Aerospace Access Control Checklist

This checklist is designed to evaluate the effectiveness of access control measures within aerospace operations, in accordance with AS9110 standards.

Get Template

About This Checklist

Access control plays a crucial role in ensuring the security of aerospace operations. This checklist helps identify potential vulnerabilities and assesses the effectiveness of current access control measures, contributing to overall safety and compliance with industry standards.

Learn more

Industry

Aerospace

Standard

AS9110 - Aerospace Maintenance Organizations

Workspaces

Aerospace Facilities
Design Studios

Occupations

3D Artist
1
Are robust user authentication methods implemented?

Select 'PASS' if robust authentication methods are in place; otherwise select 'FAIL'.

To ensure only authorized personnel can access sensitive systems.
2
Is there a regular review of access rights for users?

Select 'PASS' if reviews are conducted regularly; otherwise select 'FAIL'.

To maintain updated access permissions and security.
3
Is access control documentation maintained and up-to-date?

Select 'PASS' if documentation is current; otherwise select 'FAIL'.

Documentation is essential for compliance and operational integrity.
4
Is there an incident response plan for unauthorized access?

Select 'PASS' if a plan is in place; otherwise select 'FAIL'.

Having a plan helps mitigate damage from security breaches.
5
Are there physical barriers to unauthorized access?

Select 'PASS' if physical barriers are in place; otherwise select 'FAIL'.

Physical barriers are crucial for protecting sensitive areas.
6
Are there controls for managing visitor access?

Select 'PASS' if visitor controls are in place; otherwise select 'FAIL'.

Visitor management is important for maintaining security.
7
Is there a presence of security personnel during operating hours?

Select 'PASS' if security personnel are present; otherwise select 'FAIL'.

Security personnel deter unauthorized access.
8
Are surveillance systems operational and monitored?

Select 'PASS' if surveillance systems are operational; otherwise select 'FAIL'.

Surveillance is vital for detecting unauthorized access.