We deploy utility access control that retrofits into existing locks, adds audit trails, and works at remote sites without trenching or new wiring.
Utility access control gives small utilities and co-ops NERC-style discipline without the NERC price tag. Swap cylinders or padlocks, issue smart keys with schedules, and record every touch. The key powers the lock, so sites without power or network can still be brought under control.
What “NERC-style security” looks like for small utilities
Direct answer: Adopt the control and documentation mindset from NERC Critical Infrastructure Protection. That means permissioned access to critical points and entry logs that you can show. CIP-006 calls for documented entry into a Physical Security Perimeter. CIP-014 focuses on protecting critical stations and substations. We mirror those outcomes at a practical scale. See the official NERC CIP standards.
- Record access attempts, including denied events, at the points that matter most.
- Set user schedules and limit access to defined windows.
- Prove diligence with reports instead of guesswork.
Critical insight: You do not need a hardwired reader at every door to follow CIP-style practices. Start with the riskiest sites and expand.
How a key-centric system cuts project cost
Direct answer: The key powers the cylinder, so there is no door wiring and no batteries in the lock. Keep existing hardware and replace only the cylinder or padlock body. Keys hold per-user permissions and time windows. Both the key and the lock store an audit trail. Flag a missing key and it stops working.
- Fast retrofit on doors, cabinets, and gates.
- No trenching or network drops at remote sites.
- Immediate accountability with full logs.
Critical insight: Cut wiring cost first, then add reporting. That order delivers the largest budget win with the biggest visibility boost.
Where this approach makes the biggest impact
Direct answer: Start at unpowered or hard-to-wire locations. Use electronic cylinders for doors and weather-rated electronic padlocks for yards, gates, trucks, and containers. The same key can open both.
- Water: Collier County uses electronic cylinders and padlocks across wells, re-pump stations, and underground sample stations, with reporting that proves tasks and checks were performed.
- Large plants: Atlanta–Fulton County replaced mechanical keys facility-wide and blocks lost keys without rekey projects.
Critical insight: One platform across doors and padlocks reduces key rings and closes audit gaps across the system.
When to keep card readers and when to skip wiring
Direct answer: Hardwired readers fit main entrances. Many utility sites lack reliable power or network at the perimeter. Conduit, trenching, and structural work drive cost and delay. A key-centric approach avoids those costs while still delivering logs and schedules.
- Use readers where wiring is practical.
- Use key-centric control everywhere else.
- Integrate both under one platform if you need a mixed environment.
Critical insight: The mix gives you reach without breaking the budget.
Deployment steps for small utilities and co-ops
- Prioritize sites. Rank gates, pump houses, tanks, cabinets, and mobile assets by risk and distance.
- Retrofit first wave. Replace mechanical cylinders or padlocks with electronic versions. No wiring at the opening.
- Issue keys with schedules. Program by person, lock list, and time window. Set expirations for routine updates.
- Turn on auditing. Capture successful and denied attempts in both keys and locks. Pull reports for supervisors and inspections.
- Set a lost-key process. Flag missing keys in software so locks refuse them. Skip the rekey project.
- Integrate where it helps. Tie select doors into your existing hardwired system for a single view while keeping retrofits in the field.
Critical insight: Pilot one plant and one remote circuit first. Prove reporting and response on a small footprint, then roll out.
Results you can expect
- Accountability: Each touch is captured, including denied attempts.
- Fewer rekeys: Lost keys are blocked in software.
- Coverage at the edge: Doors, gates, trucks, and containers get the same control.
- Lower install cost: No trenching or network drops at remote sites.
FAQ
Does this make us NERC compliant?
No single product guarantees compliance. This approach supports CIP-style controls such as documented entry, restricted access, and reviewable logs. Use it to strengthen your physical program.
Do we need power at the lock?
No. The key powers the cylinder during the access event, which is why this works at remote gates and outbuildings.
Can we keep our current card system at headquarters?
Yes. You can integrate with a hardwired system and run both from one platform using expansion modules.
Schedule a time today to learn more about TEC Solutions and CyberLock





