Cyber icons

Cybersecurity within our Organization

To maintain the robustness of our cybersecurity program, we employ the following resources and practices.

Technical Expertise

Technical Director for Product Cybersecurity & CISO

Dedicated secure development lifecycle (SDL) team

Acquisition of a large team of cybersecurity experts with a proven track record

In-house “Red Team” & Vulnerability researchers

External partnership with an industry-leading Incidence Response Team (IRT)

factory icon

Supply Chain Controls

Vendor vetting process for hardware component suppliers (HBOM)

End-to-end software development in EU and Israel for inverters and for SolarEdge ONE Controllers

Security analysis of 3rd party code

Manufacturing site cybersecurity review process

certification icon shield icon

Organizational Practices

Cyber awareness training for all new employees as part of their on-boarding program, is coupled with an annual cybersecurity online training course, mandatory for all global employees.

Third party certification to ISO 27001 Information Security Management Standard for company-wide IT infrastructure and digital assets. Our products are certified to ETSI 303-645, The Radio Equipment Directive (RED) 2014/52/EU and is compliant with the UK PSTI law.

Recurring penetration testing & mitigation work plan

Secure coding training

Continuous security events monitoring in our security operations center

Incident response policies and procedures

Vulnerability Disclosure Program for external researchers (Bug Bounty)

Ad-hoc updates sent to all employees on cybersecurity risks and threats

Protection of main online platforms against Denial-of-Service attacks (that prevent legitimate use of our services) and Denial-of-Wallet attacks

Information Security Due Diligence

We recently began undertaking information security assessments for new suppliers in an effort to ensure compliance with our requirements. These assessments cover several topics, including but not limited to- regulatory and standard compliance, information access protocols and controls, information protection, network security, physical protection, security controls, and event management and reporting. In cases of non-compliance, we formulate a corrective action plan with suppliers. We plan to expand this practice and include all major suppliers in the future.

 

SolarEdge has not experienced any material information security breaches in the past three years and minor issues have been reported to our Audit Committee. The company has not been subject to any information security breach penalties or settlement payments in the same three-year period. SolarEdge has not experienced a third-party material security breach within the last year that impacted our business.

SolarEdge is an active participant in various technical committees devising international regulatory cyber standards. For further information see section Powering the World through Positive Policy’. We design our solutions in line with such future regulations.

Cybersecurity for our Customers

SolarEdge is committed to continuous cybersecurity improvement. We actively monitor cybersecurity trends, adopt industry best practices, and collaborate with security researchers to enhance our defenses.

To safeguard system connectivity, functionality, and customer data, SolarEdge follows the Cyber Informed Engineering (CIE) principle, embedding information security mechanisms into its products from initial design stages. We apply proactive security measures, perform continuous monitoring, and practice rapid incidence response if an incidence should occur.

Our Product Cybersecurity methodology is based on four pillars:

Unique device passwords per inverter

Restrictions on remote access, allowing pre-authorized users only

Detection and prevention of run-time anomalies by an embedded security agent

Built-in security features such as casual Wi-Fi scanning protections

Static code analysis procedures

3rd party penetration testing of the device

All SolarEdge inverters receive over-the-air security updates upon request, ensuring customers have secure access to signed software and firmware updates

Device Security

The underlying cornerstone of cybersecurity is the product itself. To ensure device security, SolarEdge embeds features such as:

SolarEdge’s security methodology empowers Commercial & Industrial customers’ IT and security teams to monitor their energy assets in real-time. To secure these systems -

Visibility & Control

All communications between the gateway and the SolarEdge server are encrypted and channeled through a single port (443)

Our devices contain enhanced security features, designed to block any remote action on the inverter, unless temporary access is granted by authorized personnel physically present at the device

SolarEdge devices also collect robust security logs on failed log-in attempts, system crashes and general system performance

Data analyzed at SolarEdge’s SOC (Security Operations Center) can be made available to customer IT teams

A critical point for protection in commercial installations is the connection between the customer’s PV system and the company’s IT network. To secure this connection, SolarEdge implements several measures:

Network Security

We direct the data flows of the entire PV system through a single point of entry, via the SolarEdge Local Controller, or via the SolarEdge Inverter in smaller installations

All communications passing through the gateway are inspected and analyzed, and a masking feature enhances protection by making it inaccessible, even if an intrusion attempt is made within the same LAN

Connected SolarEdge inverters do not store sensitive information and can be fully wiped of all configuration data in a factory reset

System-generated data is stored on-premises at a dedicated SolarEdge operated data center in Germany

We implement a comprehensive backup cycle to protect our customers’ data and store it with multiple redundancies

Best practice encryption and authentication are in place for a system to access the server

Data Security

To maintain security of our customers data, we ensure the following:

As solar energy emerges as a dominant source of power, installations are considered a significant part of the critical infrastructure in many countries. Grid participation, system maintenance and PV monitoring require heavy reliance on communications technology, and so protecting information integrity and reliability is of paramount importance.

With this in mind, SolarEdge launched a Cybersecurity Program aimed to safeguard its customers, itself, and to raise cybersecurity standards for the entire PV industry.  

This program combines the efforts of the Chief Information Security Officer and his team, responsible for corporate protection, with those of the Chief Data and Digital Officer who leads the Product Security roadmap. The management team provides quarterly updates to the Technology Committee and annually to the full Board regarding cybersecurity activities and other developments that impact our digital security, in keeping with our high organizational focus on this issue.

Data Privacy

By adhering to these principles and implementing all the above-described practices, SolarEdge reaffirms its commitment to privacy compliance and its dedication to protecting the privacy rights of all stakeholders. We believe that integrating privacy considerations into our business frameworks strengthens our accountability, transparency, and trustworthiness as a responsible corporate actor.

Transparency: We are transparent about the types of personal data we collect, how we use it, and with whom we share it. We provide clear and easily accessible information about our data processing activities through our privacy policies and communications channels. For further information see our Privacy Policy.

Lawfulness, Fairness, and Purpose Limitation: We collect and process personal data in accordance with all relevant applicable laws and regulations worldwide. We ensure that personal data is obtained and used fairly, and only for specified and legitimate purposes. We do not use personal data for purposes incompatible with the initial one without obtaining appropriate consent or other legal basis.

Data Minimization and Accuracy: We collect and retain only the personal data necessary for the activities we execute on a lawful basis, and we take steps to ensure its accuracy and relevance. We regularly review and update our data collection processes to minimize the amount of personal data collected and to ensure its quality and accuracy.

Security and Confidentiality: We implement appropriate technical and organizational measures to protect personal data against unauthorized access, disclosure, alteration, or destruction. We restrict access to personal data to authorized personnel who have a legitimate need to know and who are bound by confidentiality obligations.

Data Subject Rights: We respect the rights of individuals regarding their personal data, including the rights to access, rectify, erase, restrict processing, and portability, as well as the right to object to processing. We have established procedures for responding to data subject requests and inquiries in a timely and effective manner.

Accountability and Governance: We have a designated Data Protection Officer in our organization who is responsible for overseeing our activities on personal data and ensuring compliance with all applicable privacy laws and regulations. We conduct periodic assessments and audits of our privacy practices to identify and address any compliance gaps or risks.

At SolarEdge, we are committed to upholding the highest standards of privacy compliance in all aspects of our operations. We recognize the importance of protecting the personal data and privacy rights of our stakeholders, including employees, customers, suppliers, and investors, and we are dedicated to ensuring that our activities align with all applicable privacy laws and regulations. SolarEdge is fully compliant with the requirements of the GDPR.

Our commitment to privacy compliance encompasses the following principles:

Cybersecurity
and Data Privacy

Join the SolarEdge Conversation

 

 

 

Contact our sustainability / ESG team

How can we help you?

 

Join the SolarEdge Conversation

 

 

 

Contact our sustainability / ESG team

How can we help you?

 

shield icon certification icon

Information Security Due Diligence

We recently began undertaking information security assessments for new suppliers in an effort to ensure compliance with our requirements. These assessments cover several topics, including but not limited to- regulatory and standard compliance, information access protocols and controls, information protection, network security, physical protection, security controls, and event management and reporting. In cases of non-compliance, we formulate a corrective action plan with suppliers. We plan to expand this practice and include all major suppliers in the future.

 

SolarEdge has not experienced any material information security breaches in the past three years and minor issues have been reported to our Audit Committee. The company has not been subject to any information security breach penalties or settlement payments in the same three-year period. SolarEdge has not experienced a third-party material security breach within the last year that impacted our business.

SolarEdge is an active participant in various technical committees devising international regulatory cyber standards. For further information see section Powering the World through Positive Policy’. We design our solutions in line with such future regulations.

factory icon

Supply Chain Controls

Vendor vetting process for hardware component suppliers (HBOM)

End-to-end software development in EU and Israel for inverters and for SolarEdge ONE Controllers

Security analysis of 3rd party code

Manufacturing site cybersecurity review process

Organizational Practices

Cyber awareness training for all new employees as part of their on-boarding program, is coupled with an annual cybersecurity online training course, mandatory for all global employees.

Third party certification to ISO 27001 Information Security Management Standard for company-wide IT infrastructure and digital assets. Our products are certified to ETSI 303-645, The Radio Equipment Directive (RED) 2014/52/EU and is compliant with the UK PSTI law.

Recurring penetration testing & mitigation work plan

Secure coding training

Continuous security events monitoring in our security operations center

Incident response policies and procedures

Vulnerability Disclosure Program for external researchers (Bug Bounty)

Ad-hoc updates sent to all employees on cybersecurity risks and threats

Protection of main online platforms against Denial-of-Service attacks (that prevent legitimate use of our services) and Denial-of-Wallet attacks

Cybersecurity within our Organization

Technical Expertise

Technical Director for Product Cybersecurity & CISO

Dedicated secure development lifecycle (SDL) team

Acquisition of a large team of cybersecurity experts with a proven track record

In-house “Red Team” & Vulnerability researchers

External partnership with an industry-leading Incidence Response Team (IRT)

To maintain the robustness of our cybersecurity program, we employ the following resources and practices.

By adhering to these principles and implementing all the above-described practices, SolarEdge reaffirms its commitment to privacy compliance and its dedication to protecting the privacy rights of all stakeholders. We believe that integrating privacy considerations into our business frameworks strengthens our accountability, transparency, and trustworthiness as a responsible corporate actor.

Transparency: We are transparent about the types of personal data we collect, how we use it, and with whom we share it. We provide clear and easily accessible information about our data processing activities through our privacy policies and communications channels. For further information see our Privacy Policy.

Lawfulness, Fairness, and Purpose Limitation: We collect and process personal data in accordance with all relevant applicable laws and regulations worldwide. We ensure that personal data is obtained and used fairly, and only for specified and legitimate purposes. We do not use personal data for purposes incompatible with the initial one without obtaining appropriate consent or other legal basis.

Data Minimization and Accuracy: We collect and retain only the personal data necessary for the activities we execute on a lawful basis, and we take steps to ensure its accuracy and relevance. We regularly review and update our data collection processes to minimize the amount of personal data collected and to ensure its quality and accuracy.

Security and Confidentiality: We implement appropriate technical and organizational measures to protect personal data against unauthorized access, disclosure, alteration, or destruction. We restrict access to personal data to authorized personnel who have a legitimate need to know and who are bound by confidentiality obligations.

Data Subject Rights: We respect the rights of individuals regarding their personal data, including the rights to access, rectify, erase, restrict processing, and portability, as well as the right to object to processing. We have established procedures for responding to data subject requests and inquiries in a timely and effective manner.

Accountability and Governance: We have a designated Data Protection Officer in our organization who is responsible for overseeing our activities on personal data and ensuring compliance with all applicable privacy laws and regulations. We conduct periodic assessments and audits of our privacy practices to identify and address any compliance gaps or risks.

Data Privacy

At SolarEdge, we are committed to upholding the highest standards of privacy compliance in all aspects of our operations. We recognize the importance of protecting the personal data and privacy rights of our stakeholders, including employees, customers, suppliers, and investors, and we are dedicated to ensuring that our activities align with all applicable privacy laws and regulations. SolarEdge is fully compliant with the requirements of the GDPR.

Our commitment to privacy compliance encompasses the following principles:

SolarEdge’s security methodology empowers Commercial & Industrial customers’ IT and security teams to monitor their energy assets in real-time. To secure these systems -

Visibility & Control

All communications between the gateway and the SolarEdge server are encrypted and channeled through a single port (443)

Our devices contain enhanced security features, designed to block any remote action on the inverter, unless temporary access is granted by authorized personnel physically present at the device

SolarEdge devices also collect robust security logs on failed log-in attempts, system crashes and general system performance

Data analyzed at SolarEdge’s SOC (Security Operations Center) can be made available to customer IT teams

SolarEdge is committed to continuous cybersecurity improvement. We actively monitor cybersecurity trends, adopt industry best practices, and collaborate with security researchers to enhance our defenses.

To safeguard system connectivity, functionality, and customer data, SolarEdge follows the Cyber Informed Engineering (CIE) principle, embedding information security mechanisms into its products from initial design stages. We apply proactive security measures, perform continuous monitoring, and practice rapid incidence response if an incidence should occur.

Our Product Cybersecurity methodology is based on four pillars:

Unique device passwords per inverter

Restrictions on remote access, allowing pre-authorized users only

Detection and prevention of run-time anomalies by an embedded security agent

Built-in security features such as casual Wi-Fi scanning protections

Static code analysis procedures

3rd party penetration testing of the device

All SolarEdge inverters receive over-the-air security updates upon request, ensuring customers have secure access to signed software and firmware updates

Device Security

The underlying cornerstone of cybersecurity is the product itself. To ensure device security, SolarEdge embeds features such as:

A critical point for protection in commercial installations is the connection between the customer’s PV system and the company’s IT network. To secure this connection, SolarEdge implements several measures:

Network Security

We direct the data flows of the entire PV system through a single point of entry, via the SolarEdge Local Controller, or via the SolarEdge Inverter in smaller installations

All communications passing through the gateway are inspected and analyzed, and a masking feature enhances protection by making it inaccessible, even if an intrusion attempt is made within the same LAN

Connected SolarEdge inverters do not store sensitive information and can be fully wiped of all configuration data in a factory reset

System-generated data is stored on-premises at a dedicated SolarEdge operated data center in Germany

We implement a comprehensive backup cycle to protect our customers’ data and store it with multiple redundancies

Best practice encryption and authentication are in place for a system to access the server

Data Security

To maintain security of our customers data, we ensure the following:

Cybersecurity for our Customers

As solar energy emerges as a dominant source of power, installations are considered a significant part of the critical infrastructure in many countries. Grid participation, system maintenance and PV monitoring require heavy reliance on communications technology, and so protecting information integrity and reliability is of paramount importance.

With this in mind, SolarEdge launched a Cybersecurity Program aimed to safeguard its customers, itself, and to raise cybersecurity standards for the entire PV industry.  

This program combines the efforts of the Chief Information Security Officer and his team, responsible for corporate protection, with those of the Chief Data and Digital Officer who leads the Product Security roadmap. The management team provides quarterly updates to the Technology Committee and annually to the full Board regarding cybersecurity activities and other developments that impact our digital security, in keeping with our high organizational focus on this issue.

Cyber icons

Cybersecurity
and Data Privacy

Sustainability Report 2023 /