Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Determining and Implementing Successful Access Control Solutions

By Bernard J. Scaglione
January 1, 2009

Today, the key phrase in security is convergence: the convergence of physical security systems, the convergence of logical and physical security and the convergence of corporate processes to ensure compliance. CSOs in every industry have to protect massive amounts of electronic and paper information, secure virtual as well as physical infrastructures, and monitor the actions of employees, vendors and visitors for regulatory compliance.

The control of access and the authentication of identity play a key role in security convergence. However, all too often, the fundamental principles associated with access control and identification are overlooked.

These fundamental principles are not always emphasized in the design and implementation of security programs. I am reminded of this myself when I periodically guest lecture at a local college for introduction to security and security management classes. I enjoy not only the opportunity to stand up in front of a group and educate them on security practices, but teaching basic principles gives me the opportunity to reflect upon and review my own programs to ensure basic principles are adhered to.



Assess and Establish Access Control

All security practitioners should conduct a survey to determine if basic access control principles are present within their security program. These principles are important to consider because they establish a strong foundation for all other programs incorporated into the access control process. Establishing programs with a weak foundation can only lead to weak systems, which can become overly complicated and ineffective – something to strongly consider in this current economy of shrinking budgets and increasing crime.

The access control process can be broken down into four basic components: people, policy, procedure and physical security systems. Each component is important to consider in the creation of a comprehensive access control program. So, whether protecting digital information on a network or identifying visitors as they enter a facility, the management of these four elements helps to establish a solid foundation for the access control process. They will facilitate the restriction and monitoring of access, the detection of unauthorized users and the proper channeling of authenticated personnel into authorized areas.

The single most prominent principle to consider when designing or evaluating access control is the notion of “Concentric Circles,” security systems constructed in layers. Layers can be physical barriers like fences, doors, windows, walls or door locks. They can be electronic systems like card readers, intercoms or security video.

Layers can be security officers posted at an entrance, a receptionist behind an information desk or armed personnel patrolling the grounds with an attack dog. They can also be the creation of a policy statement and the implementation of a procedure. What is important to remember is no one single component can effectively control access; it is the coordination of several systems or components working together that create a controlled security infrastructure.


Development and Implementation

When developing and implementing physical access control layers, the principle of “Crime Prevention through Environmental Design” or CPTED should be utilized. CPTED looks to change the physical environment to stop or channel people in order to monitor, restrict or control their access. Utilized correctly, CPTED controls the physical environment to create barriers that can be difficult to breach. The advantage to using CPTED is that environmental manipulation provides consistent control within the parameters of the physical elements being utilized to control access.

Layered security also means policy and procedure. As part of any solid access control program, a strong policy statement along with a tested procedure adds value to the security strategy. Policies should be written to make a statement about the security philosophy and the process being instituted. A procedure should be outlined within the policy statement that details the particular elements of the process being implemented. The process should be designed to coordinate and support the physical design elements being utilized through CPTED. It is important to have alignment among process and physical security.

The most important element in the implementation of basic access control is compliance. Are the layered systems put into place working as designed? Compliance is the confirmation of processes, the verification that policy and physical security work to consistently and effectively provide the designed access control. Compliance practices should be instituted that continuously monitor access control systems to ensure they are working as specified. Ensure that your security staff consistently screens visitors as outlined within the policy, and make sure the procedure is written within the policy correctly, stating the process being carried out by the security staff.

Finally, the installation of layered security should be done with one philosophy in mind - Keep It Simple. The proliferation of layers can create a complicated and ineffective system in which end-users look to bypass security features so they can function effectively within the corporate environment. Security systems should not be in conflict with the corporate culture. The installed processes must provide security without supporting a prison like environment.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP, is a principal partner at The Security Design Group in New York City. He has 30 years experience in the security field. Ben is Chairman of the ASIS International Healthcare Council and president of the New York City Metropolitan Healthcare Safety and Security Directors Association. He is a member of the training council for the International Association for Healthcare Security and Safety and is an accomplished author writing for ASIS, the International Association for Healthcare Security and Safety and Lawyers and Judges Publishing. He currently teaches re-certification classes for licensed architects and professional engineers at the Platt Institute in New York City.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • One Leader’s Perspective on Identification and Access Control

    See More
  • Using Access and ID Control to Prevent Workplace Violence

    See More
  • Workplace Violence Prevention Revisited

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing