Are You Neglecting Key Control?

Author: Brian Rhodes, Published on Aug 07, 2012

End users spend thousands on advanced systems to keep themselves secure, but regularly neglect the one of the lest expensive yet most important aspects of all: Key Control. Administrating who carries keys and which doors they open seems simple, but most do not understand how vital it is to remaining secure. In this note, we examine the problem and give recommendations on how to optimize keying systems to guarantee buildings stay secure.

Loose Control of Keys

key ring

**** *** ** ******, ****** ****** *** ******** **** ***. It ***** ** ***** ** **** ******* **** ******'* ******* or ********, *** ******* ******* **** *** **** ** ****** them * **** ** * *** ** ** *** ****. However, ***** **** ******* ***** ****** ** ** ************ ***, significant *********** ** ******** ******** ******* *** ****** *** *** window. **** *** ***** **** ********** ** *** ******* **** controlling *** *** ***** ***, **** ******** *** ***** ****** a '**** *****' ** * '*** **** ** ***** **** things **** ****'.

**** ******** ***** ** **** *** *******. **** ***** ****** publicised ******** ************* ************* ********* ********** *** * **** *** *** *** **** ****** ******* reaction *** ******** ********* ** *****. ****** ** ********* *** control ****** *** ******** ********* ** ******** ******** ** ******* from **** ****. ******* ******* ***** *** ** ****, *** what ***** **** *** *** ****** **, ** ******** *********** in ********* **********.

EAC *** * **** ***

**** ********** ******** *** ****-*** ** ** '********** ****** *******' for *** ******* ** ************ ****, *** ****** ***** ******* are ********* ** *** *****, ********** **** *** ***** **** daily ** **** ****** ** ********* *****. **** **** * door ** '*********' ** **** *******, ** **** ****** ***** has * ********** *** **** ****** *** *** ** ****** independently ** **** ****** *******. ** ****** *** ***** *********** or ******** ****** ******* ******* ******* ** * ********, ***** key ******* ** *********** ** **** ********.

*** **** ******** ** ********** ***** ***** ****. **** ** every ******** ******* ** **** ****** ******* ********** ****** *******, typically ***** *** ******** *******, *******, ********, *** ***** **** still **** ** **** ** **** ********* ****** ****** *** secure.

Not ******** ********* *****

*** **** **********, *** ******* ** *** ******* ** *** a ********* ***; ** ****** ***** ********* **********. ** ***** facilities ** *************, *** ******* ****** (**********) ** * ************** of ******** ***********. *******, ** ***** *****, ** ***** ** facilities *********** ***** (******* **** *** *** ***** **** **** the ****), ** *** ****** ******* ...** *** ******** ...** the ************ ...*** ** **.

** *** *****, *** ******* ** ********** **** *** *********** party **** *** ***** ********** *** **********. ** *** ******* responsibilities *** ****** ** '**** ******* *** ** ****', **** expect **** ******* ** ******. ******* ************ *** ********** *** significance ** *** ******* ** *** *****, **** ******** ******* to ********.

Key ******** ** *** *******

** ***** ****, *** ******* ******* **** ***** ********:

  • *** **************: * *** ** *** ******* ***** **** *** ***** doors ***** **** ****/****
  • *** *******: * ******* ** ******** ** ******* **** (*** ******* doors) ** ******** ******** ****
  • ******* '*** ***' ******: * ****** ******* **** ********* *** **** *** ** be ******* **/******* *** *** **********, ******* ********* * ****** agreement ** ****** ********* *** ************* ** *** ******.

*** ******* **** *** *********** **** ********* ******** ** ** successful. **** ***** *** ******* *** ******* **** ******* **** than * ****** ***********. *******, * ****** ** '**********' ****** programs *****, **************,**********'* *******,******'* *********, **********'* ********** ***. *** ***** ***** ** * ********** **** ** ******* key ******* ********:

********* ***** ******** *****, ******* ** **** ************** ********* ** *******. ** **** *****, ******** ******** ********** features ****** *** *******: ********* **** ******* ***********, ****** *********/***** management ****, *** *********** ******** *******. **** ********** **** ******** new ******** ** ****** *** ******** **** ***'* ****, **** users ****** ****** ***** *** ************ *** ****** *** ****** from *****.

* **** ********

**** *** ***** **** *** ***** ** ********* *** ******* the **** ********* ****** ** ********. ***********, ** ****** *** out ** ******* * ****** *** ******, ***** *** * Steps ******** ** ****** **********:

1. *****, ** ********* * ****** ******: Very few buildings are constructed without some form of keying plan. At some level, planning has taken place to group doors so they can be opened with common keys. Key distribution is planned to so that certain people have access to areas relevant to their jobs, but unauthorized people are kept out. Unless firm central management of the keying system is present from the beginning, the particulars of this system are quickly forgotten. Often this happens because no individual or group is given responsibility to keep the system in order.

** * ******, ********** ** ********** * ****** '****** ******' is *** ***** ****. **** *** ******* *********** ********* ** locks *** ********** ** ****, *** ***** ** *** ***** way ** ****** **** ******* ** ********. ********* *** **** hardware *** **** **** ** * ********** ***** ***** ***** expensive, *** ** *** ******** ***** **** ** ******* **** on *****.

2. ********* ** ************ ****** ****: Every key that is cut, even if it is a exact copy of other keys, should be given a unique serial number. This permits traceability of specific keys to specific holders, and helps maintain an understanding of how long an issued key has been in service. When situations warrant reissuing new keys, serialization ensures that every previous issued key is accounted for.

"** *** *********":***** **** ****** ** * ****** ******** ** ****, ** should *** ** ******** ** ********* ***** ********** ******* ******* the ***. * *** ********** **** ************ ** ********** ******* ***************** ****** ******* ** ******.

duplicate

********** *******: **** **** ******** ******* ***** '**********' *** ********, ***** means *** ******** ******* ** *** *** *** ******* ************. The ******* ** **** ******* ** **** ******** ********* ********* cannot ** *** ** *** ***** *******. ***** **** ** make ** ************ *** **** ** * ******** ** ********** store ** * **** **** ** *** *******, *** ********** a ********** ****** ********* **** ****. *******, ******** * ********** keyway **** ******** ******** ***** ** ** ********* ** ***** door, *** *** ****** ** ********* ********.

restricted

3. **** *******: The final step is most important for ongoing success. ******* * ************ ***** *** **** ****** ** * ******** ****** ***** ensure **** '****** ********' *** ********** *** **********. **** *** does *** **** ** ** *******, *** ****** ****** ****** who **** ***** *** *** **** ***** **** *** *** access ** ****. **** *********** ** ****** *** ************** *** auditing, *** **** ******** * ***** ************* ** *** ** allowed ****** ** ******** ********* ** * ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Lenel President Is Out on Apr 20, 2017
Lenel's challenges continue. Now, Lenel's President is out, suddenly. This follows increasing challenges for the company who has broadly upset...
Access Control Course Spring 2017 on Apr 14, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Bosch B-Series Intrusion Tested on Apr 10, 2017
Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
Milestone / Lenel Resell Partnership on Apr 03, 2017
Lenel has never found success in video management. Nearly a decade ago Lenel OEMed an OEM of Milestone. Now, in an equally uncommon move,...
ConvergenceTP (CTP) Claims VMS Integrations Simplified on Mar 30, 2017
Developing integrations with 3rd party systems can be expensive and time consuming, especially in the physical security market with hundreds of...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Anixter Favorability Results on Mar 28, 2017
Anixter's direct sales and integrator anger about it has been in the news recently: Anixter / Bosch Sells Direct to Amazon Anixter Touts...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Unikey Smart Phone Access Control Platform Profile on Mar 21, 2017
More and more people carry smart phones. Many think this could replace the conventional key or card for access control. However, using a phone...

Most Recent Industry Reports

IP Networking Course May 2017 on Apr 26, 2017
NOTE: Registration ends tomorrow, Thursday the 27th. This is the only networking course designed specifically for video surveillance professionals...
Tri-Ed Favorability Results on Apr 25, 2017
Tri-Ed, owned by Anixter, far outranked Anixter, the lowest ranked company in our distributor favorability series. Still, Anixter's ownership did...
Chinese 'Attacking Us From Every Direction', Says US FBI on Apr 25, 2017
"Chinese eating our lunch. Attacking us from every direction" said the US FBI's Deputy Director Andrew McCabe at the ASIS 2017 CSO Summit. .@FBI...
Eagle Eye Exec On Mountain Of Servers - VSaaS Growth Analysis on Apr 25, 2017
Eagle Eye VP of Operations, Hans Kahler, posted a picture of himself sitting on top of a shipment of new servers, as a testament to the companies...
Axis Posts Strong Q1 2017 Financial Results on Apr 24, 2017
Axis posted strong numbers for Q1 2017, after having some challenges in 2016 (Q1 2016, Q3 2016). Inventory levels and overall spending show...
Axis Lowest Cost Outdoor IR Camera M2025-LE Tested on Apr 24, 2017
Axis has lagged offering low cost IR cameras while their Asian competitors have made IR standard even in their most entry level cameras. Recently,...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Splicing Alarm Circuits Guide on Apr 24, 2017
Alarm installers commonly connect multiple sensors to a single zone. They do this by splicing the wires together. In this report, we will explain...
PureTech Video Analytics Examined on Apr 21, 2017
PureTech's analytics were chosen for a US border protection system (see related post), which the company claims no other analytics vendor was able...
US Border RVSS / Video Analytics System Examined on Apr 21, 2017
US Customs and Border Protection has been rolling out a video analytics-based detection system along the US/Mexico border, with detection ranges...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact