CAP, EAS AND IPAWS: INTRODUCING A DEFENSE-IN-DEPTH SECURITY STRATEGY FOR BROADCASTERS



Similar documents
White Paper INTRODUCING A DEFENSE-IN-DEPTH SECURITY STRATEGY FOR CABLE AND IPTV OPERATIONS. Contents. Monroe Electronics, Inc.

State/Local CAP EAS Systems

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CMPT 471 Networking II

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Proxy Server, Network Address Translator, Firewall. Proxy Server

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewall Security. Presented by: Daminda Perera

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

THE ROLE OF IDS & ADS IN NETWORK SECURITY

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Network Security Topologies. Chapter 11

On-Premises DDoS Mitigation for the Enterprise

Firewall Environments. Name

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

10 Configuring Packet Filtering and Routing Rules

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Guideline on Firewall

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

FIREWALL ARCHITECTURES

IP Ports and Protocols used by H.323 Devices

Firewalls, IDS and IPS

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Security Technology: Firewalls and VPNs

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Chapter 15. Firewalls, IDS and IPS

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Cisco AnyConnect Secure Mobility Solution Guide

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

Application Note. Onsight TeamLink And Firewall Detect v6.3

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Configuring PA Firewalls for a Layer 3 Deployment

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Recommended IP Telephony Architecture

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

UNDERSTANDING FIREWALLS TECHNICAL NOTE 10/04

allow all such packets? While outgoing communications request information from a

Firewalls. Chapter 3

CS5008: Internet Computing

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May Far South Networks

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Chapter 4 Customizing Your Network Settings

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Overview. Firewall Security. Perimeter Security Devices. Routers

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

FIREWALLS & CBAC. philip.heimer@hh.se

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Deploying Firewalls Throughout Your Organization

- Introduction to Firewalls -

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

SIP Security Controllers. Product Overview

SANS Top 20 Critical Controls for Effective Cyber Defense

Firewall Architecture

Chapter 4 Customizing Your Network Settings

DMZ Network Visibility with Wireshark June 15, 2010

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Proxies. Chapter 4. Network & Security Gildas Avoine

Chapter 11 Cloud Application Development

INTRODUCTION TO FIREWALL SECURITY

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

How To Protect Your Network From Attack From Outside From Inside And Outside

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

A Network Design Primer

Intro to Firewalls. Summary

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

Architecture Overview

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

How To Protect A Web Application From Attack From A Trusted Environment

Building a Systems Infrastructure to Support e- Business

DoS: Attack and Defense

12. Firewalls Content

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

CIT 480: Securing Computer Systems. Firewalls

SiteCelerate white paper

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

First Line of Defense to Protect Critical Infrastructure

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

The Cisco ASA 5500 as a Superior Firewall Solution

Security Technology White Paper

How To Protect Your Network From Attack

VOICE OVER IP SECURITY

Why an Intelligent WAN Solution is Essential for Mission Critical Networks

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Networking and High Availability

Application Firewall Overview. Published: February 2007 For the latest information, please see

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

HANDBOOK 8 NETWORK SECURITY Version 1.0

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Transcription:

CAP, EAS AND IPAWS: INTRODUCING A DEFENSE-IN-DEPTH SECURITY STRATEGY FOR BROADCASTERS Introduction: CAP EAS, Network Security and Information Assurance... 2 CAP System Security: Current FEMA s IPAWS and State CAP Systems.... 2 FEMA IPAWS...2 State and Local CAP Systems...3 Basic Defense: Network Segmentation Firewalls & Intrusion Protection... 3 Network Segmentation & Triple Port Ethernet Expansion (for DASDEC- II only)...3 Strong Firewalls...4 Intrusion Protection...5 DMZs, Network Segregation and Trust Zones...5 Defense in Depth: Reverse Proxy Servers... 5 Scenario 1: Using a Reverse Proxy / Firewall as an intermediary for polling IPAWS...6 Scenario 2: Using a Reverse Proxy / Firewall as an intermediary for polling IPAWS plus a third- party multimedia server...6 Scenario 3: Outbound polling of IPAWS and State or Local CAP server(s)...7 Scenario 4: Outbound polling of IPAWS, plus inbound push from State/Local CAP systems...8 Conclusion... 9 Digital Alert Systems A division of Monroe Electronics 585-765-1155 fax 585-765-9330 100 Housel Ave. Lyndonville NY 14098 www.digitalalertsystems.com Revision: 1.0 September 2011 Publication: WPDAS-122

Introduction: CAP EAS, Network Security and Information Assurance With the introduction of FEMA s IPAWS and other IP-based CAP alerting systems, radio and television broadcasters will be asked to connect their CAP EAS equipment such as the Digital Alert Systems DASDEC to outside networks, including the Public Internet. In response to the challenges these new requirements present, this paper examines a basic defense in depth approach for enhanced information assurance and network security that broadcasters can evaluate in response to their new CAP EAS Internet monitoring requirements. We say information assurance in addition to network security, because the issues involved are larger than simply computer security. Information assurance covers issues of building safe and reliable information systems able to withstand a broad range of contingencies. Information assurance involves issues of physical security, authentication technologies, network security, intrusion detection, and a number of other fields. A defense in depth strategy entails multiple layers of defense to prevent intrusions and attacks against critical systems, including protection mechanisms, procedures and policies. Defense in depth measures are intended to not only prevent security breaches, but also buy an organization time to detect and respond to an attack, thereby reducing and mitigating the consequences of a breach. The technical information in this document is basic by design. Many IT professionals may find the concepts and approaches discussed in this document to be elementary. On the other hand, this paper identifies actual emerging architectures for next generation CAP EAS systems at the Federal, state and local level, and the implications these raise for broadcasters IT infrastructures. CAP System Security: Current FEMA s IPAWS and State CAP Systems. The next generation Emergency Alert System (EAS) will bring about a variety of benefits, including more detailed and informative alert messages, with the possibility of accompanying multimedia and interoperability with a wider range of communications systems. However, because the next generation of EAS is IP based, relying on networked computing systems, a range of security and operational challenges are emerging. This is not unexpected, as is the case with any new system transiting - in whole or part - over the public Internet. FEMA IPAWS The Federal Emergency Management Agency (FEMA) is preparing to operationally deploy their Integrated Pubic Alert and Warning Systems (IPAWS). Alerting data in Common Alerting Protocol (CAP) format - will be made available from IPAWS through an Atom Syndication Resource feed.1 The DASDEC is typically configured to poll the IPAWS server every 20 to 30 seconds via the Internet. In this instance, the DASDEC is the active party, and the IPAWS server is passive. The Atom resource will contain the XML CAP data needed for EAS activation. In addition, that Atom resource will be an HTTPS site, requiring a PIN code programmed into each DASDEC unit. The PIN code is not public and is shared only between FEMA and the manufacturer (Digital Alert Systems). As of this writing there are still a number of unknowns, including the ultimate size of the Atom CAP feed (i.e. how much data will be accessed each polling interval). Additional considerations factor in if an alert message transiting through IPAWS is intended to have an audio resource file, the IPAWS CAP message would include a URL/URI of a third party address/server redirecting the DASDEC to download the audio file. This third party server would be expected to be a state or local government asset, or a server maintained by a service provider retained by the state or local government. 1 The Atom Syndication Format is an XML language used for web feeds, developed as an alternative to RSS, while the Atom Publishing Protocol (AtomPub or APP) is a simple HTTP- based protocol for creating and updating web resources. The Atom syndication format was published as an Internet Engineering Task Force (IETF) proposed standard in RFC 4287 (December 2005), and the Atom Publishing Protocol was published as RFC 5023 (October 2007). Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 2 of 9

State and Local CAP Systems A range of CAP systems are already in deployment by state and local jurisdictions. While in most cases monitoring these local CAP resources is voluntary (optional), we feel it is advisable to plan around the expectation these CAP feeds from state and local areas will eventually become a primary monitoring resource in several states. Some state systems provide a CAP web resource feed for the DASDEC to poll periodically. As with IPAWS, the state server is passive, while the DASDEC is active. These web resources may be in RSS formal or a generic XML page. Some of these systems utilize varying levels of digital security (such as HTTPS), while others appear based on security through obscurity. These passive CAP systems can be found emerging in California, Idaho, New York, and Washington. Other state CAP systems rely on pushing CAP messages by various means, including private networks, VPNs, satellite, and other methods. In these cases, the DASDEC is passive, while the state system is active. In general, we observe that these active state systems provide significant levels of data and transport-level security, including encryption. Examples of active state CAP systems can be found emerging in Alaska, Delaware, District of Columbia, Florida, Georgia, Maryland, Massachusetts, Michigan, North Carolina, Pennsylvania, South Carolina, Virginia, and elsewhere. Basic Defense: Network Segmentation Firewalls & Intrusion Protection CAP alert sources are proliferating at the Federal, State and Local level. These governmental CAP sources have varying approaches to security ranging from highly secure encrypted feeds, to generic web resources with little to no security. For this reason, broadcasters are advised to evaluate their options for protecting their own networks, beginning with a look at their basic defensive capabilities. Network Segmentation & Triple Port Ethernet Expansion (for DASDEC-II only) Users of the DASDEC-II with the optional Triple-Port Ethernet expansion will find several useful features to start their basic security configuration. This option adds three independent 10/100/1000 Ethernet ports to the 10/100 Ethernet port integrated in the DASDEC-II. Each port is non-bridging with separate IP and subnet settings. The Triple-Port Ethernet expansion option provides IT administrators control over network segmentation, and enables broadcasters to limit access by network and subnet. Using this feature, users can readily allocate one port for a different network; a port for internal access, a port for different users, and importantly a separate port for firewalled outside access. Segmented networks maintain functional separation and prevent unnecessary (or unwanted) traffic between network elements. Figure 1 Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 3 of 9

The unique benefit is multiple points of access across domains without needing complex bridges or modifying routing tables in existing equipment. To further ease integration each port can be assigned a static IP address, while ports 1 and 2 can also be set for Dynamic Host Configuration Protocol (DHCP). For users of the DASDEC-II with or without the optional for the triple port Ethernet option, there are a range of additional security options to create defense in depth, including establishment of a DMZ with proxy servers to extend the line of defense further away from critical internal networked functions. With or without the Ethernet expansion port option, users may find it desirable to create a DMZ around the Internet-connected DASDEC by establishing strong internal and external firewalls around the device. Strong perimeter defense and creation of a DMZ is discussed further below. Strong Firewalls The first line of defense in any event is of course the firewall. A firewall is commonly used to provide a layer of security for its respective local network. The firewall opens a portal allowing the world into the internal network. The question is how far the broadcaster wants to allow the outside world into its network. The simple answer in most cases is, with selected exceptions for highly trusted sources, it is not desirable for the outside world to be on the network at all. Defense can be approached in two levels. One level is ensuring the protection of the Internet-connected DASDEC from outside threats. The second critical level is safeguarding the broadcaster s internal IT network, which may be directly connected to the DASDEC. Broadcasters may wish to start evaluating their network security options by examining their existing firewall technology. This perimeter line of defense represents the frontline of the battle to secure the broadcaster s enterprise network. However, if first-generation firewall technology is to be used, this may provide only limited protection against more sophisticated network threats. For example, first-generation firewalls may be limited in their ability to protect from certain specific types of exploits. Most first-generation firewalls do not inspect each packet looking for particular exploits. Another key requirement to consider is whether your firewall can provide detailed, real-time traffic inspection. The majority of CAP alert traffic over the Internet will be http/https traffic. First generation firewalls either fail to inspect or at least thoroughly inspect web traffic in real time. In many cases, firewalls have to be manually configured to support this traffic. The end result is an increase in the number of potential security breaches caused by human error in the firewall configuration process. Newer generation firewall technology provides several key benefits. These next generation firewalls not only inspect traffic at the perimeter, they adds another layer of detailed traffic inspection by integrating Intrusion Protection Systems (IPS). The next generation firewall also enables deep packet inspection to eliminate threats inherent in web traffic (http / https). Further, the next generation firewall enables enterprises to open encrypted web traffic and treat it with the same inspection as clear-text HTTP data thereby eliminating a critical blind spot in network protection. Figure 2 Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 4 of 9

Intrusion Protection The ability to monitor network traffic is a key component of protecting information systems. Firewalls by themselves have limitations though. Most can only block based on IP addresses or ports. In contrast a network Intrusion Prevention Systems (IPS) is able to use signatures designed to detect and defend from specific types of attacks such as denial of service attacks among others Coupling a firewall with an IPS creates the potential to reduce these risks. An IPS is capable of monitoring the content deep inside the Web traffic. When the IPS discovers an event considered to be a true positive, the malicious connection is dropped and all subsequent matching packets are destined for the same outcome. In this ideal situation, the Web server never commits processing power to the malicious attack as it continues providing Web content to legitimate clients it was intended to serve. IPS have also been known to block buffer overflow type attacks, and can be configured to report on network scans that typically signal a potential attack is soon to follow. DMZs, Network Segregation and Trust Zones. A next level in a defense-in-depth strategy may be limiting Internet access to a DMZ. A DMZ is network added between a protected (internal) network and an external network (e.g. the Public Internet) in order to provide an additional layer of security. A DMZ is sometimes called a Perimeter network. A DMZ is a large step towards defense in depth because it adds an extra layer of security beyond that of a single perimeter. A DMZ can be used to isolate a particular machine within a network from other machines. From a security prospective, one does not want to put critical systems on a DMZ. The firewall is implemented so that the Internet users and the internal network users can talk to the servers on the DMZ, but Internet users cannot access to the internal network. The servers on the DMZ may be mail forwarding servers, web servers, or web proxy servers. Later on, we will discuss a specify type of proxy server the reverse proxy. Often these servers will access the internal servers for the client browser, giving the added defense-in-depth. In addition, the Firewall may implement NAT or Network Address Translation, which hides the addresses of the internal servers from the Public Internet by mapping each server to a different address on the internal network. 2 Defense in Depth: Reverse Proxy Servers The use of a reverse proxy server to provide defense-in-depth security presents as a practical security solution for protecting a broadcaster s internal assets. A regular proxy server s function is to pass a group of user requests from a client machines through a single server to the requested URL or web server. The URL may vary, but for a firewall implementation, it makes it possible to set up a single rule for one IP address to pass through the firewall instead of all of the users requesting access to the URL or web server. The process in reverse occurs with a Reverse Proxy - a Reverse Proxy acts as a proxy on behalf of the CAP EAS unit, rather than on behalf the outside client s request. In this case, CAP EAS sources and their related multimedia servers are set up to be proxied for one or more DASDEC units. Reverse proxies are also known as application gateways or web publishing servers. The reverse proxy is an application proxy for servers using the HTTP protocol. It acts as a gateway to an HTTP server or EAS CAP unit by acting as the final IP address for requests from the outside. Reverse proxies protect against attacks by adding a layer of interrogation. The proxy server evaluates the request according to established filtering rules. For example, it may filter traffic by IP address. If the filter validates the request, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. Much like a firewall, a reverse proxy requires a configuration table of URLs to translate, with anything not matching being rejected. In this way, judicious URL naming standards can prevent generic attacks from getting through the reverse proxy to the content server. Once all Internet traffic has been properly analyzed, routed, cached, and filtered in the DMZ via the proxy server, only then is it released to the DASDEC. The proxy server/firewall acts as an IP address "filtering" system. When properly configured, a proxy server/firewall should not significantly slow down or restrict Internet connection speeds or throughput, nor should it reduce Internet bandwidth. 2 Network Address Translation (NAT) is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 5 of 9

Scenario 1: Using a Reverse Proxy / Firewall as an intermediary for polling IPAWS In this baseline scenario, the proxy server acts as an intermediary for requests from the DASDEC-II seeking resources from CAP servers, specifically FEMA s IPAWS CAP resource in Atom format. Reverse proxy servers are intermediary servers between the public network and the internal DASDEC CAP EAS unit. Figure 3 Proxy servers work by accepting incoming HTTP requests, translating the requested URL using a configuration table, and issuing an internal request to the appropriate content web server. The response received from the content server is then re-translated and sent back to the browser. In this way the proxy server appears to the client (IPAWS) to be the internal content server (the DASDEC). The firewall works tightly with the Reverse Proxy to help ensure that only the Reverse Proxy can access the DASDEC hidden behind it. From the outside client s point of view in this case the IPAWS server the Reverse Proxy appears to be the actual CAP EAS unit. To ensure Internet protection of any broadcaster s IT network and to keep unwanted intruders outside, a proxy server/firewall combination can to be installed at the very entrance of where the Internet connects to the outside, and then connect in series to the DASDEC and broadcaster network they are intended to protect. Scenario 2: Using a Reverse Proxy / Firewall as an intermediary for polling IPAWS plus a third-party multimedia server As noted in our discussion of the IPAWS CAP system, the Atom web resource will only contain the XML text of CAP messages. IPAWS will not itself serve as a source for audio or other multimedia resources. However, it is very possible that these CAP messages will contain a reference or link to an external audio file on a third party server. Industry specifications require that these audio resources be in.mp3 or.wav format. FEMA IPAWS further limits this requirement to the.mp3 format. 3 For example, the CAP XML message may include the information along the following lines, referencing a hypothetical media server: <resource> <resourcedesc>eas Broadcast Content</resourceDesc> <mimetype>audio/x- ipaws- streaming- audio</mimetype> <uri>http://100.0.0.111:8000/liveeas.mp3</uri> </resource> In this example, the DASDEC would search for the audio file located at the web server (100.0.0.111) embedded in the CAP message. The value of a firewalled proxy server becomes rapidly evident if the CAP EAS equipment is expected to access third party servers. In the Figure 4 diagram below, we illustrate these relationships, and assume a simple but highly restrictive rule of outbound polling only no inbound inquiries. However, as discussed in Scenario 4, there are cases where inbound requests may be made. 3 Please refer to the ECIG Recommendations for CAP EAS Implementation Guide - Version 1.0, as adopted by the FEMA IPAWS program office (www.eas-cap.org). Also see the Requirements for the Integrated Public Alert and Warning System (IPAWS) Common Alerting Protocol (CAP) Profile Implementation Guide (http://www.cmasforum.com/docs/ipaws_cap-to-eas_requirements.pdf). Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 6 of 9

Figure 4 Scenario 3: Outbound polling of IPAWS and State or Local CAP server(s) The only near-term CAP system that is likely to be required or mandatory to monitor would be the FEMA IPAWS aggregator, which will publish an Atom CAP resource page. However, earlier, we introduced the possibility even likelihood that EAS participants may be encouraged or required to monitor state and local CAP sources, in addition to IPAWS. Indeed, a growing number of states are already in the process of deploying their own CAP-based capabilities. In addition, we are seeing several local areas consider their own CAP systems (including municipalities and groups of counties). In this scenario as depicted in Figure 5 below - the DASDEC connects to the proxy server, requesting some service, such as the FEMA Atom CAP web page, or a State/Local CAP resource, or other resource file (e.g. audio recording) available from one or more third party CAP servers. As with the previous scenarios, the proxy server will sit in front of the DASDEC and only outbound communications (http/https) will be established between the DASDEC and the CAP source(s). This reverse proxy method here may suffice for polling passive CAP systems such as MyStateUSA (Washington, Idaho), NY Alerts, and California EDIS. Figure 5 Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 7 of 9

Scenario 4: Outbound polling of IPAWS, plus inbound push from State/Local CAP systems. A major variation in the scenarios depicted so far is where a CAP system pushes CAP data and multimedia resources to the DASDEC. This type of system, for example, is in use in 16 states currently using (or planning to use) a managed CAP alert service called EMnet. 4 In this case, inbound communications would only occur over the previously established EMnet private network. At the same time, there is likely be outbound communications from the DASDEC-II to the CAP alert service. For example, outbound EMnet communications include message acknowledgements and proof of delivery that would either be accomplished via the established EMnet private network, or via the reverse proxy method outlined above. Figure 6 4 These states include Florida, Georgia, South Carolina, North Carolina, Virginia, District of Columbia, Maryland, Delaware, New Jersey, Pennsylvania, Massachusetts, Michigan, Indiana and others. For additional information, please see our State/Local CAP EAS Systems: Challenges for Broadcasters Facing State, Local and Federal CAP EAS Systems & Interoperability Requirements (May 2011). http://www.digitalalertsystems.com/pdf/das_state_interoperability_whitepaper_may2011.pdf Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 8 of 9

Conclusion Defense-in-depth involves using a number of layers. We have identified a range of options, including the addition of a strong firewall and intrusion protection system in front of the DASDEC, creation of a DMZ, and use of a reverse proxy server within a DMZ. There are many additional options that we have not discussed in the confines of this paper, such as network address translation (NAT), and adding additional obscurity. The firewall is a first layer of defense; the proxy may be the second; using NAT, a third; obscuring the type of system adds another layer of defense. While we defer to the specific technical preferences of our broadcaster clients and partners, we do overall suggest considering a defense-in-depth strategy, to defend the networks and infrastructure of the broadcaster: Protect the local and wide area communications networks (e.g. from Denial of Service Attacks). Provide confidentiality and integrity protection for data transmitted over these networks (e.g. use encryption and traffic flow security measures to resist passive monitoring) Defend the enclave boundaries (e.g. deploy Firewalls and Intrusion Detection to resist active network attacks) Defend the Computing Environment (e.g. provide access controls on hosts and servers to resist insider, close-in, and distribution attacks). For assistance in configuring your DASDEC to common security options, please feel free to contact Digital Alert Systems. Introducing A Defense-In-Depth Security Strategy for Broadcasters Page 9 of 9