Skip to main content

Trusted by 100,000+ organizations globally

Places of worship are often considered the heart of a community, providing a safe space for groups to gather and participate in activities. While churches may not seem like a primary target for physical attacks, FBI data suggests that violence against churches may be increasing, with almost 500 incidents reported each year.

Should a security breach or other emergency occur, church safety and security plans must be in place to protect community members and mitigate risks. Through a combination of security solutions, policies, best practices and protocols, church security teams can deter common threats and improve real-time incident responses.

Below is a comprehensive guide to church safety planning and security, including best practices for reviewing and improving church security protocols to help church operators, congregation leaders and community members protect their institutions from modern threats.

What does church security include?

Church security covers a range of technologies, best practices and policies positioned to safeguard people and property from security threats. Church security systems typically include access control, CCTV, alarm solutions and other technologies designed to identify and address threats, alongside clear event response plans.

The operation, review and strengthening of church security systems will be the responsibility of an elected church security team. These professionals will continuously observe all active devices and review all emergency response plans to ensure church security policies remain effective. A church security checklist should be developed to aid stakeholders in this pursuit.

Church security checklists include a concise list of tasks to ensure all security systems and organizational processes are working properly. Examples include checking all security cameras are functional, all doors are secure and all alarms are properly configured. 

Protect your place of worship with modern security

  • End-to-end video and access control solutions
  • Versatile security cameras built for simplicity 
  • Real-time observance for fast incident response
  • Robust, vandal-resistant options 
  • Long-range perimeter protection

What does a church security team look like? 

Church security teams must include a combination of trained security professionals, medical personnel and trusted congregation members with intimate knowledge of the property and the local community. Some team members will be in charge of observing security systems and enacting incident responses, with others taking more of an administrative role. 

Any members of the congregation with a background in security, law enforcement, IT, healthcare or the military should be approached to serve on the church safety team and be prepared to respond quickly and effectively in high-stress situations.

Church security team members include:

  • Board members: Congregation members who create church safety plans and manage security teams. This includes a pastor, treasurer, president and trusted congregation members.
  • Security director: The board will elect a security director from the congregation to lead the fulfillment of security plans. This person is responsible for training security team volunteers and selecting equipment for church security systems.
  • Security guards: Larger institutions may hire trained security guards to observe the property and manage security devices during busy events. Smaller churches may instead elect congregation members to perform this role during normal service.
  • First aiders: Church safety plans must identify community members trained in t first aid. These individuals will be in charge of administering basic first aid in the event of an emergency before official first responders arrive on the scene.
  • IT personnel: Church members with IT experience must be identified to help ensure security technologies are working effectively. External professionals must regularly review systems, though internal IT teams can provide day-to-day support.
  • Law enforcement liaison: Church security protocols must include processes for contacting first responders in an emergency. This may be achieved via panic buttons, automated alerts or manual contact from security team members.

All church safety and security team members must attend regular meetings to discuss active security plans and practice emergency responses. Lockdowns, evacuations and first aid responses must be practiced frequently, with documents outlining these processes made available to all church members. Updates and risk assessments should also be discussed.

The importance of church security plans and protocols 

Developing and regularly reviewing church security plans ensures all community members understand how to respond to physical threats and emergencies safely. Should a targeted attack or emergency occur, congregation members must know how to protect themselves, support other individuals, contact local authorities and evacuate the church safely.

Additionally, creating and communicating clear security plans and procedures will help church members respond to various threats effectively. 

Active harmer events 

Active harmer events involve individuals entering specific locations with the express purpose of causing physical harm to others. This includes acts of violence and terrorist incidents involving dangerous weapons. As it’s not uncommon for such events to be religiously motivated, church security plans must contain strategies to deter, identify and address physical attacks.

Despite active shooter events rising by 52% across the US in recent years, data shows only 57% of US churches have dedicated response plans in place. Church security teams should utilize a combination of access control, weapon detection and CCTV solutions to deter and address these events, as well as issue lockdown and evacuation plans to church members.

Natural disasters 

Church safety and security plans must also consider responses to natural disasters like floods, earthquakes and storms. Members should be informed of how to safely evacuate the premises or shelter in place, as well as how to approach medical emergencies that may arise as a result of structural damage, fires, electrical faults or other similarly harmful events.

Access systems should be designed to provide law enforcement with temporary credentials used to grant safe access in the event of an emergency. Communication devices must be accessible to ensure members can contact authorities reliably. Also, church security teams must have plans in place to perform accurate headcounts used to inform ongoing responses.

Vandalism and theft

Churches can be common targets for acts of vandalism, with both the outside and inside of the property requiring protection against defacement and physical damage. Visible security cameras can act as a deterrent against vandalism and capture evidence of criminal behavior to aid later investigations. Motion sensors and alarms may also assist.

Theft is another common threat, with personal property, cash, computers, vehicles and even fixtures like copper pipes often targeted by opportunistic criminals. Church security systems featuring motion sensors, cameras and access control readers can help teams to prevent unauthorized access to valuable assets, while also capturing evidence of suspicious activity.

Arson attacks 

Churches, especially older properties constructed primarily from wood, may be vulnerable to arson attacks. Data published in 2015 found that 50% of all church fires recorded during the previous 20 years were due to intentional arson attacks. These threats are still common across the US, with 135 arson attacks against churches being recorded between 2018 – 2023.

Visible church security systems must be considered to deter attackers from targeting the property, with policies to help members report potential threats and respond to fires. Alongside fire safety training and evacuation plans, temperature sensors and thermal CCTV cameras can automatically respond to and warn teams of potential arson attacks.

Internal threats 

In addition to defending against unknown assailants, church security teams must consider how internal threats will be prevented and addressed. Policies may be created restricting the number of congregation members who can access valuable assets like computers, money and artwork, with similar rules governing access to digital systems containing sensitive data.

Access control systems ensure select locations and assets remain physically protected from internal threats, providing reviewable records of access events to aid investigations. Regular meetings and community-focused efforts can also help to foster a culture of security within the community, helping to reinforce that criminal behavior will be identified and addressed. 

Common types of security for churches 

To support church security teams in detecting, observing and addressing various threats, bespoke combinations of security technologies must be deployed. Church security directors and board members should explore multiple types of security for churches to find appropriate solutions suited to unique requirements. Common examples are provided below.

Access control systems 

Access control systems positioned to cover all main entrances, exits and sensitive locations help security teams prevent unauthorized intrusions. Congregation members can be issued personalized credentials granting access to select locations, with all access events recorded automatically. This enables teams to review logs freely and investigate anomalous activities.

Different credential types can be used for high and low-risk areas. For example, simple key cards may control access to perimeter gates and main entrances, with biometric fingerprint scanners used to secure utility and storage rooms. Mobile credentials may also grant temporary access to visitors and contractors with permissions stored on smartphones. 

When selecting access solutions for church security, consider the following features:

  • Remote access: Cloud-based systems enable security teams to view, manage and adjust access solutions remotely. Admins can revoke permissions if credentials are lost or stolen, manually open locks and review logs from any secure smart device.
  • Access models: Rules and roles can be set to automatically govern the operation of church security access systems. A rule may be set to lock all doors after a certain hour, with roles granting only church security staff entry to storage and utility rooms.
  • Integrations: Access systems can be linked to wider security devices like cameras and intrusion alarms to strengthen church security. For example, a failed access attempt may trigger on-site alarms and cause nearby cameras to automatically record live footage.

Video security solutions 

Video security cameras installed both outside and inside the building ensure church security teams have required visibility over all key assets. Care must be taken to select appropriate CCTV camera types for different locations, with some key features required for specific use cases.

 

  • Bullet cameras: Designed to capture high-quality footage at long-range, ideal for observing building perimeters. Prioritize models with night-vision settings and durable weather-resistant casings to ensure bullet CCTV cameras remain functional in adverse conditions.
  • Dome cameras: Offer a wide field of view to provide great coverage of large, open spaces like parking lots, naves and storage rooms. Dome CCTV cameras feature protective dome-shaped casings over the lens that will need to be cleaned regularly.
  • PTZ cameras: Pan-Tilt-Zoom cameras can be adjusted remotely, allowing operators to observe suspicious activity more accurately. These cameras are best installed in high-traffic areas where viewing angles may need adjusting to capture subtle events.

Smart alarms and sensors

Internet of Things (IoT) sensors and connected alarms can be deployed to autonomously detect and warn church security teams of specific threats. For example, IoT motion sensors may be installed near internal access points and programmed to trigger alarms if motion is detected after a certain time. Heat, smoke, noise pressure, and vape sensors may also be utilized.

When selecting an alarm system, teams should prioritize a hard-wired solution built into the property’s walls to prevent cables from being tampered with. It’s also wise to select a service provider with extensive experience developing systems for commercial properties and one who will provide ongoing maintenance to ensure systems remain operational. 

Perimeter security solutions

Perimeter security includes fences, gates and physical barriers to prevent unauthorized access and guide traffic into easily-observed areas. Church security systems can also provide some perimeter security benefits. For example, data shows visible security cameras installed outside of a property may ward off as many as 60% of would-be burglars. 

Additional perimeter security technologies to consider include:

  • Access control gates: Private entrance roads and parking lots can be secured behind access control gates. Members and verified guests must present pre-issued credentials to a stationary access reader before access to the church will be granted.
  • Intercoms: Audio-only or video intercom systems may be installed at access gates and external entrances. Visitors request access through the intercom system, enabling church staff to visually or auditorily verify their credentials before access is granted. 
  • License Plate Recognition (LPR) cameras: LPR camera systems feature smart video analytics software capable of identifying and analyzing license plate data. These cameras can detect the presence of known and unknown vehicles, enabling church security teams to better investigate and report suspicious vehicular activity. 

Cybersecurity considerations

Church security plans must also make considerations to protect sensitive personal data and security information stored in digital systems. Internal databases, financial information and data associated with security solutions like access control and CCTV tools must be reliably protected against unauthorized access to maintain compliance with data privacy regulations.

Recommended cybersecurity considerations for churches include:

  • Private Wi-Fi: Wi-Fi networks must be password-protected to prevent unauthorized persons from accessing sensitive systems. Private Wi-Fi networks ensure all data sent between devices is encrypted and allow staff to observe all connected devices.
  • Encryption software: Dedicated encryption software can mask all data sent between computers, personal devices, and security hardware from unauthorized persons, ensuring private and sensitive information is unreadable to outside sources.
  • Password hygiene: Weak passwords are involved in over 80% of cyber-attacks. All church security staff must be trained in good password hygiene, including how to create strong passwords and never use the same password for multiple accounts.
  • Firewalls: Firewalls prevent cyber-attackers from using malicious software to access private networks and devices by continuously observing network traffic and automatically blocking access requests from unknown and unauthorized sources.
  • Training programs: 74% of cyber-attacks are caused by human error. Church security directors must ensure all staff and volunteers understand cybersecurity best practices, and how to spot and avoid common threats like social engineering attacks.

How to build your church’s security plan

Combining the technologies mentioned above, policies and strategies into an effective and bespoke church security policy can be daunting. Teams will need to be assembled, risk assessments will need to be performed and board members will need to ensure all potential threats and emergencies are appropriately identified, considered and addressed.

1. Garner stakeholder support

Before any church security plans can be implemented, project leaders will need the support of relevant stakeholders. Church board members must first approve the redevelopment of security systems and policies before wider contributors can be consulted. 

  • Church staff: General staff members will need to be brought on board to aid in developing and delivering church security plans. Staff can offer insights into how reasonable prospective plans will be to implement and help find reliable volunteers.
  • Professionals: Church members with a background in the military, police force, fire service or other relevant security-focused industries should be approached for advisory roles. Their experience will help to inform effective church security policies.
  • Volunteers: Volunteers will form the backbone of the church security team and will be integral to the effective delivery of security plans. Project leaders must approach trusted congregation members to draft them into security planning operations.

2. Perform a thorough risk assessment

Church security plans must be positioned to address the unique needs of each institution. Different churches will likely face different threats. For example, a church in a busy area may face an elevated risk of vandalism, while an older church may be more vulnerable to arson attacks. Risk assessments help highlight these risks.

Church security directors should review local crime records, past security incidents and consult trusted congregation members to identify realistic threats. A property review should also be conducted to highlight any potential vulnerabilities the existing security systems expose. Access points, CCTV systems, alarms and organizational policies should be examined from an intruder’s perspective to uncover weaknesses.

3. Seek professional assistance

Members of the congregation with a background in security should review risk assessment findings and recommend actionable solutions. It’s also wise to request support from non-emergency personnel working for local authorities. Emergency services may have a volunteer department to visit the congregation for safety and security advice.

A strong relationship with local law enforcement is also vital.  Church security directors should inform local police of proposed security developments, communicate regularly to inform church emergency response plans and enable teams to establish policies for contacting authorities. 

4. Select appropriate technologies 

Informed by risk assessment findings and information gathered from local authorities, church security directors can begin to prioritize which technologies and systems should be updated. Chosen solutions must match the specific needs of the property and the congregation, with functionality, management, usability and maintenance requirements all equally considered.

For example, if access systems have been identified as a necessary investment, time must be taken to choose a convenient and operable solution. Older church members may struggle to use mobile credential systems, and biometric systems may require extra data security measures. 

5. Explore security grant opportunities 

After the church security director, board members and all other relevant stakeholders have agreed on security investments, it can be wise to explore potential funding opportunities. While the church’s existing budget may cover some security improvements, financial support might be available through federal and charitable security grant programs. 

Currently, churches can apply for the Nonprofit Security Grant Program (NSGP), a federal initiative intended to provide funding support for target hardening and other physical security enhancements and activities to nonprofit organizations at high risk of terrorist attack.” Grant programs can also be searched using the government’s online search tool.

