Secure by default

Issue 7 2020 Editor's Choice

As the cybersecurity landscape changes and evolves and IoT continues to proliferate, so do the challenges being faced by businesses.


Tertius Wolfaardt.

It is worth noting that not all hacks consist of an elite team of sophisticated hackers. The reality may be more of an opportunistic hacker looking for exploitable vulnerabilities and weaknesses in a network or just plain old human mistakes or oversight. To add to that, there are huge data breaches reported due to configuration problems. While it is widely acknowledged that education on new technologies is hugely important, it is essential that technology vendors support those that are installing and commissioning these systems, to minimise human mistakes and configuration issues.

Simply put, a Secure by Default strategy means taking an holistic approach to solving security problems at the root cause, rather than treating the symptoms of a cybersecurity defect and therefore acting at scale to reduce the overall harm to a system or type of component. Secure by Default covers the long-term technical effort to ensure that the right security primitives are built into software and hardware. It also covers the equally demanding task of ensuring that those primitives are available and usable in such a way that the market can readily adopt them.

This area has never been so important for businesses. Poor set-up and configuration increases the risk of devices providing a platform for unauthorised access.

The worst that can happen

At Axis, we’ve experienced businesses questioning the danger of a cybersecurity breach, stating: “What’s the worst that can happen? They will only get access to the video feeds but won’t get into our network.” This is a dangerous scenario and mindset.

If a technology does follow Secure by Design principles, it will have embedded out-of-box cybersecurity principles built in, which would inevitably have prevented this incident from occurring. To support our technologies, Axis has aligned Secure by Default to recommendations made within industry best practices.

• Password prompt – In order to access the device, there will be an out of box password for the user. During the setup, we will prompt you to change it.

• Password strength indicator – There is a strength indicator advising of the effectiveness of the password. Due to most large enterprises having their own corporate password policies, we won’t dictate and approve the password used, but will advise.

• HTTPS encryption – Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The ‘S’ at the end of HTTPS stands for ‘Secure’. It means all communications between your browser and the website are encrypted.

• 802.1x – IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

• Remote access DISABLED (NAT traversal) – While there are operational benefits to being able to remotely access devices, this is a function that needs to be enabled and the necessary procuration should be followed when this has been enabled to protect the device.

Axis understands the importance of securing our technologies, and while no technology is ever 100% secure, we follow technical considerations such as Secure by Default.

For more information contact Axis Communications, +27 11 548 6780, terri.miller@axis.com, www.axis.com

‘Secure by design’ in IT


Gregory Dellas.

By Gregory Dellas, security presales, CA Southern Africa.

Consider the construction of a bank, an embassy or some type of secure installation. Before brick and mortar is laid down, the secure design of the building is already in the blueprints. Things such as the entrance and exit points, the location of a vault, thickness of the walls, anchor points for gates, grades of steel, mounting brackets for CCTV, cable conduits for wiring and so forth, all this is planned prior to construction. The facilities for security need to be designed alongside the functional facilities.

Software development without security by design is like a flimsy residential building that must then be renovated with thicker walls, strong gates, CCTV, guard huts etc., all at a later stage. This is called overlaid or retroactive security, not very secure or efficient and will never be as safe as a building that had security by design. The same issues apply to retroactive security in IT.

IT ‘Security by Design’ means putting in mechanisms like encryption, granularity, segregation, reporting and such into the solution early on in the design stage, before ever getting to a public release. Furthermore, continuous vulnerability testing is done throughout the development lifecycle. The means for improvement and operational testing are also built in to enhance security post deployment.

For more information, contact CA Southern Africa, +27 11 417 8594, heidi.ziegelmeier@caafrica.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.