October 16, 2024
Updated:
October 2, 2024
Cyber Defense Strategies for Transportation Infrastructure
Executive Summary
Rekor is at the forefront of delivering Roadway Intelligence solutions designed to enhance public safety, improve urban mobility, and optimize transportation and traffic management. As a pioneer in the implementation of digital infrastructure, Rekor is collecting, connecting, and organizing the world’s mobility data – laying the foundation for a digitally-enabled operating system for the roadway. Yet, in today’s increasingly connected world, continuous cyber threats to integrated systems and communication networks critical to roadway infrastructure are on the rise. These threats range from malicious software, including ransomware, to sophisticated network-based attacks like DDoS and MITM assaults. Recognizing the pivotal role of data and system security in maintaining infrastructure integrity, Rekor is committed to a robust cybersecurity framework.
Rekor’s technological ecosystem integrates a diverse array of components, spanning cloud-based AI model training, edge-based roadside sensors, and web-based software platforms. This extensive application spectrum, from roadside to cloud, necessitates the holistic approach Rekor has adopted to meet the stringent AI and cybersecurity compliance measures mandated by state transportation departments, metropolitan planning organizations, and cities. The following provides a high-level overview of Rekor’s cybersecurity framework, designed to safeguard our technology, ensure compliance with national standards, advance technology adoption, proactively manage risks, and instill trust and confidence in our customers and partners.
Cybersecurity Monitoring for Edge Systems
Rekor integrates comprehensive cybersecurity measures across our Edge computing deployments to ensure robust protection against a range of cyber threats. By adhering to critical compliance frameworks and utilizing advanced security technologies, we maintain high standards of data security and system integrity. Our advanced monitoring and response capabilities include:
- Network Detection and Response (NDR): Identifies and mitigates network threats such as DDoS attacks, port scanning, and botnet activities.
- Endpoint Detection and Response (EDR): Focuses on securing endpoints from malware, ransomware, and other host-based attacks.
- Intrusion Prevention System (IPS) and Intrusion Detection System (IDS): These systems collaboratively prevent and detect unauthorized network access or attacks.
- Anomaly Detection and Response: Identifies and responds to zero-day attacks and anomalies that deviate from normal operations.
- Asset Visibility: Ensures comprehensive monitoring and management of all network-connected assets to enhance security posture.
- Zero Trust Network: Implements strict identity verification for every individual and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter.
Rigorous Penetration Testing
Rekor conducts extensive penetration testing across our hardware, software applications, and networks to identify vulnerabilities before they can be exploited. This critical component of our cybersecurity strategy involves:
- Regularly Scheduled Tests: Conducting tests at regular intervals to ensure ongoing security and compliance.
- Comprehensive Coverage: Assessing all aspects of our systems from physical devices to application interfaces to network protocols.
- Expert Analysis: Utilizing skilled cybersecurity professionals to perform tests and analyze security posture comprehensively.
Enhanced Data/Cloud Security and Compliance with AWS
Rekor technology is built on AWS Cloud infrastructure, designed to be the most secure cloud computing environment available, servicing entities including military, global banks and other high-sensitivity organizations. Security features include:
- Cloud Security Tools: A deep set of cloud security tools, including over 300 security, compliance, and governance services and features.
- Security Standards and Compliance: AWS complies with over 143 security standards and compliance certifications including SOC 1/ISAE 3402, SOC 2, SOC 3, FISMA, DIACAP, FedRAMP, PCI DSS Level 1, and various ISO standards including ISO 9001, ISO 27001, ISO 27017, and ISO 27018.
- Automated Security Controls and End-to-End Security: Security services such as DDoS protection, identity and access management (IAM), network and application protection, continuous monitoring and threat detection, industry leading data privacy safeguards and security controls, along with sophisticated data encryption.
Conclusion
In closing, this document represents Rekor ongoing commitment to advancing state-of-the-art Roadway Intelligence solutions underpinned by a robust end-to-end cybersecurity framework. We will continue to take an innovative and collaborative security approach, ensuring continuous protection and integrity of our technologies with our customers privacy and protection at the forefront.