Bridging the Gap Between Locks and Firewalls in Cannabis Facilities

Your IP cameras are on the same network as your POS system. Your access control badges are managed by cloud software. Your alarm system calls out over the internet. Physical security IS cybersecurity—and most cannabis operators don’t realize it until after the breach.


WHY THIS GUIDE MATTERS

The cannabis industry has some of the strictest physical security requirements of any sector. States mandate cameras, access controls, alarm systems, vault storage, and security guards.

But here’s what regulators didn’t anticipate: every physical security device you install is now a computer on your network.

Your “physical” security is actually:

  • IP cameras running Linux firmware with known vulnerabilities
  • Access control systems connected to cloud management platforms
  • Alarm panels communicating over cellular or internet connections
  • DVR/NVR systems storing terabytes of footage on networked drives
  • Environmental sensors reporting to cloud dashboards
  • Smart safes with wireless connectivity

When attackers compromise these systems, they can:

  • Disable cameras before a break-in
  • Unlock doors remotely
  • Suppress alarm notifications
  • Watch your facility in real-time to plan robberies
  • Use cameras as entry points to your entire network
  • Harvest footage of employees entering safe combinations
  • Access your POS, Metrc, and business systems through lateral movement

Real-World Incidents:

  • 2023: Cannabis cultivation facility in California had IP cameras compromised through default credentials. Attackers watched operations for weeks before a coordinated theft.
  • 2024: Colorado dispensary’s NVR was infected with ransomware that spread to their POS system through an unsegmented network—both physical security footage AND sales data were encrypted.
  • 2024: Oregon grow operation discovered their “secure” access control system had been backdoored, with badge access logs being exfiltrated to track employee schedules.
  • 2025: Multi-state operator found that a vulnerability in their cloud-connected safe management system exposed safe combinations across 12 locations.

This guide shows you how to:

  • Understand where physical and cyber security intersect
  • Secure your cameras, access control, and alarm systems
  • Properly segment your network to isolate security devices
  • Implement monitoring that catches both physical AND cyber threats
  • Meet compliance requirements while building real security
  • Create integrated incident response procedures

SECTION 1: THE CONVERGENCE PROBLEM

1.1 Why Physical Security is Now Cybersecurity

The Old Model (Pre-2010):

┌─────────────────────────────────────────────────────────────┐
│                    PHYSICAL SECURITY                        │
│  • Analog cameras with coax cables                         │
│  • Mechanical locks with physical keys                     │
│  • Landline alarm systems                                  │
│  • Separate from IT infrastructure                         │
│  • Security guards and police response                     │
└─────────────────────────────────────────────────────────────┘
                        COMPLETELY SEPARATE
┌─────────────────────────────────────────────────────────────┐
│                       CYBERSECURITY                         │
│  • Computers and servers                                   │
│  • Network firewalls                                       │
│  • Antivirus software                                      │
│  • IT department responsibility                            │
└─────────────────────────────────────────────────────────────┘

The New Reality (2025):

┌─────────────────────────────────────────────────────────────┐
│             CONVERGED PHYSICAL-CYBER SECURITY               │
├─────────────────────────────────────────────────────────────┤
│  IP Cameras ←──── Network ────→ POS System                 │
│  Access Control ←── Network ──→ Metrc Integration          │
│  Alarm Panel ←──── Network ────→ Cloud Services            │
│  NVR/DVR ←──────── Network ────→ Remote Monitoring         │
│  Smart Safe ←───── Network ────→ Cash Management           │
│  Environmental ←── Network ────→ Grow Controls             │
│                                                             │
│  ALL ON THE SAME NETWORK = ALL AT RISK TOGETHER            │
└─────────────────────────────────────────────────────────────┘

The gap in most organizations:

  • Physical security team installs cameras, access control, alarms
  • IT team manages computers, POS, network
  • Neither team owns the security of IoT devices
  • Result: Vulnerable devices sitting on production networks with no monitoring

1.2 The Cannabis-Specific Risk Factors

Why Cannabis Facilities Are High-Value Targets:

Factor Impact

Cash-heavy operations Average dispensary holds $20K-$50K daily

High-value inventory Cannabis worth $1,500-$3,000/lb in legal markets

Resale market Stolen product easily sold in illegal states

Regulatory pressure Compliance failures = license suspension

Limited banking Cash storage increases robbery appeal

Extended hours Early/late operations with minimal staff

Remote grow locations Cultivation facilities often isolated

Attack Statistics:

Hardly a day goes by that a dispensary hasn’t been broken into or robbed. The vast majority of break-ins are classified as smash and grabs or crash and grabs.

Data shows there was a 19% decline in burglary, robbery and vandalism incidents reported by cannabis businesses throughout Fiscal Year 2024. About 90% of the businesses that were impacted by crimes were retail businesses. 72% of cannabis businesses have faced at least one of these offenses before.

Most offenses occur between the hours of 1 a.m. and 4 a.m.

The convergence threat: Criminals are getting smarter. Rather than smash-and-grab, sophisticated actors now:

  • Compromise cameras to conduct reconnaissance
  • Study employee patterns and safe access procedures
  • Disable security systems before physical attack
  • Time attacks to maximum cash on hand

1.3 The Compliance Gap

What Regulations Require:

Most state cannabis regulations mandate:

  • 24/7 video surveillance of all cannabis handling areas
  • Access control for limited access areas
  • Alarm systems monitored by licensed companies
  • Video retention (30-90 days typically, California requires 1 year)
  • Ability to provide footage to regulators on demand

What Regulations DON’T Address:

Most state regulations say nothing about:

  • Network security for surveillance systems
  • Firmware updates for cameras
  • Password requirements for NVR systems
  • Network segmentation for security devices
  • Encryption of video streams
  • Cloud security for remote access

The Result:

You can be 100% compliant with physical security regulations and still be completely vulnerable to cyber attacks on those same systems.

Compliance ≠ Security

This guide helps you achieve both.


SECTION 2: IP CAMERA SECURITY

2.1 Understanding IP Camera Vulnerabilities

IP cameras are computers. They run operating systems (usually Linux), have processors, memory, network connections, and often run web servers for configuration.

Common Vulnerabilities:

Vulnerability Description Risk Level

Default credentials Factory username/password unchanged CRITICAL

Outdated firmware Unpatched security flaws CRITICAL

Unencrypted streams Video viewable by anyone on network HIGH

P2P vulnerabilities Remote access bypasses firewall CRITICAL

UPnP enabled Automatic port forwarding exposes devices HIGH

Telnet/FTP enabled Legacy protocols with no encryption HIGH

Web interface flaws XSS, CSRF, command injection HIGH

Hardcoded backdoors Some manufacturers include hidden access CRITICAL

Real-World Camera Vulnerabilities:

In January 2023, Hangzhou Xiongmai Technology recalled 4.3 million internet-connected camera products linked to Distributed Denial of Service (DDoS) attacks. In April 2023, video surveillance giant Hikvision patched a critical vulnerability affecting its Hybrid SAN and cluster storage products. In January 2024, Security Service of Ukraine identified a security camera monitoring a residential complex’s parking facility as being used to conduct reconnaissance prior to missile attacks.

In March 2025, CVE-2025-1316 emerged—a command injection flaw in Edimax IC-7100 IP cameras. Exploited in the wild, this zero-day was actively used by Mirai-based malware to infect thousands of devices that were already end-of-life and unpatched.

Affected devices use “peer-to-peer” features that allow users to connect to their devices the moment they come online. Hackers are able to exploit flaws in these features to rapidly find vulnerable cameras, then launch attacks to access them. As of October 2022, over 8.7 million vulnerable devices have been found on the Internet.


2.2 Camera Security Hardening Checklist

Immediate Actions (Do Today)

☐ Change all default passwords

Camera/NVR Default Changed? Strong Password? Documented Securely?

☐ Yes ☐ Yes ☐ Yes

☐ Yes ☐ Yes ☐ Yes

☐ Yes ☐ Yes ☐ Yes

NVR Admin ☐ Yes ☐ Yes ☐ Yes

Password Requirements:

  • 16+ characters minimum
  • Unique per device (not same password for all cameras)
  • Stored in enterprise password manager only
  • Never written on devices or near equipment

☐ Update all firmware

Device Current Version Latest Version Updated?

NVR

Where to find updates:

  • Manufacturer website (download section)
  • NVR management interface
  • Camera web interface

⚠️ Schedule firmware updates quarterly minimum

☐ Disable unnecessary services

Service Why Disable Disabled?

Telnet Sends credentials in cleartext ☐

FTP Sends data in cleartext ☐

UPnP Auto-opens firewall ports ☐

P2P/Cloud Bypasses firewall, often vulnerable ☐

SNMP v1/v2 Cleartext community strings ☐

SSH (if unused) Reduces attack surface ☐

☐ Enable encryption

Encryption Type Where Enabled?

HTTPS for web interface All cameras, NVR ☐

RTSP over TLS Video streams ☐

SRTP Audio streams ☐

HTTPS for cloud access Remote viewing apps ☐


Network Security (Do This Week)

☐ Place cameras on separate VLAN

INCORRECT (Flat Network):
┌──────────────────────────────────────────────────────────┐
│                    SINGLE NETWORK                        │
│  Cameras + NVR + POS + Computers + WiFi + Everything     │
│  [All devices can talk to all other devices]             │
└──────────────────────────────────────────────────────────┘

CORRECT (Segmented Network):
┌─────────────────┐   ┌─────────────────┐   ┌─────────────────┐
│ CAMERA VLAN     │   │ POS VLAN        │   │ CORPORATE VLAN  │
│ (VLAN 10)       │   │ (VLAN 20)       │   │ (VLAN 30)       │
│                 │   │                 │   │                 │
│ • IP Cameras    │   │ • POS Terminals │   │ • Workstations  │
│ • NVR           │   │ • Card Readers  │   │ • Printers      │
│                 │   │ • Metrc Devices │   │ • WiFi          │
└────────┬────────┘   └────────┬────────┘   └────────┬────────┘
         │                     │                     │
         └─────────────────────┼─────────────────────┘

                    ┌──────────┴──────────┐
                    │      FIREWALL       │
                    │  (Controls traffic  │
                    │   between VLANs)    │
                    └─────────────────────┘

VLAN Configuration Checklist:

☐ Create dedicated VLAN for cameras/NVR (e.g., VLAN 10) ☐ Configure switch ports for camera VLAN ☐ Configure firewall rules:

  • DENY camera VLAN → Internet (cameras don’t need internet)
  • DENY camera VLAN → POS VLAN
  • DENY camera VLAN → Corporate VLAN
  • ALLOW NVR → specific management IPs only
  • ALLOW authorized users → NVR for viewing

☐ Disable remote access (or secure it properly)

Best: No remote access at all (view only on-site)

If remote access required:

  • Use VPN, not port forwarding
  • Require multi-factor authentication
  • Limit to specific IP addresses
  • Use manufacturer’s secure cloud (if reputable)
  • Never expose NVR directly to internet

☐ Disable UPnP on router/firewall

UPnP allows devices to automatically open firewall ports—exactly what attackers want.


Ongoing Maintenance (Monthly)

☐ Monthly camera security review

Check Jan Feb Mar Apr May Jun

All cameras online ☐ ☐ ☐ ☐ ☐ ☐

Firmware current ☐ ☐ ☐ ☐ ☐ ☐

Login attempts reviewed ☐ ☐ ☐ ☐ ☐ ☐

No unauthorized users ☐ ☐ ☐ ☐ ☐ ☐

Passwords rotated (quarterly) ☐

☐ Quarterly firmware updates

Device Q1 Update Q2 Update Q3 Update Q4 Update

☐ ☐ ☐ ☐

☐ ☐ ☐ ☐

NVR ☐ ☐ ☐ ☐


2.3 NVR/DVR Security

Your NVR is the crown jewel for attackers. It contains:

  • All your video footage
  • Camera credentials
  • Access to all cameras
  • Often runs 24/7 unmonitored

NVR Security Checklist:

☐ Physical security

  • Located in locked room or cabinet
  • Not visible to customers
  • Backup power (UPS) connected
  • Temperature controlled

☐ Account security

  • Admin password: 16+ characters, unique
  • Viewer accounts: Limited permissions
  • No shared accounts—individual credentials
  • Review accounts quarterly, remove terminated employees

☐ Network security

  • Dedicated VLAN with cameras
  • No direct internet access
  • Remote access via VPN only
  • Firewall logs monitored

☐ Storage security

  • RAID configured for redundancy
  • Automatic overwrite of old footage (per retention requirements)
  • Encrypted storage if available
  • Offsite backup for critical footage

☐ Logging enabled

  • User login/logout events
  • Configuration changes
  • Export/download activities
  • Failed login attempts

2.4 Camera Vendor Selection

Avoid These Red Flags:

❌ Unknown/no-name brands (often rebranded Chinese ODM with backdoors) ❌ No firmware update history ❌ No security vulnerability disclosure process ❌ P2P-only remote access (cloud dependency) ❌ No HTTPS option ❌ Banned by US government (Hikvision, Dahua for federal use)

Look For:

✅ NDAA-compliant manufacturers (required for federal contracts) ✅ Regular firmware updates with security patches ✅ ONVIF compliance for interoperability ✅ Local storage options (not cloud-dependent) ✅ Encryption support (HTTPS, SRTP) ✅ Enterprise-grade access controls ✅ SOC 2 certification (for cloud features)

Reputable Cannabis-Friendly Vendors:

Vendor Notes

Hanwha Vision NDAA-compliant, cannabis experience

Axis Communications Premium, strong security focus

Verkada Cloud-native, enterprise security

Rhombus Cloud-based, AI analytics

Avigilon (Motorola) Enterprise-grade

All new Hanwha Vision cameras and devices are fully NDAA-compliant and meet the highest cybersecurity standards.


SECTION 3: ACCESS CONTROL SECURITY

3.1 Access Control Attack Vectors

Modern access control systems are networked computers. They include:

  • Door controllers (computers that unlock doors)
  • Credential readers (badge/fob/biometric scanners)
  • Management software (often cloud-based)
  • Integration APIs (connecting to HR systems, visitor management)

Common Attack Vectors:

Attack Method Impact

Credential cloning Copy RFID badge data Unauthorized entry

Controller exploitation Attack door controller over network Mass unlock all doors

Cloud compromise Attack vendor’s cloud platform Access all managed locations

Relay attack Extend badge signal range Entry without physical badge

Default credentials Unchanged admin passwords Full system control

Insider threat Former employee badges not revoked Unauthorized access

The Cloud Risk:

Many modern access control systems are cloud-managed. This means:

  • Vendor has access to your door schedules
  • Vendor can unlock your doors remotely
  • Vendor breach = your doors compromised
  • Internet outage = potential lockout

3.2 Access Control Hardening Checklist

Credential Security

☐ Use modern credential technology

Technology Security Level Notes

Magnetic stripe ❌ POOR Easily cloned, avoid

125kHz proximity (HID ProxCard) ❌ POOR Easily cloned, legacy

13.56MHz MIFARE Classic ⚠️ MEDIUM Encryption broken, avoid

13.56MHz MIFARE DESFire EV2/EV3 ✅ GOOD Strong encryption

Mobile credentials (BLE) ✅ GOOD Phone-based, harder to clone

Biometrics + badge ✅ BEST Multi-factor

☐ Enable multi-factor for sensitive areas

Area Badge Only? Badge + PIN? Badge + Biometric?

Lobby entrance ✅

Retail floor ✅

Limited access areas

Vault/safe room

Server room

Grow rooms

☐ Badge management procedures

Procedure Implemented?

Unique badge per employee ☐

Badge photo matches employee ☐

Badge deactivated same day as termination ☐

Lost badges reported and deactivated immediately ☐

Contractor badges expire automatically ☐

Visitor badges returned and logged ☐

Badge audit conducted quarterly ☐


Controller & System Security

☐ Change all default credentials

Component Default Changed? Strong Password?

Controller admin ☐ Yes ☐ Yes

Management software ☐ Yes ☐ Yes

Cloud portal ☐ Yes ☐ Yes

Database ☐ Yes ☐ Yes

☐ Network security for controllers

Requirement Implemented?

Controllers on dedicated VLAN ☐

Controllers isolated from internet ☐

Management traffic encrypted ☐

Firmware updates current ☐

Unused ports disabled ☐

☐ Enable and review audit logs

Log Type Enabled? Retained? Reviewed?

Door open/close events ☐ ☐ 90+ days ☐ Weekly

Access granted/denied ☐ ☐ 90+ days ☐ Weekly

Admin configuration changes ☐ ☐ 1+ year ☐ Weekly

User creation/modification ☐ ☐ 1+ year ☐ Weekly

Failed access attempts ☐ ☐ 90+ days ☐ Daily


Termination Procedures

⚠️ CRITICAL: Access must be revoked IMMEDIATELY upon termination

Approximately 90% of the financial and product losses in the cannabis industry can be attributed to internal threats.

Same-Day Termination Checklist:

Action Responsible Completed

Badge physically collected Manager ☐

Badge deactivated in system Security/HR ☐

PIN codes changed (if shared) Security ☐

Biometric data removed Security ☐

Remote access revoked IT ☐

Keys returned (if any) Manager ☐

Alarm codes changed (if known) Security ☐

Quarterly Access Review:

Employee Still Active? Access Level Appropriate? Action

☐ Yes ☐ No ☐ Yes ☐ No

☐ Yes ☐ No ☐ Yes ☐ No

☐ Yes ☐ No ☐ Yes ☐ No


3.3 Cloud vs. On-Premise Access Control

Cloud-Based Systems:

Pros Cons

Easy remote management Vendor has access to your doors

Automatic updates Internet dependency

Lower upfront cost Ongoing subscription cost

Mobile app convenience Vendor breach = your breach

Easy multi-location Data stored off-site

On-Premise Systems:

Pros Cons

Full control of system Higher upfront cost

No internet dependency Manual updates required

No vendor access to doors Remote access more complex

Data stays local IT expertise required

Recommendation for Cannabis:

For high-security facilities, consider hybrid approach:

  • On-premise controllers that function without internet
  • Cloud management as optional overlay
  • Local backup of all configurations
  • Failsafe that locks (or unlocks per fire code) if cloud unavailable

SECTION 4: ALARM SYSTEM SECURITY

4.1 Alarm System Vulnerabilities

Modern alarm systems communicate over:

  • Cellular networks (LTE/5G)
  • IP networks (Ethernet/WiFi)
  • Radio (backup)
  • Traditional phone lines (increasingly rare)

Attack Vectors:

Attack Method Impact

Jamming Block cellular/radio signals Alarm can’t call out

Network attack Compromise IP-connected panel Disable alarm

Default codes Unchanged installer codes Full system control

Social engineering Impersonate monitoring company False alarm disregard

Panel exploitation Attack panel firmware Persistent access


4.2 Alarm System Hardening

☐ Change all default codes

Code Type Changed? Who Knows It?

Master code ☐ Yes Owner/Manager only

Installer code ☐ Yes Security company only

Duress code ☐ Yes Documented with employees

User codes ☐ Yes Individual employees

☐ Require dual communication paths

Primary Path Backup Path Configured?

Cellular IP ☐ Yes

IP Cellular ☐ Yes

IP Radio ☐ Yes

If one path is blocked, the other should trigger alert.

☐ Enable panel tamper protection

Protection Enabled?

Panel tamper switch ☐ Yes

Siren tamper detection ☐ Yes

Cellular jam detection ☐ Yes

Line cut detection (if wired) ☐ Yes

Power failure notification ☐ Yes

☐ Review alarm response procedures

Item Documented? Updated?

Primary contact list ☐ Yes ☐ Within 90 days

Backup contacts ☐ Yes ☐ Within 90 days

Password/passphrase for verification ☐ Yes ☐

Duress code procedure ☐ Yes ☐

Police dispatch requirements ☐ Yes ☐

☐ Network security for IP-connected panels

Requirement Implemented?

Panel on dedicated VLAN ☐

Encrypted communication to monitoring ☐

Firmware updated ☐

No remote access except monitoring ☐


4.3 Panic Buttons & Duress Codes

State regulations often require panic buttons. Ensure they’re properly configured:

☐ Panic button placement

Location Installed? Tested? Hidden from View?

Front counter/POS ☐ ☐ ☐

Back office ☐ ☐ ☐

Vault/safe room ☐ ☐ ☐

Manager office ☐ ☐ ☐

Receiving area ☐ ☐ ☐

☐ Duress code training

All employees should know:

  • What the duress code is
  • When to use it (being forced to disarm)
  • That it silently alerts monitoring
  • That they should comply with robbers to stay safe

Test Schedule:

Test Type Frequency Last Test Next Test

Panic button functionality Monthly

Duress code verification Quarterly

Full alarm test with monitoring Annually


SECTION 5: NETWORK SEGMENTATION

5.1 Why Segmentation is Critical

The Flat Network Problem:

In a typical small business network, all devices are on the same network segment. This means:

  • Your cameras can communicate with your POS
  • Your POS can reach your environmental controls
  • A compromised camera can attack everything else
  • Ransomware can spread from any device to all devices

Network segmentation is a network security practice and defense-in-depth strategy of dividing the main network into multiple, smaller subnetworks to better protect sensitive data and limit lateral movement to the rest of the network.

The Segmented Network Solution:

Create separate network zones with firewalls controlling traffic between them:

┌───────────────────────────────────────────────────────────────┐
│                    FIREWALL/ROUTER                            │
│         (Controls ALL traffic between zones)                  │
└───────────────────────────────────────────────────────────────┘
          │              │              │              │
          ▼              ▼              ▼              ▼
┌─────────────┐  ┌─────────────┐  ┌─────────────┐  ┌─────────────┐
│  SECURITY   │  │    POS      │  │  CORPORATE  │  │    GUEST    │
│   VLAN 10   │  │   VLAN 20   │  │   VLAN 30   │  │   VLAN 40   │
├─────────────┤  ├─────────────┤  ├─────────────┤  ├─────────────┤
│ • Cameras   │  │ • POS terms │  │ • Computers │  │ • Customer  │
│ • NVR       │  │ • Card read │  │ • Printers  │  │   WiFi      │
│ • Access    │  │ • Metrc     │  │ • Phones    │  │ • No access │
│   control   │  │   device    │  │ • Employee  │  │   to any    │
│ • Alarms    │  │ • Receipt   │  │   WiFi      │  │   internal  │
│             │  │   printer   │  │             │  │   systems   │
└─────────────┘  └─────────────┘  └─────────────┘  └─────────────┘

Firewall Rules Between Zones:

From To Allow/Deny Why

Security → POS DENY Cameras shouldn’t access POS

Security → Corporate DENY Cameras shouldn’t access computers

Security → Internet DENY Cameras don’t need internet

POS → Security DENY POS doesn’t need camera access

POS → Corporate LIMITED Only specific management traffic

POS → Internet LIMITED Only to payment processor, Metrc

Corporate → Security LIMITED Only NVR viewing from authorized IPs

Corporate → POS LIMITED Only management systems

Guest → Everything DENY Guests access internet only


5.2 VLAN Implementation Guide

Equipment Needed:

Equipment Purpose Examples

Managed switch Creates VLANs Ubiquiti, Cisco, Netgear

Router/Firewall Routes between VLANs pfSense, Fortinet, Ubiquiti

VLAN-capable WiFi Separate wireless networks Ubiquiti, Aruba, Meraki

Step-by-Step Implementation:

Step 1: Plan Your VLANs

VLAN ID Name Purpose Subnet

10 Security Cameras, NVR, access control 192.168.10.0/24

20 POS Point of sale systems 192.168.20.0/24

30 Corporate Computers, printers 192.168.30.0/24

40 Guest Customer WiFi 192.168.40.0/24

50 IoT Environmental sensors, etc. 192.168.50.0/24

Step 2: Configure Switch

# Example: Ubiquiti switch configuration
# Create VLANs
VLAN 10 - Name: Security
VLAN 20 - Name: POS
VLAN 30 - Name: Corporate
VLAN 40 - Name: Guest
VLAN 50 - Name: IoT

# Assign ports
Ports 1-8: VLAN 10 (Security devices)
Ports 9-12: VLAN 20 (POS devices)
Ports 13-20: VLAN 30 (Corporate devices)
Port 24: Trunk (uplink to router, all VLANs)

Step 3: Configure Router/Firewall

Create interfaces for each VLAN and apply firewall rules.

Step 4: Configure WiFi

Create separate SSIDs mapped to appropriate VLANs:

  • “DispensaryStaff” → VLAN 30 (Corporate)
  • “DispensaryGuest” → VLAN 40 (Guest, captive portal)

Step 5: Test

Test Expected Result Passed?

Camera can reach NVR ✅ Yes ☐

Camera cannot reach POS ❌ No ☐

Camera cannot reach internet ❌ No ☐

POS can reach payment processor ✅ Yes ☐

POS can reach Metrc ✅ Yes ☐

Guest WiFi can reach internet ✅ Yes ☐

Guest WiFi cannot reach internal ❌ No ☐


5.3 Quick Wins for Smaller Operations

If full VLAN segmentation isn’t feasible immediately, implement these:

☐ Separate WiFi networks

Most consumer routers support guest networks. At minimum:

  • Primary network: Business devices only
  • Guest network: Customer WiFi, isolated

☐ Physical separation where possible

  • Cameras on one switch
  • POS on another switch
  • Don’t connect unless necessary

☐ Firewall on NVR

Most NVRs have built-in firewall. Enable it:

  • Allow only specific IPs to access NVR
  • Block all other traffic

☐ Host-based firewalls

Enable Windows Firewall on all computers:

  • Block incoming connections from unknown sources
  • Allow only necessary applications

SECTION 6: INTEGRATED MONITORING

6.1 Unified Security Monitoring

The goal: See physical AND cyber security events in one place.

What to Monitor:

System Physical Events Cyber Events

Cameras Motion detection, camera offline Failed logins, firmware changes, unusual traffic

Access Control Door open/close, access denied Failed logins, config changes, new users

Alarms Zone triggered, tamper Communication failure, code changes

POS Void transactions, discounts Failed logins, after-hours access

Network N/A Unusual traffic, new devices, attacks

Metrc N/A Failed logins, sync failures, changes


6.2 Correlation Examples

Spotting coordinated attacks requires correlating physical and cyber events:

Example 1: Reconnaissance Before Robbery

Time Event System Significance

Day 1, 2:00 AM Camera login from unknown IP NVR 🚨 Potential recon

Day 3, 3:00 AM Multiple cameras viewed NVR 🚨 Studying layout

Day 5, 1:00 AM Motion detected, alarm triggered Alarm Physical attempt

Without correlation: Alarm company responds to one break-in attempt. With correlation: You realize you’ve been under surveillance for days and can notify police, review all footage, and increase security.


Example 2: Insider Threat

Time Event System Significance

6:00 PM Employee badge out (left for day) Access Normal

10:00 PM Same badge access to vault Access 🚨 Should be gone

10:02 PM Vault camera offline NVR 🚨 Camera disabled

10:30 PM Badge out Access Left with… what?

Without correlation: Looks like a late night. With correlation: Clear insider theft pattern.


Example 3: Cyber Attack Preceding Physical

Time Event System Significance

2:00 AM Alarm communication failure Alarm 🚨 Jammed? Network attack?

2:01 AM Camera VLAN traffic spike Network 🚨 Attack in progress

2:05 AM All cameras offline NVR 🚨 Disabled for break-in

2:10 AM No motion detection Cameras Break-in in progress

Without correlation: Alarm company might dismiss as system glitch. With correlation: Coordinated attack detected, police dispatched immediately.


6.3 Building a Monitoring Dashboard

Option 1: SIEM (Security Information and Event Management)

For larger operations, a SIEM collects logs from all systems:

  • Splunk
  • Microsoft Sentinel
  • Elastic SIEM
  • Graylog

Option 2: Unified Security Platform

Some vendors offer converged physical/cyber platforms:

  • Genetec (video + access + cyber)
  • Verkada (cloud-based unified)
  • Solink (video + POS + analytics)

Option 3: Manual Correlation (Smaller Operations)

Create a daily security review checklist:

System Check Anomaly?

NVR Review failed logins ☐ Yes ☐ No

Access Control Review after-hours access ☐ Yes ☐ No

Access Control Review denied attempts ☐ Yes ☐ No

Alarm Review all events ☐ Yes ☐ No

POS Review void/refunds ☐ Yes ☐ No

Network Check for new devices ☐ Yes ☐ No

Metrc Review login activity ☐ Yes ☐ No


SECTION 7: FACILITY-SPECIFIC GUIDANCE

7.1 Dispensary Physical-Cyber Integration

High-Traffic Retail Environment

Priority Threats:

  • Armed robbery
  • Smash-and-grab burglary
  • Internal theft
  • Customer data breach

Key Integration Points:

Physical System Cyber Integration Purpose

Front door camera License plate recognition Track suspicious vehicles

POS camera Transaction overlay Match video to sales

Vault camera Access control log Verify authorized entry

ID scanner POS system Customer verification

Panic button Notification system Alert management, police

Network Segmentation for Dispensary:

┌─────────────┐  ┌─────────────┐  ┌─────────────┐  ┌─────────────┐
│  CAMERAS    │  │    POS      │  │   OFFICE    │  │   GUEST     │
│  NVR        │  │  PAYMENT    │  │  COMPUTERS  │  │   WIFI      │
│  ACCESS     │  │   METRC     │  │  EMPLOYEE   │  │             │
│   ALARM     │  │             │  │   WIFI      │  │             │
└─────────────┘  └─────────────┘  └─────────────┘  └─────────────┘
   VLAN 10         VLAN 20          VLAN 30          VLAN 40
   
   No internet     Limited          Full access      Internet
   No cross-VLAN   to processors    Managed          only
                   and Metrc


7.2 Cultivation Facility Physical-Cyber Integration

Large Footprint, Remote Location

Priority Threats:

  • Perimeter breach
  • Product diversion
  • Environmental sabotage
  • Regulatory non-compliance

Key Integration Points:

Physical System Cyber Integration Purpose

Perimeter cameras AI motion detection Early warning of intrusion

Environmental sensors Central monitoring Plant protection

Access to grow rooms Metrc integration Track who touches plants

RFID plant tags Inventory system Seed-to-sale compliance

Water/nutrient systems Network monitoring Detect sabotage

Network Segmentation for Cultivation:

┌─────────────┐  ┌─────────────┐  ┌─────────────┐  ┌─────────────┐
│  SECURITY   │  │ENVIRONMENTAL│  │   OFFICE    │  │   OT/ICS    │
│  Cameras    │  │  Sensors    │  │  COMPUTERS  │  │  HVAC       │
│  NVR        │  │  Climate    │  │  METRC      │  │  IRRIGATION │
│  ACCESS     │  │  Monitoring │  │             │  │  LIGHTING   │
└─────────────┘  └─────────────┘  └─────────────┘  └─────────────┘
   VLAN 10         VLAN 20          VLAN 30          VLAN 40
   
   No internet     Limited          Managed          Isolated
                   cloud sync       access           No internet

OT (Operational Technology) Warning:

HVAC, irrigation, and lighting systems in grow facilities are increasingly networked. These are critical systems that can be:

  • Disabled to kill crops
  • Manipulated to damage plants
  • Used as entry points to network

Always isolate OT systems on their own VLAN with strict firewall rules.


7.3 Manufacturing/Processing Facility Physical-Cyber Integration

Extraction, Infusion, Packaging

Priority Threats:

  • Product diversion during processing
  • Formula/recipe theft
  • Safety system manipulation
  • Chain of custody violations

Key Integration Points:

Physical System Cyber Integration Purpose

Lab cameras Production logs Verify processing

Access to extraction Safety interlocks Prevent unauthorized operation

Scales Metrc integration Automated weight recording

Testing equipment LIMS integration Track lab results

Packaging line Batch tracking Chain of custody

C1D1 Considerations:

Extraction labs (Class 1 Division 1 hazardous areas) require special cameras:

  • C1D1-rated cameras (explosion-proof)
  • Specialty mounting
  • Higher cost

Ensure safety and compliance with specialty C1D1 rated cameras designed for high-risk cannabis processing environments.


SECTION 8: INCIDENT RESPONSE FOR CONVERGED THREATS

8.1 Physical-Cyber Incident Types

Incident Type Physical Component Cyber Component

Coordinated Robbery Break-in, theft Camera/alarm disabled remotely

Insider Theft Product removal Log manipulation, badge misuse

Ransomware Operations halted Systems encrypted

Surveillance Compromise Footage theft Camera hacking

Sabotage Equipment damage OT system manipulation


8.2 Converged Incident Response Procedure

When a security incident occurs, investigate BOTH physical and cyber:

Step 1: Assess Both Domains

Check Physical Cyber

What happened? Product missing? Damage? Systems compromised? Data stolen?

When? Timeline from cameras, access logs Timeline from network logs

Who? Badge records, camera footage Login records, IP addresses

How? Point of entry, method Attack vector, vulnerability

Step 2: Preserve Evidence (Both Types)

Physical Evidence:

  • Secure the scene
  • Don’t touch potential fingerprint sources
  • Export camera footage immediately
  • Photograph damage
  • Pull access control logs

Cyber Evidence:

  • Don’t reboot systems
  • Capture network logs
  • Export NVR logs
  • Screenshot unusual activity
  • Preserve firewall logs

Step 3: Correlation Analysis

Time Physical Event Cyber Event Assessment

Step 4: Investigate Attack Chain

Most coordinated attacks follow a pattern:

  • Reconnaissance - Watch cameras, study patterns
  • Preparation - Test alarms, clone badges
  • Cyber Attack - Disable cameras, suppress alarms
  • Physical Attack - Break-in, theft
  • Exit - Escape with product/cash/data

Investigate each phase:

Phase Evidence Sources Findings

Reconnaissance NVR login logs, failed access attempts

Preparation Access denied logs, alarm test logs

Cyber Attack Network logs, camera offline events

Physical Attack Video footage, alarm events

Exit Cameras, badge-out logs


8.3 Post-Incident Checklist

☐ Physical Security Review

Item Action Completed

All locks changed

Access badges revoked/reissued

Alarm codes changed

Physical damage repaired

Additional cameras needed?

Guard coverage increased?

☐ Cyber Security Review

Item Action Completed

All passwords changed

All firmware updated

Network segmentation verified

Firewall rules reviewed

Monitoring enhanced

Vulnerability scan performed

☐ Integrated Review

Item Action Completed

Attack chain documented

Root cause identified

Gaps that allowed attack identified

Remediation plan created

Staff training updated


SECTION 9: COMPLIANCE INTEGRATION

9.1 State Physical Security Requirements

Most states require some combination of:

Requirement Typical Standard Cyber Security Implication

Video surveillance 24/7, all cannabis areas NVR security, retention, access control

Resolution 1280x720 minimum Ensure cameras meet spec

Retention 30-90 days (CA: 1 year) Storage security, backup

Access control Limited access areas Credential security, logs

Alarms Monitored 24/7 Communication security

Visitor logs All visitors tracked Data security

Employee badges Visible at all times Credential management


9.2 Adding Cyber Requirements to Compliance

Extend your compliance program to include cyber security for physical systems:

Video Surveillance Cyber Compliance:

Requirement Standard Evidence

Default passwords changed All devices Password management records

Firmware current Within 90 days Update logs

Network segmentation Cameras isolated Network diagram

Encryption enabled HTTPS, RTSP over TLS Configuration screenshots

Access logging enabled All logins tracked Log exports

Access Control Cyber Compliance:

Requirement Standard Evidence

Admin passwords unique Per device Password management

Terminated employee badges Same-day revocation HR/Security SLA

Access logs retained 1+ year Log exports

System updates current Within 90 days Update logs

Alarm System Cyber Compliance:

Requirement Standard Evidence

Default codes changed All panels Vendor confirmation

Dual communication Primary + backup System configuration

Panel firmware current Within 90 days Vendor records

Communication encrypted Where available Configuration


9.3 Documentation for Audits

Regulators may ask for:

  • Video footage on demand (have clear export procedure)
  • Access logs for specific dates
  • Alarm history reports
  • Proof of monitoring contract

Add to your documentation:

  • Network diagrams showing security device placement
  • Security device firmware versions
  • Password rotation records (not passwords!)
  • Incident response plan including cyber events
  • Vendor security assessment (for cloud systems)

SECTION 10: CHECKLISTS & TEMPLATES

10.1 Physical-Cyber Security Integration Audit

Complete this audit quarterly:

Cameras & NVR

Item Status Notes

All default passwords changed ☐ Pass ☐ Fail

Firmware updated (last 90 days) ☐ Pass ☐ Fail

Cameras on isolated VLAN ☐ Pass ☐ Fail

Remote access via VPN only ☐ Pass ☐ Fail

P2P/UPnP disabled ☐ Pass ☐ Fail

Login logging enabled ☐ Pass ☐ Fail

No cameras accessible from internet ☐ Pass ☐ Fail

Access Control

Item Status Notes

All default passwords changed ☐ Pass ☐ Fail

Terminated employees removed ☐ Pass ☐ Fail

Visitor badges collected and logged ☐ Pass ☐ Fail

Access logs reviewed weekly ☐ Pass ☐ Fail

Controllers on isolated network ☐ Pass ☐ Fail

Multi-factor on sensitive areas ☐ Pass ☐ Fail

Alarms

Item Status Notes

Installer codes changed ☐ Pass ☐ Fail

Duress codes documented ☐ Pass ☐ Fail

Dual communication tested ☐ Pass ☐ Fail

Panel firmware current ☐ Pass ☐ Fail

Panic buttons tested ☐ Pass ☐ Fail

Network

Item Status Notes

VLANs properly segmented ☐ Pass ☐ Fail

Firewall rules appropriate ☐ Pass ☐ Fail

Guest WiFi isolated ☐ Pass ☐ Fail

Unknown devices investigated ☐ Pass ☐ Fail

Audit Score: _____ / _____ Pass

Auditor: _______________ Date: _______________


10.2 Device Inventory Template

Track all networked security devices:

Device Type IP Address VLAN Manufacturer Model Firmware Last Updated Password Changed

Camera

Camera

NVR

Access Controller

Alarm Panel


10.3 Vendor Security Assessment (Physical Security Providers)

Before engaging a security system vendor:

Question Acceptable Answer Vendor Response

Where is cloud data stored? USA, SOC 2 compliant facility

Who can access our video/data? Limited, audited, background-checked

Is data encrypted at rest and in transit? Yes, AES-256, TLS 1.2+

What happens if you’re breached? Documented notification procedure

Can we export all our data if we leave? Yes, in standard formats

Do devices work without internet? Yes, local functionality preserved

How often are firmware updates released? At least quarterly

What is your vulnerability disclosure process? Documented, responsible disclosure


CONCLUSION

Physical security and cybersecurity are no longer separate.

Every camera, access control panel, and alarm system you install is a networked computer that expands your attack surface. Criminals know this—they’re compromising security systems to enable physical attacks.

Key Takeaways:

  • Change every default password on every security device
  • Update firmware quarterly on all cameras, NVRs, controllers
  • Segment your network - cameras shouldn’t be able to reach your POS
  • Disable internet access for devices that don’t need it
  • Monitor for cyber attacks on physical security systems
  • Correlate physical and cyber events to catch coordinated attacks
  • Include security systems in your incident response plan
  • Vet vendors for cloud security before buying

Your physical security system should make you MORE secure, not create new vulnerabilities.


Questions about physical-cyber integration?

Ask in #physical-security channel in our private Discord Or email: security@cannasecure.tech


Related Resources: