Securing Access Control Installations Tutorial

By: Brian Rhodes, Published on Oct 17, 2019

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

** **** *****, ** done *********, ****** ****** of ******** *** ********** access ********** **** ********** cost. **** *** ****'* 5 *********** ***** *** options:

  • ******* *********** ** ****** Side ** ********
  • **** ***** ******* & Server ***** ******
  • **** ********** & ******
  • *** ****** ******* & Alarms
  • ********* ************ *******

*******, *** **** ** the *** **** **** your *********.

Install *********** ** ****** **** ** ********

*** '****** **********' **** of *** ******* ** typically *** ****** **** unless ******* **** ******* or ***** ************ ***** one ** ****** ** lock ****** **.

**** * **** ** access **********, *** ****** is ** **** ***** unapproved ** ***** ** the '********* ****' ** occupants *** ****, **** called *** '*******' ****. While *** ***** ***** of ***** ***** *******, most ************ *** '****** the ****** ****' ** be *** ******* ****.

*** ***** **** ******* ***** ***************** *** ********** ** Secure ** ******* **** of *****:

******** ********* ******* ********* on *** ********* **** leaves ** * ****** to ***** ********** ** force *****.

******* *** ********* **** is *** **********, ***** should ** ***** ** mitigate *** **** ** exploiting ** ******** ****** control *******. * *********** step ** ** ******* as **** ** *** access ******* ******** (***********, power ********, *******) ** the **** ** ******* side.

***** **** *** **** to ** * *** of ****** *****, ** is ******** **********. **** this *******:

**** ***** ***** *** 'unsecured' **** ** *** door, **** *** ****** reader *** ******* **** facing ******* *** ****** door. *******, *** ********** has ******* *** ******** door ********** ** ***** sight ***** *** ******* on *** ****** ****.

*******, ******* ******** *** tampering ** ****** ********* by ******** ****** ******** on *** ******* **** of *** *******. ********* the ******** ** *** same **** *** **** expensive *** *********** ********** devices ** * ***** area.

**** ***** ***** ******* on *** ******* ****, mounting ******** ** * discrete ******** ** *******. Simply ******** ******* ** the **** ***** *** opening ***** ******* ***** puts ****** ******* ********* out ** *****, *** of *****,*** *** ** **** for ********* *******:

**** ** ***** ** access *******, *** **** of *** ******* *****/******* cabling ****** ** ******* during ******.

**** **** **** *********** or ********* ******* *** at ****. **** *** example ***** *****, ** a ******* ******** ** outside ******** ****:

** ***** ** ****** the ******* ********, **** the ******* ***** ***** to ** ***. ** note *** ****** ****** to *** ***** ***** in ********** ********* *****,***** ********** **** ******** need ** ******** *******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* use ******* ***** ** servers ** ********** ********, and **** '****' ***** of ******* ********* *** centralized ******* *******.

** ** ******** ******** policy ********* ******** ***** locations ** **** ****** and ****** ** ****** few, ** *********, ***** doors *** ******** ********** by *** **** ****** system **** *** **********:

*** ***** *****, *** server *****, ***** ******* or ******* ** ************, despite ***** ******. **** and ***** *** ** shared, *** ******** ***, over **** ******* ***** areas ************ ** **** loosely *********.

********, ******* ***************** ******* ****** *** Schedules*** ***** ******* & Server ***** ***** ************ employees **** ******** ********* areas **** ****** ***** if **** ***** ******* a ****.

***** **** ***** ** not ********* *** **** of ****** **** ******* closets ** *** ******** access ******* ******, ******** that **** '*****' ******* should ** ****** ** well. **** *** **** or **** ** ****** access ******* ** **** to *******, * ****-******* system ** ********** ***** and ****, ** **** a '*****-*****' ********** **** keeps *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** locked *******, ***** ***** often *** ****** **** other ***** ** ********** systems **** ********, *******, or **** ********** *****. While ********** ** ****** may ** ****** **** for *** ******* ******, there *** ***** ** the **** ** ************ individuals ********* **** *******.

**** ********** ****** ******* include ******** **********, **** the **** ***** *****:

***** ********* '***' ******** a ***** **** ** kept ****** ** *** times. **** ***** **** ensures **** *********** ********* is *******, *** ****** keeping *********** ****** **** and ******* ******** *** keys ** * *******, low-cost ****.

Use ****** ******* & ******

**** ******* *** ****** include * '****** ******' that *********** ******* **** a ****** *** **** knocked *** * ******** point ** * ***** has **** ******. *************, these ******** *** ***** left *********** ** ************ to **** ******, ***** they ** *** ********* a **** ******* ** the ******.

*******, *********** *** ******* locks *** ** ******* or *********** ******* *** the ****, ******* *****. Properly ********** ****** ******** can ****** *********** ** seconds **** ********* ******, rather **** ***** ********** hours ***** *** ****.

**** ******* ******* ******** tamper ******* ** ********, and *********** **** *** use ***** ******* - another ***********, *** ******** method ** ********** ****** integrity:

Integrate ************ *******

*******, ******* *** **** expensive ****** *** **** provide ******* ********** *** immediate ********: *********** ***** and ****** ********. **** cameras *** ******* **** access-controlled ********, ********* ********* or ************ ***** ******** are ****** ** ******.

********** **** *** ********'* surveillance ****** ** ******** monitored, ***** ******** *** stop ****** ** ********* before ** ******.

*******, ***** **** *********, the **** ** *********** the *** ******* ******** can ** ********** ********* (several ******* ******* *** door) *** ******* ********** cameras ** *** ******* installed. ** **** *****, the *********** ******* *** two ******* **** ** used *** **** **** just ********** ********* ** threats, *** ********* *** the ************ ** ***** passing ******* *** *****:

Use ****

***** *** * ******** security ************* **** ******* enclosures ** ****** ********, OSDP ******** *** ****** bus ** *********** *** connection ******* *** ********** and ********** ******.

****** *******, ***** ** unidirectional *** ****** **** from ****** ** ********** only, **** ** ************* and *** ***** ****** users ** ******* ********** separates *** ****** **** the ******.

*** **** ** ****, catch ******* ****** ******* *****.

Quiz ********

**** *********** ****** ******* *******.

Comments (11)

* ***** *** ** the ***** ****** ************** and **** **** ** to * ** ****** central *******. ***** ****** alarms **** **** ** the ****** ******* ** can ** ****** **********. If **** ** ** a ******* ******* *** will *** * ****** notification *** ******** *********.

** **** ******** ****** send ******* ******** *** can *** ****** */** to ******* *** ********* tamper ****** ** ******* an ********* ***** ****.

* ********* ****** */** because *** *** *** the ******* ****** ******* panel ** *** ***** panel *** *** *******. Also *** *** ***** the ******* *** *** one ***** ****. ** get ******* *** ***** use *** ****** ******* UI. **** **** **** hardware ***** *** ** you *** ********** *** you **** ** ** is *** *** ****** to *** ***** *** you *** ****.

(******....*** *** ****** */** are ******* *****....***** **** manufacturer...)

* ***** ****** *** all ****** ******** *** created *****. ** ** experience *** ***** *** tamper ***** **** **** a ***** ****** ****** do ** * ****** manufactured ****** ****** ** a ******* *** **** gets ****** **** ****.

* **** **** *** done ******** ** **, but ** *** ****/**** prox ******* *** ***********. That ** *** ********** that *** ** ******, duplicated, *** ****** ******. Use ** ***** ******.

*** *** ***** ** until ***’** **** ** the ****, *** **** will ***** ** **** and ********* ******* ***** are ** **** ********* living ** *** ****.

******* * **** ** in *** ****** ****. Perhaps ************* ****** ****** and ** *********** ** not ************ ** *** insecurities. **** ****** **** stopped ******* ** ****** ago ** ** ***** suggested ****** *** ******* after * ******* **** it **** ** ****** be ****/*********.

** ******** ** * part ** ********** * hospital *** * ***** company ******** ** **** knowledge ** ****** ******* by ******* *** ******** the ****** *** *** very ******* ** ** considering * **** ***** yet ** ***** *** access ******* ******. * don’t ***** ** ** an ****** ** *** access ******* *****. * just ****** ** ** able ** **** *** can ******** * ********** on ****.

* ******* *** **** thing ***** ************* ** longer ****** *** *** prox *********** *** **** you *** *** *** big **** ** **** but * ***'* ***** you ***** **** *** the ***** ***** **** in ***** *** **** on ****** ** **** go ****.

*** *** ***** ****** at **** ***** ** has ** ****.

** *** ***** ****** control ********* ***** **** programmed **** ***** ****** if * ****** **** was **** **** **** might **** ** ******** customers ** ***** ********* away *******. **** * card ** ****** ***** is ***** *********** *** onto *** ****. * know *** **** **** but *** **** ** others ** ** ***. Of ****** ***** *** also ** * *** for **** ** ** overcome **** *** ****** as ****.

**** ****.

***** ******* *****. *** note *** ***** ******* if *** **** *** the *********** ***** *** ceiling, ***** * ***'* like ** ** *** sometimes *** ***'* **** a ******, **** **** the ******** ******** ** somewhere *** **** ** able ** ******* *** equipment ** * ***** date. ******** ***** *** door **** ****** ***** for ******* *** ***** makes ** * **** as ****** **** ****** want ** **** ******* the ******* **** ** there ** * **** two **** ****.

**** ******* ******* ** the ********* ** ******* above *** ******* *** that ******** ***** ** though ******* **** **** be *** ***** *** equipment *** ******'* *** says ********* *** **** will *** ** **** 1000 ** ******** *** can't **** ** ****** the ******* **** *** then *** ***'* ***** your ********* ** *** desk ******* ** *** out.

** * ****** *** to *** **********, **** imagine **** *** **** to **** **** *** service **** **** ***. You **** **** ********* this ********* ** ** as ******* **** ** possible.

* ***** ******* *** installing **** **** ***’* listed *** ****** *** in * ****** ******* above *** *****. **** though **’* *****, **** inspectors *** * ****** picky.

**** *****!

* ****** ***** ***** panels **** ***** *** tampers, *** * ****** quote **********, *****, *** tampers **** ******* **** expansion ******* **** *** easily *** **** * panel *********. *'* ****** surprised ** *** **** people ****** ***** ****.

**** ** ***** ** access *******, *** **** of *** ******* *****/******* cabling ****** ** ******* during ******.

**** ** *** **** true ** *** **** but **** ** *** data ******. ** **** times *'** **** **** plugged ** ** * nearby ****** ****** **** having *** ***** ****-**** piped **** *** *********. A ******* ****** ***** might **** ** **** case *** *** ***** can ***** ** *** (might ****** * ***).

**** *******.

Read this IPVM report for free.

This article is part of IPVM's 6,538 reports, 881 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Keypads For Access Control Tutorial on Jul 28, 2020
Keypad readers present huge risks to even the best access systems. If...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Forced Door Alarms For Access Control Tutorial on Aug 17, 2020
One of the most important access control alarms is also often ignored....
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Door Fundamentals For Access Control Guide on Aug 24, 2020
Doors vary greatly in how difficult and costly it is to add electronic access...
Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
Use Access Control Logs To Constrain Coronavirus on Apr 09, 2020
Access control users have included capabilities that are not commonly used...
HID Presents Mercury Security & Aero Access Controllers on Aug 25, 2020
HID presented Mercury Security & Aero Access Controllers at the 2020 IPVM...
The Insecure Verkada Access Control System on Jun 25, 2020
While Verkada touts the security of its system and that how their new door...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Risks Of Managing End User Passwords (Statistics) 2020 on Sep 11, 2020
Alarmingly, most integrators used spreadsheets to manage passwords, IPVM...

Recent Reports

New Products Show Fall 2020 continues tomorrow with Genetec, Milestone, Avigilon, Microsoft and more! on Sep 29, 2020
IPVM's sixth online show continues tomorrow and will feature New Products...
Avigilon / Motorola VS Virtual ISC West on Sep 29, 2020
ISC West has historically been so dominant that no player would think of...
Dartmouth College Deploys K3 Temperature Screening on Sep 29, 2020
While Dartmouth College has a $6+ billion endowment, the College has bought...
Hanwha AI Object Detection Tested on Sep 28, 2020
Hanwha has added detection and classification of people, cars, clothing...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...