Are You Neglecting Key Control?

Author: Brian Rhodes, Published on Aug 07, 2012

End users spend thousands on advanced systems to keep themselves secure, but regularly neglect the one of the lest expensive yet most important aspects of all: Key Control. Administrating who carries keys and which doors they open seems simple, but most do not understand how vital it is to remaining secure. In this note, we examine the problem and give recommendations on how to optimize keying systems to guarantee buildings stay secure.

Loose Control of Keys

key ring

**** *** ** ******, ****** ****** *** ******** **** ***. It ***** ** ***** ** **** ******* **** ******'* ******* or ********, *** ******* ******* **** *** **** ** ****** them * **** ** * *** ** ** *** ****. However, ***** **** ******* ***** ****** ** ** ************ ***, significant *********** ** ******** ******** ******* *** ****** *** *** window. **** *** ***** **** ********** ** *** ******* **** controlling *** *** ***** ***, **** ******** *** ***** ****** a '**** *****' ** * '*** **** ** ***** **** things **** ****'.

**** ******** ***** ** **** *** *******. **** ***** ****** publicised ******** ************* ************* ********* ********** *** * **** *** *** *** **** ****** ******* reaction *** ******** ********* ** *****. ****** ** ********* *** control ****** *** ******** ********* ** ******** ******** ** ******* from **** ****. ******* ******* ***** *** ** ****, *** what ***** **** *** *** ****** **, ** ******** *********** in ********* **********.

EAC *** * **** ***

**** ********** ******** *** ****-*** ** ** '********** ****** *******' for *** ******* ** ************ ****, *** ****** ***** ******* are ********* ** *** *****, ********** **** *** ***** **** daily ** **** ****** ** ********* *****. **** **** * door ** '*********' ** **** *******, ** **** ****** ***** has * ********** *** **** ****** *** *** ** ****** independently ** **** ****** *******. ** ****** *** ***** *********** or ******** ****** ******* ******* ******* ** * ********, ***** key ******* ** *********** ** **** ********.

*** **** ******** ** ********** ***** ***** ****. **** ** every ******** ******* ** **** ****** ******* ********** ****** *******, typically ***** *** ******** *******, *******, ********, *** ***** **** still **** ** **** ** **** ********* ****** ****** *** secure.

Not ******** ********* *****

*** **** **********, *** ******* ** *** ******* ** *** a ********* ***; ** ****** ***** ********* **********. ** ***** facilities ** *************, *** ******* ****** (**********) ** * ************** of ******** ***********. *******, ** ***** *****, ** ***** ** facilities *********** ***** (******* **** *** *** ***** **** **** the ****), ** *** ****** ******* ...** *** ******** ...** the ************ ...*** ** **.

** *** *****, *** ******* ** ********** **** *** *********** party **** *** ***** ********** *** **********. ** *** ******* responsibilities *** ****** ** '**** ******* *** ** ****', **** expect **** ******* ** ******. ******* ************ *** ********** *** significance ** *** ******* ** *** *****, **** ******** ******* to ********.

Key ******** ** *** *******

** ***** ****, *** ******* ******* **** ***** ********:

  • *** **************: * *** ** *** ******* ***** **** *** ***** doors ***** **** ****/****
  • *** *******: * ******* ** ******** ** ******* **** (*** ******* doors) ** ******** ******** ****
  • ******* '*** ***' ******: * ****** ******* **** ********* *** **** *** ** be ******* **/******* *** *** **********, ******* ********* * ****** agreement ** ****** ********* *** ************* ** *** ******.

*** ******* **** *** *********** **** ********* ******** ** ** successful. **** ***** *** ******* *** ******* **** ******* **** than * ****** ***********. *******, * ****** ** '**********' ****** programs *****, **************,**********'* *******,******'* *********, **********'* ********** ***. *** ***** ***** ** * ********** **** ** ******* key ******* ********:

********* ***** ******** *****, ******* ** **** ************** ********* ** *******. ** **** *****, ******** ******** ********** features ****** *** *******: ********* **** ******* ***********, ****** *********/***** management ****, *** *********** ******** *******. **** ********** **** ******** new ******** ** ****** *** ******** **** ***'* ****, **** users ****** ****** ***** *** ************ *** ****** *** ****** from *****.

* **** ********

**** *** ***** **** *** ***** ** ********* *** ******* the **** ********* ****** ** ********. ***********, ** ****** *** out ** ******* * ****** *** ******, ***** *** * Steps ******** ** ****** **********:

1. *****, ** ********* * ****** ******: Very few buildings are constructed without some form of keying plan. At some level, planning has taken place to group doors so they can be opened with common keys. Key distribution is planned to so that certain people have access to areas relevant to their jobs, but unauthorized people are kept out. Unless firm central management of the keying system is present from the beginning, the particulars of this system are quickly forgotten. Often this happens because no individual or group is given responsibility to keep the system in order.

** * ******, ********** ** ********** * ****** '****** ******' is *** ***** ****. **** *** ******* *********** ********* ** locks *** ********** ** ****, *** ***** ** *** ***** way ** ****** **** ******* ** ********. ********* *** **** hardware *** **** **** ** * ********** ***** ***** ***** expensive, *** ** *** ******** ***** **** ** ******* **** on *****.

2. ********* ** ************ ****** ****: Every key that is cut, even if it is a exact copy of other keys, should be given a unique serial number. This permits traceability of specific keys to specific holders, and helps maintain an understanding of how long an issued key has been in service. When situations warrant reissuing new keys, serialization ensures that every previous issued key is accounted for.

"** *** *********":***** **** ****** ** * ****** ******** ** ****, ** should *** ** ******** ** ********* ***** ********** ******* ******* the ***. * *** ********** **** ************ ** ********** ******* ***************** ****** ******* ** ******.

duplicate

********** *******: **** **** ******** ******* ***** '**********' *** ********, ***** means *** ******** ******* ** *** *** *** ******* ************. The ******* ** **** ******* ** **** ******** ********* ********* cannot ** *** ** *** ***** *******. ***** **** ** make ** ************ *** **** ** * ******** ** ********** store ** * **** **** ** *** *******, *** ********** a ********** ****** ********* **** ****. *******, ******** * ********** keyway **** ******** ******** ***** ** ** ********* ** ***** door, *** *** ****** ** ********* ********.

restricted

3. **** *******: The final step is most important for ongoing success. ******* * ************ ***** *** **** ****** ** * ******** ****** ***** ensure **** '****** ********' *** ********** *** **********. **** *** does *** **** ** ** *******, *** ****** ****** ****** who **** ***** *** *** **** ***** **** *** *** access ** ****. **** *********** ** ****** *** ************** *** auditing, *** **** ******** * ***** ************* ** *** ** allowed ****** ** ******** ********* ** * ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Glass Doors and Access Control Tutorial on Feb 22, 2017
The biggest challenge for many access control systems are glass doors. Here's what happens when a maglock is improperly installed to an existing...
Customized Access Control Cans (Altronix Trove) on Feb 14, 2017
Access control installs typically require hanging at least two or three different enclosure cans, each holding individual parts.  Open wall space...
Lenel Favorability Results 2017 on Feb 09, 2017
At this point, it is not surprising that Lenel is one of the most disliked security manufacturers. From stories like Lenel Partners Angry, Lenel...
VPNs for Video Surveillance on Feb 07, 2017
Remote access in surveillance networks is a key cyber security and usability issue. With cyber attacks rising, how can users ensure their systems...
Boycott Anixter, Says 82% Integrators on Feb 05, 2017
82% of 130 145 integrator respondents say integrators should boycott Anixter, in response to Anixter / Bosch Sells Direct to Amazon. This is the...
Scathing Honeywell Favorability Results on Jan 24, 2017
Honeywell is one of the biggest brands in security, with offerings for intrusion, fire, wire, video surveillance, access control, plus they own one...
Paxton Hosted Access - Disruptive Low Dealer Pricing on Jan 19, 2017
Paxton is entering the hosted access game, with BLU, at a cost that is a fraction of key competitors. The different approach could be very...
Anixter / Bosch Sells Direct to Amazon on Jan 18, 2017
Anixter regularly says they do not sell direct to end users or that they do not do it anymore. However, over the past year, Anixter has sold Bosch...
Cut in Half, Everfocus Shifts Strategies on Jan 17, 2017
The race to the bottom impact continues. Now, Everfocus, who used to be one of the larger budget providers, is shifting strategies after years of...
Genetec Favorability Results on Jan 16, 2017
In the race to the bottom and flight to 'solutions', Genetec has taken a contrary path. The company remains independent, focusing up market,...

Most Recent Industry Reports

Artificial Intelligence Robot Assistant (ACTi) on Feb 23, 2017
Has artificial intelligence come to the video surveillance industry? ACTi has released 'SARA' which it bills as an 'AI assistant that brings...
Cutting Costs 70% Using Milestone With HD Analog on Feb 23, 2017
HD analog and enterprise VMSes are often thought of as being on opposite sides of the spectrum, with HD analog best for small jobs due to its low...
Dahua 4K HD Analog Cameras Announced on Feb 23, 2017
HD analog has been gaining popularity (even if Axis hopes otherwise). Last year, HD analog's max resolution doubled from 1080p to 4MP (see our 4MP...
Uniview (UNV) IP Cameras Tested on Feb 22, 2017
"We're #3," in China says Uniview (UNV). While the company significantly trails Hikvision and Dahua in total sales, one notable difference is that...
Glass Doors and Access Control Tutorial on Feb 22, 2017
The biggest challenge for many access control systems are glass doors. Here's what happens when a maglock is improperly installed to an existing...
Exacq Favorability Results on Feb 22, 2017
For years, Exacq has been one of the most frequently favored VMSes in IPVM integrator statistics (e.g., see Favorite VMS Manufacturers...
The Hot RMR Company - Electric Guard Dog on Feb 22, 2017
The financiers at the Barnes Buchanan conference praised a company named 'Electric Guard Dog'. While the name sounds fairly low tech, the money and...
Hikvision Leads Multi-Manufacturer Sales Promo on Feb 21, 2017
Earlier this month, Hikvision launched new 'super value' kits, with 40% discounts, and now Hikvision is offering another promo, but this time they...
Washington DC MPD's Surveillance Equipment on Feb 21, 2017
The Washington DC Metropolitan Police Department's surveillance system was hacked in January 2017. Two immediate questions were: Whose...
Hikvision Ezviz Mini 360 Plus - $80 Autotracking Camera Tested on Feb 21, 2017
Autotracking, integrated IR, local storage, full HD, cloud access: $80. That is the claim of Hikvision EZVIZ's new Mini 360 Plus. But for this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact