Key Control Central

Airport enhances its access control systems, protects assets

Airports have many security requirements and challenges, and part of the challenge arises because of the mix of people on-site, including airport staff, airline staff, contractor and vendor staff and travelers. One component of managing security in such settings is to strengthen the role of access control so that all parties remain in their authorized areas, assets are protected and security staff can focus on operational matters.

For many airports, strengthening access control means implementing a key control and management system to ensure that all keys, including those to sensitive areas, are properly secured and accounted for. When installed throughout the airport complex, the automated key control systems enable controlled access to keys and provide valuable forensic capabilities such as automated tracking, alarm and reporting functions.

Key Control Increases Security

Automated key control and management systems offer an increased level of security for an airport by preventing unauthorized key access and reducing the incidence of lost or misplaced keys. Tamperproof cabinets are used to hold keys to sensitive or sterile airport areas, including ramps, operational spaces and other Security Identification Display Area (SIDA) spaces restricted from the general public. Authorized users with permission to enter these restricted areas unescorted can access keys which they have been pre-programmed to use by entering their PIN code and swiping a pre-issued badge. If the criteria entered matches the information stored in the system data base, the key cabinet will unlock and the necessary key can be removed or returned.

Following are more specific ways key control and management systems are designed to improve airport operational security.

Actionable information. Operational security and efficiency is further improved because all key access activity is automatically recorded including user, date and time of key access/return. Scheduled reports of which keys are in or out and who has/had them keeps airport security management informed. Administrators can request programmed reports to trace key movements by time, date and user code. If an incident occurs, during the follow-up investigation, management can query the system for specific details such as a listing of all transactions between certain times. Or, immediately following an incident, a report can be generated showing which keys are signed out and who last accessed them. Real-time audit reports can also track keys in use, overdue or lost keys, the location of a stored key (i.e. which key cabinet in the system) and any inconsistent key usage.

When time is of the essence, the up-to-date and reliable information provided by a key control and management system’s reporting can provide a strong evidence trail allowing airport staff to enforce established procedures regarding secure areas.

System integrity. Key control and management systems may incorporate additional security features to help maintain the integrity of the system and provide enhanced security. For example, when an authorized user accesses a key, a numeric code can appear on the display and that code must be entered at secure doors when using the key. As an added safety measure, alarms can be triggered for certain predetermined circumstances such as the use of force to gain access or remove a key, invalid user codes, a door left open for more than 10 seconds after use, power failure, a key missing or not returned on time, or a key returned by the wrong user.

Locking devices can be attached to the keys to prevent users from swapping out the real key for another. These can be color-coded for organizational purposes. For example, this can help airport management organize keys for sensitive or sterile areas. The colorcoding system also means that individual keys need not be labeled as to their purpose. If a key is lost, not only does the system flag this missing key, but it also eliminates any immediate identity issues.

Integrated/Networked Systems Improve Operational Efficiency, Convenience

Today’s sophisticated key management systems bear little resemblance to manual processes in the past. Now, these systems are designed with an open architecture platform to enable network connectivity to access control and other systems provided by a range of integration partners for multiple levels of security and control.

Operational efficiency. Optimizing the key management and access control technology within a facility through system integration pays impressive rewards in improved security and system efficiency. The technology can usually be integrated with the existing physical security system without costly upgrades or overhauls. For example, asset control systems featuring alarm and relay inputs/outputs can be integrated with existing video surveillance systems for additional security. Ethernet and USB capability help to ensure system compatibility and integration. Systems can also integrate with the airport’s existing identification cards.

Integration with access control allows system administrators to regulate the area of movement within the building for staff with keys. An authorized airport employee who has taken a specific, high-value key can be denied egress from the facility via an access-controlled door until the key is returned. The parameters can be applied to users, keys, groups of keys, time constraints, and reservations. Or, when high security keys are involved, specific management can be alerted via email if that particular key has not been returned on time.

Operational convenience. Compatibility with other security systems and network access offers an added richness and usability to airport security management. Integration with existing databases can also save time and money, by using a common front-end database to synchronize programming. Transactions such as adding or deleting users are easier and provide more efficient administrative control.

Adding or deleting contractors and other nonpermanent airport staff is just as easy, and the information is automatically distributed to all key cabinets within the system.

Mobile capability. Mobile applications are quickly becoming a preferred platform for airport security managers accessing key control data and even to perform transactions. The result is improved safety and integrity of the airport.

Advanced communication capabilities enable key control systems to be monitored and administered remotely from PDAs or smartphones as well as from the desktop. Apps for automated key control systems enable users to maintain control of keys no matter their location.

At any time, an authorized user can see real time transactions and information about keys that are in use and any keys that are overdue, as well as where and when alarms may have been triggered or overall system status. For investigative purposes, for example, managers can even review key usage to determine who may have last accessed a key for a vehicle that was found to be damaged.

Notifications and events are automatically sent to authorized airport personnel for real-time awareness and management, and allowing them complete control of the system. They can cancel an alarm and even, if necessary, remotely disable user privileges. These features, along with many others, provide the mobile user with a greater level of convenience and control when it comes to key control management in an airport environment.

Outside the Terminal

Improvements that strengthen an airport’s access control should not stop at the terminal. Remotely located buildings such as fire stations, administrative facilities, control towers and even hangars can pose a challenge for management in terms of keeping the buildings secured and safe from break-ins, vandalism and other unwanted access.

Since these locations are not connected to the main terminals, providing access can also create a challenge when it is necessary for maintenance crews and other workers to have access to certain or all areas within these buildings.

Common concerns. Will employees remember to return the keys? Will the facility be properly locked upon exit? Will accurate time logs be kept? Automated key control and management systems installed at the remote facilities can help eliminate these issues. More efficient than requiring employees to pick up and return keys to/from a central office, on-site networked key control systems with tracking capability offer an easy-to-use alternative. Illuminated key slots to locate keys, random return capability and user prompt screens with tailored messages all help make systems easier and more efficient for even the occasional users.

Key control systems can be programmed remotely to meet the requirements of airport and government regulations as well as setting time and date parameters for each user, which can also help to ensure the deterrence and detection of unwarranted access to controlled areas within the facility. Using PIN codes or biometric authentication, remotely located systems make it easier for authorized users to access keys when needed and for security management to be more assured about the building’s security.

Accountability beyond security. In a real-life example, United Airlines Jet Rebuild and Test Facility in San Francisco keeps track of valuable tools using a key control and management solution. At the facility where United brings its jets for rebuilding, each mechanic is provided with the specific tools and test equipment needed for the job at hand.

The items, some of which have values up to $20,000 each, are kept in locking toolboxes and the toolboxes are kept in assigned areas relating to the project. The shop uses the integrated key control system to store the keys for the toolboxes and to enable complete control of who has access to individual keys and when that access is authorized.

The system can be accessed through an IP network from anywhere in the building and this online control enables airline management to administer the system and know from their own desktop computer who has any key. An audit trail tracks data regarding who removed any key, when it was taken and when it was returned.

Activity reports provide complete information on which keys come and go, at what time and on what day. The information provides insight into usage trends that could help the facility better understand the operation and any opportunities for improvement, such as a need for additional equipment or improved alternative scheduling.

Planning for the Future

Changes to the Aviation and Transportation Security Act, airport expansion, policy changes and system upgrades are just some of the circumstances that can affect an existing or planned implementation of a key control and management system. Several options and design variations are available to customize a solution and help protect the airport’s investment as needs grow and change.

Lockers. It’s not just bottles of perfume or electronic cigarettes that are confiscated at TSA airport checkpoints. Guns, knives and other banned weapons are also found and must be held in a secure lock-up. Today’s key control and asset management systems provide the answer with integrated locker systems.

Vital documents, cash, employee badging/access control cards, data drives and even small electronic gear can also be controlled and secured using asset management lockers. The locker systems are identical in function to key control systems; users can access items only from the lockers/modules for which they have been pre-authorized and any activity such as removing or returning items or opening lockers/modules is automatically recorded, creating an audit trail.

Custom solutions. From single key cabinets to those used for securing hundreds of keys, solutions for airport key security, key control and key management can be tailored to a variety of needs. Smart, tamper-proof designs help keep space requirements small, and systems can be optionally accessed with pass codes, access cards or biometrics.

Hundreds of key control and management systems are already installed and in use at airports around the world, providing tangible benefits and supporting airport management in the achievement of safety and operational goals. As described above, in some of these installations, further enhancing integration with related systems could provide further improvements and benefits. In either case, for both new airport installs or enhancements, administrators can be confident that they are not only improving their local security posture but also thereby improving the safety of the entire global air transport system.

This article originally appeared in the September 2015 issue of Security Today.


  • Survey: Less Than Half of IT Leaders are Confident in their IoT Security Plans

    Viakoo recently released findings from its 2024 IoT Security Crisis: By the Numbers. The survey uncovers insights from IT and security executives, exposes a dramatic surge in enterprise IoT security risks, and highlights a critical missing piece in the IoT security technology stack. The clarion call is clear: IT leaders urgently need to secure their IoT infrastructure one application at a time in an automated and expeditious fashion. Read Now

  • ASIS International and SIA Release “Complexities in the Global Security Market: 2024 Through 2026”

    ASIS International and the Security Industry Association (SIA) – the leading security associations for the security industry – have released ”Complexities in the Global Security Market: 2024 Through 2026”, a new research report that provides insights into the equipment, technologies, and employment of the global security industry, including regional market breakouts. SIA and ASIS partnered with global analytics and advisory firm Omdia to complete the research. Read Now

  • President Biden Issues Executive Order to Bolster U.S Port Cybersecurity

    On Wednesday, President Biden issued an Executive Order to bolster the security of the nation’s ports, alongside a series of additional actions that will strengthen maritime cybersecurity and more Read Now

  • Report: 15 Percent of All Emails Sent in 2023 Were Malicious

    VIPRE Security Group recently released its report titled “Email Security in 2024: An Expert Look at Email-Based Threats”. The 2024 predictions for email security in this report are based on an analysis of over 7 billion emails processed by VIPRE worldwide during 2023. This equates to almost one email for everyone on the planet. Of those, roughly 1 billion (or 15%) were malicious. Read Now

Featured Cybersecurity


New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3