Home' RTCA Documents for Review : DO-230I, Airport Security Access Control Systems Contents 1
©2018 RTCA, Inc.
This document contains standards and guidelines for airport security access control and integrated systems
(including alarm monitoring, credentialing, identity management, biometrics, video management and
recording, intrusion detection, intercom, public address, and supporting network communications
subsystems) and is hereinafter entitled Integrated Security Systems for Airports (ISSA).
Airport operators designing or enhancing such systems under the Code of Federal Regulations (CFR), Title
49 (Transportation Security Administration [TSA]), Chapter XII, Part 1542.207, are strongly encouraged
to consider these recommendations in the design and implementation process.
These standards present functional requirements and performance characteristics, as well as best practices
for use by designers, manufacturers, installers, service providers, operators and users of automated
integrated security systems intended for operational use within the US National Airspace System (NAS)
and include industry best practices and lessons learned by industry subject matter experts.
In 1973, the Federal Aviation Administration (FAA) divided responsibility for aviation security between
the airlines and the airport operators.
Airlines were required to screen passengers and the airport operators were required to have an FAA-
approved Airport Security Program (ASP). Federal Aviation Regulation (FAR) Part 107 was promulgated
to provide a more secure environment in which airlines could operate.
Airport operations can vary significantly from place to place. Each ASP was originally required to describe
the “systems, methods or procedures” in place to control personnel and vehicle access to and within secured
areas. ASP personnel identification and challenge procedures, for instance, enhanced the security inherent
in the use of airport-issued employee identity badges mitigating the possible use of forged, stolen or non-
current identification by no-longer-authorized individuals seeking to exploit this knowledge in attempting
to enter secured areas.
With the FAA issuance of FAR 107.14 (1989), the installation and use of systems, equipment, and other
means of meeting certain performance standards to prevent unauthorized access to secured areas of airports
was strengthened. Although the performance standards were developed with automated Physical Access
Control Systems (PACS) in mind (FAR 107.14[a]), they do allow the installation and use of systems,
methods or procedures other than computer-controlled access.
The final rule in FAR 107.14(b) provided for FAA approval of alternative systems, methods or procedures
that provide an overall level of security equal to that established by the performance standards in FAR
107.14(a). Airport operators were required to segregate the secured area from other areas of the Air
Operations Area (AOA) to ensure (1) access controls specifically restrict access to commercial passenger
aircraft areas and (2) controlled vehicle and personnel movements in other portions of the AOA as required
by FAR 107.13. In July 2001, an entirely new version of the FAR 107 was issued, with largely procedural
changes, but without significant impact on PACS design.
Subsequent to the transfer of the security responsibility to the TSA as required by the Aviation
Transportation Security Act (ATSA) November 2001, these regulations were relocated, with few significant
changes, to CFR, Title 49, Chapter XII, Parts 1500-1699. In 1542.207, the division of responsibility
between the airlines, airport and federal agencies was modified by ATSA. However, while the PACS
design provisions remained largely unchanged, details of their implementation and operation has been
Links Archive ACAS X MOPS DRAFT Vol. 2 Navigation Previous Page Next Page