IP Camera Hardening and Cybersecurity Guide |
Secure Configuration and Operation
12 |
14
Data subject to change without notice | August 22
Security Systems / Video Systems
Security Maintenance Activities
To not only configure a device securely, but to also keep a device in a secure state, regular maintenance activities should
be conducted.
Checking of Log files
Keeping watch of the logs is an important part of security analysis or maintenance activity. Regular review of the logs can
reveal configuration problems or security violations like false logins.
For analyzing logs and storing them for long term it is advised to send the logs of the camera to a syslog server or a SIEM
system as each camera will reserve a fixed space for logging internally but will overwrite older logs if that space is filled.
Check for Updates
The device should be always updated to the latest firmware version to include security or functional fixes.
To get more information about the release cycle of firmware versions as well as downloads of the latest firmware versions,
please visit the
Bosch Security and Safety Systems Download Store
For devices connected to the Remote Portal (Cloud) users are notified about availability of latest firmware.
Check for Security Advisories
To check if there are known security vulnerabilities, please check the following page:
Security Advisories | Bosch Security and Safety Systems I Global