| Section |
|---|
| Column |
|---|
| | Panel |
|---|
| borderColor | #CCCCCC |
|---|
| bgColor | #FFFFFF |
|---|
| titleBGColor | #F0F0F0 |
|---|
| borderStyle | solid |
|---|
| title | On the page: |
|---|
| |
|
|
General information
Information security is a field set of measures and tools dedicated to protecting information and information systems from unauthorized access, use, disclosure, destruction, modification, or violation of system integrity. The main goals of information security are to ensure confidentiality (protecting information from unauthorized access), integrity (ensuring In the context of Axxon One, information security is implemented through three main goals:
| Goal | Description |
|---|
| Confidentiality | Protection of video data, metadata, and configuration from unauthorized viewing and copying |
| Integrity | Guarantee of the accuracy and completeness of data |
...
| and prevention of unauthorized modification or deletion of data |
| Availability | Ensuring that authorized users can work with the system at any time |
Elements of information security
...
| Element | Description |
|---|
| Authentication and access control | - Users—Accounts are created by the administrator. Local users and Active Directory (LDAP) integration are supported.
- Change user password—User can change their
General information about users Changing user |
| Protected export | - Export—Ability to set a password on the exported archive or use a digital signature to confirm authenticity.
- Watermark checker utility—allows you to verify that the exported data has not been modified after uploading
|
Object masking | |
Automatic system responses in the event of inactivity or integrity violations | Configuring automatic response when Axxon One integrity check fails- —All logon attempts (successful and unsuccessful) are recorded. Configurable rules: automatic session termination after prolonged operator inactivity, interface locking.
- Security policy—The administrator can set a policy for password change (frequency, complexity, blocking on unsuccessful attempts) and configure notifications in the event of a system breach.
|
Encrypting and hiding private information in the archive | |
Technical protection of information | - Configuring the Web-Server—The embedded web server of Axxon One supports HTTPS with the ability to use custom certificates. We recommend disabling unused network interfaces and protocols.
- Using Axxon One with antivirus software—To prevent false positives and ensure performance, you must configure exclusions for Axxon One processes and directories in your antivirus software
|
Recommendations for enhancing information security
To enhance the system security, we recommend you do the following:
- Regularly update Axxon One (see Update, Updating Axxon One in Linux OS) and the operating system (see Requirements for Windows OS updates).
- Use complex passwords and configure a policy for password change. Securely store the administrator password.
- Restrict physical access to server hardware.
- Use archive encryption for systems that handle particularly sensitive data.
- Maintain a security event log (logins, permission changes, exports) and regularly analyze it.
- Separate the video surveillance network from the corporate network (VLANs, isolated switches).