{"id":29863,"date":"2023-07-17T11:52:07","date_gmt":"2023-07-17T18:52:07","guid":{"rendered":"https:\/\/stage.blog.logitech.com\/?p=29863"},"modified":"2024-07-02T12:02:49","modified_gmt":"2024-07-02T19:02:49","slug":"product-security-at-logitech","status":"publish","type":"post","link":"https:\/\/www.logitech.com\/blog\/2023\/07\/17\/product-security-at-logitech\/","title":{"rendered":"Product Security at Logitech"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">At Logitech, we make products that live inside your home and business. Since you type your passwords on our keyboards, navigate your ecommerce sites using our mice, record your lives using our cameras, talk to others using our headsets and video conferencIng products, it is our core belief that our products should be safe and secure as they interact with your lives.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Logitech has an established internal Product Security Review Board (PSRB) comprising employees with relevant experience and expertise. The PSRB defines the policies and practices that all our product teams must adhere to and follows security best practices. We define a security vulnerability as an unintended weakness in a product that could allow a malicious actor to compromise the integrity, availability, or confidentiality of a product or service. We adopt a life-cycle approach to managing this risk. Relevant security risks are identified early in the design process, via our established risk assessment process. Appropriate security measures are developed to address any such risks and vulnerabilities, and embedded into the product design as it evolves. This may include incorporating encryption, digital signatures, strong authentication and authorization, and network security, as needed, based on each product\u2019s data and network access needs. We carry out security testing prior to product launch and the Chairperson of the PSRB has the authority to halt the launch of any new product or service if the product security standards are not met. The PSRB reviews and provides final approval on the security design for new products under development.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We also welcome reports from independent researchers, industry organizations, vendors, customers, and other relevant stakeholders and sources post-launch. For this purpose, we run a public <\/span><a href=\"https:\/\/hackerone.com\/logitech\"><span style=\"font-weight: 400;\">Vulnerability Disclosure and Bug Bounty Program<\/span><\/a><span style=\"font-weight: 400;\"> and facilitate the receipt of such reports through our <\/span><a href=\"https:\/\/www.logitech.com\/security\"><span style=\"font-weight: 400;\">security reporting process<\/span><\/a><span style=\"font-weight: 400;\">. All submissions to this platform are reviewed by the appropriate security team members and are investigated further to determine the appropriate remedy, with an appropriate reward paid to the relevant reporter.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to the internal Secure Software Development Lifecycle Process, Logitech is also an active participant in industry efforts to bake security into the core standards that our products use. Through our active participation in the Product Security Working Group (PSWG) and <\/span><a href=\"https:\/\/csa-iot.org\/all-solutions\/matter\/\"><span style=\"font-weight: 400;\">Matter<\/span><\/a><span style=\"font-weight: 400;\"> Working Group within the <\/span><a href=\"https:\/\/csa-iot.org\/\"><span style=\"font-weight: 400;\">Connectivity Standards Alliance<\/span><\/a><span style=\"font-weight: 400;\"> (CSA), we continue to work with others in the industry to write and certify the standards by which next generation products will operate. Through these efforts, we remain committed to providing our customers with safe and secure products.\u00a0\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Logitech, we make products that live inside your home and business. Since you type your passwords on our keyboards, navigate your ecommerce sites using our mice, record your lives using our cameras, talk to others using our headsets and video conferencIng products, it is our core belief that our products should be safe and [&hellip;]<\/p>\n","protected":false},"author":116,"featured_media":28038,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2853,3250],"tags":[],"class_list":["post-29863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","category-product"],"_links":{"self":[{"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/posts\/29863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/users\/116"}],"replies":[{"embeddable":true,"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/comments?post=29863"}],"version-history":[{"count":1,"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/posts\/29863\/revisions"}],"predecessor-version":[{"id":29864,"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/posts\/29863\/revisions\/29864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/media\/28038"}],"wp:attachment":[{"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/media?parent=29863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/categories?post=29863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.logitech.com\/blog\/wp-json\/wp\/v2\/tags?post=29863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}