Are You Neglecting Key Control?

Author: Brian Rhodes, Published on Aug 07, 2012

End users spend thousands on advanced systems to keep themselves secure, but regularly neglect the one of the lest expensive yet most important aspects of all: Key Control. Administrating who carries keys and which doors they open seems simple, but most do not understand how vital it is to remaining secure. In this note, we examine the problem and give recommendations on how to optimize keying systems to guarantee buildings stay secure.

Loose Control of Keys

key ring

**** *** ** ******, ****** ****** *** ******** **** ***. It ***** ** ***** ** **** ******* **** ******'* ******* or ********, *** ******* ******* **** *** **** ** ****** them * **** ** * *** ** ** *** ****. However, ***** **** ******* ***** ****** ** ** ************ ***, significant *********** ** ******** ******** ******* *** ****** *** *** window. **** *** ***** **** ********** ** *** ******* **** controlling *** *** ***** ***, **** ******** *** ***** ****** a '**** *****' ** * '*** **** ** ***** **** things **** ****'.

**** ******** ***** ** **** *** *******. **** ***** ****** publicised ******** ************* ************* ********* ********** *** * **** *** *** *** **** ****** ******* reaction *** ******** ********* ** *****. ****** ** ********* *** control ****** *** ******** ********* ** ******** ******** ** ******* from **** ****. ******* ******* ***** *** ** ****, *** what ***** **** *** *** ****** **, ** ******** *********** in ********* **********.

EAC *** * **** ***

**** ********** ******** *** ****-*** ** ** '********** ****** *******' for *** ******* ** ************ ****, *** ****** ***** ******* are ********* ** *** *****, ********** **** *** ***** **** daily ** **** ****** ** ********* *****. **** **** * door ** '*********' ** **** *******, ** **** ****** ***** has * ********** *** **** ****** *** *** ** ****** independently ** **** ****** *******. ** ****** *** ***** *********** or ******** ****** ******* ******* ******* ** * ********, ***** key ******* ** *********** ** **** ********.

*** **** ******** ** ********** ***** ***** ****. **** ** every ******** ******* ** **** ****** ******* ********** ****** *******, typically ***** *** ******** *******, *******, ********, *** ***** **** still **** ** **** ** **** ********* ****** ****** *** secure.

Not ******** ********* *****

*** **** **********, *** ******* ** *** ******* ** *** a ********* ***; ** ****** ***** ********* **********. ** ***** facilities ** *************, *** ******* ****** (**********) ** * ************** of ******** ***********. *******, ** ***** *****, ** ***** ** facilities *********** ***** (******* **** *** *** ***** **** **** the ****), ** *** ****** ******* ...** *** ******** ...** the ************ ...*** ** **.

** *** *****, *** ******* ** ********** **** *** *********** party **** *** ***** ********** *** **********. ** *** ******* responsibilities *** ****** ** '**** ******* *** ** ****', **** expect **** ******* ** ******. ******* ************ *** ********** *** significance ** *** ******* ** *** *****, **** ******** ******* to ********.

Key ******** ** *** *******

** ***** ****, *** ******* ******* **** ***** ********:

  • *** **************: * *** ** *** ******* ***** **** *** ***** doors ***** **** ****/****
  • *** *******: * ******* ** ******** ** ******* **** (*** ******* doors) ** ******** ******** ****
  • ******* '*** ***' ******: * ****** ******* **** ********* *** **** *** ** be ******* **/******* *** *** **********, ******* ********* * ****** agreement ** ****** ********* *** ************* ** *** ******.

*** ******* **** *** *********** **** ********* ******** ** ** successful. **** ***** *** ******* *** ******* **** ******* **** than * ****** ***********. *******, * ****** ** '**********' ****** programs *****, **************,**********'* *******,******'* *********, **********'* ********** ***. *** ***** ***** ** * ********** **** ** ******* key ******* ********:

********* ***** ******** *****, ******* ** **** ************** ********* ** *******. ** **** *****, ******** ******** ********** features ****** *** *******: ********* **** ******* ***********, ****** *********/***** management ****, *** *********** ******** *******. **** ********** **** ******** new ******** ** ****** *** ******** **** ***'* ****, **** users ****** ****** ***** *** ************ *** ****** *** ****** from *****.

* **** ********

**** *** ***** **** *** ***** ** ********* *** ******* the **** ********* ****** ** ********. ***********, ** ****** *** out ** ******* * ****** *** ******, ***** *** * Steps ******** ** ****** **********:

1. *****, ** ********* * ****** ******: Very few buildings are constructed without some form of keying plan. At some level, planning has taken place to group doors so they can be opened with common keys. Key distribution is planned to so that certain people have access to areas relevant to their jobs, but unauthorized people are kept out. Unless firm central management of the keying system is present from the beginning, the particulars of this system are quickly forgotten. Often this happens because no individual or group is given responsibility to keep the system in order.

** * ******, ********** ** ********** * ****** '****** ******' is *** ***** ****. **** *** ******* *********** ********* ** locks *** ********** ** ****, *** ***** ** *** ***** way ** ****** **** ******* ** ********. ********* *** **** hardware *** **** **** ** * ********** ***** ***** ***** expensive, *** ** *** ******** ***** **** ** ******* **** on *****.

2. ********* ** ************ ****** ****: Every key that is cut, even if it is a exact copy of other keys, should be given a unique serial number. This permits traceability of specific keys to specific holders, and helps maintain an understanding of how long an issued key has been in service. When situations warrant reissuing new keys, serialization ensures that every previous issued key is accounted for.

"** *** *********":***** **** ****** ** * ****** ******** ** ****, ** should *** ** ******** ** ********* ***** ********** ******* ******* the ***. * *** ********** **** ************ ** ********** ******* ***************** ****** ******* ** ******.

duplicate

********** *******: **** **** ******** ******* ***** '**********' *** ********, ***** means *** ******** ******* ** *** *** *** ******* ************. The ******* ** **** ******* ** **** ******** ********* ********* cannot ** *** ** *** ***** *******. ***** **** ** make ** ************ *** **** ** * ******** ** ********** store ** * **** **** ** *** *******, *** ********** a ********** ****** ********* **** ****. *******, ******** * ********** keyway **** ******** ******** ***** ** ** ********* ** ***** door, *** *** ****** ** ********* ********.

restricted

3. **** *******: The final step is most important for ongoing success. ******* * ************ ***** *** **** ****** ** * ******** ****** ***** ensure **** '****** ********' *** ********** *** **********. **** *** does *** **** ** ** *******, *** ****** ****** ****** who **** ***** *** *** **** ***** **** *** *** access ** ****. **** *********** ** ****** *** ************** *** auditing, *** **** ******** * ***** ************* ** *** ** allowed ****** ** ******** ********* ** * ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

New Whole Foods Installs Hackable Access Control on Feb 21, 2018
Whole Foods has built a reputation for high quality. And their 2017 Amazon acquisition has increased that, plus added deep pockets for buying...
Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Door Closer Startup Lifedoor Aims To Prevent Fire Deaths on Jan 24, 2018
A startup named Lifedoor has a device with one basic function: Close doors during a fire. Closing doors is so powerful, UL and FDNY Fire Chiefs say...
PoE Powered Access Control Tutorial on Jan 19, 2018
Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
If You Have 4 Cameras, You Can Throw Them Away, If You Have 400, They Throw You Away on Jan 19, 2018
Do users care about anything but price? Do user care about cybersecurity? Do users care about trusting their supplier? These have become...
Access Control Course Winter 2018 on Jan 04, 2018
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in the...
2018 Access Control Book Released on Jan 02, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significantly updated for...
2018 Top Sales Interest For Integrators on Dec 20, 2017
130+ integrators answered: This is a key question, especially for manufacturers, as it impacts what areas to focus more on and what...
Lock Status Monitoring Tutorial on Dec 18, 2017
Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they...

Most Recent Industry Reports

Visio For Video Surveillance Design on Feb 20, 2018
Many integrators have standardized on AutoCAD for camera layouts but new users may be overwhelmed by its learning curve. Microsoft's Visio...
Health Care Insurance Integrator Benefits Statistics on Feb 20, 2018
How common and how much healthcare coverage is typically provided by security companies? 150+ integrators explained how their companies provide the...
Hikvision Deletes Genetec Support on Feb 20, 2018
There will be no peace between Hikvision and Genetec. A year after Genetec expelled Hikvision (and Huawei, citing Chinese government control...
Change Orders - Sometimes Necessary, Sometimes Unethical on Feb 19, 2018
Change orders are a common element in project sales. Sometimes they are a necessity and appropriate ways to deal with arising issues, but sometimes...
Bosch Merges Video, Intrusion and Access Businesses on Feb 19, 2018
Bosch is merging their "video systems, intrusion detection, as well as its access control and management software business units to form a single...
Why 3VR Failed on Feb 16, 2018
3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
"Fear Mongering": Hikvision USA Cybersecurity Director Dismisses Chinese Government Ownership Concerns on Feb 16, 2018
The facts are: The Chinese government created Hikvision and is Hikvision's controlling shareholder. Hikvision's Chairman, a Communist Party...
16:9 vs 4:3 Video Aspect Ratio Statistics on Feb 16, 2018
What aspect ratio do security integrators prefer? The 'standard' 4:3 or the 'wide' 16:9 one? 100+ integrators told us what they preferred, with...
Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Last Chance February 2018 Camera Course on Feb 15, 2018
This is the last chance to get into the Winter camera course, starts next Tuesday. Register now. IPVM provides the best education, live online...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact