Introduction to Q-SYS Security

Q-SYS Level 1 Training : Monitoring and Security Considerations

6 ) Audio Playback

13m 10s

7 ) Basic Test & Measurement

15m 4s

9 ) QSC Conferencing Solution

21m 53s

12 ) Final Exam Overview

15m 59s

Video Transcript

Introduction to Q-SYS Security 3m 3s
00:00
Let’s talk security, well software security for AV, that is.
00:05
As you might know, Q-SYS is a software-based platform that provides for audio, visual, and control processing, distribution and management .
00:13
The Q-SYS OS software stack allows us to advance Q-SYS to meet the growing feature needs of the industry,
00:18
and provide the flexibility to keep the ever-evolving security needs at the forefront of the system.
00:23
Now, we have in-depth resources available that go deep into the security methodology, but let’s start with a high-level overview of the key concepts.
00:32
Behind the scenes, we use a series of industry standards and processes across the Q-SYS Platform to strengthen and validate security.
00:39
Our baseline standard is OWASP ASVS 4.0, which provides a set of principles for secure development and testing,
00:46
focusing on identifying any vulnerabilities that could be exploited by an attacker.
00:51
For the security-minded, you play an important part in configuring your Q-SYS system to give different types of users the appropriate level of access.
01:00
That’s because Q-SYS allows you to configure tiered user access.
01:05
Role-based access controls let you highly-customize the permissions that each user has, in order to comply with your specific security environments and best practices.
01:15
Obviously, protecting the data that's travelling on your network is always a priority.
01:19
So we based the Q-SYS encryption and cipher suite on the same technology that is used to build the worldwide web,
01:25
namely Industry standard TLS 1.3, Security Hash Algorithms, and AES encryption.
01:31
In fact, here’s a fun fact about the encryption we use and how hard it would be to break the key.
01:37
If you enlisted the entire computational power of the entire BITCOIN network and try to break this AES encryption key with brute force, it would take 70 septillion years to break it!
01:51
You never know what kind of bad actors are out there so we’ve implemented cryptographic code signing when updating your Q-SYS system.
01:59
That means that as long as your system is running Q-SYS Designer Software v9.1.0 or later, the Core will check all subsequent firmware updates for a digital signature and,
02:11
by default, will only install firmware that is signed by QSC. This protects the Core against illegitimate or unsafe firmware.
02:19
Our engineers regularly evaluate the system using a series of tests: white-box testing to identify potential source code vulnerabilities,
02:27
and black-box testing to simulate attack attempts.
02:30
We also perform full 3rd party penetration testing.
02:34
These tests give us great confidence in the resiliency of the system
02:37
and provides valuable information on infrastructure health for present and future security considerations.
02:42
And that’s just the beginning.
02:44
We’re always working to ensure that the Q-SYS OS, hardware, software applications, cloud infrastructure
02:50
and licensing technologies are continually scrutinized with security in mind.
02:55
If you’d like a deeper dive, check out our security documentation. Thanks for watching and we’ll see you next time.

Lesson Description

Introduction to Q-SYS Security 3m 3s

A high-level overview of the Q-SYS security methodology.

Downloads and Links

Introduction to Q-SYS Security 3m 3s