Security

All Macula editions have enhanced security aimed at data protection, which includes not only advanced permission management but also encryption wherever possible. Data protection for Macula encompasses database encryption, server-to-server and server-to-clients connection encryption, password protection for the proprietary archive, as well as certain system settings and policies that increase the level of cybersecurity.

The system offers pre-configured security levels, each of which includes a certain preset of security-related features. Some of the security settings are system-wide, and some other can be adjusted for individual servers (e.g., archive encryption).

Cybersecurity Dashboard

You can access the cybersecurity dashboard via Macula Console main menu in the top right corner > Cyber security.

Four pre-defined security levels range from the lowest to the highest. You can choose any level as a basis and, either leave it is it is, or turn off individual security checks.

Each security check means that the related setting is tracked and you are notified if it does not meet the security requirements. For example, if the automated backup location is on the same disk as the main configuration file, the backup directory setting in the Automated backup configuration dialog box will have a warning shield. Thus, the selected security level is a set of recommended security settings, and you are free to ignore the warnings or exclude individual checks from the security profile.

Security Levels

The cybersecurity dashboard will display recommended setting values accompanied by warnings if the current preference is lower than recommended. For some of the checks, the warnings cannot be displayed: this happens if the security check is applied at a certain moment. For example, this is true for the storage and device passwords: the server cannot validate the existing password so the password complexity will be estimated on the password creation step.

Cybersecurity levels:

  • None: no security checks at all

  • Low: only some password policies and server backup settings are tracked

  • Medium: more of these settings plus user- and device-related settings

  • High: all possible settings related to security are monitored for maximum system protection

If the security check concludes there are issues with the current configuration, you will be notified with an orange shield and offered to review the list of issues.

Click the Show active issues button to see the list of detected security issues and recommendations on how to get rid of them.

From here, you can save the list of active cybersecurity issues into a CSV file.

Security Checks

The following security checks are available with their corresponding recommended values for different security levels:

Category
Security check
Low
Medium
High

Automated configuration backup

Automated configuration backup mode

Enabled

Enabled

Enabled

Automated configuration backup interval

Every 5 days

Every 2 days

Every day

Number of config backup files to keep (max)

1 or more

15 or more

30 or more

Backup directory is located on a different drive

-

+

+

Databases to be backed up

-

All

All

Category
Security check
Low
Medium
High

Server security policy

Minimal user password length

6+ characters

8+ characters

12+ characters

Minimum number of uppercase letters in the user password

1+

2+

2+

Minimum number of lowercase letters in the user password

1+

2+

2+

Number of previous passwords to remember

-

1+

3+

Number of days between password changes

-

90-

30-

Max number of simultaneous connections using the same user account

-

1

1

Max unsuccessful login attempts before blocking the user account

-

5-

3-

Minimum number of special symbols in the user password

-

-

1+

Minimum number of digits in the user password

-

-

2+

Category
Security check
Low
Medium
High

Server storage

Check storage password complexity (upon setting the password)

-

+

+

Storage encryption is enabled

-

-

+

Audit policy

All audit options related to security policy are enabled

-

+

-

Server connections

Client-server connection encryption is enabled

-

-

+

HTTPS is enabled

-

-

+

Two-factor authentication (2FA)

2FA is enabled

-

-

+

User account

Check password complexity against server policy

-

+

+

Lock account after N unsuccessful login attempts ("never lock on bad password" option is disabled)

-

+

+

User password is valid for a limited time ("password never expires" option is disabled)

-

-

+

Device settings

Verify password complexity (upon entering the password)

-

+

+

Some of the security options are hard-coded so it is impossible to disable them (e.g., database encryption) and these are therefore not listed here.

Database Encryption

Macula server uses several databases for storing the server configuration, audit logs and other software data, and all of them are encrypted by default. Once you install the software version that supports database encryption, all the databases are automatically converted to the encrypted format. There is no need to adjust any settings to enable this feature.

Database encryption was introduced starting from the Macula version 1.8.0 and is supported in all succeeding versions.

Connection Encryption

Traffic encryption is not enabled by default, it can be turned ON in the server settings, in the Connections tab. There are separate settings for TCP connection encryption and HTTPS.

Client-Server Connections

This setting affects all TCP traffic between servers and clients, including server-to-server communications in Macula Global.

The currently available encryption options:

  • None: no encryption

  • AES-128 or AES-256: choose the one you need

HTTPS

Connections from remote Web browser clients and mobile applications, as well as API connections, can also use a secure channel instead of plain HTTP.

To enable secure communications, enable HTTPS in the server settings, then specify desired HTTPS ports (different from HTTP ports) for local and internet connections, and then add the digital certificate you wish to use; you can either use your own certificate or generate a self-signed one right on this step.

It is recommended that you use a valid digital certificate signed by a trusted authority instead of self-signed ones. If you use a certificate generated by Macula, your browser will show you a warning.

Archive Encryption

Each archive storage (local or network), as well as archive backups made through the Archive Backup Wizard, can be encrypted. You can provide a different password for every storage unit, and there is also an option to change the password at any time.

Regular Server Archive

To access the archive encryption settings in Macula Console, open the Configuration section, choose Servers on the left, then double-click the desired server to edit its settings. In the Storage tab, click the Open storage properties button.

Click the target storage in the list on the right or add a new local or network storage unit by using the +New button above the storage list: its properties will appear on the left. Mark the Enable encryption option and specify the password you want.

The currently available encryption options:

  • None: no encryption

  • AES-128 or AES-256: choose the one you need

To save the changes, hit the Apply button beneath the storage settings, then hit OK to close the storage configuration dialog box, and then click OK to finally save the storage settings together with the server configuration. Pressing Cancel on the last step will revoke the changes in the storage configuration.

When assigning a new password for the storage, make sure to remember it or store in a secure place: you will require it, should you need to access the storage contents in the following scenarios:

  • when accessing the archive with the Portable Player tool

  • when adding the same disk as a storage unit for another server

  • when adding a disk with archive backup as a storage unit

  • if you delete the encrypted disk from the storage configuration and then add it anew

There is a field that allows you to enter a password hint, which will be displayed in these situations.

You will not be prompted for the password when accessing the archive from the Macula Monitor application connected to a server with encrypted archive: Macula server will decrypt it automatically.

Starting from the moment you set the password, all footage recorded to the target storage becomes encrypted; retroactive encryption for the previously recorded archive is not supported. If you wish to have the already recorded data to be encrypted, you can use the replication feature in Macula Global, targeting the replicas to an encrypted storage.

When the storage password is changed, the new password is used for encryption from then on. If storage encryption is disabled for some time and then enabled back, that part of the archive will remain unencrypted.

Adding an Encrypted Disk

If you wish to use a storage, which contains encrypted archive, as a new storage unit and add it to the server configuration, you will be prompted for the password. You need to provide the password that was used to encrypt that disk. If you have provided a password hint earlier, it will appear as a tooltip when hovering your mouse over the password field.

Archive Backups

The archive backup tool also provides an option to specify a password to encrypt the backup.

There is no difference if the backup is made from an encrypted or an unencrypted storage; the password provided at this step will be used in future for archive access, whether you read the disk contents using the Portable Player tool or add the disk as a new storage to some Macula server.

Encrypted Archive Access

When accessing an encrypted storage via Macula Monitor and Macula Mobile, the archive is decrypted automatically and provided for browsing according to the user permissions.

Should you want to access a directory that contains proprietary Macula archive or its part (backup) using Macula Portable Player tool, you will be prompted for the password.

If you have specified a hint at the point of setting the password, it will be displayed as text or as a hint when hovering your mouse over the password field.

Last updated