{"id":4683,"date":"2022-05-29T04:09:04","date_gmt":"2022-05-29T10:09:04","guid":{"rendered":"https:\/\/idzone.com.sa\/?p=4683"},"modified":"2022-05-29T04:12:31","modified_gmt":"2022-05-29T10:12:31","slug":"is-your-access-control-system-secured","status":"publish","type":"post","link":"https:\/\/idzone.com.sa\/arabic\/is-your-access-control-system-secured\/","title":{"rendered":"Measure the Security Level of your PACS"},"content":{"rendered":"<p>Security of any premises comprises of critical systems like \u2013 Physical Access Control System<strong>&nbsp;(PACS<\/strong>), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance of PAC system which helps to manage and identify any sort of threats &amp; vulnerabilities.<\/p>\n\n\n\n<p><br>A few points below that explains the framework of PACS:<\/p>\n\n\n\n<p><br>1.&nbsp;<strong>Safeguarding all Storage Locations<\/strong><br>For better security, ensure all the controller devices and its cabling are hidden from general public to avoid accessing for fabrications.&nbsp;<strong><em>\u0634\u0647\u0627\u062f\u0627\u062a\u0647<\/em><\/strong>&nbsp;play a major role in identifying users in PACS. Limit the storage of credential data to fewer components, such as controllers and server databases. Even if smart cards or readers get hacked, it becomes impossible for the intruder to gain sensitive information.<br>Here are some of the most effective ways to secure storage components of PACS credentials:<br><strong>a. Server Database Security<\/strong><br><em>\u2013 Use of standard RDBMS products offering secure authentication protocols<\/em><br><strong>b. Controller Memory Security<\/strong><br><em>\u2013 Crypto memory chip<br>\u2013 Biometric credential storage on the controller itself (publicly exposed devices such as readers should not carry any confidential credential data)<\/em><br><strong>c. Reader Memory Security<\/strong><br><em>\u2013 A secure element for the protection of keys and cryptographic operations<\/em><br><strong>d. Smart Card User Memory Security<\/strong><br><em>\u2013 Key-based secure user memory access (instead of just referring to card CSN)<\/em><\/p>\n\n\n\n<p><br><strong>2. Securing all Communication Networks<\/strong><br>The PACS framework is designed in a way that if any communication networks (server, controller, reader, cards) gets compromised, all the sensitive credential information becomes vulnerable.<\/p>\n\n\n\n<p><br>However, here are some of the most effective ways to secure the respective communication channels:<br><strong>a. Secure Communication between Card &amp; Reader<\/strong><br><em>\u2013 Symmetric Key Encrypted data transmission (instead of just referring to card CSN)<\/em><br><strong>b. Secure Communication between Reader &amp; Controlle<\/strong>r<br><em>\u2013 Use of communication protocol supporting encryption such as OSDP SC (instead of ubiquitous wiegand protocol)<\/em><br><strong>c. Secure Communication between Controller &amp; Server<\/strong><br><em>\u2013 TLS encryption or AES 128\/256 bit<br>\u2013 Cryptographic module, like OpenSSL FIPS Object Module RE for certified implementation of TLS<br>\u2013 IPV6, ensuring greater connection integrity and security<\/em><br><strong>d. Secure Communication between Server &amp; Clients<\/strong><br><em>\u2013 SSL (HTTPS)<\/em><\/p>\n\n\n\n<p><br><strong>3. Device\/ Application Access Management<\/strong><br>PACS security threat continues on application access management levels, wherein hackers gain access to privileged user\u2019s credentials for unauthorized access.<br>Here are some of the most effective ways to secure against unauthorized application access:<br><strong>a. Robust Password Policy Implementation, such as-<\/strong><br><em>\u2013 Enforcing strong passwords<br>\u2013 Password expiry\/Portal lockout (multiple incorrect login attempts)<br>\u2013 Audit trails<br>\u2013 CAPTCHA<\/em><br><strong>b. Ensure Server Application Security with:<\/strong><br><em>\u2013 VAPT certification<br>\u2013 ISO 27001:2013 (ISMS) certified processes<\/em><\/p>\n\n\n\n<p>To know more about PACS, contact our experts at IDZONE Saudi Arabia.<\/p>","protected":false},"excerpt":{"rendered":"<p>Security of any premises comprises of critical systems like \u2013 Physical Access Control System&nbsp;(PACS), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance of [&hellip;]<\/p>","protected":false},"author":2,"featured_media":4684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-4683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Measure the Security Level of your PACS - IDZONE - Access Control System<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idzone.com.sa\/arabic\/is-your-access-control-system-secured\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Measure the Security Level of your PACS - IDZONE - Access Control System\" \/>\n<meta property=\"og:description\" content=\"Security of any premises comprises of critical systems like \u2013 Physical Access Control System&nbsp;(PACS), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idzone.com.sa\/arabic\/is-your-access-control-system-secured\/\" \/>\n<meta property=\"og:site_name\" content=\"IDZONE - Access Control System\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-29T10:09:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-29T10:12:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IDZONE Systems\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"IDZONE Systems\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"\u062f\u0642\u064a\u0642\u062a\u0627\u0646\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/\"},\"author\":{\"name\":\"IDZONE Systems\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819\"},\"headline\":\"Measure the Security Level of your PACS\",\"datePublished\":\"2022-05-29T10:09:04+00:00\",\"dateModified\":\"2022-05-29T10:12:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/\"},\"wordCount\":457,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/idzone.com.sa\/#organization\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/\",\"url\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/\",\"name\":\"Measure the Security Level of your PACS - IDZONE - Access Control System\",\"isPartOf\":{\"@id\":\"https:\/\/idzone.com.sa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg\",\"datePublished\":\"2022-05-29T10:09:04+00:00\",\"dateModified\":\"2022-05-29T10:12:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage\",\"url\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg\",\"contentUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg\",\"width\":1000,\"height\":500,\"caption\":\"Young business person working on tablet and shows the digital sign: ACCESS CONTROL\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/idzone.com.sa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Measure the Security Level of your PACS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/idzone.com.sa\/#website\",\"url\":\"https:\/\/idzone.com.sa\/\",\"name\":\"IDZONE - Access Control System\",\"description\":\"IDZONE - Access Control System\",\"publisher\":{\"@id\":\"https:\/\/idzone.com.sa\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/idzone.com.sa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/idzone.com.sa\/#organization\",\"name\":\"IDZONE\",\"url\":\"https:\/\/idzone.com.sa\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png\",\"width\":703,\"height\":301,\"caption\":\"IDZONE\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819\",\"name\":\"IDZONE Systems\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g\",\"caption\":\"IDZONE Systems\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Measure the Security Level of your PACS - IDZONE - Access Control System","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idzone.com.sa\/arabic\/is-your-access-control-system-secured\/","og_locale":"ar_AR","og_type":"article","og_title":"Measure the Security Level of your PACS - IDZONE - Access Control System","og_description":"Security of any premises comprises of critical systems like \u2013 Physical Access Control System&nbsp;(PACS), Video Surveillance, and Logical Access Control. Physical access control is the foremost line-of-defense against any breach of security followed by video surveillance that assists to analyze the intrusion incident. Hence, the security team and the management must know the significance of [&hellip;]","og_url":"https:\/\/idzone.com.sa\/arabic\/is-your-access-control-system-secured\/","og_site_name":"IDZONE - Access Control System","article_published_time":"2022-05-29T10:09:04+00:00","article_modified_time":"2022-05-29T10:12:31+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg","type":"image\/jpeg"}],"author":"IDZONE Systems","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"IDZONE Systems","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u062a\u0627\u0646"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#article","isPartOf":{"@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/"},"author":{"name":"IDZONE Systems","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819"},"headline":"Measure the Security Level of your PACS","datePublished":"2022-05-29T10:09:04+00:00","dateModified":"2022-05-29T10:12:31+00:00","mainEntityOfPage":{"@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/"},"wordCount":457,"commentCount":0,"publisher":{"@id":"https:\/\/idzone.com.sa\/#organization"},"image":{"@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage"},"thumbnailUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg","articleSection":["Blogs"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/","url":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/","name":"Measure the Security Level of your PACS - IDZONE - Access Control System","isPartOf":{"@id":"https:\/\/idzone.com.sa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage"},"image":{"@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage"},"thumbnailUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg","datePublished":"2022-05-29T10:09:04+00:00","dateModified":"2022-05-29T10:12:31+00:00","breadcrumb":{"@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#primaryimage","url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg","contentUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2022\/05\/AdobeStock_314555933-1000x500-1.jpeg","width":1000,"height":500,"caption":"Young business person working on tablet and shows the digital sign: ACCESS CONTROL"},{"@type":"BreadcrumbList","@id":"https:\/\/idzone.com.sa\/is-your-access-control-system-secured\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idzone.com.sa\/"},{"@type":"ListItem","position":2,"name":"Measure the Security Level of your PACS"}]},{"@type":"WebSite","@id":"https:\/\/idzone.com.sa\/#website","url":"https:\/\/idzone.com.sa\/","name":"IDZONE - Access Control System","description":"IDZONE - Access Control System","publisher":{"@id":"https:\/\/idzone.com.sa\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idzone.com.sa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/idzone.com.sa\/#organization","name":"IDZONE","url":"https:\/\/idzone.com.sa\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/","url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png","contentUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png","width":703,"height":301,"caption":"IDZONE"},"image":{"@id":"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819","name":"IDZONE Systems","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g","caption":"IDZONE Systems"}}]}},"_links":{"self":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts\/4683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/comments?post=4683"}],"version-history":[{"count":0,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts\/4683\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/media\/4684"}],"wp:attachment":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/media?parent=4683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/categories?post=4683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/tags?post=4683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}