Video security and the Internet of Things

The security of your surveillance data is just as important as the people and premises you are safeguarding.

Video security data is increasingly connected across local and global networks. A growing number of edge components (cameras) send their data to core components (servers) over the Internet, where digital intruders and hackers loom. It is therefore essential to cover all major elements of the video security infrastructure.

Because video data is often highly critical and sensitive, Bosch is driving a systematic approach to maximise data security by considering physical safety and cybersecurity simultaneously.

Bosch’s system approach aims to provide the highest standards in end-to-end data security by:

  • Assigning every component in the network an authentication key.
  • Securing data from hackers by encrypting it at the hardware level, using a cryptographic key that is safely stored in a unique built-in Trusted Platform Module (TPM).
  • Offering ways to manage user access rights ensuring that only authorised people have access to your data.
  • Supporting the set-up of a Public Key Infrastructure.

End-to-end security: How we achieve data security

How do Bosch…

Secure their cameras

  • Secured connections supported (HTTPS)
  • Password enforcement at initial set up
  • Execution of 3rd party software is disabled
  • Firmware updates via Bosch signed firmware files only
  • Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM)

Secure storage devices

  • Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM)
  • Support of Microsoft Active Directory for safe management of user access rights
  • Digest access authentication only
  • Regular updates via security patches

Secure network communication

  • Unsecure ports, such as Universal Plug and Play, are disabled by default
  • Password enforcement at initial set up
  • Network authentication using the 802.1x protocol
  • Support of the Advance Encryption Standard (up to 256 bit keys for encryption).

Support Public Key Infrastructures (PKI)

  • Factory-loaded unique Bosch signed certificates on all cameras
  • Unique built-in Trusted Platform Module (TPM) for highly secure cryptographic operations
  • In-house Certificate Authority (Escrypt)
  • Support of customer specific certificates
  • Support of 3rd party PKI solutions

Story credit: BOSCH 

Source: http://resource.boschsecurity.com/documents/Data_Security_Guideb_Special_enUS_9007221590612491.pdf

More information:

Data Security – how Bosch secures the camera: https://www.youtube.com/watch?v=4YRGeAVKk50

 

For more articles like this, subscribe to the Security Newsletter

  • Stay up to date with the latest news and Security updates.
  • Subscribe