

Access control
Access control makes it possible to determine who, when and where an individual is authorised to enter an area or not. The main objective is to protect people, property and company data from intrusions and malicious acts.
Access control: the key to security
Controlling inputs and outputs
An access control system can be used to restrict entry to a location (physical control) or a computer system (logical control) to a certain number of identified people.
This filtering is possible both at the entrance and exit of a building and in the various areas of the site. This can be based on the identity of the person (employees, visitors, suppliers, etc.) and other criteria such as the time of day (all the time, at certain times of the day and/or night), etc.
-
- Protect employees from malicious intrusion
- Protect assets and production tools (theft, fire)
.
-
- Limit access to sensitive or restricted premises
- Know everyone on site in real time to generate a list in the event of a fire or accident
- Monitor attendance time and movements for statistical purposes and security audits
.
* Whatever the purpose of access control, this system allows you to locate and identify a danger so you can react as quickly as possible and make the best decisions.
Need an access control system? Multi-expertise solutions from the DEF Network
Contact usHow does an access control system work?
There are currently four categories of access control system: mandatory (applies to everyone), discretionary (certain people have specific authorisations at the administrator’s discretion), based on people’s roles and based on rules defined by the administrator.

If we are thinking more specifically of keys, badges, or even security agents to filter passers-by, several technologies are possible:
|
.
|
3 control steps for door opening
An access control system proceeds in three stages:
- Authentication: when users present their badge (or any other piece of identification), the system compares the proof of identity with its database.
- Authorisation: the system checks whether the person has the necessary rights to access the requested location and, if so, grants entry authorisation.
- Traceability: as each access request is recorded, the system can track the movements of people within the company.
Obligations and standards
Access control obligations and standards
Installing an access control system is compulsory for Operators of Vital Importance (OVI) and the agri-food sector (subject to the IFS Food standard). For other sectors, the installation of access control is a matter for the head of the establishment to decide.
In all cases, access control is one of the most important security levers in a building. It is recommended for use in sensitive areas such as education, finance and banking, energy, data centres, healthcare, etc.
The law and regulations
Access control systems are governed by several laws…
- Labour Code (Articles L 120-2, L121-8 and L 432-2-1- and Code Civil (article 9)
- Through the European text RGPD, the CNIL frames the main rules for data processing and retention.
… as well as guidelines for use…
- The ANSSI Guide
- The APSAD D83 standard issued by the CNPP
… and norms.
- ISO 27 001 standard on global information systems security
- Norm NS-42 for conventional access control use (excluding biometrics)
Access control for your home in 5 stages
When it comes to access control systems, there are as many solutions as there are requests. Because every situation is different, depending on the sector, regulatory requirements and customer expectations, the system is installed in 5 stages, allowing it to be tailor-made.
-
Risk diagnosis and analysis
Description of requirements, risk analysis and definition of intrusion scenarios, zoning, prioritisation of actions, definition of resources to be implemented.
-
Technical study and estimate
Drawing up of specifications. Choosing the equipment best suited to your needs and budget. Proposal for an estimate.
-
Declaration to the CNIL
Before any implementation, it is necessary to sign a compliance undertaking for the project and to obtain a favourable opinion from the CNIL.
For biometric access control, a data protection impact assessment and a specific authorisation request are required.
-
Installation
Design of the solution in the workshop. Equipment installation and commissioning. User training.
-
Maintenance
Preventive and corrective maintenance by a qualified and certified service provider. Remote or on-site troubleshooting.
DEF Sûreté, your DEF Network access control expert
DEF Sûreté has specialised in the installation and maintenance of electronic security systems for over 30 years. It can work with you on a simple access control system (single-site) or a complex centralised system (multi-site).
DEF Sûreté manages the solutions of the main manufacturers on the market and the most widespread reading technologies (MIFARE, DESFire, SEOS, etc.). Thanks to this multi-brand approach and our proven expertise in locksmithing, we can offer comprehensive solutions tailored to everyone’s needs and problems.

|