Subscriber Discussion

Security System OS - Impact On Cyber Security

Avatar
Scott Fischer
Dec 29, 2023
Lorica Consulting LLC • IPVMU Certified

I have run into several instances where the operating system underpinning a security system has become a point of contention between IT/Cybersecurity teams and the physical/corporate security teams. Confirming what OS is being used and how the system will interact with tools such as CrowdStrike frequently takes multiple discussions with sales teams and engineers from the manufacturers. The IT teams I have worked with prefer regular operating systems that can be monitored with their existing tools and avoid (or ban) the use of non-standard, hardened operating systems.

Has anyone else run into this issue? Is it common among manufacturers to use proprietary/hardened operating systems for their platforms? If so, how do you satisfy IT and cybersecurity requirements when connecting these systems to the corporate network?

(1)
UM
Undisclosed Manufacturer #1
Dec 29, 2023

*** *** ******* ***** ***-**** ** devices **** ** ** *******? ***** types ** ******* ******** *** ***** OS **** *** **** ********** *** stripped ****.

** *** *** ******* ***** ******* to *** ****** ******* ** ***, etc., **** ***** *** ********* ***-***-***** OS **** ** ******* *** *****.

*** **** ******* **** **** ******* or ***** ********* ****** *** ***-***-***** Raspberry ** *** ******** **, ** they *** *** ** ****** **** too ****.

*** ****** *** ******** ** **** type ** ** *** *** ****** the ********, ***. *** ** **** useful ** ************* *** ****** *** who ******** ***** **.

(3)
Avatar
Scott Fischer
Dec 29, 2023
Lorica Consulting LLC • IPVMU Certified

****** *** *** ********. * ** specifically ********* ** *** **** ******* running ****** ******* *** ****** ******* systems. ** **** **** **** ** work ******* *** **** **** ***** are ****** ********** (*******, ******* ******, etc.) **** ***** *** ********** ** non-standard ********.

* ******** ******* ***** ** *********** ** *** *********** **** ** "******** ******** **". Based ** ** **********, **** ****** it **** * ******** **, ** could ** * ***-******* **** **** cyber ******** ***/** ** *****. ******** offers ***** **** **** ** ******* *********** *** ** ******* ****** **** LTSC; *******, *** *** *** *** all ** *** ******** ******** ** the ** *** ****.

UE
Undisclosed End User #3
Dec 30, 2023

******** **** **** * ***-********* ******** (aka ***********) *** **** ** ******* "out ** ****" ******** *** ****** RED ***** **** ***.

UI
Undisclosed Integrator #4
Dec 30, 2023

** ** * *** ** ******** and *** **** ***. ** **** not *** * ******** **** *******. Having ******* ******** ** ******** ******* running ******* ** ***** *** ******/***** easier ** ****** ******* ****** ** deal **** ******* **** * ***.

**** ******* **** **** ***** ******** assessments *** **** *** ******** *** issues. **** **** **** *** ********* as *** ***** ********* *** **** happy.

(1)
UI
Undisclosed Integrator #2
Dec 29, 2023

*** **** ** ******* ***** *** Windows *** **********, ***** *** **** be ********* ** **** (** * recall *********).

New discussion

Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.

Newest discussions