Perimeter
Electrified perimeter fence with full surveillance coverage. Approach lanes and the fence line itself sit under overlapping CCTV with 24/7 monitoring at a certified alarm receiving centre.
THG1 is certified to VRKI 2.0 Class 4 — the highest risk classification in the Dutch Association of Insurers' security framework. The full physical-security build, on one page.
VRKI 2.0 Class 4 is the highest risk classification in the Dutch Association of Insurers' security framework. A Class 4 plan cannot be self-declared.
The plan is implemented by certified contractors and signed off by the property insurer before it takes effect. Audits run on the operational baseline; the plan is the contract between the building, the installer, the alarm receiving centre and the insurer.
Six layers, implemented against insurer-recognised specifications.
Electrified perimeter fence with full surveillance coverage. Approach lanes and the fence line itself sit under overlapping CCTV with 24/7 monitoring at a certified alarm receiving centre.
External doors are reinforced to RC4 under NEN-EN 1627 — engineered to resist a determined attacker with portable power tools for a sustained period. Roof, walls and below-grade openings are hardened to the equivalent class.
EN 50131 Grade 4 intrusion detection across the perimeter, envelope and interior. The system is zoned: data halls, MMR, office and loading areas are independently armable and report independently.
Around-the-clock monitored CCTV with retention sufficient for forensic review. Coverage includes the perimeter, every entry point, internal corridors and white-space aisles.
Dual-path, supervised alarm transmission to a certified PAC, paired with a contracted private security response with guaranteed arrival times. Authority notification runs in parallel.
Multi-factor authentication at every door from the building entrance to the rack. Every access event is logged and retained. Visitors are pre-registered and escorted; contractor work follows a documented permit procedure.
Key and credential lifecycle, incident response and audit procedures are documented and reviewed against our operational baseline. The physical-security plan and the operational baseline together close the loop on the certification.
We do not publish the security plan. Compliance and audit teams running vendor due diligence can request the SOC 2 Type II report under NDA — that report covers the operational evidence layered on top of the physical build.
For procurement files and audit packets, we share the SOC 2 Type II report under NDA. Operational evidence on top of the physical-security build, in one document.