Milestone Hardening Guide

Milestone Hardening Guide Image
This guide describes security and physical security measures and best practices that can help secure your XProtect video management software (VMS) against cyber-attacks. This includes security considerations for the hardware and software of servers, clients and network device components of a video surveillance system. This guide adopts standard security and privacy controls and maps them to each of the recommendations. That makes this guide a resource for compliance across industry and government security, and network security requirements.
Link to Milestone Hardening Guide

Axis Hardening Guide Cameras

Axis Hardening Guide Cameras Image
The guide provides technical advice for anyone involved in deploying Axis video solutions. It establishes a baseline configuration as well as a hardening guide that deals with the evolving threat landscape. Like that of many other security organizations, the Axis baseline uses the CIS Controls - Version 6.1, see www.cisecurity.org/critical-controls.cfm. These controls were previously known as SANS Top 20 Critical Security Controls. This document refers to these CSC (Critical Security Control) by marking CSC#.
Link to Axis Hardening Guide

Hikvision Network Security Hardening Guide

Hikvision Network Security Hardening Guide Image
Hikvision network devices, like any other network devices, may be exposed to cybersecurity risks. To protect the network from the risk, Hikvision takes measures such as disabling the Telnet and FTP interface, and adopting the security activation mechanism.
Download Hikvision Hardening Guide

Salient Systems Hardening Guide

Salient Systems Hardening Guide Image
This document provides guidance for system end users, system integrators, and security design consultants about establishing a sensible cyber security profile for their deployed Salient Systems security video management system products. Cyber security, also known as computer and network security or IT security, is defined as 'the protection of computer systems from theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.'
Link to

Zenitel Cybersecurity Hardening Guide

Zenitel Cybersecurity Hardening Guide Image
Zenitel has developed a Cybersecurity Hardening Guide to help you approach your Cybersecurity planning, based on the CIS (Center for Internet Security) Controls. It combines our experience applying best practices developed by CIS to support end users and integrators to build a good cyber defense.
Link to Zenitel Cybersecurity Hardening Guide

Bosch IP Video and Data Security Guidebook

Hanwha Network Hardening Guide

Mobotix Cyber Protection Guide

ONSSI Hardening Guide

Speco Security Hardening Guide

Vivotek Security Hardening Guide

Dahua Cybersecurity Best Practices