Équipement de CVC
  • Champion
Sécurité
  • American Dynamics
  • DSC
  • Tyco Logo with Exacq Cloud Brand
  • Illustra
Réfrigération industrielle
Lutte Contre Le Feu
  • Chemguard
  • Pyro-Chem
  • RapidResponse
Solutions de vente au détail
Automatisation et contrôles du bâtiment
  • BCPRO
  • VERASYS
Détection d'incendie
  • Autocall
  • CWSI
  • Vigilant
  • Zettler

Annuaire Global

Équipement de CVC
  • Champion
Sécurité
  • American Dynamics
  • DSC
  • Tyco Logo with Exacq Cloud Brand
  • Illustra
Réfrigération industrielle
Lutte Contre Le Feu
  • Chemguard
  • Pyro-Chem
  • RapidResponse
Solutions de vente au détail
Automatisation et contrôles du bâtiment
  • BCPRO
  • VERASYS
Détection d'incendie
  • Autocall
  • CWSI
  • Vigilant
  • Zettler

Annuaire Global

Products and Solutions

Securing Your Building — and Keeping It Safe

As part of OpenBlue Secure — and built on our deep experience and customer focus — our products and solutions help you manage cybersecurity risks for your smart buildings.

Here’s how Cyber Solutions from Johnson Controls can help you secure your systems and data:

 

Safeguards

Johnson Controls products are developed using a secure-by-design approach. Security features for each solution are selected based on the application and environment they are targeted for.

Here are just a few examples of the advanced safeguards and assurances you can find within our solutions:



Zero-Trust Architecture

With zero-trust architecture, granular access controls and micro-segmentation is managed to reduce the attack surface and provides protection against unauthorized access, lateral movement and malware propagation.

Zero-Trust Micro-segmentation

Remote Access/Software Defined Perimeter (SDP)

  • Segment and protect critical assets: Create and manage virtual air gap encryption end-to-end.
  • Reduce Attack Surface: We reduce the entry points where unauthorized users can enter by hardening and cloaking our devices. This makes them invisible.
  • Prevent Lateral Movement: Contain malware and ransomware attacks, while preventing insiders from gaining unauthorized access.

Secure Boot

Protecting a device starts at boot time with protection spanning the hardware and software stack. Secure boot ensures that a device starts using only unaltered software that is trusted by the Original Equipment Manufacturer (OEM).

Examples: Metasys, Illustra, iSTAR Door Controller

Encrypted Video Streams

Video from surveillance systems is often considered sensitive data. By encrypting the video streams customers can have the assurance that privacy is maintained.


ExamplesVideoEdge, Illustra

Health Dashboards

Helps administrators understand and address potential concerns. Identify issues such as:

  • Out-of-date software
  • Users with access credentials
  • User lockout policies that could be strengthened
  • Under protected configurations

ExamplesMetasys, Metasys Cyber Health Video and DemoVideoEdge

ISASecure Component Security Assurance (CSA) Certification

Conformance with IEC/ISA 62443-4-2 ensures that product and solutions have sufficient safeguards within the software applications and embedded devices have sufficient safeguards according to appropriate security levels. 

Examples: York Chillers

FIPS 140-2 Compliance

Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing for increasing, qualitative levels intended to cover a wide range of potential applications and environments.

Examples:
MetasysiSTAR Door Controller

Key Elements of Our Security Programs

panels

Want to sign up to receive product security advisory notifications by email?

Register to be Added to our Communications List

Stay one step ahead with our news and insights.

See All Insights
Johnson Controls headquarters in Cork, Ireland
Standards and Compliance

Global Privacy Certifications

Johnson Controls creates solutions which respect global fair information practices and Privacy by Design.

 

     

       

 

 

 

 

 

Cloud Solutions – OpenBlue and others

OpenBlue is a complete suite of connected smart building solutions, from edge to cloud. OpenBlue and other cloud-based solutions from Johnson Controls hosted in Microsoft Azure, Google Cloud or Amazon Web Services are protected environments that conform to industry recognized standards, such as:

  • ISO 27001 – Information Security
  • ISO 27017 – Information Security for Cloud Services
  • ISO 27018 – Code of Practice for Personal Data in the Cloud
  • SOC 1, 2, 3 – Service Organization Controls – Safeguarding Confidentiality and Privacy of Information Stored and Processed in the Cloud

Additional security compliance information for these environments is available at:

        


How can we help you?

For everything from asking a question to raising an alarm, please use this form for a quick response from our Johnson Controls cybersecurity organization.

Report a potential vulnerability or cybersecurity concern | Ask about Products and Services | Learn about protecting your smart building

If you are aware of a potential security vulnerability in a Johnson Controls product, service or solution, or have a product security question, please contact us at productsecurity@jci.com.

Please use a downloadable PGP key to secure communications.

When submitting a concern, please include the following information:

  • Complete product name and version
  • Description of the concern or the potential vulnerability and the steps necessary for our staff to reproduce
  • A brief description of the potential impact
  • A reliable method to contact you
  • Supporting documentation, if available

Thanks to all who partner with us to create a smarter, safer, more sustainable world.

Product Security Advisories

Johnson Controls tracks, identifies and proactively addresses ever-evolving cybersecurity threats every day – it’s a top priority. This commitment is reflected in our technology innovations and continual product development to keep building management systems, IT infrastructures, and connected equipment secure.

Our dedicated cybersecurity team works with local professionals to address your concerns and immediate threats to system security. We encourage a partnership that follows best practices for IT security.

     * Cliquez ici pour lire la politique de confidentialité de Johnson Controls.