System security

The system exists to protect buildings and the people who work in them from multiple external threats. This chapter concerns securing this system itself so that only authorized users may view and configure its properties, and all communication within the system is protected from malicious activity.

The security of your access system relies on these factors:

  • Physical protection: Supervisor stations need to be located in physically secure areas. Controllers need to be located where they cannot be easily accessed by unauthorized personnel.
  • Data communication and server authentication should be secured by signed PKI (Public Key Infrastructure) certificates.
  • Passwords need to be robust and changed regularly.
  • User permissions need to be configured based on need. Few should serve as administrators with unfettered access to platforms and stations.

Most of the procedures in the chapter use Workbench running on a PC. Some procedures are also available in the web UI.