HikCentral Access Control V2.1.1 Hardening Guide - 20230907
HikCentral Access Control V2.1.1 Hardening Guide - 20230907
1
HikCentral Access Control Hardening Guide (Windows)
LEGAL DISCLAIMER
● TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS DOCUMENT AND THE PRODUCT
DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED "AS IS" AND "WITH
ALL FAULTS AND ERRORS". HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR
PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION
BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES,
INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION,
WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY,
OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
● YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY
RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS
INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
● YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE
SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW.
ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT
INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF
i
HikCentral Access Control Hardening Guide (Windows)
PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS.
YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED
TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN RIGHTS
ABUSES.
● IN THE EVENT OF ANY CONFLICTS BETWEEN THIS DOCUMENT AND THE APPLICABLE LAW, THE
LATTER PREVAILS.
ii
HikCentral Access Control Hardening Guide (Windows)
Contents
Chapter 1 Overview ............................................................................................................................. 1
1.1 Introduction ....................................................................................................................................... 1
1.2 Supported Operating Systems ........................................................................................................... 1
Chapter 2 HikCentral Access Control Program Security ...................................................................... 3
2.1 Brute Force Attack Prevention ........................................................................................................... 3
2.1.1 Verification Code Mechanism ..................................................................................... 3
2.1.2 Lock IP Address: After Too Many Attempts................................................................. 3
2.2 Identity Authentication...................................................................................................................... 4
2.3 Replay Attack Prevention ................................................................................................................... 4
2.4 Private and Sensitive Data Protection ............................................................................................... 5
2.4.1 Transmission Protection .............................................................................................. 5
2.4.2 HikCentral Access Control Storage Protection ............................................................ 6
2.5 Database Security .............................................................................................................................. 7
2.5.1 Database Password Security ....................................................................................... 7
2.5.2 Database Storage Security .......................................................................................... 7
2.5.3 Database Version Update............................................................................................ 7
2.6 Device Anti-Hijacking ......................................................................................................................... 8
2.7 Access Control ................................................................................................................................... 8
2.8 Device Firmware Upgrade ................................................................................................................. 8
2.9 Audit Log ............................................................................................................................................ 9
2.10 Digital Signature and Anti-Tamper Protection of Product Information ............................................. 9
2.11 HikCentral Access Control Version Update ........................................................................................ 9
2.12 Other Security Measures ................................................................................................................. 10
2.12.1 Maximum Password Age ........................................................................................... 10
2.12.2 HikCentral Access Control Changes Device Password Periodically ........................... 10
2.12.3 Strong Password........................................................................................................ 10
Chapter 3 Operating System Security of Server and Client ............................................................... 12
3.1 Strict Password Policy ...................................................................................................................... 12
3.2 Disable Windows Remote Desktop.................................................................................................. 12
3.3 Enable Windows Firewall ................................................................................................................. 12
3.4 Disable Sensitive Ports ..................................................................................................................... 12
3.5 Antivirus ........................................................................................................................................... 13
3.6 Enable Windows Update ................................................................................................................. 13
iii
HikCentral Access Control Hardening Guide (Windows)
iv
HikCentral Access Control Hardening Guide (Windows)
Chapter 1 Overview
1.1 Introduction
HikCentral Access Control is a software that requires a Microsoft® Windows-based server.
HikCentral Access Control is able to manage and control distributed access control devices
and video intercom devices.
This document informs users of the factors affecting the system security and provides
security suggestions for users in terms of system overall security. The safe and reliable
running environment and the security mechanism of HikCentral Access Control can provide
better service to users.
The instructions of this document are listed as follows:
1. HikCentral Access Control Program Security-HikCentral Access Control Security
Configurations
2. Operating System Security of Server and Client
Security Configurations Based on Microsoft® Windows Operating System
3. Device and Network Security Deployment
4. Server and Network Security Deployment
Note: This document focuses on HikCentral Access Control security. For best security
practices about access control devices and video intercom devices, refer to the
corresponding security guides on Hikvision official website.
1
HikCentral Access Control Hardening Guide (Windows)
2
HikCentral Access Control Hardening Guide (Windows)
The verification code is required as shown below when the password is wrong:
Enable the “Lock IP Address” function in the Security Settings module of the HikCentral
Access Control Web Client. This helps protect against invalid attempts to log in to the
HikCentral Access Control Server.
3
HikCentral Access Control Hardening Guide (Windows)
Once this option is configured, the account whose password is lower than this password
strength will not be allowed to log in.
A session ID and a dynamic token are required when the client connects to the server.
4
HikCentral Access Control Hardening Guide (Windows)
following figure for replay attack model and HikCentral Access Control anti-replay method.
1.Session + Token
Client Server
2. 3. Session + Token Replay
Intercept
Reject
4.
Attacker
5
HikCentral Access Control Hardening Guide (Windows)
2. Transmission Security Between HikCentral Access Control and Devices or Other Servers
(1) To reduce the risk of data leakage in the interaction process, the communication between
HikCentral Access Control and the devices is based on Hikvision private protocol. Sensitive
information transmission is encrypted based on the dynamic key negotiated by HikCentral
Access Control and the devices. The key length is 128 bits, and the encryption algorithm is AES.
(2) The transmission between HikCentral Access Control and facial recognition server supports
HTTPS to ensure that the communication channel is encrypted.
According to the property and performance requirements of private and sensitive information
storage, HikCentral Access Control supports data storage in database, disk, and external
storage servers.
The contents stored in different storage methods and the safety measures adopted are as
follows:
1. Database Storage
Refer to Chapter 2.6 for database security description.
2. Disk Storage
Disk storage mainly refers to the case where HikCentral Access Control is configured as a
picture storage server. HikCentral Access Control supports configuring picture storage server
by channel. When the HikCentral Access Control service is configured as the picture storage
server, the event pictures reported by the channel will be stored on the HikCentral Access
Control server disk. This rule ensures the efficiency of pictures reading and the security of
storage, that is, pictures cannot be browsed directly.
3. External Storage Server
External storage server mainly refers to pStor used for picture storage. Pictures are stored in
accordance with certain storage security rules.
6
HikCentral Access Control Hardening Guide (Windows)
1. By default, the HikCentral Access Control database service only reserves one user for the
HikCentral Access Control connection database service to reduce the risk of account cracking.
2. The password of HikCentral Access Control database can be updated. If you change the
admin password of HikCentral Access Control administrator, the database password will be
automatically updated in the background. The database password is encrypted by AES128
algorithm and stored in the configuration file. The secret key component is generated
randomly and unpredictable.
3. HikCentral Access Control only allows local access to the database on the server by default,
and cannot connect to the database service outside. Ensure that the data is p protected from
network access.
1. Some private and sensitive information, such as device password, is required by HikCentral
Access Control client, so AES128 algorithm is used to encrypt and store in the database, and
the secret key component is generated randomly and unpredictable.
2. Some private and sensitive information, such as HikCentral Access Control account
password, is stored after it is added with salt value and processed by the SHA256 algorithm.
The correctness of these information is verified at the HikCentral Access Control server, which
can reduce the risk of leakage caused by transmission.
3. HikCentral Access Control supports regular backup of configuration database to reduce the
risk of data loss.
4. HikCentral Access Control database only opens necessary ports by default to reduce the risk
of being attacked.
1. HikCentral Access Control will use the dominant security scanning tools before release,
including PostgreSQL database. For serious flaws, HikCentral Access Control will update the
version in time according to the official breach repair situation of PostgreSQL. Please follow
the HikCentral Access Control version update instructions.
2. When HikCentral Access Control is upgraded, PostgreSQL will be upgraded to a version with
higher security (depending on the timeliness of breach official release from PostgreSQL).
7
HikCentral Access Control Hardening Guide (Windows)
When the administrator creates a new role, he/she must only select the required
permissions for the role.
8
HikCentral Access Control Hardening Guide (Windows)
9
HikCentral Access Control Hardening Guide (Windows)
Switch on Enable Maximum Password Age and Set the Password Will Expire In as you want
on the Security page of the HikCentral Access Control Web Client.
The new user needs to change the password when they log in for the first time.
Set a STRONG password (case-sensitive letters, special characters combined with digits).
10
HikCentral Access Control Hardening Guide (Windows)
When the administrator adds a new user, he/she can set a STRONG password and an Expiry
Date for the user. The administrator can also set the Restrict Concurrent Logins to limit the
maximum IP addresses logged in to the platform using the user account.
11
HikCentral Access Control Hardening Guide (Windows)
12
HikCentral Access Control Hardening Guide (Windows)
are suggested to be disabled when RPC, NetBIOS, and SMB are NOT used.
3.5 Antivirus
Install full-featured Anti-Virus software to keep HikCentral Access Control Server secure.
Antivirus must be active and automatically updated.
For example, the settings of Windows antivirus Windows Defender are as below.
Real-time protection must be “On”
Virus and spyware definitions must be “Up to date”
Example from Microsoft® Windows 10:
13
HikCentral Access Control Hardening Guide (Windows)
14
HikCentral Access Control Hardening Guide (Windows)
15
HikCentral Access Control Hardening Guide (Windows)
16
HikCentral Access Control Hardening Guide (Windows)
17
HikCentral Access Control Hardening Guide (Windows)