Acts of unlawful interference share a taxonomy with safety. A threat that creates a hazard isn't copied between two systems — it's one record, linked to both. Sensitive fields stay inside the SeMS perimeter, even within the unified operational picture.
Closed enumerations beat free-text every audit. The Annex 17 categories are enforced on intake — not a “category” dropdown that suggests, but a typed field that refuses anything not in the rulebook.
Acts of unlawful interference are mapped to a closed enumeration on intake. The reporter narrates; the taxonomy resolves itself. No "other / specify" buckets that hide the next attack.
Threat actors against asset zones, scored from your real records — not a generic vendor matrix. The current watch cell pulses; one click drills into the threats and barriers behind any score.
Credentials, escort permissions, and biometric enrolments are tracked records with validity periods. Expiry fires through the alert engine ahead of due date. No "I thought we revoked that badge."
A perimeter breach that also creates a runway-incursion safety hazard becomes a single record linked to both modules. Sensitive security fields stay inside the SeMS perimeter; the unified picture stays unified.
Threats, barriers, assets, and protective measures live as linked records. Audit lanes open scoped to the inspector. The matrix is the answer.
Security and safety share structure but not visibility. A breach that's also a hazard becomes one record — linked into both modules — with the sensitive fields scoped to roles inside the SeMS perimeter.
Classify a sample threat against Annex 17, see the exposure cell update, and walk the protective measures — with the founder, on your data shape, in 30 minutes.