- The assignment and monitoring of key holders.
- The decision whether or not to hold master keys.
- The limitations and controls placed on the duplication of keys.
- The need for patented cylinder locks, depending on security requirements.
Category: Security & Privacy
-
Considerations for key control
-
Safes, Vaults and secured containers
- Vault security classifications are supplied by the underwriters laboratory
- The underwriters laboratory provides standards for the construction of vault doors, floors, walls and ceilings
- The weight of a safe contributes to its security classification.
-
Instakey and Intellikey
InstaKey
A key device that can be used to disable a using one turn of a master key to change a lock.
IntelliKey
A key device that contains a built-in microprocessor, microcomputer, and key-exchange data.
-
Characteristics of compartmentalized areas
- Contains sensitive data that, if lost, could cause serious harm to the organization or others.
- The access rights of personnel into the area are frequently verified.
-
Intrusion Detection Technology: Examples
- Acoustical detection: A bio-hazard laboratory is in a hermetically sealed area of a building.
- Motion detection: A large warehouse needs after hours protection.
- Electrostatic detection: A expensive painting on display needs protection.
- Electro-Mechanical detection: the door to a server room.
- Electro-Mechanical detection: detects breaks in electrical circuit.
- Passive Infrared: Detects fluctuations in energy and particle temperature within the protected area.
- Motion detection: A large warehouse needs after hours protection.
- Electrostatic detection: detects capacitance changes in a defined field.
-
Components of layered defense
- Mechanisms for preventing unauthorized access to rooms where sensitive data is stored.
- Bars on windows that represent possible building entry points.
- Surveillance devices for securing the perimeter of the organizations’s premisses.
- A security gate for restricting access to a suite of offices.
-
Securing a safe
- Create strong combinations for the safelock and change these frequently
- Install the safe in reinforced concrete
-
Secure HVAC systems
HVAC is short for „Heating, Ventilation and Air Conditioning“.
- Installing separate air conditioning for data centers.
- Maintain positive pressurization
Also, in the context of access control:
- Implementing access control for cable runs.
- Securing ventilation registers from unauthorized access.
-
Preventing Power Problems
- Install static controls.
- Use power line conditioners.
- Installing regulators to ensure clean power.
- Installing single-socket power line filter suppressant.
-
Disaster Response Roles
- Responsible for carrying out the recovery processes and tasks: Emergency Response Team
- Responsible for contaction the organization’s lawyer an/or legal team: Primary site restoration team
- Responsible for interfacing with the media: Company executives
- Responsible for setting the emergency plans into motion: Emergency management team