Top Banner
Security @ the EBU Stan Roehrich
13

Security @ the EBU

Jan 07, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security @ the EBU

Security @ the EBU

Stan Roehrich

Page 2: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

EBU Practical implementation:Rebuilding of the EVC in 2004

General Aspects:

IT systems are taking over the broadcast environmentproduction (file transfer, video server, editing)monitor and control of broadcast equipment

Multi Clients accessis now a common requestallows scalable working environment (extend, delocalize, ...)is challenging IT securities policies

IT security policies should not interfere with day to day operational tasks !

Page 3: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

3 ways to control:

1. One fully isolated PC from the IP network (KVM)

2. Dedicated server bridging more than 1 subnetMonitored equipments networkClients networks

3. Equipments with own (web) built-in server controller

Page 4: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Fully isolated systems

KVM Clientswith access rights

Controlled Devices

Monitoring PC

RS232/USB/Ethernet...

Only Keyboard/Video/Mouse signals are handled

Page 5: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

The KVM matrix

Advantages :

critical systems kept isolated from the outside world (no hard wiring with the IP network)

Multiple level of user rights access

Shared access to multiple users

Systems behind the matrix are generally difficult to update (new patch, service pack, security update).

Application running on the machine don’t works with O.S. updates.

Page 6: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Dedicated Server

SharedClients

NCC/TCC Server

Audio Conference

Matrix

Dedicated Clients

DTM Mgmt Network(FiNE)

DREAMS2FINE Server

EV

C L

AN

Page 7: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Dedicated ServerOn the server :

use of several network cardsavoids direct traffic between the client and control subnets.let the server to be the only one to link subnets(no route are defined on the server)

Linux Operating system is installedSoftware Firewall are locally used to track events

PC clients :are connected to the EVC VLANprovides more flexibility and availability

compared to the KVM case Security policies are handle by our IT

department

Page 8: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Directly Connected To EVC LAN

SharedClients Backup

ClientE

VC

LA

N

KVM MATRIX

To KVMClients

Page 9: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Directly Connected To EVC LAN

Broadcast equipment with built in microcontroller acting as server for remote control

are directly connected to EVC LANare less sensitive to external attacks (if append)they also required less intervention (very few update)

Page 10: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Directly Connected To EVC VLAN

Backup access is provided by a dedicated, isolated client acting as a gateway with the KVM matrix

2 Controllers for each equipment ensure redundancy.

In case of a freeze of the equipment controller, a reset can be done without stopping the operational functions.

Page 11: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Remote AccessEquipments connected to the EVC LAN can be access through a VPN application.

For isolated equipments (On KVM) specific procedures are established for temporary remote access.

Page 12: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Remote AccessIsolated systems

KVM Clientswith rights access

Isolated Devices

KVM/IP Gateway

VPN Tunneling

EBU

Network

Remote access

Page 13: Security @ the EBU

Security @ the EBU© EBU/UER – Stan Roehrich

Thanks for your attention