Access Control Physical Security Tutorial

Author: Brian Rhodes, Published on Oct 30, 2017

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

In most cases, if done correctly, adding layers of security and protecting access components adds negligible cost. Here are IPVM's 5 recommended steps and options:

  • Install Controllers on Secure Side of Openings
  • Keep Panel Closets & Server Rooms Locked
  • Lock Enclosures & Panels
  • Use Tamper Sensors & Alarms
  • Integrate Surveillance Cameras

Finally, the 5 question quiz at the end will test your knowledge.

*** ******** ******** ** ****** ******* ********** ** ******** ** ensuring **** * ******** ** ***** ******. *********, *** ****** system *** ** ************ ** **** **** ** ** *********.

** **** *****, ** **** *********, ****** ****** ** ******** and ********** ****** ********** **** ********** ****. **** *** ****'* 5 *********** ***** *** *******:

  • ******* *********** ** ****** **** ** ********
  • **** ***** ******* & ****** ***** ******
  • **** ********** & ******
  • *** ****** ******* & ******
  • ********* ************ *******

*******, *** * ******** **** ** *** *** **** **** your *********.

[***************]

Install *********** ** ****** **** ** ********

** **** *****, *** **** ** *** ******* *** *** standing ** * **** **********.

**** * **** ** ****** **********, *** ****** ** ** keep ***** ********** ** ***** ** *** '********* ****' ** the ****** **** ** ********* *** ****, **** ****** *** 'secured' ****. ***** ***** ***** ** ***** ***** *******, **** characterize *** '****** *** ****** ****' ** ** *** ******* area.

*** ***** **** ******* ***** ***************** *** ********** ** ****** ** ******* **** ** *****:

******* *** ********* **** ** *** **********, ***** ****** ** taken ** ******** *** **** ** ********** ** ******** ****** control *******. * *********** **** ** ** ******* ** **** of *** ****** ******* ******** (***********, ***** ********, *******) ** the **** ** ******* ****. **********, *** ******** **** ** the ****** ***** **** ***** *** ** *** ******* **** access ******* *** ****, *** ******** ********* ******* ********* ** the ********* **** ****** ** * ****** ** ***** ********** to ***** *****.

***** **** *** **** ** ** * *** ** ****** sense, ** ** ******** **********. **** **** ******* **** ********' ************ *****:

** *** ******* ** *** '*********' **** ** *** ****, with *** ****** ****** *** ******* **** *** ****** ******* the ****** ****. *******, *** ********** *** ******* *** ******** door ********** ** ***** ***** ***** *** ******* ** *** locked ****.

*******, ******* ******** *** ********* ** ****** ********* ** ******** access ******** ** *** ******* **** ** *** *******. ********* the ******** ** *** **** **** *** **** ********* *** potentially ********** ******* ** * ***** ****.

**** ***** ***** ******* ** *** ******* ****, ******** ******** in * ******** ******** ** *******. ****** ******** ******* ** the **** ***** *** ******* ***** ******* ***** **** ****** control ********* *** ** *****, *** ** *****,*** *** ** **** *** ********* *******:

**** **** **** *********** ** ********* ******* *** ** ****. Take *** ******* ***** *****, ** * ******* ******** ** outside ******** ****:

** ***** ** ****** *** ******* ********, **** *** ******* cable ***** ** ** ***. ** **** *** ****** ****** to *** ***** ***** ** ********** ********* *****(****: ********** ***** ******** *** ******* *********** *** **** ********** *******) **** ** ***** ** ****** *******, *** **** ** any ******* *****/******* ***** ** ****** **** * ****** **** reader ****** ** ********* ********** ****** ******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* *** ******* ***** ** ******* ** coordinate ********, *** **** '****' ***** ** ******* ********* *** centralized ******* *******.

** ** ******** ******** ****** ********* ******** ***** ********* ** kept ****** *** ****** ** ****** ***, ** *********, ***** doors *** ******** ********** ** *** **** ****** ****** **** are **********:

*** ***** *****, *** ****** *****, ***** ******* ** ******* is *** **********, ******* ***** ******. **** *** ***** *** be ******, *** ******** ***, **** **** ******* ***** ***** uncontrolled ** **** ******* *********.

***** **** ***** ** *** ********* *** **** ** ****** main ******* ******* ** *** ******** ****** ******* ******, ******** that **** '*****' ******* ****** ** ****** ** ****. **** the **** ** **** ** ****** ****** ******* ** **** to *******, * ****-******* ****** ** ********** ***** *** ****, or **** * '*****-*****' ********** **** ***** *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** ****** *******, ***** ***** ***** *** 'shared ******' **** **** ***** ***** ** ********** ******* **** plumbing, *******, ** **** ********** *****. ***** ********** ** ****** may ** ****** **** *** *** ******* ******, ***** *** still ** *** **** ** ************ *********** ********* **** *******.

**** ********** ****** ******* ******* ******** **********, **** *** **** shown *****:

***** ********* '***' ******** * ***** **** ** **** ****** at *** *****. **** ***** **** ******* **** *********** ********* is *******, *** ****** ******* *********** ****** **** *** ******* managing *** **** ** * *******, *** **** ****.

Use ****** ******* & ******

**** ******* *** ****** ******* * '****** ******' **** *********** detect **** * ****** *** **** ******* *** * ******** point ** * ***** *** **** ******. *************, ***** ******** are ***** **** *********** ** ************ ** **** ******, ***** they ** *** ********* * **** ******* ** *** ******.

