Access Control Physical Security Tutorial

By: Brian Rhodes, Published on Oct 30, 2017

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

In most cases, if done correctly, adding layers of security and protecting access components adds negligible cost. Here are IPVM's 5 recommended steps and options:

  • Install Controllers on Secure Side of Openings
  • Keep Panel Closets & Server Rooms Locked
  • Lock Enclosures & Panels
  • Use Tamper Sensors & Alarms
  • Integrate Surveillance Cameras

Finally, the 5 question quiz at the end will test your knowledge.

*** ******** ******** ** access ******* ********** ** critical ** ******** **** a ******** ** ***** secure. *********, *** ****** system *** ** ************ or **** **** ** an *********.

** **** *****, ** done *********, ****** ****** of ******** *** ********** access ********** **** ********** cost. **** *** ****'* 5 *********** ***** *** options:

  • ******* *********** ** ****** Side ** ********
  • **** ***** ******* & Server ***** ******
  • **** ********** & ******
  • *** ****** ******* & Alarms
  • ********* ************ *******

*******, *** * ******** quiz ** *** *** will **** **** *********.

[***************]

Install *********** ** ****** **** ** ********

** **** *****, *** side ** *** ******* you *** ******** ** a **** **********.

**** * **** ** access **********, *** ****** is ** **** ***** unapproved ** ***** ** the '********* ****' ** the ****** **** ** occupants *** ****, **** called *** '*******' ****. While ***** ***** ** these ***** *******, **** characterize *** '****** *** locked ****' ** ** the ******* ****.

*** ***** **** ******* ***** ***************** *** ********** ** Secure ** ******* **** of *****:

******* *** ********* **** is *** **********, ***** should ** ***** ** mitigate *** **** ** exploiting ** ******** ****** control *******. * *********** step ** ** ******* as **** ** *** access ******* ******** (***********, power ********, *******) ** the **** ** ******* side. **********, *** ******** risk ** *** ****** comes **** ***** *** do *** ******* **** access ******* *** ****, and ******** ********* ******* equipment ** *** ********* side ****** ** * target ** ***** ********** to ***** *****.

***** **** *** **** to ** * *** of ****** *****, ** is ******** **********. **** this ******* **** ********' ************ *****:

** *** ******* ** the '*********' **** ** the ****, **** *** keypad ****** *** ******* lock *** ****** ******* the ****** ****. *******, the ********** *** ******* the ******** **** ********** in ***** ***** ***** the ******* ** *** locked ****.

*******, ******* ******** *** tampering ** ****** ********* by ******** ****** ******** on *** ******* **** of *** *******. ********* the ******** ** *** same **** *** **** expensive *** *********** ********** devices ** * ***** area.

**** ***** ***** ******* on *** ******* ****, mounting ******** ** * discrete ******** ** *******. Simply ******** ******* ** the **** ***** *** opening ***** ******* ***** puts ****** ******* ********* out ** *****, *** of *****,*** *** ** **** for ********* *******:

**** **** **** *********** or ********* ******* *** at ****. **** *** example ***** *****, ** a ******* ******** ** outside ******** ****:

** ***** ** ****** the ******* ********, **** the ******* ***** ***** to ** ***. ** note *** ****** ****** to *** ***** ***** in ********** ********* *****(****: ********** ***** ******** are ******* *********** *** need ********** *******) **** ** ***** to ****** *******, *** risk ** *** ******* power/control ***** ** ****** like * ****** **** reader ****** ** ********* considered ****** ******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* use ******* ***** ** servers ** ********** ********, and **** '****' ***** of ******* ********* *** centralized ******* *******.

** ** ******** ******** policy ********* ******** ***** locations ** **** ****** and ****** ** ****** few, ** *********, ***** doors *** ******** ********** by *** **** ****** system **** *** **********:

*** ***** *****, *** server *****, ***** ******* or ******* ** *** sufficient, ******* ***** ******. PINs *** ***** *** be ******, *** ******** are, **** **** ******* these ***** ************ ** very ******* *********.

***** **** ***** ** not ********* *** **** of ****** **** ******* closets ** *** ******** access ******* ******, ******** that **** '*****' ******* should ** ****** ** well. **** *** **** or **** ** ****** access ******* ** **** to *******, * ****-******* system ** ********** ***** and ****, ** **** a '*****-*****' ********** **** keeps *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** locked *******, ***** ***** often *** '****** ******' area **** ***** ***** of ********** ******* **** plumbing, *******, ** **** janitorial *****. ***** ********** or ****** *** ** locked **** *** *** general ******, ***** *** still ** *** **** of ************ *********** ********* with *******.

**** ********** ****** ******* include ******** **********, **** the **** ***** *****:

***** ********* '***' ******** a ***** **** ** kept ****** ** *** times. **** ***** **** ensures **** *********** ********* is *******, *** ****** keeping *********** ****** **** and ******* ******** *** keys ** * *******, low **** ****.

Use ****** ******* & ******

**** ******* *** ****** include * '****** ******' that *********** ****** **** a ****** *** **** knocked *** * ******** point ** * ***** has **** ******. *************, these ******** *** ***** left *********** ** ************ to **** ******, ***** they ** *** ********* a **** ******* ** the ******.

*******, *********** *** ******* locks *** ** ******* or *********** ******* *** the ****, ******* *****. Properly ********** ****** ******** can ****** *********** ** seconds **** ********* ******, rather **** ***** ********** hours ***** *** ****.

**** ******* ******* ******** tamper ******* ** ********, and *********** **** *** use ***** ******* - another ***********, *** ******** method ** ********** ****** integrity:

Integrate ************ *******

*******, ******* *** **** expensive ****** *** **** provide ******* ********** *** immediate ********: *********** ***** and ****** ********. **** cameras *** ******* **** access ********** ********, ********* tampering ** ************ ***** attempts *** ****** ** camera.

********** **** *** ********'* surveillance ****** ** ******** monitored, ***** ******** *** stop ****** ** ********* before ** ******.

*******, ***** **** *********, the **** ** *********** the *** ******* ******** can ** ********** ********* (several ******* ******* *** door) *** ******* ********** cameras ** *** ******* installed. ** **** *****, the *********** ******* *** two ******* **** ** used *** **** **** just ********** ********* ** threats, *** ********* *** the ************ ** ***** passing ******* *** *****:

Consideration: *** ****

***** *** * ******** security ************* **** ******* enclosures ** ****** ********, OSDP ******** *** ****** bus ** *********** *** connection ******* *** ********** and ********** ******.

****** *******, ***** ** unidirectional *** ****** **** from ****** ** ********** only, **** ** ************* and *** ***** ****** users ** ******* ********** separates *** ****** **** the ******.

*** **** ** ****, catch ********** ** ********.

Quiz ********

**** *** **** **************** ****** ******* *******.

[******: **** ******** *** originally ********* ** **** and ************* ******* ** 2017]

Comments (5)

Everyone locks the enclosures but leave the key on top, most are is a secure room at least!

This is true! There was a common "cut 'n paste" RFP spec that made the rounds in my area that made a point to specify locking closures for EVERYTHING: controllers, switches, servers, etc. and all the locks had to be pinned differently so one key couldn't open all enclosures.

Getting this part of the bid right took effort! Extra expense and admin time for sure.

The kicker: in every case I am aware of, after install the keys were just left hanging or stored on the top of the can just like you mention.

:(

Great article. From my point of view, the customer is the one that has to manage and take care of the keys after the install company finishes their job.

After training the end customers, I always hand them the keys of THEIR installation and advise that they should keep them in a safe place, so when the maintenance/service techs show up, first thing they have to do is ask for them (although reality is that most techs will always have keys for almost every enclosure, asking the customer for them builds confidence).

Great Article. I might add the value of OSDP even though you are talking physical security. There are generally hundreds of feet of cable between a secure room and a secure reader (Please don't forget the reader tamper !).

You have totally covered this in the past but it is worth another mention here .

Have a great Day

Randy

This is a good point that I am adding to the post. OSDP allows for reader supervision without even needing a separate tamper, and is a good method for securing the piece most typically exposed on the unsecured side.

Thanks for the feedback, right on.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Mining Company Security Manager Interview on May 10, 2019
First Quantum Minerals Limited (FQML) is a global enterprise with offices on 4 continents and operations in 7 countries with exploratory operations...
10 Facial Recognition Providers Review (Secutech) on May 09, 2019
Adding to our 19 Facial Recognition Providers Profiled report from ISC West, IPVM focused on facial recognition technology for our Day 2 coverage...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Restaurant Security Manager Interview on May 06, 2019
Wright’s Gourmet House in Tampa, Florida has been around for over 50 years. During most of that time, there were no security measures in place. Now...
Door Closers Access Control Tutorial on May 02, 2019
Door Closers have an important job: automatically shut doors when they are opened, because an open door cannot control access. In this note, we...

Most Recent Industry Reports

Verkada Video Quality Problems Tested on May 23, 2019
Verkada suffers from numerous video quality problems, not found in commercial IP cameras, new IPVM testing of Verkada vs Axis and Hikvision...
Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
US Considers Sanctions Against Hikvision and Dahua on May 22, 2019
The US government is considering blacklisting "up to 5" PRC surveillance firms, including Hikvision and Dahua, Bloomberg reported, with human...
Dahua USA Celebrates 5 Years of Errors on May 21, 2019
Dahua USA is, in their own words, 'celebrating' 5 years in North America or as trade magazine SSN declared: Dahua Technology finds success in...
Axis ~$150 Outdoor Camera Tested on May 21, 2019
Axis has released the latest in their Companion camera line, the outdoor Companion Dome Mini LE, a 1080p integrated IR model aiming to compete with...
Covert Facial Recognition Using Axis and Amazon By NYTimes on May 20, 2019
What if you took a 33MP Axis camera covering one of the busiest parks in the US and ran Amazon Facial Recognition against it? That is what the...
Amazon Ring Public Subsidy Program Aims To Dominate Residential Security on May 20, 2019
Amazon dominates market after market. Quitely, but increasingly, they are doing so in residential security, through a combination of significant...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact