Security Dealer & Integrator

JUN 2017

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: http://sdi.epubxp.com/i/835749

Contents of this Issue

Navigation

Page 37 of 59

38 Security Dealer & Integrator / www.SecurityInfoWatch.com June 2017 attack patterns highlighted in the leading threat reports, and they are vetted across a very broad commu- nity of government and industry practitioners. "Too oen in cybersecurity, it seems the bad guys are better organized and collaborate more closely than the good guys. e Controls provide a means to turn that around," SANS says. Learn more about the guidelines at www. sans.org/critical-security-controls. ■ » John Distelzweig is Vice President and General Manager of FLIR's Security segment. Request more information about the company at www.securityinfowatch.com/10213696. ture security researcher and product evalua- tor for consultant Smithee, Spelvin, Agnew and Plinge Inc. "(e VMS) is then put on top of a Microso server that is capa- ble of taking care of itself, and then plugged into a network with the right type of cyber defenses to take care of itself," ayer explains. Together, ayer says, these sophis- ticated systems provide excellent situ- ational awareness, early detection and rapid response for cyber intrusion. Security professionals – both end-users and integrators – should fol- low the cyber controls laid out in stan- dards, such as the "CIS Critical Secu- rity Controls" from the SANS institute. "e CIS Critical Security Controls Physical Security are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous attacks," SANS explains on its website. Created by the people who know how attacks work – NSA Red and Blue teams, the U.S. Department of Energy nuclear energy labs, law enforcement organizations and some of the nation's top forensics and incident response organizations – the Controls prior- itize and focus a smaller number of actions with high pay-off results. ey are derived from the most common Cybersecurity Best Practices Vendors' products should be progressively evolving to address the security control requirements that are necessary today to defend against sophisticated cyberattacks. Look for the following features and best practices to help your custom- ers deter, detect, delay and defend: • Enforced encryption between the VMS and cameras via Transport Layer Security (TLS). Cryptographic protocols such as these can secure connections between equipment and server by ensuring the connection is private – requiring the identity of communicating entities like cameras and VMS to be authenticated; or by performing continuous integrity checks through the use of message authentication codes. • Endpoint security appliances. When edge devices – such as video surveillance cameras – come under attack, endpoint security will be able to detect and alert to events such as a camera going offline. This should be included as part of the VMS infrastructure during the product design process. Endpoint security solutions – such as network intrusion detection systems (NIDS) – are an important way to help increase cyber defense. Upon installation, the NIDS begins creating a baseline by observing and learning the network's typical behavior. Once initial configuration is complete, the system can then be set to identify anomalies, send alerts, and even facilitate automatic or manual intervention tactics. Much like analytics for physical intrusion detection on cameras, the parameters on a NIDS can be set to serve as virtual barriers. • Stakeholder unification. As hybrid cyber and physical attacks continue to increase, phys- ical security managers, IT departments, customers and systems integrators all need to effectively communicate and work together. Cybersecurity awareness, education and training by all stakeholders are extremely important. In the past, there was never an expectation for security integrators to configure network systems, so many installers do not have the technical expertise regarding networking best practices. Consequently, integrators have had to work with limited resources, getting by on instinct rather than knowledge. As such, education and proper training concerning system hardening and cyber awareness is key. Customers are also looking at vendors to showcase a cyber roadmap that addresses the evolving challenges in the cyber space.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Dealer & Integrator - JUN 2017