*******, *********** *** ******* ***** *** ** ******* ** *********** knocked *** *** ****, ******* *****. ******** ********** ****** ******** can ****** *********** ** ******* **** ********* ******, ****** **** being ********** ***** ***** *** ****.

**** ******* ******* ******** ****** ******* ** ********, *** *********** them *** *** ***** ******* - ******* ***********, *** ******** method ** ********** ****** *********:

Integrate ************ *******

*******, ******* *** **** ********* ****** *** **** ******* ******* deterrence *** ********* ********: *********** ***** *** ****** ********. **** cameras *** ******* **** ****** ********** ********, ********* ********* ** unauthorized ***** ******** *** ****** ** ******.

********** **** *** ********'* ************ ****** ** ******** *********, ***** response *** **** ****** ** ********* ****** ** ******.

*******, ***** **** *********, *** **** ** *********** *** *** systems ******** *** ** ********** ********* (******* ******* ******* *** door) *** ******* ********** ******* ** *** ******* *********. ** most *****, *** *********** ******* *** *** ******* **** ** used *** **** **** **** ********** ********* ** *******, *** typically *** *** ************ ** ***** ******* ******* *** *****:

Consideration: *** ****

***** *** * ******** ******** ************* **** ******* ********** ** tamper ********, **** ******** *** ****** *** ** *********** *** connection ******* *** ********** *** ********** ******.

****** *******, ***** ** ************** *** ****** **** **** ****** to ********** ****, **** ** ************* *** *** ***** ****** users ** ******* ********** ********* *** ****** **** *** ******.

*** **** ** ****, ***** ********** ** ********.

Quiz ********

**** *** **** **************** ****** ******* *******.

[******: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (5)

Everyone locks the enclosures but leave the key on top, most are is a secure room at least!

This is true! There was a common "cut 'n paste" RFP spec that made the rounds in my area that made a point to specify locking closures for EVERYTHING: controllers, switches, servers, etc. and all the locks had to be pinned differently so one key couldn't open all enclosures.

Getting this part of the bid right took effort! Extra expense and admin time for sure.

The kicker: in every case I am aware of, after install the keys were just left hanging or stored on the top of the can just like you mention.

:(

Great article. From my point of view, the customer is the one that has to manage and take care of the keys after the install company finishes their job.

After training the end customers, I always hand them the keys of THEIR installation and advise that they should keep them in a safe place, so when the maintenance/service techs show up, first thing they have to do is ask for them (although reality is that most techs will always have keys for almost every enclosure, asking the customer for them builds confidence).

Great Article. I might add the value of OSDP even though you are talking physical security. There are generally hundreds of feet of cable between a secure room and a secure reader (Please don't forget the reader tamper !).

You have totally covered this in the past but it is worth another mention here .

Have a great Day

Randy

This is a good point that I am adding to the post. OSDP allows for reader supervision without even needing a separate tamper, and is a good method for securing the piece most typically exposed on the unsecured side.

Thanks for the feedback, right on.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Belgium Bans Private Facial Surveillance on Jul 06, 2018
Belgium has effectively banned the use of facial recognition and other biometrics-based video analytics in surveillance cameras for private,...
GDPR For Access Control Guide on Jul 03, 2018
Electronic access control is common in businesses plus organizations are increasingly considering biometrics for access control. With GDPR coming...
Allegion Acquires Isonas on Jun 29, 2018
Isonas failed to 'revolutionize' access control as they regularly claimed. Now, nearly 20 years after their founding, they are being acquired by...
Replacing / Switching Access Control Systems Guide on Jun 28, 2018
Ripping out and replacing access control systems is hard for important reasons. Because users typically hold on to access control systems for as...
Free Online NFPA, IBC, and ADA Codes and Standards on Jun 27, 2018
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...
IFSEC 2018 Final Show Report on Jun 20, 2018
IPVM attended the IFSEC show for the first time this year. The Chinese took over the show, centered on Hikvision, flanked by Dahua, Huawei and a...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Access Control - Time & Attendance, Mustering and Mantraps Guide on Jun 13, 2018
Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure,...

Most Recent Industry Reports

Directory of Video Surveillance Startups on Jul 18, 2018
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known entity...
Ladder Lockdown and Ladder Levelizer Tested on Jul 18, 2018
Ladders are a daily necessity for surveillance and security installers, but working on an unstable surface can be extremely dangerous. In addition...
FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Axis ~$100 Camera Tested on Jul 17, 2018
Axis has released their lowest cost camera ever, the Companion Eye Mini L, setting their sights on a market dominated by Hikvision and Dahua. Can...
Amazon Ring Alarm System Tested on Jul 16, 2018
Amazon Ring is going to hurt traditional dealers, and especially ADT, new IPVM test results of Ring's Alarm system underscore. IPVM found that...
Hikvision Wins Chinese Government Forced Facial Recognition Project Across 967 Mosques on Jul 16, 2018
Hikvision has won a Chinese government tender which requires that facial recognition cameras be set up at the entrance of every single mosque...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Security Sales Course Summer 2018 on Jul 13, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer 2018 This...
US Tariffs Hit China Video Surveillance on Jul 13, 2018
Chinese video surveillance products avoided tariffs for the first two rounds. Now, in the third round, many video surveillance products will be...
Last Chance - July 2018 IP Networking Course on Jul 12, 2018
Registration ends today, Thursday. Register now. This is the only networking course designed specifically for video surveillance...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact