Access Control Physical Security Tutorial

Author: Brian Rhodes, Published on Oct 30, 2017

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary.

In most cases, if done correctly, adding layers of security and protecting access components adds negligible cost. Here are IPVM's 5 recommended steps and options:

  • Install Controllers on Secure Side of Openings
  • Keep Panel Closets & Server Rooms Locked
  • Lock Enclosures & Panels
  • Use Tamper Sensors & Alarms
  • Integrate Surveillance Cameras

Finally, the 5 question quiz at the end will test your knowledge.

*** ******** ******** ** ****** ******* ********** ** ******** ** ensuring **** * ******** ** ***** ******. *********, *** ****** system *** ** ************ ** **** **** ** ** *********.

** **** *****, ** **** *********, ****** ****** ** ******** and ********** ****** ********** **** ********** ****. **** *** ****'* 5 *********** ***** *** *******:

  • ******* *********** ** ****** **** ** ********
  • **** ***** ******* & ****** ***** ******
  • **** ********** & ******
  • *** ****** ******* & ******
  • ********* ************ *******

*******, *** * ******** **** ** *** *** **** **** your *********.

[***************]

Install *********** ** ****** **** ** ********

** **** *****, *** **** ** *** ******* *** *** standing ** * **** **********.

**** * **** ** ****** **********, *** ****** ** ** keep ***** ********** ** ***** ** *** '********* ****' ** the ****** **** ** ********* *** ****, **** ****** *** 'secured' ****. ***** ***** ***** ** ***** ***** *******, **** characterize *** '****** *** ****** ****' ** ** *** ******* area.

*** ***** **** ******* ***** ***************** *** ********** ** ****** ** ******* **** ** *****:

******* *** ********* **** ** *** **********, ***** ****** ** taken ** ******** *** **** ** ********** ** ******** ****** control *******. * *********** **** ** ** ******* ** **** of *** ****** ******* ******** (***********, ***** ********, *******) ** the **** ** ******* ****. **********, *** ******** **** ** the ****** ***** **** ***** *** ** *** ******* **** access ******* *** ****, *** ******** ********* ******* ********* ** the ********* **** ****** ** * ****** ** ***** ********** to ***** *****.

***** **** *** **** ** ** * *** ** ****** sense, ** ** ******** **********. **** **** ******* **** ********' ************ *****:

** *** ******* ** *** '*********' **** ** *** ****, with *** ****** ****** *** ******* **** *** ****** ******* the ****** ****. *******, *** ********** *** ******* *** ******** door ********** ** ***** ***** ***** *** ******* ** *** locked ****.

*******, ******* ******** *** ********* ** ****** ********* ** ******** access ******** ** *** ******* **** ** *** *******. ********* the ******** ** *** **** **** *** **** ********* *** potentially ********** ******* ** * ***** ****.

**** ***** ***** ******* ** *** ******* ****, ******** ******** in * ******** ******** ** *******. ****** ******** ******* ** the **** ***** *** ******* ***** ******* ***** **** ****** control ********* *** ** *****, *** ** *****,*** *** ** **** *** ********* *******:

**** **** **** *********** ** ********* ******* *** ** ****. Take *** ******* ***** *****, ** * ******* ******** ** outside ******** ****:

** ***** ** ****** *** ******* ********, **** *** ******* cable ***** ** ** ***. ** **** *** ****** ****** to *** ***** ***** ** ********** ********* *****(****: ********** ***** ******** *** ******* *********** *** **** ********** *******) **** ** ***** ** ****** *******, *** **** ** any ******* *****/******* ***** ** ****** **** * ****** **** reader ****** ** ********* ********** ****** ******.

Keep ***** ******* & ****** ***** ******

*********** ****** ******* ******* *** ******* ***** ** ******* ** coordinate ********, *** **** '****' ***** ** ******* ********* *** centralized ******* *******.

** ** ******** ******** ****** ********* ******** ***** ********* ** kept ****** *** ****** ** ****** ***, ** *********, ***** doors *** ******** ********** ** *** **** ****** ****** **** are **********:

*** ***** *****, *** ****** *****, ***** ******* ** ******* is *** **********, ******* ***** ******. **** *** ***** *** be ******, *** ******** ***, **** **** ******* ***** ***** uncontrolled ** **** ******* *********.

***** **** ***** ** *** ********* *** **** ** ****** main ******* ******* ** *** ******** ****** ******* ******, ******** that **** '*****' ******* ****** ** ****** ** ****. **** the **** ** **** ** ****** ****** ******* ** **** to *******, * ****-******* ****** ** ********** ***** *** ****, or **** * '*****-*****' ********** **** ***** *** **** ** bay.

Lock *** ****** & **********

**** **** **** ****** ****** *******, ***** ***** ***** *** 'shared ******' **** **** ***** ***** ** ********** ******* **** plumbing, *******, ** **** ********** *****. ***** ********** ** ****** may ** ****** **** *** *** ******* ******, ***** *** still ** *** **** ** ************ *********** ********* **** *******.

**** ********** ****** ******* ******* ******** **********, **** *** **** shown *****:

***** ********* '***' ******** * ***** **** ** **** ****** at *** *****. **** ***** **** ******* **** *********** ********* is *******, *** ****** ******* *********** ****** **** *** ******* managing *** **** ** * *******, *** **** ****.

Use ****** ******* & ******

**** ******* *** ****** ******* * '****** ******' **** *********** detect **** * ****** *** **** ******* *** * ******** point ** * ***** *** **** ******. *************, ***** ******** are ***** **** *********** ** ************ ** **** ******, ***** they ** *** ********* * **** ******* ** *** ******.

*******, *********** *** ******* ***** *** ** ******* ** *********** knocked *** *** ****, ******* *****. ******** ********** ****** ******** can ****** *********** ** ******* **** ********* ******, ****** **** being ********** ***** ***** *** ****.

**** ******* ******* ******** ****** ******* ** ********, *** *********** them *** *** ***** ******* - ******* ***********, *** ******** method ** ********** ****** *********:

Integrate ************ *******

*******, ******* *** **** ********* ****** *** **** ******* ******* deterrence *** ********* ********: *********** ***** *** ****** ********. **** cameras *** ******* **** ****** ********** ********, ********* ********* ** unauthorized ***** ******** *** ****** ** ******.

********** **** *** ********'* ************ ****** ** ******** *********, ***** response *** **** ****** ** ********* ****** ** ******.

*******, ***** **** *********, *** **** ** *********** *** *** systems ******** *** ** ********** ********* (******* ******* ******* *** door) *** ******* ********** ******* ** *** ******* *********. ** most *****, *** *********** ******* *** *** ******* **** ** used *** **** **** **** ********** ********* ** *******, *** typically *** *** ************ ** ***** ******* ******* *** *****:

Consideration: *** ****

***** *** * ******** ******** ************* **** ******* ********** ** tamper ********, **** ******** *** ****** *** ** *********** *** connection ******* *** ********** *** ********** ******.

****** *******, ***** ** ************** *** ****** **** **** ****** to ********** ****, **** ** ************* *** *** ***** ****** users ** ******* ********** ********* *** ****** **** *** ******.

*** **** ** ****, ***** ********** ** ********.

Quiz ********

**** *** **** **************** ****** ******* *******.

[******: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (5)

Everyone locks the enclosures but leave the key on top, most are is a secure room at least!

This is true! There was a common "cut 'n paste" RFP spec that made the rounds in my area that made a point to specify locking closures for EVERYTHING: controllers, switches, servers, etc. and all the locks had to be pinned differently so one key couldn't open all enclosures.

Getting this part of the bid right took effort! Extra expense and admin time for sure.

The kicker: in every case I am aware of, after install the keys were just left hanging or stored on the top of the can just like you mention.

:(

Great article. From my point of view, the customer is the one that has to manage and take care of the keys after the install company finishes their job.

After training the end customers, I always hand them the keys of THEIR installation and advise that they should keep them in a safe place, so when the maintenance/service techs show up, first thing they have to do is ask for them (although reality is that most techs will always have keys for almost every enclosure, asking the customer for them builds confidence).

Great Article. I might add the value of OSDP even though you are talking physical security. There are generally hundreds of feet of cable between a secure room and a secure reader (Please don't forget the reader tamper !).

You have totally covered this in the past but it is worth another mention here .

Have a great Day

Randy

This is a good point that I am adding to the post. OSDP allows for reader supervision without even needing a separate tamper, and is a good method for securing the piece most typically exposed on the unsecured side.

Thanks for the feedback, right on.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...
Axis 2N Intercom Tested on Nov 08, 2018
Axis expanded its video intercom business buying Czech-based 2N in 2016. Despite competing against owner Axis' intercoms, 2N recently registered as...
Haven Targets School Security with Lockdown Lineup on Nov 08, 2018
Haven, a US startup founded in 2014 as a residential-focused company, has now raised funding and is offering a lineup of commercial grade locks for...
Directory Of Video Doorbells on Nov 06, 2018
Video doorbells are one of the fastest growing categories in video surveillance, especially among residences. The optimal placement of these...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
Worst Products on Nov 03, 2018
Security integrators periodically report on their favorite and worst products to IPVM. These are known integrators who IPVM pays to answer surveys....
Solar-Powered, Smart-Phone-Based Access Kit (VIZPin) Examined on Nov 02, 2018
Cloud-based access control company VIZPin is releasing a solar-powered and smart phone based access control system for gates and other remote...
Building Occupancy Codes and Access Control Tutorial on Nov 01, 2018
A building or room's classification can greatly impact which building codes must be followed. In terms of access control, these 'occupancy codes'...
Resideo IPOs, Then Plunges on Oct 31, 2018
ADI and Honeywell Homes management have been touting their spinout and IPO for months, including appearing on Wall Street as they widely shared on...

Most Recent Industry Reports

'Sticker' Surveillance Camera Developed (CSEM Witness) on Nov 16, 2018
The Swiss Center for Electronics and Microtechnology (CSEM) has announced what it calls the: world’s first fully autonomous camera that can be...
ISC East 2018 Mini-Show Final Report on Nov 16, 2018
This is our second (updated) and final show report from ISC East. ISC East, by its own admission, is not a national or international show, billed...
Facial Detection Tested on Nov 16, 2018
Facial detection and recognition are increasingly offered by video surveillance manufacturers. Facial detection detects faces in an image/video...
Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
ASIS Offering Custom Research For Manufacturers on Nov 15, 2018
Manufacturers often want to know what industry people think about trends and, in particular, the segments and product they offer.  ASIS and its...
Hikvision Silent on "Bad Architectural Practices" Cybersecurity Report on Nov 14, 2018
A 'significant vulnerability was found in Hikvision cameras' by VDOO, a startup cybersecurity specialist. Hikvision has fixed the specific...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Integrator Credit Card Alternative Divvy on Nov 13, 2018
Most security integrators are small businesses but large enough that they have various employees that need to be able to expense various charges as...
Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact