Mission Critical Cybersecurity and Data Privacy

Tyco Cloud has leveraged its server management and video services expertise to create and implement industry-leading secure software development, operational management, and threat mitigation practices, helping it to deliver services that achieve higher levels of security, privacy, and compliance than most customers could achieve on their own.

Tyco Cloud surveillance services undergo regular verification by third-party audit firms. Tyco Cloud shares audit report findings and compliance packages with customers to help them fulfill their own compliance obligations. By verifying that its services meet compliance standards and demonstrating how compliance was achieved, Tyco Cloud makes it easier for customers to attain compliance for the infrastructure and applications they run.

Although the Tyco Cloud video surveillance platform is cloud agnostic, its standard services run on the Azure platform. Microsoft engages in industry-leading security efforts through its centers of excellence, including the Microsoft Digital Crimes Unit, Microsoft Cybercrime Center, and Microsoft Malware Protection Center. Tyco Cloud adheres to a rigorous set of security controls that govern operations and support and works with other entities within Microsoft such as the Microsoft Operational Security Assurance (OSA) group to identify risks and share information, supporting continuous improvement in operational controls. This increases the ability to prevent, detect, contain, and respond to security threats.

For data in transit, Tyco Cloud uses industry-standard transport protocols such as SSL and TLS between cameras, gateways, devices, and data centers, and within the data centers themselves. Data at rest, such as recorded video, is encrypted and can optionally be secured using 256bit SHA keys to validate anti-tampering. For data segregation and private clouds, Tyco Cloud offers private cloud services to provide unique physical cloud instances for each of its customers. It also offers multi-tenant services, meaning that multiple customers’ deployments are stored on the same physical hardware. Tyco Cloud uses logical isolation to segregate each customer’s data from that of others. This provides the scale and economic benefits of multi-tenant services while rigorously preventing customers from accessing other’s data. For many customers, controlling the location of their data is an important element of data privacy, compliance and governance. Tyco Cloud customers can specify the geographic areas where their data is stored.

Tyco Cloud delivers a global 24x7 response service that works to mitigate the effects of attacks and malicious activity. The incident response team follows established procedures for incident management, communication, and recovery, and uses discoverable and predictable interfaces internally and externally to its customers.

Tyco Cloud provides also provides a global 24x7 access to our Product Security Incident Response Team (PSIRT) which includes a cyber security hotline for customers to contact Johnson Controls with issues or concerns around the clock and around the world.

Holistic Methodology

Johnson Controls’ approach to cyber protection is aimed at providing peace of mind to our customers. Our holistic cyber mindset begins at initial design concept, continues through product development, and is supported through deployment, including a rapid incident response to meet the comprehensive and evolving cybersecurity environments. Our methods include the ability to provide cyber resilient systems with a range of capabilities to complement the diverse security needs of our customers.

Under the JCI Cyber Program, the internal conformance standards established are:

·      Secure Communications Cryptographic Functions

·      Third Party Penetration Testing Standard

·      Open Source Code Security Standard

·      Application Threat Modeling Standard

·      Open Source Software Security Audit-Standard Operating Procedure

·      Threat Intelligence Program Standard

·      Product Security Patching and Updating Documentation Standard

·      Vulnerability Management Standard

Secure Development

Baseline design requirements that address core cyber threat categories for elevated security. Dedicated in-house cybersecurity test labs focused on discovering and neutralizing concerns before they reach customers. Extended testing, including bug bounty programs and 3rd party penetration testing, provides verification and validation assurance. Solution designed features that enable easier compliance with corporate policies Certified and trained experts driving design decisions.

Deployment Services

Customer education to help drive more secure installation. Thought leadership to build a pragmatic approach to address cyber risk. Compliance assistance to help you comply with industry and organizational policies Security documentation for IT acceptance. 

Rapid Response

Rapid incident response to quickly respond and advise on vulnerabilities. Preemption solutions driven by ongoing threat and trend monitoring. Incident response designed in conformance with ISO standards for accurate and consistent vulnerability handling and disclosure. 

Disruption is Not an Option

Operational technologies often provide critical functions which, if disrupted, can impact operational efficiency and profits and result in disclosure of sensitive information. Cyber-attackers whose aim is to cause disruption and loss have identified building and security systems as attractive targets. In today’s environment, cybersecurity plays a very crucial role in protecting building and security systems. Unfortunately, many system providers do not address cybersecurity or fall short of providing sufficient support, leaving many buildings under protected.

