CDSA

M&E Journal: Preparation and Learning From TPN Security Assessments … and COVID-19

[svg-table-content]

By Chris Johnson, CEO, President, and Mathew Gilliat-Smith, EVP, Convergent Risks

The M&E supply chain has never been more united in improving digital security. At the time of writing this article more than 500 vendors have, or are going through, the Trusted Partner Network (TPN) security assessment process, with hundreds more in the pipeline.

As a provider of TPN security assessments, the benefits are clear for us to see. Most facilities have some elements of Motion Picture Association (MPA) best practices that can be improved upon, and some have critical issues that fall below best practice which need to be immediately remediated. Importantly, no matter how minor or major the issue, security is improving across the board.

Convergent has been observing vendor-agnostic data since TPN launched, identifying trending types of remediation by geographic location. This rich data source allows us to report and respond to actionable intelligence targeting areas for future development. Collaborating on intelligence in a rapidly changing landscape can be extremely beneficial when raising awareness of the vulnerabilities to content as it moves through the creative and consumer process.

Common areas requiring remediation include: data IO, digital asset tracking, dedicated CCTV VLAN, logging and event notification, and firewall implementation and configuration. Easily implemented items such as intrusion detection services (IDS), isolated internet on production workstations, are often lacking. In some cases, critical policies and business processes are missing entirely.

A Convergent survey on penetration test reports recently found that 80 percent of vendors discovered findings previously unknown to them, with only 20 percent of vendors finding no issues. Furthermore, 40 percent of the findings were in the “critical” or “high” category requiring urgent remediation.

Common findings were: security misconfiguration, SSL/TLS issues, components with known vulnerabilities and exposed management services. Sharing this information helps with better preparation.

An unprecedented event

One remediation item that has never been more relevant is business continuity planning (BCP). COVID-19 is proving a surreal situation and this current scenario feels more like we are living through a film script or industry experiment — only it is real, immediately impactive and extremely damaging.

Assessment and remediation, which earlier may have seemed a laborious task, are now seen by many as a very worthwhile effort when responding to COVID-19. An unprecedented event such as this will always make any response more difficult. In this case, the scale of transition to remote working and accelerated migration to application and cloud-based workflows has tested companies of all sizes.

For many, this will be the first time BCP policy has been looked at since it was written. For others, such plans may not even exist. For those with a documented and tested BCP, remote working will have been a more swift and smoother transition.

With a large proportion of productions currently halted and limited new content to work with, areas such as localisation and visual effects have been impacted especially hard. Add to this the significant risk of poorly managed configuration changes, increases in phishing attacks and malware, and the threat of unknown vulnerabilities sitting latent within our networks, and workflows will significantly increase the likelihood of future breaches.

To give some perspective, most of us have adopted and are rapidly adapting to new workflows that are likely to remain. Less travel means better corporate and social responsibility with less pollution and efficient cost-effective conversations via video call.

Move to the cloud quickly, securely

Prior to COVID-19, only 20 percent of new content reportedly was being processed in the cloud. This figure will increase during the first half of 2020, and by the end of 2020 will have become established as a business as usual activity.

Concerns over security in the cloud are changing in favour of achieving speed and efficiency. The cloud can be secured, but how you configure and monitor user interaction on a continual basis is critical. With so many moving parts involving third-party applications, navigating security is very challenging. While there is plenty of general guidance available, it is not always relevant or specific to media workflows.

Convergent’s approach to protecting content is to make security available to the broadest possible audience, consistently and globally. Cloud and application security will be no different. We aim to be a leading advocate on the subject, providing assurance to content owners through industry-led best practice. While we await industry-led implementation, we will offer reviews based on the available standards and our industry knowledge, using a process of discovery, mapping and configuration testing.

Our three-step strategy includes scoping the relevant cloud architecture and applications to gain an in-depth understanding of the workflow, where content resides and likely areas of vulnerability. The next stage is mapping to best practices, highlighting areas for remediation.

The third stage is conducting configuration reviews and penetration testing areas of concern and prior remediation. Significant investment has been made in training our media experienced workforce and integrating into our team cloud security architect professionals with in-depth knowledge of each of the cloud providers.

———————-

Click here to translate this article
Click here to download the complete .PDF version of this article
Click here to download the entire Spring/Summer 2020 M&E Journal