1CRO Amendment (2)
1CRO Amendment (2)
-33004/99
सी.जी.-डी.एल.-अ.-09042024-253632
xxxGIDHxxx
CG-DL-E-09042024-253632
xxxGIDExxx
असाधारण
EXTRAORDINARY
भाग II—खण्ड 3—उप-खण्ड (ii)
PART II—Section 3—Sub-section (ii)
प्राजधकार से प्रकाजित
PUBLISHED BY AUTHORITY
Sr. No. Goods or Articles Indian Standard Title of Indian Standard Essential
(1) (2) (3) (4) Requirement(s)
(5)
41 CCTV Camera IS 13252: Part 1: 2010 Information Technology Essential
Equipment - Safety General Requirement(s) for
Requirements-- CCTV as per Annexure
3. The provisions of “Electronics and Information Technology Goods (Requirements for Compulsory
Registration) Order, 2021” shall apply on the Goods or articles as specified in the column (2) added to the schedule of
the said Order by virtue of this notification, for conforming to the corresponding Essential Requirement(s) as specified
in the column (5), on the expiry of six months from the date of publication of this notification in the Official Gazette.
As per Scheme II of BIS Conformity Assessment Regulations, 2018, submission of test reports from BIS recognized
labs, shall form a pre -requisite for obtaining license to use Standard Mark.
[F.No. W-43/11/2021-IPHW]
ASHA NANGIA, Group Coordinator & Scientist 'G'
Annexure
Essential Requirement(s) for Security of CCTV
Securing a CCTV (Closed-Circuit Television) system is crucial to protect sensitive information and ensure
the system operates effectively. Key areas of testing include exposed network services, device communication
protocols, physical access to the device’s UART, JTAG, SWD, etc., the ability to extract memory and firmware,
firmware update process security and storage and encryption of data. Here are brief requirements for the security of a
CCTV system:
1. Physical Security - Use tamper-resistant camera enclosures and locking mechanisms to deter physical
tampering.
2. Access Control by Authentication, Role-Based Access Control (RBAC) and regularly review and update
access permissions to reflect personnel changes.
3. Network Security by employing encryption of data transmission
4. Software Security by Regular Updates, Disable Unused Features and Strong Password Policies
5. Penetration Testing: Employ penetration testing to assess the system's resistance to cyberattacks and address
vulnerabilities.
Essential Security Requirements
1.4 Verify that Identifying whether The vendor shall provide the
trusted execution TEE/SE/TPM is available following:
is implemented or not in the device 1. Datasheet of the SoC
and enabled, if through the SoC datasheet being used in the device.
available on the and technical
device SoC or documentation submitted 2. User manual/ Technical
CPU. by the vendor. specifications of the device
Further assessment is
done on the basis of 3. Code snippets of the TEE
scenarios as applicable to API call, wherever
device as defined below: applicable
CASE 1: TEE/SE/TPM
is not available:
No further assessment
CASE 2: TEE/SE/TPM
is available and enabled:
Verification through
code-review that crypto
functions are called
through TEE/SE/TPM
APIs.
CASE 3: TEE/SE/TPM
is available but not
enabled by the vendor:
Termed as non-
conformance to the
requirement. OEM is
required to enable and
implement the
TEE/SE/TPM.
1.5 Verify that Identifying all the keys Vendor shall submit the
sensitive data, and certificates being following:
private keys and used in the device eco- 1. List of all keys and
certificates are system, sensitive data and certificates being used in the
stored securely in their storage device ecosystem
a Secure Element, mechanism(s); and 2. List of all the sensitive
TPM, TEE verification through: data with their intended
(Trusted • Testing, in usage and secure storage
Execution presence of mechanism(s) as
Environment), or OEM team implemented along with
protected using • Code review secure configurations to be
strong enabled in the device.
• Process audit of
cryptography. 3. Key management life
the key-life cycle
process cycle (purpose, generation,
storage,
destruction/zeroization,
validity, key
changeover/rotation) private
keys and certificates.
1.6Verify the Testing, in presence of Vendor shall submit the
presence of OEM team, to verify the following:
tamper resistance measures implemented in 1. Measures available in the
and/or tamper the device to prevent device to prevent software
detection software and hardware tampering.
features. tampering. 2. Measures available in the
device to prevent hardware
tampering.
