Index

APPENDIX G

PHYSICAL SECURITY STANDARDS

A. Vault and Secure Room Construction Standards

1. Vault

2. Secure Room

B. Intrusion Detection System (IDS) Standards

1. An IDS must detect an unauthorized penetration in the secured area. An IDS complements other physical security measures and consists of the following:

2. System Functions

3 Threat, Vulnerability and Acceptability

4. Transmission and Annunciation

5. System Requirements

6. Installation, Maintenance and Monitoring

C. Priorities for Replacement of Locks

[Priorities range from 1 to 4, with 1 being the highest and 4 the lowest.]

Lock Replacement Priorities

In the United States and Its Territories

ITEM

TS/SAP

TS

S/SAP

S-C

Vault Doors

1

1

3

4

Containers (A)

3

4

4

4

Containers (B)

1

1

1

2

Crypto

1

1

2

2


Lock Replacement Priorities

Outside the United States and Its Territories

ITEM

TS/SAP

TS

S/SAP

S-C

Vault Doors

1

1

2

2

Containers (A)

2

2

3

3

Containers (B)

1

1

1

2

Crypto

1

1

2

2

High Risk Areas

1

1

1

1



D. Access Controls

1. Access Controls

The perimeter entrance should be under visual control at all times during working hours to prevent entry by unauthorized personnel. This may be accomplished by several methods (e.g., employee work station, guard CCTV). Regardless of the method used. an access control system shall be used on the entrance. Uncleared persons are to be escorted within the facility by a cleared person who is familiar with the security procedures at the facility-

a. Automated Entry Control Systems: An automated entry control system may be used to control admittance during working hours instead of visual control, if it meets the AECS criteria stated in subparagraphs 1.a., and 2., below. The automated entry control system must identify an individual and authenticate the person's authority to enter the area through the use of an identification (ID) badge or card.

2. In conjunction with subparagraph 1.a.(1), above, a personal identification number (PIN) may be required. The PIN must be separately entered into the system by each individual using a keypad device and shall consist of four or more digits, randomly selected, with no known or logical association with the individual. The PIN must be changed when it is believed to have been compromised or subjected to compromise.

3. Authentication of the individual's authorization to enter the area must be accomplished within the system by inputs from the ID badge/card, the personal identity verification device, or the keypad with an electronic database of individuals authorized to enter the area. A procedure must be established for removal of the individual's authorization to enter the area upon reassignment, transfer, or termination, or when the individual's access is suspended, revoked, or downgraded to a level lower than the required access level

4. Protection must be established and maintained for all devices or equipment which constitute the entry control system. The level of protection may vary depending upon the type of device or equipment being protected.

5. Access to records and information concerning encoded ID data and PINs shall be restricted. Access to identification or authorizing data, operating system software or any identifying data associated with the entry control system shall be limited to the fewest number of personnel as possible. Such data or software shall be kept secure when unattended.

6. Records shall be maintained reflecting active assignment of ID badge/card, PIN, level of access, and similar system-related records. Records concerning personnel removed from the system shall be retained for 90 days. Records of entries shall be retained for at least 90 days or until investigations of system violations and incidents have been investigated, resolved and recorded.

7. Personnel entering or leaving an area shall be required to secure the entrance or exit point. Authorized personnel who permit another individual to enter the area are responsible for confirmation of need to know and access. The Heads of DoD Components may approve the use of standardized AECS which meet the following criteria:

8. Electric, Mechanical, or Electromechanical Access Control Devices. Electric, mechanical, or electromechanical devices which meet the criteria stated below may be used to control admittance to secure areas during duty hours if the entrance is under visual control. These devices are also acceptable to control access to compartmented areas within a secure area. Access control devices must be installed in the following manner: