Personnel authentication is the most visible of these functions. Its aim is to verify who a person is, or what credentials he or she holds – in other words, to ask them to present their identity, and to verify their identity through some mechanism. This can be done by verifying access codes, tokens (such as the familiar magnetic stripe card) or biometric data, such as fingerprints or iris patterns. Identification based on the first two types of data does not rely on verifying a person’s identity per se; rather, it verifies that a person holds some particular information or physical object that is issued in a controlled manner, only to people belonging to specific groups (employees vs. visitors, IT personnel vs. administrative personnel, etc.). Biometric data, however, is essentially unique to each person and allows unique identification of an individual.
Authorisation is granted based on a specific set of rules and is implemented through various types of access control components, such as door locks or turnstiles. The rules can vary, from group-based, generic access (such as granting access to the main facilities to anyone who presents an employee badge – and is, presumably, an employee) to specific, identity-based access (such as allowing access to highly-sensitive equipment only to certain employees using fingerprint-based authentication).
Access control is relevant only insofar as it is continuously monitored. At a minimum, it should be possible to know whether someone is present on-premises or not, but more advanced features, such as tracking, are sometimes required. Often, access control systems are integrated with general surveillance systems, allowing the consequences of every access attempt to be tracked. And, generally, besides this continuous monitoring, some form of record keeping is also required. This is useful not only in case incidents need to be officially reported – it is also a useful source for internal evaluation and optimisation, and can also be integrated with HR and staff databases to provide time and attendance data.
Planning and Installation of Access Control Systems
This wealth of features and potential implementation mechanisms makes planning and designing an access control system a very complex task. It needs to balance a company’s current security requirements, future development, and the costs associated with implementing them. Furthermore, access control system installation is a very painstaking task, which requires specialised knowledge, advanced skills and a rigorous procedure.
Access control system installation and planning have to take into account a great deal of industry- and country-specific standards and regulations. In the UK, industry-specific standards include BS EN 60389-11, BS EN 50468, which specifically deal with security systems, and general electrical installation standards, such as BS 7671. However, UK companies that use access control systems also need to follow a diverse set of legal requirements, such as those concerning access for disabled persons, outlined in the Equality Act 2010.
Some manufacturers, such as Paxton, one of the leading manufacturers of access control systems, choose to impose additional requirements upon their partners. They disseminate and enforce these requirements through training and certification services, which focus on both general regulations, such as international standards, and manufacturer-specific knowledge and skills. Therefore, when offering such a certification, these companies vouch not only for their partners’ knowledge of their portfolio, but also for their compliance with international and regional standards.
