Alarm and electronic security systems - Part 11-2: Electronic access control systems - Application guidelines

IEC 60839-11-2:2014 defines the minimum requirements and guidance for the installation and operation of electronic access control systems (EACS) and/or accessory equipment to meet different levels of protection. This standard includes requirements for planning, installation, commissioning, maintenance and documentation for the application of EACS installed in and around buildings and areas. The equipment functions are defined in IEC 60839-11-1.

Systèmes d'alarme et de sécurité électroniques - Partie 11-2: Systèmes de contrôle d'accès électronique - Lignes directrices d'application

L'IEC 60839-11-2:2014 définit les exigences et les lignes directrices minimales concernant l'installation et le fonctionnement des systèmes de contrôle d'accès électronique (EACS) et/ou des équipements annexes pour satisfaire à différents niveaux de protection. La présente norme inclut des exigences en matière de planification, d'installation, de mise en service, de maintenance et de documentation pour l'application d'EACS installés à l'intérieur et autour des bâtiments et des zones. Les fonctions des équipements sont définies dans l'IEC 60839-11-1.

General Information

Status
Published
Publication Date
23-Jul-2014
Drafting Committee
WG 11 - TC 79/WG 11
Current Stage
PPUB - Publication issued
Start Date
31-Aug-2014
Completion Date
24-Jul-2014

Overview

IEC 60839-11-2:2014 is an international standard published by the International Electrotechnical Commission (IEC) that provides comprehensive application guidelines for Electronic Access Control Systems (EACS). As part of the IEC 60839 series focused on alarm and electronic security systems, this part specifically addresses the minimum requirements for the installation, planning, operation, maintenance, and documentation of EACS used in and around buildings and secured areas.

The standard aims to help organizations implement secure, reliable, and compliant access control solutions tailored to various protection levels. It supports system integrators, security planners, and maintenance personnel with best practices to enhance access security, ensure operational integrity, and comply with international norms.

Key Topics

  • System Architecture
    IEC 60839-11-2 outlines typical EACS components and interfaces, guiding the design and physical arrangement of hardware to optimize security and functionality.

  • Environmental and EMC Considerations
    The standard defines classification for equipment installation environments, ranging from indoor office settings to outdoor harsh conditions, and specifies electromagnetic compatibility (EMC) requirements to ensure system robustness.

  • Planning and Risk Assessment
    A critical aspect is the risk-based approach to security grading, where the system's protection level is aligned to identified threats and vulnerabilities through structured risk assessment.

    • Security grades define tailored requirements depending on factors such as potential intruder knowledge and tools.
    • Guidance on system and component selection reflects the security grade and operational conditions.
  • Installation and Cabling
    Best practices outline equipment positioning, cabling standards, and installation sequencing to maximize effectiveness and minimize vulnerabilities.

  • Commissioning and Handover
    The standard emphasizes thorough commissioning protocols and documentation to verify installed systems meet design intentions before operational use.

  • Operation and Maintenance
    IEC 60839-11-2 recommends proactive maintenance scheduling and operation procedures to sustain security effectiveness throughout the system lifecycle.

  • Documentation
    Clear, comprehensive documentation covering planning, commissioning, and maintenance stages supports system transparency, traceability, and compliance.

  • Allowed Exceptions and Battery Capacity
    Annexes provide specific tolerances and methods for backup power calculation to ensure continuous system performance.

Applications

IEC 60839-11-2:2014 is applicable for a wide range of electronic access control implementations including:

  • Commercial Buildings – Office complexes requiring graded access control levels aligned with risk profiles.
  • Residential Facilities – Multi-unit housing with controlled public access areas.
  • Industrial Sites – Areas requiring strict perimeter security with tailored electronic access measures.
  • Critical Infrastructure – Secure government, healthcare, or utility facilities with high assurance requirements.
  • Public Venues – Airports, stadiums, and transport hubs employing complex access control integrations.

The standard supports the deployment of access control systems that provide scalable security, improve operational efficiency, and comply with international best practices ensuring interoperability and safety.

Related Standards

  • IEC 60839-11-1: Electronic access control systems – System and components requirements
    Defines the functional and performance requirements of EACS components, complementing the application guidance in IEC 60839-11-2.

  • Other IEC 60839 Series Parts
    Cover additional aspects of alarm and electronic security systems, enabling integrated security solutions encompassing alarms, intrusion detection, and monitoring.

  • ISO/IEC Standards on Security and Risk Management
    Provide frameworks for systematic risk assessment and mitigation, which support the planning elements referenced in IEC 60839-11-2.

Summary

IEC 60839-11-2:2014 equips security professionals with authoritative guidance to design, install, and maintain electronic access control systems that meet international quality and security benchmarks. Its risk-based security grading, thorough planning, and operational procedures help organizations safeguard their premises effectively, making this standard essential for anyone involved in electronic security system implementation and management.

Keywords: IEC 60839-11-2, electronic access control systems, EACS, access control standards, security grading, system installation, risk assessment, electronic security, alarm systems, access control guidelines, building security, IEC standards

Standard

IEC 60839-11-2:2014 - Alarm and electronic security systems - Part 11-2: Electronic access control systems - Application guidelines

English and French language
58 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

IEC 60839-11-2:2014 is a standard published by the International Electrotechnical Commission (IEC). Its full title is "Alarm and electronic security systems - Part 11-2: Electronic access control systems - Application guidelines". This standard covers: IEC 60839-11-2:2014 defines the minimum requirements and guidance for the installation and operation of electronic access control systems (EACS) and/or accessory equipment to meet different levels of protection. This standard includes requirements for planning, installation, commissioning, maintenance and documentation for the application of EACS installed in and around buildings and areas. The equipment functions are defined in IEC 60839-11-1.

IEC 60839-11-2:2014 defines the minimum requirements and guidance for the installation and operation of electronic access control systems (EACS) and/or accessory equipment to meet different levels of protection. This standard includes requirements for planning, installation, commissioning, maintenance and documentation for the application of EACS installed in and around buildings and areas. The equipment functions are defined in IEC 60839-11-1.

IEC 60839-11-2:2014 is classified under the following ICS (International Classification for Standards) categories: 13.320 - Alarm and warning systems. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase IEC 60839-11-2:2014 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.

Standards Content (Sample)


IEC 60839-11-2 ®
Edition 1.0 2014-07
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Alarm and electronic security systems –
Part 11-2: Electronic access control systems – Application guidelines

Systèmes d'alarme et de sécurité électroniques –
Partie 11-2: Systèmes de contrôle d'accès électronique – Lignes directrices
d'application
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des
questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez
les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.

IEC Central Office Tel.: +41 22 919 02 11
3, rue de Varembé Fax: +41 22 919 03 00
CH-1211 Geneva 20 info@iec.ch
Switzerland www.iec.ch
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigenda or an amendment might have been published.

IEC Catalogue - webstore.iec.ch/catalogue Electropedia - www.electropedia.org
The stand-alone application for consulting the entire The world's leading online dictionary of electronic and
bibliographical information on IEC International Standards, electrical terms containing more than 30 000 terms and
Technical Specifications, Technical Reports and other definitions in English and French, with equivalent terms in 14
documents. Available for PC, Mac OS, Android Tablets and additional languages. Also known as the International
iPad. Electrotechnical Vocabulary (IEV) online.

IEC publications search - www.iec.ch/searchpub IEC Glossary - std.iec.ch/glossary
The advanced search enables to find IEC publications by a More than 55 000 electrotechnical terminology entries in
variety of criteria (reference number, text, technical English and French extracted from the Terms and Definitions
committee,…). It also gives information on projects, replaced clause of IEC publications issued since 2002. Some entries
and withdrawn publications. have been collected from earlier publications of IEC TC 37,

77, 86 and CISPR.
IEC Just Published - webstore.iec.ch/justpublished
Stay up to date on all new IEC publications. Just Published IEC Customer Service Centre - webstore.iec.ch/csc
details all new publications released. Available online and If you wish to give us your feedback on this publication or
also once a month by email. need further assistance, please contact the Customer Service
Centre: csc@iec.ch.
A propos de l'IEC
La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des
Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.

A propos des publications IEC
Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la
plus récente, un corrigendum ou amendement peut avoir été publié.

Catalogue IEC - webstore.iec.ch/catalogue Electropedia - www.electropedia.org
Application autonome pour consulter tous les renseignements
Le premier dictionnaire en ligne de termes électroniques et
bibliographiques sur les Normes internationales,
électriques. Il contient plus de 30 000 termes et définitions en
Spécifications techniques, Rapports techniques et autres
anglais et en français, ainsi que les termes équivalents dans
documents de l'IEC. Disponible pour PC, Mac OS, tablettes
14 langues additionnelles. Egalement appelé Vocabulaire
Android et iPad.
Electrotechnique International (IEV) en ligne.

Recherche de publications IEC - www.iec.ch/searchpub
Glossaire IEC - std.iec.ch/glossary
Plus de 55 000 entrées terminologiques électrotechniques, en
La recherche avancée permet de trouver des publications IEC
en utilisant différents critères (numéro de référence, texte, anglais et en français, extraites des articles Termes et
comité d’études,…). Elle donne aussi des informations sur les Définitions des publications IEC parues depuis 2002. Plus
projets et les publications remplacées ou retirées. certaines entrées antérieures extraites des publications des

CE 37, 77, 86 et CISPR de l'IEC.
IEC Just Published - webstore.iec.ch/justpublished

Service Clients - webstore.iec.ch/csc
Restez informé sur les nouvelles publications IEC. Just
Published détaille les nouvelles publications parues. Si vous désirez nous donner des commentaires sur cette
Disponible en ligne et aussi une fois par mois par email. publication ou si vous avez des questions contactez-nous:
csc@iec.ch.
IEC 60839-11-2 ®
Edition 1.0 2014-07
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Alarm and electronic security systems –

Part 11-2: Electronic access control systems – Application guidelines

Systèmes d'alarme et de sécurité électroniques –

Partie 11-2: Systèmes de contrôle d'accès électronique – Lignes directrices

d'application
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
PRICE CODE
INTERNATIONALE
CODE PRIX U
ICS 13.320 ISBN 978-2-8322-1774-0

– 2 – IEC 60839-11-2:2014 © IEC 2014
CONTENTS
FOREWORD . 4
INTRODUCTION . 6
1 Scope . 7
2 Normative references . 7
3 Terms and definitions . 7
4 Abbreviations . 8
5 System architecture . 8
6 Environmental and EMC considerations . 9
6.1 General . 9
6.2 Environmental Class I – Equipment situated in indoor but restricted to
residential/office environment . 9
6.3 Environmental Class II – Equipment situated indoor in general . 9
6.4 Environmental Class III – Equipment situated outdoor – Sheltered or indoor
extreme conditions . 10
6.5 Environmental Class IV – Equipment situated outdoor – General . 10
6.6 EMC . 10
7 System planning . 10
7.1 General . 10
7.2 Risk assessment and security grading . 11
7.3 System design . 12
7.3.1 System and components selection . 12
7.3.2 Operational considerations . 14
8 System installation . 16
8.1 General . 16
8.2 Installation planning . 17
8.2.1 Equipment . 17
8.2.2 Cabling . 19
9 Commissioning and system handover . 19
9.1 Commissioning . 19
9.2 System handover . 20
10 System operation and maintenance . 20
10.1 System operation . 20
10.2 System maintenance . 21
11 Documentation . 21
11.1 General . 21
11.2 Documentation for planning . 21
11.3 Documentation for commissioning/system handover . 22
11.4 Documentation for maintenance . 22
Annex A (normative) Allowed exceptions for installed systems . 23
A.1 General . 23
A.2 Claims of compliance . 23
A.3 Allowed exceptions . 23
Annex B (informative) Standby battery capacity calculations . 27
Bibliography . 29

Figure 1 – Typical arrangement of components and interfaces of an EACS . 9
Figure 2 – Risk assessment chart . 11
Figure 3 – Example of system grade selection . 13
Figure 4 – Equipment location versus security grade of protected area . 17

Table 1 – Security grading . 12
Table 2 – Power supply requirements for installed EACS . 18
Table A.1 – Allowed exceptions for access point interface requirements . 24
Table A.2 – Allowed exceptions for indication and annunciation requirements . 24
Table A.3 – Allowed exceptions for recognition requirements . 25
Table A.4 – Duress signalling requirements . 25
Table A.5 – Overriding requirements . 25
Table A.6 – Communication requirements . 25
Table A.7 – Allowed exceptions for system self-protection requirements . 25
Table A.8 – Allowed exceptions for power supply requirements . 26

– 4 – IEC 60839-11-2:2014 © IEC 2014
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
ALARM AND ELECTRONIC SECURITY SYSTEMS –

Part 11-2: Electronic access control systems –
Application guidelines
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 60839-11-2 has been prepared by IEC technical committee 79:
Alarm and electronic security systems.
The text of this standard is based on the following documents:
FDIS Report on voting
79/476/FDIS 79/489/RVD
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.

A list of all parts in the IEC 60839 series, published under the general title Alarm and
electronic security systems, can be found on the IEC website.
Future standards in this series will carry the new general title as cited above. Titles of existing
standards in this series will be updated at the time of the next edition.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.
– 6 – IEC 60839-11-2:2014 © IEC 2014
INTRODUCTION
This standard is part of the IEC 60839 series, written to include the following parts:
Part 11-1: Electronic access control systems – System and components requirements
Part 11-2: Electronic access control systems – Application guidelines
This part of IEC 60839 describes the general requirements for planning, installation, operation,
maintenance and documentation for the application of electronic access control systems
(EACS).
The performance of the EACS is determined by the security grades allocated to the access
points. A risk assessment that identifies the risks and perceived threats should first be carried
out in order to establish the appropriate security grades.
Four security grades are available based upon the knowledge and tools available to a person
intent upon gaining unauthorised access and the type of application, taking into account
specific organizational aspects and the value of the assets.
Separate guidance is provided for each activity along with recommendations for the
documentation needed. A brief description of each section covering the activities is provided
below:
System planning: this section is intended to assist the designer with the selection of an
electronic access control system (EACS) that provides the control of access and security
integrity commensurate with the value of the assets requiring protection and the associated
risks. See Clause 7.
System design should minimise potential vulnerabilities that could be exploited to circumvent
the access control measures. It is recommended that safeguards are incorporated to give
early warning of attempts to circumvent the access control measures. See 7.3.
System installation: this section is intended to help those responsible for installing the EACS
by identifying issues which should be considered prior to commencing the installation and
during the installation of the system in order to ensure the EACS is correctly implemented as
specified during system planning. See Clause 8.
Commissioning and system handover: this section provides guidance to ensure the level of
performance required in the system planning is obtained and that the end user is provided
with the necessary documentation, records and operating instructions during the handover of
the EACS. See Clause 9.
System operation and maintenance: includes information regarding the responsibilities of the
end user of the EACS to ensure the system is operated correctly and adequately maintained.
It covers inspection, service and the use of remote diagnostics in order that the level of
performance determined during the system planning stages can be maintained. See Clause
10.
ALARM AND ELECTRONIC SECURITY SYSTEMS –

Part 11-2: Electronic access control systems –
Application guidelines
1 Scope
This part of IEC 60839 defines the minimum requirements and guidance for the installation
and operation of electronic access control systems (EACS) and/or accessory equipment to
meet different levels of protection.
This standard includes requirements for planning, installation, commissioning, maintenance
and documentation for the application of EACS installed in and around buildings and areas.
The equipment functions are defined in the IEC 60839-11-1.
When the EACS includes functions relating to hold-up or the detection of intruders, the
requirements in standards relating to intrusion and hold-up are also applicable.
This standard provides application guidelines intended to assist those responsible for
establishing an EACS to ascertain the appropriate design and planning of the EACS, both in
terms of levels of protection and levels of performance necessary to provide the degree of
access control and protection considered appropriate for each installation. This is achieved by
scaling or classifying the features of electronic access control systems related to the security
functionality (e.g. recognition, access point actuation, access point monitoring, duress
signaling and system self-protection) in line with the known or perceived threat conditions.
This standard does not cover the methods and procedures for conducting a risk assessment.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and
are indispensable for its application. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC 60839-11-1:2013, Alarm and electronic security systems – Part 11-1: Electronic access
control systems – System and components requirements
3 Terms and definitions
For the purposes of this document the terms and definitions given in IEC 60839-11-1, as well
as the following, apply.
3.1
area zone
part of a protected area which has its own set of access levels
Note 1 to entry: It may have a different security grade than other area zones within the same protected area.
3.2
competent organization
organization possessing sufficient resources and staff with adequate expertise and training in
the maintenance of EACS
– 8 – IEC 60839-11-2:2014 © IEC 2014
3.3
fail-safe
fail-open
locking device designed to automatically release upon power failure
3.4
fail-secure
fail-locked
locking device designed to remain secure upon power failure
3.5
protected area
controlled area
area defined by a physical boundary, through which passage is controlled by means of one or
more access points/portals
Note 1 to entry: It may contain several separate area zones with the same or different security grades. Refer to
the area zone definition in 3.1.
3.6
system owner
person or group of people that make the decision about what is appropriate for the respective
premises to be used in order to get the desired access control/protection/price/etc.
4 Abbreviations
For the purposes of this document, the abbreviations given in IEC 60839-11-1, as well as the
following apply.
ACU Access control unit
EACS Electronic access control system
EMC Electromagnetic compatibility
REX Request to exit
5 System architecture
An access control system comprises all the constructional and organizational facilities
together with equipment required for controlling access. Refer to Figure 1 for an example of a
typical arrangement of components and interfaces of an EACS.
The physical protection and mechanical strength of actuators, sensors, etc., should be
commensurate for the security grade of each access point. Consideration should be given to
the physical strength of the surrounding building (e.g. walls, door construction, etc).

Other EACS Other systems
User interface
User
(e.g. readers)
Access point(s)
- actuators Access control system
- sensors
ACU
REX
System
Power supply
management
Mains
IEC
IEC 60839-11-1:2013, Table 8, states that: “The access control unit shall be provided with standby power source
capable of operating the unit and its accessories under specified full load condition for the period of time” required
according to the security grade of the EACS. It is recommended that monitored standby power sources be provided
to all actuators and monitoring console(s).
Figure 1 – Typical arrangement of components and interfaces of an EACS
6 Environmental and EMC considerations
6.1 General
Each component of an EACS is expected to operate correctly in its service environment and
that it will continue to do so for a reasonable time. Components shall be suitable for one of
the following environmental classes.
6.2 Environmental Class I – Equipment situated in indoor but restricted to
residential/office environment
Environmental Class I comprises environmental influences normally experienced indoors
when the temperature is well maintained (e.g. in a residential or commercial property).
NOTE Temperatures can be expected to vary between +5 °C and +40 °C.
6.3 Environmental Class II – Equipment situated indoor in general
Environmental Class II comprises environmental influences normally experienced indoors
when the temperature is not well maintained (e.g. in corridors, halls or staircases and where
condensation can occur on windows and in unheated storage areas or warehouses where
heating is intermittent).
NOTE Temperatures can be expected to vary between –10 °C and +55 °C.

– 10 – IEC 60839-11-2:2014 © IEC 2014
6.4 Environmental Class III – Equipment situated outdoor – Sheltered or indoor
extreme conditions
Environmental Class III comprises environmental influences normally experienced out of
doors when the EACS components are not fully exposed to the weather or indoors where
environmental conditions are extreme.
NOTE Temperatures can be expected to vary between –25 °C and +55 °C.
6.5 Environmental Class IV – Equipment situated outdoor – General
Environmental Class IV comprises environmental influences normally experienced out of
doors when the EACS components are fully exposed to the weather.
NOTE Temperatures can be expected to vary between –25 °C and +70 °C depending on the region. The
temperature range can be extended to plus and/or minus for different geographical or climatic zones.
6.6 EMC
It is recommended that installation good practice be followed to reduce the unwanted effects
of electrical interference, e.g. interconnection wiring should not be run in the same conduit or
trunking as cables carrying mains supplies, or network and data cables carrying high
frequency signals unless they are physically separated and/or suitably screened so as to
prevent cross interference.
Additional filtering and/or screening of interconnecting cables might be necessary for
applications known to have high levels of conducted or radiated electrical interference, e.g. an
industrial plant operating high power electrical equipment.
The manufacturers’ guidelines for electromagnetic compatibility should be followed.
7 System planning
7.1 General
The objectives of the system planning stage are to determine the extent of EACS, to select
components of the appropriate functionality/performance criteria, security grade and
environmental classification and to prepare a system design proposal.
An access control system comprises all the logical functionality, constructional and
organizational facilities together with the physical equipment required for controlling access.
Particular care should be taken to minimize inconvenience to authorized users.
The implementation of an access control system should be in accordance with the following
sequence:
a) risk assessment and security grading;
b) system and components selection;
c) operational considerations;
d) system installation;
e) system handover;
f) system operation and maintenance.
System installation shall be conducted in accordance with national and local regulations.

7.2 Risk assessment and security grading
It is essential that a risk assessment is performed before the implementation of the access
control system. The risk assessment chart of Figure 2 identifies the key considerations.
Asset Threat Risk What to do
• Requirement
Chance of vulnerability
What to protect Against what
• Efficiency
exploitation
• Cost effectiveness
Compare
• Confidentiality • Make vulnerability
• Who
exploitation improbable
• Integrity
• Safeguards
• Detect it
• Availability • What
• Threat
• Limit impact
• Value
• When
• Injury
• People • Response
Define security grading for each access point
IEC
Figure 2 – Risk assessment chart
The security grade levels are defined in terms of the value of the assets requiring protection
and the determination (knowledge/skills) and methods of attack of persons intending to
bypass the system (adversaries). Refer to Table 1 for examples of typical applications for
each grade.
– Grade 1: Low risk. The adversary is expected to have little knowledge of the access
control system and be restricted to a limited range of easily available tools. Physical
security is provided to deter and delay adversaries. Assets have limited value and
adversaries will probably give up the idea of attacking when confronted with minimum
resistance.
– Grade 2: Low to medium risk. The adversary is expected to have limited knowledge of the
access control system and the use of a general range of tools and portable instruments.
Physical security is provided to deter, delay and detect adversaries. The assets have
higher value and adversaries are likely to give up the idea of succeeding when they realize
they may be detected.
– Grade 3: Medium to high risk. The adversary is expected to be conversant with the access
control system and have a comprehensive range of tools and portable electronic
equipment. Physical security is provided to deter, delay, detect and means are provided to
help identify adversaries. The assets have high value and adversaries may give up the
idea of succeeding when they realize they may be identified and caught.
– Grade 4: High risk. The adversary is expected to have the ability or resources to plan the
attack in detail and have a full range of equipment including means of substitution of
components in the access control systems. Physical security is provided to deter, delay,
detect and means are provided to help identify adversaries. The assets have very high
value and adversaries may give up the idea of succeeding when they realize they will be
identified and caught.
– 12 – IEC 60839-11-2:2014 © IEC 2014
Table 1 – Security grading
Grade 1 2 3 4
Risk level Low Low to medium Medium to high High
Application Organizational Organizational Fewer organizational Mainly protection of
aspects, protection of aspects, protection of aspects, protection of very high value
low value assets low to medium value medium to high value commercial or critical
assets commercial assets infrastructure
Skill/ knowledge of Low skill, low Medium skill and High skill and Very high skill and
adversaries/attackers knowledge of EACS, knowledge of EACS, knowledge of EACS, knowledge of EACS,
no knowledge of low knowledge of medium knowledge of high knowledge of
token and IT token and IT token and IT token and IT
technologies. technologies. technologies. technologies.
Low financial means Low to medium
Medium financial High financial means
for attacks financial means for
means for attacks for attacks
attacks
Typical examples Hotel Commercial offices, Industrial, Highly sensitive
small businesses administration, areas (military
financial facilities, government,
R&D, critical
production areas)
7.3 System design
7.3.1 System and components selection
The security grading shall be defined for each access point taking in consideration the needs
for control of entry and exit.
Different security grades can be used for access points in the same system. It shall be
ensured that the common system components, protecting access points with different security
grading, meet the requirements of the highest security grade access point that they are
operating in conjunction with (see Figure 3).

Grade 4
monitoring console
(central)
Grade 2
Grade 4
monitoring console
monitoring console
(local)
(local)
Grade 2 Grade 2 Grade 3 Grade 3
access point ACU ACU access point
Grade 4 Grade 4
Grade 2 Grade 2
ACU access point
access point ACU
Grade 4
ACS components
Grade 1
Grade 1
access point
access point
Site 1
Site 2
IEC
Figure 3 – Example of system grade selection
Where it is not practical to have different grades of access points managed by a single access
control system it is permitted to have more than one separate access control system. An
access point shall not be controlled by more than one separate access control system.
The mandatory functions of the equipment associated with each security grade are defined in
the IEC 60839-11-1.
Not all mandatory functions defined in the IEC 60839-11-1 need to be implemented in an
installed EACS. A list of allowed exceptions is provided in Annex A. Exceptions shall be
agreed between the installer and the system owner and be recorded in the as-built
documentation.
The installer shall point out to the system owner that exceptions from the requirements,
especially for access points, recognition and communication, may affect the functions and the
security of the whole EACS.
– 14 – IEC 60839-11-2:2014 © IEC 2014
7.3.2 Operational considerations
7.3.2.1 General
The operational considerations in this subclause are guidelines for points of discussion with
the customer in order to understand and address the needs of the final installation.
These guidelines have also to be reviewed in conjunction with the mandatory functions for
each security grade of the EACS as specified in the IEC 60839-11-1.
The guidelines are not exhaustive and are not listed in any order of priority.
7.3.2.2 Guidelines
The following items should be considered:
a) manufacturer’s recommendations;
b) the threat(s);
c) specific assets requiring protection;
d) activities undertaken at the site/building;
e) access control measure philosophy;
f) security grade for each access point;
g) user flow (number of persons in a period of time);
h) operation of the access control system while under fault conditions (e.g. the need for a
second source of power, equipment cable infrastructure, loss of communication, etc.);
i) access control for users with disabilities;
j) safety requirements (e.g. emergency exits, fire protection, etc.);
k) environmental and EMC conditions of the site;
l) redundancy, disaster recovery plans for monitoring console;
m) location of the equipment (control unit, user interface, monitoring console);
n) co-operation of users (motivation, training, etc.);
o) training of operators;
p) the cable routes, the type of cable, the maximum cable length;
q) the communication links (availability, reliability, security, performance);
r) tamper detection;
s) alarm/alert reporting method;
t) throughput of personnel (staff and visitors);
u) management of visitors;
v) response force (e.g. police) arrangements;
w) vehicle access;
x) access levels (authorization) for each area zone.
7.3.2.3 Regulatory requirements
Attention should be paid to any applicable international, national and local regulatory
requirements including:
a) measures for persons with disabilities;
b) data protection and privacy legislation;
c) industry specific regulations;

d) health and safety, safe exit in emergency conditions.
7.3.2.4 Recognition
When selecting the recognition equipment and methods the following should be considered:
a) the suitability of the recognition equipment for the specific application including
convenience of use, anticipated user flow, the operating environment and expected life
time of the equipment, etc;
b) the methods of recognition, for example the use of pin only, token/card only, biometrics or
a combination of methods (i.e. multi-factor).
7.3.2.5 System management
To maintain the continued and reliable operation of the EACS adequate system management
is required and the following items should be considered when applicable:
a) operation of and responsibility for the system (programming, credentials management,
access rights administration, configuration, alarm management day and night);
b) skills and training of system operators;
c) reporting;
d) archiving and back-up policy;
e) the number of users and access levels taking into account both present and predicted
future needs;
f) ease of operation (user, management, serviceability, etc.);
g) requirements for annunciation (e.g. display, logging, alert, etc.);
h) the capacity of the logging device;
i) co-ordination of annunciation functions (location, procedures, presentation, etc.);
j) override.
7.3.2.6 Access point(s)
For proper installation and operation of the access points the following items should be
considered:
a) requirements for indication;
b) operation during fault conditions;
c) other relevant factors (e.g. risk of vandalism, etc.);
d) physical strength;
e) surrounding building structure;
f) selection of appropriate access point actuators, i.e. locks, door strikes (security level,
appearance, operating environment, operating response times, requirements to fit on
existing structure);
g) safety requirements (e.g. emergency exits, fire protection, etc.);
h) access point monitoring;
i) detection/prevention of two or more persons attempting simultaneous entry (i.e.
singularisation);
j) method of returning the access point to the closed condition (e.g. automatic door closing
equipment);
k) operating configuration in the event of power failure (fail-safe, fail-secure.);
l) measures for persons with disabilities;
m) specific measures for handling deliveries;
n) the security classification for access points leading to the same security controlled area;

– 16 – IEC 60839-11-2:2014 © IEC 2014
o) additional recognition/detection measures (weight, metal detection, image comparison,
visual inspection, etc.);
p) anti-passback (logical, timed, area controlled);
q) override;
r) duress alarm;
s) two users access condition;
t) presence check.
7.3.2.7 Interface with other systems
When it is necessary to interface the EACS with other systems such as intrusion alarm
systems, video surveillance systems, administration systems, intercom, elevator control, etc.
consideration should be given to the following:
a) the type of communication links, the desired availability, reliability and security of
transmitted data associated with those links;
b) the network infrastructure requirements;
c) specific operating commands for example, call for elevator, selection of floor and
destination;
d) reporting commands associated with elevator control.
8 System installation
8.1 General
Prior to commencing work, all relevant safety requirements should be considered.
Electrical installation methods shall comply with current national and site local regulations.
The components of the EACS should be installed in locations that ensure adequate security of
operation and permit easy access for maintenance and service.
All system components should be suitable for the environmental conditions in which they are
to operate.
Care should be taken during the selection of components to ensure all system components
are compatible. Where uncertainty arises the appropriate consultation should take place, e.g.
with the component manufacturer, supplier, a test house or another relevant third party.
The results of the risk assessment shall determine the security grades of the area zones
within the protected area. The access points to those area zones shall be of an equivalent
grade or higher. For each area zone separate access levels may be defined.
With the exception of the user interface, equipment critical to the security integrity of the
access control system shall not be located within an area zone designated as having a lower
security grade than the highest grade of the protected area it is controlling. Refer to Figure 4.

Grade 2 Grade 2
access point access point
Grade 3
ACU
Area zone Area zone
grade 3 grade 3
Grade 3 Grade 3
access point access point
Grade 3
ACU
Area zone
Area zone
Grade 2 Grade 2
grade 2
grade 2
access point access point
Protected area
IEC
Figure 4 – Equipment location versus security grade of protected area
The installer shall make the system owner aware of any specific functionality that shall be
implemented in order to meet the necessary organizational and constructional measures that
are required for the proper operation of the EACS. For example the detection/prevention of
two or more persons attempting simultaneous entry (singularisation) is recommended for the
implementation of anti-tailgating measures.
Consideration should be given to routing cables only within the protected area (see 8.2.2).
8.2 Installation planning
8.2.1 Equipment
The equipment used in installations covered by this standard shall be compliant with the
requirements covered by IEC 60839-11-1 for the applicable security grade and environmental
classification.
The equipment should be installed in accordance with the manufacturer's instructions by
suitably trained personnel. If the installation of a component in accordance with the
manufacturer’s recommendations is not possible advice should be sought from the
manufacturer and this should be recorded in the as-built documentation.
When the EACS is using existing communication (network) infrastructure at the customer site
attention should be paid to ensure there are sufficient capacity, performance and protection
measures in place to allow proper operation of the EACS for the selected security grade.
The housings for components of an EACS shall be provided with the means to prevent
undetected access to internal elements to minimi
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...