Back to Blog
Best Practices
12 min read

Key Control Policy: Issuance, Tracking, and Recovery Procedures

A comprehensive key management policy covering master key systems, electronic access credentials, key logs, and procedures for lost or unreturned keys.

Key Control Policy: Issuance, Tracking, and Recovery Procedures

Keys are a critical security asset. Uncontrolled keys create vulnerabilities that cameras and alarms can't fix. This policy establishes procedures for issuing, tracking, and recovering all physical and electronic keys.

Effective key control requires a master key system, strict issuance procedures, comprehensive logging, regular audits, and immediate action when keys are lost or employees depart. The cost of rekeying is always less than the cost of a breach.

Scope

This policy applies to:

  • All mechanical keys (master, sub-master, individual)
  • Electronic access cards and fobs
  • Keypad codes and combinations
  • Vehicle keys
  • Equipment keys (cabinets, safes, machinery)

Key System Structure

Master Key Hierarchy

Key LevelAccessAuthorized Holders
Grand Master (GMK)All locks in systemSecurity Director, Facility Manager only
Master (MK)All locks in a building/zoneBuilding managers, security supervisors
Sub-Master (SMK)All locks in a department/floorDepartment heads, maintenance leads
Change Key (CK)Individual lock onlyAssigned employees, tenants

High-Security Keys

The following require restricted/patented keyways:

  • Server rooms and data centers
  • Pharmaceutical storage
  • Financial/cash handling areas
  • Executive offices
  • Security office and armory

Key Issuance

Authorization Requirements

Key TypeAuthorization Required
Grand MasterExecutive approval + Security Director
Master KeySecurity Director or Facility Manager
Sub-MasterDepartment Head + Security approval
Individual/Change KeySupervisor + HR verification
Temporary KeysSecurity Supervisor (24-hr max without extension)

Issuance Procedure

  1. Receive authorized request form
  2. Verify employee identity and employment status
  3. Assign specific key by number from inventory
  4. Record in key log:
    • Key number and type
    • Employee name and ID
    • Date issued
    • Areas accessed
    • Authorization reference
  5. Employee signs key receipt acknowledgment
  6. Provide key care instructions

Key Receipt Acknowledgment

Key Issuance Agreement

I acknowledge receipt of the following key(s):

Key Number(s): _______________

Key Type: _______________

Areas Accessed: _______________

I agree to:

  • Keep this key secure and on my person or locked storage at all times
  • Never duplicate, loan, or transfer this key to any other person
  • Report loss or theft immediately to Security
  • Return this key upon termination or when no longer required
  • Surrender this key upon request by authorized personnel

I understand that violation of this policy may result in disciplinary action.

Employee Signature: _______________ Date: _______________

Employee Name (Print): _______________ ID #: _______________

Issued By: _______________ Date: _______________

Key Log Requirements

Information to Track

FieldRequired
Key number (unique identifier)Yes
Key type/levelYes
Lock(s) operatedYes
Assigned to (name, ID, department)Yes
Issue dateYes
Authorized byYes
Return dateWhen applicable
Status (active, returned, lost, destroyed)Yes

Daily Key Control

For keys signed out daily (shift keys, patrol keys):

  • Sign-out log with time and signature
  • Sign-in log with time and signature
  • Visual verification that all keys returned
  • Discrepancy report if keys missing at shift end

Electronic Access Control

Card/Fob Management

  • Each credential has unique identifier in system
  • Access levels assigned based on job requirements
  • Credentials expire automatically for contractors/temporary employees
  • Lost credentials deactivated immediately upon report
  • Replacement credentials issued with new number (not reactivated)

Access Code Management

  • Shared codes changed quarterly minimum
  • Codes changed immediately when employee with access departs
  • No "easy" codes (1234, 0000, building address)
  • Codes not written down or posted near doors

Lost or Stolen Keys

Immediate Actions

  1. Report to Security immediately (do not wait)
  2. Complete lost key report with circumstances
  3. Security assesses risk level
  4. Notify supervisor and Security Director

Risk Assessment

Risk LevelCriteriaAction
HighMaster key, known theft, high-security area accessImmediate rekey of affected locks
MediumSub-master, circumstances unclearRekey within 48 hours, increase monitoring
LowIndividual key, likely lost (not stolen)Document, rekey at discretion, monitor

Lost Key Report

Date/Time Discovered Missing: _______________

Key Number: _______________

Key Type: _______________

Last Known Location: _______________

Circumstances: _______________

Search Conducted: ☐ Yes ☐ No

Reported By: _______________

Action Taken: _______________

Key Return

Upon Termination

  1. HR notifies Security of termination (ideally 24+ hours advance)
  2. Key return required before final paycheck/exit
  3. Security verifies all assigned keys returned against log
  4. Employee signs return acknowledgment
  5. Log updated with return date
  6. If keys not returned, assess for rekey requirement

Role Change

  • Keys for old role returned before keys for new role issued
  • Access levels updated to match new responsibilities
  • Documentation updated accordingly

Key Audits

Audit Schedule

Key TypeAudit Frequency
Grand Master / MasterMonthly
Sub-MasterQuarterly
Individual keysAnnually
Daily-issue keysDaily (at shift end)

Audit Process

  1. Compare key log to physical inventory
  2. Verify each assigned key is in possession of assigned holder
  3. Check for unauthorized duplicates
  4. Document any discrepancies
  5. Update records as needed
  6. Report results to Security Director

Key Takeaways

  • Every key must be numbered, logged, and assigned to a specific person
  • Master keys require the highest authorization and oversight
  • Lost keys must be reported immediately—delays increase risk
  • Keys must be recovered before employees depart
  • Regular audits catch problems before they become breaches

Share this article

TeamMap

Written by

TeamMap

Team

TeamMap builds modern workforce management tools for security teams, helping companies track, communicate, and coordinate their field operations.

Continue Reading