Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Section
Column
width50%
Panel
borderColor#CCCCCC
bgColor#FFFFFF
titleBGColor#F0F0F0
borderStylesolid
titleOn the page:
Table of Contents


Column



General information

Information security is a field set of measures and tools dedicated to protecting information and information systems from unauthorized access, use, disclosure, destruction, modification, or violation of system integrity. The main goals of information security are to ensure confidentiality (protecting information from unauthorized access), integrity (ensuring In the context of Axxon One, information security is implemented through three main goals:

GoalDescription
ConfidentialityProtection of video data, metadata, and configuration from unauthorized viewing and copying
IntegrityGuarantee of the accuracy and completeness of data

...

and prevention of unauthorized modification or deletion of data
AvailabilityEnsuring that authorized users can work with the system at any time

Elements of information security

...

ElementDescription
Authentication and access control

General information about users

Changing user password

  • UsersAccounts are created by the administrator. Local users and Active Directory (LDAP) integration are supported.
  • Change user password—User can change their password
Protected export
  • Export—Ability to set a password on the exported archive or use a digital signature to confirm authenticity.
  • Watermark checker utility—allows you to verify that the exported data has not been modified after uploading
Protected export

Exporting frames and video recordings

Watermark checker utility

Object masking

Automatic system responses in the event of inactivity or integrity violations

Configuring automatic logging out and locking of the Client

Configuring automatic response when Axxon One integrity check fails

  • Logon—All logon attempts (successful and unsuccessful) are recorded. Configurable rules: automatic session termination after prolonged operator inactivity, interface locking.
  • Security policyThe administrator can set a policy for password change (frequency, complexity, blocking on unsuccessful attempts) and configure notifications in the event of a system breach.

Encrypting and hiding private information in the archive

Technical protection of information 

  • Configuring the Web-Server—The embedded web server of Axxon One supports HTTPS with the ability to use custom certificates. We recommend disabling unused network interfaces and protocols.
  • Using Axxon One with antivirus softwareTo prevent false positives and ensure performance, you must configure exclusions for Axxon One processes and directories in your antivirus software

Recommendations for enhancing information security

To enhance the system security, we recommend you do the following:

  1. Regularly update Axxon One (see UpdateUpdating Axxon One in Linux OS) and the operating system (see Requirements for Windows OS updates).
  2. Use complex passwords and configure a policy for password change. Securely store the administrator password.
  3. Restrict physical access to server hardware.
  4. Use archive encryption for systems that handle particularly sensitive data.
  5. Maintain a security event log (logins, permission changes, exports) and regularly analyze it.
  6. Separate the video surveillance network from the corporate network (VLANs, isolated switches).