This document provides the MediaCentral administrator with an overview of the security
architecture for the MediaCentral environment and recommended best practices for a secure
operation. The document also provides an analysis of the MediaCentral UX application against
the most common security flaws for Web-based applications.
Intended Audience
This document is intended for anyone responsible for system security, including MediaCentral
administrators, Chief Security Officers, and IT administrators.
Product Version
MediaCentral version 2.3 and version 2.4.
c
Beginning with version 2.0, the product name “MediaCentral” replaces “Interplay
Central.” Specific product names are Avid MediaCentral Platform (bus infrastructure) and
Avid MediaCentral | UX (Web and mobile applications).
Revision History
Date RevisedChanges Made
November 23, 2015Added multiple-zone port information. See “MediaCentral Security
Architecture” on page 6
Updated version to MediaCentral version 2.4.
July 13, 2015First publication of version 2.3.
•Added information about strong password validation. See
MediaCentral Platform Services deliver workflow tools for media professionals through both
Web and mobile applications. The MediaCentral UX application allows individuals in different
media production roles to access the tools they need to complete tasks with greater access to
assets, team collaboration, and workflow agility. Through MediaCentral UX, users can access
existing Interplay Production assets and iNEWS story/rundown information.
Overview of MediaCentral Security
This section describes some common Web application concerns and how they are addressed by
the MediaCentral architecture.
Internet Security and Availability
The MediaCentral client accesses the MediaCentral server functionality through a Web-based
client. As with any Web-based application, information is passed over the Internet for the user to
log in and operate the application. MediaCentral utilizes standard HTTPS Internet transfer
protocols for secure information transfers, such as user login credentials. MediaCentral relies on
consistent Internet access for successful operation. If the application is disconnected due to
faulty Internet access, the user session closes and users are required to re-enter their credentials
when access is restored.
Overview of MediaCentral
MediaCentral version 2.0 and later uses Red Hat Enterprise Linux (RHEL) v6.5 as the server
operating system. For the latest information on approved security updates for RHEL 6.5 see the
Avid MediaCentral Platform Services ReadMe. You can download the ReadMe for version 2.3
from the following Knowledge Base page:
MediaCentral provides the client with access to existing Interplay Production assets and iNEWS
story/rundown information. As part of the login to MediaCentral, the user is also logged into
associated Interplay Production and iNEWS sessions using their existing Interplay Production
and iNEWS credentials. Access to these assets is controlled by the underlying applications
themselves, based on the user’s existing account privileges. The MediaCentral client does not
provide users access to any assets for which they do not have existing privileges.
3
Overview of MediaCentral Security
In order to provide for a single login experience, MediaCentral stores user login credentials
(MediaCentral, iNEWS, Interplay Production, and other customer user account information) in a
central user management database. All data is stored in this central database and all passwords
are maintained in an encrypted form. Note that MediaCentral leverages the existing iNEWS and
Interplay Production credentials (no modifications are made to existing accounts).
Control of Data
MediaCentral stores system configuration information, some of which includes login credentials
to other applications (such as iNEWS, Interplay Production). MediaCentral also stores user
configuration information (roles) and login credentials. A MediaCentral administrator does not
have access to any user private information. Access to user and system settings is limited as
described below.
There are three categories of settings:
•Home > User Settings (Basic, Video, Logging layouts), which are accessed only through a
user login. A MediaCentral administrator cannot access these settings.
•System Settings (System Settings layout), which are accessed only through an administrator
login. These settings define the overall MediaCentral environment.
•User Management settings (Users layout), which are accessed only through an administrator
login. These settings include settings for individual users, groups, and roles.
Specific information about the settings is available in the MediaCentral UX documentation. See
“Where to Find More Information” on page 22.
Security Incident Tracking
MediaCentral does not have the ability to track specific security incidents related to the
application.
Through the MediaCentral UI, the administrator has access to user session information (who is
logged in and at what time) and has the ability to manually terminate a specific user session if
required. The administrator also can review information contained in /var/log/audit/audit.log and
/var/log/secure, which contain a history of remote logins, authentication and authorization
privileges.
Example:
Jan 7 14:39:59 localhost sshd[3781]: Accepted password for root from
172.24.41.133 port 43239 ssh2
4
Overview of MediaCentral Security
Disaster Recovery and Business Continuity
•The MediaCentral application can operate within a clustered server configuration, providing
Active/Passive failover for continuity of services.
•The MediaCentral Playback Services (MCPS), which supports the player functionality in the
MediaCentral UI, is also load balanced, providing performance and failover support for
video streaming.
•The underlying MediaCentral database, which stores the user settings and system
configuration data, can be configured for data replication and failover. Continuous database
®
replication is performed by LINBIT
DRBD® (www.drbd.org).
Additional details are provided in the Avid MediaCentral Platform Services Installation and Configuration Guide.
•The MediaCentral Messaging Broker can operate in an active/active configuration with load
balancing. Other MediaCentral services (such as Attributes) are highly available using
Active/Passive failover and are not load balanced. All services are managed as a single
combined resource and will fail over as a group.
Regulatory Compliance
Due to the nature of the application and the information that is accessed and stored, the
MediaCentral application is not currently validated against any existing security compliance
standards (such as HIPAA, DSS, ISO 19779/27001).
5
MediaCentral Security Architecture
MediaCentral Security Architecture
MediaCentral Server
(Node 2)
MediaCentral Server
(Node 1)
Interplay
Production
Workgroup
ISIS 7000
MediaCentral Client
(External)
1Gb
10 GigE
10 Gb
Network
VPN Router /
Firewall
Internet
To House
Network
Data In Transit:
x User Credentials
x JPEG Images
x Machine
Instructions
x User
Credentials
x User Settings
x System
Attributes
Edge Switch
HTTPS
Session Creation
and Termination
Logs
1 Gb
Netwok
MediaCentral Client
(WAN/LAN)
ISIS 5000
ISIS 2000
10Gb
port
The diagram below provides an overview of the MediaCentral architecture with specific
references to application and data security. This diagram shows a clustered MediaCentral server
configuration.
MediaCentral Security Architecture
6
MediaCentral Security Architecture
A MediaCentral client requires user login credentials in order to gain access to the underlying
functionality. All data transfer to and from the MediaCentral client (user credentials, session
information, user configuration settings, media images and files, text, and machine instructions)
are transported in a secure manner to the MediaCentral server using HTTPS protocol.
MediaCentral clients that connect through the public Internet require VPN access into the server
network. All connections pass through the VPN router/firewall through identified ports. Once the
data has passed into the “house network” it is secured using the customer’s existing network
security infrastructure.
Users connected within the corporate LAN/WAN would not typically use VPN access but would
likely need to pass through firewalls and other network security devices with ACLs before
accessing the Avid Interplay network.
The following table lists the ports used by MediaCentral server that should be allowed through
the VPN firewall.
Table 1: VPN Firewall Port Settings
Protocol and
ComponentPort
DirectionUsage
MediaCentral Web application 80TCP InboundMediaCentral Playback
Services (MCPS) HTTP calls
File streaming from MCPS
443Secure TCP InboundMediaCentral HTTPS calls
Communication with
MediaCentral server
843TCP InboundServing Flash Player socket
policy files
5000TCP InboundPlayback service (loading
assets, serving JPEG images
and audio, etc.). Outbound
flow to client serving inbound
request.
MediaCentral mobile
applications
80TCP InboundMediaCentral Playback
Services (MCPS) HTTP calls
File streaming from MCPS
443Secure TCP InboundMediaCentral HTTPS calls
Communication with
MediaCentral server
7
Loading...
+ 15 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.