Bosch Whitepaper Data Security
Bosch Whitepaper Data Security
Bosch Whitepaper Data Security
Upgrading the frequency from 125kHz to 13.56MHz allows you to take advantage of the security functions on
13.56MHz processor cards. These high-frequency cards are commonly referred to as “Smartcards”, and several
13.56MHz formats are currently on the market. Although inherently more secure, some 13.56MHz technologies
have already been compromised, and no longer offer the highest security standards. It is therefore important to
choose the most up-to-date and secure formats.
+ + =
Key diversification Encryption Mutual authentication Secure
A mathematical Reader and card Reader and card communication
algorithm ensures that a communicate in communicate several
unique key is generated “secret code“ times to ensure that the
match is authentic
An aspect of equal importance is card encoding. Many smartcard readers allow only the reading of the Card
Serial Number (CSN). Unfortunately this type of implementation is not fully secure, because the CSN is always
stored in a public (unencrypted) card sector. To guarantee maximum security the credential data must always
be stored in a secure sector of the card.
“Bosch makes its own secure code (Bosch Code) which is stored within the
secure area of the Smartcard, plus a variety of compatible readers, thus
providing the highest level of security for credentials.”
With multi-factor authentication you combine different types of credentials to increase the level of security.
This method requires more than one valid credential to gain access, typically to a highly restricted area, for
instance a badge (smartcard) followed by a fingerprint.
Whitepaper | 3
You may combine two different readers, or one multi-technology reader connected to a single controller.
This method is ideal for retrofitting older access control installations where a complete re-wiring would not
be cost-effective.
The Bosch biometric readers offers dual-frequency and multi-smartcard reader technology.
If visual confirmation of identity is required, a video management system can be integrated: The cardholder
presents his credential and a security operator is notified via the management software. The operator can
now compare live video from the entrance with database images of the cardholder, before deciding
whether to grant access. In this way the operator’s human intelligence can be made the ultimate arbiter
in high-security areas.
The lack of encryption between reader and controller communication is vulnerable to “man-in-the-middle”
attacks. Using a device known as a “Skimmer”, an attacker can tap the data transferred between reader and
controller without the knowledge of the operators. Once collected, the data can provide unauthorized access
even where otherwise secure smartcards are used, a so called Replay Attack. Attackers can inject valid
credential data into the system wirelessly via the Skimmer using a smartphone, for example via Bluetooth,
and thus gain access without even needing to clone the physical credential.
For more secure access control we recommend using Open Supervised Device Protocol (OSDP).
Version 2 (OSDPv2) with Secure Channel Protocol supports AES encrypted communication between reader and
controller. Additionally, OSDP utilizes two-way communication. This allows constant monitoring of readers, via
the same communication channels, in order to detect tampering or device removal. OSDP is an open protocol
and has several other benefits, such as the ability to send commands to the reader, improved system
interoperability and more.
4 | Whitepaper
Bus 1
Ethernet communications, such as those between the access controller and the server, are also vulnerable to
“Man in the Middle“ attacks. This kind of attack can collect valid credential data if the network technology used
is not encrypted. If there is an internet or WiFi connection present, attackers can intercept data from any point
in the local network, without even being physically onsite.
That is why all components in an access control system (reader, controller, server, client, database, etc.) must
encrypt their communications.
Qualified network specialists are essential to undertake the many other measures necessary to implement
a secure network infrastructure. These include firewalls, NIDS, VLANs, VPNs, MAC filtering.
Whitepaper | 5
Confidentiality means limiting data access to authorized persons only, and ensuring that data is stored securely.
In access control systems, most data is stored on the database server, which must implement encryption
methods to prevent illicit access to sensitive data. In Europe and elsewhere the law is increasingly concerned
and increasingly strict with data privacy. Thus access control systems must also guarantee the safety of
cardholders’ personal data, such as photos, addresses, medical and biometric information.
Availability means making sure that information is accessible at all times to all and only authorized and
authenticated users and system services. Major access control systems provide round-the-clock interaction with
users, their data and their credentials; whether this means granting access at a door, enrolling a new employee,
or printing a report. To provide this level of availability a system must include fail-safe mechanisms to ensure
that authorized access to required data is guaranteed, and not dependent on a single point of failure.
Offline
Controllers operation
Data integrity means that all required information is kept usable and unadulterated. For audits access control
systems must provide reliable records of all access events and of any changes in the system configuration.
Data backups must be secure, complete and resilient against database failure or corruption.
A common cyber threat is that of “brute-force” attacks. These are programs for discovering usernames and
passwords through rapid-fire informed guesses. They can succeed in hours, days, or years, depending on
password complexity and their own processing power. If successful, a hacker may gain privileged access to all
access-control functions and can, for example, grant access to intruders. To minimize the attack’s chances of
success, strong passwords must be enforced, as well as mechanisms to block rapid-fire login attempts.
Many other attack vectors exist, such as malware, SQL injection, denial-of-service (DoS),
and “man-in-the-middle” tactics. It is of paramount importance that installed software components
receive security updates regularly and on time, so as to be armed against current and future threats.
Whitepaper | 7
▶ “Secure-by-Design”
Bosch software components are developed according to “Secure-by-Design” principles. For example, in
accordance with “Secure-by-Default”, all initial security settings (certificates, complex passwords, etc.) are set
for maximum security in the configuration by default. In accordance with the concept of “Least privilege” each
operator, by default, has the rights to perform only those operations that are essential to his job, and to access
the system from no other workstation but his own.
▶ Encrypted communications
Data transfer between the reader, controller, server and other components is encrypted. MIFARE Desfire EV1 or
EV2 technology and Bosch codes ensure that credentials are secure. Communication between reader and
controller supports the encrypted OSDPv2 protocol.
Between controller and server, as well as between server and other components, a secure, AES- encrypted
communication channel protects against a wide range of network-based attacks.
Support of encrypted
database technologies Support of Open
AES encrypted Supervised Device
controller Protocol (OSDP v2
communication secure channel)
Communication via
Trusted digital the latest card
certificates encryption technology
▶ Complete events logs and records for forensic investigations and auditing
All system events and operator activities are securely logged, and the data is protected against tampering.
Bosch software can also log any changes made to its own configuration. These features allow mandatory
investigations and audits to be completed quickly, unequivocally, and with minimum disruption to daily
operation.
System security involves not only the application, but the whole software environment.
It is therefore extremely important to use the most secure operating systems with the latest security
patches, as well as anti-malware tools.
The company responsible for installing the system must be fully qualified, and must understand the complex
dynamics of physical barriers, the technologies involved and the daily operation of an access control system.
Mistakes during the installation phase are common and can be costly. Installing maglocks outside of the secure
area, for example, or with unprotected wiring, provides an opportunity for attackers to deactivate access control
devices simply by cutting off their power supply.
Without a culture of security, cardholders themselves are a major cause of security breaches. The common and
expected courtesy of holding doors open for the person behind you poses a security risk: “Tailgating”, as it is
known, is usually harmless, but is a major problem for security operatives because the number of persons on
the premises, and their identities, are no longer known with certainty. If an access control system is to be
effective, it is vitally important to train all users in security culture to work with the system, not against it.
Good technology is necessary but not sufficient on its own. Bosch also has the experience to maintain
a complete overview of the system and consider every component: “The security of a system is as
strong as its weakest component“.
Best practices in installation, configuration, network security, hardened operating systems, operator and
user training, are all crucial. For certified installers Bosch provides a “Cyber Security Hardening Guide“
to list all measures an installer can take to design and configure a Truly Secure Access Control System.