Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Door Detail Schedule

By Michael Khairallah
May 1, 2007


Conducting a Vulnerability Survey to determine physical security requirements requires many steps, including recording information in a Door Detail Schedule (DDS). During the physical survey, the chief security officer should record the information obtained about the openings on the DDS.

To fill in the DDS, determine the “common name” given to each opening or alarm point in the protected area. The common name is the one given to that location by company personnel and used on a day-to-day basis. The “formal name” for the opening is usually provided on the floor plan or plot plan. This will be the primary identifier when discussing openings with company employees in future meetings and will serve as the primary reference for communicating equipment locations to vendors during the bid and installation process.

The formal name tends to be more exact and reflects the relative location in the building. The architect of the building typically generated egress names during the design phase (e.g., corridor 12, door 15). However, these designations frequently give way to a common description recognized by employees in everyday situations (e.g., lab door). It would be useful to record both.

Using the security level assignments made during the preparation step, assess each opening in the protected perimeter. Show the means of access, egress, locking and alarm on the DDS. Continue in a like manner for the entire outer perimeter and then move to each inner perimeter, assessing each opening in each perimeter. The primary mission of the DSS is to establish the traffic patterns throughout the facility.

Access and Egress Control Devices

An access/egress control device is a card reader, PIN pad, biometric measuring device or other identification device that uses a characteristic of an individual or the properties of a credential the individual possesses to identify the person requesting access or egress. At this point, it is only important to note that some form of identity recognition is needed for access or egress at controlled openings.

Exit Button

After locating any access control devices, and egress control devices used, specify the placement of egress buttons. There are a variety of regulations concerning the placement, use and operation of egress buttons. The state and local fire marshals enforce these regulations and failure to follow them can result in the closing of the facility until the violations are corrected.

In addition to egress buttons, the code requires a variety of other means of egress from a protected area. When specifying any form of security system that restrains egress from a protected space, complete familiarity with the entire section of NFPA Means of Egress requirements is imperative.

Door Locks

The appropriate lock is vital to the proper operation of any access control system that controls an opening. Electronic access control systems are designed to either admit or deny an individual an access opening, but what restrains the individual from entering the opening is the actual door and lock. It is important to choose the appropriate lock for a given door. A well-designed, properly installed access control system can be easily defeated if the appropriate locking mechanism is not properly selected and installed.

Door locks fall into two broad categories: locks that work with the existing door hardware and locks that are not dependent on the existing door hardware. No single choice is best in all circumstances.

Other locks are completely independent of the existing door hardware, such as power bolts and power magnets. These devices usually have one component installed on the doorframe and another component installed on the door. The relation between these two devices is such that the application (or release) of power will permit the door to open. These products generally hold an opening closed by a mechanical or magnetic means and act independently of any other mechanism on the door. Again, a complete examination of these devices is not necessary at this point; only the designation of a lock and lock type.

Door Hardware

When choosing an electric strike for a door, information is also required about the existing door hardware. Electric strikes are designed to replace door strike plates and not all electric strikes are compatible with all strike plate cutouts. Furthermore, not all electric strikes are compatible with all door handle hardware.

The most appropriate means for determining compatibility between strike and strike plate is to use a cross-reference document published by the electric strike manufacturers. However, the exact make and model of door hardware is not always easy to determine by simply examining the outer surface of the door hardware. Make a tracing of the existing strike plate that will be replaced by the new electric strike. This will save considerable time in the system design step.

Using a piece of ordinary paper, title the paper with the name and location of the door. Place the paper over the strike plate, aligning the edge of the paper with the edge of the door jam. Note the side of the paper where the jam is located. Trace the outer edges of the entire strike plate and the inner edges of the cutouts — holes in the plate that accept the door handle hardware (keeper and bolt). Be sure to indicate on the tracing the location, size and center of the mounting screw holes. This will also be an essential part of making the appropriate electric strike selection. A lock hardware supplier can use this tracing to match an electric strike to the existing strike plate. Share these documents with vendors when releasing the bid. A simple sketch will assist them in preparing their cost proposals and allow for them to install the appropriate hardware.

Door Status Switches

Plan to monitor all security perimeter openings. Door status switches, sometimes called door contacts or alarm contacts, are used to monitoring openings. Door status switches are simple mechanical sensors that detect the status of an opening. Although the name implies a DSS is for door installations, these switches are also for windows and other types of openings.

In general, a DSS consists of two components: a magnet attached to the door leaf and a reed switch that detects the presence of that magnet. Simply put, when the door is closed the alarm contact is in close proximity to the reed switch and holds it closed. When the door is open, the magnet is away from the reed switch and the switch opens. This provides a signal to an electronic security system that indicates the door is open. During the physical survey, indicate where a DSS is needed at an opening and the number required.

Space Protection

If a room, a passageway or some open area requires protection, use a space protection device. These detectors register the presence of individuals in the protected area. Similar to locks and door status switches, there are a wide variety of such devices available. It is not important to decide on which device to use during the physical survey, it is only important to note the need for such a device.

SIDEBAR: The Door Comes First

Each door characteristic has an impact on the lock chosen for the door. Gather as much information as possible about the subject door before deciding on the locking mechanism to use. Consider the following when selecting the lock type for an opening:
  1. The nature and construction of the door.
  2. The door swing (inward swing or outward swing).
  3. The height of the door. (Do not use locks that are installed at the door header on very tall doors. This causes the door to warp.)
  4. The material the door is made of (in judging the application of electric latches).
  5. The ability to bring low voltage electrical power to various points on the doorframe.
  6. The type of control devices that will be used on the door. (Egress controls are sometimes necessary in certain application and will dictate the use of special hardware or locks that do not work with existing door hardware.)
  7. The applicable fire codes that govern the use of the door.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael Khairallah is president, Security Design Solutions of Covington, La. His book, Physical Security Systems Handbook – The Design and Implementation of Electronic Security Systems (Elsevier, Butterworth Heinemann), is available at $49.95 and can be ordered through the Elsevier Web site at www.elsevier.com or telephone (800) 545-2522 or write Elsever, Order Fulfillment, 11830 Westline Industrial Drive, St. Louis, Mo. 63146.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Camera Detail Schedule

    See More
  • Devil in Design Details: Documenting the Preliminary System Design

    See More
  • Completing the Vulnerability Survey

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing