Skip to main content

5.1 Physical Security & Access Control

Physical security in an electronics manufacturing environment is not limited toabout theft prevention; it is theabout primary firewall for Intellectual Property (IP) protection and client data integrity. A breach in physical security compromisespreserving the "Chain of Custody" for high-valueclient componentsIntellectual and violates non-disclosure agreementsProperty (NDAs)IP). ThisA chapterbreach defineshere compromises not just inventory, but the mandatorycontractual integrity of the entire operation. Treat facility access controlas architecture,a surveillancelayered standards,filtration andsystem—each assetzone protectionrequires protocolsa requiredhigher authentication friction to maintainenter, TAPAensuring (Transportedonly Assetvalidated Protectionpersonnel Association)interact andwith ISOsensitive 27001 compliance.assets.

Access Control Architecture (Zoning)

FacilityDefine accessyour is governedfacility by arisk, tierednot zoningby system.department. Movement between zones must be physically restricted and electronicallydigitally logged.

  • Zone 1: Public/AdministrativeAdmin (Lobby, Offices)
    • AccessAccess:: Standard RFID badge.Badge.
    • VisitorIf MandateVisitor/Contractor arrives -> Then: All non-employees must sign NDAs and wear distinctIssue "Visitor"Escort badgesRequired" badge (Red/Yellow).
      • Constraint: visibleVisitors must remain within 2 meters of their host at all times. Visitors must be escorted 100% of the time by badged personnel.
  • Zone 2: General Production Floor (SMT Lines,SMT, Assembly)
    • AccessAccess:: RFID Badge + Anti-Passback enforcement.logic.
    • Barrier:Physics: Full-heightAnti-passback turnstilesprevents ora airlockbadge doorsfrom entering twice without an exit scan, stopping "Tailgating" where one badge grants entry to preventmultiple "tailgating."
    • Log Retention: Access logs must be retained for people.12 months.
  • Zone 3: Restricted (Server Room, High-Value Cage)
    • AccessAccess:: Multi-Factor Authentication (MFA). required. This consists of RFID Badge + Biometric Scan(Fingerprint/Iris).
    • Rule: (FingerprintNo orsingle Iris).credential is sufficient for high-risk assets.
    • Door
Hardware

:Pro-Tip: Doors must be fail-secure (remain locked upon power loss, barring fire code overrides) and equipped withInstall door contact sensors on all perimeter and Zone 3 doors. Program the access control system to trigger alarmsa "Door Forced / Door Propped" alarm if proppedthe contact remains open for > 30 seconds.seconds.

Video Surveillance (CCTV) Standards

TheCameras CCTV infrastructure providesare forensic auditabilitytools, fornot safetylive incidentsmonitors. andTheir assetvalue tracking.lies in the ability to reconstruct an event frame-by-frame.

  • CoverageIf Mandates:
    • Entries/Exits:Area 100%is coverage of all perimeter doors and internal zone transitions with facial identification clarity.
    • Loading DocksDock / Entry: Cameras-> Then Camera must capture licensefacial platesID ofand allLicense incoming/outgoing vehicles.Plates.
    • Production Lines: Wide-angle coverage of SMT lines to verify machine utilization and operator presence.
  • Technical Specifications:
    • ResolutionIf: MinimumArea is 1080pHigh Value (2MP)The Cage) for-> generalThen areas;Resolution must be 4K (8MP) to capture part numbers on labels.
      • Retention: Store footage for high-value counting areas.
      • Frame Rate: Minimum 15 FPS90 Days (Frames Per Second).
      • Retention: Footage must be stored on redundant RAID arraysarrays. A 30-day loop is insufficient for ainvestigating minimuminventory ofshrinkage 90discovered daysduring beforequarterly overwrite.audits.

    IP Protection & Imaging Policy

    To protect client designs, the control of image capture devices is strictly enforced.

    • Restricted Imaging Zones: Photography and video recording are strictly prohibited on the production floor ("Red Zone") without written authorization from the Plant Manager.
    • Personal Devices: Personal smartphones and cameras are banned from Zone 2 (Production) and Zone 3 (Restricted). They must be stored in lockers located in Zone 1.
    • CCTV Privacy Masks: Security cameras must be angled or digitally masked to prevent recording contents of computer monitors displaying CAD data, schematics, or BOMs.

    High-Value Asset Storage ("The Cage")

    Components classified as High-Value (e.g., CPUs, FPGAs, Memory)and mustMemory bemodules storedrepresent dense value. Store them in a segregated, physical enclosure knownthat asis "Theharder Cage."to breach than the facility itself.

    • PhysicalIf Structure: The enclosure must be floor-to-ceiling chain-link or mesh steel to prevent unauthorized reaching or climbing.
    • Inventory Control:
      • Cycle Counts: Mandatory daily cycle count of top 10 value SKUs.
      • Transaction Logs: All items entering or leavingAccessing The Cage must-> beThen electronicallyEnforce scanned.the Manual logbooks are insufficient.
      • Two-Person Rule:.
        • Logic: AccessTwo badges must scan simultaneously to Therelease Cagethe lock. This forces collusion, significantly raising the barrier for inventoryinternal adjustmenttheft.
      • If requiresInventory twois authorizedTop employees10 toValue badgeSKUs -> Then Perform Daily Cycle Count.
        • Action: Resolve discrepancies before the shift ends.

      IP Protection & Imaging

      • If entering Zone 2 (Production) -> Then Personal smartphones and cameras are Strictly Prohibited.
        • Action: Store devices in simultaneously.Zone 1 lockers.
      • If CCTV views Monitors -> Then Apply Privacy Masks.
        • Requirement: Cameras must not record CAD data, schematics, or BOMs displayed on screens.

      Final Checklist

      Security Layer

      Parameter

      LimitMetric / MandateRule

      Critical State

      Zone 2 Access

      AuthenticationLogic

      Badge + Anti-Passback Active

      Zone 3 Access

      AuthenticationCredential

      BadgeBiometric + BiometricBadge

      CCTV Retention

      DataStorage RetentionDuration

      >90 Days

      CCTVDoor Alarms

      ResolutionPropped Time

      >1080p

      IP< Protection

      Personal30 Phones

      Banned in Zone 2/3Seconds

      The Cage

      AccessEntry Protocol

      Two-Person Rule

      ThePersonal CageDevices

      InventoryZone Freq.2 Status

      DailyBanned (Top/ 10 SKUs)Lockers

      PerimeterVisitor Policy

      Door Propped AlarmSupervision

      >30100% SecondsEscort