6. Train church security team members

To ensure newly implemented church security systems function as intended, security team members will need to be trained in safe operation, observation and maintenance practices. Members should learn how to issue and manage access credentials, observe CCTV solutions, activate alarm systems and report incidents using secure communication devices.

Organizational policies must also be developed. Church security plans should include clearly defined policies outlining how security team members are expected to handle incidents like active harmer events, fires and medical emergencies. Plans must be documented and made available to all members on request, with regular meetings to reinforce security policies.

7. Develop child safety policies 

In the event of an emergency, children are unlikely to respond as quickly and effectively as adult church members. Church security plans must account for this through specific policies aimed at safeguarding children. Any congregation members with experience in professional childcare must be identified and tasked with assisting children in the event of an emergency.

Additional safeguarding best practices include:

  • Background checks - Any individuals tasked with safeguarding children or spending any amount of time alone with children must pass a thorough background check.
  • Access restrictions - A drop-off and check-out process should be created to ensure children are only ever left in the care of legal guardians or childcare professionals.
  • Safety information - Legal guardians must be asked to fill out forms documenting vital medical information such as allergies, health conditions and physical limitations.

8. Maintain incident report logs 

Maintaining detailed incident reports is a vital aspect of church security. By collecting and documenting information about security incidents, both large and small, stakeholders can adjust existing church security plans to prevent similar incidents from occurring in the future.

To ensure incident reporting processes are standardized, consistent and repeatable, stakeholders should document the following:

  • Date and time
  • Location of the event
  • Persons involved
  • Witness information (names, contact details and statements)
  • Injuries/​damages sustained
  • Actions taken by staff and bystanders
  • Actions taken by responding authorities
  • A detailed summary of events

9. Continuously review church security plans 

Church security must always be viewed as a continuous process. Threats and risk factors will evolve as the community changes, systems become outdated and criminals become more sophisticated. Frequent and comprehensive assessments must be performed to ensure church security plans and technologies continue to provide adequate protection.

Church security directors and board members should review security policies at least once every 6 – 12 months. Technologies should be assessed to ensure they’re well-maintained and updated, emergency response plans should be reviewed and practiced, and incident report logs should be analyzed. Such commitments will ensure continuous security improvements.

Complete church security checklist

Our church security checklist has been specially designed to aid church security teams and volunteers in developing, optimizing and maintaining effective security plans.

Roles and responsibilities

  • Appoint a security team leader to oversee operations
  • Appoint security team members to enforce security policies
  • Appoint an emergency response team trained in first aid
  • Appoint safeguarding officers to take responsibility for childcare
  • Appoint perimeter security teams to stand guard outside during events
  • Appoint technology leaders to monitor equipment like cameras and access systems

Access security

  • Check that all access points are properly secured
  • Ensure all access control software is up to date
  • Make sure to review and organize all access logs
  • Check that all old and unused credentials have been deactivated
  • Check that local authorities have access codes to enter the premises

Alarms and sensors

  • Check that all fire alarms are working and up-to-date
  • Check that all smoke detectors are working and up-to-date
  • Check that all environmental sensors (motion/​sound etc.) are working and up-to-date
  • Check that all active alarms and sensors are free from obstructions

Communication plans

  • Establish a secure method of communication (walkie-talkies / mobile devices etc.)
  • Check that all communication devices are working properly and up to date
  • Check that all team members know how to safely use communication devices
  • Check that all communication devices are secure and free from interference
  • Establish code words and gestures to visually communicate security concerns
  • Ensure security team leaders regularly liaise with local law enforcement agencies

Video security 

  • Ensure all cameras are operational
  • Make sure all cameras are frequently inspected
  • Make sure security footage is appropriately stored and managed
  • Ensure all camera software solutions are up-to-date 

Special event protocols

  • Establish a safe ratio of security team members to event attendees
  • Hire external security professionals for events where attendance exceeds this threshold
  • Establish safety protocols for children’s events (after-school clubs/​parties etc.)
  • Ensure all attendees understand evacuation plans and know where exits are located

Evacuation plans

  • Check that all emergency exits are clearly labeled
  • Check that all exit routes are free from obstructions
  • Make sure a meeting point has been established
  • Establish a process for contacting local authorities
  • Ensure safety drills are regularly conducted and updated

Conclusion

To develop an effective church security plan, stakeholders must commit to a comprehensive review of their institution’s unique requirements. A security team must be assembled, risk assessments must be conducted and appropriate technologies must be leveraged to provide essential support. Plans should be developed alongside insights from internal and external professionals, with security policies continuously reviewed to ensure future-proof protection.

Have questions? We can help

Our video security experts can help you implement the right security system for your business.