• Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

Phone:985-875-0119

Consultants@sds-web.net
Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC

Protect your business from loss and liability!
SERVING CLIENTS SINCE 1998

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

Access Control

Home Uncategorized Access Control

Access Control

Oct 17, 2017 | Posted by Michael Khairallah | Uncategorized |

Who, goes where, when … that is access control in a nutshell.  In this post we will discuss why we need access control, some of the variations in how it is applied and some suggested techniques on applying these systems.

 

Why Do We Need Access Control

All security systems start with a controlled perimeter.  As you learned in our earlier post on secure perimeters this means you have a contiguous set of walls that isolate and protect your assets and keep out  the bad guys.  But the problem with a controlled perimeter is that you have to provide openings so legitimate use of assets can occur.  So the dilemma is that you must provide access to something that is best protected when there is no access, thus the need for access control.

 

The most effective means of access control is to station security personnel at every door to the protected assets, provide them with information on all authorized personnel and require that everyone entering be screen by security.  Obviously this is very expensive and only used in the most critical security circumstances.  In more modest situations like a commercial business environment we can use access control devices that identify authorized personnel and allow only those individuals access to the protected space.

 

Access Control Devices

Access control devices have two basic components, a locking device and an identification device.  The locking device is usually an electric strike or latch, power magnet, electric panic hardware or other door locking device.  The lock is matched to the door based on the door and frame configuration, existing mechanical lock cutouts, egress requirements and other door characteristics.

 

Access control identification devices also come in a variety of configuration to match the application requirement.  The method of identification can be something the user knows, such as a code or something they posses like an identification card or something unique to the individual like a fingerprint, palm print or eye characteristic.  The least secure of these is the known code since it can be shared without control and easily acquired by unauthorized personnel through modest clandestine means. The most secure is biometric since it is unique to each person.  But biometrics are generally more expensive and more difficult to implement and maintain.  The decision on which type of access control device to use is not simple and requires a comprehensive view of all security needs in an organization with your security consultant.

 

Some Application Methods

There are cases where multiple access control methods are used in the same facility.  For example, research labs with controlled substances might have a vehicle radio frequency tag for entry to a parking lot to restrict the general public from their property and at the same time add a keypad to the same openings and give out the code number to visitors.  This code could be changed weekly so only chosen people will have access.

 

This same facility might have proximity card readers to enter the building and control movement throughout the facility.  Not all cards would work at all doors, cards would be authorized only for areas where the individual cardholder worked.  In some situations there may be more than one card reader on a door, one might be proximity for the employees and the other a magnetic stripe or bar code reader that reads paper cards for visitors.  Visitors would be assigned these paper cards for unescorted movement through the building and each card would have an “access path” allowing them to go only through those doors necessary for their destination.  Visitor cards would expire at the end of the day and could be thrown away.  Then once deep inside the facility a biometric device would be employed to control access to the select agents or substances.+

 

The most perplexing problem in building access control is “tailgating”, that is when an unauthorized person follows an authorized person through a controlled door.  There are ways to inhibit this movement but the discussion is too long for this post.  The most cost effective means of preventing tailgating is employee training.  Make sure the staff understands the problems tailgaters can create and establish a policy that no one is to be admitted without proper authorization.

 

System Management

The final thought on this topic is system management.  An access control system operates in an active environment, that is you can’t “set it and forget it” like a burglar alarm system.  Authorization levels change, people loose cards and new people are added.  If you allow the system to automatically lock and unlock certain doors during the business day, schedules change, special events occur, there are always changes.  An individual (with at least 1, preferably 2 backups) should become intimately familiar with the system and be the hub of all requests for changes and maintenance.  That person may have clerical support for keyboard work but they must know what the system is doing at all times.

0
Share

About Michael Khairallah

Michael is a physical security systems consultant providing services to clients throughout the United States. Michael entered the security industry in 1980 as a Manufacturer’s Representative for Cardkey Systems then founded Card Access Systems where he served as President and CEO for 17 years. He became an Independent Physical Security Systems Consultant in 1998 and provides all the elements of risk assessment and mitigation for his clients.

Find us on Facebook

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
Contact SDS for your assessment today Contact

Contact SDS for your system implementation today.

Louisiana Security Consultant LA-Consultants@sds-web.net
U.S. Security Consultant US-Consultants@sds-web.net
International Security Consultant International-Consultants@sds-web.net

Telephone 985-875-0119

© 2025 · Security Design Solutions LLC

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map
Prev Next