Music Recording Studio Security Program Security Assessment Version 1.1



Similar documents
Content Protection & Security Standard

Supplier Security Assessment Questionnaire

Newcastle University Information Security Procedures Version 3

HIPAA Security Alert

How To Protect Decd Information From Harm

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

ISO Controls and Objectives

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Supplier Information Security Addendum for GE Restricted Data

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

VMware vcloud Air HIPAA Matrix

SUPPLIER SECURITY STANDARD

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

ISO27001 Controls and Objectives

Service Children s Education

FINAL May Guideline on Security Systems for Safeguarding Customer Information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Information security controls. Briefing for clients on Experian information security controls

INFORMATION TECHNOLOGY SECURITY STANDARDS

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

1B1 SECURITY RESPONSIBILITY

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

Instructions for Completing the Information Technology Officer s Questionnaire

ULH-IM&T-ISP06. Information Governance Board

INCIDENT RESPONSE CHECKLIST

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

Network & Information Security Policy

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Client Security Risk Assessment Questionnaire

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Network Security Policy

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

Rotherham CCG Network Security Policy V2.0

System Security Plan University of Texas Health Science Center School of Public Health

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IBX Business Network Platform Information Security Controls Document Classification [Public]

Retention & Destruction

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

PCI Data Security and Classification Standards Summary

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

Information Security Policies. Version 6.1

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

HIPAA Security COMPLIANCE Checklist For Employers

Attachment A. Identification of Risks/Cybersecurity Governance

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

PCI DSS Requirements - Security Controls and Processes

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

FormFire Application and IT Security. White Paper

Information Resources Security Guidelines

Information Technology Branch Access Control Technical Standard

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Draft Information Technology Policy

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

University of Sunderland Business Assurance Information Security Policy

Mike Casey Director of IT

Does it state the management commitment and set out the organizational approach to managing information security?

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

BKDconnect Security Overview

Operational Risk Publication Date: May Operational Risk... 3

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Supply Chain Security Audit Tool - Warehousing/Distribution

SRA International Managed Information Systems Internal Audit Report

Estate Agents Authority

Practical Overview on responsibilities of Data Protection Officers. Security measures

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

HIPAA Security Matrix

Cloud Computing: Legal Risks and Best Practices

Information Security Program Management Standard

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

How To Protect Your School From A Breach Of Security

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Transcription:

Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND AWARENESS INCIDENT MANAGEMENT AND RECOVERY PLANNING

ABOUT THIS PROGRAM... 4 The Audit Process... 4 How to use this document... 5 The Statement of Applicability... 5 Declination of Liability... 6 CF 1. DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE... 7 CF 1.1. Documentation... 7 CF 1.2. Risk Management... 8 CF 1.3. Compliance... 8 CF 2. PERSONNEL AND RESOURCES... 9 CF 2.1. Personnel and Resources... 9 CF 3. ASSET MANAGEMENT...10 CF 3.1. Administrative Controls... 10 CF 3.2. Asset Controls... 11 CF 3.3. Asset Receipt and Identification... 11 CF 3.4. Asset Handling and Transfer... 12 CF 3.5. Secure Asset Storage and Reconciliation Controls... 12 CF 3.6. Asset Re-call Procedures... 13 CF 3.7. Control of Blank Media Materials... 13 CF 3.8. Record Retention... 14 CF 3.9. Transportation of Assets... 14 CF 3.9. Destruction and Recycling... 14 CF 4. PHYSICAL SECURITY...15 CF 4.1. Physical Security Management... 15 CF 4.2. Securing Internal Areas... 16 CF 4.3. Use of Guards... 16 CF 4.4. Searches... 17 CF 4.5. CCTV... 17 CF 4.6. Access Control Systems and Automated Technologies (AACS)... 18 CF 4.7. Intruder Detection Systems (IDS)... 18 CF 5. IT SECURITY...19 CF 5.1. Information Security Policy... 19 CF 5.2. Acceptable Use... 19 CF 5.3. System Administrator and Elevated Privilege User Accounts... 20 CF 5.4. System Basic User Accounts... 20 CF 5.5. Password Management... 21 CF 5.6. Authorizing Third-party Access to IT Systems... 21 CF 5.7. Removable Media... 22 CF 5.8. Mobile Device Management... 22 CF 5.9. Wireless Networks... 23 CF 5.10. Physical and Environmental Security Controls... 23 CF 5.11. IT Asset Management... 24 CF 5.12. Network Monitoring... 25 CF 5.13. Access Controls... 25 CF 5.14. Remote Access... 26 2013 Content Delivery & Security Association Page 2 of 31 Recording Studio Security Program CF 1.1 Docu

CF 5.15. Change Management... 26 CF 5.16. System Documentation... 27 CF 5.17. External Networks... 27 CF 5.18. Internal Networks... 27 CF 5.19. File Transfer Management... 28 CF 5.20. Firewall Management... 28 CF 5.21. Vulnerability Management... 29 CF 6. TRAINING AND AWARENESS...30 CF 6.1. Training and Awareness Needs... 30 CF 7. INCIDENT MANAGEMENT AND RECOVERY PLANNING...31 CF 7.1. Incident Management and Recovery Planning... 31 2013 Content Delivery & Security Association Page 3 of 31 Recording Studio Security Program CF 1.1 Docu

ABOUT THIS PROGRAM This program has been jointly developed by operational and technical specialists within the recording industry. The objective of the Music Recording Studio Security Program (MRSSP) Assessment is to establish a set of effective security controls that can measure how a Recording Studio or individual involved in the recording studio process will secure and protect physical and digital media assets. In order to mitigate the risk and reduce the impact of copyright infringement as a result of leaked content, focus has been placed on the access to and handling of physical and logical media assets. The objective-based approach will only test applicable elements taken from the seven frameworks of capability used in the full version of the CDSA Security (CPS) Standard. The areas to be considered are: RECORDING STUDIO SECURITY PROGRAM CF 1: DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE CF 2: PERSONNEL AND RESOURCES CF 3: ASSET MANAGEMENT CF 4: PHYSICAL SECURITY CF 5: IT SECURITY CF 6: TRAINING AND AWARENESS CF 7: INCIDENT MANAGEMENT AND RECOVERY PLANNING According to the nature of operations a successful assessment against the relevant requirements will result in a site and/or an individual achieving approved site or service provider status. The programs objectives are to identify, assess, manage and minimize risks to an acceptable level, thereby ensuring the continued integrity of intellectual property, confidentiality and media asset security. The identified objectives provide the basis on which to define the auditable requirements for approved Site and/or service provider status. The Assessment Process On receipt of an application to join the program a CDSA auditor will be assigned and will contact the applicant to set a timeframe for the assessment and assist with preparation. A one-day visit to the site or applicants place of work will take place followed by the submission of a detailed report. 2013 Content Delivery & Security Association Page 4 of 31 Recording Studio Security Program CF 1.1 Docu

A further assessment can be undertaken every 12 months thereafter in order to maintain approved site or service provider status. A qualified CDSA auditor with relevant industry experience will carry out the audit. The applicant receives approved status if: There are zero non-compliances, or One or more non-systemic (minor) non-compliances need to be addressed by an agreed corrective action plan and no significant threat to client media assets is identified. An applicant will fail to achieve approved status where one or more major or systemic non-compliances are observed. Approved status can be awarded once major non-compliances have been adequately addressed, re-evaluated and accepted by CDSA. How to use this document In order to remain applicable to a wide cross-section of participants this document remains vendor and technology neutral. The Standard utilizes the following terms: Security: The preservation of confidential intellectual property and protection of media related assets, against all threats, whether internal or external, accidental or deliberate. Policy: WHAT to do Process or Procedure: HOW to do it Role: WHO is responsible and/or accountable including any corresponding competencies Responsibility: What task/s an individual is accountable for in accordance with any policy or procedure Schedule: WHEN an action is performed A the applicant may be referred to as site or Service Provider. A site or service provider may form part of a larger organization. The Statement of Applicability The inaugural audit process will incorporate completion of a Statement of Applicability or SoA assisted by the assigned CDSA auditor. This document will define the scope of the assessment. Requirements deemed Not Applicable will be identified, justified and agreed. Requirements deemed Applicable But Not Implemented may be identified and accepted as: o In progress o Future project o Accepted risk Requirements Not Addressed may be accepted using equivalent compensating controls that meet the same objective. 2013 Content Delivery & Security Association Page 5 of 31 Recording Studio Security Program CF 1.1 Docu

Within each capability framework a summary of requirements has been provided to assist the applicant with their preparation. Further guidance is available through consultation with the appointed auditor or territory director. Objective: Descriptive text to assist the applicant with the requirements to be met. A measureable objective to be achieved. Items that may be accepted as demonstrating compliance. Declination of Liability CDSA has made every effort to formulate a program that they believe will help companies reduce the likelihood of content loss or theft. However, a program, no matter its specificity or diligent application, cannot guarantee avoidance of a claim. Therefore, CDSA must decline any liability toward the company or third party on account of this program, whether or not CDSA has issued a certificate. 2013 Content Delivery & Security Association Page 6 of 31 Recording Studio Security Program CF 1.1 Docu

CF 1. CF 1.1. DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE Documentation CF 1.1 Produce and maintain relevant security policies, procedures and practices. Supported and authorized, where applicable, by management. Such documents set the context and provide the structure for communicating security expectations. Develop and produce adequate security policy, procedures and associated documentation. Where relevant communicate all security policies, procedures and work instructions to staff. Ensure documents remain current and fit for purpose through a process of review. Security Policy and Procedures Security Manual Associated documentation such as session reports. 2013 Content Delivery & Security Association Page 7 of 31 CF 1.3 Compliance Error! Reference source not found.

CF 1.2. Risk Management CF 1.2 Demonstrate how operational risk has been identified, assessed, treated and/or mitigated to an acceptable level. Documentation shall be assessed according to the level of complexity. Conduct regular review of all business activity directly or indirectly associated to media assets in physical or digital format. Demonstrate that potential security related risks have been identified. Demonstrate that proportionate and effective controls have been implemented to treat and/or mitigate identified risks. Manage and review risks within a process of continual review. Risk assessment methodology Documented risk assessments Completed Statement of Applicability Management review documents CF 1.3. Compliance CF 1.3 Methodology for ongoing compliance with the program shall be demonstrated. This should include effective incident management and a process of continual monitoring and review. To ensure ongoing program requirements and any, legal, regulatory and contractual obligations have been considered. To provide a mechanism to promote on-going compliance. Incident handling policy, procedures and completed Incident reports Corrective and preventive actions CDSA CPS audit report including associated non-compliances Management reviews 2013 Content Delivery & Security Association Page 8 of 31 CF 1.3 Compliance Error! Reference source not found.

CF 2. CF 2.1. PERSONNEL AND RESOURCES Personnel and Resources CF 2.1 The creative process can often, involve sharing of content between multiple resources working on the same project. When working in a shared environment, it is crucial to ensure that all parties involved with the project understand and adhere to program and requirements. A manager shall be nominated as being accountable for security functions. Individuals shall undertake responsibilities for ensuring the security requirements of this program are met. The level of background screening to be carried out on all personnel and resources, including contractors, consultants and third-party vendors shall be demonstrated. The program member must be capable of providing personnel and resources to meet the requirements of any, legal, regulatory and contractual obligations. Mitigate the risk to content where personnel and resources are involved, including the engagement of contractors, consultants and third-party vendors. Organizational structure depicting responsibility for security and program management Policy and procedural documentation Evidence non-financial processes that assist security and Service Level Agreements, third-party contracts, confidentiality and non-disclosure agreements Processes for the engagement of third-parties 2013 Content Delivery & Security Association Page 9 of 31 CF 2.1 Personnel and Resources

CF 3. CF 3.1. ASSET MANAGEMENT Administrative Controls CF 3.1 sets out accountability, roles and responsibilities for asset management. Specific consideration should to be given to the types of asset being handled. The level of security afforded to assets must be consistent with risk assessment. An asset may be defined as: Intellectual property, all formats of content including edits, rough cuts, un-mastered and mastered content and including any proprietary or sensitive information relating to a project. The asset may be in a physical, digital or electronic form and may exist at any point in the creative process. Each project should be assessed on an individual basis for risk and value, with any special requirements for high security projects being added to documentation. Administrative control of computer systems and storage locations containing digital IP or other commercial assets must be considered in line with the requirements as set out in section CF 5 of this program. Ensure that accountability, roles and responsibilities for asset management and security are established and have been clearly communicated. Ensure a consistent approach when handling assets using a process of risk assessment. Provide a secure, efficient and effective operating system for all assets. Ensure additional security requirements are considered and implemented where necessary. Provide a chain of custody for assets. Defined asset management roles and responsibilities Documented risk assessment Asset handling procedures Session reports Work orders and associated documentation 2013 Content Delivery & Security Association Page 10 of 31 CF 3.1 Administrative Controls

CF 3.2. Asset Controls CF 3.2 All processes undertaken must be auditable. All original material and subsequent assets created, as part of a project, process or procedure must be included. Implement, operate and maintain an accurate asset management system that is capable of audit. Asset management system Asset management records Session reports Work orders and associated documentation CF 3.3. Asset Receipt and Identification CF 3.3 sets out the requirement to establish a mechanism for recording the receipt and identification of assets. Implement, operate and maintain accurate records for asset receipt and future identification. Physical and Electronic methods used for asset identification 2013 Content Delivery & Security Association Page 11 of 31 0 CF 3.5. Secure Asset Storage and Reconciliation Controls

CF 3.4. Asset Handling and Transfer CF 3.4 The program member will be required to demonstrate work flows as well as the appropriate use of protective controls such as watermarking, password protection, encryption, use of secure and/or vendor approved digital delivery platforms, secure file transfer and secure or offline storage. Operate and maintain effective processes for secure asset handling and transfer. Maintain accurate and accountable records of all asset movement that are capable of audit. Asset tracking processes, policy, procedures and processes Asset handling policy, procedures and processes Third-party contracts, service level agreements (SLA s) and confidentiality agreements Asset tracking logs and/or manual records Use and application of asset protection technologies CF 3.5. Secure Asset Storage and Reconciliation Controls CF 3.5 sets out how the program member must ensure that assets are retained securely within secure areas. Maintain accurate records for asset storage and movement. Ensure asset integrity and security is being maintained. Inventory records and asset registers Cyclic count policy and procedure Documented reviews of cyclic count records Documented resolution and review of discrepancies Client notification policy and process Third-party contracts, service level agreements (SLAs) and confidentiality agreements Asset tracking logs and/or manual records 2013 Content Delivery & Security Association Page 12 of 31 0 CF 3.5. Secure Asset Storage and Reconciliation Controls

CF 3.6. Asset Re-call Procedures CF 3.6 sets out requirements for monitoring assets allocated to an individual. Dependent on the activity and type of asset, different procedures may exist. However, the program member must demonstrate that it has taken into consideration the risk to high security items. Prevent assets from being retained outside secure storage locations any longer than is necessary. Reduce opportunity for theft and prevent assets from being left unattended. Provide a mechanism whereby escalation procedures can be implemented, including commencement of checks, controls, investigation and client notification. Asset management systems Inventory records Asset recall policy or process Incident management and investigation Policy and procedures for loss of asset and client notification Service level agreement or contractual requirements. CF 3.7. Control of Blank Media Materials CF 3.7 Unless properly controlled, access to blank media materials provides an opportunity to transfer, copy or transmit media files without detection. Policy, procedure or a process as appropriate must control the use of blank media materials. Blank media may include CDR, tapes, data storage etc.. Treat the use of blank media as an asset. Document, implement and maintain secure policy and processes for controlling raw material. Use of media duplication policy and guidelines Policy, procedures and management records for asset identification, issue, tracking, return and destruction Cyclic count reconciliation policy, procedures and inspection results Media duplication guidelines 2013 Content Delivery & Security Association Page 13 of 31 0 CF 3.7. Control of Blank Media Materials

CF 3.8. Record Retention CF 3.8 sets out the requirements for the retention of asset management records. Retain accurate and detailed asset management records to enable and assist audit and investigation. Asset retention policy and procedure Retained asset management records CF 3.9. Transportation of Assets CF 3.9 The secure transportation of assets off-site varies according to the type of activity, asset, technology, destination and contractual obligation. Achieve secure transfer of assets between sites. Policy and procedures for asset transportation Shipping records Third-party service level agreements and insurance CF 3.10. Destruction and Recycling CF 3.10 sets out requirements for the destruction and recycling of assets. During the creative process physical assets are often created that require secure and responsible destruction. Secure and segregate assets while awaiting destruction. Securely destroy and recycle assets using a reliable and auditable process. Asset destruction and recycling policy and procedures Destruction records and certificates of destruction Third-party Service Level Agreements Destruction and storage facilities 2013 Content Delivery & Security Association Page 14 of 31 0 CF 3.10. Destruction and Recycling

CF 4. CF 4.1. PHYSICAL SECURITY Physical Security Management CF 4.1 The program member will be required to demonstrate the different levels and/or types of physical security controls used. This will be proportionate to the operational environment and activity undertaken. Policy, procedures and processes will help to demonstrate how proportionate and effective controls are maintained. Physical security may be applicable to a site location, internal location or device. Implement security controls to safeguard media and operational assets. Demonstrate how unauthorized physical access to perimeter and internal secure areas is prevented, monitored and managed. Demonstrate how physical access is authorized, monitored and managed. Demonstrate how physical access controls protect media and operational assets and critical business information. Physical security plans Physical security policies and procedures Physical security risk assessment methodology Physical security controls and boundaries Use of perimeter security, CCTV, Access Control, Keys, intruder detection, searches and physical device security Policy and procedures for internal controlled and secure locations 2013 Content Delivery & Security Association Page 15 of 31 CF 4.1 Physical Security Management

CF 4.2. Securing Internal Areas CF 4.2 sets out the requirements for defining, segregating and working within controlled and secure internal areas. A controlled area is considered to be a location where monitoring is required but no access to physical or logical assets is possible. A secure area is considered to be a location where monitoring, supervision and controlled access are required to protect physical or logical media assets. Media assets stored, handled, processed, manufactured, received or dispatched within a designated secure area have additional bespoke physical security requirements. Ensure the internal security of a site, and identify requirements for high security zones. Monitor, secure and control access to internal areas where media assets are located, stored, handled or produced. Policy and procedures for internal controlled and secure locations Physical security controls and boundaries Event logs for access controls CCTV records Incident reports Visitor logs Search records Policy and procedures for visitors CF 4.3. Use of Guards CF 4.3 The use of guards is dependent on the nature of operations and risk assessment. A decision to instruct guards is decided by the evel of risk, access to resources and the availability of alternative controls, security systems or technology. Ensure the integrity and security of the physical site by the use of guards. Assignment instructions and any associated records Service level agreement with providers 2013 Content Delivery & Security Association Page 16 of 31 CF 4.3 Use of Guards

CF 4.4. Searches CF 4.4 A decision to search should be based on risk assessment. Consideration should be given as to who is being given access, the activity undertaken and the sensitivity of the content. Examples may include but not exclusively be playbacks and listening sessions. Deter and detect the theft or misappropriation of assets. Search policy and procedures Search records CF 4.5. CCTV CF 4.5 sets out the security requirements for the use of closed circuit television (CCTV). Industry standards for acceptable use and retention of images are to be used to assist immediate response and post-incident reporting. As a guide images must be: Fairly and lawfully processed, Used for specific limited purposes such as the prevention and detection of crime, Assessed as accurate, adequate, relevant but not excessive, Retained only for as long as necessary to aid investigation, Processed in accordance with an individual s human rights, and Kept secure and only accessible by those who have a business need. Protect premises, staff and media assets through the effective use of CCTV. Policy or integration of policies for CCTV Management controls for CCTV imagery Maintenance records SLA and confidentiality agreements 2013 Content Delivery & Security Association Page 17 of 31 CF 4.5 CCTV

CF 4.6. Access Control Systems and Automated Technologies (AACS) CF 4.6 sets out the security requirements for the use access control systems including automated technologies (AACS). In some cases the implementation of proper key control continues to provide adequate control and mitigation of risks. Risk assessment drives the decision on the correct type of control to apply. Protect external and internal access to controlled and designated internal secure areas through the use of access control. Access control policy and procedures Access control plan Access control logs Maintenance records SLA and confidentiality agreements CF 4.7. Intruder Detection Systems (IDS) CF 4.7 Use of IDS must be considered in areas that are left vulnerable when unattended, or when it is necessary to augment additional physical security barriers. Properly managed installation, maintenance, monitoring and response are essential requirements to success. Detect the entry, or attempted entry of an intruder into a protected area. Identify the location of the intrusion and to signal an alarm on which to respond. IDS policy and procedures Alarm response records Event logs Maintenance reports Uninterrupted powers supply (UPS) SLA and confidentiality agreements 2013 Content Delivery & Security Association Page 18 of 31 CF4.7 Intruder Detection Systems

CF 5. CF 5.1. IT SECURITY Information Security Policy CF 5.1 Documents shall demonstrate the technical security controls and practices in place. IT infrastructure consists of the equipment, systems, software, and services including all hardware, networks and facilities. Establish a basic document framework for IT controls. IT security policy framework IT security plans CF 5.2. Acceptable Use CF 5.2 Acceptable use is a rule set defined by the program member that restricts the way in which IT systems, networks and assets may be used including internet, social media and email. Provide a formal framework for acceptable system, network, asset and internet usage. Achieve a culture of responsible behavior at all levels of the organization when working with client assets. Achieve a culture of responsible Internet usage Acceptable use of IT systems policy Individual s acceptance of policy Management review 2013 Content Delivery & Security Association Page 19 of 31 CF 5.2 Acceptable Use

CF 5.3. System Administrator and Elevated Privilege User Accounts CF 5.3 sets out the requirements for administrator and elevated privilege user accounts. These elevated privileges may allow the creation, modification and access to local user groups, folders and accounts, to delete files, install hardware/software, modify the operating system and configure network/firewall settings. Such activities must be controlled with clear segregation of duties established within policy. See CF 6 for training and awareness requirements. Define, control and securely manage persons with administrator/elevated privilege level access to network/systems and logical media assets Administrator and elevated privilege user policy and procedures Administrator and elevated privilege account logs Change management requests Firewall logs Training and awareness records Individual s acceptance of policy CF 5.4. System Basic User Accounts CF 5.4 sets out the requirements for system basic user accounts. The principle of least privilege must be adopted. Define, control and securely manage persons with basic user level access to network/systems and logical media assets. Administrator and elevated privilege user policy and procedures Administrator and elevated privilege account logs Change management requests Firewall logs Training and awareness records Individual s acceptance of policy 2013 Content Delivery & Security Association Page 20 of 31 CF 5.4 System Basic User Accounts

CF 5.5. Password Management CF 5.5 sets out requirements for password management. Passwords are the front line of protection for user accounts and network access. Rules must be in place to separate and define the complexity, length, use and re-use for system level and user passwords. Ensure the program member has appropriate and consistent password controls to deter unauthorized access to IT systems. Password policy Administrator controls and monitoring Individual s acceptance of policy CF 5.6. Authorizing Third-party Access to IT Systems CF 5.6 sets out the requirements for controlling third-party access to IT systems. Access to company information via IT systems must be controlled, risk assessed, authorized and documented. To maintain integrity and security of IT systems/networks and logical media assets accessed by third-parties. Third-party access policy and procedures Records of authority Log files Policy acceptance SLA, NDA and confidentiality agreements 2013 Content Delivery & Security Association Page 21 of 31 CF 5.6 Authorizing Third-party Access to IT Systems

CF 5.7. Removable Media CF 5.7 sets out requirements for controlling removable media and personal devices. Removable media represents a significant threat to the loss or compromise of media assets. Such media may be owned/controlled by the site or an individual. To ensure controls are in place to prevent unauthorized removal from the site and or any device or introduction of threats to IT systems. Policy to manage removable media Authorization records Network access controls Asset register Device identification CF 5.8. Mobile Device Management CF 5.8 sets out the requirements for acceptable use of mobile and portable devices capable of processing, transmitting or storing sensitive company data or client information. Set a formal requirement for mobile device acceptable use. Achieve a culture of responsible behavior when working with mobile devices. Mobile device acceptable use policy Device register Authorization records Users acceptance of policy 2013 Content Delivery & Security Association Page 22 of 31 CF5.8 Mobile Device Management

CF 5.9. Wireless Networks CF 5.9 sets out the requirements for wireless networks. Sites and/or devices using wireless networks need to carefully consider the deployment of wireless networks within a production or manufacturing environment. Secure wireless networks to prevent unauthorized access or loss of sensitive data. Wireless network policy Network maps Authentication strategy Encryption strategy CF 5.10. Physical and Environmental Security Controls CF 5.10 sets out the requirements for physical and environmental security controls. Data and logical media assets must be physically as well as logically protected. Ensure data and logical media assets are physically controlled and secured. Ensure environmental conditions are managed. Server room and data store policy and procedures Physical controls to monitor and control access Environmental protection systems Inspection reports Routine maintenance reports Third-party SLA and confidentiality agreements 2013 Content Delivery & Security Association Page 23 of 31 CF 5.10 Physical and Environmental Security Controls

CF 5.11. IT Asset Management CF 5.11 sets out the requirements for asset registration, use and disposal. A register of the physical and logical assets used to operate, control and protect IT systems, is to be maintained. Physical assets should be marked, referenced or have bar code registration. Software assets and applications should be registered. The destruction or removal from use of all hardware and associated digital assets must be properly authorized. Provide a register of all hardware, associated devices and software in use. Ensure that regular reviews of software use are undertaken. Ensure data from defective hardware is securely removed prior to any authorized repair. Ensure that redundant hardware and associated devices are disposed of properly in a secure manner that prevents data migration. Policy to register, use and destroy hardware and associated devices Authorization records Network access controls Asset register Device identification Software management solutions Data removal policy Repair service level agreements (SLAs) Destruction certificates 2013 Content Delivery & Security Association Page 24 of 31 CF 5.11 IT Asset Management

CF 5.12. Network Monitoring CF 5.12 sets out the requirements for monitoring network activity. Where relevant systems must be monitored to detect unauthorized processing activities. Information security events are to be logged, reviewed, recorded and investigated where required. Ensure networks are monitored effectively. Demonstrate how network traffic is monitored Event logs Demonstrate actions to be taken in the event of anomalies Records of any e-mail/sms alerts CF 5.13. Access Controls CF 5.13 sets out the requirements for authorizing and controlling access to network systems. Access controls can be both physical and logical (i.e., tools used to identify, authenticate or authorize users on computer systems). Effectively manage access controls. Policy and process to identify and control access Access control lists (ACLs) and logs Complete configuration management reviews 2013 Content Delivery & Security Association Page 25 of 31 CF 5.13 Access Controls

CF 5.14. Remote Access CF 5.14 sets out the requirements for authorizing and accessing network systems from remote locations. Remote access controls must be enforced to mitigate the risk of loss or compromise to client content. Establish effective controls to secure remote access requirements. Policy and process to identify and control access. Evidence of ACL s logs. Present records of configuration reviews CF 5.15. Change Management CF 5.15 sets out the requirements for ensuring that all system configuration changes are properly authorized, tested and implemented. Change management will depend on the size and nature of operations. Effectively manage change within the site s networks. Policy and process to manage change Evidence of effective change Document configuration reviews 2013 Content Delivery & Security Association Page 26 of 31 CF 5.18 Internal Networks

CF 5.16. System Documentation CF 5.16 sets out the requirements necessary to demonstrate the full network landscape. A clear and well-defined system architectural document allows immediate and easy reference to the network landscape. Document detail and complexity will depend upon the size and nature of operations. Effectively document the systems architecture of all networks. System architecture policy or reference to production of system architecture Method of safeguarding presentational information Network landscape diagram CF 5.17. External Networks CF 5.17 sets out the requirements necessary for ensuring network integrity through segregation. External networks are those network segments with direct internet access such as DMZs (demilitarized zones). Maintain the security of external networks. Intrusion detection logs CF 5.18. Internal Networks CF 5.18 sets out the requirements necessary to ensure proper separation of network functions. For example Internal networks with no direct internet access. There may be multiple internal segments according to functions. Maintain the security of internal networks. Ensure separation of administrative functions Network maps (architectural diagrams) Intrusion detections system logs Separation of administrative functions 2013 Content Delivery & Security Association Page 27 of 31 CF 5.18 Internal Networks

CF 5.19. File Transfer Management CF 5.19 sets out the requirements relating to file transfer technologies and encryption of data. File transfer technologies in this context are those information exchange systems approved and used by content owners to distribute media to their supply chains and end users. The site must have full knowledge and oversight of all such technologies in use. Ensure effective file transfer methodologies and encryption. Policy for the use of all file transfer and encryption technologies Log files to prove controls are clearly understood and practiced CF 5.20. Firewall Management CF 5.20 sets out the requirements for firewall management. Firewalls control traffic flow between a trusted network and an untrusted or public network (e.g., internet). It is essential that program member protect IT systems from untrusted networks by way of an approved firewall. The program requires that firewalls must be correctly configured to reduce risk and deal appropriately with any threats that may be encountered. A formal system of review and logging is necessary to ensure an adequate level of protection. Ensure effective firewall management. Record of the use and configuration of devices deployed Evidence that devices are configured, controlled and reviewed regularly 2013 Content Delivery & Security Association Page 28 of 31 CF 5.20 Firewall Management

CF 5.21. Vulnerability Management CF 5.21 sets out the requirements necessary for vulnerability management. Applying a regime of good housekeeping can mitigate the majority of vulnerabilities. If not protected and updated, systems can become unstable, causing loss of data, which if not backed up can cause permanent loss or compromise of client assets. Vulnerability management seeks to eradicate these threats through proper application of: Anti-virus, Security updates, Server and system build configuration back-ups, Regular data back-ups, Vulnerability scanning, Testing. Ensure effective anti-virus is installed and maintained. Ensure that regular security updating reduces vulnerabilities. Ensure that server and system configuration back-ups are available in the event of an unplanned incident. Ensure that data maintains integrity and confidentiality in the event of a loss of services. Documented configuration of devices deployed Evidence that devices are configured, controlled and reviewed regularly 2013 Content Delivery & Security Association Page 29 of 31 CF 5.21 Vulnerability Management

CF 6. CF 6.1. TRAINING AND AWARENESS Training and Awareness Needs CF 6.1 sets out the requirements for security awareness. All employees, contractors, consultants and third-parties must be capable of delivering their services securely and shall be made aware of the security measures and requirements used to protect the confidentiality and integrity of customer assets and intellectual property. Ensure all personnel are competent and made aware of security requirements. Security training policy Training records 2013 Content Delivery & Security Association Page 30 of 31 CF 6.1 Training and Awareness Needs Error! Reference source not found.

CF 7. CF 7.1. INCIDENT MANAGEMENT AND RECOVERY PLANNING Incident Management and Recovery Planning CF7.1 Incident Management and Recovery planning sets out the requirements for Incident management and recovery planning. A process and ability to ensure investigation and recovery in the event an incident shall be demonstrated. The degree of complexity and ability to recover will be dependent and commensurate to the size and nature of operations. Events to be considered may include but are not exclusive to natural disaster, fire, flood, accident, civil unrest, equipment failures and deliberate or malicious acts of sabotage. To ensure the confidentiality, integrity and availability of client assets are maintained in the event of an unexpected or significant event or emergency. To minimize the impact on clients in the event of an unexpected or significant event or emergency. Business continuity plan and disaster recovery plan Management reviews and test results 2013 Content Delivery & Security Association Page 31 of 31 CF7.1 Incident Management and Recovery Planning