{"id":3416,"date":"2023-11-01T16:28:09","date_gmt":"2023-11-01T16:28:09","guid":{"rendered":"https:\/\/www.onvif.org\/blog\/?p=3416"},"modified":"2025-06-10T12:51:24","modified_gmt":"2025-06-10T12:51:24","slug":"back-to-cyber-basics-tls","status":"publish","type":"post","link":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/","title":{"rendered":"Back to cyber basics: TLS"},"content":{"rendered":"\n<p>The security of security systems has never been more important, with billions of security sensors and other edge devices connected to the Internet.&nbsp;<\/p>\n\n\n\n<p>One important fundamental aspect of securing a system that can sometimes be overlooked is protecting the communications between devices and software clients. The need for secure communication has been growing in demand and serves as the driver behind the new <a href=\"https:\/\/www.onvif.org\/profiles\/add-on\/tls-configuration-add-on-release-candidate\/\">ONVIF TLS (Transport Layer Security) Configuration Add-on<\/a>, set to be released later this year.<\/p>\n\n\n\n<p>TLS provides end-to-end encryption and authentication for data transmission over the Internet. When enabled, TLS ensures that data is encrypted before it is transmitted between different network security system components, making it unreadable to anyone who intercepts the data. It also verifies the identity of the server, preventing man-in-the-middle attacks where someone pretending to be the server may try to steal information or compromise data.&nbsp;<\/p>\n\n\n\n<p>In addition to encryption and authentication, using TLS can also provide increased speed and reliability of data transmission. It reduces the risk of data loss and corruption during transmission, ensuring that the data is delivered in a timely and accurate manner.<\/p>\n\n\n\n<p>Once released, support for ONVIF TLS Configuration Add-on can be incorporated into ONVIF conformant products. It will enable software clients, such as a VMS, that are conformant to the add-on to be able to configure and update the TLS settings on a camera or other device with support for the add-on.&nbsp;<\/p>\n\n\n\n<p>Using the data encryption, authentication and integrity offered by TLS in conjunction with other basic cybersecurity best practices can make the difference between a strong cybersecurity foundation and a vulnerable security system.&nbsp;<\/p>\n\n\n\n<p>Want to learn more about the ONVIF TLS Add-on (Release Candidate)? Find out more at <a href=\"https:\/\/www.onvif.org\/profiles\/add-on\/tls-configuration-add-on-release-candidate\/.\">https:\/\/www.onvif.org\/profiles\/add-on\/tls-configuration-add-on-release-candidate\/.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The security of security systems has never been more important, with billions of security sensors and other edge devices connected to the Internet.&nbsp; One important fundamental aspect of securing a system that can sometimes be overlooked is protecting the communications between devices and software clients. The need for secure communication has been growing in demand&#8230;<\/p>\n","protected":false},"author":10,"featured_media":3417,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Back to cyber basics: TLS<\/title>\n<meta name=\"description\" content=\"ONVIF TLS add-on part of cybersecurity best practices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Back to cyber basics: TLS\" \/>\n<meta property=\"og:description\" content=\"ONVIF TLS add-on part of cybersecurity best practices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/\" \/>\n<meta property=\"og:site_name\" content=\"ONVIF Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-01T16:28:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T12:51:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1418\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ONVIF\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ONVIF\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/\"},\"author\":{\"name\":\"ONVIF\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\"},\"headline\":\"Back to cyber basics: TLS\",\"datePublished\":\"2023-11-01T16:28:09+00:00\",\"dateModified\":\"2025-06-10T12:51:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/\"},\"wordCount\":297,\"image\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/\",\"url\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/\",\"name\":\"Back to cyber basics: TLS\",\"isPartOf\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg\",\"datePublished\":\"2023-11-01T16:28:09+00:00\",\"dateModified\":\"2025-06-10T12:51:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\"},\"description\":\"ONVIF TLS add-on part of cybersecurity best practices\",\"breadcrumb\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage\",\"url\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg\",\"contentUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg\",\"width\":2560,\"height\":1418},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.onvif.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Back to cyber basics: TLS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#website\",\"url\":\"https:\/\/www.onvif.org\/blog\/\",\"name\":\"ONVIF Blog\",\"description\":\"ONVIF Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.onvif.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\",\"name\":\"ONVIF\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g\",\"caption\":\"ONVIF\"},\"url\":\"https:\/\/www.onvif.org\/blog\/author\/onvif\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Back to cyber basics: TLS","description":"ONVIF TLS add-on part of cybersecurity best practices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/","og_locale":"en_US","og_type":"article","og_title":"Back to cyber basics: TLS","og_description":"ONVIF TLS add-on part of cybersecurity best practices","og_url":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/","og_site_name":"ONVIF Blog","article_published_time":"2023-11-01T16:28:09+00:00","article_modified_time":"2025-06-10T12:51:24+00:00","og_image":[{"width":2560,"height":1418,"url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg","type":"image\/jpeg"}],"author":"ONVIF","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ONVIF","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#article","isPartOf":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/"},"author":{"name":"ONVIF","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d"},"headline":"Back to cyber basics: TLS","datePublished":"2023-11-01T16:28:09+00:00","dateModified":"2025-06-10T12:51:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/"},"wordCount":297,"image":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/","url":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/","name":"Back to cyber basics: TLS","isPartOf":{"@id":"https:\/\/www.onvif.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage"},"image":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg","datePublished":"2023-11-01T16:28:09+00:00","dateModified":"2025-06-10T12:51:24+00:00","author":{"@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d"},"description":"ONVIF TLS add-on part of cybersecurity best practices","breadcrumb":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#primaryimage","url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg","contentUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg","width":2560,"height":1418},{"@type":"BreadcrumbList","@id":"https:\/\/www.onvif.org\/blog\/2023\/11\/01\/back-to-cyber-basics-tls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.onvif.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Back to cyber basics: TLS"}]},{"@type":"WebSite","@id":"https:\/\/www.onvif.org\/blog\/#website","url":"https:\/\/www.onvif.org\/blog\/","name":"ONVIF Blog","description":"ONVIF Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.onvif.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d","name":"ONVIF","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g","caption":"ONVIF"},"url":"https:\/\/www.onvif.org\/blog\/author\/onvif\/"}]}},"jetpack_featured_media_url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/11\/AdobeStock_229146668-fotor-2023110112844-scaled.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/comments?post=3416"}],"version-history":[{"count":2,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3416\/revisions"}],"predecessor-version":[{"id":3419,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3416\/revisions\/3419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/media\/3417"}],"wp:attachment":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/media?parent=3416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/categories?post=3416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/tags?post=3416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}