1.7 Verify that Testing, in presence of Vendor shall submit the
any available OEM team, to verify the following:
Intellectual enabling of the 1. Datasheet of the SoC
[भाग II—खण्ड 3(ii)] भारत का रािपत्र : असाधारण 5
Property Intellectual Property 2. Documentation regarding
protection protection technologies the Intellectual Property
technologies provided by the chip protection technologies
provided by the manufacturer, if available. provided by the chip
2.11 Verify that Verification shall be done Vendor shall provide the
firmware can as per the applicable following:
perform scenario: 1. Modes of updates
automatic Case 1: Automatic OTA available i.e. automatic,
firmware updates updates are available: manual or both.
upon a predefined A standard operating 2. Organizational process
schedule. procedure for issuing and policies regarding the
automatic issuing of updates to the
updates/upgrades to the devices.
in-field devices is
required to be submitted
by the vendor which can
then be evaluated by the
evaluation agency as per
C20, C21 and C22
security requirement of
OWASP open standard.
Case 2: Automatic OTA
updates are not
available and vendor
provides manual
updates:
A standard operating
procedure for issuing
manual updates/upgrades
to the in-field devices is
required to be submitted
by the vendor which can
then be evaluated by the
evaluation agency as per
C20, C21 and C22
security requirement of
OWASP open standard.
3. Secure Process 3.1 Verify that Testing, in presence of Vendors shall provide the
Conformance wireless OEM team, to verify the documentation regarding the
communications process of mutual process of mutual
are mutually authentication as laid authentication as
authenticated. down in the implemented in the device
documentation by the when wireless
vendor. communications are
initiated.
In case, the device does not
support wireless
communications, the vendor
shall provide a declaration
for the same.
3.2 Verify that Identifying all the security Vendors shall provide the
wireless mechanisms being used in documentation regarding the
communications the communication security measures
are sent over an process verification implemented in the device to
encrypted through: prevent tampering of the data
[भाग II—खण्ड 3(ii)] भारत का रािपत्र : असाधारण 11
channel. • Testing, in being sent through wireless
presence of mode of communication.
OEM team
• Code review In case, the device does not
• Process audit of support wireless
the key-life cycle communications, the vendor
process shall provide a declaration
for the same.
3.3 Verify that Vendor shall submit Bill of
whether trusted materials for critical
sources are being hardware components
used for sourcing (related to security functions
the components like SoC).
of the device i.e.
trusted supply
chain through a
managed Bill of
materials for
critical hardware
components
(related to
security functions
like SoC) is in
use.
3.4 Supply chain Vendor shall submit the
risk following:
identification, Supply chain risk
assessment, identification, assessment,
prioritization, and prioritization, and mitigation
mitigation shall documents.
be conducted. Supply chain risk/business
Supply chain continuity planning policy
risk/business documents, playbooks
continuity reflecting how to handle
planning policy supply chain disruption,
documents, post-incident summary
playbooks documents.
reflecting how to
handle supply
chain disruption,
post-incident
summary
documents need
to be submitted
and demonstrate
the same.
3.5 Verify the no Document for Network
proprietary protocols used in the device.
network protocols
are being used in
the device. If yes,
then complete
implementation
details and the
source code for
the same shall be
provided.
4. Security 4.1 Design and Design and architecture
Conformance at architecture documents till the PCBA and
details till the SoC level.
PCBA and SoC
12 THE GAZETTE OF INDIA : EXTRAORDINARY [PART II—SEC. 3(ii)]
product level to be
development stage provided to aid in
counterfeit
mitigation and
malware
detection.
4.2 Threat Process and method
mitigation artifacts need to be
strategies for submitted and
tainted and demonstrate the same.
counterfeit
products shall be
implemented as
part of product
development.
4.3 One or more List of components that
up-to-date have been identified as
malware requiring tracking targets
detection tools of tainting/counterfeiting,
shall be deployed CM tool.
as part of the Quality assurance process
code acceptance need to be submitted and
and development demonstrate the same.
processes.
Malware
detection
techniques shall
be used before
final packaging
and delivery (e.g.,
scanning finished
products and
components for
malware using
one or more up-
to-date malware
detection tools).
4.4 Supply chain Supply chain risk/business
risk continuity planning policy
identification, documents, playbooks
assessment, reflecting how to handle
prioritization, and supply chain disruption,
mitigation shall post-incident summary
be conducted. documents need to be
submitted and demonstrate
the same.
Uploaded by Dte. of Printing at Government of India Press, Ring Road, Mayapuri, New Delhi-110064
and Published by the Controller of Publications, Delhi-110054.