Skip to main content

SecuritEase Level 7 img-fdc6ce662d75c81f6f581d5edb5700d4 Version 0.5

Tim Jackson

Introduction

SecuritEase International (SecuritEase) is moving into a repurposed and upgraded physical floor at 25 Victoria Street.

The floor is level 7, and is currently split between two tenants.

The purpose of this document is to provide both a high level overview and detailed description of the controls and settings of the Ubiquity Networks (Unifi) fit out to provide SecuritEase with:

  • Floor access control to a number of external and internal doors
  • Security surveillance of both public and private spaces
  • Monitoring and alerting based on business event rules to a 3rd party system
  • Integration with Microsoft Entra Identity Service for accounts and group provisioning
  • Security Controls catalogue and key decisions

Design Overview

High Level Overview

The following diagram is an overview of the components and the interconnections for both ethernet and security systems.

img-8aaa291f1b8396b11e430e2d60dd5ef3

The Unifi components are shown below:

ComponentDescriptionQty
UDM Pro MaxController1
G2 Reader ProAdvanced access reader2
G2 ReaderStandard access reader2
G2 Dome Ultra4K dome camera2
Enterprise Access HubAccess Hub1
Intercom ViewerWall mounted touch screen viewer2

Lock Access Detail

The existing / new door locks are Lockwood 3570 series electronic mortice locks.

These locks use the existing 6 core security cable to connect to the Gallagher system. These cables will be rerouted to the Access Hub onto one of the 8 door panels.

Each door will have power to solenoid, door position sensor and request to exit enabled.

img-0e35fe827135152bb90ee66e3feeec0b

PanelDoorFail PositionDescription
1Reception 1SecureWest Reception door
2Reception 2SecureEast Reception Door
3Records RoomSecureRecords Room
4Internal DoorOpenCanteen Area

Site Design

The position of the existing doors and new doors are shown below.  The positions of the cameras and access keypads would be fitted to the existing locations where possible, and the cabling used a draw wire for new Ethernet cabling.

img-5bf63ceba5853ffefa42675ab05fd4b

Cable Standards

All cabling must be:

StandardUsed forDescription
Cat6eKeypads, Cameras,Ethernet should be used
6 core 0.5Security Cabling0.5mm2

Camera Placement

Camera placement is best guess at this stage.  The requirement is to clearly identify people and objects coming from the lifts or stairwells in the reception areas. 

Cameras are present for staff health and safety given no clear view of non office space behind locked glassless doors.

In the records room, clear view of anyone in the room so as to monitor safety given this is a secured area with controlled access.

The following is a representation of the camera viewpoints based on:

  • Camera type
  • Location
  • Ceiling height

This does not represent the view of cameras located in the access doors.

img-84b4063bf82f64dafed85d9e61a39fce

Security Controls

Building Evacuation

This is not a legal document - however references to certain legislation and the impact on decisions is documented and the decisions made by SecuritEase captured as controls.

Fire and Emergency New Zealand (Fire Safety, Evacuation Procedures, and Evacuation Schemes) Regulations 2018

Section 5

Owner and tenants of building must maintain means of escape from fire for building.

  1. The owner and every tenant of a building must maintain the means of escape from fire for the building so as to ensure that:

    1. the means of escape are kept clear of obstacles at all times; and
  2. exit doors are unlocked and free of barriers or blockages so that the building’s occupants can leave the building in the event of a fire emergency; and

  3. smoke-control and fire-stop doors are kept closed unless they are kept open in a way that complies with the building code; and

  4. stairwells and passageways are free of stored items and accumulation of waste.

  5. The duty in subclause (1) is owed by a tenant only in respect of an act or omission by:

  6. the tenant:

  7. a person who occupies floor space of the tenant (whether as a party to a tenancy agreement, lease, sublease, or other contractual arrangement):

  8. any occupant of the building who is an employee of the tenant.

:::Decison Title

All egress doors are to be set to exit without security controls - i.e. not locked. :::

Area Zoning

The level 7 office will be zoned for access based on the guidance of the New Zealand Protective Security guidelines for Physical security,

  • Zone 1 (public access)
  • Zone 2 (normal office work area),
  • Zone 3 (restricted work area) – potentially the Records Room, else it would also fall under Zone 2. img-8c03707f3360dc0378eb531918dbef16

Network Components

The following diagram explains the connectivity between all the components in solution

img-3f0d81e76f387ab9e89b6d01d0beef2b

ComponentProtocolDirectionNotes
Entra IDSSLOutboundSync is initiated from UDM
Access RequestSSLTunnelledIdentity client connects to Internet hosted Unifi Cloud service which has a SSL tunnel between itself and the UDM.  Authentication requests are proxied to the UDM.
Local Access RequestBluetooth LEInboundBluetooth Low Energy is used for local device based authentication between device and keypad.
NFCInboundEncrypted NFC is used to authenticate applications to users.

Testing and Validation

As part of any deployment, a set of test cases and plans will be provided to SecuritEase for general assurance from change.

This section is not to document the cases, but provide the overview of the required planning and documentation for the test cases.

Test cases and plans are maintained in the ThoughtLabs Test Management suite:

https://testmanagement.thoughtlabs.co.nz

Test Cases

The test cases below show the scope of smoke testing of core functionality required to validate the service pre and post changes.

IDNameDescriptionArea
TC-1Unifi portal loginConnect to https://unifi.ui.com/
Authenticate
Unifi
TC-2Obtain camera feedConnect to Dashboard
Validate camera operations
Check quality
Check alignment
Protect
TC-3Check camera detectionsCheck heat mapCheck detections against targetsProtect
TC-4Check notificationsEvent creation
Event processing
Protect
TC-5Check storageCheck storage availableProtect
TC-6Check usersCheck users are updated
Check user details are correct
Access
TC-7Check VisitorsCheck visitor databaseAccess
TC-8Check device healthCheck no devices are down or degradedAccess
TC-9Check System logValidate events recorded
Validate access denial
Validate unlocks recorded
Validate ring event recorded
Access
TC-10Add new user / visitorCreate new user or visitor
Check new user details are added
Access
TC-11Delete userDelete a test user
Validate this user has been removed from the database
Access
TC-12Add new credentialsAdd a new PIN code to userAccess
TC-13Trigger LockdownTrigger Lockdown process
Validate response on system
Validate keypad response
Validate intercom response
Validate Lock Response
Disable Lockdown
Access
TC-14Trigger EvacuationTrigger Lockdown process
Validate response on system
Validate keypad response
Validate intercom response
Validate Lock Response
Disable Evacuation
Access
TC-15Authenticate with NFCWith a registered and valid NFC card, check response in the following:
- Access Granted
- Access Denied
- Audio response from keypad
Access
TC-16Authenticate with AppWith a registered and valid registered Unifi Identity App, check response in the following:
- Access Granted
- Access Denied
- Audio response from keypad
Access
TC-17Authenticate with BLEWith a registered and valid registered Unifi Identity App, check response in the following:
- Access Granted
- Access Denied
- Audio response from keypad
Access
TC-18Authenticate with PINWith a registered and known user with an allocated PIN, check the following:
- Correct PIN = Access
- Incorrect PIN = Denied
Check impact of too many failed attempts (not configured).
Access
TC-19Authenticate with FaceWith a registered and valid Unifi Identity App, and a registered Face.  On the G2 Pro keypads only.

Check response in the following:
- Access Granted
Access
TC-20Check Syslog FeedReview the Syslog server by checking Unifi logs are being written to disk.  Check search for recent Unifi events.Access
TC-21Check Incident LogsIn PagerDuty - check Access Control service for recent events.Access
TC-22Ring DoorbellFrom the G2 Pro devices - press the doorbell button on the panel.
Check:
- Doorbell sound is heard
- Ringing is then heard
Access
TC-23Remote Open doorFrom an Intercom panel, select a door, and click unlock.Access
TC-24Open secured door - externalWith the door closed and locked. 
Then, ensure the handle cannot be turned.
Access
TC-25Close secured doorWhen a secured door is closed, check to hear the lock engage after 10 seconds of opening.Access
TC-26Open secured door - internalWhen exiting a secure area, ensure you can exit the door by operating the handle.Access
TC-27Check Slack/TeamsCheck the relevant Slack/Teams channel for any messages or notifications recently.Access
TC-28Check Email NotificationsCheck the relevant email account for any messages or notifications recently.Access
TC-29Check Email for Access requestFor new users provisioned on the system - check that an email containing a credential download link, and an authorisation code is included in the message.Access
TC-30Check Email for Visitor requestFor new visitors provisioned on the system - check that an email containing a PIN code is received.Access
TC-31Add new NFC CardIn the Access Portal, add a new card.
Select a reader, and place the new card.
Ensure the new card is registered.
Access
TC-32Download and install endpointIn the access request email, click the link to download the client.Access
TC-33Load new credentialWith a compatible client installed, click the credential link to load the credential onto the device.Access
TC-34Load New FaceIn a compatible endpoint, load a new face into the profile.Access
TC-35View camera feedIn the endpoint, view a camera feed.
Ensure the appropriate privilege is granted.
Protect
TC-36Modify NFC cardSelect user / visitor
Select existing card
Modify thew card to a new one.
Access

Test Plans

The following test plans are a high level view of the activities to validate functions against required outcomes.

IDTest CaseTest CasesStatus
TP-1Access RequestTC-1, TC-15, TC-16, TC-17, TC-18, TC-24, TC-25, TC-4DRAFT
TP-2Access DeniedTC-18 - With incorrect PIN, TC-24, TC-4DRAFT
TP-3New VisitorTC-1, TC-10, TC-7, TC-30DRAFT
TP-4Emergency EvacuationTC-1, TC-14DRAFT
TP-5Lockdown ModeTC-1, TC-13DRAFT
TP-6Grant AccessDRAFT
TP-7Modify CardTC-1, TC-36DRAFT
TP-8New User SyncTC-1, TC-6, TC-9DRAFT
TP-9Incident ResponseTC-1, TC-14, TC-21DRAFT
TP-10Intercom OperationTC-22, TC-23, TC-24DRAFT
TP-11NotificationsTC-1, TC-(15-19), TC-4DRAFT
TP-12New UserTC-1, TC-10, TC-12, TC-29, TC-33, TC-(15-19)DRAFT

Standards

The following table is a subset of the known standards for the solution.

AreaStandards / Spec
Unifi Access Reader
ConnectivityBLE 4.1
NFC Frequency13.56 MHz
NFC Read Range< 30 mm
NFC StandardsISO 14443A, 14443B, 15693
NFC TechnologyNFC Tag 1,2,3,4,5
MIFARE Classic
MIFAREPlus
MIFARE Ultralight
MIFARE DESFire
CertificationsCE, FCC, IC, UL 294, CAN/ULC-60839-11-1
Video Cameras
Resolution4MP 2688 x 1512 (16:9)
CertificationsFCC, IC, CE
Night ModeBuilt-in IR LED illumination and IR cut filter

Appendices

Decision Table

The following is a list of key decisions and ownership.

DecisionDescriptionRationaleOwnerDecided
Use Microsoft Entra for IdentityCompany standard for staff identity.James WinskillUndecided
PIN codes for accessAllow PIN codes for accessPin codes remove the need for NFC cards, especially for visitors.  Can be used as a second factor.James WinskillUndecided
PIN code complexity6 digit code for accessMore complex, easier to remember.  Balance security for ease of use.James WinskillUndecided
Access System Log RetentionNever delete logsLogs are stored on devices and also in SIEM.James WinskillUndecided
Video recording on accessMaximum 2 minutesFor correlation with access attempts.James WinskillUndecided
On Audio on VideoNo audio is recordedPrivacy reasonsJames WinskillUndecided
Door unlock recordingsOnly videoJames WinskillUndecided
Door unlock recording retention30 DaysPrivacy and we don’t need to keep events data.James WinskillUndecided
Auto send invitations when a user has an emailSet to enabledTo reduce the administration of creating separate emails for new user registration.James WinskillUndecided
Require a verification code when loading a credentialSet to requiredThis is to safeguard a credential email compromise.  Email is needed along with the link.  Forwarding an email is tracked.James WinskillUndecided
Deploy firmware or application updates WeeklyVendor recommended updates managed for deploymentMaintaining a balance between security and functions.James WinskillUndecided
Integration into PagerDutyWebhook used to push events and notifications to support Incident response activities.Incident response platform to ensure on-call teams and escalation is undertaken in a timely way.  Traceability of actions and incident acknowledgement.

Assignment of incidents using defined workflow.
James WinskillUndecided
External SirenConnecting the system to an external siren or sounding device for audible warnings.Could enhance the “silent” alarm capability.  Potentially used as a deterrent?James WinskillUndecided
Integration with Building alarmFor evacuation managementIf the building alarm was to sound, this could trigger the emergency or evacuation procedure.James WinskillUndecided

Controls Table

The following table describes the key control features of the service, and the rationale behind their use.

ControlDescriptionRationale
Separation of NetworksAll networks are segmented and have no associated direct routing.  All traffic is isolated to vLANs and Access control lists are used to inspect traffic.Reduced surface area for attack.

Good practice
Multiple Layers of SecurityVLAN separation with Access Control Lists and network inspection installed on all VLANs.Defence in depth, network based IPS / IDS deployed using another technology to protect against attackers.

Network based honeypots deployed to lure potential attackers for identification and escalation.
Secure Doors and FramesAll doors are hardened wood with recessed mortice locks with tamper resistant casing.High quality components designed to repel common entry attacks.
Access Control PanelsAccess panels are PoE connected to a separate network VLAN and have assigned IP addresses based on MAC address and device type.  No internet access is available on the network, and the default network is the VLAN gateway on the Unifi.High quality devices with ability to service many different types or authentication requests.  Future face ID and second factor access controls to help safeguard access.
Auditing and LoggingAll access is logged to the gateway, and Syslog can be used to send logs for further analysis and exception mapping.Visibility and future correlation of event data for trending and analysis.
Visitor ManagementSystem managed visitor database for managing temporary / non staff users.  Assignment of access policies and timeframes.  Access control via NFC or PIN code.Required ISO 27001 control to ensure a safe and secure physical environment.



Provides ability to determine who is onsite for emergency and evacuation.  Health and Safety.
Maintenance and TestingAll components are under a regular update train, with monthly security and feature updates by the vendor.  Device firmware is maintained and controlled centrally.Maintaining the latest security and service features is key to good practice and leveraging investments in service.
Security SurveillanceCameras in public areas, and in secure environments to safeguard staff.Health and Safety but also good practice security and assurance.
External Viewports to ReceptionEnables staff in a secure area to see who is in a public space before entry.Heath and Safety for staff before opening a door to a potentially unsafe environment.
Separate Gateway / Corporate Network designService takes a VLAN from the corporate environment with only Internet access.Controlled egress between Access services and corporate environment.
Integrated Identity ServiceInternal identity service used to support local administration and visitor databases.Important to keep local access in the event of a network outage, and keeping non staff out of the company identity system.
Activity based detection and response
Integration with SE SIEM
Webhooks for 3rd party notifications
High security locks
Separate network and security cabling
Incident Response

Constraints Table

The following table provides a list of known constraints that have presented themselves during the initial build of the service.

ConstraintDescriptionTreatmentOwner
Entra Sync - PushMicrosoft Entra can only sync changes such as new users or new groups.  It currently does not deprovision or amend groups to existing usersManual process to true up.James Winskill
Cloud BackupsThe system can produce automated cloud backups.Determine this is an acceptable place for system level backup data.  Alternative is manual backups to local storage.James Winskill

Schedules Table

NameSchedule HoursSchedule DaysHolidays
Business Hours07:00 - 18:00M,T,W,T,FOff
After Hours18:00 - 00:00M,T,W,T,FOff
Weekend Hours07:00 - 18:00S,SOff
Extended Weekend07:00 - 23:00S,SOff
24 Hours00:00 - 00:00M,T,W,T,F,S,SOff

Policies Table

NameDescriptionLocationGroupSchedule
Business Hours07:00 - 18:00 - Monday → Friday inclusiveAll locationsBusiness Hours
24 Hours24/7 accessAll locations24 Hours
After Hours18:00 - 23:00 - Monday → Friday inclusiveAll locationsAfter Hours
Weekend Hours07:00 - 18:00 - Saturday → Sunday inclusiveAll locationsWeekend Hours
Extended Weekend07:00 - 23:00 - Saturday → Sunday inclusiveAll locationsExtended Weekend

Admins Table

NameEmailRolePermissionsNotes
Tim Jacksontim.jackson@thoughtlabs.co.nzSuper AdminSuper AdminInitial Admin until signoff
James Winskilljames.winskill@securitease.comSuper AdminSuper Admin
Chris McKenziechris.mckenzie@securitease.comSuper AdminSuper Admin

Role Table

NameNetworkProtectControlAccessConnectNotes
Super AdminFullFullFullFullFullSystem Default
Access AdminNoneNoneNoneAdminNone
System AdminViewAdminAdminAdminNone
Camera AdminNoneNoneAdminNoneNone
Access UserNoneNoneNoneViewNone
Camera UserNoneViewNoneNoneNone

Data Controls

The following table is in support of the Data Controls and Classification section in this document.

Information

This section is to advise on possible inclusion into SecuritEase’s risk management system.  It is not a formal record of the control, nor the risk posed.
ControlControl NameControl DescriptionControl OwnerNote
Encryption at RestData EncryptionRSA 2048 EncryptionSystem Owner
Encryption in TransitData EncryptionRSA 2048 SigningSystem Owner
RBACRBAC AccessRole Based Access Control implementedSystem OwnerRBAC used to control access to system and personnel data

Identity Group Mapping

Information

This is used to assign applications to the Unifi application systems.  These appear as applications under the Unifi Identity service, and provide a consolidated view of services to an end user.  The users should only be allocated to this via a Group / Entra mapping.
Identity GroupAccess PoliciesProtect CamerasNotes
SecuritEase
Business DayBusiness DayTBA
After HoursAfter HoursTBA
All TimesBusiness Day

After Hours

Weekend
TBA
WeekendWeekendTBA
Weekend ExtendedWeekend ExtendedTBA
Records RoomRecords RoomRecords RoomTBA
CamerasCamera View

Camera Admin
Reception

Records Room

East Door

West Door
TBA

Entra Group Mapping

Entra GroupIdentify GroupNotes
Business DayBusiness DayTBA
After HoursAfter HoursTBA
All TimesAll TimesTBA
WeekendWeekendTBA
Weekend ExtendedWeekend ExtendedTBA
Records RoomRecords RoomTBA
CamerasCamerasTBA
Camera AdminTBA

Operational Processes

The following table is a list of the operational processes required to administer the service.

IDProcessDescriptionNotes
P01True Up AD
P02Add / Remove User
P03Manual Update User
P04Update Group
P05Upgrade Applications
P06Routine Configuration TestTest door operation and impact of disabling access
P07Manual Backup / Restore
P08Assign / Unassign CredentialsCards, NFC, and Application credentials.
P09Add new Cards
P10Add / Remove Visitor
P11Emergency Mode
P12Mobile Application Deployment
P13Update Event Notification
P14Incident Response Activities

Control Plane Event Management

NotificationEmailNotificationNote
Shadow Mode EventsSupportPagerDuty
Drive FailurePagerDuty
Drive Issue DetectedPagerDuty
Drive InstalledNot critical
Incompatible DriveNot critical
Drive EjectedPagerDuty
Admin Application ActionsSIEM
UpdatesSupport
Console Update AvailableNot critical
Console UpdatedNot critical
Application Update AvailableSupport
Application UpdatedNot critical
Admin ActivitySIEM
Admin AddedSIEM
Admin RemovedSIEM
Admin Role ChangedSIEM
Admin Settings ChangedSIEM
Admin AccessSIEM
Console Ownership TransferredSIEM
BackupsSupport
Backup CreatedNot critical
Backup RestoredNot critical

Alarm Actions

The system can deal with custom actions so help notify administrators with key events.

Action TypeDescriptionURL
Slack PostCreate a post to a Slack groupTBA
PagerDutyCreate a webhook to ServiceTBA
TeamsCreate a post to Teams WebhookTBA

Custom Alarms

The following is a list of the custom actions configured for notifications.

TriggerScopeActionNotes

Alarm Manager

The following table contains a list of standard actions and alarms with the scope and action defined.

TriggerScopeActionNotes
AnimalNot deployed
Baby CryingNot deployed
BarkingNot deployed
BurglarPagerDutyNew Incident
Car HornNot deployed
CO AlarmNot deployed
Glass BreakagePagerDutyNew Incident
Motion
PackageSlackPostPackage detection
Person
Person of interestNot deployed
RingSlackPostReception?
Sense AlarmNot deployed
Sense Extreme ValuesNot deployed
Sense Low BatteryNot deployed
Sense Open or Close Status ChangedNot deployed
Sense Water LeakNot deployed
SirenNot deployed
Smoke AlarmNot deployed
SpeakingNot deployed
VehicleNot deployed
Vehicle of interestNot deployed
Admin AccessSIEM
Admin Change SettingsSIEM
Admin Recording Clips ManipulationsSIEM
Application IssuePagerDutyNew Incident
Device Adopted or RemovedSIEM
Device DiscoverySIEM
Device IssuePagerDutyNew Incident
Device Limitation Reached

Access Settings

Security Settings

The following is a list of the security settings in the Access service.

SettingOptionNotes
Emergency Mode
Credentials
CardAllow 3rd Party CardsAllow potential other cards to be used based on the security limitations of the card.
Pin6 Digits



Randomised Keypad layout



Allow simple PIN
This is a decision to have a complex code for users.



Not enabled



Not enabled
Face UnlockDisabledThis is in early access currently.

Advanced Settings

The following is a list of the security settings in the Access service.

SettingOptionNotes
Time Format24 Hours
RegionPacific/Auckland
System Log RetentionNever delete logs
NetworkIsolated vLANIsolated network for Access and Cameras - vLAN 1984
Video Recording
Maximum Call and View Duration2 MinutesDefaul
Door Unlock RecordingsOnly videoDecision to only capture video for privacy.
Recording RetentionCustom30 days retention
Retention Period30 Days
Access Reader
Access Reader LanguageEnglish
Entry Greeting
Greeting SoundYes
MessageWelcome
SalutationFirst Name
Exit Greeting
Greeting SoundYes
MessageBye
SalutationFirst Name

Protect Settings

Recording Manager

The following is a list of the security settings in the Access service.

SettingOptionNotes
Camera NameCamera 1
Recording Options
When to RecordAlways
Recording ModeContinuous
Motion Events
Seconds of motion1 second
Seconds before event2 seconds
Seconds after event2 seconds
AI Events
Video DetectionsAnimal / PersonVehicle is not relevant.
Seconds before event2 seconds
Seconds after event2 seconds
Overlay
SettingsTime, Camera Name. Logo
Recording Retention
Retention SettingAuto
Delete recordings afterNot set due to auto.

System Settings

The following is a list of the security settings in the Access service.

SettingOptionNotes
LanguageEnglish
Preferences
Time Format24 Hour
TemperatureCelsius
Recovery CodeStored in secure password safe
Automate device updatesCheck daily at 03:00
Archiving AccountsNot Set
Smart DetectionSet
HeatmapSet
GeofencingSet
Low Latency VideoSet
Timeline Scrubbing ReviewSet
Discovery 3rd Party CamerasDisabled
Report False DetectionsNot set
Auto-Adopt Bridge DevicesNot set

Identity Settings

System Settings

The following is a list of the identity endpoint settings

SettingOptionNotes
Site LogoSE LogoUse default SE logo PNG.
Services
One Click WifiNot setNot required as no Wifi inscope
OneClick VPNNot setNot required as no security gateway
Camera SharingSetEnabled for staff with permissions
Identify Credentials
Auto send invitations when a user has an emailSetEnabled to improve the workflow of new users
Require a verification code when loading a credentialSet

UDM Console Settings

Console Settings

The following is a list of the console control plane.

SettingOptionNotes
Site GatewayUDM Pro Max
Settings
Name
Location / Time Zone
LED / ScreenSet
Brightness80%
Night Mode22:00 - 08:00
Email Services
Service TypeCustom Server
SSLSet
SMTP Server / PortTBD
Authentication
SMTP UsernameTBD
SMTP PasswordMaintained in password safe.
Specify Sender Address
Sender Emailsecurityaccess@securitease.com
Advanced
Remote AccessSetDefault
Direct Remote ConnectionNot setNot required
Analytics and ImprovementsNot setPrivacy
SSHNot setNot required

Network Settings

Network General Settings

The following is a list of the console control plane.

SettingOptionNotes
Multicast Settings
IoT Auto-DiscoveryNot set
Multicast FilteringNot set
Forward Unknown multicastNot set
Fast leaveNo set
Switch Isolation Settings
L3 Network Isolation (ACL)Not setL3 isolation not possible on UDM
Device Isolation (ACL)Not set
Global Switch Settings
Spanning Tree ProtocolRTSP
Rogue DHCP DetectionSet
Jumbo FramesNot set
Flow ControlNot set
802.1x ControlNot set
Information

The UDM Prox MAX is not a full Layer 3 switch and therefore cannot restrict vLAN interactions to the same level as a full featured layer 3 device.  Therefore certain access control features of Unifi Network such as network isolation are not possible.  Layer 2 and some layer 3 capabilities such as ACL are used instead to provide this capability.

Surveillance Network Settings

The following is a list of the settings applied for the Surveillance Control Network

SettingOptionNotes
Network
NameSurvellance
RouterUDM Pro MAX
IPv4Set
IPv6None
Gateway IP / Subnet
Auto scale networkNot setMore control over allocation.
Host address192.168.10.1
Subnet Mask/28
Advanced
vLAN ID1984
Guest NetworkNot set
Isolate NetworkSet
Allow Internet AccessNot set
Content FilteringNone
IGMP SnoopingNot set
mDNSNot set
DHCP
DHCP ModeDHCP Server
DHCP Range192.168.10.2

192.168.10.14
DHCP GuardingNot setThis can be set once DHCP servers are
DHCP Service Management
NTP ServerNot setNot used
Network BootNot set
Time OffsetNot set
Option 43Not set
WPAD URLNot set
TFTP ServerNot set
Ping Conflict DetectionSetPart of advanced conflict detection.
Default GatewayAutoSet to router
DNS ServerAutoAs defined by router
Lease Time86400 secStandard balanced lease time
Domain NameNot setCan be set later
Custom OptionsNot used

Network Overview

Gateway IPBroadcast IPUseable IPRangeMask
192.168.10.1192.168.10.1513192.168.10.2

192.168.10.14
255.255.255.240

Access Network Settings

The following is a list of the settings applied for the Access Control Network

SettingOptionNotes
Network
NameAccess Control
RouterUDM Pro MAX
IPv4Set
IPv6None
Gateway IP / Subnet
Auto scale networkNot setMore control over allocation.
Host address192.168.11.1
Subnet Mask/28
Advanced
vLAN ID1985
Guest NetworkNot set
Isolate NetworkSet
Allow Internet AccessNot set
Content FilteringNone
IGMP SnoopingNot set
mDNSNot set
DHCP
DHCP ModeDHCP Server
DHCP Range192.168.11.2

192.168.11.14
DHCP GuardingNot setThis can be set once DHCP servers are
DHCP Service Management
NTP ServerNot setNot used
Network BootNot set
Time OffsetNot set
Option 43Not set
WPAD URLNot set
TFTP ServerNot set
Ping Conflict DetectionSetPart of advanced conflict detection.
Default GatewayAutoSet to router
DNS ServerAutoAs defined by router
Lease Time86400 secStandard balanced lease time
Domain NameNot setCan be set later
Custom OptionsNot used

Network Overview

Gateway IPBroadcast IPUseable IPRangeMask
192.168.11.1192.168.11.1513192.168.11.2

192.168.11.14
255.255.255.240

Network Security Settings

The following is a list of the general network security settings applied to the UDM Pro.

General Settings

SettingOptionNotes
Device IdentificationSet
Traffic IdentificationSet
Country RestrictionsNot set
Ad BlockingNot set
DNS ShieldOff
Internal Honeypot
NameWinnie the Pooh
Subnet192.168.11.1/28
Honeypot IP192.168.11.2
Lease Time86400 secStandard balanced lease time
Domain NameNot setCan be set later
Custom OptionsNot used

Intrusion Prevention Settings

SettingOptionNotes
Intrusion Detection and Prevention - Advanced
NetworkAccess Control

Survellance
Filtering ModeNotify and Block
Detection SensitivityMedium
Dark Web BlockerSet
Block known malicious IPSet

Network System Settings

The following is a list of the general network security settings applied to the UDM Pro.

General Settings

SettingOptionNotes
Country / RegionNew Zealand
LanguageEnglish
Time Format24 Hours

Integrations

SettingOptionNotes
NetflowNot setWe are not using Netflow IPFIX
Activity Logging
SIEM ServerSet
ContentsGateway

Switches

Access Control

Admin Activity

Clients

Critical

Devices

Security Detections

Triggers

Updates
Standard settings applied.  Review logs.
Debug LogsSet
Server AddressTBA
Port1514
NetconsoleNot set
SNMP Monitoring
Version 3
UsernameTBAGood practice
PasswordTBA
WifiMan SupportNot setWe are not using Wifi.

Console Backup Settings

SettingOptionNotes
Backups (Config File)DownloadedCreated post install
Auto Backup
RepeatDaily
Time03:30Outside of business hours
Maximum Number of Files14Two weeks backup
RetentionSettings OnlyFor privacy

Advanced Settings

SettingOptionNotes
Side Panel TabsSet
Professional InstallerSet
Debug ToolsSet
Data Retention
Data Retention Days90 daysStats and log retention due to SYSLOG
Collect Historical Client DataSetTraffic counts, retries etc.
Network Time ProtocolAutoSet based on location.  Custom NTP servers can be used if needed.
Email Services
Service TypeCustom Server
SSLSet
SMTP Server / PortTBD
Authentication
SMTP UsernameTBD
SMTP PasswordMaintained in password safe.
Specify Sender Address
Sender Emailsecurityaccess@securitease.com
Inform HostNot setDevice name settings are used.
Device AuthenticationEnabled SSH
UsernameMaintained in password safe.
Password
SSH KeysNot used
Logging Levels
DeviceVerbose
ManagementVerbose
Remote AccessVerbose
SystemVerbose
Wireless ConnectivityNot used.
Device Firmware Release ChannelOfficialThis might need to be reviewed as Entra is currently in Early Access.
Device Update Schedule
NameWeekly Schedule
Start Time02:00
RepeatsWeekly
On EveryFriday

:::NOTE Information

Device firmware updates occur often.  The recommendation is to apply these soon after release. :::

Most updates are either security or additional application functions.

Data Classification

Classification Types

Based on the NZ Government Data Classification Policy.

LevelDescriptionNotes
Level 1Publicly Available InformationPublic information only
Level 2Restricted InformationRestricted information, PII, confidential business information and client data.
Level 3Sensitive InformationFinancial information, personal health data, legal or national security information.

Data Sources

SourceTypesSystemsClassification
Staff DataName

Email

Group assignments

Devices running client

Assignment of NFC

Assignment of user PIN

Insights into access movements
Entra

Unifi Management Appliance
Level 2
Visitor DataName (First + Last)

Visit Reason

Email Address

Person Visiting

NFC Card registration

PIN Code registration
Unifi Management ApplianceLevel 2
Access DataAccess Data / Granted / Denial

Unlocks

Ring / Notify

Face Detection
Unifi Management ApplianceLevel 2
Video DataVideo recording on camera feeds

Motion detection events

AI event detections
Unifi Management ApplianceLevel 2
Audio DataAudio recording on camera feedsUnifi Management ApplianceLevel 2
Event DataNotifications / Alarm triggersUnifi Management Appliance

PagerDuty

SIEM
Level 2
System DataDevice Logs

System Admin Activity

Update activity

Client connection activity

Threats data

Triggers

System host data

Configuration Data
Unifi Management Appliance

PagerDuty

SIEM
Level 2

Systems

NameDescriptionNotes
Microsoft EntraUsed to populate staff data into the system.  Controls group and rights assignments.

Only certain groups are synced so not all staff records exist in systems.
Office 365 EmailUsed to send notifications of events and details for new user setup.

It is used to send details to visitors (if used).
Identity ApplicationiOS or Android application that can be used for Authentication against keypads for access control.  Also provides access to other services such as camera feeds if permissions allow.
Protect ApplicationiOS or Android application that can be used for access to camera feeds if used outside of the identity application.
Access ApplicationiOS or Android application that can be used for physical access if used outside of the identity application.
Unifi Management ApplianceSecurity gateway used to control policies and management over both the Protect and Access applications.  Also provides a secure networking and routing function for these networks.

Connected to L1 firewalls for Internet access.
SecuritEase SlackIf configured - messages and notifications about events and actions can be sent via SSL to this service.
SIEM / SyslogSyslog feeds to event monitoring systems as required.
SNMPAuthenticated system information used for monitoring.
PagerDutyWebhook function to send event data to on-call teams for remediation and Incident Response activity actions.

Storage

NameLocationNotes
Unifi CloudNorth AmericaSecure cloud service.
SATA DiskLocal DeviceRAID 1 encrypted disk array
SIEM / SyslogTBAUnknown - Potentially AU based Managed SIEM service
SecuritEase VaultLocal DevicePasswords

Keys
SecuritEase File systemLocal DeviceManual Backups

Incident Response Design

Overview

Information

One of the core mitigations to not having a fully monitored alarm system, is that any core system or break in attempts are reported, escalated and investigated as they occur.



Good practice in Incident Response is to have any events reported in a standard way, and assign them to case owners as part of any ongoing investigation.



PagerDuty has been configured to provide this capability, and used to support these outcomes.

Business Service

Business services provide a way to model capabilities that span multiple technical services.

AreaSettingNotes
Service NamePetone Access Management
Service DescriptionAccess control system events from Petone L7 office.
Service OwnerJames Winskill
TeamGlobal Support Team

Supporting Service

A service in PagerDuty represents a component, microservice or piece of infrastructure a team operates, manages, and monitors. 

AreaSettingNotes
Service NameAccess Control Response
Service DescriptionResponse Plan to incidents relating to systems, or escalations to physical access to SecuritEase buildings or monitored systems.
Service OwnerJames Winskill
Integrations
Event APITBAURL and Access Key for service webhook.
Slack MessageTBA
Incident Workflow
Triage EventBased on severity establish Alert areas.
Assign SeverityBased on system categorisation of severity - map incident severity.
Assign PriorityAssign priority based on severity
Raise IncidentCreate an incident - start a response process.
Settings
Assign to Escalation PolicyTBA
Response PolicyTBA
Alert MappingCritical → High

Error → High

Warning → Low

Info → Low

Not Available → High
Retrigger Ack IncidentsNo
Auto ResolveNo
Responders and Stakeholders
Conference BridgeTBA
Meeting URLTBA
Response PlayP14 - Incident Response Activities
Event Management
Orchestration Rule
Events create IncidentAll Events Monitored
All EventsSelect any event
Incident PrioritySet to Low
Add NoteSet to Low by Rule
Set SeveritySet to Warning
Remediate
Documentation LinkP14 - Incident Response Activities
Link NameAccess Control Response

Monitoring Assurance

Information

The following is a recommendation for system monitoring.  This is not a replacement for any assurance standards or policies the SecuritEase has.
AreaNotes
SNMP MonitoringCPU

Memory

Network

Temperature

Error Logs

Critical Events
Event MonitoringPagerDuty Reporting
SIEM MonitoringSyslog Monitoring
Operational ChecklistsDaily Backups

Event history

Device Events

Updates

Entra Sync status

Visitor Cards

Check against Entra for removed users
SupportSupport tickets related to system

Escalations

Vendor email notifications

Change control planning

BAU procedures

**