Protecting the nerve centre

CCTV Handbook 2018 Surveillance, Information Security, Integrated Solutions

A control room is seen as a secure location that is tasked with securing other locations, but it is not unheard of in South Africa that a control room is attacked (or hijacked) in order to allow syndicates to attack their intended target, for example a mine or a cash centre. These attacks have happened to both on-site and remote control rooms, showing just how well informed and prepared the syndicates are.

However, a physical attack is one thing, in today’s digital world we are also likely to see cyber-attacks on control rooms in an effort to shut them down. The cyber approach doesn’t need people to actually be on site to carry out the attack. Of course the cyber-attack needs people and planning, but malware can be installed in the control room well ahead of time and activated quite easily on the required day.

So what is the security team supposed to do? Build another control room to monitor its control room? Have the entire control room backed up to another site in case the primary site goes down?

Drew van Vuuren.
Drew van Vuuren.

There are many options when it comes to protecting your control room. Hi-Tech Security Solutions asked Drew van Vuuren, ESET’s data protection officer, for some insights into the cyber and physical protection of control rooms – after all, these sites hold sensitive and personal information that you need to protect from unauthorised parties, which includes employees taking information home with them.

Where are the risks

Van Vuuren provides the following examples of how control rooms can be left vulnerable.

Vulnerabilities would extend to insufficient controls on access systems that are used to gain access to the key points within the control room. This includes things like doors left ajar as well as tailgating without authenticating your credentials on a physical access control reader. Additionally, doors, windows, etc. being left open by employees also contribute significantly to the likelihood that vulnerabilities would be introduced into the environment. A further consideration on physical vulnerabilities would be insufficient controls on the mitigation of flood, fire and other risks, with these controls having to be defined in business continuity and disaster recovery programmes.

To mitigate these risks, van Vuuren advises control room management uses “a combination of defined security control milestones, like scheduled checks as well as ensuring educating of staff and employees on the risks faced when allowing people to tailgate or leaving doors or windows open.”

If access to the control room is not managed by an authentication mechanism, then anyone would be free to enter and exit the control room as they wished. Use of biometrics, smartcard readers, as well as keypad codes etc. should be used to ensure access is strictly controlled. Failure of these systems would lead to a significant impact on security within the control room.

“To mitigate these risks, ensure redundancies exist in the systems that manage the authentication of logical access control systems by defining, implementing and managing them in business continuity and disaster recovery plans.”

Save the technology

It goes without saying that control rooms are expensive investments when considering the technology that is used in these nerve centres. To ensure a reliable service, these environments need backup or redundant technology to cater for normal problems such as wear-and-tear, electricity blackouts and human error. For example, they require redundancy in their power supplies and telecommunications channels, through to servers and desktops, video walls, etc.

In order to protect its investment, van Vuuren says an organisation needs to ensure it has considered the following, among others, physical and logical security solutions:

• Fire suppression and mitigation technologies: Sprinklers, CO2 filtering systems, air conditioners, flood defences by ensuring systems are isolated from water sources, and raising the equipment.

• Ensure networks, servers and desktops have security controls implemented for mitigation of cyber-attacks by implementing endpoint security, network security and lock down configurations for these systems.

Watch the people

Ask any security operator in almost any industry and you will find that the internal risk of employees working for syndicates, or simply trying to enrich themselves at the expense of others is a serious threat. No matter how low the percentage of these ‘risks’ is, it only takes one to create havoc.

Van Vuuren believes companies need to perform extensive background checks on any employees who will be responsible for accessing systems within a control room. “Additionally, ongoing education on the challenges of being co-coerced into working with criminals is a very important initiative within an organisation.

“Finally, ensure that employees are sufficiently compensated for their roles so that they are not tempted to work with outside parties against the organisation.”

Safety by distance

It may be tempting for some to consider having their control room hosted offsite in an attempt to address some of the risks of compromise, but will this pay off? It’s impossible to determine a standard in this regard. Van Vuuren says it is difficult to say specifically what is better for an organisation when it comes to placement of a control room. In reality, it is specific to each company and warrants a detailed investigation and discussion by each stakeholder within an organisation. He provides an example of some of the factors each organisation could consider:

Profile of the business. What does the business do?

Profile of business systems. What information does the company manage, handle etc.?

Response and resourcing requirements. Are onsite staff required to respond to issues in the short-term or are remote responsive resources acceptable to the organisation?

Location of the business. Are there environmental factors which would influence the location of control rooms?

Commercial model. Is it more commercially viable to outsource to an external service provider for a managed control room service?

At the end of the day, each organisation needs to make these decisions based on its own risk profile and the specific requirements it has of its control room and related security operations. It is also worth noting that control rooms are increasingly being used for managing more than security, which can have an even greater impact on the onsite or offsite decision. When it comes to selecting technology aimed at protecting the control room, there are four areas which van Vuuren says is the starting point for each organisation:

• Logical access control such as biometrics etc.

• Environmental control systems including fire detection and suppression.

• Redundant IT systems, i.e. backup systems for network, servers and clients.

• Information security solutions and controls to protect your network and endpoint.

For more information contact ESET-SA, +27 (0)21 659 2000, info@eset.co.za, www.eset.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Data security and privacy in global mobility
Risk Management & Resilience Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...