1. All Resources
  2. Glossary

Monitored Table

Chances are, you’re working with a huge amount of data in your operations, and thanks to access control systems, you can record even the tiniest events that happen in your facility. Monitored tables, which can be any table in your records that is monitored by the system for addition, modification and deletion of data, work to protect that information from harm. While monitored tables work most obviously as safeguards against unwanted data modification by hackers or other internal forces, they can also be used to protect against accidental deletion or addition of crucial records during routine maintenance.

Not every table must be monitored, but the most important ones in your system, like badge ID numbers and access clearance levels, should be protected in this way to cut down on risk. Each change, no matter how small, will be recorded, preventing you from worrying about what happens to your data when you’re not looking.

Starting a new project?
Download our Physical Security Guide

Get the full guide and other great security content from Kisi. 

Download Guide
Kisi Physical Security Guide