Access Control Physical Security Tutorial

Author: Brian Rhodes, Published on Oct 30, 2017

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

In most cases, if done correctly, adding layers of security and protecting access components adds negligible cost. Here are IPVM's 5 recommended steps and options:

  • Install Controllers on Secure Side of Openings
  • Keep Panel Closets & Server Rooms Locked
  • Lock Enclosures & Panels
  • Use Tamper Sensors & Alarms
  • Integrate Surveillance Cameras

Finally, the 5 question quiz at the end will test your knowledge.

*** ******** ******** ** ****** ******* ********** ** ******** ** ensuring **** * ******** ** ***** ******. *********, *** ****** system *** ** ************ ** **** **** ** ** *********.

** **** *****, ** **** *********, ****** ****** ** ******** and ********** ****** ********** **** ********** ****. **** *** ****'* 5 *********** ***** *** *******:

  • ******* *********** ** ****** **** ** ********
  • **** ***** ******* & ****** ***** ******
  • **** ********** & ******
  • *** ****** ******* & ******
  • ********* ************ *******

*******, *** * ******** **** ** *** *** **** **** your *********.

[***************]

Install *********** ** ****** **** ** ********

** **** *****, *** **** ** *** ******* *** *** standing ** * **** **********.

**** * **** ** ****** **********, *** ****** ** ** keep ***** ********** ** ***** ** *** '********* ****' ** the ****** **** ** ********* *** ****, **** ****** *** 'secured' ****. ***** ***** ***** ** ***** ***** *******, **** characterize *** '****** *** ****** ****' ** ** *** ******* area.

*** ***** **** ******* ***** ***************** *** ********** ** ****** ** ******* **** ** *****:

******* *** ********* **** ** *** **********, ***** ****** ** taken ** ******** *** **** ** ********** ** ******** ****** control *******. * *********** **** ** ** ******* ** **** of *** ****** ******* ******** (***********, ***** ********, *******) ** the **** ** ******* ****. **********, *** ******** **** ** the ****** ***** **** ***** *** ** *** ******* **** access ******* *** ****, *** ******** ********* ******* ********* ** the ********* **** ****** ** * ****** ** ***** ********** to ***** *****.

***** **** *** **** ** ** * *** ** ****** sense, ** ** ******** **********. **** **** ******* **** ********' ************ *****:

** *** ******* ** *** '*********' **** ** *** ****, with *** ****** ****** *** ******* **** *** ****** ******* the ****** ****. *******, *** ********** *** ******* *** ******** door ********** ** ***** ***** ***** *** ******* ** *** locked ****.

*******, ******* ******** *** ********* ** ****** ********* ** ******** access ******** ** *** ******* **** ** *** *******. ********* the ******** ** *** **** **** *** **** ********* *** potentially ********** ******* ** * ***** ****.

**** ***** ***** ******* ** *** ******* ****, ******** ******** in * ******** ******** ** *******. ****** ******** ******* ** the **** ***** *** ******* ***** ******* ***** **** ****** control ********* *** ** *****, *** ** *****,*** *** ** **** *** ********* *******:

**** **** **** *********** ** ********* ******* *** ** ****. Take *** ******* ***** *****, ** * ******* ******** ** outside ******** ****:

** ***** ** ****** *** ******* ********, **** *** ******* cable ***** ** ** ***. ** **** *** ****** ****** to *** ***** ***** ** ********** ********* *****(****: ********** ***** ******** *** ******* *********** *** **** ********** *******) **** ** ***** ** ****** *******, *** **** ** any ******* *****/******* ***** ** ****** **** * ****** **** reader ****** ** ********* ********** ****** ******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* *** ******* ***** ** ******* ** coordinate ********, *** **** '****' ***** ** ******* ********* *** centralized ******* *******.

** ** ******** ******** ****** ********* ******** ***** ********* ** kept ****** *** ****** ** ****** ***, ** *********, ***** doors *** ******** ********** ** *** **** ****** ****** **** are **********:

*** ***** *****, *** ****** *****, ***** ******* ** ******* is *** **********, ******* ***** ******. **** *** ***** *** be ******, *** ******** ***, **** **** ******* ***** ***** uncontrolled ** **** ******* *********.

***** **** ***** ** *** ********* *** **** ** ****** main ******* ******* ** *** ******** ****** ******* ******, ******** that **** '*****' ******* ****** ** ****** ** ****. **** the **** ** **** ** ****** ****** ******* ** **** to *******, * ****-******* ****** ** ********** ***** *** ****, or **** * '*****-*****' ********** **** ***** *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** ****** *******, ***** ***** ***** *** 'shared ******' **** **** ***** ***** ** ********** ******* **** plumbing, *******, ** **** ********** *****. ***** ********** ** ****** may ** ****** **** *** *** ******* ******, ***** *** still ** *** **** ** ************ *********** ********* **** *******.

**** ********** ****** ******* ******* ******** **********, **** *** **** shown *****:

***** ********* '***' ******** * ***** **** ** **** ****** at *** *****. **** ***** **** ******* **** *********** ********* is *******, *** ****** ******* *********** ****** **** *** ******* managing *** **** ** * *******, *** **** ****.

Use ****** ******* & ******

**** ******* *** ****** ******* * '****** ******' **** *********** detect **** * ****** *** **** ******* *** * ******** point ** * ***** *** **** ******. *************, ***** ******** are ***** **** *********** ** ************ ** **** ******, ***** they ** *** ********* * **** ******* ** *** ******.

*******, *********** *** ******* ***** *** ** ******* ** *********** knocked *** *** ****, ******* *****. ******** ********** ****** ******** can ****** *********** ** ******* **** ********* ******, ****** **** being ********** ***** ***** *** ****.

**** ******* ******* ******** ****** ******* ** ********, *** *********** them *** *** ***** ******* - ******* ***********, *** ******** method ** ********** ****** *********:

Integrate ************ *******

*******, ******* *** **** ********* ****** *** **** ******* ******* deterrence *** ********* ********: *********** ***** *** ****** ********. **** cameras *** ******* **** ****** ********** ********, ********* ********* ** unauthorized ***** ******** *** ****** ** ******.

********** **** *** ********'* ************ ****** ** ******** *********, ***** response *** **** ****** ** ********* ****** ** ******.

*******, ***** **** *********, *** **** ** *********** *** *** systems ******** *** ** ********** ********* (******* ******* ******* *** door) *** ******* ********** ******* ** *** ******* *********. ** most *****, *** *********** ******* *** *** ******* **** ** used *** **** **** **** ********** ********* ** *******, *** typically *** *** ************ ** ***** ******* ******* *** *****:

Consideration: *** ****

***** *** * ******** ******** ************* **** ******* ********** ** tamper ********, **** ******** *** ****** *** ** *********** *** connection ******* *** ********** *** ********** ******.

****** *******, ***** ** ************** *** ****** **** **** ****** to ********** ****, **** ** ************* *** *** ***** ****** users ** ******* ********** ********* *** ****** **** *** ******.

*** **** ** ****, ***** ********** ** ********.

Quiz ********

**** *** **** **************** ****** ******* *******.

[******: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (5)

Everyone locks the enclosures but leave the key on top, most are is a secure room at least!

This is true! There was a common "cut 'n paste" RFP spec that made the rounds in my area that made a point to specify locking closures for EVERYTHING: controllers, switches, servers, etc. and all the locks had to be pinned differently so one key couldn't open all enclosures.

Getting this part of the bid right took effort! Extra expense and admin time for sure.

The kicker: in every case I am aware of, after install the keys were just left hanging or stored on the top of the can just like you mention.

:(

Great article. From my point of view, the customer is the one that has to manage and take care of the keys after the install company finishes their job.

After training the end customers, I always hand them the keys of THEIR installation and advise that they should keep them in a safe place, so when the maintenance/service techs show up, first thing they have to do is ask for them (although reality is that most techs will always have keys for almost every enclosure, asking the customer for them builds confidence).

Great Article. I might add the value of OSDP even though you are talking physical security. There are generally hundreds of feet of cable between a secure room and a secure reader (Please don't forget the reader tamper !).

You have totally covered this in the past but it is worth another mention here .

Have a great Day

Randy

This is a good point that I am adding to the post. OSDP allows for reader supervision without even needing a separate tamper, and is a good method for securing the piece most typically exposed on the unsecured side.

Thanks for the feedback, right on.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Favorite Biometrics 2018 on Apr 23, 2018
Biometrics are on the rise, or at least integrator opposition to them is declining, according to new IPVM integrator statistics.   Almost half of...
Dedicated Vs Converged Access Control Networks (Statistics) on Apr 20, 2018
Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can...
Worst Access Control 2018 on Apr 18, 2018
Three access control providers stood out as providing the most problems for integrators. In this report, we analyze the answers to: "In the...
Key Control For Access Control Tutorial on Apr 16, 2018
End users spend thousands on advanced systems to keep themselves secure, but regularly neglect one of the lest expensive yet most important aspects...
Alarm.com Business Market Expansion on Apr 13, 2018
Alarm.com has millions of subscribers, but the company has traditionally been mostly a residential/home focused offering.  ADC's new Smart Business...
Average Access Control Project Size 2018 on Apr 10, 2018
  The most common access control project size is 5 - 16 doors per project. This 2018 result mirrors previous statistics, most recently in 2016...
ISC West 2018 Access Control Rundown on Apr 06, 2018
For ISC West 2018, what is new and interesting in access control?  This rundown will bring you up to speed on the exhibitors, what they are...
VMS New Developments Spring 2018 (Avigilon, Exacqvision, Genetec, Hikvision, Milestone, Network Optix) on Apr 04, 2018
What's new with VMS software? In this report, we examine new features and releases for Spring 2018 to track different areas of potential...
Forced Door Alarms For Access Control Tutorial on Apr 04, 2018
One of the most important access control alarms is also often ignored. "Forced Door" provides a vital and even critical notification against...
The 5 Major Lock Profiles Guide - Euro, Oval, KIK, Interchangeable Core, Mortise on Apr 03, 2018
Locks are used everywhere, but they are not all the same. In fact, even the shape of the lock changes, sometimes for no other reason than...

Most Recent Industry Reports

Chinese Manufacturer Kickstarter Campaign Huge Success (EverCam) on Apr 23, 2018
In a week, a Chinese manufacturer's expertly done Kickstarter campaign has received $1.4 million in pledges, an incredible amount for a video...
Favorite Biometrics 2018 on Apr 23, 2018
Biometrics are on the rise, or at least integrator opposition to them is declining, according to new IPVM integrator statistics.   Almost half of...
Dahua and Hikvision Win Over $1 Billion In Government-Backed Projects In Xinjiang on Apr 23, 2018
Dahua and Hikvision have won well over $1 billion worth of government-backed surveillance projects in China’s restive Xinjiang province since 2016,...
May 2018 Camera Course on Apr 20, 2018
Save $50 on early registration until this Thursday, the 26th. Register now (save $50) for the Spring 2018 Camera Course This is the only...
Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...
Dedicated Vs Converged Access Control Networks (Statistics) on Apr 20, 2018
Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
Rare Video Surveillance Fundraising - Verkada $15 Million on Apr 19, 2018
Fundraising in video surveillance (and the broader physical security market) has been poor recently. Highlights are few and far in between...
'Best In Show' Fails on Apr 19, 2018
ISC West's "Best In Show" has failed. For more than a decade, it has become increasingly irrelevant as the selections exhibit a cartoon level...
Security Camera Cleaning Frequency Statistics on Apr 18, 2018
150+ integrators told IPVM how often they clean cameras on customer's sites and why.  Inside we examine their answers and break down feedback...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact