Ultimate Guide to Access Control 4.4
Ultimate Guide to Access Control 4.4
To secure facilities, organizations deploy electronic access control systems that incorporate user credentials, access
control readers, auditing and reports to manage and track access to restricted locations. They may also deploy alarms and
lockdown capabilities to prevent unauthorized access or control operations in restricted areas.
Electronic access control has replaced traditional lock and key systems as a more secure and convenient method of
controlling access, overcoming the problems of lost or stolen keys, retooling locks and the inability to view access activity.
Another subset of access controls– information security– can include ways to limit who has access to computer systems
or networks. Also known as cybersecurity access control, these types of methods are used both on the premises and
in cloud-based platforms to help ensure data and information remain protected. When combined with physical security
methods, it’s often referred to as security convergence, a growing trend in the security industry.
2
Why access
control security
is important
In short, replacing traditional locks and keys with electronic
security and access control strengthens security. Traditional
locks have many drawbacks, including management
challenges, lack of audit trails and the fact that metal keys
are easily lost, stolen and copied.
3
How access control Access is granted or denied based on
the user’s security clearance level. This
security works category is used to protect highly secure
A user authorized to enter a building or secure areas.
area presents credentials to an access control • Attribute-based access control (ABAC):
reader positioned at the entrance or door. This approach provides access to users
The reader transmits the credentials’ data to based on who they are rather than what
software, validating the credentials against a they do. Access permissions can be based
database of authorized users. on the user’s type, location, department
and duties, mirroring the organizational
If the credentials are valid, the software
structure of the business.
initiates a door release signal, granting access.
If the credentials are invalid or the user does • Role-based access control (RBAC): Access
not have the necessary permissions, the door is based on defined business functions
will remain locked. rather than the individual user’s identity. The
aim is to provide users with access only to
Access control panels or controller boards are areas that are deemed necessary for their
the backbone of access control systems. They roles within the organization.
determine the basic functions of the system,
• Rule-based access control: An
including the entry decisions. The system also
administrator defines rules that govern
records and retains all access requests for
access to an area. These rules may be
analysis, audit or evidence.
based on conditions, such as time of day
In the case of visitors requesting security and location.
access, they will either need temporary
credentials, such as a visitor badge or digital
guest pass. If the occupant or front desk
has the ability to operate the access control
mechanism, either via a button or app, they
can issue a door release signal to grant
access.
What is an access
control policy?
To impose the right level of security and
access at entrances to restricted areas,
security professionals or property managers
must enforce access control policies. These
fall into five main categories:
4
Authentication Authorization Access Manage Audit
Access control functions The data from door access control helps security
professionals monitor the performance of the systems
Access security has five main functions: through reports such as:
• Authorization: The access control system administrator • Door activity history recording who opened a specific
specifies individual users’ access rights to areas or door and at what time.
resources. For example, employees are authorized to
enter a building but only permitted to enter restricted • Invalid access attempts where users attempt to use
areas relevant to their grade or job function. their credentials at an unauthorized access point.
• Authentication: The system or an individual validates • Door openings, door forced open or door left open
an entry request, such as the identity of a person or the too long.
credentials they present. For example, a resident checks
a video image of a visitor before granting access or Access security configuration
the system validates credentials against a database of
System administrators use the information from the
authorized users.
authorization process to configure access levels for users
• Access: When the system has authenticated a request, and access locations. They rank locations based on the
it grants access by opening a locked door. level of security and authority required to gain access.
• Management: Security administrators manage the They can then configure the credentials issued to individual
access control database by adding or removing users.
authorized users so that the access control devices only
Access control software can also configure user credentials
validate requests based on current information.
to automatically expire by specific dates, like the completion
• Audit and review: Regular reviews and audits minimize of a project or the date when a resident leaves their tenancy.
the risk of users retaining access rights they no longer The software can also configure temporary credentials for a
require. Audits also provide essential records for one-time event, where attendees will only require access for
compliance. emergency maintenance or a vendor visit.
Reporting is also an important function. Each time a user
Building owners may wish to restrict general access to a
requests access, the system generates data that provides
building at certain times, such as evenings or weekends.
important management information. The system records
Software can configure all credentials to be invalid at those
all access requests with details of location, user identity
times. It’s also important to put emergency measures in
and type of credential used. Notifications also provide
place so that access control systems can automatically
insight into potential security issues, such as tailgating,
operate in lockdown mode in the event of a fire or other
doors left open or access requests from unidentified users.
emergency.
5
Security access locations
Security access control examples are found in many
internal and external areas of a building or campus that
need to be secured and controlled. Here are a few examples
of common areas for access control security to be installed:
6
Access control components
Door access control systems have a number of basic components, each with its own importance for
a fully functioning system. It’s important to understand how access control components influence
the convenience and security of the system in order to deploy a solution that fits your needs.
7
Door readers • Smart door lock readers: These readers are
designed to operate with different types of
Door readers can be installed inside and credentials. They can also be programmed
outside of the building to provide security for two-factor authentication using a
for areas with different levels of vulnerability. combination of credentials to increase
There are different types of security door security levels.
readers for use with corresponding credentials.
They include: • Video door readers: Video door readers
have a camera embedded into the access
• Keypad readers: Users key in a general or control device, giving security teams visual
unique PIN using the keypad. Although this evidence of identity and any security issues.
type of reader is simple and convenient • Intercom readers: This type of access
to use, PINs can be shared, guessed or control device combines reader technology
used by intruders with stolen credentials, with two-way audio and is commonly used
especially when buttons wear over time. on front doors to help verify visitors prior to
Capacitive touch keypads and longer-digit granting entry.
unique PINs help combat these challenges.
• Key card swipe readers: Users swipe their Controllers and access
key cards through the reader. Although
these readers are secure, they may require control boards
frequent maintenance if they are used in These are the “brains” of the access control
areas of heavy traffic. system, linking the door reader and the user
• RFID key card or key fob readers: This type database. These units are usually installed
of contactless reader is more suitable for behind restricted doors, as they contain vital
heavy traffic areas. Readers simply present data and information that should be protected.
their credentials when they are within range
of the reader.
• Biometric readers: Users present one
of their approved biometric attributes,
which are scanned for validation against a
biometric database. For even higher levels
of security, biometric solutions can be used
as part of two-factor authentication with
other credentials.
8
Access control software
and data storage
The software for access control systems
is a vital tool for managing the database of
authorized users. The database holds the
details of the network of access-controlled
doors and authorized users together with their
access levels.
9
Electronic locks for door Data networks and cabling
access control Dedicated cabling has traditionally been used to
connect security access components. However,
Electronic door entry systems remain closed
cabling can be expensive to install and
until a user’s credentials are validated and a
maintain, with additional installation costs if
“release” signal unlocks them. There are two
the system changes or expands. Data networks
types of electronic door locks for commercial
offer a more flexible alternative for IP-based
keyless entry:
systems. Access control components, such as
• Electric strike locks: These are fitted to the readers and control units, can be connected
inside of a door frame, where they replace to existing networks wirelessly or using Power
conventional lock strike plates. A small over Ethernet (PoE), reducing installation costs
motor on the strike is connected to a power and offering simpler, faster scalability.
supply, and the current holds the strike plate
A fast, secure and reliable data network is
in the locked position. When an access
essential for efficient access control operations.
controller submits a “release” signal, the
motor releases the strike plate, allowing an The networks must be able to transmit signals
securely between controllers, readers and
authorized user to open the door.
electronic locks. Data networks must be
• Magnetic strikes: These incorporate capable of transmitting high volumes of data
an electromagnet attached to the door at high speed to minimize the risk of slow
frame, which bonds to a metal plate on response times. To maintain performance, the
the door. The door remains locked while network should offer high bandwidth availability
an electric current is flowing through the and traffic prioritization to support data-
electromagnet. When credentials are intensive tasks, such as video or biometric
validated, the access controller sends a data transmission.
signal which cuts the power, breaking the
magnetic bond and allowing the user to
open the door. Power supply
An access control system requires power
Commercial security doors for door readers, controllers and electronic
door locks. Power can be connected using
Electronic locks for access control are generally
conventional cabling to each component
used in conjunction with commercial security
or supplied via a data network using PoE
doors, which have the strength and durability to
technology. This simplifies installation and
resist threats. These doors can cope with high
reduces costs because no separate cabling
traffic volumes and continuous use by larger
is required.
numbers of users with minimal maintenance.
They also have the performance to withstand Access control best practices recommend
different internal and external environmental backup power for each component to keep
conditions, such as extreme weather. doors functional during internet or power
outages.
10
Integrating door access control systems
with other security solutions
Access control systems provide an essential first line of defense against unauthorized access. However, integrating access
control devices with other security system components can strengthen protection even further and provide security
professionals with a single 360-degree view of activity throughout a building.
Security video cameras monitor vulnerable areas inside and outside commercial properties to identify and record incidents.
Installing video cameras in restricted areas allows security teams to watch and analyze feeds, enabling quick responses to
incidents.
Integrating security access data with video feeds enables security teams to identify suspects more easily in the event of an
incident.
Fitting alarms and sensors to external doors and windows extends security coverage and ensures security teams receive
immediate notifications of any attempt to break into the building. When integrated with the access control system, this
allows security teams to quickly identify a door forced or propped open or remotely unlock a door if needed. Smoke and fire
alarms can be integrated with security access to trigger local or building-wide lockdowns in the event of an emergency.
Software applications can also be integrated with access control systems for more efficient management. For example,
syncing identity platforms with access control ensures credential databases are always up to date and connecting visitor
management platforms gives security teams greater control and visibility over guest access within a property.
Video cameras, alarms, sensors, access control devices and electronic locking systems should be built to open standards to
integrate easily into a comprehensive security system.
11
Benefits of access control
systems
Investing in access control techniques can transform the security and
convenience of building access and deliver important operational and
financial benefits.
Stronger security
Replacing traditional locks and keys with electronic access control mechanisms strengthens
security. It eliminates the problem of lost or stolen keys and replaces them with electronic
credentials offering different levels of security. Electronic credentials are more difficult to copy,
and they require validation before a user can gain access, providing security teams with a greater
ability to control access.
Targeted security
Security professionals can deploy different types of door access control systems or program
electronic credentials with different levels of access. This enables security teams to impose the
strongest levels of security where they are needed most. For example, smart key cards can be
programmed with unique codes to protect highly secure areas, or users can be assigned mobile
access permissions based on their titles or work schedules. Mobile or RFID credentials can
also be paired with other credentials, such as PIN codes or biometrics, to support two-factor
authentication.
12
Greater convenience for users More flexible property management
Credentials for security access control systems are A cloud-connected security access system gives teams
available in different forms, all offering users convenient greater operational flexibility. They no longer have to be
access. Proximity solutions, for example, allow users to onsite outside normal business hours because they can
enter high-traffic areas quickly and easily, while biometric manage access requests, open or lock doors and monitor
solutions eliminate the need for separate credentials. alerts from any location with a secure internet connection.
Mobile credentials can increase convenience even further
by allowing users and visitors to identify themselves using a A remote door entry system can provide important security
smartphone app. When choosing and developing an access continuity in the event of a fire or other disaster that makes
control policy, make sure to provide staff training on how to it impossible to provide onsite security management.
use the new system. Teams can continue to monitor and secure doors from a
temporary location with internet connectivity.
13
Greater scalability
Networked access control security systems are easier to scale than
conventional lock and key systems or access systems connected by
dedicated cabling. A new door reader can be added to an existing data
network with no need for delay or disruption when installing dedicated
cabling. In addition, adding new locations to the access control security
network in the cloud is just as effortless, with all sites managed from a
single dashboard.
Streamlined interoperability
Access control devices designed and built to open standards can be
integrated with other security components such as sensors, alarms,
video security cameras, existing access control systems, and fire and
smoke alarms to create a comprehensive security solution that enables
security professionals to monitor and manage all activity through
a single pane of glass. These systems can also be integrated with
compatible building management systems and environmental control
platforms to improve overall protection and safety in the building.
14
Access control
and smart
buildings
Access control systems play an essential role
in protecting a building and its occupants
against threats from intruders, but they can
also make a wider contribution to building
management and the evolution of smart
buildings.
15
Selecting Management
In addition to adding convenience for
an access
employees and visitors, access control
mechanisms and systems should also
be convenient to manage. Operation,
system
intuitive to use and interoperable with other
security tools. Selecting a cloud-enabled
system simplifies management even further.
Reliability
If a reader or access control unit is not reliable,
it reduces the level of security. Downtime for
repair or maintenance also increases risk
and inconvenience for users. The equipment
should have guaranteed levels of uptime and
incorporate backup or failover solutions for
high-security areas.
Convenience
Although access control is designed to deter
unwanted intruders, it should not prove
inconvenient for authorized users who require
access. The system and access control
devices should be quick and easy to use and
incorporate touchless technologies for added
convenience.
16
Scalability
For growing businesses, it’s important to have a system that can be
easily scaled to cover more access points or support additional users.
Organizations operating across multiple sites can improve operational
efficiency if a system on one site can be scaled via the cloud to other
sites. This will ensure consistent security across the organization and
reduce overall costs.
Compliance
The security access control system should enable the business to
comply with any customer security requirements, data protection
requirements, or industry-specific regulations. For example, customers
may require data relating to their business to be secured by special
measures as part of a contract. In some industries, compliance with an
international security standard such as ISO 27001 is essential for doing
business, while businesses in sectors such as healthcare or financial
services require even higher levels of security compliance. In general,
it’s essential to provide security for personal data to comply with data
protection regulations.
Cost of ownership
Cost is one of the most important factors in selecting an access control
system, not just the initial costs, but the ongoing costs for operating,
maintaining and managing access control systems. The upfront cost
will be based on the number of access points to be covered and the type
of components required. The ongoing costs will include installation and
configuration, operation, monitoring and management and the costs of
maintenance, repair and upgrading. Costs may be more predictable with
a cloud-based solution that includes maintenance and upgrading costs
in a monthly subscription.
17
Getting the best
downtime reports so you can compare. Also, consider
adding backup and fail-over security for your access-
controlled doors.
To gain full benefit from security access control, it’s How easy is it for employees to use the access control
important to plan the solution carefully by assessing devices?
vulnerabilities and access requirements throughout the You don’t want to make it harder for your staff to get into
building. A professional security system installer can the building. Unlocking the door should be simple, fast
provide advice and guidance on the most appropriate and reliable. Touchless access control methods are a
solution for different areas of the building and prepare great way to keep traffic moving in your building without
detailed installation plans. Security specialists can also compromising on security.
recommend integration opportunities to ensure the system
forms part of a holistic solution for building security and What does the installation process look like?
management. Before purchasing, know how long your access control
system will take to install and what the installation project
Here are a few questions to ask when determining which
will involve. Do you need to run new cabling? Are there
access control features and solutions are the best for your
existing access control units or readers that you want to
business:
keep? Be sure to include installation costs in your access
control plan.
How reliable is the access control system?
Security systems are only worth the investment if they
work. Reliable door access control systems will have public
18
What access control features are available
with this system?
Be sure the system you invest in has a full
feature set, with everything you need to
maintain security in your buildings. Look for
customizable user permissions, the ability
to set door schedules, advanced reporting
and audit tools, support for multi-factor
authentication and automatic alerts. Other
features you may want include lockdown
capabilities, custom rule engines, digital guest
passes and unification with video security
systems.
19
Access control case studies
Find out how organizations use Avigilon’s access control solutions to
address their most pressing safety and security challenges.
20
Enterprise-class security solutions for Rogers Public Schools ace safety
Stamps.com with Avigilon
Stamps.com, a global leader in online postage and shipping With over 60 buildings spread across a large district, Rogers
software, upgraded to Avigilon Alta’s cloud-based access Public Schools (RPS) needed a comprehensive solution
control system to simplify security management across its to address vandalism and theft instances. Additionally,
11 locations. By switching to mobile credentials, employees the school’s outdated security system had no remote
can now unlock doors using their smartphones, eliminating management capabilities, requiring extensive manual
the need for multiple key cards and improving convenience. checks from security operators.
Alta’s open API allowed Stamps.com to centralize its
security tools, automating processes and enhancing RPS implemented a unified Avigilon Unity suite, integrating
security. a mobile-enabled access control system and AI-powered
cameras for a comprehensive security system. Combining
The integration with Okta enabled seamless user access logs with real-time video footage allowed the team
management, simplifying the process of issuing or revoking to act swiftly and streamline security operations. This
credentials. The touchless Wave to Unlock feature has unified system has given RPS the flexibility to manage
been a favorite among employees and visitors, reflecting access remotely while providing a robust platform to
the company’s modern approach to work. Integration maintain a safe learning environment.
of Avigilon Alta Access with the building’s alarm system
helped minimize false alarms and created a more secure
Read case study
and efficient work environment.
21
Avigilon access
control systems
22
Video Intercom Reader Pro Standard Smart Keypad Reader
The Video Intercom Reader Pro combines all front door The Standard Smart Keypad Reader combines the
security features into one intelligent device, offering live capabilities of Avigilon Smart Readers with enhanced
video, two-way audio, smart call routing and touchless PIN code access, offering multi-factor authentication and
access. Equipped with a 5MP camera and AI-powered call touchless entry. Its durable, tamper-resistant touch keypad
routing, the reader supports hands-free access via mobile prevents wear-and-tear and spoofing for enhanced security.
devices, key cards, fobs or Wave to Unlock technology. The This reader supports customizable PIN codes and provides
Virtual Directory allows visitors to easily reach their host, frictionless access via Wave to Unlock, mobile devices, key
while remote management through the cloud-based Alta cards and fobs. Managed through the cloud-based Alta
Access software provides full control of entry activity from Access software, it enables remote management, mobile
any device. unlock and seamless integrations.
Learn more
23
Additional resources
Commercial access control systems
Securing your business storefront with
retail access control
Disclaimer: The information provided in the Ultimate Guide to Access Control is for informational
purposes only and is not a substitute for professional security advice.
Motorola Solutions, Inc. 500 West Monroe Street, Chicago, IL 60661 U.S.A. motorolasolutions.com
© 2024, Avigilon Corporation. All rights reserved. MOTOROLA, MOTO, MOTOROLA SOLUTIONS, and the Stylized M Logo are trademarks
or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their
respective owners.10-2024 [JMS02]