Delta MPA Best Practices · v5.1 → v5.3.1

Comprendre rapidement les changements MPA Best Practices pour piloter votre trajectoire TPN

Synthèse réalisée à partir des classeurs officiels fournis, sur le seul onglet Best Practices. Objectif: vous donner une lecture opérationnelle et exploitable des évolutions entre versions.

Évolution du nombre de contrôles

v5.1 (2023)

64

Contrôles total Best Practices

OR 10 · OP 9 · PS 9 · TS 36

v5.2 (2023)

66

Contrôles total Best Practices

OR 10 · OP 9 · PS 10 · TS 37

v5.3 (2025)

76

Contrôles total Best Practices

OR 13 · OP 9 · PS 11 · TS 43

v5.3.1 (2025)

82

Contrôles total Best Practices

OR 13 · OP 9 · PS 11 · TS 49

Changelog par transition

Les contrôles modifiés incluent les changements de texte Best Practices, Additional Recommendations, et les ajustements d'intitulés/portée.

v5.1 → v5.2

+4

Ajoutés

-2

Retirés

~62

Modifiés

  • Formalisation de la colonne Additional Recommendations.
  • Évolution du périmètre PS et TS avec de nouveaux contrôles ciblés.
  • Première réorganisation de certains intitulés et topics.
Voir les contrôles ajoutés/supprimés

Ajouts

  • OR-1.3 · Data & Assets
  • OP-2.1 · Remote Sites & Locations
  • PS-3.2 · Data Centers, Co-locations & Cloud Providers
  • TS-1.16 · Application Hardening Guidelines

Suppressions

  • OP-3.3 · Disposal
  • OR-3.4 · Contracts & Service Level Agreements

v5.2 → v5.3

+10

Ajoutés

-0

Retirés

~55

Modifiés

  • Hausse nette du nombre de contrôles OR et TS.
  • Introduction explicite des thématiques AI/ML (OR-5.0, TS-7.x).
  • Ajout des mappings NIST 800-207 et NIST-AI-600-1 dans la grille.
Voir les contrôles ajoutés/supprimés

Ajouts

  • OR-1.4 · Data & Assets
  • OR-5.0 · AI/ML - Security Management
  • PS-3.3 · Cloud Providers
  • TS-6.0/6.1/6.2 · Zero Trust Architecture
  • TS-7.0/7.1 · AI/ML technical controls

v5.3 → v5.3.1

+6

Ajoutés

-0

Retirés

~75

Modifiés

  • Ajout d'une dimension Applicative (colonne App) en plus de Site/Cloud.
  • Renforcement ciblé de la sécurité applicative (TS-8.0 à TS-8.3).
  • Affinage massif des Best Practices et des Additional Recommendations.
Voir les contrôles ajoutés/supprimés

Ajouts

  • TS-1.18 · Application Configuration Guidelines (In-House Developed)
  • TS-3.2 · Encryption Key Management
  • TS-8.0 · Application Error Handling and Logging
  • TS-8.1 · Application Session Management
  • TS-8.2 · Application Hosting
  • TS-8.3 · Application Security Testing

Détail des changements par ID (mode diff)

Comparaison ciblée uniquement sur les colonnes Best Practices et Additional Recommendations.

68 ID impactés sur la transition 5.1 -> 5.2.

OR-1.0 Modifié

Information Security Management System

+2 -3

Best Practices

  • - Establish, regularly review, and update upon key changes, an Information Security Management System (ISMS), which is approved by leadership of the organization, to include the following:
  • + Establish, regularly review, and update upon key changes, an Information Security Management System (ISMS) or Information Security Manual (ISM), which is approved by leadership of the organization, to include the following:

Additional Recommendations

  • - Recommend implementing the following:
  • - • Reference established Information and Content Security frameworks e.g. MPA Best Practices, ISO 27001, NIST 800-53, SANS, CoBIT, CSA, CIS, etc.
  • + • Reference established Information and Content Security frameworks (e.g., MPA Best Practices, ISO 27001, NIST 800-53, SANS, CoBIT, CSA, CIS, etc.)
OR-1.1 Modifié

Acceptable Use Policy

+4 -3

Best Practices

  • - Establish and regularly review an Acceptable Use Policy (AUP) governing the use of Internet (e.g. social media and communication activities) and mobile devices (e.g. phones, tablets, laptops, etc.), to include the following:
  • + Establish and regularly review an Acceptable Use Policy (AUP) governing the use of Internet (e.g., social media, communication activities, etc.) to include the following:

Additional Recommendations

  • - Recommend implementing the following:
  • - • Use dedicated accounts for marketing purposes
  • + • List of products approved by the organization
  • + • Acceptable uses of technologies
  • + • Use dedicated, company administered accounts for marketing and communication purposes
OR-1.2 Modifié

Business Continuity & Disaster Recovery Plans

+6 -8

Best Practices

  • - • Define threats to critical assets, locations, infrastructure, and business operations (e.g. loss of power or communications, systems failure, natural disasters, pandemics, breach, etc.)
  • + • Define threats to critical assets, locations, infrastructure, and business operations (e.g., loss of power or communications, systems failure, natural disasters, pandemics, breach, etc.)
  • + • Notification to affected business partners and clients in accordance with local laws, regulations, and agreements
  • - • Notification to affected business partners and clients, as applicable
  • - • Cover Work From Home (WFH)/remote workers, and business functions that are occurring remotely, as applicable

Additional Recommendations

  • - Recommend implementing the following for both BCP and DR:
  • - • Testing procedures of business continuity and disaster recovery processes regularly, to include tabletop exercises, if possible
  • + • Testing procedures of business continuity and disaster recovery processes regularly, to include tabletop exercises
  • - • Address in Shared Security Responsibility Model (SSRM), if applicable
  • + • Address in Shared Security Responsibility Model (SSRM)
  • - For Business Continuity, the following is recommended:
  • + For Business Continuity:
  • - For Disaster Recovery, the following is recommended:
  • + For Disaster Recovery:
OR-1.3 Ajouté

Data & Assets

+4 -0

Best Practices

  • + Establish and regularly review a policy and process for the classification, protection, and handling of Data & Assets throughout its lifecycle, according to local laws, regulations, and agreements.

Additional Recommendations

  • + • Data retention periods
  • + • Classify according to data sensitivity
  • + • Third-Party Service Provider data sharing responsibilities (e.g., via contract clauses, SSRM, , etc.)
OR-2.0 Modifié

Risk Management

+7 -9

Best Practices

  • - Establish a formal, documented security Risk Management Program, to include the following:
  • + Establish a formal, documented security Risk Management program, to include the following:

Additional Recommendations

  • - Recommend implementing the following:
  • - • Incorporate a systematic approach that uses likelihood of risk occurrence, impact to business objectives/content protection, and asset classification for assigning priority (e.g. Business Impact Assessment (BIA))
  • + • Incorporate a systematic approach that uses likelihood of risk occurrence, impact to business objectives/content protection, and asset classification for assigning priority (e.g., Business Impact Assessment (BIA))
  • + • Use an accredited third-party to conduct risk assessments
  • - • Risks identified should tie into the Business Continuity (BCP) and Disaster Recovery (DR) plans
  • + • Risks identified should tie into the Business Continuity (BCP) and Disaster Recovery (DR) Plans
  • - • Include risks to cloud environments and infrastructure, if applicable
  • + • Include risks to all environments and infrastructure
  • - • Document and maintain a Threat Modeling and Analysis process, as applicable
  • + • Document and maintain a Threat Modeling and Analysis process
  • + • Leverage NISTIR 8286, FAIR frameworks, or ISO 31000:2018/ISO 31010:2019, ISO 27005, & NIST 800-30
  • - • Ensure WFH/remote access content workflow risks are also documented and addressed, as applicable
  • - • Leverage NISTIR 8286, FAIR frameworks, or ISO 3100:2018
  • - • See NIST's Secure Software Development Framework (SSDF) NIST 800-218 (https://csrc.nist.gov/Projects/ssdf) as an example for Threat Modeling and on how to develop a Secure Software Development Lifecyle (SSDLC) process for coverage of training, requirements, design, development, testing, release and response
OR-3.0 Modifié

Background Screening

+4 -4

Best Practices

  • - Establish and regularly review a policy and process for Background Screening on all relevant employees, WFH/remote workers, temporary workers, interns, and third-party workers (e.g. contractors, freelancers, temp agencies etc.), to include the following:
  • + Establish and regularly review a policy and process for Background Screening on all relevant full- and part-time employees, consultants, contractors, and interns, to include the following:
  • - • Perform in accordance with relevant laws, regulations, union bylaws, and cultural considerations
  • + • Perform in accordance with local laws, regulations, agreements, and cultural considerations

Additional Recommendations

  • - Recommend implementing the following:
  • + • Apply to freelancers and temporary workers
  • - • Use an accredited Background Screening company
  • + • Use an accredited background screening company
OR-3.1 Modifié

On-boarding/Off-boarding

+12 -13

Best Practices

  • - Establish and regularly review a process for the On-boarding/Off-boarding of employees, WFH/remote workers, temporary workers, interns, and third-party workers (e.g. contractors, freelancers, temp agencies) by performing the following:
  • + Establish and regularly review a process for the On-boarding/Off-boarding of all relevant full- and part-time employees, consultants, contractors, interns, freelancers, and temporary workers, by performing the following:
  • - • Perform background screening
  • - • Provision physical/digital access, as needed
  • + • Provision physical/digital access
  • - • Confidentiality Agreements, Non-Disclosure Agreements (NDAs), etc. specifically applied for on-boarding
  • + • Confidentiality Agreements, Non-Disclosure Agreements (NDAs), etc., specifically applied for on-boarding
  • - • Transfer ownership of data & access, as required
  • + • Transfer ownership of data & access
  • - • De-provision physical/digital access, as needed
  • + • De-provision physical/digital access
  • - • Return all company assets/equipment (e.g. keys, fobs, badges, devices, etc.)
  • + • Return all company assets/equipment (e.g., keys, fobs, badges, devices, etc.)
  • - • Confidentiality Agreements, Non-Disclosure Agreements (NDAs), etc. specifically applied for off-boarding
  • + • Confidentiality Agreements, Non-Disclosure Agreements (NDAs), etc., specifically applied for off-boarding

Additional Recommendations

  • - Recommend implementing the following:
  • - • Apply on a per-project basis, as applicable
  • + • Apply on a per project basis
  • - • For WFH/remote workers, confidentiality agreements are also recommended for other members at the remote location (e.g. roommate, spouse, etc.), where local laws allow
  • - • Review for role/job changes, geographical relocations, and leave of absence, as applicable
  • + • Review for role/job changes, geographical relocations, and leave of absence
  • - • Review disciplinary policy, as applicable
  • + • Review disciplinary policy
  • + • For Third-Party IT Service Provider, access to be limited to a specific time frame and enforced via account lockout
  • + • Issue photo ID badge for all relevant employees and third-party personnel
OR-3.2 Modifié

Training & Awareness Program

+4 -5

Best Practices

  • - Establish and regularly review a Training and Awareness Program about security policies and procedures and train employees, WFH/remote workers, temporary workers, interns, and third-party workers (e.g. contractors, freelancers, temp agencies) upon hire and annually, to include the following:
  • + Establish and regularly review a Training & Awareness Program about security policies and procedures and train all relevant full- and part-time employees, consultants, contractors, and interns upon hire and annually, to include the following:
  • - • Develop tailored training based on job responsibilities (e.g. interaction with content)
  • + • Develop tailored training based on job responsibilities (e.g., interaction with content)

Additional Recommendations

  • - Recommend implementing the following:
  • - • Include training for social engineering, ransomware, malware, phishing, WFH/remote working risks, etc.
  • + • Include training for social engineering, ransomware, malware, phishing
  • - • Develop a program to test effectiveness of training (e.g. phishing campaigns, tabletop exercises, etc.)
  • + • Develop a program to test effectiveness of training (e.g., phishing campaigns, tabletop exercises, etc.)
OR-3.3 Modifié

Contracts & Service Level Agreements

+12 -11

Best Practices

  • - Establish and regularly review a policy and procedure to secure content accessed, processed and/or stored at Remote Sites and Locations (i.e. Work From Home (WFH)/remote workers), to include the following:
  • - • Enable Multi-Factor Authentication (MFA) for remote access
  • - • WFH/remote workers must be trained on the Remote and Home Working Policy (WFH) and Procedures, as part of their security awareness training, to include acknowledgement of Policies and Procedures
  • - • Define where WFH/remote work is permitted, and where it is not (e.g. home ok, coffee shop not ok)
  • - • The method of remote access to the organization’s internal systems to perform post-production and/or content creation work
  • - • Establish minimum requirements for physical protection of company assets at the remote location
  • - • The use of studio approved pixel streaming remote access (e.g. PCoIP, RGS, Parsec, NICE DCV, etc.) that restricts processing and content storage on local endpoint devices
  • + Ensure Contracts & Service Level Agreements (SLAs) with Third-Party Service Providers (i.e., external companies that are paid for services provided), include the following:
  • + • Business Continuity (BCP) and Disaster Recovery (DR) Plans
  • + • Data handover and disposal upon service termination
  • + • Risk Management process
  • + • Ability to obtain requested Information Security Compliance Certificates and/or Attestations
  • + • Background screening
  • + • Confidentiality Agreements/NDAs
  • + • Notification if services are outsourced or subcontracted
  • + • Handling and reporting of incidents
  • + • In accordance with local laws, regulations, and agreements

Additional Recommendations

  • + • An independent, third-party review/audit of the effectiveness of the Service Provider security and privacy controls is performed (e.g., MPA Best Practices, CSA Star, ISO, SOC 2 Type 2, etc.)
  • + • Audit covers the following: Organizational, Operational, Physical, and Technical Security
  • - Recommend implementing the following:
  • - • Restricting unauthorized access to content from others at the remote working location (e.g. roommate, spouse, etc.).
  • - • Requirements and restrictions for the configuration of wireless network services (Note: wired connection is preferred)
  • - • Where feasible, encourage the use of corporate owned devices when content is stored locally on the endpoint device
OR-3.4 Supprimé

Contracts & Service Level Agreements

+0 -12

Best Practices

  • - Ensure Contracts and/or Service Level Agreements (SLAs) with Third-Party Service Providers include the following:
  • - • Business Continuity (BCP) and Disaster Recovery (DR) Plans
  • - • Data handover and disposal upon service termination
  • - • Risk Management process
  • - • Background screening
  • - • Confidentiality Agreements/NDAs
  • - • Notification if services are outsourced or subcontracted
  • - • Handling and reporting of incidents
  • - • Compliance with applicable data privacy laws
  • - • Cloud deployments

Additional Recommendations

  • - Recommend implementing the following:
  • - • An independent, third-party review/audit of the effectiveness of the Service Provider security and privacy controls is performed (e.g. MPA Best Practices, CSA Star, ISO, SOC 2 Type 2, etc.), to cover the following: Organizational, Operational, Physical, and Technical Security
OR-4.0 Modifié

Incident Response

+7 -9

Best Practices

  • - Establish and regularly review a formal Incident Management process, which covers both IT and content incidents/events, to include the following:
  • + Establish and regularly review a formal Incident Response process, which covers both IT and content incidents/events, to include the following:
  • + • A corrective action process, to include root cause, lessons learned, preventative measures taken, etc.

Additional Recommendations

  • - Implementation Guidance:
  • - Recommend implementing the following:
  • - • Apply to cloud deployments (e.g. IaaS, PaaS, SaaS)
  • - • Apply to employees, WFH/remote workers, temporary workers, interns, third-party workers (e.g. contractors, freelancers, temp agencies etc.), and visitors
  • + • Incidents are addressed within 48 hours
  • + • Apply to all relevant full- and part-time employees, consultants, contractors, interns, freelancers, temporary workers, and visitors
  • - • Maintain key contact information, including clients
  • + • Maintain key contact information, including business partners and clients
  • - • Notification of law enforcement, where applicable
  • + • Notification of law enforcement
  • + • Anonymous reporting
  • - • Anonymous reporting, where possible
  • - • A corrective action process, to include root cause, lessons learned, preventative measures taken, etc.
OP-1.0 Modifié

Receiving

+3 -5

Best Practices

  • + Establish and regularly review a Receiving process for physical client assets, to include maintaining a receiving log to be filled out by designated personnel upon receipt of deliveries.
  • - Establish and regularly review a Receiving process to receive physical client assets, to include the following:
  • - • Maintain a receiving log to be filled out by designated personnel upon receipt of deliveries

Additional Recommendations

  • - Recommend implementing the following:
  • - • For receiving log, include the following information: Name and signature of courier/delivering entity, name and signature of recipient, time and date of receipt
  • + • For receiving log, include the following information: name and signature of courier/delivering entity, name and signature of recipient, time and date of receipt
  • - • For assets that can't be delivered immediately, store in a secure area (e.g. vault, safe, high-security cage, etc.), including overnight deliveries
  • + • For assets that can't be delivered immediately, store in a secure area (e.g., vault, safe, high-security cage, etc.), including after-hours deliveries
OP-1.1 Modifié

Packaging

+2 -3

Best Practices

  • - Establish and regularly review a Packaging process to package assets according to client specifications and destination laws.
  • + Establish and regularly review a Packaging process to package assets in accordance with local laws, regulations, and agreements.

