fbpx
26 C
Sydney
Wednesday, December 25, 2024

Buy now

  • HIKVISION NVR
  • HID SIGNO
  • HIK Vision
HomeSecurityAccess ControlHow Would You Secure IP-Enabled Access Control Solutions?

How Would You Secure IP-Enabled Access Control Solutions?

26 C
Sydney
25.2 C
Brisbane
29.2 C
Canberra
13.2 C
Melbourne

RECOMMENDED

WEATHER

Sydney
clear sky
25.6 ° C
28.6 °
23.5 °
55 %
8.2kmh
0 %
Wed
24 °
Thu
27 °
Fri
36 °
Sat
22 °
Sun
24 °

Latest Articles

STAY CONNECTED

2,458FansLike
1,487FollowersFollow
0FollowersFollow
Bookmark
Page is Bookmarked

We’ve heard a lot about back doors in IP cameras – practically every manufacturer has had issues over the past few years. But what about IP access controllers? How would you secure these network-connected systems when they must be exposed to public networks?

A: We’d be limiting IP addresses that have access through the firewall using a white list comprising the fewest possible users. Ensure the IDS reports attempts to breach protected ports. Minimise or eliminate wireless network communications unless encrypted. Consider whether there’s a need for the security workstation to be exposed to local data networks. It’s possible to build dedicated links to minimise touch points.

The best access control solutions will have app-based management of security functionality allowing administrators a considerable measure of remote control when it comes to event reporting, alarm management and driving of doors. The app will need to run on a secure smart phone with biometric authentication. This device will also need secure passage through the firewall. Getting this right is going to take the input of the IT team.

Another consideration is the nature of the database and the network on which its server/s are installed. This aspect would be simpler if the access control solution lived on a secure subnet and it might be more complex if the database is managed in virtual servers in a fully networked environment. If it’s the latter, you’ll like already be on first name terms with relevant IT engineers.

Other things we’d be doing would be cyber security 101 – no default passwords, ensuring adjacent automation devices linked to the access control system are also secure, implementing a process of vulnerability testing and reporting. Training of staff so they are aware of the risks posed by operator error – opening attachments, using third party thumb drives, etc.

It also helps to get across the software that is controlling boards and devices across the entire solution. If it’s just an access control system, that’s easier, but if there are oddments of automation, that means devices run by who-knows-what code with who-knows-what vulnerabilities. A lot of automation code is free or open source and can’t be trusted in secure ecosystems.

Finally, ensure physical security of the control panels with tamper switches and secure the workstation, card printer and camera used to support the access control system.

#securityelectronicsandnetworks.com

SECTECHfeb19 960x90 logos3

AUTHOR

SEN News
SEN Newshttps://sen.news
Security & Electronics Networks - Leading the Security Industry with News and Latest Events. Providing information and pre-release updates on the latest tech and bringing it all to you daily. SEN News has been in print for over 20 years and has grown strong as a worldwide resource in digital media.

LEAVE A REPLY

Please enter your comment!
Please enter your name here