background image

 

 

IP Camera Hardening and Cybersecurity Guide | 

Secure Configuration and Operation 

7 | 

14

 

Data subject to change without notice | August 22 

Security Systems / Video Systems 

802.1X 

802.1x is a standard for Network Access Control (NAC). It allows devices to authenticate in the network, granting 
only authenticated devices access to the network. Bosch IP cameras support 802.1x either with password or 
certificate-based authentication, with certificate-based authentication being the preferred method. To use 802.1x 
the network switch must support this standard, and an authentication server is needed. 

Recommendation: 

If network infrastructure allows it, use network authentication with 802.1x.

 

 

Syslog 

As the camera does only provide a limited space for log messages, they should be sent to a central location and 
analysed there to detect any attacks or misconfigurations. 

Recommendation: 

Use TCP Syslog to avoid losing messages due to packet loss, use Syslog with TLS to encrypt 

and authenticate messages.

 

 

SNMPv3 Mode 

SNMPv3 is the successor of SNMPv1 and allows for secure authentication and transfer of information.  

Recommendation: 

When using SNMPv3 use SHA1 as authentication protocol and AES as privacy protocol (if 

supported).

 

 

IP Filter 

In IP Filter several IP addresses (single hosts or network subnets) can be defined, that are allowed to access the 
camera. It is recommended to define the computers or networks accessing the camera here. 

Recommendation: 

It is recommended to use the IP filter to define allowed hosts or networks.

 

 

Date / Time 

For having the correct timestamp on logs and video data is it recommended to sync the time to a central 
timeserver. Both SNTP and TLS date can be used to achieve that. The advantage of SNTP is a more precise time 
synchronization, the advantage of TLS date is the possibility to check for a correct certificate making it the more 
secure solution. 

Recommendation: 

Use a secure means of synchronizing time either with SNTP or TLS date. 

 

Cloud based services 

Bosch offers its own cloud-based services to manage cameras over the Bosch Cloud Portal. The cloud services do 
not automatically connect to the cloud and are disabled by default. Each camera needs to be connected to the 
cloud portal first if it should be used. Every precaution has been taken to secure the connection between cloud and 
camera, so if needed the portal can be used in any environment. 

Recommendation: 

Bosch cloud portal can be used depending on if cloud solution is in use. 

 

Software Sealing 

After a completed configuration of an IP camera the settings of the device should not change. A software seal can 
be enabled to be notified of any changes to device configuration (break of seal). 

Recommendation: 

Enable software sealing if there are no pending configuration changes. 

 
 

 

 

Содержание 7100i-2MP OC

Страница 1: ...ersecurity Guide Secure Configuration and Operation 1 14 Data subject to change without notice August 22 Security Systems Video Systems IP Camera Hardening and Cybersecurity Guide Secure Configuration and Operation of IP Cameras ...

Страница 2: ...eature Description and Hardening Decisions 5 Defense in Depth 8 Firmware protection 8 Authentication Access Control 8 Network Layer 9 Operational Environment 10 Physical Security 10 Network Separation 10 Network Authentication 10 Central configuration 10 SIEM System 11 PKI 11 AD FS 11 Security Maintenance Activities 12 Checking of Log files 12 Check for Updates 12 Check for Security Advisories 12 ...

Страница 3: ...ings to allow easy integration into existing environments Even though it is recommended to reach the settings as shown below Level 2 there can be limitations of the operational environment that mandates the use of a certain protocol or feature which is less secure e g SNMPv1 The Reasoning chapter describes why a certain protocol should be enabled or disabled to allow a better informed choice Harde...

Страница 4: ...led Discovery Enabled Enabled Disabled ONVIF discovery Enabled Enabled Disabled GBT 28181 Disabled Disabled Disabled Password reset mechanism Enabled Disabled Disabled Ping response Enabled Enabled Disabled RTSPS Enabled Enabled Enabled Network Network Access Minimum TLS version 1 0 1 2 1 2 HSTS Disabled Enabled Enabled Network Advanced 802 1x Disabled Optional Enabled Syslog Disabled TCP TLS Netw...

Страница 5: ...s is the configuration protocol for Bosch IP cameras Plain RCP is unencrypted so settings are transferred unencrypted All Bosch tools now use RCP over HTTPS communication for some time but it might be needed for 3rd party integration tools or scripting tools still relying on this protocol Recommendation Disable RCP if not used by 3rd party tools or legacy systems SNMPv1 SNMP is the common network ...

Страница 6: ...eeded it is recommended to disable this feature Ping Response Configures if the camera answers to ping requests in the network Can help with debugging in a high secure network this can be disabled to avoid device enumeration via ping sweep although there are several other means of device discovery that can be used by an attacker Recommendation Risk based approach can be disabled for high security ...

Страница 7: ...rk subnets can be defined that are allowed to access the camera It is recommended to define the computers or networks accessing the camera here Recommendation It is recommended to use the IP filter to define allowed hosts or networks Date Time For having the correct timestamp on logs and video data is it recommended to sync the time to a central timeserver Both SNTP and TLS date can be used to ach...

Страница 8: ...ware root of trust This prevents an attacker to modify bootloader or firmware on the device Authentication Access Control 3 2 1 User Authentication Bosch IP cameras support different methods of authentication Pre configured is password based authentication with three different roles that can be assigned to a user Optional certificate based authentication or ADFS integration into an active director...

Страница 9: ...traffic when using HTTPS HSTS HTTP Strict Transport Security HSTS protects against man in the middle attacks and protocol downgrade attacks For more details see chapter 1 RTSPS RTSPS is the encrypted variant of RTSP providing a secure means of transporting video data 3 3 2 Least Protocol It is recommended to activate only the protocols that are needed for operation of the camera All other protocol...

Страница 10: ...ation The network in which the cameras are operated should support network authentication with 802 1x to allow only valid devices and actors on the network Central configuration The cameras can not only be configured locally via web based interface but there are several possibilities to centralize management 4 4 1 Configuration Manager The Configuration Manager offers the possibility to manage one...

Страница 11: ...ntication with 802 1x user authentication with certificates and other encryption functions custom certificates can be installed on the camera The most secure variant of certificate deployment is to generate a signing request on the camera and request a certificate from an internal or external CA certification authority This way the private key of the certificate never leaves the device and is secu...

Страница 12: ... it is advised to send the logs of the camera to a syslog server or a SIEM system as each camera will reserve a fixed space for logging internally but will overwrite older logs if that space is filled Check for Updates The device should be always updated to the latest firmware version to include security or functional fixes To get more information about the release cycle of firmware versions as we...

Страница 13: ...tificates and the respective keys that were stored in the TPM or secure element will also be deleted It is recommended to set devices to factory default also in case that they must be moved into another installation that may use other credentials or certificates Reporting Security Vulnerabilities It is an essential part of the Bosch Quality Promise that we provide product security and protect our ...

Страница 14: ...cure Configuration and Operation 14 14 Data subject to change without notice August 22 Security Systems Video Systems Bosch Sicherheitssysteme GmbH Robert Bosch Ring 5 85630 Grasbrunn Germany www boschsecurity com Bosch Sicherheitssysteme GmbH 2022 ...

Отзывы: