Security & Risks
6.1 Cybersecurity Threats in Underground Surveillance Systems
Underground security surveillance systems are increasingly networked and IP-based, which exposes them to the same cybersecurity threats as enterprise IT systems — but with significantly higher physical consequences. A compromised camera feed can be used to plan unauthorized access; a disabled access control system can allow tailgating through secure doors; a ransomware attack on the VMS server can blind the entire monitoring operation. The threat landscape for these systems includes network intrusion, device firmware exploitation, credential theft, and supply chain attacks on embedded firmware.
The following risk matrix identifies the primary cybersecurity threats, their likelihood and impact ratings, and the recommended mitigations. All mitigations marked as mandatory must be implemented before system commissioning; recommended mitigations should be implemented within 90 days of commissioning.
Default Credential Exploitation
Cameras and switches shipped with factory-default passwords. Attackers scan networks for known default credentials. Impact: full device takeover, feed manipulation, pivot to internal network.
Unencrypted Video Streams
RTSP streams transmitted without TLS encryption can be intercepted on the local network. Impact: surveillance footage exposed to unauthorized parties, privacy violations, intelligence gathering by adversaries.
Firmware Vulnerabilities
Outdated camera and switch firmware with known CVEs. Impact: remote code execution, denial of service, persistent backdoors. Mitigated by regular firmware update policy.
Physical Tamper & Bypass
Physical access to field cabinets allows console port access, SD card extraction, or device replacement. Impact: data exfiltration, system reconfiguration, surveillance blind spots.
| Threat | Likelihood | Impact | Risk Level | Mandatory Mitigation |
|---|---|---|---|---|
| Default credential exploitation | High | Critical | Critical | Change all default passwords before commissioning; enforce password policy (min 12 chars, complexity) |
| Unencrypted RTSP streams | Medium | High | High | Enable RTSP over TLS (RTSPS) or use SRTP for all streams; disable plain RTSP on production network |
| Outdated firmware with known CVEs | High | High | High | Establish quarterly firmware update schedule; subscribe to vendor security advisories |
| Physical tamper of field cabinet | Medium | High | High | Cabinet tamper alarm wired to ACS; cabinet lock with key management; console port disabled or password-protected |
| VLAN hopping / lateral movement | Low | High | Medium | Strict VLAN segmentation; disable trunk negotiation (DTP off); 802.1X port authentication on all switch ports |
| Rogue device insertion | Low | Medium | Medium | 802.1X NAC; MAC address binding on critical ports; DHCP snooping enabled |
| VMS server ransomware | Low | Critical | Medium | VMS server on isolated VLAN; no internet access; daily backup to air-gapped storage; EDR software installed |
| Weak SNMP community strings | Medium | Medium | Medium | Disable SNMPv1/v2c; use SNMPv3 with auth+priv; restrict SNMP access to NMS IP only |
| Supply chain firmware backdoor | Low | Critical | Low | Verify firmware hash against vendor-signed manifest; use vendors with published SBOM |
6.2 Physical Security Risks
Beyond cybersecurity, underground surveillance systems face unique physical security risks arising from the harsh operating environment. These include water ingress, condensation damage, vibration fatigue, corrosion, and unauthorized physical access to field equipment. Physical security risks are often underestimated during design but account for the majority of field failures in underground installations. The table below summarizes the primary physical risks and their mitigations.
| Physical Risk | Root Cause | Affected Components | Risk Level | Mitigation |
|---|---|---|---|---|
| Water ingress / flooding | Heavy rain, pipe burst, condensation | Cameras, field cabinets, cabling | High | IP67 minimum for cameras; IP65 cabinets with sealed cable entries; flood sensor with alarm; cable routing above flood level |
| Condensation damage | Temperature cycling, high humidity | Cameras, switches, power supplies | High | Cabinet dehumidifier + heater; conformal coating on PCBs; breathable IP66 membrane on cameras |
| Vibration fatigue | Trains, machinery, traffic | Camera mounts, connectors, PCBs | Medium | Anti-vibration mounts; strain relief on all cables; vibration-rated connectors; IEC 60068-2-6 tested equipment |
| Corrosion | Salt, chemicals, humidity | Enclosures, screws, connectors | Medium | 316L stainless hardware; powder-coated or hot-dip galvanized enclosures; annual anti-corrosion inspection |
| Vandalism / physical attack | Unauthorized access, deliberate damage | Cameras, intercoms, readers | Medium | IK10 rated equipment; recessed mounting; tamper alarm on all field devices; CCTV coverage of CCTV equipment |
| Cable theft / damage | Theft of copper, accidental damage | Cabling infrastructure | Low | Armored cable in accessible areas; steel conduit; fiber preferred over copper for long runs (no scrap value) |
Critical Safety Note: In underground environments with explosive atmospheres (e.g., fuel storage, certain utility tunnels), all electrical equipment including cameras and switches must be ATEX/IECEx certified for the applicable zone classification. Standard IP-rated equipment is NOT sufficient for explosive atmosphere applications. Verify zone classification with the facility safety officer before specifying any equipment.
6.3 Compliance & Standards
Underground security surveillance systems must comply with a range of national and international standards covering cybersecurity, data protection, electrical safety, and physical security. The applicable standards vary by country and facility type. The following table lists the most commonly applicable standards for underground security systems in commercial and infrastructure applications.
| Standard / Regulation | Scope | Key Requirements for Underground Systems |
|---|---|---|
| IEC 62443 | Industrial cybersecurity | Security levels SL1–SL4 for OT/ICS systems; zone and conduit model; security lifecycle management |
| GDPR / PDPA | Data protection (video) | Lawful basis for recording; retention period limits; access control to footage; data subject rights |
| IEC 60529 | IP ingress protection ratings | Minimum IP65 for outdoor/underground cameras; IP67 for submersion risk areas |
| IEC 62262 | IK impact protection ratings | Minimum IK08 for accessible areas; IK10 for high-vandalism risk areas |
| EN 50132 / IEC 62676 | CCTV system design | Camera placement, image quality, recording retention, system performance requirements |
| ISO/IEC 27001 | Information security management | ISMS for VMS and ACS systems; risk assessment; incident response; access control policy |
| ATEX / IECEx | Explosive atmospheres | Zone classification; equipment certification; installation requirements for hazardous areas |
| Local Building Code | Electrical installation | Cable routing, conduit requirements, earthing, fire-rated cable in escape routes |