Additional Recommendations

  • - Recommend implementing the following:
  • - • Secure containers depending on asset value (e.g. Pelican case with a combination lock)
  • + • Secure containers depending on asset value (e.g., Pelican case with a combination lock)
OP-1.2 Modifié

Shipping

+0 -1

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - Recommend implementing the following:
OP-1.3 Modifié

Transport Vehicles

+3 -2

Best Practices

  • - • Lock the vehicle at all times
  • + • Always lock the vehicle
  • + • Apply to third-party couriers

Additional Recommendations

  • - Recommend implementing the following:
  • + • Restrict courier access into high security areas
OP-2.0 Modifié

Work From Home/Remote Workers

+16 -5

Best Practices

  • - Establish and regularly review a policy and process for the classification, protection, and handling of Data and Assets throughout its lifecycle, according to applicable laws and regulations.
  • + Establish and regularly review a policy and process for Work From Home (WFH)/Remote Workers, in accordance with local laws, regulations, and agreements, and apply the following Best Practices:
  • + • Authentication & Authorization
  • + • Background Screening
  • + • Business Continuity Plan
  • + • Endpoint Protection
  • + • Identity Access Management
  • + • On-boarding/Off-boarding
  • + • Remote Access
  • + • Risk Management
  • + • Training & Awareness
  • + • Wireless Networks

Additional Recommendations

  • - Recommend implementing the following:
  • - • Data retention periods
  • - • Classify according to data sensitivity
  • - • Third-Party Service Provider data sharing responsibilities (e.g. via contract clauses and SSRM)
  • + • Apply Incident Response Best Practices
  • + • For on-boarding, confidentiality agreements for other members at the remote location (e.g., roommate, spouse, etc.)
  • + • Maintain a list of authorized remote access users
  • + • Regularly review user list for discrepancies, and unusual or suspicious activity
  • + • Disconnect wireless networks while accessing content locally
OP-2.1 Ajouté

Remote Sites & Locations

+10 -0

Best Practices

  • + Establish and regularly review a policy and process to secure Remote Sites & Locations, and apply the following Best Practices:
  • + • Disaster Recovery
  • + • Entry/Exit Points
  • + • Remote Access

Additional Recommendations

  • + For sensitive content and data:
  • + • Restrict unauthorized access to content from others at the remote working location (e.g., roommate, spouse, etc.)
  • + • Attach privacy screens to monitors where content or sensitive information is visible to others
  • + • Logs for content accessed, processed, and/or stored
  • + • Apply Alarm System Best Practices
  • + • Apply Camera System Best Practices
OP-3.0 Modifié

Tracking

+3 -4

Best Practices

  • - Establish and regularly review a Tracking process for physical and digital client assets, to include the following:
  • + Establish and regularly review a Tracking process for physical and/or digital client assets, to include the following:
  • - • Utilize a unique asset identifier (e.g., barcode, unique ID) in the system, to include the location, time, and date of each asset transaction
  • + • Utilize a unique asset identifier (e.g., barcode, unique ID, etc.) in the system, to include the location, time, and date of each asset transaction

Additional Recommendations

  • - Recommend implementing the following:
  • - • Implement watermarking as instructed by client (e.g. spoiling, invisible/visible, forensic, etc.)
  • + • Implement watermarking as instructed by client (e.g., spoiling, visible, forensic, etc.)
OP-3.1 Modifié

High Security Titles

+7 -5

Best Practices

  • - Establish and regularly review a process to support the handling of client classified High Security Titles (e.g. Tier 0), to include the following:
  • + Establish and regularly review a process to support the handling of client classified High Security Titles, to include the following:
  • - • Aliases (e.g. AKA, working title, code name, etc.)
  • + • Aliases (e.g., AKA, working title, code name, etc.)
  • + • Individual NDAs/Confidentiality Agreements

Additional Recommendations

  • - Recommend implementing the following:
  • - • Use client assigned security title aliases on assets and in asset tracking systems, including lifecycle management (e.g. handling of alias pre vs post-release)
  • + • Use client assigned security title aliases on assets and in asset tracking systems, including lifecycle management (e.g., handling of alias pre- vs post-release)
  • - • Individual NDAs/Confidentiality Agreements, as applicable
  • + • Use of separate network (e.g., physical or logical segmentation)
  • + • A dedicated partition on shared storage
  • + • Store physical assets for high security titles (e.g., scripts, art, external hard drives, etc.) in a secured area while not in use
OP-3.2 Modifié

Disposal

+13 -8

Best Practices

  • + Establish and regularly review a process for the physical Disposal of stock/client assets (e.g., discs, storyboards, scripts, hard drives, etc.), to include the following:
  • + • Segregation of duties between asset handler/creator and personnel performing the destruction of assets
  • + • Store assets in a secure location/container prior to disposal
  • + • Erasing, degaussing, shredding, or physically destroying before disposal
  • - Establish and regularly review a process for Blank Media & Raw Stock to include:
  • - • Segregation of duties (e.g. between requestor and personnel authorizing check-out, inventory counter, and vault staff, etc.)
  • - • Allow access to storage areas (e.g. locked cabinet, safe) to only authorized personnel
  • - • Tagging (e.g. barcode, assign unique identifier) per unit received
  • - • Designating a secure storage area (e.g. locked cabinet, safe)
  • - • Check in/out process to include logging and monitoring

Additional Recommendations

  • - Recommend implementing the following:
  • - • Reconciliation on a regular basis (e.g. inventory counts)
  • + • Destruction is performed on-site
  • + • Destruction is supervised by company personnel, including a sign-off
  • + • When using a third-party company for destruction, obtain a Certificate of Destruction (CoD)
  • + • Complete destruction within 30 days
  • + • Shred bins are locked with openings small enough that a hand cannot fit inside
  • + • Restrict keys to shred bins to authorized personnel only
  • + • Maintain a log of asset disposal for at least one year
  • + • For hardware (e.g., laptops, servers, etc.), utilize corporate IT Asset Disposition standards
  • + Reference U.S. Department of Defense 5220.22-M & NIST SP 800-88 for digital shredding and wiping standards
OP-3.3 Supprimé

Disposal

+0 -13

Best Practices

  • - Establish and regularly review a process for the Disposal of stock/client assets (e.g. discs, storyboards, scripts, hard drives, etc.) to include:
  • - • Segregation of duties between asset handler/creator and personnel performing the destruction of assets, if possible
  • - • Store assets in a secure location/container prior to disposal
  • - • Erasing, degaussing, shredding, or physically destroying before disposal

Additional Recommendations

  • - Recommend implementing the following:
  • - • Destruction is performed on-site
  • - • Destruction is supervised by company personnel, including a sign-off
  • - • When using a third-party company for destruction, obtain a Certificate of Destruction (CoD)
  • - • Complete destruction within 30 days
  • - • Shred bins are locked with openings small enough that a hand cannot fit inside
  • - • Restrict keys to shred bins to authorized personnel only
  • - • Maintain a log of asset disposal for at least one year
  • - • Reference U.S. Department of Defense 5220.22-M for digital shredding and wiping standards
PS-1.0 Modifié

Entry/Exit Points

+3 -6

Best Practices

  • - • Apply to facility server room, screening room, datacenters, co-locations, loading docks, cloud providers, etc.
  • + • Apply to facility server room, screening room, loading docks, etc.
  • - • For an owned and operated datacenter/co-location or cloud provider, proof can be provided via audit reports covering physical security
  • - • Apply to WFH/remote locations, if applicable

Additional Recommendations

  • - Recommend implementing the following:
  • - • Access control segmentation between content areas and other parts of the facility (e.g. administrative offices, waiting rooms, loading docks, courier pickup and drop-off areas, replication, and mastering)
  • + • Access control segmentation between content areas and other parts of the facility (e.g., administrative offices, waiting rooms, loading docks, courier pickup and drop-off areas, replication, mastering, etc.)
  • - • Attach privacy screens to monitors
  • + • Attach privacy screens to monitors where content or sensitive information is visible to others
PS-1.1 Modifié

Visitors

+7 -8

Best Practices

  • - Establish a process for Visitors to include the following:
  • + Establish a process for Visitors who have access to high security areas, to include the following:
  • - • Retain Visitor logs for one year at a minimum, or as local laws allow
  • + • Retain visitor logs for one year at a minimum, in accordance with local laws, regulations, and agreements
  • - • Verification of identity via valid government issued photo ID (e.g. drivers license, passport, etc.)
  • + • Verification of identity via valid government issued photo ID (e.g., driver's license, passport, etc.)
  • - • NDA/Confidentiality Agreement for Visitors interacting with sensitive content, as applicable
  • + • NDA/Confidentiality Agreement for visitors with access to sensitive content

Additional Recommendations

  • - Recommend implementing the following:
  • - • Visitor log to capture: Name, company, entry/exit time, reason for visit, person(s) visiting, and signature of visitor
  • + • Visitor log to capture: name, company, entry/exit time, reason for visit, person(s) visiting, and signature of visitor
  • - • Make Visitor badges/stickers easily distinguishable from company personnel badges
  • + • Make visitor badges/stickers easily distinguishable from company personnel badges
  • - • Accompanied by an authorized employee, as feasible
  • + • Accompanied by an authorized employee
PS-1.2 Modifié

Electronic Access Control

+5 -7

Best Practices

  • - Establish and regularly review a process to implement Electronic Access Control (EAC) throughout the facility to cover all areas where content is stored, transmitted, or processed, to include the following:
  • + Establish and regularly review a process to implement Electronic Access Control (EAC) to cover all high security areas, to include the following:
  • - • Designate an individual(s) to authorize facility access
  • + • Designate an individual(s) to authorize access
  • - • Assign electronic access to specific facility areas based on job function and responsibilities
  • + • Assign electronic access to specific areas based on job function and responsibilities (e.g., vault, server/machine room, etc.) to authorized personnel only
  • - • Keep a log that ties the device (e.g. badge, keycard/fob, etc.) to each company personnel
  • + • Keep a log that ties the device (e.g., badge, keycard/fob, etc.) to each company personnel
  • - • Restrict access to production systems and areas (e.g. vault, server/machine room) to authorized personnel only

Additional Recommendations

  • - Recommend implementing the following:
  • - • Set third-party, contractor, etc. to approved timeframe with expiration date (e.g. 90 days)
  • + • Set third-party, contractor, etc., to approved timeframe with expiration date (e.g., 90 days)
PS-1.3 Modifié

Electronic Access Control Logging & Monitoring

+4 -5

Best Practices

  • - Establish and regularly review a process for Electronic Access Logging and Monitoring, to include the following:
  • + Establish and regularly review a process for Electronic Access Control Logging & Monitoring, to include the following:
  • - • Automated alerts for suspicious or unusual events to restricted areas
  • - • Escalation procedures to appropriate personnel
  • - • Retain logs for one year at a minimum, or as local laws allow
  • + • Retain logs for one year at a minimum, in accordance with local laws, regulations, and agreements

Additional Recommendations

  • - Recommend implementing the following:
  • + • Automated alerts for suspicious or unusual events for restricted areas
  • + • Escalation procedures to appropriate personnel
PS-1.4 Modifié

Alarm System

+4 -6

Best Practices

  • - Install and maintain an Alarm System that covers all entry/exit points (including emergency exits), windows, loading docks, fire escapes, and restricted areas (e.g. vault, server/machine room, etc.), to include the following:
  • + Install and maintain an Alarm System that covers all entry/exit points to high security areas (including emergency exits), windows, loading docks, fire escapes, and restricted areas (e.g., vault, server/machine room, etc.), to include the following:
  • - • For an owned and operated datacenter/co-location or cloud provider, proof can be provided via audit reports

Additional Recommendations

  • + For high security areas:
  • + • Motion sensors
  • + • Door prop alerts
  • - Recommend implementing the following:
  • - • Motion sensors to cover sensitive areas (e.g. vault, production areas, etc.)
  • - • Door prop alerts in restricted areas (e.g. vault, server/machine rooms)
  • - • Apply to WFH/remote locations, if possible
PS-1.5 Modifié

Keys

+5 -6

Best Practices

  • - Establish and regularly review a process to manage the distribution of physical Keys to restricted areas to authorized personnel only (e.g. owner, facilities management, etc.), to include the following:
  • + Establish and regularly review a process to manage the distribution of physical Keys to restricted areas to authorized personnel only (e.g., owner, facilities management, etc.), to include the following:
  • - • Implement a check-in/check-out process to track and monitor the distribution of keys
  • + • Implement a check-in/check-out process for master keys to track and monitor the distribution
  • - • Maintain a list of company personnel who are allowed to check out keys and review the list regularly
  • + • Maintain a list of company personnel who are allowed to check out master keys and review the list regularly
  • - • All keys should be stored in a safe location (e.g. lockbox or safe)
  • + • All keys should be stored in a safe location (e.g., lockbox or safe)

Additional Recommendations

  • + A check-in/check-out process to track and monitor the distribution of non-master Keys
  • - Recommend implementing the following:
  • - • For an owned and operated datacenter/co-location or cloud provider, proof can be provided via audit reports
PS-2.0 Modifié

Replication Facilities

+6 -4

Best Practices

  • - Establish, regularly review, and audit the policy and process for Replication and Distribution Facilities, as permitted by local laws, to perform searches of persons, bags, packages, and personal belongings for content/assets at key entry/exit points, as applicable.
  • + Establish and regularly review a policy and process for Replication Facilities, in accordance with local laws, regulations, and agreements, to include the following:
  • + • Perform searches of persons, bags, packages, and personal belongings for content/assets
  • + • Searches performed at key entry/exit points
  • + • Regular audit of process

Additional Recommendations

  • - Recommend also including the following:
  • + • Apply to recording/storage devices (e.g., USB thumb drives, digital cameras, cell phones, etc.) in high security areas
  • + • Use of transparent bags and containers
  • - • Recording/storage devices (e.g. USB thumb drives, digital cameras, cell phones. etc.)
  • - • Use of transparent bags and containers, as applicable
PS-3.0 Modifié

Camera System

+4 -6

Best Practices

  • - Install and maintain a Camera System that captures all facility entry/exit points and restricted areas (e.g. server/machine room, storage areas, vaults, etc.), as local laws allow, to include the following:
  • + Install and maintain a Camera System that covers all entry/exit points to high security areas (including emergency exits), windows, loading docks, fire escapes, and restricted areas (e.g., vault, server/machine room, etc.), to include the following:
  • - • Restrict physical and/or logical access to the surveillance camera console and to camera equipment (e.g. DVRs, NVRs) to authorized personnel only
  • + • Restrict physical and/or logical access to the surveillance camera console and to camera equipment (e.g., DVRs, NVRs, etc.) to authorized personnel only
  • + • Retain footage in a secure location for at least 90 days, or the maximum time allowed, in accordance with local laws, regulations, and agreements
  • - • For an owned and operated datacenter/co-location or cloud provider, proof can be provided via audit reports
  • - • Retain footage for at least 90 days, or the maximum time allowed by law, in a secure location

Additional Recommendations

  • - Recommend implementing the following:
  • - • Apply to WFH/remote worker locations, if possible
  • + • Install cameras in all areas of the facility, including non-high security areas
PS-3.1 Modifié

Environmental Controls

+6 -7

Best Practices

  • - Install and regularly review Environmental Controls for facilities that contain servers, storage devices, LAN equipment, network communications devices, and storage media to include the following:
  • + Install and regularly review Environmental Controls for facilities that contain servers, storage devices, LAN equipment, network communications devices, and storage media, to include the following:

Additional Recommendations

  • - Recommend the following settings:
  • + Environmental Control settings:
  • - • Temperature (Low End): 64.4 F (18 C)
  • + • Temperature (Low End): 64.4 degrees F (18 degrees C)
  • - • Temperature (High End): 80.6 (27 C)
  • + • Temperature (High End): 80.6 degrees F (27 degrees C)
  • - • Moisture (Low End): 40% relative humidity and 41.9 F (5.5 C) dew point
  • + • Moisture (Low End): 40% relative humidity and 41.9 degrees F (5.5 degrees C) dew point
  • - • Moisture (High End): 60% relative humidity and 59 F (15 C) dew point
  • + • Moisture (High End): 60% relative humidity and 59 degrees F (15 degrees C) dew point
  • - • For an owned and operated datacenter/co-location or cloud provider, proof can be provided via audit reports
PS-3.2 Ajouté

Data Centers, Co-locations & Cloud Providers

+27 -0

Best Practices

  • + For an owned and operated Data Center and/or Co-location, or when utilizing a Cloud Provider, proof can be provided via policy, procedure, or audit report documents, that includes the following Best Practices:
  • + • Alarm System
  • + • Application Hardening Guidelines
  • + • Authentication & Authorization
  • + • Camera System
  • + • Change Control
  • + • Contracts & Service Level Agreements
  • + • Encryption
  • + • Endpoint Protection
  • + • Entry/Exit Points
  • + • Environmental Controls
  • + • Identity Access Management
  • + • Incident Response
  • + • Network Topology Diagram
  • + • Patching
  • + • Penetration Testing
  • + • Risk Management
  • + • Shared Security Responsibility Model
  • + • Systems Configuration
  • + • Vulnerability Management
  • + • Web & Cloud Portals

Additional Recommendations

  • + When utilizing a Cloud Provider, proof can be provided via policy, procedure, or audit report documents, that includes the following Best Practices:
  • + • Review user access list to the client cloud portal regularly
  • + • Use of a Cloud Access Security Broker (CASB) to monitor and restrict cloud software usage and access
  • + • Cloud Service Providers (CSPs) should provide Cloud Service Consumers (CSC) with the ability to manage their own encryption keys
  • + • Intra-tenant segregation between Cloud Service Provider (CSP) and Cloud Service Consumer (CSC)
  • + • Cloud hosted directory services (e.g., JumpCloud, OKTA, Azure Active Directory, AWS Directory Service, etc.)
TS-1.0 Modifié

Data I/O Workflows & Systems

+5 -9

Best Practices

  • - Establish and regularly review a process for Data I/O Workflows and Systems, to include the following:
  • + Establish, document, and regularly review a workflow and process for Data I/O Workflows and Systems, to include the following:
  • + • Use dedicated data I/O systems to move content between external networks (Internet) and internal networks (data I/O network, production)
  • - • Dedicated systems for data I/O
  • - • Segregation of duties between data I/O staff and production staff
  • + • Segregation of duties between data I/O staff and other staff (e.g., production, development, etc.)
  • - • Use dedicated data I/O systems to move content between external networks (Internet) and internal networks (data I/O network, production)
  • - • Content movement must be initiated from the more secure layer: i.e. push/pull content at the data I/O zone to/from Internet; push/pull content at the production network to/from the data I/O zone
  • + • Content movement must be initiated from the more secure layer (e.g., push/pull content at the data I/O zone to/from Internet; push/pull content at the production network to/from the data I/O zone)
  • - • Hardware-encrypted hard drives using Advanced Encryption Standard (AES) 256-bit encryption can also be used to transfer data between production networks and data I/O systems (e.g. ‘air gapped network’)
  • + • Hardware-encrypted hard drives using at least Advanced Encryption Standard (AES) 256-bit encryption can also be used to transfer data between production networks and data I/O systems (e.g., ‘air gapped network’)

Additional Recommendations

  • - Recommend implementing the following:
  • - • WFH/remote workers that ingest content using their machine should always be disconnected from Internet after content download, during production work, and after content upload
  • - • If content is not downloaded or uploaded by WFH/remote workers, it is only accessed via a studio approved remote pixel streaming connection (e.g. PCoIP, RGS, Parsec, NICE DCV, etc.), then the previous point is not applicable
TS-1.1 Modifié

Systems Configuration

+7 -7

Best Practices

  • - Establish and regularly review security baselines, policies, and procedures to Configure Corporate Systems and Infrastructure (e.g. laptops, workstations, servers, SAN/NAS, virtual machine infrastructure, WAN, LAN) used at an onsite facility, cloud infrastructure, and for those used by WFH/remote workers, to include the following:
  • + Establish and regularly review security baselines, policies, and procedures to Configure Corporate Systems and Infrastructure (e.g., laptops, workstations, servers, SAN/NAS, virtual machine infrastructure, WAN, LAN, etc.), to include the following:
  • - • Remove, uninstall, or disable all unnecessary software and services
  • + • Remove, uninstall, or disable all unnecessary software, protocols, and services
  • - • Block input/output (I/O), mass storage, external storage, and mobile storage devices on all systems that handle or store content, with the exception of systems used for content I/O
  • + • Block input/output (I/O), mass storage, external storage, and mobile storage devices on all systems that manage or store content, except for systems used for content I/O
  • + • Apply secure configuration standards before a system is connected to the environment
  • + • Leverage hardening guidelines provided by application providers

Additional Recommendations

  • - Recommend implementing the following:
  • + • Implement password-protected screensavers or screen-lock software for all production and non-production systems
  • + • Screensavers and/or screen-lock software activates after a maximum of 10 minutes of inactivity
  • - • Leverage hardening guidelines provided by application providers
  • - • Implement password-protected screensavers or screen-lock software for servers, workstations, cloud endpoints, and WFH/remote workers
  • - • Apply to BYOD, where possible
TS-1.2 Modifié

Default Accounts

+3 -5

Best Practices

  • - • Identify all default account(s)
  • + • Identify all default accounts
  • - • Change the default username(s), when possible
  • + • Change the default usernames

Additional Recommendations

  • - Recommend implementing the following:
  • - • Limit the use of these accounts to special situations that require these credentials (e.g. operating system updates, patch installations, software updates, etc.).
  • + Limit the use of these accounts to special situations that require these credentials (e.g., operating system updates, patch installations, software updates, etc.)
  • - • Apply to WFH/remote workers on equipment, such as firewalls, WIFI, and routers, etc., if possible
TS-1.3 Modifié

Endpoint Protection

+5 -8

Best Practices

  • - • Endpoint protection, anti-virus, and anti-malware software with a centralized management console
  • + • Endpoint protection and anti-virus/anti-malware software with a centralized management console
  • - • Updating anti-virus and anti-malware definitions regularly and performing regular scans on systems
  • + • Updating anti-virus/anti-malware definitions regularly and performing regular scans on systems
  • - • Apply to WFH/remote worker devices, if possible
  • - • Workstations (e.g. desktop, laptop)
  • + • Workstations (e.g., desktop, laptop, etc.)
  • - • Cloud infrastructure

Additional Recommendations

  • - Recommend implementing the following:
  • - • Local firewalls, where feasible
  • + • Local firewalls
  • + • Endpoint protection software sends logs to a central logging solution
  • - • Apply to BYOD, where possible
TS-1.4 Modifié

Mobile Devices

+8 -3

Best Practices

  • - Establish and regularly review a process to define security controls and standards for company issued and managed Mobile Devices (e.g. tablets, cell phones, laptops, etc.), to include the following:
  • + Establish and regularly review a policy and process to define security controls and standards for company issued and managed Mobile Devices (e.g., tablets, cell phones, laptops, etc.), to include the following:
  • + • Apply Acceptable Use Policy (AUP) Best Practice

Additional Recommendations

  • - Recommend implementing the following:
  • - • Apply to BYOD, where possible
  • + For Bring Your Own Devices (BYOD), in accordance with local laws, regulations, and agreements, apply the following Best Practices:
  • + • Corporate Email Filtering
  • + • Endpoint Protection
  • + • Patching
  • + • Systems Configuration
  • + • Web Filtering
TS-1.5 Modifié

Security Information & Event Management

+8 -6

Best Practices

  • - Implement Security Information and Event Management (SIEM) and regularly review system logs, to include the following:
  • + Implement Security Information & Event Management (SIEM) and regularly review system logs, to include the following:
  • - • Centralized real-time logging of firewalls, authentication servers, network operating systems, content transfer systems, remote access mechanisms, virtual machines/servers, storage services, databases, container-based application services, API gateway connections, key generation/management, etc.
  • + • Centralized real-time logging of firewalls, authentication servers, network operating systems, content transfer systems, virtual machines/servers, storage services, databases, container-based application services, API gateway connections, key generation/management, etc.
  • - • Retain logs for a period of one year, where local laws permit
  • + • Retain logs for a period of one year, in accordance with local laws, regulations, and agreements
  • - • A synchronized time service protocol (e.g. Network Time Protocol (NTP)) to ensure all systems have a correct and consistent time
  • + • A synchronized time service protocol (e.g., Network Time Protocol (NTP)) to ensure all systems have a correct and consistent time
  • - • Incorporate into BCP & Incident Response procedures
  • + • Incorporate into Business Continuity Plan & Incident Response procedures

Additional Recommendations

  • - Recommend implementing the following:
  • + • Administrator account creation, modification, or deletion
  • + • File Integrity Monitoring for sensitive data and applications
  • + • Failure of critical security systems (e.g., Firewall, IDS/IPS, endpoint protection, physical and logical access controls, etc.)
TS-1.6 Modifié

Authentication & Authorization

+9 -10

Best Practices

  • - Establish and regularly review a policy to enforce Authorization and Authentication policy of employees, WFH/remote workers, temporary workers, interns, and third-party workers (e.g. contractors, freelancers, temp agencies), administrative accounts, service accounts, to include the following:
  • + Establish and regularly review a policy to enforce Authentication & Authorization policy of all relevant full- and part-time employees, consultants, contractors, interns, freelancers, temporary workers, administrative accounts, service accounts, to include the following:
  • - • Use the principles of least privilege
  • + • Use the Principle of Least Privilege (PoLP)
  • - For Multi-Factor Authentication (MFA), only apply to the following:
  • + For Multi-Factor Authentication (MFA), apply to the following:
  • - • All administrative accounts
  • - • Any Internet facing systems, including webmail, web portal, cloud portal
  • + • Any Internet facing systems, including webmail and web portal
  • - • WFH/remote workers when connecting to corporate and/or production systems

Additional Recommendations

  • - Recommend implementing the following:
  • - • Apply MFA to all accounts, where feasible
  • + • Apply MFA to all accounts
  • - For administrator and service accounts, the following is recommended:
  • + • Passwords changed every 90 days for all accounts
  • + • Always use company email address when registering, logging into, or accessing applications to transfer content
  • + For administrator and service accounts:
  • - • Ensure accounts are still used for intended purposes only (e.g. database queries, application-to-application communication, etc.)
  • + • Ensure accounts are still used for intended purposes only (e.g., database queries, application-to-application communication, etc.)
TS-1.7 Modifié

Identity Access Management

+4 -5

Best Practices

  • - Establish and regularly review an Identity Access Management (IAM) process to manage access to all information systems for employees, WFH/remote workers, temporary workers, interns, and third-party workers (e.g. contractors, freelancers, temp agencies), administrative accounts, service accounts, to include the following:
  • + Establish and regularly review an Identity Access Management (IAM) process to manage access to all information systems for all relevant full- and part-time employees, consultants, contractors, interns, freelancers, temporary workers, administrative accounts, service accounts, to include the following:
  • - • Implement Identity Access Management (IAM) (e.g. role-based access control (RBAC), attribute-based access control (ABAC), single sign on system, identity federation standards, and directory service (e.g. Active Directory, Open Directory, LDAP, Zero Trust Architecture))
  • + • Implement Identity Access Management (IAM) (e.g., role-based access control (RBAC), attribute-based access control (ABAC), single sign on system, identity federation standards, and directory service (e.g., Active Directory, Open Directory, LDAP, Zero Trust Architecture, etc.))

