5.1 Physical Security & Access Control
Physical security in an electronics manufacturing environment is not limited toabout theft prevention; it is theabout primary firewall for Intellectual Property (IP) protection and client data integrity. A breach in physical security compromisespreserving the "Chain of Custody" for high-valueclient componentsIntellectual and violates non-disclosure agreementsProperty (NDAs)IP). ThisA chapterbreach defineshere compromises not just inventory, but the mandatorycontractual integrity of the entire operation. Treat facility access controlas architecture,a surveillancelayered standards,filtration andsystem—each assetzone protectionrequires protocolsa requiredhigher authentication friction to maintainenter, TAPAensuring (Transportedonly Assetvalidated Protectionpersonnel Association)interact andwith ISOsensitive 27001 compliance.assets.
Access Control Architecture (Zoning)
FacilityDefine accessyour is governedfacility by arisk, tierednot zoningby system.department. Movement between zones must be physically restricted and electronicallydigitally logged.
- Zone 1: Public/
AdministrativeAdmin (Lobby, Offices)AccessAccess::Standard RFIDbadge.Badge.VisitorIfMandateVisitor/Contractor arrives -> Then:All non-employees must sign NDAs and wear distinctIssue "Visitor"EscortbadgesRequired" badge (Red/Yellow).- Constraint:
visibleVisitors must remain within 2 meters of their host at all times.Visitors must be escorted 100% of the time by badged personnel.
- Constraint:
- Zone 2:
GeneralProduction Floor (SMT Lines,SMT, Assembly)AccessAccess::RFID Badge + Anti-Passbackenforcement.logic.Barrier:Physics:Full-heightAnti-passbackturnstilespreventsoraairlockbadgedoorsfrom entering twice without an exit scan, stopping "Tailgating" where one badge grants entry topreventmultiple"tailgating."Log Retention: Access logs must be retained forpeople.12 months.
- Zone 3: Restricted (Server Room, High-Value Cage)
AccessAccess::Multi-Factor Authentication (MFA).required. This consists ofRFID Badge + BiometricScan(Fingerprint/Iris).- Rule:
(FingerprintNoorsingleIris).credential is sufficient for high-risk assets. Door
:Pro-Tip: Doors must be fail-secure (remain locked upon power loss, barring fire code overrides) and equipped withInstall door contact sensors on all perimeter and Zone 3 doors. Program the access control system to trigger alarmsa "Door Forced / Door Propped" alarm if proppedthe contact remains open for > 30 seconds.seconds.
Video Surveillance (CCTV) Standards
TheCameras CCTV infrastructure providesare forensic auditabilitytools, fornot safetylive incidentsmonitors. andTheir assetvalue tracking.lies in the ability to reconstruct an event frame-by-frame.
CoverageIfMandates:Entries/Exits:Area100%iscoverage of all perimeter doors and internal zone transitions with facial identification clarity.
DocksDock / Entry:Cameras-> Then Camera must capturelicensefacialplatesIDofandallLicenseincoming/outgoing vehicles.Plates.Production Lines: Wide-angle coverage of SMT lines to verify machine utilization and operator presence.
ResolutionIf:MinimumArea is1080pHigh Value (2MP)The Cage)for->generalThenareas;Resolution must be 4K (8MP) to capture part numbers on labels.- Retention: Store footage for
high-value counting areas. Frame Rate: Minimum15≥FPS90 Days(Frames Per Second).Retention: Footage must be storedonredundantRAIDarraysarrays. A 30-day loop is insufficient forainvestigatingminimuminventoryofshrinkage90discovereddaysduringbeforequarterlyoverwrite.audits.
- Retention: Store footage for
IP Protection & Imaging Policy
To protect client designs, the control of image capture devices is strictly enforced.
Restricted Imaging Zones: Photography and video recording are strictly prohibited on the production floor ("Red Zone") without written authorization from the Plant Manager.Personal Devices: Personal smartphones and cameras are banned from Zone 2 (Production) and Zone 3 (Restricted). They must be stored in lockers located in Zone 1.CCTV Privacy Masks: Security cameras must be angled or digitally masked to prevent recording contents of computer monitors displaying CAD data, schematics, or BOMs.
High-Value Asset Storage ("The Cage")
Components classified as High-Value (e.g., CPUs, FPGAs, Memory)and mustMemory bemodules storedrepresent dense value. Store them in a segregated, physical enclosure knownthat asis "Theharder Cage."to breach than the facility itself.
PhysicalIfStructure: The enclosure must be floor-to-ceiling chain-link or mesh steel to prevent unauthorized reaching or climbing.Inventory Control:Cycle Counts: Mandatory daily cycle count of top 10 value SKUs.Transaction Logs: All items entering or leavingAccessing The Cagemust->beThenelectronicallyEnforcescanned.theManual logbooks are insufficient.- Two-Person Rule
:.- Logic:
AccessTwo badges must scan simultaneously toThereleaseCagethe lock. This forces collusion, significantly raising the barrier forinventoryinternaladjustmenttheft.
- Logic:
- If
requiresInventorytwoisauthorizedTopemployees10toValuebadgeSKUs -> Then Perform Daily Cycle Count.- Action: Resolve discrepancies before the shift ends.
IP Protection & Imaging
- If entering Zone 2 (Production) -> Then Personal smartphones and cameras are Strictly Prohibited.
- Action: Store devices in
simultaneously.Zone 1 lockers.
- Action: Store devices in
- If CCTV views Monitors -> Then Apply Privacy Masks.
- Requirement: Cameras must not record CAD data, schematics, or BOMs displayed on screens.
Final Checklist
Security LayerParameter
LimitMetric /MandateRuleCritical State
Zone 2 Access
AuthenticationLogicBadge +Anti-Passback ActiveZone 3 Access
AuthenticationCredentialBadgeBiometric +BiometricBadgeCCTV Retention
DataStorageRetentionDuration>≥ 90 DaysCCTVDoor AlarmsResolutionPropped Time>1080pIP<ProtectionPersonal30PhonesBanned in Zone 2/3SecondsThe Cage
AccessEntry ProtocolTwo-Person Rule
ThePersonalCageDevicesInventoryZoneFreq.2 StatusDailyBanned(Top/10 SKUs)LockersPerimeterVisitor PolicyDoor Propped AlarmSupervision>30100%SecondsEscort