{"id":17847,"date":"2017-07-20T11:00:56","date_gmt":"2017-07-20T16:00:56","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=17847"},"modified":"2020-08-11T14:04:06","modified_gmt":"2020-08-11T19:04:06","slug":"beware-cloud-imposters","status":"publish","type":"post","link":"https:\/\/www.een.com\/sv\/blog\/beware-cloud-imposters\/","title":{"rendered":"Beware of Cloud Imposters"},"content":{"rendered":"<p>We recently had a discussion with a customer regarding the cyber security of their \u201cfake cloud\u201d provider for access control. They had been sold a bill of goods for an access control system that was supposed to be cloud-based. It turned out that it was not really cloud-based at all. It was simply a traditional piece of software that the company was operating on a remote server and calling it a cloud solution.<\/p>\n<p>A true cloud solution is multi-tenant, scales on demand, and is pay for&nbsp;what you use. There is a <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-145\/final\" target=\"_blank\" rel=\"noopener noreferrer\">NIST definition<\/a> of true cloud computing which has been widely accepted and spells out the five essential characteristics of cloud computing. Fake clouds have none of them.<\/p>\n<p>We asked our customer for the IP address of their cloud access \u201cserver\u201d and ran a free, quick scan&nbsp;of its security. It was immediately categorized with an \u201cF\u201d for security.&nbsp;It&#8217;s likely any hacker could get in without trouble. That&#8217;s as&nbsp;unsecure as you can get. &nbsp;You might as well leave the front door not only unlocked&nbsp;but prop it open for the burglar.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-large wp-image-17849\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-1024x742.png\" alt=\"f-Report\" width=\"713\" height=\"517\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742.png 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-300x217.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-100x72.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-179x130.png 179w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-200x145.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-400x290.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-600x435.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/Screen-Shot-2017-07-15-at-5.37.27-AM-1024x742-800x580.png 800w\" sizes=\"(max-width: 713px) 100vw, 713px\" \/><\/p>\n<p>On the other hand, we ran a similar scan of the Brivo OnAir access control system.&nbsp;Their report is below. As you can see, it\u2019s tight and secure. It\u2019s managed by professionals&nbsp;and is a true cloud system.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-17851\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1-1024x486.jpeg\" alt=\"brivo-report-1024x486\" width=\"687\" height=\"326\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1.jpeg 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1-300x142.jpeg 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1-100x47.jpeg 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1-200x95.jpeg 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1-400x190.jpeg 400w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1-600x285.jpeg 600w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/07\/brivo-report-1024x486-1-800x380.jpeg 800w\" sizes=\"(max-width: 687px) 100vw, 687px\" \/><\/p>\n<p>Now, the problem we have in the Physical Security Industry is false claims in advertising. Here are some quotes from the fake Cloud data sheet:<\/p>\n<ul>\n<li>2048 bit certificate SSL encryption<\/li>\n<li>Hardware encryption TLS 1.2 (Transport Layer Security)<\/li>\n<li>99.999% uptime<\/li>\n<li>Distributed server architecture for security and performance<\/li>\n<li>TLS Encryption with field hardware<\/li>\n<li>Two-factor authentication<\/li>\n<li>Inherent redundancy<\/li>\n<li>Real- time Alarm Events &#8211; Zero latency<\/li>\n<li>Vulnerability Testing &#8211; Combines proven, continuous 3rd party threat monitoring and vulnerability scanning through Veracode and Amazon Web Services<\/li>\n<\/ul>\n<p>That all sounds really good, but most of it\u2019s not true and some of it is irrelevant. Here are the facts:<\/p>\n<ul>\n<li>They are not doing continuous 3rd party vulnerability testing. &nbsp;Our single amateur scan showed 10 different vulnerabilities that have not been remedied. Or perhaps they are scanning, they just are not doing anything about it!<\/li>\n<li>You can\u2019t have ZERO LATENCY &#8211; unless you have figured out how to go faster than the speed of light.<\/li>\n<li>The report shows they are not running TLS 1.2 and instead are running older version.<\/li>\n<li>You are not going to get 99.999% uptime because they run on Amazon Web Services (AWS) and Amazon does not guarantee anything close to that &#8211; and putting multiple servers in Amazon won\u2019t achieve it either because Amazon&#8217;s whole shebang could have trouble.<\/li>\n<li>&#8221;Inherent Redundancy?&#8221; Redundancy is never inherent &#8211; you actually have to build it.<\/li>\n<\/ul>\n<p>Moral of the Story: Buyer beware. In the Physical Security world, there are charlatans selling \u201ccloud\u201d and \u201cSAAS\u201d solutions targeting the unsuspecting. You can get burned.<\/p>\n<p>Words of Advice:<\/p>\n<ol>\n<li>Get a professional IT person to give you some advice when making your decision.<\/li>\n<li>Don\u2019t trust everything a new vendor puts on a data sheet.<\/li>\n<li>Look at the reputation of the people running the company.<\/li>\n<li>Check references.<\/li>\n<li>Make sure it\u2019s a TRUE CLOUD solution with real cyber security.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>We recently had a discussion with a customer regarding the cyber security of their \u201cfake cloud\u201d provider for access control. They had been sold a bill of goods for an &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/sv\/blog\/beware-cloud-imposters\/\"> <span class=\"screen-reader-text\">Beware of Cloud Imposters<\/span> L\u00e4s mer &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":97885,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-17847","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/17847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/comments?post=17847"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/17847\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media\/97885"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media?parent=17847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/categories?post=17847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/tags?post=17847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}