What are the seven main categories of access control?

Posted by Comporium Business Services on Oct 19, 2020 2:20:21 PM

What are the seven main categories of access control featured image

Having the ability to control who comes into your building at any point in time is important for the safety and health of employees, as well as the business itself. There are several different types of access control solutions, each serving a different need.

Here are the seven main categories of access control.

1. Directive

Directive access control is deployed to encourage compliance with security policies. When a plan is put into place, directive access control helps guide or reinforce those policies. Some examples include security guards, guard dogs, escape route exit signs, work task procedures, and awareness training.

2. Deterrent

While directive access control actively encourages compliance, deterrent access control discourages violations. Deterrent access control solutions are used to exact consequences in the event of noncompliance. Examples include security badges, mantraps, security cameras, trespass or intrusion alarms, auditing, and firewalls.

3. Preventative

A preventative access control helps deter unwanted or unauthorized activity from occurring. Whether it’s a fence, lock, antivirus software, or alarm system, preventative measures block a wide range of potential intrusions before they can cause harm.

4. Detective

A detective access control brings light unauthorized activity. Often detective controls are after-the-fact controls rather than real-time controls. Motion detectors, security cameras, and intrusion detection systems all help detect breaches of security policies.

5. Corrective

Access control helps to restore systems following unauthorized activity. These control solutions include tighter security policies, business continuity planning, and any other retroactive measures following a breach.

6. Compensating

A compensation access control aid in the enforcement and support of a security policy. These solutions are often implemented in place of other types of access control that can’t be deployed. Examples include personnel supervision, monitoring, and work task procedures.

7. Recovery

Access control is deployed to restore functions after a security violation takes place. These controls are often more advanced than other solutions, actively repairing damage while helping to prevent further harm. Some examples include backups and database shadowing.

Comporium Access Control Solutions
If you’re looking to protect your business with an access control system, Comporium can help. We provide security solutions for small, medium and large organizations, helping to keep your team and business safe. With a customized security system, we can address your unique business needs. To learn more, visit www.business.comporium.com or call (888) 740-5307 and schedule an appointment.


Topics: business security, Access Control

Subscribe to our newsletter