Access Control Physical Security Tutorial

Author: Brian Rhodes, Published on Oct 30, 2017

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

In most cases, if done correctly, adding layers of security and protecting access components adds negligible cost. Here are IPVM's 5 recommended steps and options:

  • Install Controllers on Secure Side of Openings
  • Keep Panel Closets & Server Rooms Locked
  • Lock Enclosures & Panels
  • Use Tamper Sensors & Alarms
  • Integrate Surveillance Cameras

Finally, the 5 question quiz at the end will test your knowledge.

*** ******** ******** ** ****** ******* ********** ** ******** ** ensuring **** * ******** ** ***** ******. *********, *** ****** system *** ** ************ ** **** **** ** ** *********.

** **** *****, ** **** *********, ****** ****** ** ******** and ********** ****** ********** **** ********** ****. **** *** ****'* 5 *********** ***** *** *******:

  • ******* *********** ** ****** **** ** ********
  • **** ***** ******* & ****** ***** ******
  • **** ********** & ******
  • *** ****** ******* & ******
  • ********* ************ *******

*******, *** * ******** **** ** *** *** **** **** your *********.

[***************]

Install *********** ** ****** **** ** ********

** **** *****, *** **** ** *** ******* *** *** standing ** * **** **********.

**** * **** ** ****** **********, *** ****** ** ** keep ***** ********** ** ***** ** *** '********* ****' ** the ****** **** ** ********* *** ****, **** ****** *** 'secured' ****. ***** ***** ***** ** ***** ***** *******, **** characterize *** '****** *** ****** ****' ** ** *** ******* area.

*** ***** **** ******* ***** ***************** *** ********** ** ****** ** ******* **** ** *****:

******* *** ********* **** ** *** **********, ***** ****** ** taken ** ******** *** **** ** ********** ** ******** ****** control *******. * *********** **** ** ** ******* ** **** of *** ****** ******* ******** (***********, ***** ********, *******) ** the **** ** ******* ****. **********, *** ******** **** ** the ****** ***** **** ***** *** ** *** ******* **** access ******* *** ****, *** ******** ********* ******* ********* ** the ********* **** ****** ** * ****** ** ***** ********** to ***** *****.

***** **** *** **** ** ** * *** ** ****** sense, ** ** ******** **********. **** **** ******* **** ********' ************ *****:

** *** ******* ** *** '*********' **** ** *** ****, with *** ****** ****** *** ******* **** *** ****** ******* the ****** ****. *******, *** ********** *** ******* *** ******** door ********** ** ***** ***** ***** *** ******* ** *** locked ****.

*******, ******* ******** *** ********* ** ****** ********* ** ******** access ******** ** *** ******* **** ** *** *******. ********* the ******** ** *** **** **** *** **** ********* *** potentially ********** ******* ** * ***** ****.

**** ***** ***** ******* ** *** ******* ****, ******** ******** in * ******** ******** ** *******. ****** ******** ******* ** the **** ***** *** ******* ***** ******* ***** **** ****** control ********* *** ** *****, *** ** *****,*** *** ** **** *** ********* *******:

**** **** **** *********** ** ********* ******* *** ** ****. Take *** ******* ***** *****, ** * ******* ******** ** outside ******** ****:

** ***** ** ****** *** ******* ********, **** *** ******* cable ***** ** ** ***. ** **** *** ****** ****** to *** ***** ***** ** ********** ********* *****(****: ********** ***** ******** *** ******* *********** *** **** ********** *******) **** ** ***** ** ****** *******, *** **** ** any ******* *****/******* ***** ** ****** **** * ****** **** reader ****** ** ********* ********** ****** ******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* *** ******* ***** ** ******* ** coordinate ********, *** **** '****' ***** ** ******* ********* *** centralized ******* *******.

** ** ******** ******** ****** ********* ******** ***** ********* ** kept ****** *** ****** ** ****** ***, ** *********, ***** doors *** ******** ********** ** *** **** ****** ****** **** are **********:

*** ***** *****, *** ****** *****, ***** ******* ** ******* is *** **********, ******* ***** ******. **** *** ***** *** be ******, *** ******** ***, **** **** ******* ***** ***** uncontrolled ** **** ******* *********.

***** **** ***** ** *** ********* *** **** ** ****** main ******* ******* ** *** ******** ****** ******* ******, ******** that **** '*****' ******* ****** ** ****** ** ****. **** the **** ** **** ** ****** ****** ******* ** **** to *******, * ****-******* ****** ** ********** ***** *** ****, or **** * '*****-*****' ********** **** ***** *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** ****** *******, ***** ***** ***** *** 'shared ******' **** **** ***** ***** ** ********** ******* **** plumbing, *******, ** **** ********** *****. ***** ********** ** ****** may ** ****** **** *** *** ******* ******, ***** *** still ** *** **** ** ************ *********** ********* **** *******.

**** ********** ****** ******* ******* ******** **********, **** *** **** shown *****:

***** ********* '***' ******** * ***** **** ** **** ****** at *** *****. **** ***** **** ******* **** *********** ********* is *******, *** ****** ******* *********** ****** **** *** ******* managing *** **** ** * *******, *** **** ****.

Use ****** ******* & ******

**** ******* *** ****** ******* * '****** ******' **** *********** detect **** * ****** *** **** ******* *** * ******** point ** * ***** *** **** ******. *************, ***** ******** are ***** **** *********** ** ************ ** **** ******, ***** they ** *** ********* * **** ******* ** *** ******.

*******, *********** *** ******* ***** *** ** ******* ** *********** knocked *** *** ****, ******* *****. ******** ********** ****** ******** can ****** *********** ** ******* **** ********* ******, ****** **** being ********** ***** ***** *** ****.

**** ******* ******* ******** ****** ******* ** ********, *** *********** them *** *** ***** ******* - ******* ***********, *** ******** method ** ********** ****** *********:

Integrate ************ *******

*******, ******* *** **** ********* ****** *** **** ******* ******* deterrence *** ********* ********: *********** ***** *** ****** ********. **** cameras *** ******* **** ****** ********** ********, ********* ********* ** unauthorized ***** ******** *** ****** ** ******.

********** **** *** ********'* ************ ****** ** ******** *********, ***** response *** **** ****** ** ********* ****** ** ******.

*******, ***** **** *********, *** **** ** *********** *** *** systems ******** *** ** ********** ********* (******* ******* ******* *** door) *** ******* ********** ******* ** *** ******* *********. ** most *****, *** *********** ******* *** *** ******* **** ** used *** **** **** **** ********** ********* ** *******, *** typically *** *** ************ ** ***** ******* ******* *** *****:

Consideration: *** ****

***** *** * ******** ******** ************* **** ******* ********** ** tamper ********, **** ******** *** ****** *** ** *********** *** connection ******* *** ********** *** ********** ******.

****** *******, ***** ** ************** *** ****** **** **** ****** to ********** ****, **** ** ************* *** *** ***** ****** users ** ******* ********** ********* *** ****** **** *** ******.

*** **** ** ****, ***** ********** ** ********.

Quiz ********

**** *** **** **************** ****** ******* *******.

[******: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (5)

Everyone locks the enclosures but leave the key on top, most are is a secure room at least!

This is true! There was a common "cut 'n paste" RFP spec that made the rounds in my area that made a point to specify locking closures for EVERYTHING: controllers, switches, servers, etc. and all the locks had to be pinned differently so one key couldn't open all enclosures.

Getting this part of the bid right took effort! Extra expense and admin time for sure.

The kicker: in every case I am aware of, after install the keys were just left hanging or stored on the top of the can just like you mention.

:(

Great article. From my point of view, the customer is the one that has to manage and take care of the keys after the install company finishes their job.

After training the end customers, I always hand them the keys of THEIR installation and advise that they should keep them in a safe place, so when the maintenance/service techs show up, first thing they have to do is ask for them (although reality is that most techs will always have keys for almost every enclosure, asking the customer for them builds confidence).

Great Article. I might add the value of OSDP even though you are talking physical security. There are generally hundreds of feet of cable between a secure room and a secure reader (Please don't forget the reader tamper !).

You have totally covered this in the past but it is worth another mention here .

Have a great Day

Randy

This is a good point that I am adding to the post. OSDP allows for reader supervision without even needing a separate tamper, and is a good method for securing the piece most typically exposed on the unsecured side.

Thanks for the feedback, right on.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Wavelynx Access Control Manufacturer Profile on Jan 10, 2019
Denver-based WaveLynx is not well known as an access reader manufacturer, but OEMs for big industry brands including Amag, Isonas (Allegion),...
Combating Vaping Epidemic - Halo Smart Sensor Profile on Dec 21, 2018
Youth vaping has become an epidemic, according to the US Surgeon General, while the market leader, Juul, just received a $12.8 billion investment...
ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Open Options Acquired By ACRE on Dec 17, 2018
ACRE is doing deals again. A year after they sold Mercury, they are buying another access control company - Open Options. In this note, we...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...

Most Recent Industry Reports

The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have not only been big buzzwords over the past decade, but they have also become core features of video...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP alleged that the NYPD was using...
Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Exacq Favorability Results 2019 on Jan 17, 2019
Exacq favorability amongst integrators has declined sharply, in new IPVM statistics, compared to 2017 IPVM statistics for Exacq. Now, over 5 since...
Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact