Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Get Into Access: The Value of Buy-in

By Jeffrey Dingle
July 1, 2006


Have you ever been in a conversation that started with “Do you know who I am?” Typically this conversation starts when someone is denied access, or is challenged in a secured area. This was a recent case with Congresswoman Cynthia McKinney from Georgia. McKinney tried to enter a secured area in the U.S. Capitol, and was stopped when she didn’t present appropriate credentials at a checkpoint. The Capitol Police Officer on the post didn’t recognize her, and stopped her. The rest, as they say, is history.

A basic fact of access control is that in order for a system to work, two issues must be in place. First, the facility must be secured. While this seems to be a “no-brainer”, I have seen many instances in which a beautiful $300,000 access control system is running at the front doors while the back doors are propped open with a rock. Access control is as much about policies and procedures as it is about equipment.

Access list works

The second issue: an access list must contain rules explaining what is required for access. There MUST be an agreement, and this is a management decision, as to who is allowed access and who is not allowed access. This list can be specific, listing each individual by name, or it can be categorical. A categorical list can state that “access is permitted for employees, vendors and authorized contractors,” or “anyone with a government ID.” While broad in scope, it is usually sufficient for most applications.

The access list is important because “front line” security should NOT be decision makers at an entrance. The officers should instead be in a position to ENFORCE the access decision, not MAKE an access decision. While the difference may appear minor, it is huge.

Access decisions are not made in a vacuum. Communication between security and human resources is important, and must flow quickly. Generally, it is human resources that hires and fires, while security controls access. Often there is a lag between when a person is terminated and when the notice of the termination is communicated to security.

A recent incident at a FORTUNE 500 company involved an employee being a hostile termination on a Friday afternoon. As required by the company policy, the employee’s access badge was taken, and he was escorted out. Due to the weekend termination, human resources did not notify security, and the employee was not removed from the database. The employee returned the following day, a Saturday, stated that he “forgot his badge,” was verified to be current in the database, and was allowed access. He spent over six hours on a computer in his old office. Poor policy allowed a bad situation to get worse.

One of the major, but often overlooked pieces of the total access control operation is buy-in from upper management. The lack of buy-in shows itself with the belief that wearing a badge is unnecessary, often because of “status.” I am a firm believer in “lead by example.”

Danger in magic words

Lastly, let’s discuss magic words. Many facilities have “magic words”…the specific words that, if you know them, will bypass security measures in place. A facility I inspected had a multi-layered security approach. The facility was almost two million square feet, divided among three high-rise buildings, all connected at the three lowest levels. A multi-story parking garage is attached to the back side. From an operational standpoint, access to the parking garage is less secure than access to the building, although a current facility access badge is needed to enter the garage. The catch is that the facility has a very nice fitness center for employees. A company perk is that spouses of employees can use the fitness center for a small fee. How does this affect security? Spouses without access badges park in the garage, and gain access by pushing the intercom button and saying “I’m a spouse going to use the fitness center”…these magic works will open the gate for you. These words also will open the gate for anyone who knows them.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff Dingle is assistant director of special projects for LSI, a U.S.-based anti-terrorism, homeland security and physical security training company. He has been a Federal Criminal Investigator, security manager at a FORTUNE 15 company and ran the security operations for a former U.S President for eleven years. He can be reached at JeffDingle@LSIeducation.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Get Into Access: Back Doors and Magic Words

    See More
  • Access Control, the Government Version

    See More
  • Up or Down the Access Staircase

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing