[ The Hague · Security ]

Electrified perimeter. RC4 doors. EN 50131 Grade 4 detection.

THG1 is certified to VRKI 2.0 Class 4 — the highest risk classification in the Dutch Association of Insurers' security framework. The full physical-security build, on one page.

Tier
VRKI 2.0 Class 4
Door class
RC4 / NEN-EN 1627
Detection
EN 50131 Grade 4
Response
24/7 monitored
[ Framework ]

Certified, not self-declared.

VRKI 2.0 Class 4 is the highest risk classification in the Dutch Association of Insurers' security framework. A Class 4 plan cannot be self-declared.

The plan is implemented by certified contractors and signed off by the property insurer before it takes effect. Audits run on the operational baseline; the plan is the contract between the building, the installer, the alarm receiving centre and the insurer.

[ The build ]

Layered. Independently armable. Audited.

Six layers, implemented against insurer-recognised specifications.

Perimeter

Electrified perimeter fence with full surveillance coverage. Approach lanes and the fence line itself sit under overlapping CCTV with 24/7 monitoring at a certified alarm receiving centre.

Building envelope

External doors are reinforced to RC4 under NEN-EN 1627 — engineered to resist a determined attacker with portable power tools for a sustained period. Roof, walls and below-grade openings are hardened to the equivalent class.

Intrusion detection

EN 50131 Grade 4 intrusion detection across the perimeter, envelope and interior. The system is zoned: data halls, MMR, office and loading areas are independently armable and report independently.

Surveillance

Around-the-clock monitored CCTV with retention sufficient for forensic review. Coverage includes the perimeter, every entry point, internal corridors and white-space aisles.

Alarm transmission & response

Dual-path, supervised alarm transmission to a certified PAC, paired with a contracted private security response with guaranteed arrival times. Authority notification runs in parallel.

Access control

Multi-factor authentication at every door from the building entrance to the rack. Every access event is logged and retained. Visitors are pre-registered and escorted; contractor work follows a documented permit procedure.

[ Organisation ]

Operationalised, not merely installed.

Key and credential lifecycle, incident response and audit procedures are documented and reviewed against our operational baseline. The physical-security plan and the operational baseline together close the loop on the certification.

We do not publish the security plan. Compliance and audit teams running vendor due diligence can request the SOC 2 Type II report under NDA — that report covers the operational evidence layered on top of the physical build.

  • Key and credential lifecycle, documented
  • Incident response runbook, drilled
  • Visitor escort policy with logged hand-offs
  • Contractor permits with scope and time bounds
  • Annual independent audit cycle
  • SOC 2 Type II report — available under NDA
  • Insurer-signed VRKI plan — not published
[ Audit ]

Compliance and audit teams: ask for the SOC 2 Type II.

For procurement files and audit packets, we share the SOC 2 Type II report under NDA. Operational evidence on top of the physical-security build, in one document.