1-Provide “Controlled Access” to the facility
2-Allow access only to authorized personnel
3-Implement a ‘Security Protocol & Policy’ to make employees, visitors, and the facility safe
4-Implement a security and access level hierarchy based on personnel function
5-Automate and enhance the identification process
6-Automate personnel tracking
7-Minimize human error
8-Track outside contractors and vendors
9-Record and generate reports of access for each area