Protective Security Procurement (SUA)

The procurement of Protective Security-classified goods, services, and contracts implies that you, as the contracting authority, entrust your critical assets to third parties. It is imperative to verify their reliability, loyalty, resilience, and their capability to physically and informationally protect your critical assets. GovSec can assist both contracting authorities and procurement officers, as well as support suppliers in fulfilling these requirements…

Influence Operations

Subversion (such as influence operations) We hear daily about a large number of suspected and identified influence campaigns, including after the downing of the Malaysian airliner MH17 over Ukraine, in the US presidential election, in the UK Brexit vote, through forged letters from the Swedish Minister of Defense on arms exports to Ukraine and the turmoil around the poisoning of Sergei Spiral and his daughter in England. Swedish...

Security Legal Affairs

Protective Security is heavily regulated by laws, regulations and statutes. The important thing is interpretation and application and to put the requirements of the regulations in relation to the protection values and the threat situation. Examples of regulations are: Security Protection Act (2018:585) Security Protection Ordinance (2021:955) Protection Act (2010:305) Ordinance (2015:1053) on total defense and heightened preparedness The Swedish Armed Forces' regulations on the signal protection service (2021:1) The Swedish Security Police's regulations on security protection (2022:1) The Swedish Armed Forces'...

Information Security

Information Security PROTECT YOUR ASSETS Information constitutes a fundamental building block within an organization, akin to personnel, premises, and equipment. Through a systematic approach to information security, organizations can enhance the quality and trustworthiness of their operations. Adhering to established standards in information security efforts significantly increases the likelihood of success. Information security encompasses much more than…

Protective Security planning

Protective Security Planning One of the most critical aspects within Protective Security is the planning of Protective Security measures. Protective Security planning is a structured methodology comprising several steps, as stipulated by the Swedish Security Service and the Swedish Armed Forces. Furthermore, the fundamental provisions of Chapter 2, Section 1 of the Protective Security Act mandate Protective Security planning for any entity conducting security-sensitive operations. The Protective Security planning methodology is not exclusively applied to…

Physical Security

General information about physical security Physical security is perhaps one of the first things that comes to mind when working with Protective Security. Protective Security one of the three pillars of protection specified in the Security Protection Act 2018:585. Chapter 2, Section 3 states that "physical security shall prevent unauthorized persons from gaining access to areas, buildings, and other facilities or...

Personnel Security

Background Checks It is of paramount importance to employ and engage personnel who are reliable, loyal, and not vulnerable. We can conduct background checks, perform security vetting including security vetting interviews, and process applications for record checks with the Swedish Security Service. Background Checks We conduct background checks of varying scopes, which we utilize during the security vetting process or to provide a comprehensive analysis and summary…

Signal Protection

Crypto Protection is a method of safeguarding information by employing cryptographic solutions that prevent unauthorized access to and manipulation of telecommunications, encompassing both data traffic and voice communications. Crypto Protection is a mandatory requirement for any entity transmitting or processing Protective Security-classified information (classified as secret concerning Sweden's security) outside an information system under the operator's control. This is stipulated…