Blog
Construction Site Security Cost: Four Tiers, One Honest Budget
Four budget tiers for construction security, mapped against project size and risk profile. The honest breakdown that survives a CFO review.

Dr. Raphael Nagel
December 28, 2024

A construction security budget that survives the second meeting with the CFO is built backwards, from loss exposure and timeline risk, not forward from a list of cameras and guard hours.
Most security budgets on construction projects fail one of two tests. They either undershoot, because the project manager wanted to keep the line item invisible until the first incident forced a supplemental, or they overshoot in a way that looks like insurance against accusation, not against theft. Neither version reflects what the site actually needs. The honest budget begins with the question of what a single bad night costs in cascading delay, and works back to a number that a controller can defend without resorting to fear.
Why the typical security line item is wrong before it is written
The general contractor's security line item is, in most submitted budgets, a residual. It is what remains after structure, mechanical, electrical, finishes, logistics and contingencies have taken their share. The number is then benchmarked against what was spent on the previous project of similar size, with a small adjustment for inflation. This method produces budgets that look reasonable in the spreadsheet and underperform in the field, because the previous project was either lucky or under-instrumented, and in both cases the data carried forward is not data, it is anecdote.
A second source of error sits in how losses are recorded. When a distribution cabinet disappears overnight, the cost that lands in the security column is the replacement value of the cabinet. The cost that does not land there is the three days the electrician loses, the dry-wall crew that shifts, the painters who shift after them, and the handover that moves by a week. The general ledger files those as schedule slippage or scope adjustment. The security budget therefore looks cheaper than it was, and the next project inherits the same understatement. NICB data on construction theft, ASIS International field surveys and BSI guidance on critical infrastructure protection all point in the same direction: the cost of a security incident is rarely the cost of the stolen item. It is the cost of the chain that the item interrupted.
A third error is structural. Security is treated as a procurement category rather than an operational discipline. The procurement department sources guard hours by price per hour, fencing by linear metre, lighting by lumen output, and cameras by megapixel. Each line is optimised in isolation. The system, if one can even call it a system, is not optimised at all. The result is the well-documented pattern that CISA describes in its physical security advisories for construction adjacent to critical infrastructure: layered controls that appear adequate on paper, fail at the interface between layers, and leave the operator surprised when an incident exposes the seam. A budget that survives a CFO review is one that names the operational outcome it buys, not one that lists the components it pays for.
Tier one. The minimum that still counts as security
The first tier covers projects below roughly five million euros in build value, with construction periods under nine months, in locations that show no concentrated history of theft or vandalism, and where the material on site at any one time stays under a defined ceiling. This tier exists because most projects fall into it, and pretending otherwise produces budgets that smaller general contractors simply ignore.
The honest budget in tier one runs between zero point three and zero point six percent of build value. It pays for a perimeter that is correctly installed rather than nominally present, lighting that covers the actual approach paths rather than the architecturally photogenic facade, a single mobile video tower or equivalent autonomous unit positioned at the highest-value zone, and a service contract that defines response time in minutes rather than business days. It does not pay for permanent on-site guarding, because at this project scale the cost of a guard per hour over the full timeline exceeds the loss exposure that guard actually mitigates. It does not pay for fully integrated platform software, because the data volume does not justify the licence.
What tier one budgets must include, and frequently omit, is a documented incident protocol. Without it, the technology installed becomes evidence after the fact rather than deterrence before it. The protocol names who is called when an alarm triggers, in what order, with what authority to escalate. It references the IEC 62443 logic of zones and conduits in a simplified form, even though IEC 62443 was written for industrial automation: the principle that movement between zones must be detected, logged and verifiable applies on any site that has a fence, a gate and a material store. Tier one fails not when the equipment fails, but when no one defined what happens after the alarm.
Tier two. The middle that most projects misprice
Tier two covers projects between five and thirty million euros in build value, with construction periods between nine and twenty-four months, and material accumulations that include specialised equipment, cable, prefabricated mechanical assemblies, and increasingly, photovoltaic and battery components. This is where the budgeting error most often becomes expensive, because the project is large enough to attract organised theft but is still managed with tier one habits.
The honest budget in tier two runs between zero point six and one point two percent of build value. The structure shifts from individual components to a small integrated system. A perimeter with intrusion detection, two to four mobile video towers depending on site geometry, one autonomous patrol unit where the layout supports it, video analytics tuned to the construction context rather than generic motion detection, and a contractual link to a monitored response service. Guard hours, if used at all, are concentrated at handover times, deliveries, and the first and last hours of darkness. The platform layer becomes meaningful at this tier, because the data from multiple sensors produces actionable patterns only when it is correlated, and correlation requires software that someone reviews on a defined schedule.
A common misallocation in tier two is overspending on cameras and underspending on the software that makes the cameras useful. A site can install thirty cameras and still miss the relevant event, because no one is watching thirty feeds and the analytics layer has not been configured to surface the right exceptions. NIST CSF 2.0, in its detect function, frames this clearly: detection capability is a property of the system, not of the sensor count. The same logic applies to physical security. The budget that survives the CFO review in tier two is the one that names the detection latency the system delivers, the false-positive rate it tolerates, and the mean time to verified response. These three numbers, more than any equipment list, define whether the tier two budget was set correctly.
A second misallocation in tier two concerns insurance interaction. GDV statistics on construction-related claims show that the relationship between documented security infrastructure and premium positioning is real but conditional. Insurers price what they can verify. A site that operates documented systems, generates reviewable logs and demonstrates incident protocols positions itself differently in renewal conversations than a site that submits a guard roster and a fence drawing. The budget should include the cost of producing the documentation that makes this difference. It is a small line that returns a disproportionate effect on the premium side.
Tier three. Where the system has to behave like a system
Tier three covers projects between thirty and one hundred and fifty million euros, with construction periods of two years or more, often with multiple work phases that change the risk profile across the timeline, and frequently with civil infrastructure or sensitive end-use that brings regulatory attention. This is the tier where security stops being a procurement question and becomes an operational discipline that reports into the project organisation rather than into facility services.
The honest budget in tier three runs between one point zero and one point eight percent of build value, with a clear distinction between capital and operating components. Capital pays for the platform, the autonomous units, the fixed sensor infrastructure that survives between project phases, and the integration with the contractor's central security operations. Operating pays for monitoring, intervention, maintenance, software updates and the personnel hours that remain irreducible regardless of how much the technology covers. The split between capital and operating usually settles around forty to sixty, with operating the larger share over the full project life, although the ratio inverts in the first quarter because the platform has to be installed before it can be operated.
The discipline in tier three is to treat the security architecture as a system in the IEC 62443 sense and the ISO 27001 sense simultaneously. The physical and cyber layers are no longer separable, because the cameras, the towers, the autonomous units and the analytics all run on networks that are themselves attack surfaces. NIST 800-53 control families that were once read as IT controls now read as construction site controls, in the sections covering access control, audit and accountability, physical and environmental protection, and incident response. A tier three budget that ignores the cyber dimension is incomplete, and the incompleteness will be exposed either by an incident or by the next insurance assessment, whichever comes first. In the manuscript BOSWAU + KNAUER. From Building to Security Technology, the argument is made that the construction site of the future is networked infrastructure with a building on top, and the budget logic of tier three is where that future is already present.
A second discipline in tier three is phase awareness. The risk profile of a site at month three, when the foundation is being poured and very little of value sits on the ground, differs from the profile at month eighteen, when finished mechanical and electrical assemblies are installed but the building is not yet sealed. A budget that applies a flat security spend across the timeline overspends early and underspends late. The honest tier three budget is profiled by phase, with documented review points where the configuration is adjusted. This is one of the few areas where the platform logic of integrated systems pays for itself without argument, because reconfiguration in software is cheap and reconfiguration in guard contracts is not.
Tier four. Critical and complex, where the budget logic inverts
Tier four covers projects above one hundred and fifty million euros, projects of any size that touch critical infrastructure in the BSI sense, projects with regulated end-use such as energy, water, data centres, defence-adjacent facilities, and projects in jurisdictions where the security environment cannot be assumed stable across the build period. At this tier, the percentage logic that worked in tiers one through three begins to mislead, because the absolute numbers become large enough that a percentage band hides important variation.
A working range in tier four is one point five to three percent of build value, but the more useful question is not what percentage of build the security spend represents, but what percentage of expected loss the security spend prevents. The calculation runs in the opposite direction. A controller in tier four wants to see a loss model that estimates exposure across theft, vandalism, sabotage, schedule disruption from any cause traceable to a security incident, and the reputational and contractual exposure that follows a serious event on a sensitive site. The security budget is then justified as the cost of reducing that exposure to a defined residual level, with the residual level itself a board-approved figure. This is the budgeting logic familiar from ISO 27001 risk treatment, applied to physical and operational risk on a construction site.
Tier four budgets typically include components that lower tiers omit entirely. Redundant monitoring, with a primary and a backup operations centre. Hardened communications, because a single network path is a single point of failure. Vetted personnel for any role with access to sensitive zones, with vetting documented at a level that survives audit. Integration with the future operator's permanent security architecture, because the handover from construction security to operational security is itself a vulnerability window. Coordination with public-sector partners where the BSI or equivalent national authority has an interest in the project. The cost of these components is significant, but the cost of their absence on a critical project is, in the most direct sense, not bounded by the project budget at all.
Allocation. Where the money goes when the budget is honest
Within any tier, the allocation between categories tells the second story. A budget that is correctly sized but incorrectly distributed performs no better than one that is undersized. Across tiers two through four, a defensible allocation places roughly thirty to forty percent of the security spend on the technology platform, including autonomous units, fixed sensors, video infrastructure and analytics. Twenty to thirty percent goes to monitoring and intervention, the human layer that the technology amplifies rather than replaces. Fifteen to twenty percent covers integration, software, updates and the operational discipline of running the system as a system. Ten to fifteen percent funds documentation, reporting, incident protocols and the interface with insurers and authorities. The remainder, typically five to ten percent, is contingency that the project director controls and that does not require a change order to deploy.
The most common deviation from this pattern is overinvestment in visible hardware and underinvestment in the layers that make the hardware effective. A site can display twelve cameras and four signs and still operate, in functional terms, as if it had none, because no one configured the analytics, no one defined the response protocol, and no one maintained the equipment after the second month. The reverse deviation, overinvestment in software with insufficient field hardware, is rarer but equally ineffective. The discipline is to allocate against a defined operational outcome at each layer, and to refuse component-by-component bargaining that breaks the system logic.
Ownership of the security line within the general contractor's budget is the question that most often determines whether the allocation survives the project. When the line sits inside facility services or general conditions, it is treated as overhead and trimmed first when pressure rises. When it sits inside risk management or directly under the project director, it is treated as a structural element and defended on the same basis as structural elements. The placement of the line in the budget hierarchy is not a clerical detail. It is a statement about how the organisation understands the function.
What holds
The construction security budget that survives a CFO review is the one that names what it buys in operational terms, sizes itself against documented loss exposure rather than precedent, distributes its allocation against system performance rather than component lists, and sits in the budget hierarchy at a level that reflects what its absence would cost. The four tiers are useful as orientation, not as templates. A tier two project in an unusual risk environment may require a tier three budget. A tier three project with strong site geometry and disciplined logistics may operate effectively at the upper end of tier two. The tier is a starting point. The honest number is the one that the project's own loss exposure produces.
The manufacturer's perspective on this question is not neutral, and the document is honest about that. Boswau und Knauer builds the platforms, the autonomous units and the analytics that populate the technology layer in tiers two through four. The position the company defends is that the system logic matters more than the component selection, and that the budget conversation should begin with operational outcomes rather than equipment lists. That position is defensible because it is the position the company would hold even if it sold none of the components, and the company tests it on its own sites before recommending it to others.
For a general contractor or project director who suspects that the current security budget was set by precedent rather than by analysis, three paths are available. A sixty-minute confidential conversation establishes whether the suspicion is grounded and what the next step would be, with no further obligation. A three to five day audit produces a documented assessment of the current security posture, a cost model in three scenarios and a prioritised action list that the organisation can execute internally or externally. A ninety-day pilot at a single site produces operational data that supports a defensible budget decision for the broader portfolio. Each path stands on its own. None requires the next.
Frequently asked questions
How much should I budget for construction security?
The defensible range across most projects sits between zero point three and three percent of build value, with the position within that range determined by project size, duration, material exposure, location risk and end-use sensitivity. Small short projects in low-risk locations cluster near the lower end. Large multi-year projects on sensitive sites cluster near the upper end. The percentage is a starting point. The honest number emerges from a loss exposure analysis that the project produces for itself, not from benchmarks carried forward from previous projects that may have been under-instrumented.
What are the four tiers?
Tier one covers projects below roughly five million euros, with budgets at zero point three to zero point six percent of build value, built around perimeter, lighting and a single autonomous unit. Tier two covers five to thirty million, at zero point six to one point two percent, with an integrated multi-sensor system. Tier three covers thirty to one hundred fifty million, at one point zero to one point eight percent, with platform-level integration and phase-aware configuration. Tier four covers projects above that threshold or with critical-infrastructure exposure, at one point five to three percent, with redundant monitoring and hardened architecture.
How is the budget allocated?
A defensible distribution places thirty to forty percent on the technology platform, twenty to thirty percent on monitoring and intervention, fifteen to twenty percent on integration and software, ten to fifteen percent on documentation and reporting, and a contingency of five to ten percent under direct project director control. The most frequent allocation error is overinvestment in visible hardware and underinvestment in the analytics, protocols and maintenance that make the hardware effective. The allocation should be tested against operational outcomes, not against component completeness.
Who owns the security line in the GC budget?
Placement matters more than most organisations recognise. When the security line sits inside general conditions or facility services, it is treated as overhead and trimmed under pressure. When it sits inside risk management or reports directly to the project director, it is defended on the same basis as structural items. On tier three and tier four projects, the line should sit at the project director level with a named accountable owner. On tier one and tier two projects, the line should at minimum have a documented owner outside the procurement function, to prevent component-level bargaining that breaks system logic.

About the author
Dr. Raphael Nagel (LL.M.) is founding partner of Tactical Management. He acquires and restructures industrial businesses in demanding market environments and writes on capital, geopolitics, and technological transformation. raphaelnagel.com
More reading
Since 1892.
The firm is reached at boswau-knauer.de or +49 711 806 53 427.


