Back to Blog

Security

Cloud vs On-Premise Security Cameras: What the 150,000 Camera Breach Teaches Us

Iron Gate Technologies | | 5 min

In March 2021, hackers accessed 150,000 live camera feeds from hospitals, schools, jails, and factories, including Tesla and Cloudflare facilities. They also accessed full video archives stored on the vendor's cloud platform.

The cameras were working exactly as designed. That was the problem.

What Happened

The breach targeted Verkada, a cloud-based security camera company headquartered in San Mateo, California. According to the Federal Trade Commission's complaint and Verkada's own incident report, here's what occurred:

Attackers discovered credentials for a "Super Admin" account, a support-level access tier that provided full control over customer cameras across the entire platform. Using these credentials, they accessed live feeds and archived video from customer organizations including hospitals, psychiatric facilities, schools, police departments, and corporate offices.

The FTC's investigation found that Verkada failed to require unique and complex passwords, failed to adequately encrypt customer data, and failed to implement secure network controls. The breach wasn't the result of a sophisticated zero-day exploit. It was a misconfigured support server with credentials that gave access to everything.

The consequences were significant. The FTC required Verkada to implement a thorough information security program and pay a $2.95 million penalty, the largest fine the FTC had obtained for a CAN-SPAM violation at the time. The Department of Justice also sued the company separately for sending more than 30 million unsolicited commercial emails in violation of the CAN-SPAM Act.

According to independent testing cited in public reporting, Verkada's facial recognition system showed a 15 to 85 percent false positive rate depending on conditions, raising additional questions about the accuracy of AI features marketed alongside the cloud platform.

The Architecture Problem

The Verkada breach illustrates a structural vulnerability specific to cloud-only security architectures. Understanding the distinction matters for any organization evaluating camera systems.

In a cloud-only model, video from your cameras travels through the vendor's servers. The vendor controls access to your footage. The vendor manages the admin credentials. The vendor decides who has "Super Admin" access, and how that access is secured.

This creates a single point of failure that has nothing to do with your own security practices. Your IT team can follow every best practice in the book, and if the vendor's support infrastructure is misconfigured, your footage is exposed.

Cloud-only also means subscription dependency. Your video lives on someone else's infrastructure, and accessing it requires an active subscription. If you cancel or the vendor changes terms, your access to your own recorded footage can disappear.

None of this means cloud is inherently insecure. It means cloud-only architectures concentrate risk in the vendor's infrastructure, and the buyer has limited visibility into how that risk is managed.

150,000
Cameras exposed in 2021 breach
$2.95M
FTC penalty against Verkada

On-Premise: What It Actually Means

On-premise security means your video stays on your network, stored on your hardware, controlled by your team.

There are no subscription fees for accessing your own footage. The data doesn't traverse third-party servers. Admin access is managed by your IT department, not by a vendor's support team with "Super Admin" privileges that may or may not be adequately secured.

For organizations with existing network infrastructure, on-premise storage integrates with your current security posture. Your firewall rules, access controls, and monitoring tools apply to video data the same way they apply to everything else on your network.

The strongest form of on-premise security is air-gapped deployment, where the camera system operates on a physically isolated network with no internet connectivity. For facilities handling classified information, critical infrastructure, or sensitive operations, air-gapped systems eliminate the entire category of remote access vulnerabilities that enabled the 2021 breach.

On-premise does require local storage capacity and IT management overhead. For organizations with the infrastructure and personnel to manage it, this is a straightforward trade: you accept the management responsibility in exchange for complete control over your security data.

Want to learn more about on-premise architecture?

Iron Gate Technologies builds on-premise and air-gapped systems exclusively. Every system stores footage locally on hardware you own.

Book a Security Assessment

Why Iron Gate Technologies Builds On-Premise Only

The subscription model is the business logic behind cloud-only security. When your video lives on someone else's servers, you pay monthly for the privilege of accessing your own footage. Stop paying and access disappears. The vendor's recurring revenue depends on your continued dependency.

Iron Gate Technologies rejected that model entirely. Every IGT system stores footage locally, on hardware you own, on your network. There is no monthly subscription to access your recordings. There is no cloud dependency that turns your security system into a recurring bill. The footage is yours from the moment it is captured.

This is not a philosophical stance. It is an engineering decision rooted in how security systems actually get used. When a facility manager needs to pull footage from last Tuesday at 2 AM, that request should not depend on an internet connection, a subscription status check, or a third-party server's availability. It should depend on walking to the local storage system and retrieving the file.

For organizations in compliance environments where data residency matters (HIPAA, FERPA, CJIS), on-premise is not a preference. It is a requirement. For government and defense agencies where cloud-only architectures can be disqualifying, on-premise is the only path to procurement eligibility. For any organization that wants guaranteed access to its footage regardless of vendor business continuity, on-premise means the footage survives even if the vendor does not.

Iron Gate Technologies builds on-premise and air-gapped systems exclusively. Learn more about Iron Gate Technologies' approach to data security or explore our government and defense security solutions.

Questions to Ask Your Security Vendor

Before signing a contract for any security camera system, these questions separate vendors who respect your data sovereignty from those who don't.

Five Questions for Your Security Vendor

Use these during your next vendor evaluation to assess data sovereignty and architectural risk.

"Where does my video physically reside?" If the answer is "our cloud" and there's no local storage option, your footage lives on someone else's infrastructure, subject to their security practices.

"Who has admin access to my cameras?" Ask specifically about support-tier access. How many people at the vendor have the ability to view your live feeds? What audit controls exist? The 2021 breach demonstrated that broad internal access without adequate controls creates risk that customers may never see until it's too late.

"What happens to my footage if I cancel my subscription?" If footage is cloud-only and you stop paying, does it get deleted? Archived? Returned to you? The answer reveals whether you own your data or rent it.

"Can my system operate fully disconnected from the internet?" If the answer is no, then every vulnerability in the vendor's cloud infrastructure is your vulnerability too. A system that requires internet connectivity to function cannot provide security when that connectivity is compromised.

"Where is your equipment manufactured, and who controls the firmware?" This connects directly to NDAA compliance and supply chain security. If the vendor can't answer clearly, the supply chain may include components from manufacturers banned under Section 889.

Your Data, Your Choice

The 150,000-camera breach wasn't a failure of cameras. It was a failure of architecture. Concentrating access to 150,000 customer camera systems behind a single set of credentials, on a single vendor platform, with insufficient access controls, created a risk that no individual customer could mitigate.

On-premise security doesn't eliminate all risk. Nothing does. But it moves control back to the organization that owns the cameras, the footage, and the responsibility for protecting both.

Request an on-premise consultation to discuss which architecture fits your security requirements.

Ready to Talk Security?

Our engineering team can walk you through the right solution for your environment.

Book a Security Assessment