Secure by design requires a systematic approach
Securing video surveillance data is just as important as safeguarding people and property
As more video security cameras get connected to the Internet of Things (IoT), the role of video security is changing. Cameras are no longer part of a “closed” system, solely focused on gathering, recording, and viewing images. They are transitioning into intelligent sensors that collect significantly more data than video security images alone. The surge in data collection also increases the risk of cybercriminals looking to steal sensitive data.
Solutions built on trust
Cyber and data security remain essential topics across all divisions and areas of Bosch, especially video systems and solutions. We are dedicated to the highest production and testing standards and have approximately 35,000 software developers working on software security. As a pioneer in automotive cybersecurity, emphasizing technical standards such as the Bosch hardware security module and working with the ISO/SAE 21434 committee, we embrace an end-to-end approach to maximize data security and cybersecurity.
Because video data is often highly critical and sensitive, every component of the video security infrastructure, including cameras, storage devices, network communication, Public Key Infrastructure (PKI), and video management software needs to be addressed. With that in mind, every Bosch camera has a built-in Secure Element with a Trusted Platform Module functionality, safely storing all certificates and keys needed for authentication and encryption.
Keeping video systems up-to-date and secure is essential as more devices connect to the IoT. We aim to embody the highest levels of security in every network-connected device and ensure their resilience. As a result of our unwavering commitment to addressing cybersecurity, our cameras are certified to UL 2900-2-3 Level 2 cybersecurity standards and achieved the IEC 62443-4-1 certificate of conformity for cybersecurity, demonstrating our commitment to providing you with a reliable video security system.
10 leading measures to ensure data security
How we maximize data security to meet the highest reliability standards:
1. Secure Element
Future-proof Secure Element with Trusted Platform Module (TPM) functionality, supporting 4096-bit keys.
2. Embedded login firewall
Embedded login firewall minimizes unintentional lock-outs and DDOS attacks. An intelligent login firewall you can count on.
3. Password enforcement
Security first: set a password, then connect.
4. Minimum TLS 1.2
A minimum version of TLS 1.2 provides maximum security.
5. Simple Certificate Enrollment Protocol (SCEP)
Simplifying cybersecurity at scale.
6. Software sealing
Changes to a sealed camera configuration will trigger an alarm. Protects against unintentional or unauthorized changes.
7. Encrypted firmware
Verifies firmware authenticity and prevents malware insertion.
8. Cloud firmware check
Always stay up to date.
9. Session timeout
Manage how long a configuration session can be left unattended.
10. Secure by default
Security by default, insecure ports closed until you say it is open.
AI-driven, secure by design
All our AI-driven products are secure by design. You can trust Bosch to provide product security and protect customer privacy throughout the product life cycle. To achieve this promise, we have established a global Product Security Incident Response Team (PSIRT) that is the central point of contact for external security researchers, partners, and customers to report product security concerns.
Product security throughout the life cycle
Security with supplier | Security engineering process | Vulnerability and incident management |
---|---|---|
Security with supplier We have high-quality requirements for purchased products. To ensure the security of purchased products, modules, and components, we evaluate each supplier concerning product security as an integral part of our purchasing process. | Security engineering process Whenever we develop a new product, we conduct a comprehensive threat and risk analysis and create an individual security concept for the product and its integration into a complete solution. We ensure product security with comprehensive security and penetration testing during the design phase and before release. Any updates, patches, or upgrades will undergo the same rigorous tests and only be deployed once they have proven secure. | Vulnerability and incident management Because requirements are constantly changing, 100% security is never guaranteed. Therefore, a structured vulnerability and incident management process is established to professionally manage potential product security vulnerabilities and incidents. Visit the Security Advisories webpage to get the latest information about identified security vulnerabilities and proposed solutions. |