Are You Neglecting Key Control?

Author: Brian Rhodes, Published on Aug 07, 2012

End users spend thousands on advanced systems to keep themselves secure, but regularly neglect the one of the lest expensive yet most important aspects of all: Key Control. Administrating who carries keys and which doors they open seems simple, but most do not understand how vital it is to remaining secure. In this note, we examine the problem and give recommendations on how to optimize keying systems to guarantee buildings stay secure.

Loose Control of Keys

key ring

**** *** ** ******, ****** ****** *** ******** **** ***. It ***** ** ***** ** **** ******* **** ******'* ******* or ********, *** ******* ******* **** *** **** ** ****** them * **** ** * *** ** ** *** ****. However, ***** **** ******* ***** ****** ** ** ************ ***, significant *********** ** ******** ******** ******* *** ****** *** *** window. **** *** ***** **** ********** ** *** ******* **** controlling *** *** ***** ***, **** ******** *** ***** ****** a '**** *****' ** * '*** **** ** ***** **** things **** ****'.

**** ******** ***** ** **** *** *******. **** ***** ****** publicised ******** ************* ************* ********* ********** *** * **** *** *** *** **** ****** ******* reaction *** ******** ********* ** *****. ****** ** ********* *** control ****** *** ******** ********* ** ******** ******** ** ******* from **** ****. ******* ******* ***** *** ** ****, *** what ***** **** *** *** ****** **, ** ******** *********** in ********* **********.

EAC *** * **** ***

**** ********** ******** *** ****-*** ** ** '********** ****** *******' for *** ******* ** ************ ****, *** ****** ***** ******* are ********* ** *** *****, ********** **** *** ***** **** daily ** **** ****** ** ********* *****. **** **** * door ** '*********' ** **** *******, ** **** ****** ***** has * ********** *** **** ****** *** *** ** ****** independently ** **** ****** *******. ** ****** *** ***** *********** or ******** ****** ******* ******* ******* ** * ********, ***** key ******* ** *********** ** **** ********.

*** **** ******** ** ********** ***** ***** ****. **** ** every ******** ******* ** **** ****** ******* ********** ****** *******, typically ***** *** ******** *******, *******, ********, *** ***** **** still **** ** **** ** **** ********* ****** ****** *** secure.

Not ******** ********* *****

*** **** **********, *** ******* ** *** ******* ** *** a ********* ***; ** ****** ***** ********* **********. ** ***** facilities ** *************, *** ******* ****** (**********) ** * ************** of ******** ***********. *******, ** ***** *****, ** ***** ** facilities *********** ***** (******* **** *** *** ***** **** **** the ****), ** *** ****** ******* ...** *** ******** ...** the ************ ...*** ** **.

** *** *****, *** ******* ** ********** **** *** *********** party **** *** ***** ********** *** **********. ** *** ******* responsibilities *** ****** ** '**** ******* *** ** ****', **** expect **** ******* ** ******. ******* ************ *** ********** *** significance ** *** ******* ** *** *****, **** ******** ******* to ********.

Key ******** ** *** *******

** ***** ****, *** ******* ******* **** ***** ********:

  • *** **************: * *** ** *** ******* ***** **** *** ***** doors ***** **** ****/****
  • *** *******: * ******* ** ******** ** ******* **** (*** ******* doors) ** ******** ******** ****
  • ******* '*** ***' ******: * ****** ******* **** ********* *** **** *** ** be ******* **/******* *** *** **********, ******* ********* * ****** agreement ** ****** ********* *** ************* ** *** ******.

*** ******* **** *** *********** **** ********* ******** ** ** successful. **** ***** *** ******* *** ******* **** ******* **** than * ****** ***********. *******, * ****** ** '**********' ****** programs *****, **************,**********'* *******,******'* *********, **********'* ********** ***. *** ***** ***** ** * ********** **** ** ******* key ******* ********:

********* ***** ******** *****, ******* ** **** ************** ********* ** *******. ** **** *****, ******** ******** ********** features ****** *** *******: ********* **** ******* ***********, ****** *********/***** management ****, *** *********** ******** *******. **** ********** **** ******** new ******** ** ****** *** ******** **** ***'* ****, **** users ****** ****** ***** *** ************ *** ****** *** ****** from *****.

* **** ********

**** *** ***** **** *** ***** ** ********* *** ******* the **** ********* ****** ** ********. ***********, ** ****** *** out ** ******* * ****** *** ******, ***** *** * Steps ******** ** ****** **********:

1. *****, ** ********* * ****** ******: Very few buildings are constructed without some form of keying plan. At some level, planning has taken place to group doors so they can be opened with common keys. Key distribution is planned to so that certain people have access to areas relevant to their jobs, but unauthorized people are kept out. Unless firm central management of the keying system is present from the beginning, the particulars of this system are quickly forgotten. Often this happens because no individual or group is given responsibility to keep the system in order.

** * ******, ********** ** ********** * ****** '****** ******' is *** ***** ****. **** *** ******* *********** ********* ** locks *** ********** ** ****, *** ***** ** *** ***** way ** ****** **** ******* ** ********. ********* *** **** hardware *** **** **** ** * ********** ***** ***** ***** expensive, *** ** *** ******** ***** **** ** ******* **** on *****.

2. ********* ** ************ ****** ****: Every key that is cut, even if it is a exact copy of other keys, should be given a unique serial number. This permits traceability of specific keys to specific holders, and helps maintain an understanding of how long an issued key has been in service. When situations warrant reissuing new keys, serialization ensures that every previous issued key is accounted for.

"** *** *********":***** **** ****** ** * ****** ******** ** ****, ** should *** ** ******** ** ********* ***** ********** ******* ******* the ***. * *** ********** **** ************ ** ********** ******* ***************** ****** ******* ** ******.

duplicate

********** *******: **** **** ******** ******* ***** '**********' *** ********, ***** means *** ******** ******* ** *** *** *** ******* ************. The ******* ** **** ******* ** **** ******** ********* ********* cannot ** *** ** *** ***** *******. ***** **** ** make ** ************ *** **** ** * ******** ** ********** store ** * **** **** ** *** *******, *** ********** a ********** ****** ********* **** ****. *******, ******** * ********** keyway **** ******** ******** ***** ** ** ********* ** ***** door, *** *** ****** ** ********* ********.

restricted

3. **** *******: The final step is most important for ongoing success. ******* * ************ ***** *** **** ****** ** * ******** ****** ***** ensure **** '****** ********' *** ********** *** **********. **** *** does *** **** ** ** *******, *** ****** ****** ****** who **** ***** *** *** **** ***** **** *** *** access ** ****. **** *********** ** ****** *** ************** *** auditing, *** **** ******** * ***** ************* ** *** ** allowed ****** ** ******** ********* ** * ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Control Course Winter 2018 on Dec 07, 2017
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in...
ZKAccess Control Tested on Dec 04, 2017
China manufacturer ZKTeco / ZKAcces has been expanding in the West, offering a low-cost access control platform. But how good is it? And how does...
Hazardous & Explosion Proof Access Control Tutorial on Nov 27, 2017
Controlling access to hazardous environments require equipment meeting specific ratings that certify they will not start fires. Understanding those...
Top Maglock Provider Warns Against Using Maglocks on Nov 21, 2017
Do not buy my company's product. It sounds strange indeed, but a senior Allegion consultant stated that maglocks should not be used in common...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
Mobile Credentials (BLE / NFC / Apps) Guide on Nov 14, 2017
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. In this guide,...
Long Range Access Control Readers Tutorial on Nov 10, 2017
One of the classic challenges for access control are parking lots and garages, where the user's credential is far from the reader. With modern...
Selecting Access Control Readers Tutorial on Nov 09, 2017
Given the variety of types available, specifying access control readers can be a daunting process. However, focusing on a few key elements will...
Assa August Smartlock Pro Tested on Nov 07, 2017
Failures and set backs in the smartlock business have been commonplace (e.g., Lockitron Admits Failure and issues from our 2017 Kevo test). But...
Avigilon Access Control 2017 Examined on Nov 01, 2017
For more than 4 years, Avigilon has been in the access control business, since their May 2013 acquisition of RedCloud. Since then, Avigilon has...

Most Recent Industry Reports

Imperial Capital Security Investor Conference Review on Dec 08, 2017
Investment bank Imperial Capital holds an annual Security Investor Conference where 60+ companies present, including this year: IPVM bought a...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...
Hikvision NA Biggest Sale of 2017 on Dec 07, 2017
Hikvision North America has been relatively disciplined the past 5 months, reducing the number of sales and the breadth of what is on sale. No...
Security Integrator IT Expertise Statistics on Dec 07, 2017
20 years ago, putting physical security systems on IP networks was just emerging. Today, almost every system is networked in some way, IP cameras...
Lighthouse Deep Learning Camera Tested on Dec 07, 2017
A Silicon Valley startup, Lighthouse, with a Stanford PhD CTO, has released a deep learning AI camera with 3D sensors for just $300. The company...
Access Control Course Winter 2018 on Dec 07, 2017
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
'Catastrophic Problem' For Videofied App on Dec 06, 2017
Less than 2 months after closing their DIY division DragonFly, Videofied has been hit with a problem the company calls 'catastrophic'. Now the...
ASIS Dumps 'ASIS' For Show on Dec 06, 2017
After 60+ years, ASIS is dumping its eponymous show name and replacing it with 'GSX'. This is a classic marketing mistake. For a show struggling...
Risks Of Managing End User Passwords (Statistics) on Dec 05, 2017
Integrators know admin passwords for nearly all end-user systems, according to IPVM statistics. But how do they manage them? How do they ensure...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact