
Standards, Governance and ThreatIntelligence for Resilient Physical Access Cybersecurity forms the foundationof trust in every identity interaction.As physical access control system(PACS) platforms evolve to supportgreater connectivity and cloudintegration, the potential impactof threats increases. HID builds itscybersecurity posture to meet thiscomplexity head-on. Our focus ison securing people, infrastructureand data at every layer of the accessexperience. Our strategy is builtaround three core pillars. Embedded governanceand operational control Cybersecurity is part of how HID functions everyday. Formal governance structures guide the way wedesign, build and maintain systems. Security reviewsand threat modeling are embedded throughout theproduct lifecycle. Our incident response programincludes designated owners, clear escalation pathsand cross-functional coordination. This structure helpsus move quickly when issues arise and ensures thatevery response reflects our long-term commitment tosecure identity infrastructure. A living research ecosystemthat engages with the evolvingthreat landscape HID maintains an open channel to the global securitycommunity. We participate in responsible disclosureprograms and collaborate with researchers to test andimprove our defenses. Our teams conduct internalpenetration testing, red-team exercises and vendorsecurity evaluations. This active engagement withreal-world threat actors helps us anticipate risks, buildsmarter defenses and continuously improvethe security of our systems. Adherence to globallyrecognized standards HID designs its systems to align with internationallyaccepted cybersecurity frameworks. Thesecertifications shape internal processes and givecustomers confidence in our approach to riskmanagement. By anchoring development andoperations to these standards, we ensure consistentcontrols across product lines and geographies.This alignment supports secure deployment in bothregulated and commercial environments. Together, these pillars support access controlinfrastructure that protects today’s operations andanticipates tomorrow’s challenges. The followingsections of this eBook explore these pillars ingreater detail. The entire program is designedto maintain agility as threatsevolve. Rather than operatein isolation, HID securitygovernance ties into broaderbusiness risk management andproduct planning. This keepscybersecurity aligned withpractical requirements and real-world conditions. Building onStandards Governanceat the Core HID’s cybersecurity governance framework isgrounded in clear ownership, cross-functionalcoordination and structured escalation. Our globalinformation security program connects engineering,product, operations and compliance teams aroundshared protocols for protecting systems andresponding to threats. HID builds its cybersecurity posture on globallyrecognized standards. Our HID Origo platform reflectsthis commitment through security practices that alignwith established international frameworks. ISO 27001defines how we manage informationsecurity across systems, facilities and operations. Itsets clear expectations for risk management, accesscontrol and continuous monitoring. By applying theseprinciples across product and service teams, HIDensures that information security remains a coreoperational priority. Across each of our physical access control systemplatforms —HID Origo,HID Aerocontrollers,HID Signo readersandMercury MP IntelligentControllers— the development process includesformal threat modeling to evaluate potential attackpaths and abuse cases. These assessments happenearly and continue throughout the product lifecycle.Security reviews and internal audits are integratedinto major milestones to help identify and remediatevulnerabilities before release. Teams follow adefined, secure development lifecycle that supportsaccountability across roles and timelines. SOC 2audits focus on how we manage data privacy,availability and system integrity. These controls helpcustomers evaluate our internal practices and confirmthat we operate with transparency and reliability.SOC 2 also helps guide how HID supports secureintegrations and shared responsibility across cloud-enabled infrastructure. CSA STARcertification from the Cloud SecurityAlliance provides independent validation of HID’scloud security capabilities. It reflects how HIDmanages shared responsibility, data access andsystem configuration across our cloud platforms. When issues surface, the response process is tightlymanaged. HID activates a formal incident responseprogram that includes root cause investigationand documentation. This is led by a designatedcoordination team with representation fromproduct security, engineering, legal and corporatecommunications. Every step is tracked to closure, andfindings feed back into future planning. These standards inform how HID designs, developsand supports its physical access control systemplatforms. They give customers confidence