Additional Recommendations

  • + Configure systems and applications for administrator actions, at a minimum, to include the following:
  • + • Log and record: username, time stamp, action, action parameters
  • - Recommend implementing the following:
  • - • Where applicable, use of cloud hosted directory services (e.g. JumpCloud, OKTA, Azure Active Directory, AWS Directory Service, etc.)
  • - • Configure systems and applications to log administrator actions and record, at the minimum, the following information: username, time stamp, action, additional information (action parameters)
TS-1.8 Modifié

Corporate Email Filtering

+3 -3

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - Recommend implementing the following:
  • - • If applicable, also cover WFH/remote workers and BYOD devices, as local laws permit
  • - • Incorporate into Incident Management process for reporting
  • + • Incorporate into Incident Response process for reporting
  • + • Apply SPF, DKIM, and DMARC records on the domains
  • + • Set DMARC policy set to REJECT
TS-1.9 Modifié

Web Portals

+7 -8

Best Practices

  • - Establish and regularly review a process to verify, restrict, and manage access to Web and Cloud Portals, to include the following:
  • + Establish and regularly review a process to verify, restrict, and manage access to Web Portals, to include the following:
  • - • Use HTTPS signed by a certificate authority (CA)
  • + • Use HTTPS signed by a Certificate Authority (CA)
  • - • For HTTPS, enforce use of a strong cipher suite (e.g. TLS v1.2 or higher)
  • + • For HTTPS, enforce use of a strong cipher suite (e.g., TLS v1.2 or higher)
  • - • Place the web or cloud portal on a dedicated server in the DMZ
  • + • Place the web portal on a dedicated server in the DMZ
  • - • Establish user permissions according to roles (e.g. ability to upload/download content)
  • + • Establish user permissions according to roles (e.g., ability to upload/download content)

Additional Recommendations

  • - Recommend implementing the following:
  • - • For sensitive content, set access to expire automatically at predefined intervals, where configurable
  • + For sensitive content, set access to expire automatically at predefined intervals, where configurable
  • - • Review user access list to the client web/cloud portal regularly
  • + • Review user access list to the client web portal regularly
TS-1.10 Modifié

Shared Security Responsibility Model

+1 -2

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - Recommend implementing the following:
  • - • CSC to engage with the CSP to address any issues identified, and SSRM changes to be incorporated into the CSC's implementation plans
  • + • CSC to engage with the CSP to address any issues identified, and SSRM changes are incorporated into the CSC's implementation plans
TS-1.11 Modifié

Cloud Misconfigurations

+0 -1

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - Recommend implementing the following:
TS-1.12 Modifié

Secure Software Development Lifecycle

+4 -4

Best Practices

  • - • Include scanning (e.g. TFSEC) coverage for Continuous Integration (CI)/Continuous Delivery (CD) automated pipelines and deployments (e.g. Terraform)
  • + • Include scanning (e.g., TFSEC) coverage for Continuous Integration (CI)/Continuous Delivery (CD) automated pipelines and deployments (e.g., Terraform)
  • - • Include scanning open source libraries, when applicable
  • + • Include scanning open-source libraries

Additional Recommendations

  • - Recommend implementing the following:
  • - • Engage a third-party to conduct an independent review of the code, if possible
  • + • Engage a third-party to conduct an independent review of the code
  • + Reference NIST's Secure Software Development Framework (SSDF) NIST 800-218 (https://csrc.nist.gov/Projects/ssdf) as an example for Threat Modeling and on how to develop a Secure Software Development Lifecyle (SSDLC) process for coverage of training, requirements, design, development, testing, release, and response
TS-1.13 Modifié

Security by Design & Privacy by Design

+2 -3

Best Practices

  • - • Data protection and privacy requirements be included by default at the design stage and throughout the product development lifecycle
  • + • Data protection and privacy requirements are included by default at the design stage and throughout the product development lifecycle
  • - • Follow applicable regional/local privacy laws
  • + • According to local laws, regulations, and agreements

Additional Recommendations

  • - Recommend implementing the following:
TS-1.14 Modifié

Code

+2 -3

Best Practices

  • - • Access based on the principle of least privilege
  • + • Access based on the Principle of Least Privilege (PoLP)

Additional Recommendations

  • - Recommend implementing the following:
  • - • Credentials and sensitive data be encrypted by a KMS
  • + • Key Management System (KMS) encryption for credentials and sensitive data
TS-1.15 Modifié

Content Transfer Systems

+4 -5

Best Practices

  • - Establish and regularly review a process and policy to implement and use dedicated Content Transfers Systems, to include the following:
  • + Establish and regularly review a policy and process to implement and use dedicated Content Transfers Systems, to include the following:
  • - • Disable Virtual Private Network (VPN)/remote access to transfer systems
  • + • Disable Virtual Private Network (VPN) access to transfer systems
  • - • Separate content transfer systems from administrative and production networks
  • + • Separate content transfer systems from production, non-production, and external networks

Additional Recommendations

  • - Recommend implementing the following:
  • - • Implement an exception process as needed
  • + • Implement an exception process
TS-1.16 Ajouté

Application Hardening Guidelines

+17 -0

Best Practices

  • + For in-house developed applications, document and maintain Application Hardening Guidelines to harden host and guest OS, hypervisor or infrastructure control plane used on configured corporate systems, include the following:
  • + • Follow testing procedures before deploying into production environment
  • + • Review and update the application hardening guidelines annually and/or when system components are installed or upgraded
  • + • Minimize the number of identities with privileged or administrator level access
  • + • Disable unnecessary, unused, or unsecure identities
  • + • Disable or restrict unnecessary functions and services
  • + • Invoke time-out facilities that automatically log off applications after a predetermined period of inactivity
  • + • Install anti-virus/anti-malware on systems where applications are installed

Additional Recommendations

  • + For licensed applications, source and implement Application Hardening Guidelines provided by the licensee to harden host and guest OS, hypervisor or infrastructure control plane used on configured corporate systems, include the following:
  • + • Ensure licensing agreement is from an authorized source, and is not expired
  • + • Change vendor default authentication information, such as default passwords, immediately after installation and review other important default security-related parameters
  • + • Review and update the application hardening guidelines annually and/or when system components are installed or upgraded
  • + • Minimize the number of identities with privileged or administrator level access
  • + • Disable unnecessary, unused, or unsecure identities
  • + • Disable or restrict unnecessary functions and services
  • + • Invoke time-out facilities that automatically log off applications after a predetermined period of inactivity
  • + • Install anti-virus/anti-malware on systems where applications are installed
TS-2.0 Modifié

Network Configuration

+5 -6

Best Practices

  • - Place externally accessible servers (e.g. web servers, remote access servers, VPN gateways, remote access brokers, etc.) within a DMZ, VLAN, or a public subnet DMZ within a Virtual Private Cloud (VPC) and not on an internal network, to include the following:
  • + Place externally accessible servers (e.g., web servers, remote access servers, VPN gateways, remote access brokers, application servers, etc.) within a DMZ, VLAN, or a public subnet DMZ within a Virtual Private Cloud (VPC) and not on an internal network, to include the following:
  • - • Isolate virtual or physical servers in the DMZ to provide only one type of service per server (e.g., web server, etc.)
  • + • Isolate virtual or physical servers in the DMZ to provide only one type of service per server (e.g., web server)
  • - • Implement network controls to restrict access to the internal network from the DMZ, or access from public subnets to private subnets within a VPC (e.g. ACLs, security groups, etc.)
  • + • Implement network controls to restrict access to the internal network from the DMZ, or access from public subnets to private subnets within a VPC (e.g., ACLs, security groups, etc.)

Additional Recommendations

  • + • Review managed network device (e.g., Firewalls, Routers, IDS/IPS) configurations regularly
  • - Recommend implementing the following:
  • - • Review network configurations regularly
  • - • Review restrictions regularly (e.g. IP addresses, ACLs, security groups, etc.)
  • + • Review restrictions regularly (e.g., IP addresses, ACLs, security groups, etc.)
TS-2.1 Modifié

Connections

+4 -5

Best Practices

  • - • Encrypt communication over private connections (e.g. dark fiber, leased lines, frame relay, MPLS, etc.)
  • + • Encrypt communication over private connections (e.g., dark fiber, leased lines, frame relay, MPLS, etc.)
  • - • Use advanced encryption standard (AES 256) or higher for encryption
  • + • Use Advanced Encryption Standard (AES 256) or higher for encryption
  • - • Document all point-to-point (e.g. VPN, private fiber, etc.) connections within the organization
  • + • Document all point-to-point (e.g., VPN, private fiber, etc.) connections within the organization

Additional Recommendations

  • - Recommend implementing the following:
  • - • Review connections regularly
  • + Review connections regularly
TS-2.2 Modifié

Network Topology Diagram

+2 -3

Best Practices

  • - Document the Network and Cloud Infrastructure and Topology Diagrams, and update when significant changes are made.
  • + Document the Network Infrastructure and Topology Diagrams, and update when significant changes are made.

Additional Recommendations

  • - Recommend implementing the following:
  • - • Including WAN, DMZ, LAN, WLAN (wireless), VLAN, firewalls, switches, endpoints, remote access, etc.
  • + Including WAN, DMZ, LAN, WLAN (wireless), VLAN, firewalls, switches, endpoints, etc.
TS-2.3 Modifié

Network Traffic

+1 -2

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - Recommend implementing the following:
  • - • Network-based access control, i.e. 802.1X
  • + • Network-based access control (i.e., 802.1X)
TS-2.4 Modifié

Firewall Access Control List

+6 -9

Best Practices

  • - • WFH/remote locations to have a firewall to segregate the WAN (Internet) from the internal network used to access content, as applicable
  • + • Rules to generate logs for all traffic and for all configuration changes, and logs are inspected regularly
  • + • Deploy a Web Application Firewall (WAF) in front of Internet facing web applications and APIs
  • - • Firewalls with Access Control Lists (ACLs) that deny all WAN traffic to any internal network other than to explicit hosts that reside on the DMZ
  • + • Deny all WAN traffic to any internal network other than to explicit hosts that reside on the DMZ
  • - • Firewall WAN network to prohibit direct network access to the internal content/production network
  • + • WAN network to prohibit direct network access to the internal content/production network
  • - • Firewall rules to generate logs for all traffic and for all configuration changes, and logs should be inspected regularly
  • - • Restrict unencrypted communication protocols (e.g. Telnet and FTP), and replace with encrypted versions
  • + • Restrict unencrypted communication protocols (e.g., Telnet, FTP, etc.), and replace with encrypted versions
  • - • Firewall to have a subscription to anti-virus and intrusion detection updates
  • - • Deploy a Web Application Firewall (WAF) in front of Internet facing web applications and APIs

Additional Recommendations

  • - Recommend implementing the following:
  • - • Block the following: non-routable IP addresses internal addresses over external ports, UDP and ICMP echo requests, unused ports and services, and unauthorized DNS zone transfers
  • + • Block the following: non-routable IP addresses internal addresses over external ports, UDP and ICMP echo requests, unused ports and services, unauthorized DNS zone transfers, and egress filtering
TS-2.5 Modifié

Production Networks

+2 -4

Best Practices

  • - Establish and regularly review a process to isolate the Content/Production Networks from Non-Content/Production Networks (e.g. office network, DMZ, content transfer, Internet etc.), to include the following:
  • + Establish and regularly review a process to isolate the Content/Production Networks from Non-Content/Production Networks (e.g., office network, DMZ, content transfer, Internet etc.), to include the following:
  • - • Layer 1 physical air gap, if applicable
  • + • Layer 1 physical air gap
  • - • If applicable to WFH/remote locations, segregate production network through a remote connection via client approved remote access (e.g. PCoIP, RGS, Parsec, NICE DCV, etc.)

Additional Recommendations

  • - Recommend implementing the following:
TS-2.6 Modifié

Firewall Management

+3 -4

Best Practices

  • - • Provisioning requirements based off the concept of least privilege
  • + • Provisioning firewall users based off the Principle of Least Privilege (PoLP)
  • - • Change control requirements (e.g. patching, upgrades, firewall rule management)
  • + • Change control requirements (e.g., patching, upgrades, firewall rule management, etc.)
  • - • Require secure remote access with MFA for administration
  • + • Firewall to have a subscription to anti-virus and intrusion detection updates

Additional Recommendations

  • - Recommend implementing the following:
TS-2.7 Modifié

Intrusion Detection & Prevention Systems

+3 -4

Best Practices

  • - Establish a policy to implement a network-based Intrusion Detection/Prevention System (IDS/IPS) to protect the network, to include the following:
  • + Establish a policy and process to implement a network-based Intrusion Detection/Prevention System (IDS/IPS) to protect the network, to include the following:
  • - • Implement basic border gateway services (e.g. gateway anti-virus, and URL filtering)
  • + • Implement basic border gateway services (e.g., gateway anti-virus, URL filtering, etc.)

Additional Recommendations

  • - Recommend implementing the following:
  • - • Consider host-based intrusion detection systems
  • + • Host-based intrusion detection systems
TS-2.8 Modifié

Internet Access

+7 -6

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - If a business case requires Internet access from the production network, the following is recommended:
  • + For a business case that requires Internet access from the production network, apply the following:
  • - • For cases where services (e.g. anti-virus definitions, patches, licenses, etc.) are needed on the production network, explicitly allow protocols and ports (i.e. layer 2/3 ACLs) that require connections to the services
  • + • Explicitly allow protocols and ports (e.g., layer 2/3 ACLs) that require connections to services
  • - • If Internet is needed, proxy servers must be used to broker access
  • + • Proxy servers must be used to broker access
  • - For isolated web browsing/email access, the following is recommended:
  • - • Browser isolation tools via a virtual environment that is not on the production network (e.g. Ericom RBI, McAfee Light Point, Zscaler, Palo Alto Prisma, Menlo Browser Isolation, etc.)
  • + • Restrict Internet Access to shared storage solutions
  • + For isolated web browsing/email access:
  • + • Browser isolation tools via a virtual environment that is not on the production network
  • - For use of Keyboard/Video/Mouse (KVM) solution for web browsing and/or email access, the following is recommended:
  • + For use of Keyboard/Video/Mouse (KVM) solution for web browsing and/or email access:
TS-2.9 Modifié

Remote Access

+18 -13

Best Practices

  • - Establish and regularly review a process to enable Multi-Factor Authentication (MFA) for Remote User Access to all environments, to include the following:
  • + Establish and regularly review a policy and process for Remote Access to all environments, to include the following:
  • + • Multi-Factor Authentication (MFA)
  • - • Enable AES 256 encryption for all tiers
  • - • Third-Party IT Service Provider access to be limited to a specific time frame
  • - • Remote access accounts to not be shared (use individual, unique accounts)
  • - • Avoid use of the following methods for remote access: FTP, Telnet
  • - • Remote access to be logged and reviewed real time with alerts generated for suspicious activity
  • - Follow the below tier structure:
  • - • Tier 1: Access only to a corporate network or service that doesn’t store content (e.g. VPN to corporate VLAN for file share access, webmail, Office365, etc.)
  • - • Tier 2: WFH/remote worker access to a content production network via studio approved pixel streaming (e.g. PCoIP, RGS, Parsec, NICE DCV, etc.). Do not allow any access to copy content files to the local machine. Access to a production network is only be granted via an access broker that is on a non-production network (e.g. DMZ)
  • - • Tier 3: Elevated VPN administrative access to a production network for approved personnel to perform their job responsibilities. Use a launchpad/bastion host as an intermediate machine (‘jump box’) from a non-production network, to connect to the production network, without any direct connection to production allowed from the Internet
  • + • Disable remote access to content transfer systems
  • + • Segregate production network through a remote connection via client approved remote access
  • + • Enable AES 256 encryption at a minimum
  • + Apply the following Best Practices:
  • + • Application Hardening Guidelines
  • + • Firewall Management
  • + • Remote Sites & Locations
  • + • Systems Configuration

Additional Recommendations

  • - Recommend implementing the following:
  • - • Maintain a list of authorized remote access users
  • - • Regularly review user list for discrepancies, and unusual or suspicious activity
  • + • Use of corporate owned devices when content is stored locally on the endpoint device
  • + • Use secure methods for remote access (e.g., SSH, SFTP, etc.)
  • + • Use a firewall to segregate the WAN (Internet) from the internal network used to access content
  • + • Apply internal vulnerability scan and penetration testing policy to remote endpoints
  • + • Document Remote Access infrastructure on Network Topology Diagrams
  • + Apply the following Best Practices:
  • + • Corporate Email Filtering
  • + • Web Filtering
TS-2.10 Modifié

Web Filtering

+1 -4

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - Recommend implementing the following:
  • - • Use of DNS filtering
  • + Use of DNS filtering
  • - • Use of a CASB (Cloud Access Security Broker) to monitor and restrict cloud software usage and access
  • - • If applicable, also cover WFH/remote workers and BYOD devices, as local laws permit
TS-2.11 Modifié

Wireless Networks

+4 -6

Best Practices

  • - • Enable WPA2-PSK (AES), and/or WPA3- SAE
  • + • Enable WPA2-PSK (AES), and/or WPA3-SAE

Additional Recommendations

  • - Recommend implementing the following:
  • - • Use WPA2-Enterprise (AES) if applicable
  • + • Use WPA2-Enterprise (AES)
  • - • Port-based network access control (e.g. 802.1X framework for wireless networking)
  • + • Port-based network access control (e.g., 802.1X framework for wireless networking)
  • - • Scan for rogue wireless access points and/or use a centralized wireless access to alert rogue connections
  • + • Scan for rogue wireless access points and/or use a centralized wireless device access to alert rogue connections
  • - • Apply to WFH/remote worker wireless networks and disconnect wireless networks while accessing content locally
TS-2.12 Modifié

Cloud Service Provider & Cloud Service Consumer

+1 -3

Best Practices

  • - Establish and regularly review a process to configure applications and infrastructures, so that Cloud Service Provider (CSP) and Cloud Service Consumer (CSC) user access and intra-tenant access is segregated between tenants (e.g. physically or logically).
  • + Establish and regularly review a process to configure applications and infrastructures, so that Cloud Service Provider (CSP) & Cloud Service Consumer (CSC) user access and intra-tenant access is segregated between tenants (e.g., physically or logically).

