fbpx
20.5 C
Sydney
Friday, March 29, 2024

Buy now

  • ID500014-HID-INTERCOM-26.02.2024-728x90
  • HID
  • HikVision ANPR
HomeSecurityAccess ControlHow Would You Secure IP-Enabled Access Control Solutions?

How Would You Secure IP-Enabled Access Control Solutions?

20.5 C
Sydney
20.8 C
Brisbane
20.8 C
Canberra
15 C
Melbourne

RECOMMENDED

WEATHER

Sydney
clear sky
20 ° C
21.6 °
17.5 °
73 %
2.1kmh
0 %
Fri
20 °
Sat
24 °
Sun
23 °
Mon
24 °
Tue
27 °

Latest Articles

STAY CONNECTED

2,469FansLike
1,372FollowersFollow
0FollowersFollow

We’ve heard a lot about back doors in IP cameras – practically every manufacturer has had issues over the past few years. But what about IP access controllers? How would you secure these network-connected systems when they must be exposed to public networks?

A: We’d be limiting IP addresses that have access through the firewall using a white list comprising the fewest possible users. Ensure the IDS reports attempts to breach protected ports. Minimise or eliminate wireless network communications unless encrypted. Consider whether there’s a need for the security workstation to be exposed to local data networks. It’s possible to build dedicated links to minimise touch points.

The best access control solutions will have app-based management of security functionality allowing administrators a considerable measure of remote control when it comes to event reporting, alarm management and driving of doors. The app will need to run on a secure smart phone with biometric authentication. This device will also need secure passage through the firewall. Getting this right is going to take the input of the IT team.

Another consideration is the nature of the database and the network on which its server/s are installed. This aspect would be simpler if the access control solution lived on a secure subnet and it might be more complex if the database is managed in virtual servers in a fully networked environment. If it’s the latter, you’ll like already be on first name terms with relevant IT engineers.

Other things we’d be doing would be cyber security 101 – no default passwords, ensuring adjacent automation devices linked to the access control system are also secure, implementing a process of vulnerability testing and reporting. Training of staff so they are aware of the risks posed by operator error – opening attachments, using third party thumb drives, etc.

It also helps to get across the software that is controlling boards and devices across the entire solution. If it’s just an access control system, that’s easier, but if there are oddments of automation, that means devices run by who-knows-what code with who-knows-what vulnerabilities. A lot of automation code is free or open source and can’t be trusted in secure ecosystems.

Finally, ensure physical security of the control panels with tamper switches and secure the workstation, card printer and camera used to support the access control system.

#securityelectronicsandnetworks.com

SECTECHfeb19 960x90 logos3

AUTHOR

SEN News
SEN Newshttps://sen.news
Security & Electronics Networks - Leading the Security Industry with News and Latest Events. Providing information and pre-release updates on the latest tech and bringing it all to you daily. SEN News has been in print for over 20 years and has grown strong as a worldwide resource in digital media.

LEAVE A REPLY

Please enter your comment!
Please enter your name here