Leveraging IT for Access Control

Solutions that use 13.02 FICAM topology eliminate the need for proprietary access control panels

Trying to navigate through the numerous security regulations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals. Buying access control solutions that are compliant with federal mandates, such as HSPD-12 or FIPS-201, means there are only a select few products that end users in the government sector can purchase. The only way to ensure these purchased solutions are in compliance with these requirements is to turn to the General Services Administration’s (GSA) approved products list (APL).

But even then, there are still budgetary constraints that may make implementing the best access control system nearly impossible, and government end users are still faced with the prospect of investing a significant amount of money to upgrade their existing access control infrastructure without a reasonable ROI.

Requirements Abound

In the past, government facilities could implement low-cost access cards and readers as a simple means of securing doors. Now, they are required to have a particular type of smart access card—usually a personal identity verification (PIV) card—and that card has to be authenticated at the reader. This means that the system has to check to determine that each card hasn’t been duplicated or spoofed; hence, there are many requirements in place at certain facilities to deploy some type of biometric credential solution in conjunction with the traditional card access system. Some even require the use of a PIN number in addition to these other layers.

All of these things have amounted to increasing costs across the government spectrum as agencies have sought to create secure digital identities for employees, most of who are required to be fingerprinted, photographed and issued cards that have digital certificates linked to them.

The quandary for many in the market has been how to link this new generation of secure credentials with existing physical access control systems (PACS) infrastructure, card readers, control panels and the like. The problem is that the majority of these products are on the lower end of the access control technology spectrum, specifically control panels, and don’t have the capability to check and see if a card is fraudulent at the time it is presented.

One of the major hurdles federal officials ran into is that after agencies went on the APL and purchased the components necessary to achieve this new level of required security, they quickly found many of these solutions were incompatible with one another. In response, the government introduced a new program called Federal Identity, Credential, and Access Management or FICAM that outlines the requirements of an end-to-end access control solution in which all of the devices are interoperable with one another.

Two Different Topologies Offered for FICAM Compliance

Historically, most of these systems—identity, credential management, logical access and physical access—operated in silos and did not work very well together. With FICAM, the GSA is attempting to create a new level of interoperability between these solutions.

Topology 13.01. One of the options available to address this issue is that of an additional hardware component being installed between the reader and the control panel that has all of the intelligence necessary to check the card and ensure that the credential is authentic. It does this by leveraging the IT network to verify the information on the card, and checks if the credential has been reported as lost or stolen.

This method includes three categories of components: the card reader, the access control system or the PACS, and the intermediary validation system between the reader and the panel.

Topology 13.02. This is a completely new architecture that is optimized for leveraging an IT infrastructure to meet the FICAM requirements by “virtualizing” the PIV and PIV-I credential certificate validation and authentication functionality within the access control software. Physical access points are controlled using IP encryption bridges to connect door hardware and transform card readers into IP addressable devices. This topology was introduced as an alternative to the 13.01 topology because it does not require the additional hardware and third party software needed to add authentication and validation capabilities to traditional control panel systems. Credentials are presented at the reader and cryptographically challenged by the Freedom 1302 PACS and Validation software. These credentials are then authenticated and validated before an authorization check is performed to grant or deny access to the cardholder.

This unique approach eliminates the need for an intelligent hardware component that would otherwise be necessary to meet the requirements for FICAM by using a traditional PACS architecture. All data is encrypted to eliminate the opportunity for cyber threats, ensuring that a high-level of security is maintained to meet one of the stringent testing requirements of FICAM-approved products.

The Benefits of Using an IT-centric Solution

In an IT-centric environment, solutions leverage software running on hardware as opposed to firmware-supported hardware, which is counter to how things typically work in government access control applications. For the end user, they’re able to take their existing IT infrastructure (TCP over IP) and run software on it to control their access control system in the same way they control network security for logical access to computers.

Using an IT-centric solution also provides users with significant costs savings, which is an issue when dealing with clients that have strict budgetary requirements like the government. Because much of the hardware that’s required in a traditional access control system is unnecessary under this kind of architecture, end users do not need to have the antiquated devices that would typically be required.

For instance, a solution that runs on the IT network doesn’t require the use of any proprietary access control boards or panels to perform the authentication check at the door that other systems require. The user only needs the computers operating in their data bank running software with some type of interface at the door to connect the electric-strike contact, monitor whether or not the door is open and have a push button that people can use in the event of an emergency to exit the building.

Another potential drawback in using a solution that relies on panels is that even when the devices are supplemented with an intelligent component to complete the credential validation process, the technologies still do not have access to the real-time data that a solution using the IT-centric model does. When it comes to interoperability and the time it takes for validation of a credential, the 13.02 topology can interact with these other systems much faster to determine what policies or attributes may have changed, and make that decision quicker than a typical panel-based solution.

Why Buying FICAM-compliant Products Matters

Because federal agencies are required to purchase products on GSA’s approved products list, any type of PACS solution—be it a traditional hardware-based system or one that is IT-centric—needs to have previously achieved FICAM approval before it is deployed. Having this approval paves the way for the deployment of various access control products in all federal agencies as well as all buildings leased by the GSA for other federal agencies.

Although the user is limited in what they can implement in their facility by what products are on the APL, they are protected. They can rest assured that what they do purchase works, is not vulnerable and meets all of the compliance checklist items.

The rigorous FICAM test program ensures that each product on the GSA’s APL meets the functional requirements of FIPS 201 and NIST SP 800-116, that the system is secure from a network perspective, and that there is complete interoperability between all topology components.

Evaluating FICAM’s Impact on Government End Users

At the end of the day, government users are looking for solutions that meet the necessary requirements at the lowest possible cost. Each agency has a prime directive, be it serving veterans, retirees or ensuring homeland security, not spending millions and millions of dollars on access control measures.

While the government has had access control mandates in place for well over a decade, there are still a number of agencies that have yet to fully meet all of the requirements. However, with FICAM, the GSA has said that all access control products purchased moving forward must meet these standards or else they won’t be approved for use in buildings owned or operated by the federal government.

Eventually, everyone in the government sector is going to move toward interoperability in physical access, logical access and identity management. The best way to accomplish this is through the deployment of a solution that takes advantage of the IT infrastructure already in place.

This article originally appeared in the October 2014 issue of Security Today.

Featured

  • Human Risk Management: A Silver Bullet for Effective Security Awareness Training

    You would think in a world where cybersecurity breaches are frequently in the news, that it wouldn’t require much to convince CEOs and C-suite leaders of the value and importance of security awareness training (SAT). Unfortunately, that’s not always the case. Read Now

  • Windsor Port Authority Strengthens U.S.-Canada Border Waterway Safety, Security

    Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Read Now

  • Survey: 84 Percent of Healthcare Organizations Spotted Cyberattack in Last 12 Months

    Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security professionals globally and recently released findings for the healthcare sector based on the data collected. It reveals that 84% of organizations in the healthcare sector spotted a cyberattack on their infrastructure within the last 12 months. Phishing was the most common type of incident experienced on premises, similar to other industries. Read Now

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3