A Higher-Level Commitment

Johnson Controls’ approach to cyber protection is aimed at providing peace of mind to our customers. Our holistic cyber mindset begins at initial design concept, continues through product development, and is supported through deployment, including a rapid incident response to meet the comprehensive and evolving cybersecurity environments. Our methods include the ability to provide cyber resilient systems with a range of capabilities to complement the diverse security needs of our customers. We have invested in establishing a centralized dedicated Global Product Security team that is focused on managing our cyber practices with governance to enforce compliance. At Johnson Controls, we are disciplined in executing these as we understand what is at risk if we don’t.

Expert Driven Designs

Having engineering teams trained in cybersecurity has given Johnson Controls an advantage in developing products that consider cybersecurity within its core design. Our certified cybersecurity experts (CISSP, CSSLP, CEH, CCSP etc.) work to validate designs using the latest recognized industry standards and practices. Expert driven cybersecurity designs provide the forethought required to reduce risk.

Lifecycle Management

Our cyber protection approach begins with the design and doesn’t stop once a product is developed – a product secure today may not be secure tomorrow. Through the rapid incident response service, our dedicated cybersecurity team quickly assesses new threats and vulnerabilities and advises customers on how they may reduce their cybersecurity exposure.

Shared Responsibility

Since protecting against cyber threats is a shared responsibility, we engage in market facing programs to provide customer engagement, education, and thought leadership to help our customers achieve success in their mission of a more secure system.

 

Select Security Features

In addition to industry leading standards for cyber and data protection, Tyco Cloud also implements the following security features to support customer security:

·      Encryption at rest and during transmission

·      AES-192-CBC encryption for video security

·      TLS 1.2+ encryption for network transport security

·      No Plugins or Flash

·      Strictly enforce strong user passwords

·      Rotating strong device passwords unique per device

·      Signed firmware from trusted sources for OTA updates

·      Disable all ports/processes outside of Tyco Cloud services

·      HTTPS/SSH only access to services 

·      Monitor all processes to detect intrusion/malware

·      Two-factor setup authentication

·      Latest and strongest cryptography technologies

·      Internal security audits

·      External third-party security audits

·      External third-party pen testing

·      SSL pinning

·      Trusted Certificates

·      Known Reciprocation

·      No default usernames or Passwords allowed

Hosting Infrastructure

The Tyco Cloud software as a service platform runs on Microsoft’s Azure global data center infrastructure. All aspects of data center security infrastructure are ISO27001 and SOC2 compliant operating under the shared responsibility model with Microsoft.

Learn more here:  https://www.microsoft.com/en-us/trustcenter/Compliance/ISO-IEC-27001.

 

Common Security Questions

Security policies and certificates

Is a security policy available for the use of devices by employees?

Yes

Johnson Controls corporate policy

Are regular security awareness training sessions on data and information security carried out with employees? How regularly?

Yes

Minimum once per quarter

Is a CSO (Chief Security Officer) available who can be contacted regarding security-relevant topics?

Yes

Jason Christman (Johnson Controls Vice President, Global Products Cyber Security)

Physical data center and Service Delivery Locations 

Is video surveillance available along the entire perimeter?

Yes

Is a building management system available?

Yes

Is a burglar alarm system installed?

Yes

Is the site monitored 24/7 by an on-site security service?

Yes

Is there a staffed reception desk at which all visitors have to register?

Yes 

Is access to the data center and SDL logged automatically?

Yes

Our services and applications are hosted on Microsoft Azure. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Is two-factor authentication available for access to the data center and SDL? What factors?

Yes

Phone

Are the rooms in the data center and SDL divided into security zones?  (e. g. general spaces, customer reception area, server room)

Yes

Our services and applications are hosted on Microsoft Azure. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Are access permissions for individual security zones granted based on the principle of least privilege?

Yes

Our services and applications are hosted on Microsoft Azure. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Are the data centers clustered? If so, how exactly?  (e. g. continental, regional, metro or campus cluster)

Yes

Azure regions

Is clustering used to avoid data loss?  (e. g. automatic replication)

Yes

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Is the service provided internationally? Which data centers and SDLs are used for this purpose?

Yes

Azure has data centers in over 140 countries

Are the data centers and Service Delivery Locations used the property of the service provider?

No

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Is the building secured against external forces in the event of force majeure? (e. g. tree falls on building, truck drives into building) – ISO 27001

Yes

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Does the data center have windows?

No

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Does the data center and SDL have a fire safety plan? (e. g. early detection systems, fire alarm system, smoke alarms, extinguishing equipment, regular fire drills)

Yes

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Are server racks/rooms protected from physical access? (e. g. by a combination lock)

Yes

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Can it be guaranteed that data processing is permanently carried out at the same location?

Yes

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Would customer be informed of changes to the data center infrastructure? How far in advance?

Yes

This can be discussed in the agreement, but in general it's between 30 - 60 days in advance

Is it possible to carry out pre-announced audits in the data center or service delivery Locations?

Yes

We use Azure data centers. Please refer to https://azure.microsoft.com/en-us/overview/trusted-cloud/

Is it possible to carry out pre-announced penetration tests of the platform?

Yes

 

Processes

Is a change management process established and documented?

Yes 

Are change requests documented, approved by authorized persons and backed up? Is their scope of business impact evaluated?

Yes

Are changes tested in advance in order to allow potential effects to be identified?

Yes

Is a test environment available for change management and is it used for pre-testing?

Yes

We have multiple environments for development, QA, Staging, Pre-Prod and Production.

Are changes to the existing infrastructure (updates) and to the application (new version) communicated to customer? How far in advance?

Yes

This can be discussed in the agreement, but in general it's between 30 - 60 days in advance

Will the discontinuation of the service be communicated to customer?

Yes

This can be discussed in the agreement, but in general it's between 90 - 180 days in advance

Is a patch management process established and documented?

Yes

Are all operating systems, applications and business-critical servers patched within 30 days of a release?

Yes

Are software updates and patches pre-tested in order to enable the early identification of potential effects?

Yes

Is a test environment available for pre-testing the patch management process?

Yes

Is a security incident management process established and documented?

Yes

Please refer to Johnson Controls Cyber Security document (attached)

Are all system-relevant incidents that affect services and systems used for customer directly forwarded to customer?

Yes

Describe your security response plan.

Yes

Please refer to Johnson Controls Cyber Security document (attached)

Can a report on security incidents be provided on a regular basis?

Yes

This can be discussed in the agreement

Is there 24/7 monitoring of the availability of infrastructure for services and resources?

Yes

Are all SLA-relevant events recorded and retained for at least 90 days? Which parameters? (e. g. network capacity, latencies, etc.)

Yes

Is the monitoring evaluated on a monthly basis in the scope of reports? (e. g. SLA report & capacity report)

Yes

Are the activities of the cloud service provider’s administrators recorded and monitored?

Yes

 

Application

Describe the solution architecture, multiple tiers (e.g. database, app, web), network, and technical security controls. Please provide a diagram.

Yes

Please see attached architecture document

Does your network have any single points of failure?  If so describe them.

No

Is a user management process established?

Yes 

Are account passwords able to conform to our password policy?

Yes

We enforce strong complex passwords with a minimum of 8 characters containing two upper-case, two lower case, one special character, and one number.  We can extend our password policy to conform to customer's password policy.

Are generalized user accounts used for access to the systems?

Yes 

Will customer be granted control over the encryption keys?

No

Can customer define the period for which data is retained?

Yes

Is all access automatically logged within the application?

Yes

It is not automatically logged, however it can be easily setup.

Infrastructure

Is a web application firewall used to protect the web infrastructure?

Yes

https://docs.microsoft.com/en-us/azure/application-gateway/waf-overview

Are measures taken to protect against DDOS attacks? What measures?

Yes

We have rate limiting and IP whitelist/blacklist

Is network segmentation used between the management network and the live network?

Yes 

Is it only possible to establish a secured connection to a remote access session? (e. g. SSH, TLS, IPSEC, VPN)

Yes

Is encrypted communication between individual data centers guaranteed? (e. g. in the event that multiple data centers are used)

Yes

Our services and applications are hosted on Microsoft Azure. Please refer to https://docs.microsoft.com/en-us/azure/security/security-network-overview

Is data only exchanged in encrypted form with external service providers that are necessary for the operation of the data center?

Yes 

Do firewall rules have to be activated for the use of the application? Which firewall rules?

No

Our systems communicate via HTTPS and TLS 1.2 over standard port 443.

Is there the option to establish a permanent, secure and encrypted connection between the designated data center and customer? (e. g. VPN via IPsec or MPLS)

Yes

This will require a dedicated cloud instance for customer and custom network security group setup with VPN

Is there a system in place to automatically recognize interrupted connections?

Yes

Can a fixed bandwidth be guaranteed for customer?

Yes

This will require a dedicated cloud instance for customer.

Do database or web servers run on different, dedicated systems or virtual machines?

No

Is it possible to operate all used systems in a dedicated way for customer? What are the exceptions?

Yes

This will require a dedicated installation instance for customer

Are all operating systems, applications and servers hardened? Or will this happen?

Yes

Is the processed data stored in a partition that is independent of the operating system?

Yes

Are the servers secured by a host based IPS?

No

Do the servers support SSL Perfect Forward Secrecy?

Yes

Are all virtual systems used implemented using certified software? (e. g. VM-Ware, MS Hyper-V)

Yes

Are support contracts in place with responsible service providers for all software and hardware components used?

Yes

Are the services provided protected against failure? How?

Yes

All services and applications in the cloud are protected against failure by leveraging Azure technologies.  The gateway appliance server on customer site can be protected against failure using RAIDs and UPS battery.

Are backups carried out regularly? What is stored in the scope of a backup and how often?

Yes

All services and applications in the cloud have automatic backup and replication using Azure technologies.  The gateway appliance server on customer site can backup data to our cloud.

Are backups retained? For how long (months)?

Yes

Depends on the use case

Can customer have an influence on the time and scope of the data backup? To what extent?

Yes

You can select and configure data retention and what data to backup to the cloud.

Is anti-virus software with current virus patterns in use within the environment infrastructure?

Yes

Is incoming, processed and outgoing data checked for viruses?

Yes

 

Business continuity management

Are emergency drills for the failure of critical components (e. g. Internet connection, power supply, network) carried out regularly?

Yes

We use Azure data centers. Please refer to https://docs.microsoft.com/en-us/azure/security/azure-physical-security

Contract design

Are there regular audits and certifications to check and certify data protection with the contractor and the obligations towards the client?

Yes

Is customer obliged to accept fixed service quotas?

No

Will customer have access to data and services in the event customer fails to pay?

No

Customer will have access to data that is stored locally on gateways, but may not have access to video stored on the Cloud.

May you please provided your data retention policy?

Yes

Events data are stored for up to 180 days (can be longer depending on customer needs). Video data are stored locally and/or in the cloud based on available disk space and customer needs.

Is it ensured that the data will actually be deleted upon customer’s request?

Yes

Is a source code deposit available?

Yes

Is the software used linked to a specific platform? Which one?

No

 

Service Level Agreement (SLA)

Can it be contractually ensured that customer will be proactively informed of interruptions or failures that affect the infrastructure used by customer?

Yes 

Are specific maintenance slots and patch days defined for the designated infrastructure?

Yes

customer can schedule updates & patch fixes in coordination with Tyco Cloud

Data protection 

Has a company data protection officer been appointed in writing? (Please specify the contact details and list this person's fields of activity)

Yes

Johnson Controls has Chief Data Privacy Officer

Are employees obligated to comply with data and business confidentiality regulations?

Yes

Are there any policies on data protection law and work instructions regarding the handling of personal data?

Yes

Is it possible to restrict the location for data storage to US or other countries if required due to legal or governmental requirements of customer?

Yes 

Is a sufficient level of data protection provided even outside of the US?

Yes

 

Cloud and eCommerce Services

Are services expose to the Internet? If so list them.  (Examples: HTTP(S), FTP, SSH, etc.)

Yes

HTTPS & SSH

Is Two-Factor Authentication offered? If so, what types?

Yes

Two-factor authentication via SMS and email will be released later this year

Is the service PCI compliant? If yes provide your PCI AOC. If your cart is third party, please provide the vendor's AOC.

Yes

We use Stripe for ecommerce (https://stripe.com/guides/pci-compliance)

Is the solution compliant with PCI standards for new deployments?

Yes

We use Stripe for ecommerce (https://stripe.com/guides/pci-compliance)

Do you use a separate gateway/payment processor?

Yes

We use Stripe for ecommerce (https://stripe.com/guides/pci-compliance)

Is the e-com platform hosted within a single tenant environment?

Yes

We support both single-tenant and multi-tenant deployments

Do you store any customer personal information? If so, please provide details on how this information is protected.

Yes

https://www.johnsoncontrols.com/legal/privacy

How is customer card information secure for data in use, transit, and rest?

Yes

We use Stripe for ecommerce (https://stripe.com/guides/pci-compliance)

Is Denial of Service protection is offered?

Yes

Provide details how sessions are managed, specifically as they relate to transaction and/or shopping cart operation.

Yes

Sessions are managed through short-lived access token. The integration with Stripe is done only on our cloud backend using Stripe API.

  

GDPR Privacy Shield Compliance

Tyco Cloud solutions are certified as Johnson Controls, Sensormatic Electronics LLC under the EU-U.S Privacy Shield and Swiss-U.S. Privacy Shield Frameworks. The Global Public Privacy Notice applicable to Personal Data other than Human Resources data is available here: https://www.johnsoncontrols.com/legal/privacy.