
A few years ago, "Zero Trust" was a concept that lived in enterprise IT presentations. Today it's showing up in studio vendor requirements, co-production agreements, and facility audits. If you're in post production or VFX and haven't started building a Zero Trust posture, the question is no longer whether you need to, but how quickly you can move toward it.
The shift is being driven by a convergence of factors: high-profile content leaks, the expansion of distributed workflows across more vendors and territories, and studios increasingly tightening their security expectations in response. This shift is redefining post production security across the entire content supply chain, particularly as AI introduces new compliance requirements, explored in AI in Post Production: Labour Agreements and Regulation.
For facilities and post houses, this changes not just how you think about access, but how you design the workflows your clients depend on.
Zero Trust is a security model built on a simple principle: don't assume anyone or anything is trustworthy by default, even inside your own network. Every user, device, and request should be verified, every time.
In a traditional network model, once a user was inside the perimeter, on VPN, at the facility, logged into the system, they were largely trusted. That model made sense when everyone worked in the same building. It doesn't hold up when your colorist is in London, your VFX vendor is in Mumbai, your sound designer is working remotely from their home studio, and your dailies are in the cloud.
For post production, Zero Trust translates into specific practices:
Identity-based access. Access to content is tied to who you are and what you're authorised to see, not where your IP address originates. Every session is authenticated, and access rights are enforced at the asset level, not just the network level.
Least privilege. Users and systems get access to exactly what they need, and nothing more. A colourist reviewing a rough cut doesn't need access to the full archive. A vendor receiving VFX plates doesn't need visibility into sound deliverables.
Continuous verification. Trust isn't established once at login - it's re-evaluated throughout a session. Anomalous behaviour triggers review or automatic revocation.
Comprehensive logging. Every access event is recorded. Who viewed what, when, from where, on which device. This isn't just for security incident response - it's increasingly required for studio compliance audits.
The impetus is coming from the top of the supply chain. Major studios and streamers have spent the last several years updating their vendor security requirements, and Zero Trust principles are now increasingly aligned with frameworks like the Trusted Partner Network (TPN) assessments that many facilities already undergo.
The reasoning is straightforward: a studio's security posture is only as strong as its weakest vendor. If a small VFX house with lax access controls is on the same production as a top-tier facility, the entire pipeline is exposed. High-value pre-release content, especially franchise films, premium drama, and content with significant ancillary rights, attracts sophisticated threat actors. The cost of a leak goes far beyond the immediate reputational damage.
For facilities, this means security is no longer a back-office function. It's a sales and business development conversation. Demonstrating Zero Trust compliance, or at least a credible roadmap toward it, is increasingly part of what it takes to win and retain studio work.
One of the hardest aspects of Zero Trust in post production is that the workflow doesn't end at your facility walls. Content moves between editorial, VFX, colour, sound, and delivery partners across an extended supply chain, and every handoff is a potential vulnerability.
This creates pressure to govern not just how content is handled inside your facility, but how it moves between vendors. Two areas where this shows up most directly:
Review and approval. When content is sent externally for review, to directors, producers, executive stakeholders, international co-producers, it needs to travel securely. Screeners shared via generic links, consumer video platforms, or unencrypted email threads are not consistent with a Zero Trust posture. ClearView Flex provides watermarked, access-controlled review sessions where every viewer is authenticated and every screening is logged. For studios requiring audit trails on content review, this kind of governed session is increasingly expected in high-security workflows.
File transfer. Moving large files across the supply chain, VFX plates, audio stems, finished deliverables, creates exposure at every point of transit. Sohonet FileRunner enables encrypted, tracked, browser-based transfers without requiring plugins or installs, reducing the risk surface at both ends of the transaction. The transfer log also serves as documentation that can be provided to studio security audits.
Achieving a mature Zero Trust posture isn't a single project - it's an ongoing programme. For most post facilities, the practical starting points are:
Access and identity management. Audit who has access to what. Eliminate shared credentials, legacy accounts, and broad access permissions. Implement multi-factor authentication across all systems that touch content.
Session governance for content review. Replace ad-hoc review processes with structured, authenticated sessions. Ensure every review session generates a log.
Encrypted, tracked delivery. Audit how files are being sent and received. Replace informal transfer methods with governed systems that provide encryption, access control, and delivery receipts.
Vendor assessment. Understand the security posture of your supply chain partners. The TPN framework provides a useful benchmark, and many studios now require TPN-assessed vendors for their most sensitive work.
Incident response planning. Zero Trust reduces the likelihood of a breach, but doesn't eliminate it. Having a clear, rehearsed response plan is part of a mature security posture.
There's a commercial dimension to this that's easy to overlook. Facilities that demonstrate strong security practices are increasingly better positioned to win high-value studio work. Security has moved from table stakes to differentiators.
The facilities that win the best work over the next few years will be those that have treated security as a workflow discipline, not an IT afterthought. Zero Trust is the framework that makes that possible at scale.
Zero Trust is a security model that requires continuous verification of every user, device, and request, rather than assuming internal network access means trust. It matters for post production because modern workflows span multiple facilities, vendors, and territories, creating a large and complex attack surface for high-value pre-release content.
The Trusted Partner Network (TPN) is a content security programme developed by the MPA that assesses vendors against a set of security controls. While TPN isn't explicitly a Zero Trust framework, its requirements around access control, logging, and physical and digital security align closely with Zero Trust principles.
Watermarking embeds traceable information into screeners and deliverables, so that if content leaks, the source can be identified. Access control ensures only authorised individuals can view or download content. Together they form a core part of a Zero Trust approach to content security.
The main risks include: unsecured review screeners sent via generic links; unencrypted or untracked file transfers; shared or weak credentials; legacy access permissions for former staff or vendors; and supply chain exposure through third-party vendors with weaker security practices.
Remote work significantly expands the attack surface, more devices, more networks, and more access points outside the facility's physical control. It makes the case for Zero Trust principles even stronger, since the traditional perimeter model no longer provides meaningful protection.
