Vivotek Security Hardening Guide v01
Vivotek Security Hardening Guide v01
Version 1.0 © 2018 VIVOTEK Inc., All rights reserved. January 01, 2018
1
About this Document
The intended use of this guide is to harden devices and Support
also provide collateral for deployment teams to deal with Should you require any technical assistance, please
local network policy, configurations and specification. contact your VIVOTEK reseller/distributor. VIVOTEK
All settings described in this document are made in the distributor contact information could be found on
product’s webpages. To access the webpages, see the Where to Buy section at VIVOTEK website. To
User Manual of the specific product. enhance customer satisfaction, your reseller/
distributor will reach us in a timely manner if the issue
Liability/ Disclaimer is not solved with first response.
Please inform your local VIVOTEK office of any
inaccuracies or omissions. VIVOTEK cannot be held We encourage you to take advantage of the many
responsible for any technical or typographical errors and online resources VIVOTEK offers.
reserves the right to make changes to the product and VIVOTEK Downloads: With useful materials,
manuals without prior notice. VIVOTEK makes no such as brochure, firmware/software update.
warranty of any kind with regard to the material contained VIVOTEK Support: Including Top FAQ,
within this document, including, but not limited to, the Technical Videos, and Security Hardening
implied warranties of merchantability and fitness for a Guide with efficient on-line assistance.
particular purpose. VIVOTEK shall not be liable nor VIVOTEK Customer Community: To obtain
responsible for incidental or consequential damages in assistance from VIVOTEK technical support
connection with the furnishing, performance or use of this team, you can register and discuss problems in
material. This product is only to be used for its intended our on-line customer community and engage
purpose. more with VIVOTEK’s solutions, and service.
2
Table of Contents
Introduction 4
Basic 5
Upgrade Firmware 5
Set Root Password 6
Disable Anonymous viewing 7
Privilege management 8
Setup System Time 9
Correction Time 9
NTP Server 9
Enable HTTP Digest Authentication 10
Enable RTSP Streaming Authentication 11
Disable Unused Services 12
Disable Audio 12
Disable UPnP 12
Disable IPv6 13
Disable Always Multicast 13
Disable SNMP 13
Advanced 15
Add user for VMS and other viewers 15
Enable HTTPS To Encrypt Traffic 15
Reinforce Access List 17
Maximum number of concurrent streaming 17
Enable Access List Filtering 17
Enable Remote Logs 18
Change the default port 18
Enterprise 19
Deploy IEEE 802.1x Authentication Solution 19
IPAM / VLAN / Subnet 19
Enable Log and Access Control on Switches 20
Others 21
Physical sabotage 21
Subscribe VIVOTEK newsletter 21
Appendix A - The CIS Critical Security Controls for Effective Cyber Defense Version
6.1 22
3
Introduction
There is an information security team to review the product design inside VIVOTEK and
VIVOTEK also has cooperated with many well-known information security companies for
many years to make sure our products are secure.
However proper camera and network configurations are also key to security surveillance
systems.
There are many suggestions for cyber defense in the document "The CIS Critical Security
Controls for Effective Cyber Defense" (https://www.cisecurity.org/critical-controls/), we will
instruct you all the related settings in the following chapter according to those suggestions.
Security related settings are divided into 3 levels : Basic, Advanced and Enterprise. You may
determine the security level according to your environment and requirements.
Basic: We recommend you at least achieve the basic level. It is usually for closed network
environments.
Advanced : Including the settings of Basic level and provides the settings for WAN accessible
/ Under insecurity network or risk environments.
Enterprise : Including the settings of Basic and Advanced levels and provides the settings for
corporation with complex and sound network infrastructure and IT management.
4
Basic
Upgrade Firmware
CSC 2: Inventory of Authorized and Unauthorized Software
CSC 4: Continuous Vulnerability Assessment and Remediation
CSC 18: Application Software Security
Always use the latest firmware. The latest firmware will fix all security issues and patch the
security update from 3rd party libraries.
Not only public vulnerabilities, the latest firmware will also fix all the internal security issues
uncovered by the VIVOTEK security team.
5
Set Root Password
CSC 5: Controlled Use of Administrative Privileges
The default password is blank and leaving the root password field empty means the camera
will disable user authentication whether there are other existing accounts or not. Please
assign a password as soon as possible once you enable the camera because it is VERY
DANGEROUS and not recommended to leave it blank.
Assigning a password is very critical, and a good password just as important. A weak
password is also dangerous, such as simple numbers:123456, 111111, and so are common
words, such as admin, root, pass, qwerty... and so on.
6
Disable Anonymous viewing
CSC 16: Account Monitoring and Control
7
Privilege management
CSC 5: Controlled Use of Administrative Privileges
CSC 16: Account Monitoring and Control
There are 3 user groups inside VIVOTEK cameras: Administrator, Operator and Viewer.
For users that only need viewing privilege, just assign a Viewer account for them.
8
Setup System Time
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
Time Correction
Correct dates and times are very important for incident response and data forensics.
Therefore it is critical that in the system/application logs time-stamps have correct
information.
NTP Server
It is recommended to synchronize the date/time with an NTP server. For public NTP server,
please be careful of vulnerable servers.
9
Enable HTTP Digest Authentication
CSC 13: Data Protection
CSC 14: Controlled Access Based on the Need to Know
CSC 16: Account Monitoring and Control
With Basic Authentication the user credentials are sent as cleartext and while HTTPS is not used,
they are vulnerable to packet sniffing.
VIVOTEK cameras support SSL and TLS, but we highly recommend using TLS 1.2 for better
security. You may disable SSL and old TLS (1.0, 1.1) from your browser settings panel.
10
Enable RTSP Streaming Authentication
CSC 13: Data Protection
CSC 16: Account Monitoring and Control
RTSP streaming authentication is a bit different from HTTP, it has a "disable" option in the
authentication type. Unless your VMS/NVR doesn't support RTSP authentication, we
suggest to use basic or digest strongly.
11
Disable Unused Services
CSC 9: Limitation and Control of Network Ports, Protocols, and Services
CSC 13: Data Protection
Disable Audio
If you don't need audio, check the [Mute] checkbox to protect the acoustic privacy.
Disable UPnP
If you don't use UPnP function, disable the UPnP presentation and UPnP port forwarding
12
Disable IPv6
Disable IPv6 if you do not need it.
Disable SNMP
Disable SNMP if you do not need this function.
SNMPv1 and SNMPv2 are not secure, if you really need SNMP, please adopt SNMPv3
13
14
Advanced
The root account has a higher privilege than the administrator (network services, such as
FTP), please do not use the root account for VMS/NVR, as it can reduce the risk once the
VMS/NVR is compromised by an attacker.
HTTPS will encrypt all the traffic between client and device.
15
Video and audio streaming through RTSP/RTP won’t be encrypted, and it is under the risk of
sniffing. If you want to encrypt all Video/Audio data:
1. If you connect the camera using the cameras web interface, please choose HTTP in
the protocol options of Client setting, and use https://IP-CAMERA to connect.
2. If you connect the camera by VMS/NVR, please make sure the protocol is RTSP
over HTTPS
16
Reinforce Access List
CSC 12: Boundary Defense
CSC 14: Controlled Access Based on the Need to Know
17
Enable Remote Logs
CSC 4: Continuous Vulnerability Assessment and Remediation
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
Remote log is an important function for enterprise-level surveillance systems. The local log
could be erased once the device is compromised, but with remote log, the difficulty is
increased.
Changing the default HTTP/RTSP doesn't provide any serious defense against a
targeted attack, but it will prevent some non-targeted and amateur script type attacks.
18
Enterprise
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC), it
provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. You
can prevent unauthenticated devices from attaching to your network environment, and
reduce the possibility of forging camera video.
EAP-TLS provides stronger security by requiring both server and client side certificate.
Choose the one suited for your network infrastructure or contact the network administrator.
19
IP management is a basic work to reduce cyber threat. You should know the owner of each
IP address and limit the available unused IP addresses.
You can use IPAM and proper subnet plan to archive it.
IPAM https://en.wikipedia.org/wiki/IP_address_management
VLAN is also a good tool for IP management. It allows you to isolate your surveillance
system from the regular network environment.
You can enhance the security levels via other network devices, such as switches, the switch
can enhance the "access list" and "log" functions:
1. Limit access on switches
a. Only a specific MAC address can access through a specific port
2. Enable Log
a. You may enable the log on the switch to keep more information of network
trace, and it may help on incident response.
20
Others
Physical damage
CSC 1: Inventory of Authorized and Unauthorized Devices
The most apparent threat to a network camera is physical damage, you may choose the
proper camera model to reduce the risk of physical damage.
VIVOTEK will publish security news on our website and newsletter when any security issue
occurs.
21
Appendix A - The CIS Critical Security Controls
for Effective Cyber Defense Version 6.1
https://www.cisecurity.org/critical-controls/
22
The processes and tools used to properly back up critical information with a proven
methodology for timely recovery of it.
CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and
Switches
Establish, implement, and actively manage (track, report on, correct) the security
configuration of network infrastructure devices using a rigorous configuration
management and change control process in order to prevent attackers from
exploiting vulnerable services and settings.
CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps
For all functional roles in the organization (prioritizing those mission-critical to the
business and its security), identify the specific knowledge, skills, and abilities
needed to support defense of the enterprise; develop and execute an integrated
plan to assess, identify gaps, and remediate through policy, organizational
planning, training, and awareness programs.
23
and then effectively containing the damage, eradicating the attacker’s presence,
and restoring the integrity of the network and systems.
24