Head In The Cloud Feet On The Ground

Things to remember when choosing a cloud PACS in the federal government

More government agencies are taking their physical access control system (PACS) to the cloud, and it’s easy to see why. The cloud simplifies what otherwise can be an arduous operation. Even the National Institute of Standards and Technology, in its recent “Definition of Cloud Computing,” identifies cloud computing in terms of its simplicity. Cloud operations, it notes, require “minimal management effort or service provider interaction.”

But in the rush to claim a spot in the cloud to enhance HSPD- 12 and PIV services, agencies would benefit by looking at the bigger picture. While a simple cloud solution is good, a cloud solution that is both simple and secure is even better.

The Benefits

Cost savings alone lure many information technology officers. Thanks to Software-as-a-Service (SaaS), the expense and hassle of dedicated application server and workstation maintenance, upgrades, repairs and specialized personnel effectively become the responsibility of the solution host. With these savings, enterprises are able to reconfigure budgets so that more money is allotted for things such as operations. They also can more efficiently use IT and server resources, potentially sharing them for a more collaborative enterprise.

Centralization is likewise appealing, particularly to multi-tenant and multi-facility enterprises. Managing a separate server room or system at each facility is a far cry from efficient. Cloud deployment allows these enterprises to use minimal physical IT resources to support the maximum level of IT demand—whether that be through a private or hybrid cloud.

And let’s not forget scalability. Agencies can enjoy the benefits of the cloud regardless of their size. Should these agencies expand, the cloud can allow their PACS to grow with minimal disturbance.

These benefits are significant. To many enterprises, they are too appealing to pass up. But this is only half the story.

A Simpler, More Secure Cloud

Distracted by the obvious advantages of cloud PACS, enterprises must take the time to ensure that the cloud solution they choose is complete and secure. To do its part, the federal government has established an accreditation process for cloud providers called the Federal Risk and Authorization Management Program (FedRAMP). While FedRAMP is a step forward for standardization, a robust, viable cloud solution is one that mixes the benefits of reliability and cost savings with the promise of security and streamlined operations. With the assumption that all cloud PACS are created equal, some agencies may overlook an even simpler—and more secure—solution.

Secure Infrastructure

First, agencies should do well to ask vendors if their cloud PACS infrastructure is engineered as a complete solution—designed to serve the entire enterprise equally. A solid infrastructure supporting an agency’s PACS cloud solution can eliminate unforeseen challenges such as the complexity and costs associated with elaborate integration efforts.

Using seamless infrastructure can simplify this aspect of cloud PACS. For example, solution providers that upgrade an entire team of readers with the click of a button eliminate the need to service individual readers one by one and thereby showcase the benefits of an enterprise cloud solution. Likewise, the inconvenience and difficulty this work could present for an enterprise’s operations is removed.

In the move from a local server solution to a cloud PACS or SaaS, enterprises should ensure that they don’t trade one means of simplicity for another source of complication.

Authentication

By the same token, nothing undermines the benefit of simplicity and the single purpose of a PACS like the threat of fraud. For that reason, viable PACS cloud solutions in the federal government should be capable of strong authentication. With a tool as sophisticated as the PIV card, agencies should utilize the technology, which is called for in HSPD-12, OMB M11-11 and FICAM.

Agencies should deploy strong authentication that reinforces facility security with each access control transaction. Information should not be cached or reused for days at a time, creating an unnecessary security risk.

In short, cloud PACS in the federal government should use PIV and PIV-I credential authentication that:

  1. Verifies that the credential is genuine, cryptographically validating that the credential is not counterfeit or fraudulent by performing a challenge-response exchange for every single reader transaction.
  2. Verifies origin to ensure that the issuers are trusted and legitimate.
  3. Confirms that the credential data has not been altered; the system should verify that the unique ID and all information on a user’s card were not altered and that the certificate is signed and trusted.
  4. Confirms certificate status by using a Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP) Responder to confirm that the certificate is active.

The introduction of fraud to an access control system can complicate the operation and undermine the end goal of a PACS. Strong authentication enables enterprises to identify fraudulent credentials and prevent unauthorized access with each transaction. Some vendors offer one or two of the criteria but not all four, which is a shortsighted approach.

Opting for a cloud PACS solution is, without argument, an upgrade. However, the benefits are limited if that solution is not supported by a solid, holistic infrastructure and also protected from fraud. After all, only a secure enterprise cloud solution is truly simple.

This article originally appeared in the October 2012 issue of Security Today.

Featured

  • CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October, CISA and the National Cybersecurity Alliance (NCA) will focus on ways to “Secure Our World” by educating the public on how to stay safe online. Read Now

  • Cybersecurity Awareness Month: Top Five Action Items to Elevate Your Data Security Posture Management and Secure Your Data

    October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3