Getting ready for digital signage 6: Safety

April 19, 2019

This article is the sixth in a series about choosing the network architecture for your digital signage system, If you're new to the concept of digital signage, or unfamiliar with the different architectures that existthen start with this article: Digital signage: getting ready. If you missed the previous article, see: Getting ready #5: Connectivity and bandwidth

In the age of watches, connected cars and the proliferation of cloud solutions, the security of such systems is a recurring issue. Such considerations do not spare digital signage, and are often at the heart of decisions concerning the choice ofdigital signage model, particularly when the use is dedicated to internal communication. Security in a digital signage system, like anywhere else, is above all a matter of compromise. Is the customer prepared to sacrifice functionality, speed of execution and user comfort for the sake of greater security?

Security in a digital signage system, as in any other information system, is a complex notion, based on a relationship of trust with the service provider. It's a subjective notion, determined by the client company's strategy and what it deems to be the worst consequence of an action attributable to a lack of "security". In the specific case of digital signage, the main concerns of corporate customers are, as a general rule, the following:

Although the SaaS model is often criticized for its "security" problems, and the on-premise model is much more popular, it 's difficult to draw conclusions on this basis alone, since there are so many different implementations, each with its own specific features. By focusing on these main concerns, it is nevertheless possible to lay some foundations, but also to raise some questions.

Digital signage in general

Security for your dynamic displays


As a reminder, a digital signage system, reduced to its simplest form, can be summed up as follows: A communicator wants to display a message on a screen. The message is in the form of a file (image, document, video). From his workstation, he sends this file to the digital signage system's servers. When it's time to broadcast, the server sends the file to the player responsible for broadcasting. The player reads the file and broadcasts the message. Although simplistic, this case involves several pieces of equipment (and people), each likely to present security risks . in view of the company's concerns.

Corporate image

Digital signage is a communication tool. As such, like all communication tools, it conveys messages that engage the company and help forge its reputation. These messages represent the company to its target audience. These messages must therefore be those (and only those) that the company decides to send, without any accidental or intentional alteration. Nevertheless, many alterations can occur between the time content is sent by the communicator from his or her workstation and the time it is broadcast on the display players. While the implementation of an on-premise model suggests the elimination of this problem, it only reduces its scope to a physical presence close to the company. To ensure that content is authentic and unaltered, customers should check the following points with their service provider (or ask for them to be set up):

  • Is the task of creating content and distributing it assigned to the same person?
  • Is the person in charge of content distribution reliable?
  • Does she have a good knowledge of the software?
  • Is it the only one authorized to distribute content?
  • Does she share her login details?
  • Is a robust password policy in place on the management software (use of special characters, numbers, minimum length, frequent change, etc.)?
  • Are passwords kept on a post-it note?
  • Does the software implement a file signature policy?
  • Are the files to be distributed signed?
  • Are the software and systems used by the player reliable and up-to-date? Do they present any vulnerabilities?
  • Are the screens physically accessible?
  • Le contrôle par télécommande est-il activé ? Dans un cas extrême, où les contenus seraient altérés, une solution de secours est-elle en place pour interrompre la diffusion de ces contenus ? Une trace de l’auteur de la diffusion est-elle disponible ?

So, in the case of file signatures, the threats are to be found in the distribution player, the management software (and the person(s) responsible for distribution). The choice of display system model is therefore of little importance.

Safety requires collaboration


Data confidentiality

Depending on the target audience, content may require a high degree of confidentiality. Indeed, broadcasts may reflect strategic documents or results whose public dissemination could cause harm to the company. Ensuring that such content is confined within the company is therefore a priority.

Néanmoins, pour que le système d’affichage dynamique fonctionne parfaitement, il est nécessaire de stocker les contenus à diffuser sur le serveur du système (ou au moins de faire transiter). Au premier abord, l’implémentation d’un modèle hébergé (on-premise) suggère un confinement des données sur le réseau interne et donc un grand degré de protection des contenus alors qu’une solution SaaS suggère le contraire. Dans les deux modèles, il conviendra de porter une attention particulière à la fiabilité du logiciel de gestion, de la personne qui l’utilise, ainsi qu’à la politique (et technique de mémorisation) des mots de passe.

You'll also need to ensure that communications between the management software and the server are properly encrypted, particularly in the case of a SaaS model that uses the Internet. It is also necessary to consider data storage, and therefore the system server.

  • Is it located on the customer's premises (on-premise model)?
  • Is the server accessible to anyone? Is it manned at night? Is it located in a datacenter (in most SaaS models)?
  • In this case, is the datacenter located in a country governed by laws that authorize the collection of data?

Enfin, il sera de bonne augure de s’assurer que les communications entre le serveur et les players sont correctement encodées et que les players de diffusion ne sont pas assujettis à des vulnérabilités exploitables.
Certaines solutions implémente un service de chiffrement des fichiers à diffuser. Ceux-ci sont chiffrés en amont, sur le poste du communicant, stockés de façon chiffrée sur les serveurs du système puis envoyés sur les players de diffusion, seuls à pouvoir déchiffrer les fichiers avant de les lire. Dans ce cas, la protection physique des players est également a assurer.


Securing your system

Information system integrity

Today, the information system is the backbone of many companies. It is the foundation on which many services are built, enabling the company to live and evolve. A digital signage system requires the installation of equipment that needs to be able to communicate with each other, often via the company's internal network. What's more, these players are rarely accessible to the customer, and constitute a black box that is difficult to control. These black boxes may present reliability flaws or vulnerabilities that could be exploited to penetrate the corporate network, whether in SaaS oron-premise architecture. (In the latter case, physical proximity to the company is nevertheless necessary to exploit these vulnerabilities).
Particular attention should be paid to the vulnerability of distribution players.

  • What systems and services do they run on?
  • Are they up to date? Are there any exploitable vulnerabilities?
  • Are they physically accessible? Is it possible to take control by plugging in an external device?

In the case of SaaS models, it is often necessary toopen ports on the company's firewalls to enable players to reach the provider's servers. In such cases, vulnerabilities could be exploited from outside the company. In this case, the question of server reliability arises once again. If it is possible to take control of the server, then the secure communications between server and player, and the means of securing the player, would be ineffective. Nevertheless, a precise (but complex) configuration of the company's network equipment can significantly reduce the risks ofintrusions and compromises to the integrity of the local network.
The customer can nevertheless set up a local network distinct from the one used for its services, either physically (different cables, different routers...) or virtually, using VLANs for example. The service provider can also set up the alternative of using third-party network equipment, such as 3G/4G routers that connect players to the Internet without passing through the company's internal network.

Conclusion

So, while it's hard to believe that only an on-premise model offers "security", it's true that it's the simplest and most cost-effective way to implement satisfactory security mechanisms. While it is possible to achieve equivalent levels of security via a SaaS architecture, the solutions to be implemented are often more complex. Whatever the architecture chosen, it is essential to pay particular attention to the overall security policy, and toidentify sensitive points upstream, in order to prepare security solutions, in collaboration with the service provider, before the first equipment is installed. Other issues such as data loss, broadcast continuity and management interface availability may also be of concern, in which case it will also be imperative to identify them as early as possible in order to implement the right solutions.

Continue reading :

 

Cenareo offers you an intuitive, scalable solution Saas solution, perfectly adapted to the needs of communications professionals in all sectors of activity: point-of-sale, in-house communications, hospitality and DOOH.

{{cta('2234d280-0394-4257-8e50-754f8a507348','justifycenter')}}

Our latest articles

All the latest news on digital signage and video