Q-SYS Security Best Practices

Site: QSC
Course: Q-SYS QuickStarts
Book: Q-SYS Security Best Practices
Printed by: Guest user
Date: Thursday, 21 November 2024, 5:08 AM

Description

Video Transcript

00:08
The unique needs of each Q-SYS installation are different, and the level of security required on your system may vary accordingly.
00:15
So for those with a security-centric mindset when implementing networked AV, we’ve compiled a list of best practices to follow when you’re configuring your Q-SYS design.
00:24
Some might seem fairly obvious to the seasoned integrator or IT admin, but there’s others that you may have never considered before.
00:32
The latest versions of Q-SYS Designer software has, as you might expect, the latest security features, patches, and updates for the Q-SYS OS.
00:41
In order to take advantage of those upgrades, you’ll want to update the firmware of your entire system.
00:46
Simply open your running design in the latest version of the software and Save to the Core and Run.
00:53
The Core will notify you that it needs to update its firmware to run this version of your design, which may take a few minutes.
00:59
Once the Core processor is running the latest version of the Q-SYS OS, it passes that version to all of its connected native Q-SYS products,
01:08
which will take at least a few more minutes, so it goes without saying to only do this when your system has planned down-time,
01:15
and not five minutes before it needs to be up and running.
01:19
There are several places in the software that allow you to set up a password to restrict access.
01:25
First and foremost is access to your Core processor.
01:29
You can enable a variety of user access roles by going to the Core Manager, selecting Access Management, and then Users.
01:38
Each user can have their own password and customizable access to key Core features, and the Event Log will keep track of when different users have logged in.
01:47
Without enabling User Access, anyone on your network with the Core’s IP address can get access to your system.
01:54
For peripherals, you can visit their Peripheral Manager page and set a password on their “Device Password” tab, to prevent anyone from changing their settings.
02:06
You can also customize user access to your UCIs, to make sure that only authorized users are able to access your interface.
02:14
This is done within Core Manager, under “User Control Interfaces.”
02:19
Click on the “Edit PINS” button in the top right, and then create your desired user name and PIN.
02:25
If you’re deploying your UCI on a Q-SYS touch screen, you might also want to enable the “Private” option for your UCI,
02:32
which will restrict this UCI from the list of available UCIs visible from the UCI Viewer app or Control app.
02:41
There’s one more place to leverage PINs, and that’s on Page Stations.
02:46
If your system is using Virtual Page Stations you can use your UCI PINs to restrict access to controls, but a physical page station in a public space might need a password of its own.
02:56
In the Administrator under “Page Stations”, you can edit the Security of each physical hardware device to require a User Logon,
03:05
and then choose which users, as established from the Users tab, are allowed to log in to this device.
03:12
Certain installations may require an external control system to control or monitor your Q-SYS system.
03:19
This access should be protected by configuring a User PIN for the external control system.
03:25
In the Q-SYS Administrator, you can establish different Users with their own unique PINs.
03:30
These users, it should be noted, have no association with the user permission roles you establish in the Core Manager.
03:37
Once you’ve created these, any External Control Protocol communication session will have to begin with a proper login with the User PIN associated with the external control system.
03:48
Next, let’s talk about physical precautions you can take.
03:52
Mounting your Q-SYS Core (whenever possible) onto the precarious hair-trigger of a cartoonishly oversized industrial bear trap
03:59
will greatly decrease the likeliness of any theft attempts by nefarious cat burglars.
04:04
QSC also recommends laser spikes and/or alligator sharks.
04:09
Far more importantly, there are a number of settings in Core Manager that you can configure to limit possible points of entry from untrusted sources,
04:18
particularly based on different services that you may or may not be using in your design.
04:25
Whenever possible, synchronize your Core to a trusted NTP server by going to the Core Manager, selecting Network, Date & Time, and then enable NTP Time Synchronization.
04:38
How is that a security risk, you ask?
04:40
Well security certificates often use time and date in their certificate exchange, so an inaccurate clock might result in security certificate negotiation failures.
04:52
Your network may require 802.1X, which is a port-based device authentication, which essentially authenticates every device in order to gain access to the network.
05:02
If this is in use on the network, it needs to be enabled and configured on the Core and all Q-SYS products individually.
05:10
For the Core, visit Core Manager > Network > 802.1X, and then select a LAN and edit the properties to enable it.
05:20
You’ll then need to configure your settings based on your network’s requirements and credentials.
05:25
For peripherals, visit their Peripheral Manager and the 802.1X tab to perform these same operations.
05:33
For systems using VoIP, that softphone is a potential point of entry to your system.
05:37
We recommend only using encrypted Softphone communications with secure ciphers when selecting a VoIP provider.
05:44
Then, within the Core Manager, visit the Telephony tab and edit your softphone’s settings:
05:50
specifically, disable the use of Insecure Ciphers, enable Secure Real-time Transport Protocol (or SRTP) and use Transport Layer Security (or TLS) rather than UDP or TCP.
06:04
Note that some older, legacy VoIP systems may require the use of older, insecure ciphers which is why those are still available for use.
06:13
FTP is often seen as a security risk since it’s been designed for basic, unencrypted file transfer.
06:21
If you have version 9.3 or higher installed, this FTP server has already been deprecated so feel free to tune out.
06:29
On older versions of the software it was available, disabled by default, but you should double-check that it is still disabled.
06:37
If you enter your Core’s IP address followed by /storage_config.html, it will take you to a technician’s screen for the FTP Server.
06:48
Give this a check to make sure your FTP Server, if you’re not using it, is not enabled.
06:55
Similar to FTP, SNMP is a protocol that could be abused to give access to unauthorized users.
07:02
And, like FTP, it is disabled by default on Q-SYS Cores.
07:07
You can check its status by going to the Core Manager > Network > SNMP, and ensuring that Access is disabled.
07:16
If your system requires the monitoring of your Core and peripherals with SNMP,
07:20
we recommend only using SNMP Version 3, and to follow the guidance of your client network’s InfoSec team.
07:29
Your network administrator may be using a certificate authority to identify trusted devices on the network,
07:35
which can be used to provide unique certificates for each Q-SYS Core and Q-SYS Product.
07:41
Once again, you can go to your Core Manager or Peripheral Manager, select the “Certificates” tab,
07:47
and follow the instructions to create a Certificate Signing Request (or CSR),
07:53
and installing the unique certificate that you receive back from the IT department,
07:58
which will confirm to your network resources that this Q-SYS product is authorized to be on the network.
08:05
DNS allows your network devices to connect to external URLs using a Fully Qualified Domain Name (or FQDN) rather than an IP address,
08:15
which is necessary if you’re connecting your system to Q-SYS Reflect Enterprise Manager, or remotely activating software licenses from Core Manager.
08:23
You can configure your DNS server in Core Manager under Network > Basic, and edit the server here along with your IT configuration.
08:33
Potential attackers could use a DNS redirect to compromise network resources, which is why it’s critical to only use trusted DNS servers provided by your IT team.
08:46
If you go to the Core Manager and look under Network > Services, you’ll see a list of active network protocols.
08:54
This might take some coordination with your IT department and AV system designer,
08:58
but there are a number of Q-SYS services enabled on the Core that may not be needed in your system, and can therefore be disabled on the Core.
09:08
For instance, if you’re not controlling your system from an external control device via External Control Protocol, like we mentioned earlier,
09:15
then there’s no reason to keep Port 1702 open for this type of traffic.
09:20
Go to Management and select Edit, and you can disable whichever services are not needed.
09:26
You could also search each protocol individually to see if any of its uses are active in your design.
09:32
If you don’t need Network Cameras, then why keep that service active?
09:37
The more you can close your system off by disabling unnecessary ports and protocols, the happier your IT team is going to be.
09:45
Last but not least, the best way to know about any issues on your system is to actively monitor and manage that system, using Q-SYS Reflect Enterprise Manager.
09:56
Granting Enterprise Manager “Administrator” access to your Core gives you the visibility you need to the health and activity of your Q-SYS Core, peripherals, and third-party devices.
10:07
Q-SYS Reflect is built on a robust, secure infrastructure and has been tested by external cybersecurity professionals. For more information, go to qsc.com/security.
10:18
Implementing these best practices in security, with the help of your IT team, is the best way to keep your Q-SYS system safe and secure.
10:26
Thanks for watching, and we’ll see you next time.

Lesson Description

A guided walkthrough of implementing Q-SYS security best practices in your system.