Additional Recommendations

  • - Recommend implementing the following:
  • - • For intra-tenant segregation at an owned and operated datacenter/co-location or cloud provider, proof can be provided via audit reports
TS-2.13 Modifié

Network Connections

+1 -1

Best Practices

Aucune modification sur cette colonne.

Additional Recommendations

  • - Recommend implementing the following:
  • + • Log all unauthorized connections in log management system
TS-3.0 Modifié

Encryption

+10 -11

Best Practices

  • - Establish and regularly review a policy and process to Encrypt devices, cloud endpoints, and virtual machines, to include the following:
  • + Establish and regularly review a policy and process to encrypt devices, and virtual machines, to include the following:
  • - • File-based encryption: (i.e. encrypting the content)
  • + • File-based encryption (i.e., encrypting the content)
  • - • Drive-based encryption: (i.e. encrypting the hard drive)
  • + • Drive-based encryption (i.e., encrypting the hard drive)
  • - • Encryption of backups of sensitive content (AES-256)
  • + • Encryption of backups of sensitive content
  • - • All relevant key transactions/activity should be recorded (logged) in the Cryptographic Key Management System (CKMS)
  • - • If applicable, Cloud Service Providers (CSPs) should provide Cloud Service Consumers (CSC) with the ability to manage their own encryption keys

Additional Recommendations

  • - Recommend implementing the following:
  • - • For external encrypted drives with keypad pin authentication, enforce self-erase configuration after pre-defined number of invalid attempts
  • + For external encrypted drives with keypad pin authentication, enforce self-erase configuration after pre-defined number of invalid attempts
  • + For management of keys:
  • - For management of keys, establish procedures for the following activities: generation, distribution, rotation, revocation, destruction, deactivation, compromise, recovery, inventory, backup
  • + • Establish procedures for the following activities: generation, distribution, rotation, revocation, destruction, deactivation, compromise, recovery, inventory, backup
  • - For storage, ensure the following:
  • + • All relevant key transactions/activity should be recorded (logged) in the Cryptographic Key Management System (CKMS)
  • + For storage of keys:
  • - • Store within a secure cryptographic device (e.g. Hardware Security Module (HSM) or a Pin Transaction Security (PTS) point-of-interaction device)
  • + • Store within a secure cryptographic device (e.g., Hardware Security Module (HSM) or a Pin Transaction Security (PTS) point-of-interaction device)
TS-3.1 Modifié

Key Delivery Messages & Trusted Devices List

+3 -4

Best Practices

  • - Establish a process for managing Key Delivery Messages (KDMs) and Trusted Devices List (TDL), to include the following:
  • + Establish a process for managing Key Delivery Messages (KDMs) & Trusted Devices List (TDL), to include the following:
  • - • KDM creation and handling be physically and digitally segregated from DCP handling and replication, where feasible
  • + • KDM creation and handling be physically and digitally segregated from DCP handling and replication

Additional Recommendations

  • - Recommend implementing the following:
  • - • Ensure that encryption key expiration dates conform to client instructions
  • + Ensure that encryption key expiration dates conform to client instructions
TS-4.0 Modifié

Vulnerability Management

+5 -8

Best Practices

  • - Establish and regularly review a process and policy for Vulnerability Management, including vulnerability scans for both internal and external networks, cloud deployments, and virtual machines/containers, to include the following:
  • + Establish and regularly review a policy and process for Vulnerability Management, including vulnerability scans for both internal and external networks, and virtual machines/containers, to include the following:
  • - • For internal IP ranges and hosts, perform scans quarterly at a minimum
  • + • For internal IP ranges and hosts, perform authenticated scans quarterly at a minimum
  • - • Investigate and have a remediation plan for issues
  • + • Investigate and have a remediation plan for all vulnerabilities
  • - • Perform a vulnerability scan after any major application or cloud infrastructure change
  • + • Perform a vulnerability scan after any major application or infrastructure change
  • - • Apply internal scan to WFH/remote worker endpoints, where possible
  • - Also scan the following if applicable:
  • + Also scan the following:

Additional Recommendations

  • - Recommend implementing the following:
  • - • Authenticated and unauthenticated scanning
TS-4.1 Modifié

Penetration Testing

+4 -4

Best Practices

  • - Establish and regularly review a process and policy to perform Penetration Testing of all external IP ranges, hosts, web applications, and cloud deployments (if applicable), to include the following:
  • + Establish and regularly review a policy and process to perform Penetration Testing of all external IP ranges, hosts, and web applications, to include the following:
  • - • Perform a penetration test after any major application or cloud infrastructure change
  • + • Perform a penetration test after any major application or infrastructure change
  • - Also test the following if applicable:
  • + Also test the following:

Additional Recommendations

  • - Recommend implementing the following:
  • + • Include network segmentation testing
TS-4.2 Modifié

Patching

+4 -4

Best Practices

  • - Establish and regularly review a Patching process for endpoints, servers, applications, virtual machines, network infrastructure devices (e.g. firewalls, routers, switches, etc.), Storage Area Networks (SAN), and Network Attached Storage (NAS), to include the following:
  • + Establish and regularly review a Patching process for endpoints, servers, applications, virtual machines, network infrastructure devices (e.g., firewalls, routers, switches, etc.), Storage Area Networks (SAN), and Network Attached Storage (NAS), to include the following:
  • - • Subscribe to security and patch notifications from Service Providers, other Third-Parties, and security advisories
  • + • Subscribe to security and patch notifications from Service Providers, other third-parties, and security advisories

Additional Recommendations

  • - Recommend implementing the following:
  • + • Deploy patches in a testing/development environment before deploying to production
  • + • Deploy critical patches within two weeks of release date
  • - • Also apply to BYOD, where possible
TS-5.0 Modifié

Change Control

+4 -4

Best Practices

  • - Establish, document and regularly review a process for Change Control to ensure data, applications, network, and system component updates and changes have been reviewed and approved as required, to include the following:
  • + Establish and regularly review a process for Change Control to ensure data, applications, network, and system component updates and changes have been reviewed and approved as required, to include the following:
  • - • Maintain an up-to-date inventory of systems (e.g. Configuration Management Database (CMDB)), system components, and software
  • + • Maintain an up-to-date inventory of systems (e.g., Configuration Management Database (CMDB)), system components, and software
  • - • Identify all impacted computer software, data files, database entities, infrastructure, and cloud systems
  • + • Identify all impacted computer software, data files, database entities, and infrastructure

Additional Recommendations

  • - Recommend implementing the following:
  • + • Ensure separation of duties between change initiator and approver

Ce qui a le plus d'impact pour vos équipes

  • v5.1: référentiel orienté Site/Cloud + mappings historiques (incl. CSA CCM).
  • v5.2: normalisation Additional Recommendations et évolution des mappings ISO.
  • v5.3: extension Zero Trust + AI/ML, augmentation marquée des contrôles TS.
  • v5.3.1: ajout explicite du périmètre applicatif (App), 73 contrôles sur 82 marqués applicables App.

Plan d'action client recommandé

Si vous êtes encore aligné v5.1/v5.2

  • Rejouer un gap assessment complet avant audit officiel.
  • Prioriser OR-5.x / TS-6.x / TS-7.x / TS-8.x selon votre contexte.
  • Mettre à jour la preuve documentaire sur les nouveaux attendus.

Si vous êtes déjà en v5.3

  • Traiter en priorité le bloc applicatif ajouté en v5.3.1.
  • Vérifier la couverture chiffrement/gestion de clés (TS-3.2).
  • Rafraîchir les contrôles TS déplacés ou renommés (ex. TS-1.x).

Pour préparer une trajectoire TPN lisible

  • Construire une feuille de route en lots: gouvernance, infra, applicatif, preuves.
  • Associer chaque action à un contrôle MPA et un livrable d'audit.
  • Piloter l'avancement par domaine OR/OP/PS/TS pour garder une vision claire.

FAQ – Changement MPA Best Practices

Quelle version MPA Best Practices utiliser pour préparer une certification TPN aujourd'hui ?

Pour une préparation actuelle, la cible doit être la v5.3.1. Les versions antérieures servent de base historique, mais ne couvrent pas l'ensemble des attentes récentes, notamment applicatives.

Pourquoi y a-t-il beaucoup de contrôles modifiés entre les versions ?

Dans l'onglet Best Practices, les modifications incluent les évolutions de texte, de recommandations additionnelles, de portée (Site/Cloud/App) et parfois des ajustements de titre/topic. Ce n'est pas uniquement une question d'ajouts/suppressions.

Quel est l'impact principal de la v5.3.1 pour un client studio ou prestataire ?

L'impact principal est la montée en exigence sur la sécurité applicative et la granularité de preuve. La v5.3.1 introduit aussi une lecture plus claire des périmètres d'applicabilité avec la colonne App.

Besoin d'un accompagnement pour passer de votre version actuelle à la v5.3.1 ?

CYTRUST vous aide à prioriser les écarts, planifier les remédiations et consolider vos preuves d'audit.

Appelez-nous au+33 (0)2 59 60 39 27