Skip to main content

The following is a potential plan for the deployment of the Access Control System.

Introduction

Scope

The scope of work for this initiative is to support the [[Security System Brief]]. Essentially:

  • Design an Access Control solution for the level 7, 25 Victoria Street location
  • Provide a plan for others to follow around the physical cabling and install of hardware at the location
  • Provide assistance to Project Managers onsite for the delivery of services
  • Implement the technical as-built design and deployment of policies on the Access Controller
  • Deploy configuration to the Access Controller when installed by others
  • Train SE staff on the use of the system
  • Document a process for adding new users and visitors including card management
  • Handover the design and build to SE internal teams.

Approach

  • Install external security first - secure the perimeter
  • Install new cabling if existing cabling is not to code / standard
  • Phased approach to achieve milestones:
    • Determine scope
    • Procure equipment / suppliers
    • Secure external perimeter
    • Install cameras
    • Install additional doors and services
    • Decommission old equipment
    • Document, test and handover

Principles

  • Reuse existing cabling for keypads and latches / door position sensors if these meet the required standard.
  • Use existing cabling for access points or cameras if these meet standards.

Assignment Model

We will use the RASI model to determine the assignment of actions and tasks.

RASI Model

We will use the shorted RASCI model called RASI, which stands for:

R - Responsible
A - Accountable
S - Supportive
I - Informed

Stakeholders

The follow are the list of the key stakeholders:

NameInitialsRole
William TonkinWTPrimary Stakeholder
David HinkleyDHProject Owner
Electrical ContractorECContractor
Tim JacksonTJContractor / Adviser
James WinskillJWProject Advisor
Chris McKenzieCMOperational Consultant

Design

Hardware Components

The access service comprises of a number of physical components:

ComponentDescriptionDetails
img-2cf5d839b087df41f4a42ede55724a10
img-de145e9341245c20110502928d684325
img-4bb1e330da71a154b73c5a703093151b
img-3e3176f79d4c69c6d40337dfacc4b7d1
img-30b35f4b7f62c581eb1ed694f5de8d89
img-87e8b750ad3d93a9404701e8d5a875f4
img-c46a3370feacc24a8f0413b0a1ffd280
img-d4183d7820c1a9850165ffd753d94012
img-e867a24b93eb47a59ae1d3586e8b6a27

Plan

Activities

The following list is a set of activities required to undertake the scope of the project.

General Accountabilities:

As a rule of thumb:

  • Cabling and building fit out: Electrical Contractor
  • Power termination and cable management: Electrical Contractor
  • Cabling between previous access system and new system: Electrical Contractor
  • Termination and mounting of new Access Control hardware: Electrical Contractor / Builder
  • Cable testing and procurement of cabling: Electrical Contractor
  • Certification and Sign off of network / power: Electrical Contractor
  • Decommissioning of legacy hardware: Electrical Contractor
  • Configuration / Testing: Tim Jackson / Chris M
TaskDescriptionEffortRASI
Scope
AuditAudit the current environment and document the cabling and electrical connectionsTJ / ECCMDH
ScopeDetermine the project scope for the elements that are needed.TJ / ECDHWT
Sign off ScopeSign off on the scope of works and approve the spend in terms of a budget.WTDHTJ / EC
QuoteDetermine the new cabling and environment post the auditECTJ
Approve QuoteApprove the quotationWTDHTJ / EC
ProcurementProcure the required equipment and cabling to undertake the projectTJ / ECDH
Access Control
Install Access Control HubInstall the access controller on wall in secure comms area. Install power and conduit for access cabling and UTP for keypads.EC
Cable KeypadsInstall Cat6a cable into walls near to the positions for on wall access readers. Reuse existing cabling if possible, or use as a draw wire for newer Cat6a if required.EC
Install G2 Readers in External DoorsMount the new G2 panels on the wall and connect to cabling via RJ45.EC
Install Cabling for Intercom PanelsIntercom panels will be positioned by the entrance doors to view visitors and allow entry from within the office.EC
Install Intercom PanelsConnect and securely mount the panels on the wall and connect to cabling.EC
Unifi UDM Install
Install ControllerInstall the UDM Pro in network rack - connect to power and network.CMTJ
Commission Controller on networkProvision the controller with static IP address and register against SE domain.CMTJ
Install NVR RAIDInstall NVR disks into chassis and provision as RAID0.TJCM
Provision ApplicationsInstall Network, Protect and Access onto UDM.TJCM
Adopt KeypadsIn the UDM Protect - adopt the keypads and provision the configuration to these.TJCM
Commission AccessAllocate door latching, door position and keypad to each of the entranceways.TJCM
Decommission Legacy System
Remove existing door strike cables from old systemPhysically remove these from the old system, relocate these to the appropriate section in the new Access HubECTJ
Remove existing Door Position Sensors from old systemPhysically remove these from the old system, relocate these to the appropriate section in the new Access HubECTJ
Power off existing systemPower off once all connections have been disconnected. Notify PM.ECTJ
Test External AccessWith the door latches and door position sensors physically connected to each section of the Access Hub, testing can occur.ECTJ
Commission Internal Doors
Cable KeypadsRoute required Cat6a cable between keypad area and the Access Hub. Terminate with RJ45 at each end.ECTJ
Cable LatchesUsing the appropriate AUG 18-22 cable - route from cable latch location to Access Hub.ECTJ
Install LatchesInstall physical hardware into door frame and connect to cable.ECTJ
Install Door Position SensorsDrill new position sensors into frame and door. Connect to cabling.ECTJ
Install KeypadsInstall the G2 door keypads onto the cables via the RJ45 and securely mount on the wall.ECTJ
Connect to AccessConnect the required door latch, door position sensors and keypads to the Access HubECTJ
Adopt DoorsIn the Access Application on the UDM - create new doors and assign Access Hub section to doorsTJCM
TestValidate the operation of the door against test plan.EC / CM /TJDH
Cameras
Install Cabling for CamerasProvision Cat6a cabling between camera locations and terminate with RJ45 plugs at each end. Plug into camera and the other end into the UDM for PoE. Connect ports 1-4 for this.EC
Install Cameras in CeilingInstall the camera, and ensure it is aligned correctly to monitor the area correctly.ECTJ / CM
Install Camera in ProtectAdopt the camera in Protect and label correctly with the location and settingsTJCM
Identity
Install IdentityInstall the Identity application on the UDM.TJCM
Create Entra ApplicationIn Entra, create the SAML application to secure connections between the UDM and Entra directory services.CMTJ
Bind Entra Identity to UDM IdentityUsing the Client ID and Secret provision the link.CMTJ
Create Entra groups for Physical LocationCreate new Entra groups for the physical access as per the design.CMTJ
Assign Users to GroupsAssign the appropriate users to these groups so they inherit the physical access.CMTJ
Bind Groups to Unifi Identity and Sync UsersIn the UDM, assign the groups to the RBAC controls on the platform.CMTJ
Create Admin UsersEnsure local admin accounts are available.CMTJ
Create RBAC Groups / AssignEnsure all RBAC groups are assigned to local access permissions.TJCM
Assign Contractor CardsCreate and assign contractors with cards to enable access to the service during construction.CMTJ
Test Card / Visitor allocationTest the process of creating a visitor, and allocating a secure access pass.CMTJDH
Document ProcessDocument the process of allocating visitors to cards. Handover to internal teams.TJCMDH
Policies
Create Access PoliciesReferencing the decisions captured in the design - create the required policies for access users.TJCM
Create SchedulesCreate schedules captured in the design.TJCM
Create Camera RecordingCreate the recording policies and quality.TJCM
Create Recording Archive PoliciesCreate the archive policies as required for any regulation or business policy.TJCM
Assurance
Enable LoggingEnabled logging to Syslog server. NOTE: Syslog server configuration is not inscope.TJCM
Enable NotificationsEnable webhooks and notifications actions based on the design.TJCM
TestTest logging and notifications.CMTJ
Handover
Provide documents and test reportsTJDHWT