Skip to content
  • SDLC in Cybersecurity: Software Development Best Practices
  • The Cybersecurity Life Cycle in OpenEye Web Services 
  • Strengthen Your Video Surveillance with OpenEye’s Cyber-Secure Platform
    • Ability to Audit User Activity  
    • Automated Lost Password Resets 
    • Automated Software Updates 
    • Cross-Site Request Forgery Protection 
    • Digital Signature Verification 
    • HTTPS Video and Data Transmission 
    • Multi-Factor Authentication (MFA) 
    • NIST-Compliant Data Encryption 
    • Outbound Trusted Connection (OTC) with No Open Inbound Ports 
    • Single Sign-On to Access Remote Clients 

Cybersecurity is a critical part of the software development life cycle, and its implementation should begin at the very inception of the product. 

When first developing software, a business should consider cybersecurity from every angle. Practically, this means the product’s architecture should be inherently secure from the beginning of the design phase. Trust boundaries need to be mapped, with engineers looking for places where there could be potential issues. Then, the product should be reviewed by security-focused personnel and senior engineers. An architecture that’s more complicated than it needs to be could create a security issue if one aspect isn’t implemented just right. 

The OpenEye Web Services (OWS) cloud-managed video platform, throughout its software development life cycle (SDLC), approaches cybersecurity as a foundational aspect of building its product. “Right out of the gate, OpenEye has a pretty heavyweight approach for security because if you don’t get the foundation right, the software or system can be vulnerable in spite of the best implementation later on,” says Jake Sink, OpenEye’s Principal Software Architect. 

Prioritization of security when developing software for video surveillance platforms is critical, something reflected in the makeup of OWS. Below, we’ll cover why cybersecurity is so vital, the best practices for those building the software, as well as how users can maintain their system for optimal security. 

SDLC in Cybersecurity: Software Development Best Practices

A woman looks at a computer screen

Best practices for software system design were introduced in the 1970s. According to SAFECode’s Fundamental Practices for Secure Software Development, best practices include:  

1. Keeping the system’s design as simple as possible

2. Programs and users operate using the least set of privileges necessary 

3. Human interface designed for ease of use 

4. Record compromises of information

Additional principles have been added such as “defense in depth,” in which a system is designed so it can resist attack if a single vulnerability is compromised, and “design for updating,” where designers plan for future security updates. In addition, the paper recommends having an encryption strategy, standardizing identity and access management, and rigorous testing, such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and penetration testing. 

The U.S. National Institute of Standards and Technology (NIST) recommends a Secure Software Development Framework (SSDF), a set of secure software development practices; “Following the SSDF practices should help software producers reduce the number of vulnerabilities in released software, reduce the potential impact of the exploitation of undetected or unaddressed vulnerabilities, and address the root causes of vulnerabilities to prevent recurrences.”  

The Cybersecurity Life Cycle in OpenEye Web Services 

OpenEye has processes in place to ensure a secure architecture, including testing and reviews by subject matter experts, quality assurance personnel, and developers. As we test our platform and begin the software lifecycle, it’s crucial to consider the security of how the software operates, whether in the cloud or on a device, asking ourselves questions such as: 

  • What are the possible exploit scenarios? 
  • What could go wrong? 
  • How might someone try to work around a security measure?  

The next layer is the coding process, the step in the lifecycle which includes an analysis of the code and peer reviews. Developers should use common patterns that can easily be scanned and evaluated for errors. 

When ensuring a platform is as secure as possible, Jake Sink says, “People aren’t perfect, and even your best engineer could make a mistake one day…We want to build in the fail safes to prevent that kind of thing from being possible to manifest as a security issue.” 

The integrity of the code running on the OpenEye Web Services platform also must be evaluated. There are checks and balances and a process in place to ensure testing happens throughout development. Automation at some of those checkpoints ensures consistency. OpenEye performs SAST, DAST, penetration, and other testing throughout the development cycle. 

“Whether developing a new feature or making a change to the software, we look at things from inception, with as much depth as possible. Then we look at implementation and make sure  that it is secure, using both human and machine learning. We perform a static analysis and then finally ensure the integrity of the software being released,” said Sink. 

When a project is complete, a postmortem discussion can help provide feedback and lead to adjustments for the future. 

Strengthen Your Video Surveillance with OpenEye’s Cyber-Secure Platform

Rows of office workers sit in front of computer monitors which display feeds of security footage. At the front of the room stands a large, wall-sized monitor which displays additional frames of surveillance video.

For end users operating OpenEye Web Services on a daily basis, our platform features a variety of features to keep your video and data secure. 

Ability to Audit User Activity  

User activity can be audited to get a clearer picture of who is using your system. It’s easy to see which systems users are accessing and what clients they are using, as well as the ability to implement “least privilege” for their own security and compliance requirements, through robust and fine-grained role-based access control (RBAC) features.

Automated Lost Password Resets 

OWS simplifies the process of resetting lost passwords, lessening the burden on IT and reducing the likelihood of shared user credentials. 

Automated Software Updates 

Administrators are notified when updates are available and can initiate them with the simple click of a button, helping limit the likelihood of vulnerabilities being left unpatched. 

Cross-Site Request Forgery Protection 

A Cross-Site Request Forgery attack forces users to execute an unwanted action on a site they’re currently authenticated with. This is typically accomplished by tricking the user into clicking a decoy link or logging in to a fake version of a legitimate website. To prevent this, OpenEye has implemented CSRF protection techniques similar to those implemented by banks and stock traders that require a high degree of online security. 

Digital Signature Verification 

All video exported from OpenEye Web Services includes a Digital Signature to authenticate the image or video file and proves that it has not been altered. 

HTTPS Video and Data Transmission 

OpenEye Web Services supports the use of network proxy services to securely aggregate HTTP communication in corporate environments. OWS requires an HTTP 1.1 compliant proxy and can accommodate null or basic authentication. Relayed connections will route all video traffic through the proxy host, while a peer-to-peer negotiated connection will deliver video directly from the recorder to the client, and control messages will remain routed through the proxy. 

Multi-Factor Authentication (MFA) 

Multi-factor authentication requires more than one independent form of credential to verify the user’s identity. OpenEye Web Services (OWS) uses multi-factor authentication to ensure that unauthorized parties are unable to gain access to user accounts. 

NIST-Compliant Data Encryption 

Processes compliant with the National Institute of Standards and Technology (NIST) protect users’ passwords from hacking attempts. These processes encrypt stored passwords, making them practically unusable, even in the event of a server breach. The NIST reviews these processes on a semiannual basis to look at conformance and assess new methodologies. 

Outbound Trusted Connection (OTC) with No Open Inbound Ports 

Proper user authentication and a successful TLS handshake will establish what is known as an Outbound Trusted Connection (OTC). With an OTC, a recorder will only communicate with and respond to verified clients. This OTC methodology also enables WAN client connections without permanently opening an inbound port on the network’s firewall. The result is tighter network security and does not require specialized IT configuration at individual sites. 

Single Sign-On to Access Remote Clients 

Single sign-on in OpenEye Web Services allows users to access remote clients and reduce the potential for rogue remote clients with manually entering IP and port information. 

With these cybersecurity best practices in place, OWS users can rest assured that their video surveillance system is protected. 

To see these features in action, as well as OpenEye’s smart video security tools, book a demo with us today to experience firsthand the power of OpenEye Web Services. 

Share it on:

Sign Up to Receive Our Newsletter

POS Connect in OpenEye Web Services