A physical security control is something you can physically touch, such as a hardware lock, a fence, an identification badge, and a security camera. If you’re planning to take the Security+ exam, you should have a basic understanding of physical security access controls that attempt to control entry and exits at different boundaries.
For example, can you answer this question?
Q. Employees access a secure area by entering a cipher code, but this code does not identify individuals. After a recent security incident, management has decided to implement a key card system that will identify individuals who enter and exit this secure area. However, the installation might take six months or longer. Which of the following choices can the organization install immediately to identify individuals who enter or exit the secure area?
A. Mantrap
B. Access list
C. CCTV
D. Bollards
More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available at the end of this post.
Controlling Access with Access Lists and Logs
Some organizations maintain physical access lists identifying authorized personnel. Guards staff entry points, and check the access list prior to letting people in. If people aren’t on the list, the guard doesn’t let them in. Additionally, the guards can maintain physical access logs to document when employees enter or exit.
When access points include electronic measures such as proximity card readers that record information on users, electronic access logs can verify exactly when someone enters or exits a building.
You can also use these logs to identify security vulnerabilities. For example, if a log shows that a user exited a building, but does not show that the user entered the building, it indicates the user probably tailgated when entering.
Although these access logs are very useful, it’s worth noting that video surveillance provides the most reliable proof of a person’s location and activity. People can steal a proximity card, but they can’t steal a person’s likeness shown on a video.
Monitoring Areas with Video Surveillance
Organizations are increasingly using security cameras in the workplace and surrounding areas for video surveillance. This includes areas outside of a building, such as a parking lot, and all building entrances and exits. Additionally, many organizations use video surveillance to monitor internal entrances of high-security areas, such as the entrance of a data center or server room.
Video surveillance is often referred to as closed-circuit television (CCTV) because it transmits signals from video cameras to monitors that are similar to TVs. In addition to providing security, CCTV can also enhance safety by deterring threats.
Organizations often use video cameras within a work environment to protect employees and enhance security in the workplace. In addition to live monitoring, most systems include a recording element, and they can verify if someone is stealing the company’s assets. By recording activity, videos can be played back later for investigation and even prosecution.
Video surveillance provides the most reliable proof of a person’s location and activity. Access logs provide a record, but it’s possible to circumvent the security of an access log. For example, if Bart used your proximity card to gain access to a secure space, the log will indicate you entered, not Bart. In contrast, if the video shows that Bart entered the room at a certain time of day, it’s not easy for Bart to refute the video.
Remember this
Video surveillance provides reliable proof of a person’s location and activity. It can identify who enters and exits secure areas and can record theft of assets.
When using video surveillance in a work environment, it’s important to respect privacy and to be aware of privacy laws. Some things to consider are:
- Only record activity in public areas. People have a reasonable expectation of privacy in certain areas, such as locker rooms and restrooms, and it is often illegal to record activity in these areas.
- Notify employees of the surveillance. If employees aren’t notified of the surveillance, legal issues related to the video surveillance can arise. This is especially true if the recordings are used when taking legal and/or disciplinary actions against an employee.
- Do not record audio. Recording audio is illegal in many jurisdictions, without the express consent of all parties being recorded. Many companies won’t even sell surveillance cameras that record audio.
Q. Employees access a secure area by entering a cipher code, but this code does not identify individuals. After a recent security incident, management has decided to implement a key card system that will identify individuals who enter and exit this secure area. However, the installation might take six months or longer. Which of the following choices can the organization install immediately to identify individuals who enter or exit the secure area?
A. Mantrap
B. Access list
C. CCTV
D. Bollards
Answer is C. Closed-circuit television (CCTV) or a similar video surveillance system can monitor the entrance and record who enters and exits the area.
A mantrap prevents tailgating, but it doesn’t necessarily identify individuals.
An access list is useful if a guard is identifying users and allowing access based on the access list, but the access list does not identify users.
Bollards are a type of barricade that protects building entrances.