Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Physical & Network Security: Better Together In 2014
How ready are you for the day you discover there are more networked IP security cameras than laptops in your infrastructure – and none adheres to 802.1x standards?
January 2, 2014
3 Min Read
Photo Credit: Amin Tabriz from <a href="http://www.flickr.com/photos/amin_tabrizi/63807476/sizes/m/in/photolist-6D2JU-7CDTW-9SoT9-a8LVF-au91j-aCSLF-c36TE-cXP22-d5ZPY-dnLFe-dtLyC-dtLDp-eSq4W-fGYVN-jWzAw-mFDRD-mTgSs-tkHw1-tXnb5-umJa3-wH4mJ-zH8aQ-AFsD7-AXvUf-BGpPS-F78YD-GyX7c-HX3wK-KxYn4-LHKRe-Mh7jG-PFDJh-Xe8YN-2ocYZV-2ogGz7-2vj3k2-2ZzFfA-3LMMRs-3W3U41-48kv76-4eWUtZ-4kQywn-4kQz2t-4xidpa-4CuKC3-4QZcYr-4TqrbZ-53wGjZ-53x1GX-59zCaT-5cmtyH/"target="new"> Flickr</a>
When you think about security, you probably think about the IT side of the equation: firewalls, encryption, and VPNs. There is another group in your company that also thinks about security constantly, but in their daily routines, the lingo is CCTV, proximity cards, intrusion detection, and monitoring. Until now you probably have not interacted with them too often, especially given the siloed reporting structures within most organizations. However, that is all changing as physical security is fast becoming front and center in the IT world.
In this new world the two groups must come together to achieve the shared goal of a secure organization. How safe is your server room if you have the latest firewall technology, but an ex-employee can walk into the office with an old badge? What do you do when you find out one day that there are more security cameras than laptops on your network infrastructure, and that they do not use 802.1x, which you require on all network ports?
While territoriality and control issues still exist between physical and IT security regimes within an organization, the role of the network (IT’s domain) in physical security technology is vital. At the same time, insider threats and intruders are getting increasingly sophisticated and bold, blending IT techniques with entry points through the physical perimeter. By sharing information, access, and analysis, it’s now possible to achieve a unified physical and IT security strategy.
Physical security for the IT-minded
Video surveillance has been around for the last 30 years, but the systems have mostly been proprietary and managed by a separate team. Today, that is rapidly changing, in parallel with ever increasing security risks. Now, video systems are running on the same IP network as the rest of the company’s IT applications. There are millions of networked cameras installed worldwide. Following suit, access control systems leveraging the corporate network are not far behind.
Not only does this make the system much easier to integrate with logical security, but it can also improve system capabilities and reduce costs. This is where IT comes in, because when the C-suite sees cost savings in an operational improvement, they will push to immediately implement those changes. For example, in an increasingly connected world, physical and IT security are intrinsically intertwined. So, if you want to truly secure an organization, you will have to make sure it is safe from both a logical and a physical point of view. This is exciting. But it also represents a fundamental change that is difficult to impart and execute.
Why physical and IT security need each other
We’ve all seen the stories of hacked IP video surveillance cameras, like what was exposed last summer around the BSides Conference. The trend shines a spotlight on the need for proper credentials to access and manage IP surveillance cameras in the same manner as an organization would manage a customer database, an application, or a cloud service. The BSides hacking also demonstrates the importance of properly installing and managing video surveillance equipment to keep out rogue devices that could become a vulnerability targeted for exploitation.
IT needs to be involved in today’s IP-connected physical security infrastructure to ensure proper policies and procedures are in place, and to lock down devices and applications as entry points to the network and corporate assets. This includes the design of physical security technologies in the network, which should have the same logical securities as any other node, access point, or end point on the network.
As an IT professional, I encourage you to proactively seek out the physical security team within your organization. Understand what you can do for them and what they can do for you. Understand the latest technology. Embrace the change that is coming, and unify teams and technologies for a common good. Physical and IT security: They’re good on their own but even better together. Just like chocolate and peanut butter.
Fredrik Nilsson is General Manager of Axis Communications, North America, where he has been instrumental in leading the industry shift from analog closed-circuit television to network video.
About the Author(s)
General Manager, Axis Communications, North America
Fredrik Nilsson has been responsible for Axis Communications North American operations since 2003. In this role, he has been instrumental in leading the industry shift from analog closed circuit television to network video. Mr. Nilsson serves on the Security Industry Association Board of Directors. He is a trusted industry speaker at leading events such as Securing New Ground, ASIS International, ISC West, and Interop. His articles have appeared in The Wall Street Journal, The New York Times, USA Today, and the Washington Post, and he has made numerous television appearances. He authored a book, Intelligent Network Video, published by CRC Press.
Prior to working for Axis, Mr. Nilsson served as a product manager for ABB, a global leader in power and automation technologies. He is a graduate of the Lund Institute of Technology and holds a master's degree in electrical engineering, with follow up post-graduate studies in economics.
You May Also Like
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics