How can the industry address cybersecurity concerns of cloud systems?
Editor Introduction
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry address cybersecurity concerns of cloud-based systems?
The proliferation of the Internet of Things (IoT), connected devices, and the rush to embrace digital transformation have resulted in high demand for cloud services. Nevertheless, organisations looking to deploy cloud technologies want to be assured those services are built with stringent data protections. Every component, connection, and data flow must ensure that cybersecurity protocols are in place to protect sensitive data while maintaining an optimal user experience. Look for vendors who lead with a security-first strategy, work with proven cloud providers like Google, and have specific certifications like SOC 2 Type II, which ensures your data is securely managed. These are the partners that will go above and beyond to achieve high levels of cybersecurity compliance and guarantee your information stays safe.
Cybersecurity is certainly one of the first questions and major concerns of end users and systems integrators when discussing the cloud. It should also be a natural part of the planning for a system that includes one or several cloud components. The general misconception is that cloud systems are not as secure as traditional on-premise systems, but cloud systems are actually easier to keep up to date on software and firmware, ensuring the latest security patches and updates are implemented. This is because cloud providers perform these updates in-house and relieve the maintenance burden that would normally fall to an end user or integrator’s IT department.
To begin with, the concept of cloud-based security systems took a while to gain broad acceptance, with some commentators worried about the cybersecurity aspect. Now that cloud hosting is commonplace across many sectors (including financial services, for example) it has a much broader acceptance across the board. However, the security industry must never be complacent! The most important thing we need to do and show to prospective and active users of cloud-based services is that their data is completely secure. Firewalls at the on-premise end of the network are crucial in this regard, as is ensuring that any data transmitted is properly encrypted. Clients need to have the confidence that they can wholly trust their cloud provider with their data. It only takes one incident to shatter confidence, so it is vital that cloud-based services maintain fully watertight protection.
There are a few different categories of cybersecurity issues regarding cloud-based systems. Typically, this has little to do with encryption of data in transit or at rest. More often, the issues arise from control/management of access credentials, configuration, insiders, APIs, visibility and control of cloud operations, and other sources. Addressing these cybersecurity concerns is no different for the video surveillance and physical security market as it is for other markets. Much of it comes down to proper management and process/operations, visibility, training, tools, and talent. There is no silver bullet or shortcut; it is important for this industry to take cybersecurity seriously and be prepared to make a continuous, ongoing investment in this area.
Our industry tends to assume that everyone understands how cloud-based systems work, but many lack a basic understanding and working knowledge of the cloud. It’s this lack of education that is at the root of concerns, whether they be about data privacy or cybersecurity. For example, I don't think a lot of people understand that when you deploy a cloud environment, you pick where your data is going to be stored and if you don’t secure it properly, it’s going to be publicly accessible. And while data privacy is a central issue, it’s also critical to consider how cloud workflows might impact your security compliance. Are you HIPAA, PCIDSS, ISO, or CJIS compliant with your on-premises system? It’s incorrect to assume that any cloud-deployment model will automatically be compliant as well. It’s paramount that end-users and systems integrators are aware of who has access, and who is responsible for configuring cybersecurity parameters.
The technology industry should begin to adopt artificial intelligence and machine learning tools in order to address some of the current and future concerns involved with the public cloud. For example, it can create virtual firewalls that learn and adapt to changing patterns of traffic and activity or make it easier for humans to analyse and interpret that data more effectively, as well as identify or track down the source of attacks. Additionally, AI can be used to create systems that can automatically patch vulnerabilities and respond to attacks in real-time.
To effectively secure cloud-based systems, the industry must shift to a ‘zero trust’ mindset when establishing and maintaining networks and architectures. The main idea of a zero-trust network is that no entity connecting to and within the network can be trusted, and it employs techniques including network micro-segmentation and granular network perimeter security to determine whether an individual's credentials are authorised. Giving users access only to the networks they need provides obvious security benefits, and being able to track deviations in the actions associated with individual roles further ensures network protection. Additionally, sometimes people put things in the cloud and expect everything to be automatically secured, but they must take action to ensure proper security. In doing this, cybersecurity departments should pay close attention and certify that their policies and cybersecurity controls are applied correctly across all the cloud providers they are using, as each provider contains similar–yet distinct–controls.
From a security perspective, moving to the cloud means sharing information security responsibilities with the provider. Typically, tier-one cloud providers have implemented far more stringent security measures for their infrastructures than most independent organisations could ever afford to do on their own. Tier-one providers offer the highest levels of physical security for their data centers since they have to comply with regulations such as SOC 2, ISO 27001, HiPAA, and PCI. SaaS providers also implement mechanisms that help businesses quickly identify and manage risks. From encrypted communications and granular privacy controls to strong user authentications and system health monitoring tools, cloud-based solutions come with very robust cybersecurity and privacy features. Connectivity can bring some risks but it also comes with inherent advantages. Cloud service providers must do their part to ensure that the right security mechanisms are in place, such as vulnerability management and updates, system hardening, DDOS protection, encrypted communications, data protection capabilities, strong user authentication and password protection.
A recent cloud security report showed that 66% of survey respondents believe that traditional security solutions either do not work or have limited functionality in the cloud. Given how the growing threat landscape jeopardises the benefits of greater cloud adoption, here are four key points to consider:
- Consult with a trusted cloud security advisor to benefit from industry best practices and build cloud security into the design.
- Use consolidated threat-prevention cloud tools. Cloud security is much more complex than traditional on-premises security because instead of one perimeter (the network link connecting your company to the internet), you now have multiple perimeters.
- Centralise visibility, which is particularly important in cloud security because you can’t secure what you can’t see.
- Perform regular risk management exercises for every possible and impossible cloud security solution.
For example, with the security configurations like encryption and key management embedded in AWS (Amazon Web Service), Secu365 by Anviz implements protection throughout the process from data transmission to storage and moves traditional security practices from reactive to proactive and preventative.
Editor Summary
Current cybersecurity standards and practices are robust and widely implemented. Cloud systems protect a range of very sensitive data, such as financial transactions. However, physical security end users need to be aware of cybersecurity requirements and evaluate how well their cloud service providers are leveraging the available tools to protect their data. With awareness comes a greater level of comfort using cloud systems.
Anviz Global Inc. products
Anviz Global Inc. news
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralised...
Anviz, a pioneer in intelligent security solutions, proudly announces the launch of W2 Face, its latest hybrid biometric access control and attendance terminal. Designed to meet the evolving needs of modern enterprises, the W2 Face combines facial recognition, fingerprint authentication, and RFID capabilities in a compact, intelligent device built for dynamic workplaces. Responding to market evolution As the access control landscape shifts toward integrated multi-biometric solutions, business...
The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Sounds provide crucial context to visual events. For instance, someone running might appear suspicious on video, but audio could reveal they are shouting for help, changing the interpretation entirely. Even so, historically speaking, audio has been an underused component in physical security. How is the...
Anviz Global Inc. white papers
Anviz Global Inc. case studies
When they talk about digitalisation, there is one topic that keeps coming up: Smart Office. Intelligent IoT solutions that makes the users’ everyday lives safer, more comfortable, and more efficient. Systems to centrally manage employees' access with no keys and physical cards - face recognition, manage employee time tracking, and secure office printing with the embedded face recognition reader, are now seen as state-of-the-art. Dürr, founded in 1896, is a mechanical and plant engine...
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique...
The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart security, and the pace of digital intelligence change is gradually increasing. The security industry in the Middle East is rapidly growing, driven by the government's strong emphasis on national security and terrorism prevention. Centralised systems management Significant attention and investment have been directed towar...
Anviz Global Inc. videos
Expert commentary
Security beat
Anviz Global Inc.
32920 Alvarado-Niles Rd Ste 220, Union City, CA 94587
Toll-free: +1-855-ANVIZ4U (855-268-4948)
Email: info@anviz.com
Anviz Singapore
16 Collyer Quay #12-01
Income@Raffles Singapore 049318
Email: info@anviz.com
