Use Access Control Logs To Constrain Coronavirus

By Brian Rhodes, Published Apr 09, 2020, 10:38am EDT

Access control users have included capabilities that are not commonly used that can help zero-in and discover potential Coronavirus hotspots in a facility: system activity logs.

IPVM Image

Getting this data requires tight access system configurations, which can give integrators an opportunity to consult or sell end-users on optimizing their systems and using access logs.

Inside this note, we discuss how to do this on any access system and which data is needed to make it happen. We also examine automated exposure reports from Genetec and Detrios.

Risk ********** ********** *** ********** ****, '*********' ***********

**** ***********, ***** **** shuttered ***** **** ********* working **** ****, ***** 'essential' ********** ****** *****, like ******* *** *********, food *** ********** ********, and ******** **************.

*** ***** '*********' **********, knowing *** **** ***** and *** **** **** potentially ********** **** ******* especially ******** *** *********** risk *** ***** ** direct ************ *** ******** first ** **** *** spread.

Access ******* ******* ****** **** ************

***** **** ***-***** *** considering ******** ********* ******* ********** ** combat ***********, ***** ** * good ****** **** ******* have ** ********* **** not ***** *** ** full ***: ****** ******* logs.

***** ****** ****, ************ to **** *** ***** people **** **** *** who **** **** **** in ******* **** ***** avoid *** ****, ***********, and ****** ****** ** quarantining *** ******* *** cleaning ** ** ****** facility, ********** *** *******-******** buildings **** *********.

****** **** ******* * disruptive '********/** *******' ****** for ******** **** *** limit ** ******** *** assets *** *********, *****-*********** the ******** *** ************ of ** ******** ********** offers * **** ********* and ******** **** *** countermeasures.

**** ****** ******* ******* a ****** **** **** example, **** ***** ***** badges *** **** ** specific *******/ ********* ** a ********:

IPVM Image

***** ******* ** ***** response ****** ******* *** narrow ********* ** *****/********* specific ***** ******** *** test * ******** ********** group ** ******.

***** **** ** ******* monitor * ******* ****** of ****** **** ******** risks **** ****** **** down ** ****** *********** vital ******** ***** ***** unneeded ******* ***** *********.

*** ****** **** ********* ******** **** ** disinfecting ****** ******** *** monitoring **** *********** ** just * *** ********* zones.

Access ****** ********* ****

* *** ******* ** access ******** ******** ******* ****** *** Schedules**** *** ******* ****** where * ********** ****** is ******* ** * facility.

**** **** *******, '** Tech' **** **** *****, the ******** ** **** allowed ****** *** *** door *** * ******** room. **** **** *********** to *****/******** **** ***** areas:

IPVM Image

***** '****** & *********' ***** ********* *** only ***** ****** ** areas **** ****.

** *** ******* *****, for * ********* ****** like ***********, ** ******* non-IT ******** ********* ** the ******** **** ****, but ***** *** ** logs ******* ***** *********** with ** ****** **** areas ******** ** **** example ******, ***** ************ can ** ***** ***.

Visitor ********** ****** **** ***

** ********* ** ***** logs ** ***-********* ********** holders, **** **** ********, can ** ******** ******* using****** ******* ********** *******.

*** ************* ** ******** individuals ** * ******** or ****** *** *** they ******** **** ** essentially *** ******* **** of *** ******:

IPVM Image

*****, ****** **** * potentially ******** *** ******** 'global **********' ********-**** ******** that *** ******** **** visitors ** *********** **** delivery *******, ******** ********** systems **** ******** ****** the **** ** **** for *********.

Multi-Building ******* **********

********** **** ******** ***** different ********* ** * campus, **** ******* ******** or ******* ********, ***** able ** ******* ********* everywhere ** ******** ****** has **** ** * benefit ** ******* **** potential *********.

Risk: ********* ********* *** ** ********

***** ******* ****** ** used ** ******* ********** for *********** ********* *****, but ***** ******* *** only ******* ********** ******* infections *** ****** ******* the ****** ****** ******* it.

* ******** ** **** if ****** ***** *** infected *** *** ********** people ** * ***** group ********* ***** **** can *********** ****** **** without ******* *****, *********, or ******* ** ***.

** ***** *****, ** infected *************, *********** ***********, ** ********* ********* existing ****** ******** *** enter ** **** ** contact ****** ******* ** the ******'* *******, **** method **** *** ****** it.

Integrators *** **** *****/******

**** *********** *** ************ **** **** ** customers **** *** **** amidst ********* *** ******* uncertainty, *** ******** *** to *** ***** ******* can ** *** ***** details ** *** ***** time *** ***-***** ********** Coronavirus.

**** ** *** **** already ********* ** ******* in ** ****** ****** may ** ******* ** not ******** ** ***-***** unless *********** **** ** show **** *** ** use **.

******** ***-***** *** ** use **** **** *** not **** * ******** in *** ****, *** now ********** *** ****** closure ** * ******** versus *** ********* ** just * *** ****** might ** ************* ******** detail **** *********** *** pitch ** ***-***** ***** able ** *******.

Using ****** **** ******* ***********

* *** ****** ** keep ** **** *** integrators ********* ***** ** a ********* *********** **** management ****:

********* **** **** *******: ******* ****** *** of ****** **** ** not ****** ******** ***** to ********* ***** ****** systems. ** ***** *** for * '****' ** 'flat' ****** ****** ****** that ***** ***** ********** into *** **** ** they ******, *** ******** of ******* *** *** possible ** *** ******* reduced.

** ***** *** ***** 'flat' **************, ****** ** becomes *** ***** **** an ********** *** ***** to ****, **** ********** the ******* ****** ******.

*******-**, *******-***: ** ***-***** ** not******** ****** ******* *******, *** ********** ****** is ********* **** *** or ******** ***********. *** system ******* ************* **** valuable *** ******* **** worthless.

********** ****:******* ***** ** ******** log ******** ** *** possibility ** * ****** user ******* * **** open *** ******** ****** entering ** ******* ** area. **** ******** ** access ****** **** '***********' access ** ***. ** note *** **** ***** of *** ***** ************: ****** ******* *********** ******* *** ********* polite ******** *** ******** be * ******* ******** threat.

************ *****: *********, *** ***** door ** ******** ** an ****** ******* ******, and *** ** ************ or ********* ** ***** uncontrolled ********. *** **** of ***** ***** ***** means *** ****** ****** could ** ******* ********* but *** ********** *** intended **** ** ******* a ******** ****** *** potentially ******* ** ******** people *** ***** ** area ******* ********** ** the ******.

**, ****** *** ******, it ******* ***** **** an ************ **** ** putting ** ****** ******** at ****, ****** ********* work ******* ** ******* and **** ******.

Genetec ******** '********* ******' **** *****

**** ****** ********* **** Genetec **** ***** ******** customized ****** ***** ** automate ********* *********. *** example, **** *** '******** *********/********* ******', ***** ***:

******** * ******** ********* report ** *********** *** might **** **** ** contact ** ** ***** proximity **** * ******** individual ****** * ******* time *****.

******* ***** ****** **** report ** ******** *** configuring * **** ***** in ******** ******.

******* ********* ** ** that *** ****** *** not ******** *** ********* Coronavirus ************ ******* ** monitors **** *** ******** of * ******** **** are ******-**********:

*** ****** ** ***** for ********, ********* *****, elevators, **********, ***.

*******, ******* ********** *** operational ***** ** **** that ****:

**** ****** *** ****** does *** ****** ***** spaces, *** **** **** we *** ******** *********** entering ***** ***** ****** through ******* ******** **** permit ** ** ****** down *** ********* ****** who *** **** *** contact **** ******* **** was ************, *** ****** them ** ******.

**** ******** ****** *** known ** **** ****** positive, * ****** ** names ** ***** *********** with *** **** ********/*******/********* within * ******* **** period ** *********:

IPVM Image

Detrios *****-** ******** ****** ****

******* ******* ***************** * ******* **** of ******** ****** *** no **** *********** ********** to * ****** ** access ******* ********* ****, Avigilon ***, ********* ********, LenelS2, ***, *** ******** House.

*** **** ********* ** activity ****** ***** *** same **** ** ********* potential ********* ***** ** others ** * ********:

**** ****** *** ** specified ****** *** ***** a *****-** ******** ********** entered ** ****. ************** can **** ******* * CSV ****** ** ***** potentially ******* ** *****-**, with *** ******* ** obfuscate *****-** ******** ** exposed ***********’ *****, ** protect ******’* ********** *** calculate *** ********* ** exposure.

*** **** **** **** **** ***** Convergint's************ ******** *****.

*******

** *** *** ** integrator ******* *** ********, contact ***-***** *** ***** them ** ******** *** to *** ****, ********** up ****** ******, *** setting ** ******* ********** to **** ********* ********* risks.

* ****** ** ****'* systems *** ****** **** will ****** ******* *** opportunities ** ******* **** for ***** *** ******.

******* ***** ****** ** keeping '*********' ***** ****, it *** **** ****** the **** ** *********** exposure ***** *******. ** also * ***** ****** to ******* ***-***** *** can ******** ******** ** a *********** ****.

Comments (0)

Read this IPVM report for free.

This article is part of IPVM's 6,943 reports, 926 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now
Loading Related Reports