Digital Transformation is knocking on your front door. Apartment buildings and offices have highly permissive entrance doorways, with many more users than just a buildings’ occupants. Maintenance teams, cleaners, delivery people, emergency responders and property owners need access to shared spaces, yet with more keys issued, it is harder to maintain trust in the system and prevent, detect, or deter abuse of privilege. This was always the case with mechanical and electronic locks and now internet connected door locks present new challenges and introduce cyber-physical risks. Trust is the top priority for digitally transforming door access control and – when implemented with proven digital identity and distributed integrity technologies – can vastly improve outcomes and user experiences for all.
Connected locks must be installed and commissioned by building owners, and this is just the beginning - cyber-security must be maintained throughout their lifetime. Proof that locks are cyber-secure and up-to-date is key to building trust in physical security, whether performed by owners, equipment vendors or sub-contracted to third-party managed service providers.
Access tokens can be linked to static, offline devices such as RFID fobs or mag-stripe cards, more sophisticated chip-based smart cards capable of challenge-response authentication or connected mobile apps storing credentials in secure enclaves. Understanding which is used and its trust level can help speed access control decisions.
Residents or workers need tokens that allow continual access yet preserve privacy. With such high privilege, issuance of these tokens must be highly validated and logged.
Apartment owners that participate in the sharing or rental economy may wish to temporarily delegate access to guests. Access tokens should expire when no longer needed.
Delivery people need access during reasonable hours with least privilege necessary to do their job – for example only allowing access to front doors, elevators and mail rooms. Which card was used where should be logged for traceability and audit. Tokens would be issued and revoked by a trusted third party.
Emergency Service personnel need access tokens for all communal areas of many buildings at any time. Usage must be restricted to buildings only within the services’ jurisdiction and usage logged for traceability and audit. Tokens would be issued by government bodies.
Download the Solution Brief to find out why Digital Transformation with Connected Things Needs Security Twins
Jitsuin channel partner Wavestone delivered a trusted solution architecture built on Security Twins that boosted digital transformation while managing risks introduced by connected things.
Copyright © 2020 Jitsuin - All Rights Reserved.