Best Practices for Securing Live Streams
The ability to prevent piracy, take down illegal content, and act against illegal sources are key objectives of content protection. Meeting these objectives requires the use of a variety of technologies including watermarking, Digital Rights Management (DRM), fingerprinting, and cryptography. This document examines and discusses the streaming video system to provide best practices for protecting and securing streaming video content for both content providers and distributors to ensure content is being used as intended by those who it was intended.
Goals and Objectives
- Provide a baseline understanding of streaming video architecture.
- Provide an explanation of different video delivery components and content protection options.
- Provide an overall description of the current video piracy landscape.
- Explain the importance of securing streaming video.
- A high-level overview of current video piracy issues.
- An overview of streaming video workflow from ingest to delivery and architecture.
- Descriptions of, and references to, available technologies, tools, and solutions which address piracy and video asset security.
- A list of best practices to secure content and content delivery.
- In-depth analysis of the available technologies, tools, and solutions
- A prescription or mandate to use a certain solution to address a specific aspect of streaming video security.
- Global Innovation Policy Center Digital Video Piracy
- IETF RFC 8216 HTTP Live Streaming
- ISO/IEC 27001 Information Security Management
- Institute of Standards and Technology (NIST) Cybersecurity Framework
- MovieLabs Specification for Enhanced Content Protection (ECP)
- ONVIF Standardization of communication between IP-based physical security products (see profiles S and T)
- OWASP The Free and Open software security community
- Sandvine Video Piracy Report
- Streaming Video Alliance Technical Publication: Forensic Watermarking Implementation Considerations for Streaming Media