Control access to your video meetings
Our how-to guide for ensuring secure meetings
in regulated industries

Table of contents:
Securing your video communications is paramount, particularly in industries that handle controlled or classified information. Whether you work in defense, intelligence, or other highly regulated verticals such as finance or healthcare, controlling access to your most sensitive discussions is mandatory for your organization. This eBook delves into the details of access control in video conferencing, offering a comprehensive guide to safeguard your virtual interactions.
Implementing access control in video conferencing
Fundamentally, protecting your data means controlling who may access your data. This is the central principle of Zero trust: no one should ever be able to do anything with or to your data that you have not authorized. And make no mistake: video data is data. In fact, video data is some of the most valuable data in your organization.
In the video world, access control comprises three things:
- Admission to a video session
- The type of data discussed or shared in that session
- What each participant is allowed to do within the session
To the extent possible, access control elements, such as admission to a specific session, should be automated. Certain elements, such as restricting the type of conversations individuals may engage in, cannot yet be automated. However, even in these cases, your communications platform can provide technological features, such as audiovisual notifications, to assist your personnel in this critical data management task.
When developing an access control plan for your organization, there are two important factors you must consider:
- It is critical to understand the types of information your environment supports or may support in the future. In the defense world, this is often performed for you and your users via the classification documentation process, but this is a critical step for all organizations, regardless of industry or vertical. Even within the classified world, you will likely find that there are topics (for example, acquisition discussions) that require specialized access control beyond the usual color scheme.
- You must identify the accompanying risk associated with each supported information type. This is arguably even more critical to developing a proper access control plan. Simply identifying the type of information is insufficient for helping you determine what the rules and policies governing access to that information; you must also categorize each data type and subtype based on the impact of compromise to that information. Recognize, too, that the confidentiality, integrity, and availability of data may be impacted differently, leading to different risk assessments based on usage or purpose.
Common access control methods
Unacceptable risk environments
These are meetings at the highest security level, in which risks to security could be catastrophic in impact. In addition to the methods mentioned above, unacceptable risk environments may require these additional forms of access control:
- Biometric authentication: A security mechanism that uses biometric features such as fingerprints or facial recognition to access the meeting.
- External identity provider (IDP): An external service that manages user identities and can be integrated with the video conferencing system to authenticate users.
High risk environments
These are meetings in which private and/or confidential information is exchanged. In addition to the methods mentioned above, high risk environments may require these additional forms of access control:
- Multi-factor authentication (MFA): Requires two or more verification methods, such as a code sent to a mobile device.
- Policy engine: This gives the organization the opportunity to control access over how network resources and organizational data are used. This can be done through:
- Role-based access control (RBAC): a security mechanism that assigns permissions based on the roles within an organization, rather than assigning permissions to specific users directly. Each role is equipped with certain access rights, and users are then assigned to these roles, effectively granting them the permissions associated with those roles.
- Attribute-based access control (ABAC): a security model that grants or denies access to resources based on attributes associated with the user, the resource, the environment, and the action being taken. Unlike role-based access control, which uses predefined roles to determine access, ABAC uses policies that evaluate attributes to make decisions. This allows for more granular, context-aware access control that can consider a wide range of attributes, such as location, time of day, or transaction history, thus offering a more dynamic and flexible approach to securing resources.
- One-time meeting link: This ensures that meeting links are only valid for a single use-case and not available for re-use in a series of meetings, for example.
Moderate risk environments
These include typical business meetings in which no confidential information is exchanged. In addition to the methods mentioned above, moderate risk environments may require these additional forms of access control:
- Single sign-on (SSO): Integrates with existing authentication systems to streamline access control.
- PIN code access: In addition to a login password, virtual meetings can be PIN protected to provide an additional layer of security.
- Waiting rooms: Participants are placed in a virtual waiting room until the host admits them.
Low risk environments
These include personal and friendly video chats. They may occur at home or in your place of business, often between colleagues or partners, but they do not incur significant data risk to you or your organization due to their nature. An example might be a quick check-in on a colleague on maternity leave, or planning for an office holiday party.
- Password protection: Passwords are a simple and effective method to create a first layer of security, requiring participants to login to the video service using a username and password.
- Invitation-only access: Meetings can be restricted to only those who have been invited, limiting participation to pre-approved individuals.
Technical overview
Encryption
Identity and Access Management (IAM)
IAM frameworks help manage user identities and regulate access. This involves integration with directory services like lightweight directory access protocol (LDAP) or active directory, and the use of single sign-on (SSO) and multi-factor authentication (MFA).
- SSO: By integrating the video platform with identity providers using standards like SAML 2.0 and OpenID Connect, users are able to log in using their existing corporate credentials. This simplifies the process and ensures that only authenticated users can access meetings.
- MFA: MFA offers an additional layer of security when verifying user identities. This could involve sending a code to a user’s mobile device or requiring biometric verification, to enhance security beyond name and password.
Secure meeting URLs
Generate unique, expiring URLs for each meeting as a mechanism to prevent unauthorized access. Meeting IDs can be randomized and set to expire after a certain period.
Audit logs
Self-hosting
Network and transport layer security
This is employed to encrypt data as it travels over the network, ensuring that the communication channel between participants and servers remains secure.
Use case: Secure meetings in the defense industry
Scenario
A national defense contractor needs to hold highly confidential video meetings with multiple stakeholders, including military officials and subcontractors.
Key challenges
- Ensuring that only authorized personnel can join the video meetings
- Protecting sensitive/ confidential information from cyber threats
- Maintaining compliance with defense industry regulations
How Pexip solves access control challenges for the defense industry
Solution: Implementing a multi-layered access control strategy for video meetings.
Self-hosted
To maintain full data control, the national defense contractor opts to host the video solution on-premises, within the organization’s zero-trust security architecture.
Authentication and authorization
The defense contractor utilizes single sign-on (SSO) and rolebased access control (RBAC) to verify participants’ identities and assign appropriate permissions for their video meetings.
In-meeting reminder
Given the varying grades of confidentiality in the defense contractor’s video meetings, they employ a dynamic on-screen warning – which can be adjusted to the level of confidentiality required
Implementing access control
- Authentication and authorization
- Encryption
- Secure meeting management
- Monitoring and compliance
- Network security
- Secure deployment