Access Control Security: Keeping Components Safe?

What steps do you take to keep Access Control devices secure?

Most systems take an approach similar to the image below:

The door controller, power supply, and cabling terminates above the door (typically above drop ceiling tiles) on the secured (not outside/public) side. This keeps all the sensitive bits out of sight and behind a locked door, and is generally effective at keeping the system secure.

However, is this good enough?

Do you use locking enclosures? Do you avoid certain devices because they cannot be secured? Do you worry about the security of data between the reader and the controller?

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

* ******** ***** *** ********** ** * ******** ** *** existing *********** **** *** ** * ********* ******* **** **** safe *****, **** * ****** *** ** ********* **** * firewall ***** *** ******** *** ********* ** **** *** ** cut *** ***** **** * ***** **** ****** **** *** office (******** *** ********* ****). ** *** ***, *** ******** was **** **** *** **** *** * ****'* ***** ** press **.

** **** ***** *** ***** ************ ***** ******* *** ********** secure ** ** *****, *** ** *******, * ****** *** into ****.

** **** ** **** ** **** **** ***** ****** ***** close ** ****** ******, *** *** **** * ***** ***** I **** **** **** ******.

***** *****:

** *** ***, *** ******** *** **** **** *** ******* * ****'* ***** ** ***** **.

**** ******** ********. **** ** *** * ** ******* ***** this *****. ******* *** ******** ***** *** **** ** ****/****** on *******, *** ******** ****** **** ** * '***** ****'.

**** ********* ***'* **** *************************, *** ** **** **, **** **** ***** *** **** hanging **** ****. ** *** ******** ********* ******* ***** ******** or***** ********** ********, ** ******* *** ******* ** *** *** **** ***** to ***** ****.

* ** ****** ******* ** **** **** **** ********* **** like *** **** ****** ** ****** *******.

* **** ******* *********** *** **** ***** *** ****. * try ** ***** **** *** *** * ******* ******** ********* upon *** **** ** *** ********. ** *** **** ** multiple ****** * **** * ******* ***** *** *****. * do ********* **** *** ****** ******* ***** **** * ***, and ********* **** ***** ***** ****** *** **** * ***** do *** **** *** *** ***** ******. * ****** *** to ********* *** ***** ****** *** *** ********* ******. ****** for **** ** ** *** *** *******.

** ** *** * *********** ******, ********** **** ** * locked **** ** ****** ********. ****** ** *** **** *** useless ***** ***** *** ******** ***. *** *** *** **** open **** * *********** ** * ******* **** *** ****. The ****** **** *** ******** *** ***** *******, *** **** wasn't ******.

*** **** ******* (***** *** ****, ** ******), ***** ** located **** ***** *** ****, ** **** **** ****** ****** to **** **** **** ** *** *******. * ********* ******* screws.

** *** *****, *** **** ********* **** *** ******* ******* alarms **** **** ********* **** ****, ***********. ******** *** * lock ** * ***** ***** ** ****. ******* ****** **** when **'* **********, *** ****.