HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.17 Entry regulations and controls

S 2.17 Entry regulations and controls

Initiation responsibility: Head of Organisational Section; Head of Site Technical Services

Implementation responsibility: Head of Site Technical Services, employees

Entry into parts of buildings and rooms requiring protection must be controlled (see S 2.6 Granting of site access authorisations). The pertinent measures range from the simple issue of keys through to complicated identification systems including one-by-one checks of persons; in this respect, use of a physical key with lock also constitutes a form of entry control. For entry regulation and control, it is necessary that:

The mere allocation of permissions will not be sufficient if their observance, or infringement, is not monitored. The detailed design of control mechanisms should be based on the principle that simple and practicable solutions are often just as effective as elaborate technology. Examples here are:

Various building-related, organisational and personnel-related safeguards are required in connection with access control. Their interaction should be controlled in an access control concept which specifies the general guidelines for protection of the parameter, building and equipment. These include:

In addition, the installation of various qualities of badge reader, of walk-through detectors and one-by-one checking facilities may be expedient. For key management, see S 2.14 Key Management.

When operating a computer centre, it is extremely important to protect the core units with strong access control mechanisms. Possession, knowledge and biometric features are all possible means of establishing identification and authentication. A strong access control mechanism must require at least two out of these three characteristics. Today's technology suggests that biometric procedures should not be used as the sole means of access control.

The terminals used for access control must be protected against tampering. They must be arranged so that confidentiality is maintained during data entry. Moreover, all the units that are necessary for data entry should be combined in one device, for example, a keypad for entry of a PIN.

If all the units are not in a single device, data transmission between these devices must be encrypted. If, for example, contactless ID card readers are used, the transmission of data between card and reader must be encrypted.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home