The outsourced R&D environment has high asset leakage risks
Long UE launching time, due to lack of accessing DDC cache, results in serious waste of labor costs
We have to make a hard trade-off between security controls, risk of data leakage and low R&D efficiency
provides an isolated and auditable production environment for outsourcing partners to minimize IP/code leaks while maximizing seamless collaborations with customers.
Ad-Hoc, Temporary Outsourcing
For ad-hoc outsourcing tasks, we usually hire a small team. Small teams usually do not have strong IT skills to protect their work. They might just work in any environment that comes with weak security protection. In this situation, we suggest deploying a well-controlled workstation in the cloud and authorizing those workers to access it remotely. Because there is no work on artists’ local workstations, this will greatly improve the protection of work assigned and reduce the opportunities for data leakage.
Mid-Term Outsourcing
Vendors normally work from a partially trusted environment. The partner normally manages the work environment alone, and game studios can not 100% trust its technical measures and processes. In such a partner environment, a project-based VLAN isolation should be implemented and equipped with a basic vulnerability scan and XDR capability. When we have those basic controls, the studio should be confident in deploying some non-sensitive data and cache into the partner’s facilities. A leased line or S2S VPN between the studios’ environment and partners’ facilities can be set up. Tight controlled, well-planned firewall rules (port, protocol, application,…) should be deployed.
Strategic Long-Term Outsourcing
In such a long-term partnership situation, the studio and partner are not only contracted in a project–based scenario. There could be investment and management-level relationships. The studio can fully trust the security measures and controls taken by the vendor. Studio and vendor can discuss a common ground for all sorts of security controls. Given the above situation, the studio can deploy most R&D facilities into a partner facility, such as Perforce Edge, to achieve the greatest efficiency and user experience. We can also feel peace of mind in enabling partners to develop games on their physical workstations. For a well-controlled outsourcing, by leveraging hybrid cloud, you can:
Build Your Core R&D Environment in the Cloud
By leveraging the cloud, building a partner-oriented R&D core anywhere in the world is very straightforward. We can deploy development workstations, various CICD tools, core assets, and code depots there. Furthermore, we must provide a tightly controlled internet outbound access capability and route all partners’ internet traffic to this exit to ensure no data leakage. With the connection from the partner to the core R&D environment, they can also leverage the security measures required in the core part, such as Vulnerability Scan, SIEM, and centralized access control.
Enable partner productivity on par with core R&D via Geo-distributed DDC, anyDrive, and P4Anywhere.
DDC is a critical component that has a dramatic impact on productivity. DDC is normally built from a central daily build system and updated by users centralized there. Geo-distributed DDC can help distribute the DDC from the central site to the branch site and remote users. This will save 10-60 minutes per workday for every remote, branch, and partner artist.
Sharing a common baseline is critical to avoid chaos and to make your game development milestone predictable. We can set a proxy or Edge in a partner environment and control what contents to replicate to the partner environment. The lease-line or site-to-site VPN will facilitate this replication at a low cost. We can tailor the design to your specific situation, and furthermore, P4Insights and P4Booster can manage those extensions to the partner site in a holistic approach.
When you extend your business to partners, assets, or any data, exchange is a common scenario. As a common scenario, we often must provide an easy inbound-only data transfer tool to avoid data leakage. By leveraging CES Drive, you can easily implement a fine-granularity-controlled data exchange system. It provides fine security control and a fast exchange capability, such as 20MB/s.
When you extend your connection to a partner site, security is normally a big concern for most studio owners. Per the extensive practice from the Cloud-Enabled Studios team, a set of security controls had been applied, such as micro-segmentation, identity AAA, access control, network boundary protection, data SOD, and protection, etc. Here is a comprehensive list of typical controls managed by Cloud-Enabled Studios security experts:
Products
Solutions
Consulting
Company
Resources