Hardening Guide
Hardening Guide
Hardening Guide
1
HikCentral Access Control V2.0 Hardening Guide (Windows)
Legal Information
© 2022 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
This Document (hereinafter referred to be “the Document”) is the property of Hangzhou Hikvision Digital
Technology Co., Ltd. or its affiliates (hereinafter referred to as “Hikvision”), and it cannot be reproduced,
changed, translated, or distributed, partially or wholly, by any means, without the prior written
permission of Hikvision. Unless otherwise expressly stated herein, Hikvision does not make any
warranties, guarantees or representations, express or implied, regarding to the Document, any
information contained herein.
Pictures, charts, images and all other information hereinafter are for description and explanation only.
The information contained in the Document is subject to change, without notice, due to updates or
other reasons.
Please use this Document with the guidance and assistance of professionals trained in supporting the
Product.
LEGAL DISCLAIMER
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE DOCUMENT IS PROVIDED "AS IS" AND
“WITH ALL FAULTS AND ERRORS”. HIKVISION MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE OR NON-INFRINGEMENT. IN NO EVENT WILL HIKVISION BE LIABLE FOR ANY
SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES INCLUDING, AMONG OTHERS,
DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA, CORRUPTION
OF SYSTEMS, OR LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF CONTRACT, TORT
(INCLUDING NEGLIGENCE), OR OTHERWISE, IN CONNECTION WITH THE USE OF THE DOCUMENT, EVEN
IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
i
HikCentral Access Control V2.0 Hardening Guide (Windows)
Contents
Chapter 1 Overview ....................................................................................................................... 1
1.1 Introduction ................................................................................................................................. 1
1.2 Supported Operating Systems....................................................................................................... 1
Chapter 2 HikCentral Access Control Program Security ................................................................... 3
2.1 HikCentral Access Control Port Forwarding ..................................................... 错误!未定义书签。
2.2 Brute Force Attack Prevention ...................................................................................................... 3
2.2.1 Verification Code Mechanism ................................................................................. 3
2.2.2 Lock IP Address: After Too Many Attempts .............................................................. 3
2.3 Identity Authentication................................................................................................................. 4
2.4 Replay Attack Prevention .............................................................................................................. 4
2.5 Private and Sensitive Data Protection ........................................................................................... 5
2.5.1 Transmission Protection .......................................................................................... 5
2.5.2 HikCentral Access Control Storage Protection ......................................................... 6
2.6 Database Security ......................................................................................................................... 7
2.6.1 Database Password Security ................................................................................... 7
2.6.2 Database Storage Security ...................................................................................... 7
2.6.3 Database Version Update........................................................................................ 7
2.7 Device Anti-Hijacking .................................................................................................................... 8
2.8 Access Control .............................................................................................................................. 8
2.9 Device Firmware Upgrade............................................................................................................. 8
2.10 Audit Log ...................................................................................................................................... 9
2.11 Digital Signature and Anti-Tamper Protection of Product Information ........................................... 9
2.12 HikCentral Access Control Version Update .................................................................................... 9
2.13 Other Security Measures .............................................................................................................10
2.13.1 Maximum Password Age ........................................................................................10
2.13.2 HikCentral Access Control Changes Device Password Periodically ...........................10
2.13.3 Strong Password ....................................................................................................10
Chapter 3 Operating System Security of Server and Client .............................................................12
3.1 Strict Password Policy ..................................................................................................................12
3.2 Disable Windows Remote Desktop ..............................................................................................12
3.3 Enable Windows Firewall .............................................................................................................12
3.4 Disable Sensitive Ports .................................................................................................................12
3.5 Antivirus ......................................................................................................................................13
ii
HikCentral Access Control V2.0 Hardening Guide (Windows)
iii
HikCentral Access Control V2.0 Hardening Guide (Windows)
Chapter 1 Overview
1.1 Introduction
HikCentral Access Control is a software that requires a Microsoft® Windows-based server.
HikCentral Access Control is able to manage and control distributed access control devices
and video intercom devices.
This document informs users of the factors affecting the system security and provides
security suggestions for users in terms of system overall security. The safe and reliable
running environment and the security mechanism of HikCentral Access Control can provide
better service to users.
The instructions of this document are listed as follows:
1. HikCentral Access Control Program Security-HikCentral Access Control Security
Configurations
2. Operating System Security of Server and Client
Security Configurations Based on Microsoft® Windows Operating System
3. Device and Network Security Deployment
4. Server and Network Security Deployment
Note: This document focuses on HikCentral Access Control security. For best security
practices about access control devices and video intercom devices, refer to the
corresponding security guides on Hikvision official website.
2
HikCentral Access Control V2.0 Hardening Guide (Windows)
The verification code is required as shown below when the password is wrong:
Enable the “Lock IP Address” function in the Security Settings module of the HikCentral
Access Control Web Client. This helps protect against invalid attempts to log in to the
HikCentral Access Control Server.
3
HikCentral Access Control V2.0 Hardening Guide (Windows)
Once this option is configured, the account whose password is lower than this password
strength will not be allowed to log in.
A session ID and a dynamic token are required when the client connects to the server.
4
HikCentral Access Control V2.0 Hardening Guide (Windows)
following figure for replay attack model and HikCentral Access Control anti-replay method.
1.Session + Token
Client Server
Attacker
5
HikCentral Access Control V2.0 Hardening Guide (Windows)
2. Transmission Security Between HikCentral Access Control and Devices or Other Servers
(1) To reduce the risk of data leakage in the interaction process, the communication between
HikCentral Access Control and the devices is based on Hikvision private protocol. Sensitive
information transmission is encrypted based on the dynamic key negotiated by HikCentral
Access Control and the devices. The key length is 128 bits, and the encryption algorithm is AES.
(2) The transmission between HikCentral Access Control and facial recognition server supports
HTTPS to ensure that the communication channel is encrypted.
According to the property and performance requirements of private and sensitive information
storage, HikCentral Access Control supports data storage in database, disk, and external
storage servers.
The contents stored in different storage methods and the safety measures adopted are as
follows:
1. Database Storage
Refer to Chapter 2.6 for database security description.
2. Disk Storage
Disk storage mainly refers to the case where HikCentral Access Control is configured as a
picture storage server. HikCentral Access Control supports configuring picture storage server
by channel. When the HikCentral Access Control service is configured as the picture storage
server, the event pictures reported by the channel will be stored on the HikCentral Access
Control server disk. This rule ensures the efficiency of pictures reading and the security of
storage, that is, pictures cannot be browsed directly.
3. External Storage Server
External storage server mainly refers to pStor used for picture storage. Pictures are stored in
accordance with certain storage security rules.
6
HikCentral Access Control V2.0 Hardening Guide (Windows)
1. By default, the HikCentral Access Control database service only reserves one user for the
HikCentral Access Control connection database service to reduce the risk of account cracking.
2. The password of HikCentral Access Control database can be updated. If you change the
admin password of HikCentral Access Control administrator, the database password will be
automatically updated in the background. The database password is encrypted by AES128
algorithm and stored in the configuration file. The secret key component is generated
randomly and unpredictable.
3. HikCentral Access Control only allows local access to the database on the server by default,
and cannot connect to the database service outside. Ensure that the data is p protected from
network access.
1. Some private and sensitive information, such as device password, is required by HikCentral
Access Control client, so AES128 algorithm is used to encrypt and store in the database, and
the secret key component is generated randomly and unpredictable.
2. Some private and sensitive information, such as HikCentral Access Control account
password, is stored after it is added with salt value and processed by the SHA256 algorithm.
The correctness of these information is verified at the HikCentral Access Control server, which
can reduce the risk of leakage caused by transmission.
3. HikCentral Access Control supports regular backup of configuration database to reduce the
risk of data loss.
4. HikCentral Access Control database only opens necessary ports by default to reduce the risk
of being attacked.
1. HikCentral Access Control will use the dominant security scanning tools before release,
including PostgreSQL database. For serious flaws, HikCentral Access Control will update the
version in time according to the official vulnerability repair situation of PostgreSQL. Please
follow the HikCentral Access Control version update instructions.
2. When HikCentral Access Control is upgraded, PostgreSQL will be upgraded to a version with
higher security (depending on the timeliness of vulnerability official release from PostgreSQL).
7
HikCentral Access Control V2.0 Hardening Guide (Windows)
When the administrator creates a new role, he/she must only select the required
permissions for the role.
8
HikCentral Access Control V2.0 Hardening Guide (Windows)
9
HikCentral Access Control V2.0 Hardening Guide (Windows)
Switch on Enable Maximum Password Age and Set the Password Will Expire In as you want
on the Security page of the HikCentral Access Control Web Client.
The new user needs to change the password when they log in for the first time.
Set a STRONG password (case-sensitive letters, special characters combined with digits).
10
HikCentral Access Control V2.0 Hardening Guide (Windows)
When the administrator adds a new user, he/she can set a STRONG password and an Expiry
Date for the user. The administrator can also set the Restrict Concurrent Logins to limit the
maximum IP addresses logged in to the platform using the user account.
11
HikCentral Access Control V2.0 Hardening Guide (Windows)
are suggested to be disabled when RPC, NetBIOS, and SMB are NOT used.
3.5 Antivirus
Install full-featured Anti-Virus software to keep HikCentral Access Control Server secure.
Antivirus must be active and automatically updated.
For example, the settings of Windows antivirus Windows Defender are as below.
Real-time protection must be “On”
Virus and spyware definitions must be “Up to date”
Example from Microsoft® Windows 10:
13
HikCentral Access Control V2.0 Hardening Guide (Windows)
14
HikCentral Access Control V2.0 Hardening Guide (Windows)
15
HikCentral Access Control V2.0 Hardening Guide (Windows)
to know clearly in the HikCentral Access Control audit log module which account uses what
type of client and which location (IP address) operates what resources in the system afterward.
Audit logs help the administrator locate the one who caused the system exception.
HikCentral Access Control also supports Active Domain (AD) users. AD server has high security
and can verify the validity of users.
17
HikCentral Access Control V2.0 Hardening Guide (Windows)