Home' RTCA Documents for Review : DO-230I, Airport Security Access Control Systems Contents 10
©2018 RTCA, Inc.
Communications at an airport comes in many forms and the focus of DO-230 is on the communications
systems used to support airport security access control systems. It is important that the needs of all
stakeholders are included in the development of the communication plans. Performing a functional
decomposition of needs is a recommended start as these could be included in the overall concept of
operations of the airport. Airport security systems may utilize some or all of a wired or wireless cellular
telephone and/or trunked radio systems, VHF/UHF handheld devices, IP network technologies connecting
smartphones, and/or tablet devices. Guidance information on communications technology can be found in
Section 9: Communications Infrastructure.
Credentials are identification media issued by an airport or an authorized issuing organization that are used
to identify individuals. The credentialing process can either be conducted by the airport authority or be
sub-contracted to an external organization under the direction of the airport. The credentialing process can
issue identification-only media or identification and access control media, depending on the information
encoded onto the media.
The credentialing process utilizes processes outlined in the PACS infrastructure (see Section 4: PACS for
more information). Privacy is a concern in the credentialing process since the collection and use of personal
information and background checks are requirements of the process. Information on credentials and a
typical credentialing process can be found in Section 2: Credentialing.
Airport access control systems have evolved to include biometric technology as an automated method to
determine the identity of an individual. Biometric technologies include fingerprint recognition, iris
recognition, face recognition, speaker recognition, hand geometry, and vascular/vein pattern recognition.
Access can be denied or granted based on the use of biometric information, which can be encoded within
the carried credential of the person requesting access to a particular area or stored in a central server.
The enrollment and storage of the biometric identifier is typically performed as part of the credentialing
process which is an integral part of an airport’s IdM-CIS. The use of biometrics within airport security
access control systems can be found in Section3: Biometrics together with best practices for the retention
of biometric records and guidance on privacy considerations.
The network infrastructure that connects devices such as card readers for door or portal access, field control
panels, databases and software subsystems, wiring infrastructure and servers collectively make up a PACS.
These are a representative sample of components of a PACS since some airport operators may have more
or less components based on their unique requirements.
PACS activities are coordinated with the badging/credentialing process which includes the use of biometric
identifiers and are part of the physical infrastructure of the airport. PACS should therefore be included in
the ConOps, and component guidance is included in Section 4: PACS as well as the Recommended Security
Guidelines for Airport Planning Design and Construction reference document.
Perimeter Intrusion Detection
Intrusion detection is the process whereby an abnormality is detected in a place or process, the situation is
assessed to determine the nature of the abnormality, the location is pinpointed, and a determination is made
Links Archive ACAS X MOPS DRAFT Vol. 2 Navigation Previous Page Next Page