Cybersecurity Enhancement of Wisenet 9 Products

White Paper

July 2025

1. Introduction

Hanwha Vision's Wisenet SoC (System on a Chip) has continuously evolved by incorporating new technologies to strengthen product security. Cameras equipped with the latest Wisenet 9 SoC demonstrate an enhanced focus on product security, development process security, data security, and supply chain security, further boosting customer confidence in Hanwha Vision's video surveillance solutions.

Enhancing product security demands a proactive commitment to robust security standards and security processes. Among many global standards, Hanwha Vision has strategically chosen ETSI EN 303 645, a widely respected industry security standard for Internet of Things (IoT) devices. This enables independent third-party validation of our security certifications. This document outlines the importance of product security and details Hanwha Vision's approach to meeting the core requirements of ETSI EN 303 645.

Hanwha Vision wanted to obtain official verification of the security of our development process as well, which has been upgraded over a long period of time. So, we pursued ISA/IEC 62443-4-1 certification which provides guidance on how to design, develop, test, and maintain security features, even though we already have ISO/IEC 27001 certification related to information security.

Protecting sensitive data starts with systematically identifying the assets and data that require safeguarding, followed by developing technical solutions to secure them. To add a crucial layer of protection, we employ Secure Storage with a Root of Trust (RoT), enabled by a Secure Element certified to the FIPS 140-3 standard. This document further explores the use cases and scenarios for Hanwha Vision's Secure Element and strategies to minimize the impact of security incidents.

In today's development and distribution, the security and transparency of the software supply chain have become increasingly vital. A Software Bill of Materials (SBOM), which clearly documents and manages software components, plays a key role in addressing security vulnerabilities, maintaining operational efficiency, ensuring compliance with open-source licenses, and preventing software supply chain attacks. This document highlights the key benefits of an SBOM and shows how it significantly enhances software security and management efficiency.

2. Compliance with ETSI EN 303 645 Standard

Hanwha Vision has implemented the requirements of the EN 303 645 standard in its Wisenet 9 products. This international security standard, developed by the European Telecommunications Standards Institute (ETSI), is designed to enhance the cybersecurity of IoT devices. By ensuring that Hanwha Vision's products powered by Wisenet 9 comply with this standard, our customers can trust the platform's cybersecurity.

2.1. Overview of ETSI EN 303 645

This ETSI EN 303 645 standard, initially established in the European Union (EU), has been widely adopted as a security requirement for IoT devices in European and Asian countries, including Germany (BSI/IT Security Label), the UK (PSTI Act), and Singapore (Cybersecurity Labeling Scheme Tier 1 and 2). It is also currently under consideration for adoption in other regions, such as Japan (JC-STAR1) and within the EU Cyber Resilience Act.

To assist stakeholders in understanding, testing, and implementing its security requirements, the ETSI EN 303 645 standard provides the following three documents:

Hanwha Vision has prior experience with the UL 2900-2-3 standard, a U.S.-based software cybersecurity certification for network-connectable products, applied to Wisenet 7 products. The UL 2900-2-3 standard is adopted by the American National Standards Institute (ANSI) and the National Standard of Canada (NSC).

The UL 2900-2-3 standard is more focused on testing for the presence of vulnerabilities, software weaknesses, and malware, as well as the presence of security risk controls in the architecture and design. The standard also required penetration testing to be performed on the products.

The ETSI EN 303 645 is more focused on tests for protecting customers' personal data. The standard also requires manufacturers to provide customers who use their products/services with choices regarding personal data. This includes providing the option to consent to data collection, allowing users to withdraw consent at any time, and explaining the purpose of data collection and its intended use, as shown in Reference #A.

In spite of these differences, both standards require a vulnerability disclosure policy, ongoing vulnerability monitoring, identification, and remediation activities, secure authentication and authorization, secure communication, secure boot, secure update, and protection mechanisms for external interfaces and services.

2.2. Key aspects of ETSI EN 303 645

2.3. Certified Secure Products

Hanwha Vision Wisenet 9 products are built on our deep expertise, developed through meeting diverse security requirements, customer demands, and industry standards. We remain committed to monitoring market trends, anticipating customer needs, and upholding industry-lead security standards to deliver superior products.

3. Compliance with IEC 62443-4-1 Standard

Hanwha Vision complies with the IEC 62443-4-1 standard requirements throughout the security development process of its products, including Wisenet 9 products, and will be able to inform customers of its compliance activities through obtaining this certification.

3.1. Overview of IEC 62443-4-1

IEC 62443-4-1 is an international standard that specifies security development lifecycle (SDL) requirements for Industrial Automation and Control Systems (IACS). Increasingly, customers in surveillance camera sectors, such as those for European ships, distribution, and railways, also demand compliance with this standard, leading to a rising need for certification.

This standard systematically reflects security in the product development process, including hardware, software, and firmware, and requires development organizations to implement security processes and design products with security inherently built-in.

3.2. Summary of IEC 62443-4-1

The IEC 62443-4-1 standard's requirements are organized into eight major process areas, containing a total of 47 requirements. The summary of each process area and major requirements is as follows:

Process area Major requirements
Security management (13 requirements) Establish security policies & procedures,
Define security roles & responsibilities
Operate security education & awareness programs
Manage security requirements and risks
Security requirements specification (5 requirements) Identify security requirements, then document, review, approve, and track them
Security design (4 requirements) Apply security design principles & design security architecture
Perform security design review, verification, tracking, and risk analysis
Security implementation (2 requirements) Apply secure coding standards and conduct code review
Use static analysis tools
Security verification & validation testing (5 requirements) Test for security requirements, threat mitigation, vulnerability, and penetration
Managing security-related issues (6 requirements) Report, review, evaluate, resolve, and publicize security issues
Periodic review of security flaw management practices
Manage security updates (5 requirements) Provide security updates and documentation
Security guidelines (7 requirements) Provide product protection and security enhancement (disposal/operation) guide

By complying with this standard, Hanwha Vision has demonstrated that it has an environment and process for improving development reliability and creating secure products. Hanwha Vision ensures its products meet high cybersecurity standards by incorporating robust security processes that include identifying requirements, designing and implementing security features, reviewing and managing security issues, and distributing firmware and documentation to resolve issues.

3.3. Certified Secure Development Process

By complying with the IEC 62443-4-1 standard, Hanwha Vision is officially certified as having a product development organization with an SDL process that meets this international standard. This certification ensures the reliability of Hanwha Vision's products developed through these processes. Hanwha Vision will continue to strengthen its development process to strengthen security management throughout the product lifecycle, fulfilling its commitment to trust and responsibility, and providing superior services in the global market.

4. Implementing Secure Element for Secure Storage

Secure Storage is an essential technology designed to safely store sensitive data and protect it from unauthorized access or data leakage.

Hanwha Vision initially developed the Hanwha Trusted Platform Module (HTPM), starting with the Wisenet 7 SoC, and a TPM module independent of the SoC to implement Secure Storage in its high-end products. Building on this extensive experience, Hanwha Vision has now implemented its first hardware Secure Element, certified to the latest version of the FIPS 140-3, Level 3 standard, in the Wisenet 9 products. This Secure Element allows Hanwha Vision IP cameras to provide a secure vault for the storage of sensitive data.

4.1. FIPS 140-3 Certification

FIPS 140-3 is an international standard that provides reliability in the global market for evaluating the security of cryptographic modules such as Secure Storage. Compared to FIPS 140-2, FIPS 140-3 introduces significant enhancements and strengthens security requirements across various areas, as described below.

4.2. Security Level of FIPS 140-3

FIPS 140-3 categorizes cryptographic modules into four progressive levels (Level 1 to Level 4), each characterized by increasing rigor in its security requirement. The Secure Element, which Hanwha Vision uses, is designed to achieve Level 3. This level offers enhanced security compared to Level 2 in critical areas such as:

Requirement Area Security Level 1 Security Level 2 Security Level 3 Security Level 4
Cryptographic Module Specification Specification of cryptographic module, cryptographic boundary, approved security functions, and normal and degraded modes of operation. Description of cryptographic module including all hardware, software, and firmware components. All services provide status information to indicate when the service utilizes an approved cryptographic algorithm, security function, or process in an approved manner.
Cryptographic Module Interfaces Required and optional interfaces. Specification of all interfaces and of all input and output data paths Trusted channel
Roles, Services, and Authentication Role-based or identity-based operator authentication Identity-based operator authentication Multi-factor authentication
Software / Firmware Security Required integrity technique, or EDC based integrity test. Defined SFMI, HFMI and HSMI. Executable code Approved integrity technique, or EDC based integrity test. Defined SFMI, HFMI and HSMI. Executable code Approved digital signature-based integrity test
Operational Environment Non-modifiable. Limited or Modifiable Control of SSPs Modifiable. Role-based or discretionary access control. Audit mechanism
Physical Security Production-grade components Tamper evidence. Opaque covering or enclosure Tamper detection and response for covers and doors. Strong enclosure or coating. Protection from direct probing EFP or EFT Tamper detection and response envelope. EFP. Fault injection mitigation
Non-Invasive Security Module is designed to mitigate against non-invasive attacks specified in Annex "F". Documentation and effectiveness of mitigation techniques specified in Annex "F". Mitigation testing.
Security Parameter Management Random bit generators, SSP generation, establishment, entry & output, storage & zeroization. Automated SSP transport or SSP agreement using approved methods. Manually established SSPs may be entered or output in plaintext form. Manually established SSPs may be entered or output in either encrypted form, via a trusted channel or using split knowledge procedures.
Life-Cycle Assurance Self-Tests: Pre-operational: software/firmware integrity, bypass, and critical functions test. Configuration Management: Configuration management system for cryptographic functions test. Design: Module designed to allow testing of all provided security related services. Development: Annotated source code, schematics or HDL. Testing: Functional testing. Delivery & Operation: Initialization procedures. Guidance: Operator authentication using vendor provided authentication information. Mitigation of Other Attacks: Specification of mitigation of attacks for which no testable requirements are currently available. Conditional: cryptographic algorithm, pair-wise consistency, SW/FW loading, manual entry, conditional bypass & critical functions test. Configuration management system for cryptographic module, components, and documentation. Each uniquely identified and tracked throughout lifecycle. Module designed to allow testing of all provided security related services. Software high-level language. Hardware high-level descriptive language. Functional testing. Initialization procedures. Delivery procedures. Specification of mitigation of attacks for which no testable requirements are currently available. Conditional: cryptographic algorithm, pair-wise consistency, SW/FW loading, manual entry, conditional bypass & critical functions test. Automated configuration management system. Module designed to allow testing of all provided security related services. Software high-level language. Hardware high-level descriptive language. Functional testing. Initialization procedures. Delivery procedures. Specification of mitigation of attacks with testable requirements.

1 This table was prepared with reference to https://lightshipsec.com/fips-140-3-is-here/

Briefly, the security requirements by level are summarized as follows:

4.3. Use Cases and Scenarios of the Secure Element

End-users typically don't need to understand the detailed use cases of the Secure Element built into their devices. However, it is the manufacturer's responsibility to account for these considerations to ensure strong cybersecurity throughout the product. Security features must be designed to protect users without adding complexity or inconvenience.

As a responsible manufacturer, Hanwha Vision has proactively identified sensitive data—such as cryptographic keys and user-defined passwords—that require protection. The table below outlines these data categories in more detail.

One of the best practices for protecting sensitive data is encrypting it while it is stored in the device (data at rest). However, the encryption keys themselves must also be securely protected. To address this, the most effective solution is to store and manage sensitive data using a Secure Element embedded in the device.

Category Sensitive Data
User-defined passwords Login for Device access
SMTP/FTP/NAS’S server access
User-defined cryptographic keys Private keys/Certificates for 802.1x access
Private keys/Certificates for HTTPS/TLS
Manufacturer-defined cryptographic keys CA Certificates for Authenticity of 802.1x Authentication server
Private keys/Certificates for HTTPS/TLS, device authentication
Public keys for Verifying Secure Boot/Signed Firmware
CA Certificates for Authenticity of Open Platform App
CA Certificates for Authenticity of Mutual authentication
Secret keys for Backup/Restore

Hanwha Vision's Secure Element encrypts sensitive data on a per-device basis using a unique symmetric key generated during manufacturing. While this key is protected by a FIPS 140-3 Level 3 certified Secure Element—making any exposure extremely unlikely—even in the rare event of a leak, it would only affect that specific device. This isolation greatly limits the impact of any potential security incident and minimizes overall risk.

5. Enhancing Software Supply Chain Security

Hanwha Vision has initiated the distribution of a Software Bill of Materials (SBOM) for its new software platform, beginning with the Wisenet 9 product line.

5.1. Introduction of SBOM

An SBOM (Software Bill of Materials) is a detailed list of all software components, clearly identifying every open-source and third-party library that makes up a software product. These components can be introduced into the development repository from multiple sources, which may unintentionally bring known open-source vulnerabilities into the product.

For this reason, managing open-source vulnerabilities has become a crucial part of software supply chain security, with the SBOM playing a key role in enabling effective control. Managing and maintaining an SBOM improves the transparency and security of the software supply chain, providing benefits such as:

5.2. Features of Hanwha Vision's SBOM

Hanwha Vision has published its SBOM to help customers easily access and manage essential information. This includes the name and version of open-source software components, their origin, functional descriptions, licenses, copyright holders, Common Platform Enumeration (CPE), Package URL (purl), and vulnerability patch details.

Figure 1.1: XNV-A9084R's published SBOM in Hanwha Vision website

Hanwha Vision's commitment goes beyond simply providing an SBOM. We are also dedicated to proactively addressing known open-source vulnerabilities through regular firmware updates, in line with each product's Long-Term Firmware Support Policy.

5.3. Utilizing Hanwha Vision's SBOM

Here's how customers can effectively use Hanwha Vision's SBOM to strengthen security and streamline software component management:

  1. Vulnerability Impact Assessment: If customers want to check whether their product is affected by a known CVE (Common Vulnerabilities and Exposures) in a specific open-source software, they can refer to the product-specific SBOM provided by the vendor. This allows them to quickly identify which open-source software and versions are impacted - often without needing to contact the vendor directly.
  2. Patch Verification: If an affected version is identified, customers should consult the SBOM for available vulnerability patch (pedigree) information. In some cases, security patches for CVEs may be backported to older versions, meaning the specific version in use may not actually be vulnerable.
  3. Manufacturer Consultation for Undetermined Impact: If a vulnerability patch is not listed in the SBOM, it may mean that the vulnerable code was not included by the compiler during the build time or that the vulnerability is not exposed externally. In such cases, customers should contact the manufacturer to confirm whether their product is actually affected.
  4. Software Update Request: If an actual impact is confirmed, customers can ask the manufacturer to update or patch the affected open-source software. For discontinued models, support will depend on the applicability and duration of the Long-Term Firmware Support Policy.
    [For more information, please refer to the Long-Term Firmware Support Policy document].

6. Conclusion

Product security goes beyond just preventing product vulnerabilities; it also encompasses managing supply chain security for software components, securing development environments and personnel, and protecting the data stored and processed within the product.

Understanding how security vulnerabilities arise highlights why a comprehensive range of protective measures is essential. Vulnerabilities can be introduced at any stage—from product planning and design to implementation, distribution, and even operation. While proactively eliminating these vulnerabilities is ideal to reduce costs, it is often difficult in practice. Therefore, it's crucial to have a development and vulnerability response process that enables rapid action when new vulnerabilities are discovered in the wild. Global security standards mandate such controls, and Hanwha Vision is committed to continuously integrating these requirements into its products and development processes to deliver superior solutions.

Hanwha Vision will continue its proactive security efforts, including conducting penetration tests to identify product vulnerabilities, running internal bug bounty programs for developers, and performing thorough security reviews. As a dedicated CVE Numbering Authority (CNA), we remain faithful to our role in identifying and disclosing vulnerabilities. With a trusted supply chain and an unwavering focus on cybersecurity, Hanwha Vision stands as a leader in world-class video surveillance manufacturing.

7. Reference #A

Models: Wisenet 9 White Paper, 9 White Paper, White Paper

File Info : application/pdf, 18 Pages, 520.91KB

PDF preview unavailable. Download the PDF instead.

White-Paper Cybersecurity-Enhancement-of-Wisenet-9-Products

References

Microsoft Word LTSC

Related Documents

Preview Wisenet 9 차세대 사이버보안: Hanwha Vision의 보안 표준 및 SBOM 활용
Hanwha Vision의 Wisenet 9 기반 제품이 최신 보안 표준(ETSI EN 303 645, IEC 62443-4-1, FIPS 140-3)을 어떻게 준수하고 SBOM을 통해 소프트웨어 공급망 보안을 강화하는지에 대한 백서입니다.
Preview Hanwha Vision Wisenet 9 Cybersecurity: ETSI EN 303 645, IEC 62443-4-1, FIPS 140-3, and SBOM
Explore Hanwha Vision's advanced cybersecurity measures for Wisenet 9 products. This white paper details compliance with ETSI EN 303 645, IEC 62443-4-1, the implementation of FIPS 140-3 certified Secure Elements, and the use of Software Bill of Materials (SBOM) for robust product and supply chain security.
Preview Hanwha Vision Industrial Cyber Security Capability Certificate of Conformity
Official Certificate of Conformity for Hanwha Vision's Industrial Cyber Security Capability, assessed against IEC 62443-4-1:2018. Details include applicant information, standard compliance, security requirements, and maturity level.
Preview Hanwha Vision AI Video Security Solutions for Luxury Retail
Discover how Hanwha Vision's AI-powered video surveillance enhances security, customer experience, and operational efficiency for luxury retail brands, addressing internal and external threats with advanced camera technology.
Preview Hanwha Vision Firmware Encryption Key Disclosure Statement
Official statement from Hanwha Vision regarding the disclosure of an encryption key in certain camera firmware, outlining the affected models, risks, and mitigation strategies.
Preview AI Video Surveillance Solutions for Luxury Retailers | Hanwha Vision
Discover how Hanwha Vision's AI-powered video surveillance solutions enhance security, operational efficiency, and customer experience for luxury retailers, addressing threats and providing key business insights.
Preview Hanwha Vision NVR Network Device Security Enhancement Guide
A comprehensive guide from Hanwha Vision on enhancing the security of NVR network devices, detailing various security levels and best practices for network device hardening.
Preview Hanwha Vision's Sustainability Report 2025
Hanwha Vision's Sustainability Report 2025 details the company's commitment to sustainable management, outlining its economic, social, and environmental performance and initiatives. The report adheres to GRI Standards 2021 and TCFD recommendations, with verification by BSI.