Security - Axis M1055-L User Manual

Box camera
Hide thumbs Also See for M1055-L:
Table of Contents

Advertisement

AXIS M1055-L Box Camera
Learn more

Security

Signed firmware
Signed firmware is implemented by the software vendor signing the firmware image with a private key. When a firmware has this
signature attached to it, a device will validate the firmware before accepting to install it. If the device detects that the firmware
integrity is compromised, the firmware upgrade will be rejected.
Secure boot
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable
memory (boot ROM). Being based on the use of signed firmware, secure boot ensures that a device can boot only with authorized
firmware.
Axis Edge Vault
Axis Edge Vault is a secure cryptographic compute module which can be used for cryptographic operations on securely stored
certificates. Edge Vault provides tamper protected storage, enabling each device to protect its secrets. It sets a foundation for safe
implementation of more advanced security features.
TPM module
The TPM (Trusted Platform Module) is a component that provides cryptographic features to protect information from unauthorized
access. It is always activated and there are no settings you can change.
Axis device ID
Axis device ID works like a digital passport, unique for each device unit. It is securely and permanently stored in Edge Vault as a
certificate signed by Axis root certificate. Axis device ID is designed to prove the origin of the device, enabling a new level of
device trust through the life cycle of the product.
Signed video
Signed video ensures that video evidence can be verified as untampered without proving the chain of custody of the video file. Each
camera uses its unique Axis device ID, securely kept in Axis Edge Vault, to add a signature into the video stream. When the video
is played, the file player shows whether the video is intact. Signed video hence makes it possible to trace the video back to the
origin camera and verify that the video has not been tampered after it left the camera.
To learn more about cybersecurity features in Axis devices, go to axis.com/learning/white-papers and search for cybersecurity.
42

Advertisement

Table of Contents
loading

Table of Contents