LIGHTNING MOBILE ELECTRIC // PUBLIC RELEASE / DECEMBER 2, 2025
ACCESS CONTROL SPECIFICATION - V 12.4.1
Access Control System
Purpose
This specification defines the tiered access control framework governing physical entry and information access within Lightning Mobile Electric LLC facilities, systems, and operational domains. The framework establishes three discrete authorization levels, each providing escalating privileges for physical access, temporal constraints, and audit log visibility.
Scope
This specification applies to all controlled access points, secured areas, and access-controlled objects within LME operational domains. Implementation encompasses physical entry systems (electronic locks, card readers, biometric devices), logical access controls, and associated audit logging infrastructure.
Definitions
-
Access PointAny physical or logical entry mechanism subject to authorization control (doors, gates, secure containers, systems).
-
Scheduled Access WindowA defined time period during which a credential holder is authorized to access specific resources.
-
Access LogA chronological record of all access events including successful entries, denials, and administrative modifications.
-
DomainA logical grouping of access points and objects under unified administrative control.
-
Credential HolderAny individual issued authentication credentials (card, PIN, biometric enrollment) at any access level.
Physical Access Flow
Digital / Data Access Flow
Access Level Specifications
Level 1 authorization provides baseline access privileges appropriate for general personnel operating within defined schedules. This tier enforces temporal constraints and limits audit visibility to self-generated events only.
Level 2 authorization provides elevated privileges for supervisory personnel or roles requiring unrestricted temporal access and expanded audit oversight.
Level 3 authorization provides full administrative control over the access control system within a designated domain, including credential management and comprehensive audit visibility.
Permission Matrix
The following matrix summarizes the capability differential across authorization tiers:
| Capability | L1 | L2 | L3 |
|---|---|---|---|
| Physical access to assigned points | Sched | ✓ | ✓ |
| 24/7 unrestricted access | — | ✓ | ✓ |
| View personal access log | ✓ | ✓ | ✓ |
| View Level 2 resource logs | — | ✓ | ✓ |
| View all domain access logs | — | — | ✓ |
| Modify credential permissions | — | — | ✓ |
| Configure access schedules | — | — | ✓ |
Implementation Requirements
- Authentication All access events shall require positive credential authentication prior to access point release.
- Audit Integrity Access logs shall be immutable once created. All entries shall include timestamp, credential ID, access point ID, and event outcome.
- Fail-Secure Access points shall default to locked state upon power loss or system malfunction unless designated as life-safety egress.
- Time Sync Systems shall synchronize with authoritative time sources (NTP) to ensure accurate schedule enforcement and log timestamps.
- Admin Audit All Level 3 administrative actions shall be logged with administrator credential and justification where applicable.