← All case studies
Cultural institution / government

Powerhouse Museum — Security Operations Strategy

Enterprise-level security operations framework for a complex, multi-site cultural institution — from strategy through to procurement-ready documentation.

The Challenge

Powerhouse was preparing to open Powerhouse Parramatta — the largest museum in NSW, with 18,000 square metres of exhibition and public space designed to attract two million visitors annually. This would transform Powerhouse from a single-site operation into a distributed enterprise spanning multiple precincts, significantly increasing operational complexity beyond what existing arrangements could absorb.

Our Approach

Core42 developed a space typology system — each type with defined security activities — allowing consistent security expectations across sites while accommodating site-specific conditions. We designed a governance model that preserves institutional control over security culture and decision-making while ensuring operational delivery can scale with the expanded portfolio. A visitor-centric security philosophy positioned the security function as part of the visitor experience, reflecting Powerhouse’s identity as a cultural institution.

What We Delivered

An enterprise-wide security operations strategy defining the governance model, role definitions, space typologies, resourcing schedules, and a KPI framework with measurable performance targets. A site-specific security management plan for the new flagship site. Tender-ready procurement documentation enabling Powerhouse to go to market with defined scope and evaluation criteria.

Why It Matters

This project demonstrates Core42’s ability to develop enterprise-level security operations frameworks for complex, multi-site institutions — from strategy through to procurement-ready documentation. The space typology methodology is directly transferable to transport hubs, university campuses, hospital precincts, or any mixed-use environment where diverse use types require consistent security principles with site-specific application.

Have a similar challenge?

If you're navigating security requirements on a built environment project, we'd welcome the conversation.