Security - Axis Q6075-SE User Manual

Hide thumbs Also See for Q6075-SE:
Table of Contents

Advertisement

AXIS Q6075-SE PTZ Camera
Learn more

Security

Signed firmware
Signed firmware is implemented by the software vendor signing the firmware image with a private key. When a firmware has this
signature attached to it, a device will validate the firmware before accepting to install it. If the device detects that the firmware
integrity is compromised, the firmware upgrade will be rejected.
Secure boot
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable
memory (boot ROM). Being based on the use of signed firmware, secure boot ensures that a device can boot only with authorized
firmware.
Secure keystore
A tamper-protected environment for the protection of private keys and secure execution of cryptographic operations. It prevents
unauthorized access and malicious extraction in the event of a security breach. Depending on security requirements, an Axis device
can have either one or multiple hardware-based cryptographic computing modules, which provide a hardware-protected secure
keystore. Depending on security requirements, an Axis device can have either one or multiple hardware-based cryptographic
computing modules, like a TPM 2.0 (Trusted Platform Module) or a secure element, and/or a TEE (Trusted Execution Environment),
which provide a hardware-protected secure keystore. Furthermore, selected Axis products feature a FIPS 140-2 Level 2-certified
secure keystore.
To learn more about Axis Edge Vault and cybersecurity features in Axis devices, go to axis.com/learning/white-papers and search for
cybersecurity.
Objects at the edge
Objects near the center
57

Advertisement

Table of Contents
loading

Table of Contents