S 2.17 Entry regulations and controls

Initiation responsibility: Head of Organisation, Building Services Manager

Implementation responsibility: Building Services Manager, Employee, Planner

Entry into parts of buildings and rooms requiring protection must be controlled (see S 2.6 Granting of site access authorisations). The pertinent safeguards range from the simple issue of keys through to complicated identification systems including one-by-one checks of persons; in this respect, use of a physical key with lock also constitutes a form of entry control. For entry regulation and control, it is necessary that:

The mere allocation of permissions will not be sufficient if their observance, or infringement, is not monitored. The detailed design of control mechanisms should be based on the principle that simple and practicable solutions are often just as effective as elaborate technology. Examples of this include:

Various building-related, organisational and personnel-related safeguards are required in connection with access control. Their interaction should be controlled in an access control concept which specifies the general guidelines for protection of the perimeter, building and equipment. This includes the following safeguards:

In addition, the installation of various qualities of badge reader, of walk-through detectors and one-by-one checking facilities may be expedient. For key management, see S 2.14 Key Management.

The use of an IT-supported system for authorisation management is recommended to realise a more comprehensive concept, to maintain flexibility during use, and to ensure transparency and verifiability (see S 1.80 Access control system and authorisation management).

The terminals used for access control must be protected against tampering. They must be arranged so that confidentiality is maintained during data entry. Moreover, all the units that are necessary for data entry should be combined in one device, for example, a keypad for entry of a PIN.

If all the units are not in a single device, data transmission between these devices must be encrypted. If, for example, contactless ID card readers are used, the transmission of data between card and reader must be encrypted.

Effectiveness of all technical and organisational safeguards must be checked continuously during operation. It is recommended to perform regular checks especially with the known problematic sites regarding any possibilities to by-pass access control, e.g. in delivery or smoker zones.

Review questions: