Video Management Systems play an integral role in tracking down perpetrators of all types as well as preventing criminal incidents in general. Given the broad base of applications for video management systems, there are many instances of large quantities of useless footage due to poor quality recording. Regular audits and evaluations are to ensure that the best possible procedures are being followed can cut down on time wasted by sifting through unusable footage.
Consider the following best practices around logging, auditing and back-up processes to guarantee the most secure results:
- Security Event Log – Supports reliable, fine-grained, and configurable logging of a variety of security relevant system events. This includes logins, configuration changes, and file and networks access.
- Log Security – A log should be protected from unintentional and malicious. Limited access and proper authentication are required for good security.
- Date and Time – Accurate date and times are extremely important for auditing and backup as this information will enable auditors and investigators to know exactly when specific events have occurred. During device set up, it is required that the date and time is either automatically set to the workstation or that the device uses Network Time Protocol (NTP) to synchronize the camera to the Coordinated Universal Time (UTC).
- Logs by Default – Logs should not be optional, but created by default as a part of the device setup since they are the essence of detecting and uncovering malicious activity.
- Backup/Restore – Maintaining your security position is very important as it is critical to quickly restoring the system to operation after an incident. There needs to be a method to back up a working camera and then to restore the data on the current or replacement camera.
Reviewing your camera’s logging and backup setting will provide you an opportunity to make sure it meets your site’s needs. You should also verify that you can successfully restore a camera to ensure that your backups are not corrupt. To learn more about the Cyber Protection Program visit our website at tycosecurityproducts.com/CyberProtection.aspx. For any questions you may have on the Cyber Protection Program, email email@example.com.