled / monitored?
Is loading dock access controlled (for example, monitored or locked?)
Are incoming shipments secured with locks or seals?
Are outgoing shipments locked or sealed?
1.3 Mail Handling Security
Vulnerability Yes No N/A Detail
Is mail handled aware from food including ingredients and packaging?
Are employees who handle mail aware of proper handling of suspicious mail and US
postal service guidelines?
Section 2: Inside Security Measures:
Goal: to protect product from intentional contamination
2.1 General Inside Security
Vulnerability Yes No N/A Detail
Are suspicious packages reported to appropriate personnel?
Are restricted areas of the establishment clearly identified?
Are previously unattended materials checked before use?
Food Defense Plan Page 6 of 13
Issue Date:
Supersedes: N/A
Are unexpected changes in inventory (product or equipment) reported to appropriate
personnel?
Is Emergency lighting in place?
Is an emergency alert system identifiable, tested, and reviewed with emergency
contacts
2.2 Production Area Security
Vulnerability Yes No N/A Detail
Is access to product restricted?
Is access to production equipment restricted (ovens, mixers, etc)
Do records ensure traceability for one step backward, one step forward or both?
2.3 Storage Security
Vulnerability Yes No N/A Detail
Is access to storage areas restricted?
Is stock rotation practiced?
Are labels and packaging materials controlled to prevent theft and misuse?
Are periodic examinations for tampering of materials in storage performed?
Food Defense Plan Page 7 of 13
Issue Date:
Supersedes: N/A
2.4 Ingredients/Water/Ice Security
Vulnerability Yes No N/A Detail
Is access to storage tanks for potable water/reuse systems restricted?
Is access to lines that transfer water or ingredients examined and restricted?
Is access to plant ice-making equipment controlled?
Is supplier food safety/security information requested?
2.5 Chemical Hazardous Material Control Security
Vulnerability Yes No N/A Detail
Are chemicals/hazardous materials in a restricted area or secured by lock?
Do you maintain an up-to-date inventory of hazardous materials and chemicals and
investigate discrepancies?
Is potentially hazardous waste (biological or chemical) controlled and disposed of?
2.6 Information Security
Vulnerability Yes No N/A Detail
Is access to sensitive information such as site plans and processing details controlled?
Food Defense Plan Page 8 of 13
Issue Date:
Supersedes: N/A
Is access to computer systems protected through firewalls / passwords?
Food Defense Plan Page 9 of 13
Issue Date:
Supersedes: N/A
Section 3: Personnel Security Measures
Goal: to ensure that only authorized personnel are in the facility at any time:
3.1 Employee Security
Vulnerability Yes No N/A Detail
Is a method to recognize or identify employees in the facility in place?
Are background or reference checks conducted for new hires?
Do employees have restrictions on what they can bring in and take from the facility?
3.2 Non-Employee Security (visitors, contractors, guests, customers, truck drivers)
Vulnerability Yes No N/A Detail
Is a log of non-employees entering the establishment maintained?
Is a method to recongize or identify non-employees in the establishment in place?
Are non-employees chaperoned on site?
Are non-employees restricted to appropriate areas?
Are non-employees restricted on what they can bring in or take from the facility?
Food Defense Plan Page 10 of 13
Issue Date:
Supersedes: N/A
3.3 Security Training
Vulnerability Yes No N/A Detail
Is awareness training on security measures provided to new employees?
Is a refresher awareness training on security measures offered to employees on a
periodic basis?
Are employees trained to report suspicious activities or unusual observations?
Section 4 Incident Response Measures
Goal: To respond quickly to a product contamination threat or event using planned members
4.1 Investigating Security Concerns
Vulnerability Yes No N/A Detail
Do you have procedures to ensure that adulterated or potentially harmed products
are held?
Are customer comments investigated?
Are members encouraged to report unusual activities?
Is information available to employees about how to respond to threats?
Do employees have the ability to stop activities in order to minimize a potential food
defense incident?
Food Defense Plan Page 11 of 13
Issue Date:
Supersedes: N/A
Are reported security breaches (alarms, suspicion of tampering) investigated?
4.2 Emergency Contact Security
Vulnerability Yes No N/A Detail
Is employee/member contact information kept up to date?
Are emergency contact lists kept up to date?
4.3 Other Plant Security
Vulnerability Yes No N/A Detail
Is a product recall plan maintained and periodically reviewed?
Is key personnel trained in product recall procedures?
Food Defense Plan Page 12 of 13
Issue Date:
Supersedes: N/A
Vulnerability Mitigation Strategy
Vulnerability Mitigation Strategy
Status Response Monitoring Corrective Action Verification
Food Defense Plan Page 13 of 13
Issue Date:
Supersedes: N/A