Skip to main content
Bosch Security and Safety Systems I Africa
Video systems

Secure by design requires a systematic approach

Securing video surveillance data is just as important as safeguarding people and property

As more video security cameras get connected to the Internet of Things (IoT), the role of video security is changing. Cameras are no longer part of a “closed” system, solely focused on gathering, recording, and viewing images. They are transitioning into intelligent sensors that collect significantly more data than video security images alone. The surge in data collection also increases the risk of cybercriminals looking to steal sensitive data.

Secure server and IT environment with icon cloud

Solutions built on trust

Bosch security camera portfolio

Cyber and data security remain essential topics across all divisions and areas of Bosch, especially video systems and solutions. We are dedicated to the highest production and testing standards and have approximately 35,000 software developers working on software security. As a pioneer in automotive cybersecurity, emphasizing technical standards such as the Bosch hardware security module and working with the ISO/SAE 21434 committee, we embrace an end-to-end approach to maximize data security and cybersecurity.

Because video data is often highly critical and sensitive, every component of the video security infrastructure, including cameras, storage devices, network communication, Public Key Infrastructure (PKI), and video management software needs to be addressed. With that in mind, every Bosch camera has a built-in Secure Element with a Trusted Platform Module functionality, safely storing all certificates and keys needed for authentication and encryption.

Keeping video systems up-to-date and secure is essential as more devices connect to the IoT. We aim to embody the highest levels of security in every network-connected device and ensure their resilience. As a result of our unwavering commitment to addressing cybersecurity, our cameras are certified to UL 2900-2-3 Level 2 cybersecurity standards and achieved the IEC 62443-4-1 certificate of conformity for cybersecurity, demonstrating our commitment to providing you with a reliable video security system.

Logo Underwriters Laboratories

UL 2900 cybersecurity certification

As a result of sustained efforts, Bosch cameras have achieved Underwriters Laboratories (UL) 2900-2-3 Level 2 cybersecurity certification. This certification confirms that Bosch performs the necessary penetration testing on the products to probe for vulnerabilities and have appropriate methods to manage cybersecurity efficiently.

“Certification to the UL 2900 Series of Standards is the highest recognition of cybersecurity due diligence and helps demonstrate that a product is secure to modern standards." - UL Cybersecurity Assurance Program (UL CAP)

Logo IEC

Security for industrial automation and control systems

Bosch cameras have achieved the IEC 62443-4-1 Certificate of Conformity – Industrial Cyber Security Capability.

This certificate focuses on the processes and definitions around developing and manufacturing secure products.

Requirements assessed:

Security management, security requirements, secure by design, secure implementation, security verification and validation testing, management of security-related issues, security update management, security guidelines.

10 leading measures to ensure data security

How we maximize data security to meet the highest reliability standards:

1. Secure Element

Future-proof Secure Element with Trusted Platform Module (TPM) functionality, supporting 4096-bit keys.

2. Embedded login firewall

Embedded login firewall minimizes unintentional lock-outs and DDOS attacks. An intelligent login firewall you can count on.

3. Password enforcement

Security first: set a password, then connect.

4. Minimum TLS 1.2

A minimum version of TLS 1.2 provides maximum security.

5. Simple Certificate Enrollment Protocol (SCEP)

Simplifying cybersecurity at scale.

6. Software sealing

Changes to a sealed camera configuration will trigger an alarm. Protects against unintentional or unauthorized changes.

7. Encrypted firmware

Verifies firmware authenticity and prevents malware insertion.

8. Cloud firmware check

Always stay up to date.

9. Session timeout

Manage how long a configuration session can be left unattended.

10. Secure by default

Security by default, insecure ports closed until you say it is open.

AI-driven, secure by design

All our AI-driven products are secure by design. You can trust Bosch to provide product security and protect customer privacy throughout the product life cycle. To achieve this promise, we have established a global Product Security Incident Response Team (PSIRT) that is the central point of contact for external security researchers, partners, and customers to report product security concerns.

Data security visual with keypad

Product security throughout the life cycle

Security with supplier Security engineering process Vulnerability and incident management
Security with supplier
We have high-quality requirements for purchased products. To ensure the security of purchased products, modules, and components, we evaluate each supplier concerning product security as an integral part of our purchasing process.
Security engineering process
Whenever we develop a new product, we conduct a comprehensive threat and risk analysis and create an individual security concept for the product and its integration into a complete solution. We ensure product security with comprehensive security and penetration testing during the design phase and before release. Any updates, patches, or upgrades will undergo the same rigorous tests and only be deployed once they have proven secure.
Vulnerability and incident management
Because requirements are constantly changing, 100% security is never guaranteed. Therefore, a structured vulnerability and incident management process is established to professionally manage potential product security vulnerabilities and incidents. Visit the Security Advisories webpage to get the latest information about identified security vulnerabilities and proposed solutions.

Resources and tools

Learn more about data security

download icon

IP video and data security guidebook

 

download icon

Secure by default tech note

 

Share this on:

Explore more