Skip to main content

Government and public space

Municipalities and public assets such as street cabinets, tunnels, bridges, locks, and technical rooms require layered management and demonstrability.

Many distributed assets with a fixed requirement: demonstrability. The basis is keyed access with digital authorization and an audit trail. Mobile validation (Bluetooth) will help but is IT-dependent. Keyless access is only deployed upon a specific requirement.

Policy in brief

  • Mobile validator: often (IT-dependent)
  • Keyless to the lock: limited, only with specific requirements
  • Flex (optionally wired): for vital infrastructure objects
  • Default issuance: named
  • Integrations: sometimes
  • Publication: no specific locations or asset names

Context and assets

Assets are distributed and have varying risk profiles. Examples include outdoor cabinets, technical rooms, bridges, locks, tunnels, and management locations. Management is layered: central organization with partial management per department or asset cluster.

Recommended setup

Rights-based access with a key as the basis.

Mechatronic cylinders and padlocks as standard on exterior assets and technical rooms. Offline opening with central authorization and audit trail.


Rights-based access with a key as the basis.

Mechatronic cylinders and padlocks as standard on exterior assets and technical rooms. Offline opening with central authorization and audit trail.


Key strategy and fieldwork

BLE-key with phone as validator where permitted. If mobile validation is not possible or not allowed: design around fixed management points.


Update points and management points

Management points at workshops and depots for periodic synchronization.


Issuance and vault process

The default is key on the person. Key programming safes for frequent temporary access with changing contractors, or chain of custody with mission and PIN code.


Flex (wired)

Flex for wired applications with online I/O, such as signaling or process connections within a location.


Software and hosting

CAW Enterprise as the management base. EU-hosted shared for smaller to medium-sized environments. EU-hosted dedicated for segregation scale or integrations. On-prem if hosting is not permitted or if logging and IT governance must remain within the own domain.

Pitfalls within the sector

Keyless

Keyless as standard without operational necessity

Mobile validator

Enforce mobile validator when IT or policy does not allow it

Asset clusters

Combining asset clusters without a clear separation of roles and management

Integrations

Integrations promise ownership and an acceptance path without scope.

Let's start a conversation.
Sellox thinks along with you.

CONTACT CONTACT