Principles
Assume breach, verify explicitly, least privilege. Apply to doors, printers, and rooms—not just networks.
Log access, tailgating alerts, visitor flows. Stream to a SIEM; prefer fail-closed configs and alert on anomalies.
By Alex Kim · · Office Security
Badges, biometrics, and behavior: how modern workplaces reduce risk without slowing teams down.
Assume breach, verify explicitly, least privilege. Apply to doors, printers, and rooms—not just networks.
Log access, tailgating alerts, visitor flows. Stream to a SIEM; prefer fail-closed configs and alert on anomalies.
Pair RFID with mobile MFA; re-auth for sensitive zones; govern via SSO groups and just-in-time access.
Analytics for tailgating, short retention, encryption at rest, audited access; respect privacy laws.
Follow-me queues, badge release, watermarking; disable USB on shared devices; monitor egress.
Pre-register, QR passes, auto-expire, NDAs, escort requirements for labs and data rooms.