Monday, 3 January 2022

Making Sure the Remote Over IP Broadcast Is Cyber-Secure

NAB

Cyber security is a critical component in modern broadcast infrastructures. Reliance on IP networks inevitably leads to a much wider exposure of vulnerabilities to the outside world. Add remote production into the mix, and the potential for security to be compromised multiplies.

https://amplify.nabshow.com/articles/making-sure-the-remote-over-ip-broadcast-is-cyber-secure/

“Broadcast is considered a particularly fertile ground for some types of attacks due to its ability to instantly reach very large audiences,” warns Geoffrey Crespin, senior solutions architect at live production vendor EVS. “Causing transmission loss during a live event watched by billions is certainly an appealing prospect for many hackers out there.”

EVS outlines the pathway to ensuring cyber security in live production workflows in a new white paper, “5 steps to make live production workflows cyber-secure.”

The first step is to know which equipment must be protected. And that means all hardware and virtual (VM and cloud) assets on your networks — from the humble office printer to the latest high-spec super slo-mo camera equipment.

Keeping an inventory may seem obvious but given the amount of equipment used in live production environments and stored ready for deployment, it can seem a daunting task. However, by closely managing all hardware on the network — both IT and broadcast devices — it is easier to spot rogue assets and remove or isolate them.

Crespin says, “Whether you rely on manual lists or use asset discovery and software inventory tools, the core security principle is simplicity. If software is unauthorized, it should not be installed. If an asset is not needed, that asset should not present on the network. If it is not present, it can’t cause a security risk.”

Once you understand the hardware and software you need to protect, it’s essential to know who has access to and uses those systems and applications, he says.

“The most common attacker techniques take advantage of uncontrolled administrative privileges, so keep access in check. If logging and analysis of events is not present, it allows attackers to hide their location, malicious software, and activities on victim machines.”

Broadcasters are further advised to ensure the network itself is protected. Obvious perhaps, but modern broadcast IP architectures are complex. Workflows rely on ethernet networks to provide the scalability and bandwidth to manage devices, assets, data, applications, users and locations — all interconnected and communicating with the external world.

“Whilst each organization must take responsibility for its own security policies, the burden of cyber-threats is one that is shared across the broadcast and media community, so you’re not facing it alone,” he says.

Broadcasters are working with industry bodies such SMPTE and the European Broadcast Union (EBU) to push cyber security due diligence to the top of the agenda for manufacturers, services providers, systems integrators and users alike.

“All workflows and customers are different so the risk factors and needs will also differ every time. However, applying international security standards and following the recommendations published by industry bodies means laying a solid foundation for a future-proof, cyber-secure infrastructure.”

With the growth of remote production, the need for content to be widely shared between collaborators in different physical locations, and the increasing number of services running in the cloud, internet-facing applications are flourishing.

These programs are designed to be accessible from within the internal network but also available to the outside world through web interfaces, providing a wider attack surface for cyber criminals.

To prevent unauthorized access, companies need to make sure all exposed entry points like user interfaces and interconnections with thirds parties are fully protected before the application goes live.

 


No comments:

Post a Comment