Top Banner
Access Control Requirements Gathering Session 1
21

Security Access Control Requirements Gathering Pack

Jun 19, 2015

Download

Technology

Amy Slater

This is a pack that I create to gather business requirements for a new Security Access Control system. It inlcudes basic questions that you should ask when completing an initial scoping exercise.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Access Control Requirements Gathering Pack

Access Control Requirements Gathering Session 1

Page 2: Security Access Control Requirements Gathering Pack

• The business requirements will form the basis of future projects and will determine the eventual scope.

• If a ‘need’ is not raised as a requirement, the project will not know that the system must perform an action- therefore it will not be included within the scope of the project or included within the end solution.

• The requirements will be base-lined at the end of the Initiate Phase. Any requirements submitted after this date will not be accepted without a change request and associated funding (where applicable).

• The identified business stakeholders are responsible for ensuring that all requirements are raised during the Initiate Requirements gathering process.

The Importance of Requirement Gathering

Page 3: Security Access Control Requirements Gathering Pack

• Review each area of Access Control functionality.

• Prepare a set of draft Access Control BUSINESS requirements for each of the functional areas.

• Agree a priority for each draft requirement.

• Agree next steps, actions and areas for further investigation.

Workshop 1 Objectives

Page 4: Security Access Control Requirements Gathering Pack

Defining the Threat- Review

Page 5: Security Access Control Requirements Gathering Pack

• What threats are present?

• What are the drivers for an access control system? i.e. controlling visitor numbers, protecting people, protecting assets, anti-tailgating, anti-pass back, etc?

• Who and what are we trying to protect?

Defining the Nature of the Threat- Discussion

Page 6: Security Access Control Requirements Gathering Pack

Areas of Concern

Page 7: Security Access Control Requirements Gathering Pack

• What general areas need to be controlled?- areas, rooms, locations etc?

• What exceptions exist?- i.e. Fire Exits etc?

• What areas require enhanced access control?- i.e. Equipment Rooms, Data Centres etc

• Why do these areas need to be controlled? What is the related threat?

• What is the level of risk associated with these areas?

• What is the function of installing control in these areas?

Areas of Concern (General)- Discussion

Page 8: Security Access Control Requirements Gathering Pack

• What vulnerable points exist for each area to be controlled?- doors, windows, air conditioning shafts, conduits etc

• What points should have access control?

• Should access be controlled on a location by location basis or should access be controlled to area ‘types’?

Areas of Concern (Specific)- Discussion

Page 9: Security Access Control Requirements Gathering Pack

Health & Safety

Page 10: Security Access Control Requirements Gathering Pack

• Are there any legal requirements? Health & Safety or Disability & Discrimination Act?

• How should access control act in case of an emergency?- i.e. release on emergency?• What is the definition of an emergency?

• What fire officer requirements exist?

• What provisions should be granted to the blue light services?

• What are the requirements for disabled access?

• When will the access system be operation? 247/ 365 or night time only?

Health & Safety- Discussion

Page 11: Security Access Control Requirements Gathering Pack

Type of Access Control

Page 12: Security Access Control Requirements Gathering Pack

• Should the system be automatic or manned?

• What types of barriers should be used for each of the areas in scope?- door locks, arm barriers, vehicle block devices etc?

• What types of additional barriers should be used for the priority locations?- electronic keys, finger print scanning?

• What type of verification measures should be used? Electronic key card, IRIS scan, Finger print recognition, ID codes, keys etc.

• What should the user do when access is denied? Should an intercom system be present?

Types of Access Control- Discussion

Page 13: Security Access Control Requirements Gathering Pack

• How often will the access control be used in each of the areas?

• What level of security should be in place?• If the power drops what should happen?• Anti-Tamper mechanisms?

Technical Details Discussion

Page 14: Security Access Control Requirements Gathering Pack

Operational Considerations

Page 15: Security Access Control Requirements Gathering Pack

• How will access control be managed?- customer, Staff, Disabled Visitors/ Staff, Contractors etc?

• What information will be captured against each person granted access? Name, address, role, date given, expiry date etc?

• What period should access be granted for?

• What types of protected access should be provided?

• How will deliveries be controlled?

• Where will data entry and monitoring of alarm activity take place?

• How will data for entry or modification be gathered?

• How will security clearance be processed?

Operational Issues- Discussion

Page 16: Security Access Control Requirements Gathering Pack

Integration to Other Systems

Page 17: Security Access Control Requirements Gathering Pack

• Should there be integration between the Access Control System and other systems? i.e. CCTV system?

• What information should pass between the systems?

Integration Discussion

Page 18: Security Access Control Requirements Gathering Pack

Management Information, Reporting & Maintenance

Page 19: Security Access Control Requirements Gathering Pack

• What information should the system capture?• Successful access- user ID, time, location etc.?• Unsuccessful access- user ID, time, location, number of attempts etc.?

• Should information be captured and available to view in real time? i.e. should it be possible to identify where an individual is located at all time?

• What reports should be available from the system?

• Should the system automatically alert based on event triggers? If so, what events should trigger alerts and how should the system alert?

• What should the system do in the event of a breach? – i.e. a door is forced?

Management Information & Reporting Discussion

Page 20: Security Access Control Requirements Gathering Pack

• What should the system do in the event that an access control point fails in the following scenarios:• Access point looses power• Access point fails- i.e. reader not able to read card• Access point operational but input not detected- i.e. an issue with the card.• Access point breached?

Support & Maintenance Discussion

Page 21: Security Access Control Requirements Gathering Pack

Any Questions?