Scroll to top
Security for NGO and Humanitarian Workers in High-Risk Environments

Security Intelligence

Security for NGO and Humanitarian Workers: Risk Management in High-Risk and Conflict Environments

NGO and humanitarian workers face distinct security risks in conflict zones and high-risk cities. A practical guide to security planning for non-governmental organisations.

Specialist Security 8 min read 29 Apr 2026

Written by James Whitfield — Senior Security Consultant

Attacks on humanitarian workers have increased globally for more than a decade. The Aid Worker Security Database, maintained by Humanitarian Outcomes, recorded 484 major attacks on aid workers in 2023, involving 399 aid workers killed, kidnapped, or wounded — figures that represent an increase on the previous year and a long-term trend of deteriorating security for the humanitarian sector.

The image of neutral, protected humanitarian workers operating in a zone of exemption from the violence around them has not reflected the reality of many operating environments for some time. Security planning for NGOs and humanitarian organisations requires the same professional rigour as security planning for any other sector operating in high-risk environments — with specific adaptations for the sector’s unique operating principles and constraints.

How the Humanitarian Security Context Differs

Mandate and operating environment. Unlike corporate travellers who can avoid the most dangerous locations, humanitarian organisations often have a mandate that requires them to be present in the areas of highest need, which frequently overlap with the areas of highest security risk. An INGO providing healthcare in active conflict zones, or an NGO conducting protection monitoring in areas controlled by armed groups, is operating in conditions that have no corporate equivalent.

Perceived neutrality. The humanitarian principles of humanity, neutrality, impartiality, and independence are designed to create a protective environment through broad acceptance by all parties to a conflict. This protective mechanism has weakened significantly as conflicts have proliferated, as the profile of armed actors has diversified, and as the politicisation of humanitarian operations has increased. Organisations cannot assume that their humanitarian identity provides protection in environments they have not specifically assessed.

Funding and resource constraints. Security investment competes for resources with programme delivery. The pressure to maximise programme spend and minimise overhead — applied by institutional donors and the public alike — creates structural underfunding of security management in many organisations. This is a false economy: security incidents are expensive (evacuations, medical care, legal liability, reputational damage) and the indirect cost of losing experienced staff to security incidents compounds over time.

National staff. The majority of humanitarian sector employees globally are national staff — local employees who cannot evacuate to a third country, who are known to armed actors, and who face threats that their international colleagues do not. Security frameworks that focus primarily on international staff are inadequate.

The Security Risk Management Framework

The Global Interagency Security Forum (GISF) has developed the Security Risk Management (SRM) model as the standard framework for the humanitarian sector. The framework covers five domains: context analysis (understanding the operating environment), threat identification (who and what poses a threat), vulnerability assessment (how exposed the organisation and its staff are), risk rating (combining threat and vulnerability), and risk management response (controls proportionate to the rated risk).

The ICRC’s Safer Access framework addresses the specific challenge of managing security through acceptance and relationship management with armed actors. Both frameworks are available publicly and are the professional standard for security management in the sector.

Practical Security Measures for Urban Operations

NGOs operating in high-risk cities — Lagos, Nairobi, Bogota, Karachi, Manila, Jakarta — face a security environment comparable to corporate travellers but with different resources and different constraints.

Transport management is the same requirement: vetted drivers, no taxis, route variation. The organisational vehicle fleet should be appropriate to the city’s road conditions and threat environment, maintained, and tracked. Drivers should have the same security briefing as field staff.

Office and residential security should be assessed on arrival in a new city and reviewed regularly. Safe locations (areas suitable for staff accommodation and office premises) versus areas that carry elevated risk should be defined and communicated to all staff. A residential security assessment for staff accommodation in high-risk cities is appropriate for larger operations.

Check-in protocols for field movements should be documented and followed. The threshold for alarm (when a missed check-in triggers an active response) should be defined and known to all staff. The difference between a late check-in because a meeting ran over and a missed check-in in a hostile area is the gap between a routine administrative follow-up and an emergency response. The protocol should make this distinction operationally clear.

Engaging Private Security

The tension between humanitarian principles and private security engagement is real but often overstated in contexts outside active conflict zones. An NGO hiring a vetted security driver in Lagos is not compromising its neutrality. An NGO operating a guarded compound in Karachi is not making a political statement.

The relevant question is whether private security engagement in a specific context is consistent with the organisation’s accepted principles and whether it creates risks (misidentification by armed actors, escalation of confrontations) that outweigh its benefits. In urban environments, this question typically resolves clearly in favour of professional security engagement.

For security driver and close protection services for NGO operations in our P1 city network, see security drivers and executive protection. City security profiles covering the operating environment for field organisations are at Lagos, Nairobi, Karachi, Manila, and Jakarta. For the practical pre-deployment training that field staff should complete before working in high-risk environments, see our HEAT training guide. For organisations operating in active or recent conflict zones – mine contamination, UN security phases, checkpoint protocols, and extraction planning – see our conflict zone security operations guide. For academic researchers who face comparable security challenges to NGO field workers – university duty of care obligations, GISF framework, fixer vetting, digital security in authoritarian states, and check-in protocol design – see our security for academic researchers and fieldworkers guide. For freelance and contracted workers deployed by NGOs and development organisations without the institutional security infrastructure of employed staff – covering ISO 31030 duty of care, lone worker devices, SRCC insurance gaps, and check-in protocols – see our security guide for gig economy and freelance workers. For UN agencies and multilateral organisation staff operating under the UNDSS framework – Security Level System 2019 (Minimal to Extreme), MOSS compliance requirements, the 1994 Convention on the Safety of UN Personnel, and the specific threat environments at Nairobi (UNEP/UN-Habitat), Bangkok (UNESCAP), Manila, and Karachi – see our security for UN agencies and international organisations guide. For heritage and archaeological fieldwork teams operating in conflict-affected and high-risk environments – UNESCO 1970 Convention, INTERPOL Works of Art unit and Operation Pandora, HEAT training, government permit relationships as security mechanisms, and close protection for project directors in West Africa, the Middle East and Central Asia – see our security for heritage and archaeological fieldwork guide. For HNWI philanthropic foundations and private charitable trusts operating programmes in high-risk countries – Charity Commission trustee risk obligations, overseas staff duty of care and ISO 31030:2021 compliance, partner organisation due diligence, donor and beneficiary data protection, and security at high-profile grant announcement events – see our security for charitable foundations and philanthropy guide. For the specific security challenges facing wildlife conservation operations – ranger security against armed trafficking networks, donor visit helicopter and ground convoy planning, bush camp perimeter security integrating wildlife and human threat, and OPSEC for anti-poaching investigators – see our wildlife conservation field operations security guide.

Summary

Key takeaways

1
1
Acceptance-based security is not a permanent solution in deteriorating environments

2
2
Staff mental health is a security and operational issue

3
3
Local staff carry different risks than international staff and need different support

FAQ

Frequently Asked Questions

Yes, in several important respects. NGO and humanitarian workers often operate in environments that are explicitly off-limits for corporate travel — active conflict zones, areas with ongoing civil unrest, communities in acute crisis. The perceived neutrality of humanitarian organisations was historically a degree of protection. It has eroded significantly: attacks on humanitarian workers globally have increased year-on-year for the past decade, according to ACLED and Aid Worker Security Database data. NGO workers are now targeted both by state actors (who may perceive them as intelligence assets or political agents) and by non-state armed groups (who may target them for ransom or supplies).

Humanitarian access negotiation is the process through which aid organisations secure permission from armed actors (state and non-state) to operate in areas under their control. It is a primary security function, not only a programmatic one. An organisation that has not negotiated access with all relevant armed actors in an area is operating without the protection (such as it is) of agreed neutrality. The negotiation function typically sits with senior leadership and is informed by a continuous relationship management process with community leaders, local authorities, and armed group interlocutors. For organisations operating in the Sahel, the Horn of Africa, or parts of South Asia and Southeast Asia, access negotiation is a specialist skill that requires dedicated capacity.

A security management framework is the documented system by which an NGO assesses security risk, implements controls, and manages incidents. The principal frameworks used in the humanitarian sector are Safer Access (developed by the International Committee of the Red Cross) and the Security Risk Management (SRM) model developed by GISF (Global Interagency Security Forum). These frameworks provide a common vocabulary and a structured approach to security assessment that allows organisations to calibrate their security posture to the operating environment. GISF publishes its guidelines openly and they are the standard reference for the sector.

The appropriate measures depend entirely on the operating environment, which ranges from high-risk urban cities to active conflict zones. At minimum for high-risk urban environments: vetted transport, check-in protocols, security briefing on arrival, emergency contact protocol. For field operations in insecure areas: clearly marked vehicles (if the organisation’s branding is a security asset rather than a liability), communication equipment including satellite phones where mobile coverage cannot be relied upon, hostile environment first aid training (HEAT), security clearance procedures for new areas of operation, and a defined hibernation or relocation protocol for deteriorating security situations.

This is a genuine tension and different organisations resolve it differently. Some large humanitarian organisations prohibit armed escorts as incompatible with their neutrality principles. Others, particularly those operating in specific high-risk contexts, use armed escorts where access without them is not possible. The debate within the sector is ongoing. For organisations working in cities rather than conflict zones, the neutrality argument for avoiding close protection is less compelling: vetted private security in a city like Lagos or Karachi has no implications for organisational neutrality. The decision should be driven by risk assessment, not dogma.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.