{"id":2874,"date":"2011-10-25T22:41:23","date_gmt":"2011-10-26T03:41:23","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=2874"},"modified":"2022-09-01T14:04:44","modified_gmt":"2022-09-01T18:04:44","slug":"copier-security-best-practices","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/copier-security-best-practices\/","title":{"rendered":"Copier Security Best Practices"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-114441\" title=\"Copier Security Best Practices\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/internet_stop_censorship-1-e1591227666375-138x150.jpg?resize=106%2C115&#038;ssl=1\" alt=\"Copier Security Best Practices\" width=\"106\" height=\"115\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/internet_stop_censorship-1-e1591227666375.jpg?resize=138%2C150&amp;ssl=1 138w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/internet_stop_censorship-1-e1591227666375.jpg?resize=69%2C75&amp;ssl=1 69w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/internet_stop_censorship-1-e1591227666375.jpg?w=304&amp;ssl=1 304w\" sizes=\"auto, (max-width: 106px) 100vw, 106px\" \/>Multi-function printers (MFP) can scan, copy, fax, and print. The lowly office copier can now send emails, host web-based administrative pages, and even tell you when the ink is low. While doing all that, MFPs can store image files on onboard hard drives, which can contain sensitive, personally identifiable information (PII). Compliance with standards\/laws such as PCI-DSS, HIPAA, Sarbanes Oxley, state privacy laws, etc., may force MFPs\u00a0to be secured.<\/p>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10747\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"mfp_printer\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/mfp_printer.jpg?resize=75%2C75&#038;ssl=1\" alt=\"MFP printer\" width=\"75\" height=\"75\" \/> <\/em><a title=\"securestate.blogspot.com\" href=\"http:\/\/securestate.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>SecureState<\/em><\/a> <a title=\"securestate.blogspot.com\" href=\"http:\/\/securestate.blogspot.com\/2010\/05\/so-youre-telling-me-that-you-did.html\" target=\"_blank\" rel=\"noopener noreferrer\">suggests<\/a> some general questions to ask when trying to understand the criticality of these copier systems and to show some due diligence:<\/p>\n<p>\u2022 Are these devices accessible on the network? If so, how is &#8220;Administrative&#8221; access controlled?<br \/>\n\u2022 How long are the image files retained on these systems?<br \/>\n\u2022 If the copier is compromised, can the attackers capture sensitive data?<br \/>\n\u2022 If a hard drive fails, does the replacement process follow the usual standard for securely destroying the disk?<br \/>\n\u2022 What are some of the services enabled on these devices? Is there an administrative website, <a title=\"Simple Network Management Protocol\" href=\"http:\/\/en.wikipedia.org\/wiki\/Simple_Network_Management_Protocol\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SNMP<\/a> client, or <a title=\"Simple Mail Transfer Protocol\" href=\"http:\/\/en.wikipedia.org\/wiki\/Simple_Mail_Transfer_Protocol\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SMTP server<\/a>? How about the accounts and passwords of the administrative websites; are they set to default accounts and passwords?<\/p>\n<p><em>SecureState<\/em> says If you answered &#8220;No&#8221; or &#8220;I don&#8217;t know&#8221; to these questions, some of the issues more than likely need to be addressed.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97877 \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-1-e1563411578292-150x112.jpg?resize=99%2C74&#038;ssl=1\" alt=\"\" width=\"99\" height=\"74\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-1-e1563411578292.jpg?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-1-e1563411578292.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-1-e1563411578292.jpg?w=224&amp;ssl=1 224w\" sizes=\"auto, (max-width: 99px) 100vw, 99px\" \/>Just like any network appliance, MFPs and other print devices are small computers connected to the network that have memory, storage, processors, an operating system, and full-fledged web servers. These devices can hold <a title=\"Information sensitivity\" href=\"http:\/\/en.wikipedia.org\/wiki\/Information_sensitivity\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">sensitive information<\/a>. Before that old printer is decommissioned, ensure the copier hard drive is securely wiped. If the existing device does not have advanced security options such as disk encryption or immediately overwriting data, the hard drive should be removed and securely wiped or destroyed separately before being decommissioned.<\/p>\n<h3>Recommended best practices<\/h3>\n<p>Recommended best practices for multi-function printers and copiers with disk drives:<\/p>\n<ul>\n<li>Review vendor security configuration guides<\/li>\n<li>Develop a standard configuration and check regularly<\/li>\n<li>Enable immediate image to overwrite and schedule regular off-hours overwrite (<a title=\"United States Department of Defense\" href=\"http:\/\/www.defense.gov\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">DoD<\/a> 3 pass)<\/li>\n<li>Enable <a title=\"Encryption\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/encryption\" target=\"_blank\" rel=\"noopener noreferrer\">encryption<\/a> (minimum 128-bit <a title=\"AES\" href=\"https:\/\/searchsecurity.techtarget.com\/definition\/Advanced-Encryption-Standard\" target=\"_blank\" rel=\"noopener noreferrer\">AES<\/a>)<\/li>\n<li>Use <a title=\"Network encryption\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/network-encryption\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">encryption<\/a> and secure protocols such as <a title=\"IPsec\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPsec\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IPSec<\/a>, <a title=\"SSL\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/Secure-Sockets-Layer-SSL\" target=\"_blank\" rel=\"noopener noreferrer\">SSL<\/a>, and <a title=\"SNMPv3\" href=\"http:\/\/web.archive.org\/web\/20120903025256\/http:\/\/www.javvin.com:80\/protocolSNMPv3.html\" target=\"_blank\" rel=\"noopener noreferrer\">SNMPv3<\/a> if network-enabled.<\/li>\n<li>Regularly review copier vendor security bulletins.<\/li>\n<li>Enable authentication and authorization (if possible, use network credentials)<\/li>\n<li>Change admin password regularly<\/li>\n<li>Enable audit log and review periodically<\/li>\n<li>Treat network-enabled devices like any other computer on the network<\/li>\n<li>Purchase a device that has an <a title=\"EAL2\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Evaluation_Assurance_Level\" target=\"_blank\" rel=\"noopener noreferrer\">EAL2<\/a> <a href=\"http:\/\/www.commoncriteriaportal.org\/\">Common Criteria<\/a> certification<\/li>\n<\/ul>\n<p>If the copier processes <a href=\"https:\/\/web.archive.org\/web\/20130109014633\/http:\/\/www.oit.uci.edu\/security\/risk\/datadefinitions.html\">restricted data<\/a>, it MUST have encryption and image overwrite. For devices that process restricted data but do not have the necessary security features:<\/p>\n<ul>\n<li><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10749 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"datadestruction\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/datadestruction.jpg?resize=55%2C82&#038;ssl=1\" alt=\"Data destruction\" width=\"55\" height=\"82\" \/>If possible, buy the required security modules and enable the features.<\/li>\n<li>If security features cannot be purchased or enabled, replace the copier as soon as appropriate and have the hard drive removed and destroyed.<\/li>\n<\/ul>\n<h3 id=\"vendor\">By Copier Vendor<\/h3>\n<p><strong><a title=\"Xerox\" href=\"http:\/\/www.xerox.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10750 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"xerox_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/xerox_logo.jpg?resize=91%2C40&#038;ssl=1\" alt=\"Xerox\" width=\"91\" height=\"40\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/xerox_logo.jpg?resize=150%2C65&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/xerox_logo.jpg?resize=300%2C130&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/xerox_logo.jpg?w=341&amp;ssl=1 341w\" sizes=\"auto, (max-width: 91px) 100vw, 91px\" \/><\/a>Xerox\u2014<\/strong>Newer Xerox (XRX) devices have security features that often need to be turned on. For more information, see the Xerox Information Security Guides.<\/p>\n<p><strong><a href=\"http:\/\/www.ricoh.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10752 size-thumbnail\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"ricoh_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/ricoh_logo.jpg?resize=75%2C21&#038;ssl=1\" alt=\"Ricoh\" width=\"75\" height=\"21\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/ricoh_logo.jpg?resize=150%2C42&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/ricoh_logo.jpg?resize=300%2C84&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/ricoh_logo.jpg?w=423&amp;ssl=1 423w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Ricoh\u2014<\/strong>Security options for Ricoh&#8217;s (7752) have to be purchased separately. For more information, see the Ricoh Common Security Features Guide (PDF).<\/p>\n<p><strong><a title=\"Canon\" href=\"https:\/\/web.archive.org\/web\/20151106040806\/http:\/\/www.usa.canon.com\/cusa\/home\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10753 size-thumbnail\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Canon_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/Canon_logo-150x52.png?resize=75%2C26&#038;ssl=1\" alt=\"Canon\" width=\"75\" height=\"26\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/Canon_logo.png?resize=150%2C52&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/Canon_logo.png?resize=300%2C104&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/Canon_logo.png?w=953&amp;ssl=1 953w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Canon\u2014<\/strong>Security options for Canon (CAJ) devices must be purchased separately. For more information, see Canon Security Solutions for iR and iP Devices (PDF).<\/p>\n<p><strong>HP<\/strong> &#8211; All <a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HP<\/a> (<a title=\"NYSE : HPQ\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:HPQ\" target=\"_blank\" rel=\"noopener noreferrer\">HPQ<\/a>) multi-function printers have hard drives.<\/p>\n<ul>\n<li><a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10754 size-full\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"HP_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/HP_logo.gif?resize=50%2C48&#038;ssl=1\" alt=\"HP\" width=\"50\" height=\"48\" \/><\/a>There is a disk-wipe utility for all MFPs.<\/li>\n<li>This utility is not installed by default and must be downloaded from HP.COM. It is protected by an admin account and password.<\/li>\n<li>The admin can configure the utility to do a printer disk wipe daily.<\/li>\n<li>Some non-MFP HP printers may have hard drives. These printers will have an occupied EIO card (with a resident hard drive) in the slot next to the network card. Viewing the printer&#8217;s external case, this EIO card should be physically evident.<\/li>\n<li>Third-party disk wipe utility cannot be used against HP MFP hard drives without removing the drive from the card, which is likely to damage the card and, possibly, the hard drive.<\/li>\n<li>Non-MFPs with hard drives are rare and may be purchased for particular purposes.<\/li>\n<li>Non-MFPs with hard drives and network connections can be remotely disk wiped. Non-MFPs with a hard drive but without a network connection need to be handled by HP.<\/li>\n<li>The agreements should include a defective media retention provision for leased HP printers that permits the lessor to keep the hard drive before releasing the printer.<\/li>\n<li>The WebJetAdmin tool, downloadable from HP.COM, can scan a network subnet and identify HP printers (and non-HP printers if the tool has an MIB for the non-HP printer).<\/li>\n<\/ul>\n<h6><em>rb-<\/em><\/h6>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-10755\" style=\"margin-left: 0px; margin-right: 0px;\" title=\"richard_nixon\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/richard_nixon.jpg?resize=81%2C108&#038;ssl=1\" alt=\"Richard Nixon\" width=\"81\" height=\"108\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/richard_nixon.jpg?resize=112%2C150&amp;ssl=1 112w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/richard_nixon.jpg?w=220&amp;ssl=1 220w\" sizes=\"auto, (max-width: 81px) 100vw, 81px\" \/><\/p>\n<p><em>All they focused on was the costs; they did not ask any of the due diligence questions pointed out in this post. They had no plans on wiping the HDDs on the 12 networked copy\/scan\/print Ricohs. It is pretty clear that all the info on the HDDs was bound for South America or else on the secondary market, as I wrote about <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-b\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20120502184918\/http:\/\/www.informationweek.com\/news\/security\/vulnerabilities\/231602113\" target=\"_blank\" rel=\"noopener noreferrer\">Corporate Espionage&#8217;s New Friend: Embedded Web Servers<\/a> (informationweek.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Multi-Function printers (MFP) can scan copy fax print email host web pages store image with PII PCI-DSS HIPAA Sarbanes Oxley may force you to secure the copier.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,825,823,824,145,822,821,820,505,4,305],"class_list":["post-2874","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-aes","tag-cryptography","tag-encryption","tag-hard-disk-drive","tag-ipsec","tag-mfp","tag-multifunction-printer","tag-personally-identifiable-information","tag-security","tag-ssl"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2874"}],"version-history":[{"count":22,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2874\/revisions"}],"predecessor-version":[{"id":132959,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2874\/revisions\/132959"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}