One of the biggest concerns for large enterprises adopting cloud technologies is security. A recent IDC survey found cloud security to be the leading concern for enterprises adopting cloud technologies. To address these concerns, Encoding.com has taken several steps ensure the highest levels of security in every aspect of our infrastructure to meet the stringent requirements of the largest broadcast, media, and entertainment companies such as FOX, The BBC, and Discovery Networks.
The Motion Picture Association of America (MPAA) has developed a sophisticated Content Security Model (CSM) for vendors to comply with MPAA requirements.
The overriding guidelines of MPAA security are the following:
• Don’t lose content.
• Don’t let someone steal content.
• If content is lost or stolen, report it immediately.
• Don’t let security measures disrupt production.
The MPAA CSM provides a structure for determining a data center’s ability to protect a customer’s content. There are 48 primary security subjects that evaluate management practices and physical and digital security. The elements of the the MPAA CSM are based on ISO 27001/27001 standards, government security regulations (NIST, NSA, DOD), and industry best practices.
In addition, the MPAA has developed a subset of guidelines for both cloud and application resources such as Encoding.com. These standards are based on the MPAA CSM and have 6 primary security subjects for both cloud products and applications. The diagram below outlines those 6 security subjects required by the MPAA.
For more information on the MPAA security requirements, check out their comprehensive security guidelines. While the MPAA does not offer a certification of their requirements, Amazon has taken every measure to map their own security protocols to those set forth by the MPAA. To learn more about how Amazon has aligned themselves with MPAA requirements, check out their (MPAA) Content Security Best Practices white paper.
Since our inception, maintaining a secure cloud for media companies has been a cornerstone of our platform. The diagram below highlights the many security touch points in our workflow.