Cloud services can deliver scalable capabilities quickly without the need to purchase, install, or configure any new on-site physical assets
Cloud connectivity can provide a linkage between the mobile users
and the facilities and systems they want to interact with

From enterprise applications to small businesses, schools, health care facilities and beyond, investments in physical security systems provide valuable resources to help protect people, property and assets – and ultimately the financial security and well-being of the organization. As need and demand for better security has dramatically increased over the years, today’s technology is more software and computer driven, enabling systems to be networked internally or managed externally through cloud computing platforms.

Increased Connectivity

 In today’s mobile, connected world, end users expect the ability to view and manage their systems from anywhere at any time, making hosted access control an attractive and economical proposition. Cloud connectivity can provide a linkage between the mobile users and the facilities and systems they want to interact with, whether those systems are in one place or distributed over several locations. And, cloud services can deliver scalable capabilities quickly – often on demand – without the need to purchase, install, or configure any new on-site physical assets, such as servers or work stations.

However, these benefits are not without their drawbacks and potential risks, most notably cybersecurity and the availability of the system and its data. Any system outage, whether the result of a network breach, server failure or other factor, compromises security and could leave an organization vulnerable. The resulting risks could be catastrophic, making it vital that organizations ensure that their access control, video surveillance and other security systems are always up and running. Management concerns over the cybersecurity risks of cloud-based solutions grow with each high-profile data breach that is reported, and with good reason.

Incorporating the cloud services into your operation will continue to take time and resources that will need to be included in your plans
Risks could be catastrophic, making it vital that organizations
ensure that their security systems are always up and running

Maintaining Critical Functions

As companies move forward with IT and physical security planning, here are some factors to consider and incorporate appropriately into the process.

Step 1: Consider the benefits and risks of cloud-based services objectively

Be honest about how your company functions today, how you want it to function in the future, and how cloud-based services might help get you from here to there. But don’t think that cloud services will solve problems magically – when it comes down to it, cloud services are really just renting hardware and software in somebody else’s facility. There are definitely benefits to renting versus owning, but there are also significant risks. And, incorporating the cloud services into your operation, and/or maintaining them, will continue to take time and resources that will need to be included in your plans.

Step 2: Determine which functions must continue, even in the event of cloud system failure.

This should be an extension of your current business strategy, which already evaluated your essential functions, personnel, etc. Remember that the risks are compounded if the cloud is used to store or process important business data – in the event of a failure, that data may not be accessible or under your control. Be very clear about the procedures and steps you will take if your cloud services go down so you can keep your operations up and running.

Step 3: Implement backup processes to ensure critical business continuity.

Once the intended benefits of cloud services are evaluated in the light of foreseeable risks and critical functions are clearly identified, it is time to put the changes into effect, along with backup and contingency plans that will be triggered in the event of service disruptions. For access control, it is essential to quickly be able to re-load your list of authorized users and permissions so that normal operations can resume as soon as possible after an outage or failure.

Both hardware and software technical advancements continue to provide new options for security management across every vertical market application
Data backup and contingency plans are crucial in the event of service disruptions

Security Applications Of Cloud-Based Services

Most firms are realising that physical security systems, including access control and video surveillance, are critical facility functions that need to be maintained 24/7 under any circumstances. Even so, both of these security applications are current offerings from cloud-based service providers that companies can consider to supplement or outsource their internal functions.

Choosing An Approach

As an example, let’s see how the suggestions in the steps above might affect a firm’s planning for access control. Before we start, we should note that different organizations will have varying risk tolerances which will contribute to what type of access control solution they choose, on premise or cloud. There is no single “right” or “wrong” answer for the general question of how to choose the right approach or services; the right answer depends on the specifics of the situation for each firm.

1. Considering Cloud Service Benefits

We would consider the potential benefits of a cloud service for access control, sometimes called ACaaS, for Access Control as a Service. Offerings vary, but might include the provision of a server and software to process access requests, which would interact with the local access controllers via IP connectivity. Thus, it would generally be required for the controllers to support not only IP communications, but also encryption and digital certifications. Older controllers would have to be upgraded if they could not support these functions. Managed access control is a service where the firm pays a third party to administer the access control platform, including such tasks as adding and deleting access rights, printing badges and other credentials, monitoring for doors that are propped open or forced open.

On the upside, up-front capital costs could be reduced by limiting the amount of purchased hardware, and the ongoing management and maintenance of that hardware is done by the supplier. Depending on the supplier, the ongoing service costs might be based on the number of controlled doors, the number of users or credentials, the number of transactions, or some combination thereof.

On the downside, the list of credentialed users will now reside at the supplier’s location, where it could be subject to tampering, loss and/or theft. And, if the host server must be contacted in order to process a transaction (that is, open a door), then the operation of the system now depends on active and successful communication with the supplier’s off-site server at all times. A complete tradeoff can now be evaluated that compares the cost of owning hardware and software, along with necessary maintenance, and expected usage patterns, to the proposed cost from the cloud supplier and various related contract terms.

 2. Potential Risks

It goes without saying that in the event of a cloud-based or premises based access control failure, people within your facility will still need to be able to exit without the risk of being trapped inside. The question is, how important will it be for people to be granted or denied access based upon the configuration in the database prior to the failure? And, how urgent is adding/deleting authorized users, permissions and the other functions that require access to the host access control software? How much impact would there be on the company if the list of authorized users was altered or stolen by hackers?

3. Contingency Plan

An implementation and backup plan is developed and put into action. For the purpose of this example, let’s assume that ACaaS was approved and put into place. One part of the plan might be to capture complete back-ups of the user database periodically and to store them both on-site and off-site. Another part of the solution might be to select access controllers that have the ability to be battery backed up and hold a copy of the user database and device configuration locally so they can continue to function even in the event of a communication breakdown with the cloud supplier’s server or power outage. By taking this approach, the affected facility would be able to continue operating normally in the event of a communication breakdown or power outage, and update authorized changes after network communications were restored.

Implementing The Best Cloud-Based Plan

Both hardware and software technical advancements continue to provide new options for security management across every vertical market application. When changes are being considered that affect organizational physical and IT security, it is important to evaluate the options carefully.

Choosing an equipment supplier that has designed their products for maximum uptime is critical. This criteria will enable more effective and cost-efficient contingency planning, so you can implement the best plans possible for all your operations.

Want to learn more? Read SourceSecurity.com's Cybersecurity White Paper here

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Karen Evans President & Chief Executive Officer, Sielox LLC

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.