F. Physical Access Control

Section 5.12 and Appendix E introduced the area of Physical Access Control as part of Facilities Management. This section provides a more detailed discussion of this area.

Information Security Management is responsible for defining and documenting all access control policies. These polices will identify all physical security measures that need to be taken and which groups of employee should have access to what type of facility. Facilities Management will ensure that these policies are properly enforced. Policies should include:

Most organizations use multiple levels of access control, starting with access to the property, then moving to access to specific areas in the building and then to specific functions, equipment or rooms. Each level of security is enforced using different mechanisms and personnel, thus providing additional security.

All facilities should have a documented, current floor plan which indicates exactly which areas are restricted and which are not. This plan will also indicate which security measures are implemented and where. This will aid in security audits and also for the maintenance of access control equipment.

Access control devices need to be installed on all entrances and exits. The aim of these devices is to ensure that only authorized personnel have access to the restricted area. Although this appears at first glance to be a fairly straightforward subject, there are a number of items that need to be taken into account (See Table F.1).

Access controlExampleAdvantagesDisadvantages
MechanicalLock and keyStable and reliableRequires key control

Locks have to be replaced every time someone leaves the organization

Can easily be compromised by anyone with knowledge of a few simple techniques

Code access Mechanical (e.g. a pushbutton device mounted into the door) Electronic (e.g. a keypad used to arm or disarm a security alarm)Stable, Relatively inexpensiveSomeone observing personnel using the device can obtain the code easily

Code has to be changed every time someone leaves the organization

People tend to write the code down

Electronic accessKey cardsEasy to use

Can be used to track personnel's access

Can be cancelled or changed centrally to suit changed requirements

Can be cancelled even where staff do not return their card

Relatively expensive, although costs have decreased, and often cheaper than using human resources to physically guard each access point

Dependent on power availability Can be compromised by people using specialized copying equipment

BiometricRetinal scanner or Voice analysis Very reliable mechanism for identifying specific individuals

Difficult to forge access

More effective at countering social engineering

Dependent on the availability of power

Requires more sophisticated access control systems

Relatively expensive

Multiple accessDoor with a key card. One person opens the door and permits access to any number of people accompanying them.Easy to move from one place to another, especially where groups are working togetherDifficult to control 'Tailgating'

Dependent on the security awareness of authorized personnel

Extremely vulnerable to social engineering

Should not be used in highly secured areas

Single accessTurnstile permits only one person to enter. The same key card can not be used to enter a second person Easier to control access

Prevents social engineering more effectively

Could become a bottleneck at peak hours

Requires more intensive surveillance and staffing

Uni-directional accessRevolving door allowing only access or only exit. Typically used in airports where security personnel are only concerned about people entering the airport, but not about those exitingGood for situations where there is no need to monitor what people take out, but where things they take in could cause significant damage.Requires more monitoring to ensure that people do not attempt to go through the wrong direction.

Typically uni-directional; also implies additional scanning equipment and surveillance

Bi-directional accessAccess-controlled doorGood for general access to restricted areas. People exiting can provide access to unauthorized personnel moving in

Could be a bottleneck (e.g. in bi-directional turnstiles people going out have to wait for people coming in)

ActiveRequires action by personnel to gain access, e.q. swiping a key card or punching a code. Easier to control access

More secure

Requires personnel to remember a code or to bring a key card
PassivePassive detector unlocks an exit from inside whenever someone approaches. Provides safer exit in the event of a fire

Does not require key cards for people moving to non-secure areas.

Easy for unauthorized personnel to gain access simply by waiting outside the door

Can be triggered from the outside by inserting something under the door and moving it within range of the sensor

Table F.1 Access control devices

As most physical access control mechanisms are not foolproof, it is important to ensure that access can be monitored and controlled. This is done by specialized security staff and by electronic surveillance equipment.

Since security is all about managing the access of people to a facility, it is fitting that people are used to enforce security measures. Larger organizations sometimes provide their own security staff, but most tend to outsource physical access control to specialized companies. This is usually for the following reasons:

Surveillance equipment is used to extend the effectiveness of both the physical access control mechanisms and the security personnel. It is important to note that no surveillance equipment can replace the presence of a trained, aware security guard, merely extend their effectiveness. Examples of commonly used surveillance equipment include:

No matter how secure the environment, it is dependent on the security awareness of the employees and contractors who work in the facility. Social engineering is still one of the most common breaches of physical security. Social engineering refers to the practice of gaining entry to a facility by using interpersonal and communication skills to convince someone to allow unauthorized access to a building, restricted area, restricted equipment and data; or to cabinets containing confidential documents.

Examples of social engineering include:

Social engineering is best countered by enforcing strict compliance with access control procedures, continuing education programmes, regular briefings of security personnel and stringent audits.

A growing number of companies offer services to test the rigour of access control with people who specialize in using social engineering techniques.

[To top of Page]


Visit my web site