Ensuring end-to-end protection of video integrity

Similar documents
Junos Pulse Instructions for Windows and Mac OS X

MaaS360 Cloud Extender

Mobile Device Manager Admin Guide. Reports and Alerts

ISAM TO SQL MIGRATION IN SYSPRO

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

BackupAssist SQL Add-on

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Service Desk Self Service Overview

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

Deployment Overview (Installation):

In addition to assisting with the disaster planning process, it is hoped this document will also::

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Serv-U Distributed Architecture Guide

Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway

Installation Guide Marshal Reporting Console

FUJITSU Software ServerView Suite ServerView PrimeCollect

User Manual Brainloop Outlook Add-In. Version 3.4

Password Reset for Remote Users

Installation Guide Marshal Reporting Console

Using PayPal Website Payments Pro UK with ProductCart

Integrating With incontact dbprovider & Screen Pops

AVG AntiVirus Business Edition

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

2. When logging is used, which severity level indicates that a device is unusable?

Sage 100 What s New in Tracey Brinkman Senior Consultant BKD Technologies tbrinkman@bkd.com

Configuring an Client for your Hosting Support POP/IMAP mailbox

Connector for Microsoft Dynamics Installation Guide

First Global Data Corp.

Implementing SQL Manage Quick Guide

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide

Data Protection Policy & Procedure

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

GUIDANCE FOR BUSINESS ASSOCIATES

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release Readme

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

CallRex 4.2 Installation Guide

FINRA Regulation Filing Application Batch Submissions

STIOffice Integration Installation, FAQ and Troubleshooting

HP Connected Backup Online Help. Version October 2012

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

Customers FAQs for Webroot SecureAnywhere Identity Shield

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE Savision B.V. savision.com All rights reserved.

Webalo Pro Appliance Setup

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors

Cloud Services Frequently Asked Questions FAQ

Cloud Services MDM. Windows 8 User Guide

FAQs for Webroot SecureAnywhere Identity Shield

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

DisplayNote Technologies Limited Data Protection Policy July 2014

Helpdesk Support Tickets & Knowledgebase

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: Fax:

ScaleIO Security Configuration Guide

CSAT Account Management

Telelink 6. Installation Manual

Getting Started Guide

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management

Configuring SSL and TLS Decryption in ngeniusone

Instant Chime for IBM Sametime Quick Start Guide

Durango Merchant Services QuickBooks SyncPay

Information Services Hosting Arrangements

NEC CLOUD STORAGE. User Guide. Version: R03.1

Data Protection Act Data security breach management

Best Practice - Pentaho BA for High Availability

KronoDesk Migration and Integration Guide Inflectra Corporation

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

Introduction to Mindjet MindManager Server

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Mobile Deployment Guide For Apple ios

State of Wisconsin. File Server Service Service Offering Definition

Attunity RepliWeb SSL Guide

AvePoint Privacy Impact Assessment 1

Connecting to

ABELMed Platform Setup Conventions

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation User Guide

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Serv-U Distributed Architecture Guide

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

TaskCentre v4.5 Send Message (SMTP) Tool White Paper

RSA SecurID Software Token Security Best Practices Guide. Version 3

Title: How Do You Handle Exchange Mailboxes for Employees Who Are No Longer With the Company

E2E Express 3.0. Requirements

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Datawatch Server Administrator's Guide

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform

KIK s GUIDE FOR LAW ENFORCEMENT

Licensing Windows Server 2012 for use with virtualization technologies

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, Infoblox NIOS Page 1 of 8

Transcription:

White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015

Milestne Systems Ensuring end-t-end prtectin f vide integrity Table f Cntents Intrductin... 3 Purpse and target audience... 3 Vide flw and inherent security risks... 3 Addressing security cncerns and risks... 6 1. Vide captured by camera... 6 2. Vide streamed t the Recrding Server... 7 3. Vide stred in the Recrding Server database... 7 4. Live r recrded vide is send t a client ver a netwrk... 9 5. Live r recrded vide viewed and exprted t a media... 10 6. Exprted evidence media is transprted frm the surveillance site t plice r a curt... 11 7. The exprted evidence is viewed by plice r a judge in a curt... 12 Benefits and summary... 14 Page2 f 15

Intrductin Milestne Systems Ensuring end-t-end prtectin f vide integrity In applicatins and installatins where vide plays a critical rle as evidence material, it is paramunt that the vide is transmitted, stred and in general handled in a secure way; frm the time it is captured by the camera t the time it is used as evidence, fr example in a curt f law. Milestne XPrtect Crprate and XPrtect Smart Client prvide a series f security mechanisms that enable users t maintain full end-t-end security and integrity f recrded vide data. Vide database encryptin, digital signing f vide databases and a functin t prevent re-exprt f the exprted material are cre cmpnents f Milestne s vide management slutin fr ensuring and prtecting the integrity f the vide evidence. Purpse and target audience The purpse f this white paper is t give a general verview f hw vide is transmitted frm the camera and stred securely in the XPrtect Crprate Recrding Server databases, as well as hw exprted recrdings are secured and validated in the XPrtect Smart Client Player when used as evidence. The primary audience fr this white paper is individuals r rganizatins with surveillance prjects/installatins where vide and evidence handling is critical. The target grup might include (but is nt limited t) the fllwing audiences: surveillance system architects/designers and surveillance prject cnsultants security fficers cmpanies rganizatins and law enfrcement bdies This white paper shuld enable the reader t understand hw recrdings are secured frm transmissin frm the camera t viewing exprted recrdings as evidence, as well as hw t implement and use the extended security in the mst ptimal way. The reader is assumed t have a general understanding f Milestne XPrtect Crprate and IP vide management slutins in general. Vide flw and inherent security risks In any vide surveillance system, analg r digital, there is an inherent security risk in the different parts, cmpnents r data/vide transprtatin media used. These Page3 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity elements f the system may be tampered with r the security f them can be cmprmised. In digital vide surveillance systems, the vide flw is typically as illustrated belw. Each functin and cmpnent has its wn inherent risks, examples f which are listed here: 1. Vide is captured by a camera Camera may be discnnected, stlen r simply vandalized Camera may be tampered with by turning it r by cvering the lens 2. Vide is streamed ver the netwrk t a Recrding Server The netwrk may be discnnected r flded with unwanted data due t a distributed denial-f-service (DDOS) attack The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide 3. The Recrding Server stres the vide in its vide database The Recrding Server may be turned ff r fail Micrsft Windws security culd be cmprmised giving lcal r remte access t the vide database files 4. Live r recrded vide is sent ver a netwrk t a client Page4 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity The netwrk may be discnnected r flded with unwanted data due t a DDOS attack The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide 5. The client decdes the vide and displays it n the mnitr and ffers a functin t exprt vide recrdings fr evidence Unauthrized persns may try t hack r therwise btain lgin credentials t gain unauthrized access t viewing and exprting vide Authenticated surveillance users may try t tamper with exprted material 6. Exprted evidence media is transprted frm the surveillance site t plice r a curt The exprted vide may be viewed and cpied by unauthrized persns The exprted vide may be tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence 7. The exprted evidence is viewed by plice r a judge in curt The exprted vide may have been tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence Page5 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity Addressing security cncerns and risks As highlighted in the previus sectin, there are several places where security can be breached. T address these security cncerns and inherent risks, Milestne has implemented several security functins in additin t the standard security measures that can be used t increase the security f the verall vide system and its recrdings. The belw illustratin shws the pssible security measures t cunter tampering and fraud in each f the vide flw steps. 1. Vide captured by camera Risk: Camera may be discnnected, stlen r simply vandalized Milestne XPrtect Crprate will autmatically detect if the camera is nt respnding r stps streaming vide t the system. Once the system detects this it issues a cmmunicatin errr event, which triggers alarms r rules that ntifies the right peple f the issue. Risk: Camera may be tampered with by turning it r by cvering the lens Many cameras can detect tampering events f different kinds, such as tampering, vide lss, and temperature. These events can be received by the XPrtect Crprate system that triggers alarms r rules, which ntifies the right peple f the issue. Page6 f 15

2. Vide streamed t the Recrding Server Milestne Systems Ensuring end-t-end prtectin f vide integrity Risk: The netwrk may be discnnected r flded with unwanted data due t a DDOS attack Milestne XPrtect Crprate will autmatically detect if the camera is nt respnding r stps streaming vide t the system. Once the system detects this it issues a cmmunicatin errr event, which triggers alarms r rules that ntifies the right peple f the issue. In additin t creating alarms r ntificatins via emails, XPrtect Crprate als supprts Edge Strage n select devices. Edge Strage ffers the functin t recrd vide in the camera itself and let the Recrding Server retrieve these recrdings after a netwrk failure, effectively ensuring vide recrding even fr perids with n cnnectin t the camera. Fr mre infrmatin n Edge Strage supprt in XPrtect Crprate: http://www.milestnesys.cm/sharepint/white%20papers/milestne_edge_strage_ with_flexible_retrieval.pdf Risk: The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide Tw methds can be used t prtect the transmitted vide: VPN tunneling and HTTPS. A virtual private netwrk (VPN) tunnel can be set up between the camera and Recrding Server using standard equipment r sftware. The VPN will encrypt all data transmitted thrugh the tunnel and thus prtect against unauthrized access t the vide. Using a VPN is a generic slutin that can be used with any camera. In additin t a VPN, XPrtect Crprate als supprts HTTP Secure (HTTPS) fr a subset f cameras. HTTPS uses Secure Scket Layer (SSL) and ffers encrypted cmmunicatin directly with the camera withut a VPN tunnel. Fr mre infrmatin abut VPN, HTTPS and SSL: http://en.wikipedia.rg/wiki/virtual_private_netwrk http://en.wikipedia.rg/wiki/http_secure http://en.wikipedia.rg/wiki/transprt_layer_security 3. Vide stred in the Recrding Server database Risk: The Recrding Server may be turned ff r fail Page7 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity XPrtect Crprate supprts Recrding Server failver, which is a functin where ne r mre dedicated Failver Recrding Servers mnitr the state f the primary Recrding Servers. If the primary Recrding Servers stp respnding, due t failure r being turned ff, fr example fr maintenance, the Failver Recrding Servers take ver the task f recrding the vide. In additin t the failver supprt, Edge Strage can als help because, as described in the previus sectin, it can recrd vide in the camera, allwing the Recrding Server t retrieve the vide nce it is up and running again. Risk: Windws (the perating system) security culd be cmprmised giving lcal r remte access t the vide database files T prevent unauthrized access t the vide database files several layers f security can be implemented: Physical security Access t the rm with the physical Recrding Server shuld be limited t a few authrized peple nly Windws Server security Lcal cnsle and remte desktp access t the server running the Recrding Server shuld be limited t a few authrized peple Windws shuld be set t autmatically lgut after a shrt time f inactivity Windws shuld be kept updated with the newest service releases Recrding Server database The database can be cnfigured t encrypt the recrdings in tw mdes: Light and Strng The database can be set t sign the recrdings digitally t prevent tampering Bth f the database encryptin mdes Light and Strng are secure and use the same DES-56 encryptin technlgy. The difference is hw much f the recrdings are encrypted. Strng encrypts all parts f the vide data stred in the database but requires mre prcessing pwer t d s because everything needs t be encrypted Light nly encrypts the first part f the JPEG r MPEG-4/H.264 vide data called the header, and because f this, it uses less prcessing pwer t encrypt the vide. The vide will still be secure if smene tries t hack the database Page8 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity because the vide cannt be decded withut the infrmatin cntained in the encrypted header The digital signature is created by calculating a Message-Digest 5 (MD5) algrithm hash f the recrdings. The hash is then signed with a Digital Signature Algrithm (DSA) and stred with the recrdings. If the cntent later n is changed r parts f the recrdings are remved, the MD5 hash and signature will n lnger match, making it pssible t detect that the recrdings have been tampered with. Enabling encryptin and digital signature f the recrdings des nt alter the actual recrded audi r vide cntent in any way. If the recrded audi r vide cntains sme frm f embedded watermark infrmatin, it will still be pssible t verify the authenticity f the audi r vide, either by the camera vendr r by a methd/tl prvided by the camera vendr. Fr mre infrmatin n MD5 and DSA: http://da.wikipedia.rg/wiki/md5 http://en.wikipedia.rg/wiki/digital_signature_algrithm Cnfiguratin f the database is dne in the XPrtect Crprate Management Client, and it is a simple matter f selecting the Signing check bx and selecting either Light r Strng in the Encryptin field. 4. Live r recrded vide is send t a client ver a netwrk Risk: The netwrk may be discnnected r flded with unwanted data due t a DDOS attack In case the netwrk is flded with unwanted data, the cnnectin t the client may be discnnected r rendered inperable. In this case the peratr will immediately see this and can alert the administratr abut the issue. Page9 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity While the clients may nt be able t view live r recrded vide, the Recrding Server can cntinue t recrd vide unaffected if the netwrk has been designed as tw separate netwrks; ne fr clients and ne fr cameras. Risk: The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide As with the netwrk cnnectin frm the cameras t the Recrding Server, the transmitted vide frm the Recrding Server t the client can be prtected by using VPN tunneling. In additin t VPN tunneling, XPrtect Web Client and XPrtect Mbile als supprt HTTPS. 5. Live r recrded vide viewed and exprted t a media Risk: Unauthrized persns may try t hack r therwise btain lg-in credentials t gain unauthrized access t viewing and exprting vide T prevent smene frm hacking int the system, XPrtect Crprate relies n secure Windws Active Directry (AD) authenticatin that ffers strng prtectin against hacking. In extensin t the built-in technical security in Windws AD, it is imprtant that all users f the system have their wn separate Windws AD accunt because a single accunt, r just a few shared accunts, will make it hard t cntrl wh knws the user name and passwrd and thus wh can access the system. Using separate accunts fr each user will als make it easier t investigate in the XPrtect Crprate audit lg wh lgged in, viewed live r recrded vide r wh exprted vide frm the system. In additin t securing access t the client, XPrtect Crprate ffers centrally cntrlled security settings with time prfiles that set when and which cameras can be viewed live, played back and exprted by the user. Furthermre, XPrtect Crprate can cntrl all exprt settings available in the XPrtect Smart Client via a s-called XPrtect Smart Client prfile. Belw is highlighted a few f the XPrtect Smart Client prfile s exprt settings with the recmmended value fr the mst secure exprt. Page10 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity Exprt t set t T media burner XPrtect frmat set t Available Media player and Still image frmats set t Unavailable Include XPrtect Smart Client Player set t Yes Prevent re-exprt set t Yes Passwrd prtect data set t Yes Passwrd set t a predefined passwrd Encryptin strength set t 256-bit AES Manage prject cmments set t Required Include digital signature set t Yes The Lcked check bx must be selected fr all f the abve settings t ensure that an XPrtect Smart Client user cannt verride them. The full list f the XPrtect Smart Client prfile s exprt settings can be seen in the screensht t the right n the previus page. 6. Exprted evidence media is transprted frm the surveillance site t plice r a curt T prevent unauthrized persns frm viewing r cpying exprted vide, Milestne s XPrtect Smart Client supprt three levels f security n the exprted vide database: 1. Database encryptin with passwrd prtectin 2. Disable re-exprt 3. Digital signature Risk: The exprted vide may be viewed and cpied by unauthrized persns The database encryptin supprts up t 256-bit advanced encryptin standard (AES) and access is prtected by a passwrd. Page11 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity XPrtect Smart Client ffers the ptin t prevent the exprted vide frm being reexprted when viewed again in the XPrtect Smart Client Player. This ensures that the vide cannt be exprted in anther frmat r be exprted t the XPrtect frmat again but withut encryptin and digital signing. Risk: The exprted vide may be tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence When vide that shuld be exprted is prtected with a digital signature n the Recrding Server, the signature f the recrded vide will be checked during the exprt t ensure that the vide has nt been tampered with n the Recrding Server. If the recrded vide passes the signature check, including the riginal digital signature, the vide is exprted t a new database created by XPrtect Smart Client n the client PC. During the exprt, XPrtect Smart Client adds its wn signature s the vide is prtected by tw signatures the riginal ne made during recrding and the ne created by XPrtect Smart Client during the exprt. 7. The exprted evidence is viewed by plice r a judge in a curt Risk: The exprted vide may have been tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence When the exprted recrdings prtected by encryptin and digital signing are viewed again by plice r a judge in curt, the XPrtect Smart Client Player will request the user t enter the passwrd t decrypt the recrdings. Once the crrect passwrd has been entered, the client infrms the user that the vide is signed and can be verified by clicking the Verify Signatures buttn. This indicates fr the persn viewing the vide that the recrdings have been prtected by an encryptin and in additin t this have a digital signature that can be verified fr authenticity. Activating the digital signing verificatin will pen a new windw and may take sme time t cmplete depending n the size f the recrdings and amunt f cameras in the exprt. When cmpleted, it will display if the recrdings have been tampered with r if the integrity is intact. Page12 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity The belw screensht shws an example f crrectly validated databases. Bth signatures can be validated directly in the Player. If the validatin fails, the dialg bx will display the time f the first failed segment f the database as seen in the screen sht belw. Page13 f 15

Milestne Systems Ensuring end-t-end prtectin f vide integrity Benefits and summary By cmbining a set f standard security functins and cncepts with a set f slutin unique functins, Milestne XPrtect Crprate enables users t deply vide surveillance slutins with full end-t-end security. With the encryptin and signing features in XPrtect Crprate and XPrtect Smart Client, it is pssible t keep streamed and recrded vide secure and prve the integrity f recrdings all the way frm the riginal stream frm the camera and t the pint where it is viewed, fr example in a curt f law. Fr cmpanies that require strict cntrl f the exprt frmat and security settings, the XPrtect Smart Client prfile can be used t cntrl exprt settings and parameters strictly frm a central pint. Milestne XPrtect Crprate and XPrtect Smart Client ffers secure handling f vide all the way frm the pint where it is captured and streamed frm the camera t the vide surveillance system and t the time it is viewed as evidence. Page14 f 15

Abut Milestne Systems Funded in 1998, Milestne Systems is the glbal industry leader in pen platfrm IP vide management sftware. The XPrtect platfrm delivers pwerful surveillance that is easy t manage, reliable and prven in thusands f custmer installatins arund the wrld. With supprt fr the widest chice in netwrk hardware and integratin with ther systems, XPrtect prvides best-in-class slutins t vide enable rganizatins managing risks, prtecting peple and assets, ptimizing prcesses and reducing csts. Milestne sftware is sld thrugh authrized and certified partners. Fr mre infrmatin, visit www.milestnesys.cm Milestne Systems Headquarters, DK Tel: +45 88 300 300 Milestne Systems US Tel: +1 503 350 1100