HID prox cards are used to provide security for physical and virtual assets of an organization. With the correct use of access control systems, the companies confidential areas can be tightly controlled from unauthorized users.
When implementing an access control system, it is important that the processes set in place facilitate the desired security levels. One of the places in the security process that is vulnerable is the HID prox card. Without proper handling and clear procedures, the card will not provide the security measures needed. For success with these cards, the following recommendations are provided for your review.
1. Make sure that old prox cards are voided immediately. If not voided, an unauthorized person could locate and use the card.
2. Authorize cards upon inital issuance. If cards are pre-validated and spare, the card can be used inappropriately.
3. Investigate situations where access is denied with a non standard denial response. “Card out of range”, “unrecognized,” and other responses indicating incorrect facility codes and formats indicate an illegally obtained card may have been used to attempt access.
4. Use security mechanisms on the card, such as a hologram, to discourage tampering with the card and increasing security levels.
5. Use RFID shield devices when appropriate.
6. Advise card holders to display their badge only when on company property.