The inaugural TPN STAR Report from the Motion Picture Association's (MPA) Trusted Partner Network (TPN) has identified a critical disconnect between security policy and practice within the entertainment industry's supply chain. The report, which analyzes security assessment data across the industry, concludes that inconsistent implementation of fundamental security controls is creating systemic risks. Despite having policies in place, many organizations are failing to consistently enforce controls like multi-factor authentication and vulnerability remediation. This has led to a dramatic increase in security incidents, with more TPN Security Alerts issued in the first quarter of 2026 than in the entirety of 2025, primarily driven by the exploitation of compromised credentials. The report serves as a stark warning, urging the industry to prioritize continuous monitoring and stronger identity and access management across its vast network of third-party vendors.
The TPN STAR Report is an industry study, not a regulation. It provides data-driven insights into the state of cybersecurity within the media and entertainment supply chain. Its key findings are:
The findings apply to the entire entertainment industry ecosystem, including:
The TPN provides a set of best-practice security guidelines that vendors are assessed against. While not legally binding, compliance with the TPN program is often a contractual requirement for vendors wishing to work with major studios. The report's findings will likely lead to stricter enforcement of these TPN requirements, with a focus on:
Based on the report, entertainment industry organizations and their vendors should:
D3-MFA) everywhere.D3-SU).M1030) to limit the blast radius of a potential breach at a third-party vendor.Enforcing MFA is the top recommendation to combat the rise in credential-based attacks.
Consistent and timely patching of vulnerabilities is critical to closing exploitable gaps.
Regularly scan for vulnerabilities to identify weaknesses before attackers do.
The TPN report explicitly calls out inconsistent MFA as a primary failure. All organizations in the entertainment supply chain, from large studios to small VFX vendors, must mandate phishing-resistant MFA (e.g., FIDO2 keys) for all remote access (VPN, RDP), cloud administration consoles, and critical applications. This single control is the most effective defense against the credential-based attacks that the report identifies as surging. Studios should make this a non-negotiable contractual requirement for all third-party partners who handle sensitive content.
The report highlights un-remediated vulnerabilities as a key weakness. Organizations need a formalized and rapid vulnerability management program. This involves using automated tools to continuously scan all assets, including those in cloud environments and at third-party locations, for known vulnerabilities. Strict Service Level Agreements (SLAs) must be established and enforced for patching, with critical internet-facing vulnerabilities being remediated within days, not weeks or months. This proactive posture closes the window of opportunity for attackers seeking to exploit known flaws.
The first quarter of 2026 sees more TPN Security Alerts than the entire year of 2025.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.