Head In The Cloud Feet On The Ground

Things to remember when choosing a cloud PACS in the federal government

More government agencies are taking their physical access control system (PACS) to the cloud, and it’s easy to see why. The cloud simplifies what otherwise can be an arduous operation. Even the National Institute of Standards and Technology, in its recent “Definition of Cloud Computing,” identifies cloud computing in terms of its simplicity. Cloud operations, it notes, require “minimal management effort or service provider interaction.”

But in the rush to claim a spot in the cloud to enhance HSPD- 12 and PIV services, agencies would benefit by looking at the bigger picture. While a simple cloud solution is good, a cloud solution that is both simple and secure is even better.

The Benefits

Cost savings alone lure many information technology officers. Thanks to Software-as-a-Service (SaaS), the expense and hassle of dedicated application server and workstation maintenance, upgrades, repairs and specialized personnel effectively become the responsibility of the solution host. With these savings, enterprises are able to reconfigure budgets so that more money is allotted for things such as operations. They also can more efficiently use IT and server resources, potentially sharing them for a more collaborative enterprise.

Centralization is likewise appealing, particularly to multi-tenant and multi-facility enterprises. Managing a separate server room or system at each facility is a far cry from efficient. Cloud deployment allows these enterprises to use minimal physical IT resources to support the maximum level of IT demand—whether that be through a private or hybrid cloud.

And let’s not forget scalability. Agencies can enjoy the benefits of the cloud regardless of their size. Should these agencies expand, the cloud can allow their PACS to grow with minimal disturbance.

These benefits are significant. To many enterprises, they are too appealing to pass up. But this is only half the story.

A Simpler, More Secure Cloud

Distracted by the obvious advantages of cloud PACS, enterprises must take the time to ensure that the cloud solution they choose is complete and secure. To do its part, the federal government has established an accreditation process for cloud providers called the Federal Risk and Authorization Management Program (FedRAMP). While FedRAMP is a step forward for standardization, a robust, viable cloud solution is one that mixes the benefits of reliability and cost savings with the promise of security and streamlined operations. With the assumption that all cloud PACS are created equal, some agencies may overlook an even simpler—and more secure—solution.

Secure Infrastructure

First, agencies should do well to ask vendors if their cloud PACS infrastructure is engineered as a complete solution—designed to serve the entire enterprise equally. A solid infrastructure supporting an agency’s PACS cloud solution can eliminate unforeseen challenges such as the complexity and costs associated with elaborate integration efforts.

Using seamless infrastructure can simplify this aspect of cloud PACS. For example, solution providers that upgrade an entire team of readers with the click of a button eliminate the need to service individual readers one by one and thereby showcase the benefits of an enterprise cloud solution. Likewise, the inconvenience and difficulty this work could present for an enterprise’s operations is removed.

In the move from a local server solution to a cloud PACS or SaaS, enterprises should ensure that they don’t trade one means of simplicity for another source of complication.

Authentication

By the same token, nothing undermines the benefit of simplicity and the single purpose of a PACS like the threat of fraud. For that reason, viable PACS cloud solutions in the federal government should be capable of strong authentication. With a tool as sophisticated as the PIV card, agencies should utilize the technology, which is called for in HSPD-12, OMB M11-11 and FICAM.

Agencies should deploy strong authentication that reinforces facility security with each access control transaction. Information should not be cached or reused for days at a time, creating an unnecessary security risk.

In short, cloud PACS in the federal government should use PIV and PIV-I credential authentication that:

  1. Verifies that the credential is genuine, cryptographically validating that the credential is not counterfeit or fraudulent by performing a challenge-response exchange for every single reader transaction.
  2. Verifies origin to ensure that the issuers are trusted and legitimate.
  3. Confirms that the credential data has not been altered; the system should verify that the unique ID and all information on a user’s card were not altered and that the certificate is signed and trusted.
  4. Confirms certificate status by using a Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP) Responder to confirm that the certificate is active.

The introduction of fraud to an access control system can complicate the operation and undermine the end goal of a PACS. Strong authentication enables enterprises to identify fraudulent credentials and prevent unauthorized access with each transaction. Some vendors offer one or two of the criteria but not all four, which is a shortsighted approach.

Opting for a cloud PACS solution is, without argument, an upgrade. However, the benefits are limited if that solution is not supported by a solid, holistic infrastructure and also protected from fraud. After all, only a secure enterprise cloud solution is truly simple.

This article originally appeared in the October 2012 issue of Security Today.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.