TKH SECURITY FD2026M Cybersecurity Camera Hardening User Guide

About this guide

What’s in this guide

This guide outlines essential steps to harden the cybersecurity of TKH Security cameras. Implementing these measures will help protect your surveillance system from unauthorized access, data breaches, and other cyber threats.
By following the following steps, you can significantly improve the security of your TKH Security cameras, reducing the risk of unauthorized access and ensuring the integrity and confidentiality of your surveillance data. Regularly review and update your cybersecurity measures to keep pace with evolving threats.

We like to hear from you!

Customer satisfaction is our first priority. We welcome and value your opinion about our products and services. Should you detect errors or inaccuracies in this manual, we would be grateful if you would inform us. We invite you to offer your suggestions and comments,
Your feedback helps us to further improve our documentation.

 

 

Hardening measures

Camera

Factory Default

efore installing make sure that the camera is in its factory default state. If in doubt, force the camera to its factory defaults again.

Firmware update

Update the camera firmware to the latest version available from TKH Security. Regularly check for updates to ensure the device is protected against the latest vulnerabilities.

2.1.3      Strong password

The administrator password should be unique and as strong as possible (minimum of 8 characters with a mix of letters, numbers, and symbols).
It is recommended to avoid subsequent series such as 1234, 555, or abcd, or the use of existing words.
Generally, the best random passwords are generated by using a password generator tool.

 Change password regularly

Change your passwords regularly. The best practice is to change the passwords every 90 days.

Authentication lockout

Enable the account lockout policies after a defined number of failed login attempts to protect against brute-force attacks.

User accounts with least privileges

Assign user roles with the principle of least privileges. Limit administrative access to only those who need it.
VMS clients, support engineers or operators may access the camera as “Operator” or “Viewer”. Be aware that some VMS clients require “administrator” access.
As a general guideline, following principle roles exist (not limited to):

  • Administrator: full control of all camera features and functions
  • Supervisors: full control except for user management and restoring factory defaults
  • Operators: access to view cameras, control PTZ
  • Viewers: access to view cameras

Time synchronization

Use a single time provisioning source, and configure the camera to synchronize against this single time source regularly.

 Disable unused protocols

Turn off unnecessary network protocols such as Telnet and FTP to reduce the attack surface. Only keep those protocols enabled that are used, and document these.
Do not use SNMPv1, SNMPv2, TLSv1.0, TLSv1.1, UPnP, Telnet, FTP, Basic authentication, Bonjour, DDNS.
Whenever these protocols are used during installation, make sure that these are disabled upon completion of the work.

Change the default ports

It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.) to reduce the risk of outsiders being able to access.

Review Settings

Regularly review and adjust camera settings to enhance security.

Audio input

Disable the audio feature of the camera if this is not used.

IP filtering

Use black and white list to filter the IP address. This will prevent everyone, except those specified IP addresses from accessing the system.

Session logout

Inactive users will be logged out after a set period.

 SD card encryption (securing local recording)

If the camera supports encryption of the recordings then it is highly recommended to use/enable this function.

Physical Security

Ensure cameras are physically secured to prevent tampering or unauthorized access. This includes using tamper-resistant mounts and enclosures.

Network

Network segmentation

Place security cameras on a dedicated VLAN separate from the main network. This minimizes the risk of cross-network infections or attacks.

Controlled access to the network

Use a Virtual Private Network (VPN) for remote access to the camera system. Do not expose to the public network or the Internet.

Set the router firewall

It is recommended to set the firewall of your router.
Note that some important ports cannot be closed (like HTTP port, HTTPS port, Data Port).

Port authentication (802.1x)

Make use of network access control using IEEE 802.1x with at least EAP-TLS (MD5 is listed as an vulnerability). Use the safely stored private key that is generated by the camera itself to request a CA client certificate.

Multicast

Avoid the use of multicast in an open accessible network. It is very easy to eavesdrop on multicast streams.

Data Security

SSL/TLS versions

TLS versions 1.0 and 1.1 are not to be used. They accept simple encryptions schemes that are hacked. The current TLS version is TLSv1.3.

HTTP authentication

Select digest authentication for HTTP. It encrypts the passwords over the network.
Basic authentication is considered unsafe, as it transmits the password in plain text over the network.

RTSP authentication

Using Digest Authentication with RTSP makes the video stream only accessible when you have the proper credentials. Digest Authentication should be chosen over the unsafe Basic Authentication.

HTTPS

Enable HTTPS for accessing the camera’s web interface to ensure that data transmitted between the camera and the user is encrypted.

Encrypted streaming (RTP/RTSP/HTTPS, SRTP)

In HTTPS mode HTTP tunnelling of RTP/RTSP encrypts the stream over the secure socket. Only the receiving VMS is able to decrypt the video content.
If the camera supports the SRTP protocol, then this protocol is preferred over the RTP protocol.

Data Retention Policy

Establish a data retention policy to regularly delete or archive old footage in a secure manner.

Monitoring and Logging

 Logging

Logging is by default enabled on the camera to monitor access and configuration changes. The log files are store securely on the device.

 Tamper Detection

The camera are fitted with a Tamper Detection System to monitor the quality and integrity of the image.

Check the log file regularly

Regularly inspect the log files to stay informed of reported irregularities.

Network Traffic

Analyse network traffic to detect potential anomalies related to the cameras.

Use secure syslog with TLS

The best practise for logging is the use of remote syslog over a secure channel (TLS). If the camera is not supporting secure syslog, use local logging with the minimum options.
Make sure that the logging server is adequately secured to allow authorized access only.

Security matrix

Feature Default setting Medium security level High security level
Factory Default Manual check Okay Manual check
Initial login wizard HTTP or HTTPS HTTPS HTTPS
Password policy 8 char, upper/lower case, digit 8 char, upper/lower case, digit, no dictionary Up to 16 char, upper/lower case, special char, digit, no dictionary
Firmware Updates Manual check Manual check Manual check
Signed Firmware Default* Default* Default*
User management Admin Admin Operator/Viewer
Lockout Mechanism Enabled Disabled Enabled
Session Timeout Enabled Enabled Enabled
HTTP/HTTPS HTTP HTTPS HTTPS
IEEE802.1x Disabled EAP-MD5/TLS EAP-MD5/TLS
TLS version TLSv1.3 TLSv1.3 TLSv1.3
HTTP Authentication Digest Digest Digest
RTSP Authentication Disabled Digest Digest
Certificate (HTTPS) Self signed cert Self signed cert CA
Certificate (802.1x) CA/Enterprise CA/Enterprise CA/Enterprise
Streaming UDP, unicast TCP (RTP/RTSP) Tunneled over HTTPS (RTP/RTSP/HTTPS),

SRTP if supported

Multicast Disabled Enabled or Disabled Disabled
Telnet Disabled Disabled Disabled
SSH Disabled Disabled Disabled
FTP Disabled Disabled Disabled
NAS Disabled Disabled Disabled
SNMP Disabled SNMPv3 Disabled
ONVIF Enabled Enabled ONVIF via HTTPS

 

MX Enabled ** Disabled Disabled
UPnP Disabled Disabled Disabled
NTP Disabled Enabled Enabled
Syslog Disabled Enabled or Disabled Disabled or Enabled over TLS (if supported)

* Signed firmware available for the 840-series, XCU-series, and TPU-series
**MX proprietary protocol is supported by the 840-series, XCU-series, and TPU-series

Incident Response Plan

TKH Security has a dedicated Incident Response plan.
For more information please visit: https://tkhsecurity.com/vulnerability-disclosure/

Decommissioning and Disposal

Before decommissioning any camera, ensure that all data is securely wiped to prevent unauthorized access to sensitive information. Follow proper procedures for the secure disposal of camera hardware, including the destruction of storage devices.

 

 

Read More About This Manual & Download PDF:

Documents / Resources

TKH SECURITY FD2026M Cybersecurity Camera Hardening [pdf] User Guide
FD2026M Cybersecurity Camera Hardening, FD2026M, Cybersecurity Camera Hardening, Camera Hardening, Hardening

References

Leave a comment

Your email address will not be published. Required fields are marked *