Door access control is a critical part of any multi-layered security system, as it prescribes access according to a set of business rules designed to protect businesses from multiple threats, or to limit access to only those permitted into certain areas.
By controlling who comes in, where they are able to go, and where they exit, you are able to protect your staff, your and their property and safety, critical data and product areas as well as Intellectual Property.
There are numerous types of door access control systems, including voice and video entry phones, swipe keycards, fobs, biometric scanners, bluetooth-activated locks and more.
In terms of how these types of access control systems are implemented, it’s really at the discretion of the business owner to decide what levels of access need to be applied.
There are three primary types of access control parameters, as follows:
Mandatory Access Control (MAC)
This is the strictest option and is primarily used by high-security requirement institutions such as the military, government, financial institutions and so forth.
An operating system, set up and controlled by a single administrator, firmly controls access to all doors. With MAC, it’s impossible for users to change permits that grant or deny entry to rooms throughout the facility.
Discretionary Access Control (DAC)
This is the most commonly-applied type of system, in which business owners are able to create their own rules about who can access which areas on the premises.
With this system, each entry point has an Access Control List (ACL) with groups or individual users who have permission to enter.
Role-Based Access Control (RBAC)
Also called non-discretionary access control, RBAC grants entry to users based on their role within the organization.
This allows you to effortlessly assign permissions based on job titles, rather than individual names of employees. If an employee is promoted and another is hired on to take their place, you can use their changing position within the company to assign access to the appropriate areas.
For the above user types, there are also rules that can be applied to each set of parameters, for example that limit all users according to a time of day, state of operation (emergency) etc.
The above systems should all be linked to other layers of security such as CCTV, alarm systems, Automatic Number Plate Recognition (ANPR), access log management systems and so forth to ensure that there are numerous ways that movement can be tracked, recorded and logged.
If you need guidance or advice on all matters related to security, access control, CCTV, ANPR and more please get in touch with one of our friendly staff today on +44 1223 23 66 55 or email@example.com